Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

最新代码,点击生成时,应用闪退 #7

Open
onexuan opened this issue Feb 23, 2023 · 5 comments
Open

最新代码,点击生成时,应用闪退 #7

onexuan opened this issue Feb 23, 2023 · 5 comments

Comments

@onexuan
Copy link

onexuan commented Feb 23, 2023

2023-02-23 16:48:50.163 1552-2053 chatty pid-1552 I uid=1000(system) InputDispatcher identical 1 line
2023-02-23 16:48:50.163 1552-2053 InputDispatcher pid-1552 I stylus touch up, set lcd event 0
2023-02-23 16:48:50.165 2449-2449 AudioManager com.example.moereng V querySoundEffectsEnabled...
2023-02-23 16:48:50.176 2449-2449 libc com.example.moereng A FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f29820)
2023-02-23 16:48:50.176 2449-2449 libc com.example.moereng A Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 2449 (example.moereng), pid 2449 (example.moereng)
2023-02-23 16:48:50.177 2593-3906 ash_trans pid-2593 I com.example.moereng { running duration=16402 Uptime=16402 } transition to: end, reason: not_running
2023-02-23 16:48:50.177 2593-3906 PG_ash pid-2593 I delete app record pkg: com.example.moereng
2023-02-23 16:48:50.177 2593-3906 AppManager pid-2593 I remove toast view when pkg dead, pid : 2449
2023-02-23 16:48:50.272 2449-2625 libc com.example.moereng A FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f2e640)
2023-02-23 16:48:50.273 2872-2872 crash_dump64 pid-2872 I obtaining output fd from tombstoned, type: kDebuggerdTombstone
2023-02-23 16:48:50.273 2449-2626 libc com.example.moereng A FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f2e640)
2023-02-23 16:48:50.274 1091-1091 /system/bin/tombstoned pid-1091 I received crash request for pid 2449
2023-02-23 16:48:50.275 2872-2872 crash_dump64 pid-2872 I performing dump of process 2449 (target tid = 2449)
2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A Build fingerprint: 'HUAWEI/HMA-AL00/HWHMA:10/HUAWEIHMA-AL00/10.1.0.163C00:user/release-keys'
2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A Revision: '0'
2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A ABI: 'arm64'
2023-02-23 16:48:50.284 47-47 migration/6 pid-47 W type=1400 audit(0.0:265571): avc: granted { setsched } for pid=47 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=process
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A SYSVMTYPE: Maple
APPVMTYPE: Art
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A Timestamp: 2023-02-23 16:48:50+0800
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A pid: 2449, tid: 2449, name: example.moereng >>> com.example.moereng <<<
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A uid: 15090
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A Abort message: 'FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f29820)'
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x0 0000000000000000 x1 0000000000000991 x2 0000000000000006 x3 0000007ff5bd79d0
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x4 0000000000000000 x5 0000000000000000 x6 0000000000000000 x7 0000000000000038
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x8 00000000000000f0 x9 28257b038072cadd x10 0000000000000001 x11 0000000000000000
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x12 fffffff0fffffbdf x13 0000000063f72872 x14 00029138032e3170 x15 00000f26c8bff612
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x16 0000007971d30a08 x17 0000007971d107c0 x18 00000079754e4000 x19 0000000000000991
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x20 0000000000000991 x21 00000000ffffffff x22 0000007974cd7020 x23 00000078ee0b7d64
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x24 0000000000000028 x25 0000007974cd7020 x26 00000078ef2108b0 x27 0000000000000001
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x28 0000000000000000 x29 0000007ff5bd7a70
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A sp 0000007ff5bd79b0 lr 0000007971cc5640 pc 0000007971cc566c
2023-02-23 16:48:50.332 53-53 migration/7 pid-53 W type=1400 audit(0.0:265572): avc: granted { setsched } for pid=53 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=process
2023-02-23 16:48:50.357 1552-1552 WindowManager pid-1552 I removeWindowToken: displayid:0 binder:android.os.Binder@3661825 token:WindowToken{2b9c6aa android.os.Binder@3661825}
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A backtrace:
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #00 pc 000000000007066c /apex/com.android.runtime/lib64/bionic/libc.so (abort+160) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #1 pc 00000000000d0d4c /apex/com.android.runtime/lib64/bionic/libc.so (__fortify_fatal(char const*, ...)+116) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #2 pc 00000000000d0480 /apex/com.android.runtime/lib64/bionic/libc.so (HandleUsingDestroyedMutex(pthread_mutex_t*, char const*)+52) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #3 pc 00000000000d02e4 /apex/com.android.runtime/lib64/bionic/libc.so (pthread_mutex_lock+148) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #4 pc 00000000000afd28 /system/lib64/libc++.so (std::__1::recursive_mutex::lock()+8) (BuildId: d957c07e50073a9c45a9ca98188a85f7)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #5 pc 00000000003b9ea4 /system/lib64/libhwui.so (hwforcedark::HwForceDarkCanvas::IsGraphicPolicyEnabled(bool)+52) (BuildId: 37e2d7c3712cdd2fcaadea48cef19956)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #6 pc 00000000001c9854 /system/lib64/libhwui.so (android::SkiaCanvas::drawRoundRect(float, float, float, float, float, float, SkPaint const&)+160) (BuildId: 37e2d7c3712cdd2fcaadea48cef19956)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #7 pc 00000000002f7530 /system/framework/arm64/boot-framework.oat (art_jni_trampoline+208) (BuildId: 4d8291c254d00aa4a381394effb4468f86c242c8)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #8 pc 00000000001475b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #9 pc 00000000001561d4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+284) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #10 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #11 pc 00000000002f9c64 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+656) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #12 pc 00000000005d0f74 /apex/com.android.runtime/lib64/libart.so (MterpInvokeStaticRange+236) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #13 pc 0000000000141c94 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #14 pc 00000000003b0fb2 /system/framework/framework.jar (android.graphics.BaseRecordingCanvas.drawRoundRect+30)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #15 pc 00000000005cec74 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtualRange+1056) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #16 pc 0000000000141b14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #17 pc 00000000003b0f7c /system/framework/framework.jar (android.graphics.BaseRecordingCanvas.drawRoundRect+24)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #18 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #19 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #20 pc 0000000000357b04 [anon:dalvik-classes.dex extracted in memory from /data/app/com.example.moereng--soVYkRLOPgtBnfFP9L05g==/base.apk] (com.google.android.material.shape.MaterialShapeDrawable.drawShape+40)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #21 pc 00000000005d0b28 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirectRange+788) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #22 pc 0000000000141c14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #23 pc 0000000000357a98 [anon:dalvik-classes.dex extracted in memory from /data/app/com.example.moereng--soVYkRLOPgtBnfFP9L05g==/base.apk] (com.google.android.material.shape.MaterialShapeDrawable.drawFillShape+28)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #24 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #25 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #26 pc 000000000035796a [anon:dalvik-classes.dex extracted in memory from /data/app/com.example.moereng--soVYkRLOPgtBnfFP9L05g==/base.apk] (com.google.android.material.shape.MaterialShapeDrawable.draw+178)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #27 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #28 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #29 pc 00000000003e1526 /system/framework/framework.jar (android.graphics.drawable.LayerDrawable.draw+34)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #30 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #31 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #32 pc 00000000003d9c40 /system/framework/framework.jar (android.graphics.drawable.DrawableWrapper.draw+8)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #33 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #34 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #35 pc 00000000003e4a18 /system/framework/framework.jar (android.graphics.drawable.RippleDrawable.drawContent+48)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #36 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #37 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #38 pc 00000000003e491a /system/framework/framework.jar (android.graphics.drawable.RippleDrawable.draw+42)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #39 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #40 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #41 pc 0000000000235d9a /system/framework/framework.jar (android.view.View.getDrawableRenderNode+106)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #42 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #43 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #44 pc 0000000000243c70 /system/framework/framework.jar (android.view.View.drawBackground+48)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #45 pc 00000000005d0b28 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirectRange+788) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #46 pc 0000000000141c14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #47 pc 00000000002435ea /system/framework/framework.jar (android.view.View.draw+46)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #48 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #49 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #50 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #51 pc 00000000020176f8 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+904)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #52 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #53 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #54 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #55 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #56 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #57 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #58 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #59 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #60 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #61 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #62 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #63 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #64 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #65 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #66 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #67 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #68 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #69 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #70 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #71 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #72 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #73 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #74 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #75 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #76 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #77 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #78 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #79 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #80 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #81 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #82 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #83 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #84 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #85 pc 0000000000210c46 /system/framework/framework.jar (android.view.ThreadedRenderer.updateViewTreeDisplayList+54)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #86 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #87 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #88 pc 0000000000210b1e /system/framework/framework.jar (android.view.ThreadedRenderer.updateRootDisplayList+14)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #89 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #90 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #91 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #92 pc 000000000203a838 /memfd:/jit-cache (deleted) (android.view.ThreadedRenderer.draw+152)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #93 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #94 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #95 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #96 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #97 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #98 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #99 pc 000000000022a796 /system/framework/framework.jar (android.view.ViewRootImpl.draw+774)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #100 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #101 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #102 pc 00000000002301de /system/framework/framework.jar (android.view.ViewRootImpl.performDraw+618)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #103 pc 00000000005d0b28 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirectRange+788) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #104 pc 0000000000141c14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #105 pc 0000000000231ee2 /system/framework/framework.jar (android.view.ViewRootImpl.performTraversals+6566)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #106 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #107 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #108 pc 000000000022e3a6 /system/framework/framework.jar (android.view.ViewRootImpl.doTraversal+94)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #109 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #110 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #111 pc 0000000000227a10 /system/framework/framework.jar (android.view.ViewRootImpl$TraversalRunnable.run+16)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #112 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #113 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #114 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #115 pc 000000000203e31c /memfd:/jit-cache (deleted) (android.view.Choreographer$CallbackRecord.run+252)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #116 pc 000000000201e5dc /memfd:/jit-cache (deleted) (android.view.Choreographer.doCallbacks+780)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #117 pc 00000000020085cc /memfd:/jit-cache (deleted) (android.view.Choreographer.doFrame+1452)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #118 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #119 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #120 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #121 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #122 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #123 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #124 pc 00000000001d4770 /system/framework/framework.jar (android.view.Choreographer$FrameDisplayEventReceiver.run+32)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #125 pc 00000000005cd074 /apex/com.android.runtime/lib64/libart.so (MterpInvokeInterface+1752) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #126 pc 0000000000141a14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_interface+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #127 pc 000000000030d514 /system/framework/framework.jar (android.os.Handler.handleCallback+4)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #128 pc 00000000005ce41c /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1136) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #129 pc 0000000000141994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #130 pc 000000000030d380 /system/framework/framework.jar (android.os.Handler.dispatchMessage+8)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #131 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #132 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #133 pc 00000000003384f8 /system/framework/framework.jar (android.os.Looper.loop+480)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #134 pc 00000000005ce41c /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1136) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #135 pc 0000000000141994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #136 pc 00000000001ac2ec /system/framework/framework.jar (android.app.ActivityThread.main+1372)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #137 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #138 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #139 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #140 pc 00000000001475b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #141 pc 00000000001561d4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+284) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #142 pc 00000000004d8834 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #143 pc 00000000004da25c /apex/com.android.runtime/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1476) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #144 pc 0000000000464140 /apex/com.android.runtime/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #145 pc 00000000000f8c34 /system/framework/arm64/boot.oat (art_jni_trampoline+180) (BuildId: ad918520addd249a3317bef34c6afa3b8c3e6241)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #146 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #147 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #148 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #149 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #150 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #151 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #152 pc 00000000004018a6 /system/framework/framework.jar (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #153 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #154 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #155 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #156 pc 0000000000b257fc /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+3660) (BuildId: 4d8291c254d00aa4a381394effb4468f86c242c8)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #157 pc 00000000001475b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #158 pc 00000000001561d4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+284) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #159 pc 00000000004d8834 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #160 pc 00000000004d84a0 /apex/com.android.runtime/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #161 pc 00000000003d7cf8 /apex/com.android.runtime/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+660) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #162 pc 00000000001015c4 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: e99b2e2e44982c12a4dc2e20fbdbab43)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #163 pc 0000000000104c48 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+1248) (BuildId: e99b2e2e44982c12a4dc2e20fbdbab43)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #164 pc 00000000000034e0 /system/bin/app_process64 (main+1168) (BuildId: e844be217eb39b34490d3798328d1f12)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #165 pc 000000000006b108 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.630 668-12580 netd pid-668 I trafficSwapActiveStatsMap() <18.17ms>
2023-02-23 16:48:50.647 1552-2091 WificondControl pid-1552 I Noise: -91, Snr: 39, Chload: 24, rssi: -54, txBitrate: 650, rxBitrate: 650, frequency: 5745, UlDelay: -1, currentTxBytes: 262856399, currentTxPackets: 1573582, currentTxFailed: 15, currentRxBytes: 221659782, currentRxPackets: 3524739
2023-02-23 16:48:50.648 1552-2189 HuaweiWifi...ateMachine pid-1552 D nothing to do
2023-02-23 16:48:50.648 1552-2090 WiFi_PRO pid-1552 I MSG_RETURN_AP_CURRY_RSSI rssi = -54
2023-02-23 16:48:50.648 1552-2090 QosMonitor pid-1552 I queryRtt: rttType = 3
2023-02-23 16:48:50.648 1552-2206 HwDualBandManager pid-1552 I handle2gApStrongWifiRssiChange
2023-02-23 16:48:50.649 1552-2090 HwWifiProServiceProxy pid-1552 I ctrlHwWifiNetwork pkgName: WIFIPRO_SERVICE interfaceId: 8
2023-02-23 16:48:50.649 1552-2189 HuaweiWifi...ateMachine pid-1552 I high data flow: protection_counter = 0, not_detect_counter = 32
2023-02-23 16:48:50.649 1552-2189 HuaweiWifi...ateMachine pid-1552 I high data flow scenario: 0 --> 0 rx bytes =4KB
2023-02-23 16:48:50.649 1552-2189 HuaweiWifi...ateMachine pid-1552 I POta txb txg rxg:0, 1, 0. Lr =0% Totpkt=1
2023-02-23 16:48:50.649 1552-2090 QosMonitor pid-1552 I postEventFromNative: msg=100,arg1=4,arg2=10
2023-02-23 16:48:50.649 1552-2090 HwWifiProServiceProxy pid-1552 I ctrlHwWifiNetwork pkgName: WIFIPRO_SERVICE interfaceId: 8
2023-02-23 16:48:50.650 1552-2090 QosMonitor pid-1552 I postEventFromNative: msg=100,arg1=0,arg2=10
2023

@onexuan onexuan changed the title 最新代码,点击生成时,应用闪退(arm64) 最新代码,点击生成时,应用闪退 Feb 24, 2023
@weirdseed
Copy link
Owner

你好,你是用的是什么设备呢?

@onexuan
Copy link
Author

onexuan commented Mar 2, 2023

华为Mate20

@weirdseed
Copy link
Owner

华为Mate20

是鸿蒙系统还是安卓?麻烦能详细写一下吗?

@onexuan
Copy link
Author

onexuan commented Mar 3, 2023

鸿蒙系统,最新代码,安装后,加载配置和加载模型都成功,但点击“生成”,就会闪退

@dhs964057117
Copy link

dhs964057117 commented May 4, 2023

Xiaomi Pad5 Android11,same problem app crash when click the generate

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants