weirdseed / Vits-Android-ncnn

vits Android部署
MIT License
319 stars 52 forks source link

最新代码,点击生成时,应用闪退 #7

Open onexuan opened 1 year ago

onexuan commented 1 year ago

2023-02-23 16:48:50.163 1552-2053 chatty pid-1552 I uid=1000(system) InputDispatcher identical 1 line 2023-02-23 16:48:50.163 1552-2053 InputDispatcher pid-1552 I stylus touch up, set lcd event 0 2023-02-23 16:48:50.165 2449-2449 AudioManager com.example.moereng V querySoundEffectsEnabled... 2023-02-23 16:48:50.176 2449-2449 libc com.example.moereng A FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f29820) 2023-02-23 16:48:50.176 2449-2449 libc com.example.moereng A Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 2449 (example.moereng), pid 2449 (example.moereng) 2023-02-23 16:48:50.177 2593-3906 ash_trans pid-2593 I com.example.moereng { running duration=16402 Uptime=16402 } transition to: end, reason: not_running 2023-02-23 16:48:50.177 2593-3906 PG_ash pid-2593 I delete app record pkg: com.example.moereng 2023-02-23 16:48:50.177 2593-3906 AppManager pid-2593 I remove toast view when pkg dead, pid : 2449 2023-02-23 16:48:50.272 2449-2625 libc com.example.moereng A FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f2e640) 2023-02-23 16:48:50.273 2872-2872 crash_dump64 pid-2872 I obtaining output fd from tombstoned, type: kDebuggerdTombstone 2023-02-23 16:48:50.273 2449-2626 libc com.example.moereng A FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f2e640) 2023-02-23 16:48:50.274 1091-1091 /system/bin/tombstoned pid-1091 I received crash request for pid 2449 2023-02-23 16:48:50.275 2872-2872 crash_dump64 pid-2872 I performing dump of process 2449 (target tid = 2449) 2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A 2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A Build fingerprint: 'HUAWEI/HMA-AL00/HWHMA:10/HUAWEIHMA-AL00/10.1.0.163C00:user/release-keys' 2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A Revision: '0' 2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A ABI: 'arm64' 2023-02-23 16:48:50.284 47-47 migration/6 pid-47 W type=1400 audit(0.0:265571): avc: granted { setsched } for pid=47 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=process 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A SYSVMTYPE: Maple APPVMTYPE: Art 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A Timestamp: 2023-02-23 16:48:50+0800 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A pid: 2449, tid: 2449, name: example.moereng >>> com.example.moereng <<< 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A uid: 15090 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr -------- 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A Abort message: 'FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f29820)' 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x0 0000000000000000 x1 0000000000000991 x2 0000000000000006 x3 0000007ff5bd79d0 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x4 0000000000000000 x5 0000000000000000 x6 0000000000000000 x7 0000000000000038 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x8 00000000000000f0 x9 28257b038072cadd x10 0000000000000001 x11 0000000000000000 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x12 fffffff0fffffbdf x13 0000000063f72872 x14 00029138032e3170 x15 00000f26c8bff612 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x16 0000007971d30a08 x17 0000007971d107c0 x18 00000079754e4000 x19 0000000000000991 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x20 0000000000000991 x21 00000000ffffffff x22 0000007974cd7020 x23 00000078ee0b7d64 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x24 0000000000000028 x25 0000007974cd7020 x26 00000078ef2108b0 x27 0000000000000001 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x28 0000000000000000 x29 0000007ff5bd7a70 2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A sp 0000007ff5bd79b0 lr 0000007971cc5640 pc 0000007971cc566c 2023-02-23 16:48:50.332 53-53 migration/7 pid-53 W type=1400 audit(0.0:265572): avc: granted { setsched } for pid=53 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=process 2023-02-23 16:48:50.357 1552-1552 WindowManager pid-1552 I removeWindowToken: displayid:0 binder:android.os.Binder@3661825 token:WindowToken{2b9c6aa android.os.Binder@3661825} 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A backtrace: 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #00 pc 000000000007066c /apex/com.android.runtime/lib64/bionic/libc.so (abort+160) (BuildId: b91c775ccc9b0556e91bc575a2511cd0) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #01 pc 00000000000d0d4c /apex/com.android.runtime/lib64/bionic/libc.so (__fortify_fatal(char const, ...)+116) (BuildId: b91c775ccc9b0556e91bc575a2511cd0) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #02 pc 00000000000d0480 /apex/com.android.runtime/lib64/bionic/libc.so (HandleUsingDestroyedMutex(pthread_mutex_t, char const)+52) (BuildId: b91c775ccc9b0556e91bc575a2511cd0) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #03 pc 00000000000d02e4 /apex/com.android.runtime/lib64/bionic/libc.so (pthread_mutex_lock+148) (BuildId: b91c775ccc9b0556e91bc575a2511cd0) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #04 pc 00000000000afd28 /system/lib64/libc++.so (std::__1::recursive_mutex::lock()+8) (BuildId: d957c07e50073a9c45a9ca98188a85f7) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #05 pc 00000000003b9ea4 /system/lib64/libhwui.so (hwforcedark::HwForceDarkCanvas::IsGraphicPolicyEnabled(bool)+52) (BuildId: 37e2d7c3712cdd2fcaadea48cef19956) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #06 pc 00000000001c9854 /system/lib64/libhwui.so (android::SkiaCanvas::drawRoundRect(float, float, float, float, float, float, SkPaint const&)+160) (BuildId: 37e2d7c3712cdd2fcaadea48cef19956) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #07 pc 00000000002f7530 /system/framework/arm64/boot-framework.oat (art_jni_trampoline+208) (BuildId: 4d8291c254d00aa4a381394effb4468f86c242c8) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #08 pc 00000000001475b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #09 pc 00000000001561d4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+284) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #10 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #11 pc 00000000002f9c64 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue*)+656) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #12 pc 00000000005d0f74 /apex/com.android.runtime/lib64/libart.so (MterpInvokeStaticRange+236) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #13 pc 0000000000141c94 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #14 pc 00000000003b0fb2 /system/framework/framework.jar (android.graphics.BaseRecordingCanvas.drawRoundRect+30) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #15 pc 00000000005cec74 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtualRange+1056) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #16 pc 0000000000141b14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #17 pc 00000000003b0f7c /system/framework/framework.jar (android.graphics.BaseRecordingCanvas.drawRoundRect+24) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #18 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #19 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #20 pc 0000000000357b04 [anon:dalvik-classes.dex extracted in memory from /data/app/com.example.moereng--soVYkRLOPgtBnfFP9L05g==/base.apk] (com.google.android.material.shape.MaterialShapeDrawable.drawShape+40) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #21 pc 00000000005d0b28 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirectRange+788) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #22 pc 0000000000141c14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #23 pc 0000000000357a98 [anon:dalvik-classes.dex extracted in memory from /data/app/com.example.moereng--soVYkRLOPgtBnfFP9L05g==/base.apk] (com.google.android.material.shape.MaterialShapeDrawable.drawFillShape+28) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #24 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #25 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #26 pc 000000000035796a [anon:dalvik-classes.dex extracted in memory from /data/app/com.example.moereng--soVYkRLOPgtBnfFP9L05g==/base.apk] (com.google.android.material.shape.MaterialShapeDrawable.draw+178) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #27 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #28 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #29 pc 00000000003e1526 /system/framework/framework.jar (android.graphics.drawable.LayerDrawable.draw+34) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #30 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #31 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #32 pc 00000000003d9c40 /system/framework/framework.jar (android.graphics.drawable.DrawableWrapper.draw+8) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #33 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #34 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #35 pc 00000000003e4a18 /system/framework/framework.jar (android.graphics.drawable.RippleDrawable.drawContent+48) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #36 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #37 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #38 pc 00000000003e491a /system/framework/framework.jar (android.graphics.drawable.RippleDrawable.draw+42) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #39 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #40 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #41 pc 0000000000235d9a /system/framework/framework.jar (android.view.View.getDrawableRenderNode+106) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #42 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #43 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #44 pc 0000000000243c70 /system/framework/framework.jar (android.view.View.drawBackground+48) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #45 pc 00000000005d0b28 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirectRange+788) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #46 pc 0000000000141c14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #47 pc 00000000002435ea /system/framework/framework.jar (android.view.View.draw+46) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #48 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #49 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #50 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #51 pc 00000000020176f8 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+904) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #52 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #53 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #54 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #55 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #56 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #57 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #58 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #59 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #60 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #61 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #62 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #63 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #64 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #65 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #66 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #67 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #68 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #69 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #70 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #71 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #72 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #73 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #74 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #75 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #76 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #77 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #78 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #79 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #80 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #81 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #82 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #83 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #84 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #85 pc 0000000000210c46 /system/framework/framework.jar (android.view.ThreadedRenderer.updateViewTreeDisplayList+54) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #86 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #87 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #88 pc 0000000000210b1e /system/framework/framework.jar (android.view.ThreadedRenderer.updateRootDisplayList+14) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #89 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #90 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #91 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #92 pc 000000000203a838 /memfd:/jit-cache (deleted) (android.view.ThreadedRenderer.draw+152) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #93 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #94 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #95 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #96 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #97 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #98 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #99 pc 000000000022a796 /system/framework/framework.jar (android.view.ViewRootImpl.draw+774) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #100 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #101 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #102 pc 00000000002301de /system/framework/framework.jar (android.view.ViewRootImpl.performDraw+618) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #103 pc 00000000005d0b28 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirectRange+788) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #104 pc 0000000000141c14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #105 pc 0000000000231ee2 /system/framework/framework.jar (android.view.ViewRootImpl.performTraversals+6566) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #106 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #107 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #108 pc 000000000022e3a6 /system/framework/framework.jar (android.view.ViewRootImpl.doTraversal+94) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #109 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #110 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #111 pc 0000000000227a10 /system/framework/framework.jar (android.view.ViewRootImpl$TraversalRunnable.run+16) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #112 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #113 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #114 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #115 pc 000000000203e31c /memfd:/jit-cache (deleted) (android.view.Choreographer$CallbackRecord.run+252) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #116 pc 000000000201e5dc /memfd:/jit-cache (deleted) (android.view.Choreographer.doCallbacks+780) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #117 pc 00000000020085cc /memfd:/jit-cache (deleted) (android.view.Choreographer.doFrame+1452) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #118 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #119 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #120 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #121 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #122 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #123 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #124 pc 00000000001d4770 /system/framework/framework.jar (android.view.Choreographer$FrameDisplayEventReceiver.run+32) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #125 pc 00000000005cd074 /apex/com.android.runtime/lib64/libart.so (MterpInvokeInterface+1752) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #126 pc 0000000000141a14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_interface+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #127 pc 000000000030d514 /system/framework/framework.jar (android.os.Handler.handleCallback+4) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #128 pc 00000000005ce41c /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1136) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #129 pc 0000000000141994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #130 pc 000000000030d380 /system/framework/framework.jar (android.os.Handler.dispatchMessage+8) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #131 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #132 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #133 pc 00000000003384f8 /system/framework/framework.jar (android.os.Looper.loop+480) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #134 pc 00000000005ce41c /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1136) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #135 pc 0000000000141994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #136 pc 00000000001ac2ec /system/framework/framework.jar (android.app.ActivityThread.main+1372) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #137 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #138 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #139 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #140 pc 00000000001475b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #141 pc 00000000001561d4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+284) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #142 pc 00000000004d8834 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod, art::(anonymous namespace)::ArgArray, art::JValue, char const)+104) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #143 pc 00000000004da25c /apex/com.android.runtime/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jobject, _jobject, unsigned long)+1476) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #144 pc 0000000000464140 /apex/com.android.runtime/lib64/libart.so (art::Method_invoke(_JNIEnv, _jobject, _jobject, _jobjectArray)+52) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #145 pc 00000000000f8c34 /system/framework/arm64/boot.oat (art_jni_trampoline+180) (BuildId: ad918520addd249a3317bef34c6afa3b8c3e6241) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #146 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #147 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #148 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread, art::ArtMethod, art::ShadowFrame, unsigned short, art::JValue)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #149 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod, art::Thread, art::ShadowFrame&, art::Instruction const, unsigned short, art::JValue)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #150 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #151 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #152 pc 00000000004018a6 /system/framework/framework.jar (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #153 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #154 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #155 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #156 pc 0000000000b257fc /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+3660) (BuildId: 4d8291c254d00aa4a381394effb4468f86c242c8) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #157 pc 00000000001475b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #158 pc 00000000001561d4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread, unsigned int, unsigned int, art::JValue, char const)+284) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #159 pc 00000000004d8834 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod, art::(anonymous namespace)::ArgArray, art::JValue, char const)+104) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #160 pc 00000000004d84a0 /apex/com.android.runtime/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject, _jmethodID, std::__va_list)+408) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #161 pc 00000000003d7cf8 /apex/com.android.runtime/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv, _jclass, _jmethodID, std::__va_list)+660) (BuildId: 762960c75ada06c48e438df6df29b0a1) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #162 pc 00000000001015c4 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass, _jmethodID, ...)+116) (BuildId: e99b2e2e44982c12a4dc2e20fbdbab43) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #163 pc 0000000000104c48 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector const&, bool)+1248) (BuildId: e99b2e2e44982c12a4dc2e20fbdbab43) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #164 pc 00000000000034e0 /system/bin/app_process64 (main+1168) (BuildId: e844be217eb39b34490d3798328d1f12) 2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #165 pc 000000000006b108 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: b91c775ccc9b0556e91bc575a2511cd0) 2023-02-23 16:48:50.630 668-12580 netd pid-668 I trafficSwapActiveStatsMap() <18.17ms> 2023-02-23 16:48:50.647 1552-2091 WificondControl pid-1552 I Noise: -91, Snr: 39, Chload: 24, rssi: -54, txBitrate: 650, rxBitrate: 650, frequency: 5745, UlDelay: -1, currentTxBytes: 262856399, currentTxPackets: 1573582, currentTxFailed: 15, currentRxBytes: 221659782, currentRxPackets: 3524739 2023-02-23 16:48:50.648 1552-2189 HuaweiWifi...ateMachine pid-1552 D nothing to do 2023-02-23 16:48:50.648 1552-2090 WiFi_PRO pid-1552 I MSG_RETURN_AP_CURRY_RSSI rssi = -54 2023-02-23 16:48:50.648 1552-2090 QosMonitor pid-1552 I queryRtt: rttType = 3 2023-02-23 16:48:50.648 1552-2206 HwDualBandManager pid-1552 I handle2gApStrongWifiRssiChange 2023-02-23 16:48:50.649 1552-2090 HwWifiProServiceProxy pid-1552 I ctrlHwWifiNetwork pkgName: WIFIPRO_SERVICE interfaceId: 8 2023-02-23 16:48:50.649 1552-2189 HuaweiWifi...ateMachine pid-1552 I high data flow: protection_counter = 0, not_detect_counter = 32 2023-02-23 16:48:50.649 1552-2189 HuaweiWifi...ateMachine pid-1552 I high data flow scenario: 0 --> 0 rx bytes =4KB 2023-02-23 16:48:50.649 1552-2189 HuaweiWifi...ateMachine pid-1552 I POta txb txg rxg:0, 1, 0. Lr =0% Totpkt=1 2023-02-23 16:48:50.649 1552-2090 QosMonitor pid-1552 I postEventFromNative: msg=100,arg1=4,arg2=10 2023-02-23 16:48:50.649 1552-2090 HwWifiProServiceProxy pid-1552 I ctrlHwWifiNetwork pkgName: WIFIPRO_SERVICE interfaceId: 8 2023-02-23 16:48:50.650 1552-2090 QosMonitor pid-1552 I postEventFromNative: msg=100,arg1=0,arg2=10 2023

weirdseed commented 1 year ago

你好,你是用的是什么设备呢?

onexuan commented 1 year ago

华为Mate20

weirdseed commented 1 year ago

华为Mate20

是鸿蒙系统还是安卓?麻烦能详细写一下吗?

onexuan commented 1 year ago

鸿蒙系统,最新代码,安装后,加载配置和加载模型都成功,但点击“生成”,就会闪退

dhs964057117 commented 1 year ago

Xiaomi Pad5 Android11,same problem app crash when click the generate