Git Product home page Git Product logo

vits-android-ncnn's People

Contributors

l1006986533 avatar weirdseed avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

vits-android-ncnn's Issues

update pre-built apk

it looks like eng and other cleaners isn't supported on the Feb release, will there be an update to the apk releases?

转化模型导入无法使用

这边遇到一个问题:

我用工具转换vits为ncnn支持的格式时,即使是有配置的模型,也会出现speaker和n_speaker数量不匹配的报错

我注释报错强制转换,加载bin模型时又会有length=1,index=1的报错

最新代码,点击生成时,应用闪退

2023-02-23 16:48:50.163 1552-2053 chatty pid-1552 I uid=1000(system) InputDispatcher identical 1 line
2023-02-23 16:48:50.163 1552-2053 InputDispatcher pid-1552 I stylus touch up, set lcd event 0
2023-02-23 16:48:50.165 2449-2449 AudioManager com.example.moereng V querySoundEffectsEnabled...
2023-02-23 16:48:50.176 2449-2449 libc com.example.moereng A FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f29820)
2023-02-23 16:48:50.176 2449-2449 libc com.example.moereng A Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 2449 (example.moereng), pid 2449 (example.moereng)
2023-02-23 16:48:50.177 2593-3906 ash_trans pid-2593 I com.example.moereng { running duration=16402 Uptime=16402 } transition to: end, reason: not_running
2023-02-23 16:48:50.177 2593-3906 PG_ash pid-2593 I delete app record pkg: com.example.moereng
2023-02-23 16:48:50.177 2593-3906 AppManager pid-2593 I remove toast view when pkg dead, pid : 2449
2023-02-23 16:48:50.272 2449-2625 libc com.example.moereng A FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f2e640)
2023-02-23 16:48:50.273 2872-2872 crash_dump64 pid-2872 I obtaining output fd from tombstoned, type: kDebuggerdTombstone
2023-02-23 16:48:50.273 2449-2626 libc com.example.moereng A FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f2e640)
2023-02-23 16:48:50.274 1091-1091 /system/bin/tombstoned pid-1091 I received crash request for pid 2449
2023-02-23 16:48:50.275 2872-2872 crash_dump64 pid-2872 I performing dump of process 2449 (target tid = 2449)
2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A Build fingerprint: 'HUAWEI/HMA-AL00/HWHMA:10/HUAWEIHMA-AL00/10.1.0.163C00:user/release-keys'
2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A Revision: '0'
2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A ABI: 'arm64'
2023-02-23 16:48:50.284 47-47 migration/6 pid-47 W type=1400 audit(0.0:265571): avc: granted { setsched } for pid=47 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=process
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A SYSVMTYPE: Maple
APPVMTYPE: Art
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A Timestamp: 2023-02-23 16:48:50+0800
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A pid: 2449, tid: 2449, name: example.moereng >>> com.example.moereng <<<
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A uid: 15090
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A Abort message: 'FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f29820)'
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x0 0000000000000000 x1 0000000000000991 x2 0000000000000006 x3 0000007ff5bd79d0
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x4 0000000000000000 x5 0000000000000000 x6 0000000000000000 x7 0000000000000038
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x8 00000000000000f0 x9 28257b038072cadd x10 0000000000000001 x11 0000000000000000
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x12 fffffff0fffffbdf x13 0000000063f72872 x14 00029138032e3170 x15 00000f26c8bff612
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x16 0000007971d30a08 x17 0000007971d107c0 x18 00000079754e4000 x19 0000000000000991
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x20 0000000000000991 x21 00000000ffffffff x22 0000007974cd7020 x23 00000078ee0b7d64
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x24 0000000000000028 x25 0000007974cd7020 x26 00000078ef2108b0 x27 0000000000000001
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x28 0000000000000000 x29 0000007ff5bd7a70
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A sp 0000007ff5bd79b0 lr 0000007971cc5640 pc 0000007971cc566c
2023-02-23 16:48:50.332 53-53 migration/7 pid-53 W type=1400 audit(0.0:265572): avc: granted { setsched } for pid=53 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=process
2023-02-23 16:48:50.357 1552-1552 WindowManager pid-1552 I removeWindowToken: displayid:0 binder:android.os.Binder@3661825 token:WindowToken{2b9c6aa android.os.Binder@3661825}
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A backtrace:
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #00 pc 000000000007066c /apex/com.android.runtime/lib64/bionic/libc.so (abort+160) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #1 pc 00000000000d0d4c /apex/com.android.runtime/lib64/bionic/libc.so (__fortify_fatal(char const*, ...)+116) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #2 pc 00000000000d0480 /apex/com.android.runtime/lib64/bionic/libc.so (HandleUsingDestroyedMutex(pthread_mutex_t*, char const*)+52) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #3 pc 00000000000d02e4 /apex/com.android.runtime/lib64/bionic/libc.so (pthread_mutex_lock+148) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #4 pc 00000000000afd28 /system/lib64/libc++.so (std::__1::recursive_mutex::lock()+8) (BuildId: d957c07e50073a9c45a9ca98188a85f7)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #5 pc 00000000003b9ea4 /system/lib64/libhwui.so (hwforcedark::HwForceDarkCanvas::IsGraphicPolicyEnabled(bool)+52) (BuildId: 37e2d7c3712cdd2fcaadea48cef19956)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #6 pc 00000000001c9854 /system/lib64/libhwui.so (android::SkiaCanvas::drawRoundRect(float, float, float, float, float, float, SkPaint const&)+160) (BuildId: 37e2d7c3712cdd2fcaadea48cef19956)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #7 pc 00000000002f7530 /system/framework/arm64/boot-framework.oat (art_jni_trampoline+208) (BuildId: 4d8291c254d00aa4a381394effb4468f86c242c8)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #8 pc 00000000001475b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #9 pc 00000000001561d4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+284) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #10 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #11 pc 00000000002f9c64 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+656) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #12 pc 00000000005d0f74 /apex/com.android.runtime/lib64/libart.so (MterpInvokeStaticRange+236) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #13 pc 0000000000141c94 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #14 pc 00000000003b0fb2 /system/framework/framework.jar (android.graphics.BaseRecordingCanvas.drawRoundRect+30)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #15 pc 00000000005cec74 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtualRange+1056) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #16 pc 0000000000141b14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #17 pc 00000000003b0f7c /system/framework/framework.jar (android.graphics.BaseRecordingCanvas.drawRoundRect+24)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #18 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #19 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #20 pc 0000000000357b04 [anon:dalvik-classes.dex extracted in memory from /data/app/com.example.moereng--soVYkRLOPgtBnfFP9L05g==/base.apk] (com.google.android.material.shape.MaterialShapeDrawable.drawShape+40)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #21 pc 00000000005d0b28 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirectRange+788) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #22 pc 0000000000141c14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #23 pc 0000000000357a98 [anon:dalvik-classes.dex extracted in memory from /data/app/com.example.moereng--soVYkRLOPgtBnfFP9L05g==/base.apk] (com.google.android.material.shape.MaterialShapeDrawable.drawFillShape+28)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #24 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #25 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #26 pc 000000000035796a [anon:dalvik-classes.dex extracted in memory from /data/app/com.example.moereng--soVYkRLOPgtBnfFP9L05g==/base.apk] (com.google.android.material.shape.MaterialShapeDrawable.draw+178)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #27 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #28 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #29 pc 00000000003e1526 /system/framework/framework.jar (android.graphics.drawable.LayerDrawable.draw+34)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #30 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #31 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #32 pc 00000000003d9c40 /system/framework/framework.jar (android.graphics.drawable.DrawableWrapper.draw+8)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #33 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #34 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #35 pc 00000000003e4a18 /system/framework/framework.jar (android.graphics.drawable.RippleDrawable.drawContent+48)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #36 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #37 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #38 pc 00000000003e491a /system/framework/framework.jar (android.graphics.drawable.RippleDrawable.draw+42)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #39 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #40 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #41 pc 0000000000235d9a /system/framework/framework.jar (android.view.View.getDrawableRenderNode+106)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #42 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #43 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #44 pc 0000000000243c70 /system/framework/framework.jar (android.view.View.drawBackground+48)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #45 pc 00000000005d0b28 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirectRange+788) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #46 pc 0000000000141c14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #47 pc 00000000002435ea /system/framework/framework.jar (android.view.View.draw+46)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #48 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #49 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #50 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #51 pc 00000000020176f8 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+904)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #52 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #53 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #54 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #55 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #56 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #57 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #58 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #59 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #60 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #61 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #62 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #63 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #64 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #65 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #66 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #67 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #68 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #69 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #70 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #71 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #72 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #73 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #74 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #75 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #76 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #77 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #78 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #79 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #80 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #81 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #82 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #83 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #84 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #85 pc 0000000000210c46 /system/framework/framework.jar (android.view.ThreadedRenderer.updateViewTreeDisplayList+54)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #86 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #87 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #88 pc 0000000000210b1e /system/framework/framework.jar (android.view.ThreadedRenderer.updateRootDisplayList+14)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #89 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #90 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #91 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #92 pc 000000000203a838 /memfd:/jit-cache (deleted) (android.view.ThreadedRenderer.draw+152)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #93 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #94 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #95 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #96 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #97 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #98 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #99 pc 000000000022a796 /system/framework/framework.jar (android.view.ViewRootImpl.draw+774)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #100 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #101 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #102 pc 00000000002301de /system/framework/framework.jar (android.view.ViewRootImpl.performDraw+618)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #103 pc 00000000005d0b28 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirectRange+788) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #104 pc 0000000000141c14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #105 pc 0000000000231ee2 /system/framework/framework.jar (android.view.ViewRootImpl.performTraversals+6566)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #106 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #107 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #108 pc 000000000022e3a6 /system/framework/framework.jar (android.view.ViewRootImpl.doTraversal+94)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #109 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #110 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #111 pc 0000000000227a10 /system/framework/framework.jar (android.view.ViewRootImpl$TraversalRunnable.run+16)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #112 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #113 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #114 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #115 pc 000000000203e31c /memfd:/jit-cache (deleted) (android.view.Choreographer$CallbackRecord.run+252)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #116 pc 000000000201e5dc /memfd:/jit-cache (deleted) (android.view.Choreographer.doCallbacks+780)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #117 pc 00000000020085cc /memfd:/jit-cache (deleted) (android.view.Choreographer.doFrame+1452)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #118 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #119 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #120 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #121 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #122 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #123 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #124 pc 00000000001d4770 /system/framework/framework.jar (android.view.Choreographer$FrameDisplayEventReceiver.run+32)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #125 pc 00000000005cd074 /apex/com.android.runtime/lib64/libart.so (MterpInvokeInterface+1752) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #126 pc 0000000000141a14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_interface+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #127 pc 000000000030d514 /system/framework/framework.jar (android.os.Handler.handleCallback+4)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #128 pc 00000000005ce41c /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1136) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #129 pc 0000000000141994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #130 pc 000000000030d380 /system/framework/framework.jar (android.os.Handler.dispatchMessage+8)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #131 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #132 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #133 pc 00000000003384f8 /system/framework/framework.jar (android.os.Looper.loop+480)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #134 pc 00000000005ce41c /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1136) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #135 pc 0000000000141994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #136 pc 00000000001ac2ec /system/framework/framework.jar (android.app.ActivityThread.main+1372)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #137 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #138 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #139 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #140 pc 00000000001475b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #141 pc 00000000001561d4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+284) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #142 pc 00000000004d8834 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #143 pc 00000000004da25c /apex/com.android.runtime/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1476) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #144 pc 0000000000464140 /apex/com.android.runtime/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #145 pc 00000000000f8c34 /system/framework/arm64/boot.oat (art_jni_trampoline+180) (BuildId: ad918520addd249a3317bef34c6afa3b8c3e6241)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #146 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #147 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #148 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #149 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #150 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #151 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #152 pc 00000000004018a6 /system/framework/framework.jar (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #153 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #154 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #155 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #156 pc 0000000000b257fc /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+3660) (BuildId: 4d8291c254d00aa4a381394effb4468f86c242c8)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #157 pc 00000000001475b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #158 pc 00000000001561d4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+284) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #159 pc 00000000004d8834 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #160 pc 00000000004d84a0 /apex/com.android.runtime/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #161 pc 00000000003d7cf8 /apex/com.android.runtime/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+660) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #162 pc 00000000001015c4 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: e99b2e2e44982c12a4dc2e20fbdbab43)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #163 pc 0000000000104c48 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+1248) (BuildId: e99b2e2e44982c12a4dc2e20fbdbab43)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #164 pc 00000000000034e0 /system/bin/app_process64 (main+1168) (BuildId: e844be217eb39b34490d3798328d1f12)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #165 pc 000000000006b108 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.630 668-12580 netd pid-668 I trafficSwapActiveStatsMap() <18.17ms>
2023-02-23 16:48:50.647 1552-2091 WificondControl pid-1552 I Noise: -91, Snr: 39, Chload: 24, rssi: -54, txBitrate: 650, rxBitrate: 650, frequency: 5745, UlDelay: -1, currentTxBytes: 262856399, currentTxPackets: 1573582, currentTxFailed: 15, currentRxBytes: 221659782, currentRxPackets: 3524739
2023-02-23 16:48:50.648 1552-2189 HuaweiWifi...ateMachine pid-1552 D nothing to do
2023-02-23 16:48:50.648 1552-2090 WiFi_PRO pid-1552 I MSG_RETURN_AP_CURRY_RSSI rssi = -54
2023-02-23 16:48:50.648 1552-2090 QosMonitor pid-1552 I queryRtt: rttType = 3
2023-02-23 16:48:50.648 1552-2206 HwDualBandManager pid-1552 I handle2gApStrongWifiRssiChange
2023-02-23 16:48:50.649 1552-2090 HwWifiProServiceProxy pid-1552 I ctrlHwWifiNetwork pkgName: WIFIPRO_SERVICE interfaceId: 8
2023-02-23 16:48:50.649 1552-2189 HuaweiWifi...ateMachine pid-1552 I high data flow: protection_counter = 0, not_detect_counter = 32
2023-02-23 16:48:50.649 1552-2189 HuaweiWifi...ateMachine pid-1552 I high data flow scenario: 0 --> 0 rx bytes =4KB
2023-02-23 16:48:50.649 1552-2189 HuaweiWifi...ateMachine pid-1552 I POta txb txg rxg:0, 1, 0. Lr =0% Totpkt=1
2023-02-23 16:48:50.649 1552-2090 QosMonitor pid-1552 I postEventFromNative: msg=100,arg1=4,arg2=10
2023-02-23 16:48:50.649 1552-2090 HwWifiProServiceProxy pid-1552 I ctrlHwWifiNetwork pkgName: WIFIPRO_SERVICE interfaceId: 8
2023-02-23 16:48:50.650 1552-2090 QosMonitor pid-1552 I postEventFromNative: msg=100,arg1=0,arg2=10
2023

转化后的模型推理出的中文音频不对

我有一个原本config中是chinese_cleaners的vits模型,原始模型本身推理是正常的,使用https://github.com/weirdseed/vits-ncnn-convert-tool转换后,修改了chinese_cleaners值为zh_ja_mixture_cleaners,然后放入SDcard 在Vits-Android-ncnn APP 中加载之后没有报错,但是在生成后出来的音频是意义不明的奇怪发音。请问这里有什么办法可以追溯一下错误原因吗。我的config 完整为:

{
  "train": {
    "log_interval": 10,
    "eval_interval": 100,
    "seed": 1234,
    "epochs": 10000,
    "learning_rate": 0.0002,
    "betas": [
      0.8,
      0.99
    ],
    "eps": 1e-09,
    "batch_size": 16,
    "fp16_run": true,
    "lr_decay": 0.999875,
    "segment_size": 8192,
    "init_lr_ratio": 1,
    "warmup_epochs": 0,
    "c_mel": 45,
    "c_kl": 1.0
  },
  "data": {
    "training_files": "final_annotation_train.txt",
    "validation_files": "final_annotation_val.txt",
    "text_cleaners": [
      "zh_ja_mixture_cleaners"
    ],
    "max_wav_value": 32768.0,
    "sampling_rate": 16000,
    "filter_length": 1024,
    "hop_length": 256,
    "win_length": 1024,
    "n_mel_channels": 80,
    "mel_fmin": 0.0,
    "mel_fmax": null,
    "add_blank": true,
    "n_speakers": 1,
    "cleaned_text": true
  },
  "model": {
    "inter_channels": 192,
    "hidden_channels": 192,
    "filter_channels": 768,
    "n_heads": 2,
    "n_layers": 6,
    "kernel_size": 3,
    "p_dropout": 0.1,
    "resblock": "1",
    "resblock_kernel_sizes": [
      3,
      7,
      11
    ],
    "resblock_dilation_sizes": [
      [
        1,
        3,
        5
      ],
      [
        1,
        3,
        5
      ],
      [
        1,
        3,
        5
      ]
    ],
    "upsample_rates": [
      8,
      8,
      2,
      2
    ],
    "upsample_initial_channel": 512,
    "upsample_kernel_sizes": [
      16,
      16,
      4,
      4
    ],
    "n_layers_q": 3,
    "use_spectral_norm": false,
    "gin_channels": 256
  },
  "speakers": ["\u0078\u0075\u0065\u006c\u0069\u006e\u0067"],
  "symbols": [
    "_",
    "\uff0c",
    "\u3002",
    "\uff01",
    "\uff1f",
    "\u2014",
    "\u2026",
    "\u3105",
    "\u3106",
    "\u3107",
    "\u3108",
    "\u3109",
    "\u310a",
    "\u310b",
    "\u310c",
    "\u310d",
    "\u310e",
    "\u310f",
    "\u3110",
    "\u3111",
    "\u3112",
    "\u3113",
    "\u3114",
    "\u3115",
    "\u3116",
    "\u3117",
    "\u3118",
    "\u3119",
    "\u311a",
    "\u311b",
    "\u311c",
    "\u311d",
    "\u311e",
    "\u311f",
    "\u3120",
    "\u3121",
    "\u3122",
    "\u3123",
    "\u3124",
    "\u3125",
    "\u3126",
    "\u3127",
    "\u3128",
    "\u3129",
    "\u02c9",
    "\u02ca",
    "\u02c7",
    "\u02cb",
    "\u02d9",
    " "
  ]
}

大老這是我的轉出來的中文模型,想請問一下這個算是正常嗎?

原模型地址,用的是bronya
https://huggingface.co/spaces/zomehwh/vits-models-genshin-bh3/tree/main

這是我用提供的工具轉出來的檔案
https://drive.google.com/file/d/1Tt3D9gPYcCjlN4pWfwJOFfSBtjk1etic/view?usp=share_link

使用起來說話像是方言一樣,聽起來很糊,不像網頁版那麼清楚
我知道轉完後會有削弱,想知道這樣是正常的嗎?還是網頁版有特別調教過?

我剛接觸沒有這方面的知識,有冒犯到請見諒

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.