Git Product home page Git Product logo

vits-android-ncnn's Issues

转化模型导入无法使用

这边遇到一个问题:

我用工具转换vits为ncnn支持的格式时,即使是有配置的模型,也会出现speaker和n_speaker数量不匹配的报错

我注释报错强制转换,加载bin模型时又会有length=1,index=1的报错

转化后的模型推理出的中文音频不对

我有一个原本config中是chinese_cleaners的vits模型,原始模型本身推理是正常的,使用https://github.com/weirdseed/vits-ncnn-convert-tool转换后,修改了chinese_cleaners值为zh_ja_mixture_cleaners,然后放入SDcard 在Vits-Android-ncnn APP 中加载之后没有报错,但是在生成后出来的音频是意义不明的奇怪发音。请问这里有什么办法可以追溯一下错误原因吗。我的config 完整为:

{
  "train": {
    "log_interval": 10,
    "eval_interval": 100,
    "seed": 1234,
    "epochs": 10000,
    "learning_rate": 0.0002,
    "betas": [
      0.8,
      0.99
    ],
    "eps": 1e-09,
    "batch_size": 16,
    "fp16_run": true,
    "lr_decay": 0.999875,
    "segment_size": 8192,
    "init_lr_ratio": 1,
    "warmup_epochs": 0,
    "c_mel": 45,
    "c_kl": 1.0
  },
  "data": {
    "training_files": "final_annotation_train.txt",
    "validation_files": "final_annotation_val.txt",
    "text_cleaners": [
      "zh_ja_mixture_cleaners"
    ],
    "max_wav_value": 32768.0,
    "sampling_rate": 16000,
    "filter_length": 1024,
    "hop_length": 256,
    "win_length": 1024,
    "n_mel_channels": 80,
    "mel_fmin": 0.0,
    "mel_fmax": null,
    "add_blank": true,
    "n_speakers": 1,
    "cleaned_text": true
  },
  "model": {
    "inter_channels": 192,
    "hidden_channels": 192,
    "filter_channels": 768,
    "n_heads": 2,
    "n_layers": 6,
    "kernel_size": 3,
    "p_dropout": 0.1,
    "resblock": "1",
    "resblock_kernel_sizes": [
      3,
      7,
      11
    ],
    "resblock_dilation_sizes": [
      [
        1,
        3,
        5
      ],
      [
        1,
        3,
        5
      ],
      [
        1,
        3,
        5
      ]
    ],
    "upsample_rates": [
      8,
      8,
      2,
      2
    ],
    "upsample_initial_channel": 512,
    "upsample_kernel_sizes": [
      16,
      16,
      4,
      4
    ],
    "n_layers_q": 3,
    "use_spectral_norm": false,
    "gin_channels": 256
  },
  "speakers": ["\u0078\u0075\u0065\u006c\u0069\u006e\u0067"],
  "symbols": [
    "_",
    "\uff0c",
    "\u3002",
    "\uff01",
    "\uff1f",
    "\u2014",
    "\u2026",
    "\u3105",
    "\u3106",
    "\u3107",
    "\u3108",
    "\u3109",
    "\u310a",
    "\u310b",
    "\u310c",
    "\u310d",
    "\u310e",
    "\u310f",
    "\u3110",
    "\u3111",
    "\u3112",
    "\u3113",
    "\u3114",
    "\u3115",
    "\u3116",
    "\u3117",
    "\u3118",
    "\u3119",
    "\u311a",
    "\u311b",
    "\u311c",
    "\u311d",
    "\u311e",
    "\u311f",
    "\u3120",
    "\u3121",
    "\u3122",
    "\u3123",
    "\u3124",
    "\u3125",
    "\u3126",
    "\u3127",
    "\u3128",
    "\u3129",
    "\u02c9",
    "\u02ca",
    "\u02c7",
    "\u02cb",
    "\u02d9",
    " "
  ]
}

大老這是我的轉出來的中文模型,想請問一下這個算是正常嗎?

原模型地址,用的是bronya
https://huggingface.co/spaces/zomehwh/vits-models-genshin-bh3/tree/main

這是我用提供的工具轉出來的檔案
https://drive.google.com/file/d/1Tt3D9gPYcCjlN4pWfwJOFfSBtjk1etic/view?usp=share_link

使用起來說話像是方言一樣,聽起來很糊,不像網頁版那麼清楚
我知道轉完後會有削弱,想知道這樣是正常的嗎?還是網頁版有特別調教過?

我剛接觸沒有這方面的知識,有冒犯到請見諒

update pre-built apk

it looks like eng and other cleaners isn't supported on the Feb release, will there be an update to the apk releases?

最新代码,点击生成时,应用闪退

2023-02-23 16:48:50.163 1552-2053 chatty pid-1552 I uid=1000(system) InputDispatcher identical 1 line
2023-02-23 16:48:50.163 1552-2053 InputDispatcher pid-1552 I stylus touch up, set lcd event 0
2023-02-23 16:48:50.165 2449-2449 AudioManager com.example.moereng V querySoundEffectsEnabled...
2023-02-23 16:48:50.176 2449-2449 libc com.example.moereng A FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f29820)
2023-02-23 16:48:50.176 2449-2449 libc com.example.moereng A Fatal signal 6 (SIGABRT), code -1 (SI_QUEUE) in tid 2449 (example.moereng), pid 2449 (example.moereng)
2023-02-23 16:48:50.177 2593-3906 ash_trans pid-2593 I com.example.moereng { running duration=16402 Uptime=16402 } transition to: end, reason: not_running
2023-02-23 16:48:50.177 2593-3906 PG_ash pid-2593 I delete app record pkg: com.example.moereng
2023-02-23 16:48:50.177 2593-3906 AppManager pid-2593 I remove toast view when pkg dead, pid : 2449
2023-02-23 16:48:50.272 2449-2625 libc com.example.moereng A FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f2e640)
2023-02-23 16:48:50.273 2872-2872 crash_dump64 pid-2872 I obtaining output fd from tombstoned, type: kDebuggerdTombstone
2023-02-23 16:48:50.273 2449-2626 libc com.example.moereng A FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f2e640)
2023-02-23 16:48:50.274 1091-1091 /system/bin/tombstoned pid-1091 I received crash request for pid 2449
2023-02-23 16:48:50.275 2872-2872 crash_dump64 pid-2872 I performing dump of process 2449 (target tid = 2449)
2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A Build fingerprint: 'HUAWEI/HMA-AL00/HWHMA:10/HUAWEIHMA-AL00/10.1.0.163C00:user/release-keys'
2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A Revision: '0'
2023-02-23 16:48:50.284 2872-2872 DEBUG pid-2872 A ABI: 'arm64'
2023-02-23 16:48:50.284 47-47 migration/6 pid-47 W type=1400 audit(0.0:265571): avc: granted { setsched } for pid=47 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=process
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A SYSVMTYPE: Maple
APPVMTYPE: Art
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A Timestamp: 2023-02-23 16:48:50+0800
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A pid: 2449, tid: 2449, name: example.moereng >>> com.example.moereng <<<
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A uid: 15090
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A signal 6 (SIGABRT), code -1 (SI_QUEUE), fault addr --------
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A Abort message: 'FORTIFY: pthread_mutex_lock called on a destroyed mutex (0x7972f29820)'
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x0 0000000000000000 x1 0000000000000991 x2 0000000000000006 x3 0000007ff5bd79d0
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x4 0000000000000000 x5 0000000000000000 x6 0000000000000000 x7 0000000000000038
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x8 00000000000000f0 x9 28257b038072cadd x10 0000000000000001 x11 0000000000000000
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x12 fffffff0fffffbdf x13 0000000063f72872 x14 00029138032e3170 x15 00000f26c8bff612
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x16 0000007971d30a08 x17 0000007971d107c0 x18 00000079754e4000 x19 0000000000000991
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x20 0000000000000991 x21 00000000ffffffff x22 0000007974cd7020 x23 00000078ee0b7d64
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x24 0000000000000028 x25 0000007974cd7020 x26 00000078ef2108b0 x27 0000000000000001
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A x28 0000000000000000 x29 0000007ff5bd7a70
2023-02-23 16:48:50.309 2872-2872 DEBUG pid-2872 A sp 0000007ff5bd79b0 lr 0000007971cc5640 pc 0000007971cc566c
2023-02-23 16:48:50.332 53-53 migration/7 pid-53 W type=1400 audit(0.0:265572): avc: granted { setsched } for pid=53 scontext=u:r:kernel:s0 tcontext=u:r:kernel:s0 tclass=process
2023-02-23 16:48:50.357 1552-1552 WindowManager pid-1552 I removeWindowToken: displayid:0 binder:android.os.Binder@3661825 token:WindowToken{2b9c6aa android.os.Binder@3661825}
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A backtrace:
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #00 pc 000000000007066c /apex/com.android.runtime/lib64/bionic/libc.so (abort+160) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #1 pc 00000000000d0d4c /apex/com.android.runtime/lib64/bionic/libc.so (__fortify_fatal(char const*, ...)+116) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #2 pc 00000000000d0480 /apex/com.android.runtime/lib64/bionic/libc.so (HandleUsingDestroyedMutex(pthread_mutex_t*, char const*)+52) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #3 pc 00000000000d02e4 /apex/com.android.runtime/lib64/bionic/libc.so (pthread_mutex_lock+148) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #4 pc 00000000000afd28 /system/lib64/libc++.so (std::__1::recursive_mutex::lock()+8) (BuildId: d957c07e50073a9c45a9ca98188a85f7)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #5 pc 00000000003b9ea4 /system/lib64/libhwui.so (hwforcedark::HwForceDarkCanvas::IsGraphicPolicyEnabled(bool)+52) (BuildId: 37e2d7c3712cdd2fcaadea48cef19956)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #6 pc 00000000001c9854 /system/lib64/libhwui.so (android::SkiaCanvas::drawRoundRect(float, float, float, float, float, float, SkPaint const&)+160) (BuildId: 37e2d7c3712cdd2fcaadea48cef19956)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #7 pc 00000000002f7530 /system/framework/arm64/boot-framework.oat (art_jni_trampoline+208) (BuildId: 4d8291c254d00aa4a381394effb4468f86c242c8)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #8 pc 00000000001475b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #9 pc 00000000001561d4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+284) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #10 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #11 pc 00000000002f9c64 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<true, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+656) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #12 pc 00000000005d0f74 /apex/com.android.runtime/lib64/libart.so (MterpInvokeStaticRange+236) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #13 pc 0000000000141c94 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #14 pc 00000000003b0fb2 /system/framework/framework.jar (android.graphics.BaseRecordingCanvas.drawRoundRect+30)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #15 pc 00000000005cec74 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtualRange+1056) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #16 pc 0000000000141b14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #17 pc 00000000003b0f7c /system/framework/framework.jar (android.graphics.BaseRecordingCanvas.drawRoundRect+24)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #18 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #19 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #20 pc 0000000000357b04 [anon:dalvik-classes.dex extracted in memory from /data/app/com.example.moereng--soVYkRLOPgtBnfFP9L05g==/base.apk] (com.google.android.material.shape.MaterialShapeDrawable.drawShape+40)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #21 pc 00000000005d0b28 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirectRange+788) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #22 pc 0000000000141c14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #23 pc 0000000000357a98 [anon:dalvik-classes.dex extracted in memory from /data/app/com.example.moereng--soVYkRLOPgtBnfFP9L05g==/base.apk] (com.google.android.material.shape.MaterialShapeDrawable.drawFillShape+28)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #24 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #25 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #26 pc 000000000035796a [anon:dalvik-classes.dex extracted in memory from /data/app/com.example.moereng--soVYkRLOPgtBnfFP9L05g==/base.apk] (com.google.android.material.shape.MaterialShapeDrawable.draw+178)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #27 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #28 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #29 pc 00000000003e1526 /system/framework/framework.jar (android.graphics.drawable.LayerDrawable.draw+34)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #30 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #31 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #32 pc 00000000003d9c40 /system/framework/framework.jar (android.graphics.drawable.DrawableWrapper.draw+8)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #33 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #34 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #35 pc 00000000003e4a18 /system/framework/framework.jar (android.graphics.drawable.RippleDrawable.drawContent+48)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #36 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #37 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #38 pc 00000000003e491a /system/framework/framework.jar (android.graphics.drawable.RippleDrawable.draw+42)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #39 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #40 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #41 pc 0000000000235d9a /system/framework/framework.jar (android.view.View.getDrawableRenderNode+106)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #42 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #43 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #44 pc 0000000000243c70 /system/framework/framework.jar (android.view.View.drawBackground+48)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #45 pc 00000000005d0b28 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirectRange+788) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #46 pc 0000000000141c14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #47 pc 00000000002435ea /system/framework/framework.jar (android.view.View.draw+46)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #48 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #49 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #50 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #51 pc 00000000020176f8 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+904)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #52 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #53 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #54 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #55 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #56 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #57 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #58 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #59 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #60 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #61 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #62 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #63 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #64 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #65 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #66 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #67 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #68 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #69 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #70 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #71 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #72 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #73 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #74 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #75 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #76 pc 00000000020060f0 /memfd:/jit-cache (deleted) (android.view.ViewGroup.recreateChildDisplayList+80)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #77 pc 0000000002009030 /memfd:/jit-cache (deleted) (android.view.ViewGroup.dispatchGetDisplayList+176)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #78 pc 0000000002017498 /memfd:/jit-cache (deleted) (android.view.View.updateDisplayListIfDirty+296)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #79 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #80 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #81 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #82 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #83 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #84 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #85 pc 0000000000210c46 /system/framework/framework.jar (android.view.ThreadedRenderer.updateViewTreeDisplayList+54)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #86 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #87 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #88 pc 0000000000210b1e /system/framework/framework.jar (android.view.ThreadedRenderer.updateRootDisplayList+14)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #89 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #90 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #91 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #92 pc 000000000203a838 /memfd:/jit-cache (deleted) (android.view.ThreadedRenderer.draw+152)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #93 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #94 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #95 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #96 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #97 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #98 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.533 2872-2872 DEBUG pid-2872 A #99 pc 000000000022a796 /system/framework/framework.jar (android.view.ViewRootImpl.draw+774)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #100 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #101 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #102 pc 00000000002301de /system/framework/framework.jar (android.view.ViewRootImpl.performDraw+618)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #103 pc 00000000005d0b28 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirectRange+788) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #104 pc 0000000000141c14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct_range+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #105 pc 0000000000231ee2 /system/framework/framework.jar (android.view.ViewRootImpl.performTraversals+6566)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #106 pc 00000000005cdc10 /apex/com.android.runtime/lib64/libart.so (MterpInvokeDirect+1168) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #107 pc 0000000000141914 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_direct+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #108 pc 000000000022e3a6 /system/framework/framework.jar (android.view.ViewRootImpl.doTraversal+94)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #109 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #110 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #111 pc 0000000000227a10 /system/framework/framework.jar (android.view.ViewRootImpl$TraversalRunnable.run+16)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #112 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #113 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #114 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #115 pc 000000000203e31c /memfd:/jit-cache (deleted) (android.view.Choreographer$CallbackRecord.run+252)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #116 pc 000000000201e5dc /memfd:/jit-cache (deleted) (android.view.Choreographer.doCallbacks+780)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #117 pc 00000000020085cc /memfd:/jit-cache (deleted) (android.view.Choreographer.doFrame+1452)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #118 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #119 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #120 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #121 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #122 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #123 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #124 pc 00000000001d4770 /system/framework/framework.jar (android.view.Choreographer$FrameDisplayEventReceiver.run+32)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #125 pc 00000000005cd074 /apex/com.android.runtime/lib64/libart.so (MterpInvokeInterface+1752) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #126 pc 0000000000141a14 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_interface+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #127 pc 000000000030d514 /system/framework/framework.jar (android.os.Handler.handleCallback+4)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #128 pc 00000000005ce41c /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1136) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #129 pc 0000000000141994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #130 pc 000000000030d380 /system/framework/framework.jar (android.os.Handler.dispatchMessage+8)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #131 pc 00000000005cb874 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+1432) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #132 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #133 pc 00000000003384f8 /system/framework/framework.jar (android.os.Looper.loop+480)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #134 pc 00000000005ce41c /apex/com.android.runtime/lib64/libart.so (MterpInvokeStatic+1136) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #135 pc 0000000000141994 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_static+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #136 pc 00000000001ac2ec /system/framework/framework.jar (android.app.ActivityThread.main+1372)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #137 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #138 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #139 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #140 pc 00000000001475b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #141 pc 00000000001561d4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+284) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #142 pc 00000000004d8834 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #143 pc 00000000004da25c /apex/com.android.runtime/lib64/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1476) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #144 pc 0000000000464140 /apex/com.android.runtime/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+52) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #145 pc 00000000000f8c34 /system/framework/arm64/boot.oat (art_jni_trampoline+180) (BuildId: ad918520addd249a3317bef34c6afa3b8c3e6241)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #146 pc 0000000000147334 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_stub+548) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #147 pc 00000000001561b4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+252) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #148 pc 00000000002fd900 /apex/com.android.runtime/lib64/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+384) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #149 pc 00000000002f8bd0 /apex/com.android.runtime/lib64/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+912) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #150 pc 00000000005cb564 /apex/com.android.runtime/lib64/libart.so (MterpInvokeVirtual+648) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #151 pc 0000000000141814 /apex/com.android.runtime/lib64/libart.so (mterp_op_invoke_virtual+20) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #152 pc 00000000004018a6 /system/framework/framework.jar (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #153 pc 00000000002ce22c /apex/com.android.runtime/lib64/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEbb.llvm.1772238600391939451+320) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #154 pc 00000000005bc0a4 /apex/com.android.runtime/lib64/libart.so (artQuickToInterpreterBridge+1012) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #155 pc 0000000000150468 /apex/com.android.runtime/lib64/libart.so (art_quick_to_interpreter_bridge+88) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #156 pc 0000000000b257fc /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+3660) (BuildId: 4d8291c254d00aa4a381394effb4468f86c242c8)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #157 pc 00000000001475b8 /apex/com.android.runtime/lib64/libart.so (art_quick_invoke_static_stub+568) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #158 pc 00000000001561d4 /apex/com.android.runtime/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+284) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #159 pc 00000000004d8834 /apex/com.android.runtime/lib64/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+104) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #160 pc 00000000004d84a0 /apex/com.android.runtime/lib64/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+408) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #161 pc 00000000003d7cf8 /apex/com.android.runtime/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+660) (BuildId: 762960c75ada06c48e438df6df29b0a1)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #162 pc 00000000001015c4 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+116) (BuildId: e99b2e2e44982c12a4dc2e20fbdbab43)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #163 pc 0000000000104c48 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+1248) (BuildId: e99b2e2e44982c12a4dc2e20fbdbab43)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #164 pc 00000000000034e0 /system/bin/app_process64 (main+1168) (BuildId: e844be217eb39b34490d3798328d1f12)
2023-02-23 16:48:50.534 2872-2872 DEBUG pid-2872 A #165 pc 000000000006b108 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+108) (BuildId: b91c775ccc9b0556e91bc575a2511cd0)
2023-02-23 16:48:50.630 668-12580 netd pid-668 I trafficSwapActiveStatsMap() <18.17ms>
2023-02-23 16:48:50.647 1552-2091 WificondControl pid-1552 I Noise: -91, Snr: 39, Chload: 24, rssi: -54, txBitrate: 650, rxBitrate: 650, frequency: 5745, UlDelay: -1, currentTxBytes: 262856399, currentTxPackets: 1573582, currentTxFailed: 15, currentRxBytes: 221659782, currentRxPackets: 3524739
2023-02-23 16:48:50.648 1552-2189 HuaweiWifi...ateMachine pid-1552 D nothing to do
2023-02-23 16:48:50.648 1552-2090 WiFi_PRO pid-1552 I MSG_RETURN_AP_CURRY_RSSI rssi = -54
2023-02-23 16:48:50.648 1552-2090 QosMonitor pid-1552 I queryRtt: rttType = 3
2023-02-23 16:48:50.648 1552-2206 HwDualBandManager pid-1552 I handle2gApStrongWifiRssiChange
2023-02-23 16:48:50.649 1552-2090 HwWifiProServiceProxy pid-1552 I ctrlHwWifiNetwork pkgName: WIFIPRO_SERVICE interfaceId: 8
2023-02-23 16:48:50.649 1552-2189 HuaweiWifi...ateMachine pid-1552 I high data flow: protection_counter = 0, not_detect_counter = 32
2023-02-23 16:48:50.649 1552-2189 HuaweiWifi...ateMachine pid-1552 I high data flow scenario: 0 --> 0 rx bytes =4KB
2023-02-23 16:48:50.649 1552-2189 HuaweiWifi...ateMachine pid-1552 I POta txb txg rxg:0, 1, 0. Lr =0% Totpkt=1
2023-02-23 16:48:50.649 1552-2090 QosMonitor pid-1552 I postEventFromNative: msg=100,arg1=4,arg2=10
2023-02-23 16:48:50.649 1552-2090 HwWifiProServiceProxy pid-1552 I ctrlHwWifiNetwork pkgName: WIFIPRO_SERVICE interfaceId: 8
2023-02-23 16:48:50.650 1552-2090 QosMonitor pid-1552 I postEventFromNative: msg=100,arg1=0,arg2=10
2023

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.