Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Paddle-Lite-Demo/ocr/android/shell/ppocr_demo 运行成功,移植到Paddle-Lite-Demo/ocr/android/app,运行报错 #391

Open
HomengLau opened this issue Dec 25, 2024 · 0 comments

Comments

@HomengLau
Copy link

分支名:feature/paddle-x
复制libs/android/cxx中的预测库替换android/app中的预测库
image
替换
image

android/shell运行结果:
➜ ppocr_demo git:(feature/paddle-x) ✗ ./run.sh
./ppocr_demo/: 10 files pushed, 0 skipped. 7.5 MB/s (44804570 bytes in 5.690s)
WARNING: linker: Warning: "/data/local/tmp/ppocr_demo/libpaddle_light_api_shared.so" unused DT entry: DT_RPATH (type 0xf arg 0x32b1) (ignoring)
The detection visualized image saved in ./test_img_result.jpg
0 纯臻营养护发素 0.993706
1 产品信息/参数 0.991225
2 (45元/每公斤,100公斤起订) 0.938893
3 每瓶22元,1000瓶起订) 0.988353
4 【品牌】:代加工方式/OEMODM 0.97557
5 【品名】:纯臻营养护发素 0.986914
6 ODMOEM 0.929891
7 【产品编号】:YM-X-3011 0.964156
8 【净含量】:220ml 0.976404
9 【适用人群】:适合所有肤质 0.987942
10 【主要成分】:鲸蜡硬脂醇、燕麦β-葡聚 0.968315
11 糖、椰油酰胺丙基甜菜碱、泛醒 0.941537
12 (成品包材) 0.974796
13 【主要功能】:可紧致头发磷层,从而达到 0.988799
14 即时持久改善头发光泽的效果,给干燥的头 0.989547
15 发足够的滋养 0.998413
花费了2.4533秒
/data/local/tmp/ppocr_demo/test_img_result.jpg: ...ed, 0 skipped. 0.6 MB/s (105195 bytes in 0.161s)
### app下运行报错:

