0% found this document useful (0 votes)
16 views2 pages

WW

The document details a crash report for the app 'com.candywriter.bitlife.modded' on a Xiaomi device running Android 14. The crash occurred on December 7, 2024, due to a fatal exception in Unity version 2020.3.47f1, resulting in a segmentation fault (SIGSEGV). The report includes technical details such as device specifications, error codes, and a backtrace of the crash.

Uploaded by

lesquatrefrere2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views2 pages

WW

The document details a crash report for the app 'com.candywriter.bitlife.modded' on a Xiaomi device running Android 14. The crash occurred on December 7, 2024, due to a fatal exception in Unity version 2020.3.47f1, resulting in a segmentation fault (SIGSEGV). The report includes technical details such as device specifications, error codes, and a backtrace of the crash.

Uploaded by

lesquatrefrere2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

************* Crash Head ****************

Time Of Crash : 2024_12_07-17_58_40


Device Manufacturer: Xiaomi
Device Model : 23021RAAEG
Android Version : 14
Android SDK : 34
App VersionName : 3.15.7
App VersionCode : 562
************* Crash Head ****************

java.lang.Error: FATAL EXCEPTION [UnityMain]


Unity version : 2020.3.47f1
Device model : Xiaomi 23021RAAEG
Device fingerprint:
Redmi/tapas_global/tapas:14/UKQ1.230917.001/V816.0.9.0.UMTMIXM:user/release-keys
Build Type : Release
Scripting Backend : IL2CPP
ABI : arm64-v8a
Strip Engine Code : true

Caused by: java.lang.Error: *** *** *** *** *** *** *** *** *** *** *** *** *** ***
*** ***
Version '2020.3.47f1 (5ef4f5b5e2d4)', Build type 'Release', Scripting Backend
'il2cpp', CPU 'arm64-v8a'
Build fingerprint:
'Redmi/tapas_global/tapas:14/UKQ1.230917.001/V816.0.9.0.UMTMIXM:user/release-keys'
Revision: '0'
ABI: 'arm64'
Timestamp: 2024-12-07 17:58:39+0100
pid: 27491, tid: 27491, name: .bitlife.modded >>> com.candywriter.bitlife.modded
<<<
uid: 10330
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0xfc8faa00000042
x0 40fc8faa00000032 x1 0000007ab158ed87 x2 0000000000000004 x3
4c69666500000000
x4 4c69666500000000 x5 000000006566694c x6 000000006566694c x7
0000007b8c26e459
x8 0000007b84cfc54c x9 7d918e72237986d9 x10 0000000000000000 x11
00000000000002ee
x12 0000007c3e20c598 x13 00000000140b7888 x14 0000000000000002 x15
b400007c428af180
x16 0000007b8c3967c0 x17 0000007cd10cdbc0 x18 0000007af80816e0 x19
40fc8faa00000032
x20 b400007c428cc5c0 x21 b400007c42842cc0 x22 b400007c428cc5c0 x23
0000000000000007
x24 0000000000000007 x25 00000000141bc830 x26 00000000141bc830 x27
0000000014235dc0
x28 0000007cf9e7d000 x29 0000007fec99d7c0
sp 0000007fec99d700 lr 0000007b8c2e4940 pc 0000007b84cfc54c

backtrace:
#00 pc 0000000001ee654c
/data/app/~~pzMqA07Mv1tcla-GefUo4A==/com.candywriter.bitlife.modded-Pq2yXgSqfs1Zu-
p34If9tg==/lib/arm64/libil2cpp.so
#01 pc 00000000000c193c
/data/app/~~pzMqA07Mv1tcla-GefUo4A==/com.candywriter.bitlife.modded-Pq2yXgSqfs1Zu-
p34If9tg==/lib/arm64/libRocketGames.so (BuildId:
6668d54f064cbc77517d6dbfe61204dee08e924a)
#02 pc 0000000000140a54
/data/app/~~pzMqA07Mv1tcla-GefUo4A==/com.candywriter.bitlife.modded-Pq2yXgSqfs1Zu-
p34If9tg==/oat/arm64/base.odex

at libil2cpp.0x1ee654c(Native Method)
at libRocketGames.0xc193c(Native Method)
at base.0x140a54(Native Method)

You might also like