2024-12-25 11:51:43.116 7777-7777 debug=== com...le.lite.demo.object_detection D NN model on SD card /storage/emulated/0/Android/data/com.baidu.paddle.lite.demo.object_detection/files/PP-OCRv4_mobile_det.nb
2024-12-25 11:51:43.117 7777-7777 Utils com...le.lite.demo.object_detection D copyAssets nnFileName: ch_ppocr_mobile_v2.0_cls_slim_opt.nb
2024-12-25 11:51:43.119 7777-7777 debug=== com...le.lite.demo.object_detection D NN model on SD card /storage/emulated/0/Android/data/com.baidu.paddle.lite.demo.object_detection/files/ch_ppocr_mobile_v2.0_cls_slim_opt.nb
2024-12-25 11:51:43.119 7777-7777 Utils com...le.lite.demo.object_detection D copyAssets nnFileName: PP-OCRv4_mobile_rec.nb
2024-12-25 11:51:43.120 7777-7777 debug=== com...le.lite.demo.object_detection D NN model on SD card /storage/emulated/0/Android/data/com.baidu.paddle.lite.demo.object_detection/files/PP-OCRv4_mobile_rec.nb
2024-12-25 11:51:43.124 7777-7777 mali_so com...le.lite.demo.object_detection I [File] : hardware/arm/maliT760/driver/product/base/src/mali_base_kbase.c; [Line] : 1392; [Func] : base_context_deal_with_version_affairs_rk_ext;
arm_release_ver of this mali_so is 'g18p0-01eac0', rk_so_ver is '2 '.
2024-12-25 11:51:43.124 7777-7777 mali_so com...le.lite.demo.object_detection I [File] : hardware/arm/maliT760/driver/product/base/src/mali_base_kbase.c; [Line] : 1408; [Func] : base_context_deal_with_version_affairs_rk_ext;
arm_release_vers are match. to set the full mali_ver 'g18p0-01eac0-2' as value of 'sys.gmali.version'.
2024-12-25 11:51:43.129 7777-7777 libc com...le.lite.demo.object_detection A Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x20 in tid 7777 (bject_detection), pid 7777 (bject_detection)
2024-12-25 11:51:43.154 7811-7811 crash_dump64 pid-7811 I obtaining output fd from tombstoned, type: kDebuggerdTombstoneProto
2024-12-25 11:51:43.154 296-296 tombstoned tombstoned I received crash request for pid 7777
2024-12-25 11:51:43.154 7811-7811 crash_dump64 pid-7811 I performing dump of process 7777 (target tid = 7777)
2024-12-25 11:51:43.866 248-248 logd pid-248 I logdr: UID=10104 GID=10104 PID=7811 n tail=0 logMask=8 pid=7777 start=0ns deadline=0ns
2024-12-25 11:51:43.866 248-248 logd pid-248 I logdr: UID=10104 GID=10104 PID=7811 n tail=0 logMask=1 pid=7777 start=0ns deadline=0ns
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A Build fingerprint: 'rockchip/rk3588_t/rk3588_t:13/TQ3C.230805.001.B2/eng.fzm.20240620.095044:userdebug/release-keys'
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A Revision: '0'
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A ABI: 'arm64'
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A Timestamp: 2024-12-25 11:51:43.160215403+0800
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A Process uptime: 1s
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A Cmdline: com.baidu.paddle.lite.demo.object_detection
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A pid: 7777, tid: 7777, name: bject_detection >>> com.baidu.paddle.lite.demo.object_detection <<<
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A uid: 10104
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0000000000000020
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A Cause: null pointer dereference
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x0 0000007435515330 x1 000000768879054c x2 000000768879054c x3 0000000000000010
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x4 0000000000000000 x5 0000000000000078 x6 666e695f65766173 x7 6c65646f6d5f7265
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x8 0000000000000000 x9 ce5d000000038104 x10 0000000000038000 x11 0000000000000004
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x12 0000000035515368 x13 0000000000000001 x14 0000000000000001 x15 0000000000005319
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x16 0000000000000001 x17 00000076886fb10c x18 000000737297f2b0 x19 0000007feb304490
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x20 0000000000000000 x21 0000007feb304498 x22 0000000000000020 x23 00000076a76df000
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x24 00000073ef200880 x25 00000076a76df000 x26 0000000000000081 x27 0000007feb304b98
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x28 0000007feb304a80 x29 0000007feb304a80
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A lr 000000737262f450 sp 0000007feb304410 pc 000000737262f450 pst 0000000060001000
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A backtrace:
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #00 pc 000000000040b450 /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/lib/arm64/libpaddle_light_api_shared.so (BuildId: 76318fbd5af7abcd3f5476b343abeb53bc9bc21b)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #1 pc 000000000040a83c /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/lib/arm64/libpaddle_light_api_shared.so (BuildId: 76318fbd5af7abcd3f5476b343abeb53bc9bc21b)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #2 pc 000000000040a124 /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/lib/arm64/libpaddle_light_api_shared.so (BuildId: 76318fbd5af7abcd3f5476b343abeb53bc9bc21b)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #3 pc 000000000040ad08 /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/lib/arm64/libpaddle_light_api_shared.so (std::__ndk1::shared_ptrpaddle::lite_api::PaddlePredictor paddle::lite_api::CreatePaddlePredictorpaddle::lite_api::MobileConfig(paddle::lite_api::MobileConfig const&)+48) (BuildId: 76318fbd5af7abcd3f5476b343abeb53bc9bc21b)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #4 pc 00000000000aedb0 /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/lib/arm64/libNative.so (BuildId: 3573f804df141344f892092ba23ed1f1965eb207)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #5 pc 000000000009a564 /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/lib/arm64/libNative.so (BuildId: 3573f804df141344f892092ba23ed1f1965eb207)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #6 pc 00000000000957e4 /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/lib/arm64/libNative.so (Java_com_baidu_paddle_lite_demo_ppocr_1demo_Native_nativeInit+232) (BuildId: 3573f804df141344f892092ba23ed1f1965eb207)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #7 pc 000000000021a354 /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+148) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.314 7811-7811 DEBUG pid-7811 A #8 pc 0000000000209b68 /apex/com.android.art/lib64/libart.so (nterp_helper+2152) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.314 7811-7811 DEBUG pid-7811 A #9 pc 00000000001ad5d4 [anon:dalvik-classes.dex extracted in memory from /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/base.apk] (com.baidu.paddle.lite.demo.ppocr_demo.Native.init+0)
2024-12-25 11:51:43.314 7811-7811 DEBUG pid-7811 A #10 pc 000000000020a958 /apex/com.android.art/lib64/libart.so (nterp_helper+5720) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.314 7811-7811 DEBUG pid-7811 A #11 pc 00000000001ad294 [anon:dalvik-classes.dex extracted in memory from /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/base.apk] (com.baidu.paddle.lite.demo.ppocr_demo.MainActivity.checkRun+216)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #12 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #13 pc 00000000001ad566 [anon:dalvik-classes.dex extracted in memory from /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/base.apk] (com.baidu.paddle.lite.demo.ppocr_demo.MainActivity.onResume+6)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #14 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #15 pc 000000000022a3d2 /system/framework/framework.jar (android.app.Instrumentation.callActivityOnResume+6)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #16 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #17 pc 00000000001c5598 /system/framework/framework.jar (android.app.Activity.performResume+128)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #18 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #19 pc 00000000001b63fe /system/framework/framework.jar (android.app.ActivityThread.performResumeActivity+182)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #20 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #21 pc 00000000001bc24c /system/framework/framework.jar (android.app.ActivityThread.handleResumeActivity+12)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #22 pc 000000000020a958 /apex/com.android.art/lib64/libart.so (nterp_helper+5720) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #23 pc 00000000002b6908 /system/framework/framework.jar (android.app.servertransaction.ResumeActivityItem.execute+32)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #24 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #25 pc 00000000002b3a8c /system/framework/framework.jar (android.app.servertransaction.ActivityTransactionItem.execute+8)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #26 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #27 pc 00000000002b7a44 /system/framework/framework.jar (android.app.servertransaction.TransactionExecutor.executeLifecycleState+64)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #28 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #29 pc 00000000002b78e2 /system/framework/framework.jar (android.app.servertransaction.TransactionExecutor.execute+158)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #30 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #31 pc 00000000001b2e78 /system/framework/framework.jar (android.app.ActivityThread$H.handleMessage+276)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #32 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #33 pc 000000000047f7ae /system/framework/framework.jar (android.os.Handler.dispatchMessage+38)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #34 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #35 pc 00000000004a63c2 /system/framework/framework.jar (android.os.Looper.loopOnce+346)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #36 pc 0000000000209334 /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #37 pc 00000000004a6a62 /system/framework/framework.jar (android.os.Looper.loop+162)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #38 pc 0000000000209334 /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #39 pc 00000000001bd76e /system/framework/framework.jar (android.app.ActivityThread.main+202)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #40 pc 0000000000210c00 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+576) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #41 pc 0000000000279790 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+236) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #42 pc 0000000000602780 /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1396) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #43 pc 0000000000584158 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+48) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #44 pc 0000000000099148 /system/framework/arm64/boot.oat (art_jni_trampoline+120) (BuildId: 87b08e02b2245437b28f15a710c1909b81a235f4)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #45 pc 000000000020a2b0 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #46 pc 0000000000405b5e /system/framework/framework.jar (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #47 pc 00000000007c023c /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+3228) (BuildId: 7ca60dc286cb06f96bffa12114419fac1a057afa)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #48 pc 0000000000210c00 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+576) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #49 pc 0000000000279790 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+236) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #50 pc 0000000000602ed8 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgsart::ArtMethod*(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+448) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #51 pc 0000000000603394 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+92) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #52 pc 00000000004f0f6c /apex/com.android.art/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+596) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #53 pc 00000000000bcad0 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120) (BuildId: e68d1a1aff94289c08c096bc76a31fc7)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #54 pc 00000000000c85c4 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+840) (BuildId: e68d1a1aff94289c08c096bc76a31fc7)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #55 pc 0000000000002554 /system/bin/app_process64 (main+1280) (BuildId: 094580f53da62691fcd1d29c5f6dde69)
---------------------------- PROCESS ENDED (7777) for package com.baidu.paddle.lite.demo.object_detection ----------------------------
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #56 pc 000000000004a1f4 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+96) (BuildId: 4e07915368c859b1910c68c84a8de75f)
2024-12-25 11:51:43.327 296-296 tombstoned tombstoned E Tombstone written to: tombstone_18
2024-12-25 11:51:43.327 628-722 RKLOG system_process D =========generate tombstone bugreport[idx=4]: {0x39263865, 3, 3, 28299}

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant