Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

利用最新demo中的so,andriod工程编译没问题,在运行中报createSession的错误 #212

Closed
qaz734913414 opened this issue Aug 2, 2019 · 4 comments

Comments

@qaz734913414
Copy link

qaz734913414 commented Aug 2, 2019

--------- beginning of crash

2019-08-02 12:13:07.131 10398-10398/? A/libc: Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0 in tid 10398 (mple.mnn.detect), pid 10398 (mple.mnn.detect)
2019-08-02 12:13:07.256 10464-10464/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2019-08-02 12:13:07.256 10464-10464/? A/DEBUG: Build fingerprint: 'Xiaomi/sirius/sirius:9/PKQ1.181121.001/V10.3.1.0.PEBCNXM:user/release-keys'
2019-08-02 12:13:07.256 10464-10464/? A/DEBUG: Revision: '0'
2019-08-02 12:13:07.256 10464-10464/? A/DEBUG: ABI: 'arm'
2019-08-02 12:13:07.256 10464-10464/? A/DEBUG: pid: 10398, tid: 10398, name: mple.mnn.detect >>> cn.sample.mnn.detect <<<
2019-08-02 12:13:07.256 10464-10464/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0
2019-08-02 12:13:07.257 10464-10464/? A/DEBUG: Cause: null pointer dereference
2019-08-02 12:13:07.257 10464-10464/? A/DEBUG: r0 9944da8b r1 ffa8d9e8 r2 9944da8b r3 00000003
2019-08-02 12:13:07.257 10464-10464/? A/DEBUG: r4 00000000 r5 e6493500 r6 9944da8b r7 ffa8e290
2019-08-02 12:13:07.257 10464-10464/? A/DEBUG: r8 e6e3ad8c r9 e64c8000 r10 ffa8df60 r11 e64c8000
2019-08-02 12:13:07.257 10464-10464/? A/DEBUG: ip cafdf8c0 sp ffa8d668 lr caf7035d pc cb015ab6

2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: backtrace:
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #00 pc 0000cab6 /data/app/cn.sample.mnn.detect-RKIzPpoleHBlV9-u3YPcrQ==/lib/arm/libMNN.so (MNN::Interpreter::createSession(MNN::ScheduleConfig const&)+22)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #1 pc 00011359 /data/app/cn.sample.mnn.detect-RKIzPpoleHBlV9-u3YPcrQ==/lib/arm/libfacedetect.so
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #2 pc 0001e6b5 /data/app/cn.sample.mnn.detect-RKIzPpoleHBlV9-u3YPcrQ==/lib/arm/libfacedetect.so (Java_cn_sample_mnn_detect_Facetest_FaceDetectionModelInit+1960)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #3 pc 0041d879 /system/lib/libart.so (art_quick_generic_jni_trampoline+40)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #4 pc 00419375 /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #5 pc 003f2703 /system/lib/libart.so (art_quick_invoke_stub+226)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #6 pc 000a1431 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #7 pc 001e9339 /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+232)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #8 pc 001e4029 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+776)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #9 pc 003ed333 /system/lib/libart.so (MterpInvokeVirtual+442)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #10 pc 0040c014 /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #11 pc 001d4664 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/cn.sample.mnn.detect-RKIzPpoleHBlV9-u3YPcrQ==/base.apk (deleted) (cn.sample.mnn.detect.TestFaceDetectActivity.copyAssets+132)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #12 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #13 pc 001cd26f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #14 pc 001e4013 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #15 pc 003ee1c5 /system/lib/libart.so (MterpInvokeDirect+196)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #16 pc 0040c114 /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #17 pc 001d4958 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/cn.sample.mnn.detect-RKIzPpoleHBlV9-u3YPcrQ==/base.apk (deleted) (cn.sample.mnn.detect.TestFaceDetectActivity.verifyStoragePermissions+72)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #18 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #19 pc 001cd26f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #20 pc 001e4013 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2019-08-02 12:13:07.781 10464-10464/? A/DEBUG: #21 pc 003ed333 /system/lib/libart.so (MterpInvokeVirtual+442)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #22 pc 0040c014 /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #23 pc 001d4858 /dev/ashmem/dalvik-classes.dex extracted in memory from /data/app/cn.sample.mnn.detect-RKIzPpoleHBlV9-u3YPcrQ==/base.apk (deleted) (cn.sample.mnn.detect.TestFaceDetectActivity.onCreate+72)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #24 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #25 pc 001cd26f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #26 pc 001e4013 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #27 pc 003ed333 /system/lib/libart.so (MterpInvokeVirtual+442)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #28 pc 0040c014 /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #29 pc 00428ea8 /system/framework/boot-framework.vdex (android.app.Activity.performCreate+32)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #30 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #31 pc 001cd26f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #32 pc 001e4013 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #33 pc 003ed333 /system/lib/libart.so (MterpInvokeVirtual+442)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #34 pc 0040c014 /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #35 pc 00428e7c /system/framework/boot-framework.vdex (android.app.Activity.performCreate+2)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #36 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #37 pc 001cd26f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #38 pc 001e4013 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #39 pc 003ed333 /system/lib/libart.so (MterpInvokeVirtual+442)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #40 pc 0040c014 /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #41 pc 00466ede /system/framework/boot-framework.vdex (android.app.Instrumentation.callActivityOnCreate+6)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #42 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #43 pc 001cd26f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #44 pc 001e4013 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #45 pc 003ed333 /system/lib/libart.so (MterpInvokeVirtual+442)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #46 pc 0040c014 /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #47 pc 0041b2be /system/framework/boot-framework.vdex (android.app.ActivityThread.performLaunchActivity+736)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #48 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #49 pc 001cd26f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #50 pc 001e4013 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #51 pc 003ee1c5 /system/lib/libart.so (MterpInvokeDirect+196)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #52 pc 0040c114 /system/lib/libart.so (ExecuteMterpImpl+14484)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #53 pc 0041af56 /system/framework/boot-framework.vdex (android.app.ActivityThread.handleLaunchActivity+72)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #54 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #55 pc 001cd26f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #56 pc 001e4013 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #57 pc 003ed333 /system/lib/libart.so (MterpInvokeVirtual+442)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #58 pc 0040c014 /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #59 pc 004b01ec /system/framework/boot-framework.vdex (android.app.servertransaction.LaunchActivityItem.execute+114)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #60 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #61 pc 001cd26f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #62 pc 001e4013 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #63 pc 003ed333 /system/lib/libart.so (MterpInvokeVirtual+442)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #64 pc 0040c014 /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #65 pc 004b193c /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.executeCallbacks+198)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #66 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #67 pc 001cd26f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #68 pc 001e4013 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #69 pc 003ed333 /system/lib/libart.so (MterpInvokeVirtual+442)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #70 pc 0040c014 /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #71 pc 004b184e /system/framework/boot-framework.vdex (android.app.servertransaction.TransactionExecutor.execute+68)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #72 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #73 pc 001cd26f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #74 pc 001e4013 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #75 pc 003ed333 /system/lib/libart.so (MterpInvokeVirtual+442)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #76 pc 0040c014 /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #77 pc 0041a26c /system/framework/boot-framework.vdex (android.app.ActivityThread$H.handleMessage+72)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #78 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #79 pc 001cd26f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #80 pc 001e4013 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #81 pc 003ed333 /system/lib/libart.so (MterpInvokeVirtual+442)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #82 pc 0040c014 /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #83 pc 00bb5bfe /system/framework/boot-framework.vdex (android.os.Handler.dispatchMessage+42)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #84 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #85 pc 001cd26f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #86 pc 001e4013 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #87 pc 003ed333 /system/lib/libart.so (MterpInvokeVirtual+442)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #88 pc 0040c014 /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-08-02 12:13:07.782 10464-10464/? A/DEBUG: #89 pc 00bc85de /system/framework/boot-framework.vdex (android.os.Looper.loop+416)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #90 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #91 pc 001cd26f /system/lib/libart.so (art::interpreter::ArtInterpreterToInterpreterBridge(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*, art::JValue*)+146)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #92 pc 001e4013 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+754)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #93 pc 003ee30f /system/lib/libart.so (MterpInvokeStatic+130)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #94 pc 0040c194 /system/lib/libart.so (ExecuteMterpImpl+14612)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #95 pc 00423052 /system/framework/boot-framework.vdex (android.app.ActivityThread.main+214)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #96 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #97 pc 001cd1bb /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #98 pc 003e0ba3 /system/lib/libart.so (artQuickToInterpreterBridge+890)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #99 pc 0041d8ff /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #100 pc 00419375 /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #101 pc 003f2807 /system/lib/libart.so (art_quick_invoke_static_stub+222)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #102 pc 000a1443 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #103 pc 00351799 /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #104 pc 00352be1 /system/lib/libart.so (art::InvokeMethod(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned int)+960)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #105 pc 00303735 /system/lib/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+40)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #106 pc 006ab577 /system/framework/arm/boot-core-oj.oat (offset 0x2c9000) (java.lang.Class.getDeclaredMethodInternal [DEDUPED]+110)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #107 pc 00419375 /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #108 pc 003f2703 /system/lib/libart.so (art_quick_invoke_stub+226)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #109 pc 000a1431 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+136)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #110 pc 001e9339 /system/lib/libart.so (art::interpreter::ArtInterpreterToCompiledCodeBridge(art::Thread*, art::ArtMethod*, art::ShadowFrame*, unsigned short, art::JValue*)+232)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #111 pc 001e4029 /system/lib/libart.so (bool art::interpreter::DoCall<false, false>(art::ArtMethod*, art::Thread*, art::ShadowFrame&, art::Instruction const*, unsigned short, art::JValue*)+776)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #112 pc 003ed333 /system/lib/libart.so (MterpInvokeVirtual+442)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #113 pc 0040c014 /system/lib/libart.so (ExecuteMterpImpl+14228)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #114 pc 01286db0 /system/framework/boot-framework.vdex (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #115 pc 001c89a1 /system/lib/libart.so (_ZN3art11interpreterL7ExecuteEPNS_6ThreadERKNS_20CodeItemDataAccessorERNS_11ShadowFrameENS_6JValueEb.llvm.1917946964+352)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #116 pc 001cd1bb /system/lib/libart.so (art::interpreter::EnterInterpreterFromEntryPoint(art::Thread*, art::CodeItemDataAccessor const&, art::ShadowFrame*)+82)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #117 pc 003e0ba3 /system/lib/libart.so (artQuickToInterpreterBridge+890)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #118 pc 0041d8ff /system/lib/libart.so (art_quick_to_interpreter_bridge+30)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #119 pc 01eb201f /system/framework/arm/boot-framework.oat (offset 0x9c8000) (com.android.internal.os.ZygoteInit.main+1750)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #120 pc 00419375 /system/lib/libart.so (art_quick_invoke_stub_internal+68)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #121 pc 003f2807 /system/lib/libart.so (art_quick_invoke_static_stub+222)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #122 pc 000a1443 /system/lib/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+154)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #123 pc 00351799 /system/lib/libart.so (art::(anonymous namespace)::InvokeWithArgArray(art::ScopedObjectAccessAlreadyRunnable const&, art::ArtMethod*, art::(anonymous namespace)::ArgArray*, art::JValue*, char const*)+52)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #124 pc 003515b5 /system/lib/libart.so (art::InvokeWithVarArgs(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+304)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #125 pc 0029555d /system/lib/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+476)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #126 pc 0006dc57 /system/lib/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+38)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #127 pc 0006ffd3 /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+522)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #128 pc 00001b25 /system/bin/app_process32 (main+884)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #129 pc 0008bf79 /system/lib/libc.so (__libc_init+48)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #130 pc 0000176f /system/bin/app_process32 (_start_main+46)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #131 pc 000199b7 /system/bin/linker (_dl__ZNSt3__112__hash_tableINS_17__hash_value_typeIjP6soinfoEENS_22__unordered_map_hasherIjS4_NS_4hashIjEELb1EEENS_21__unordered_map_equalIjS4_NS_8equal_toIjEELb1EEENS_9allocatorIS4_EEE14__erase_uniqueIjEEjRKT+90)
2019-08-02 12:13:07.783 10464-10464/? A/DEBUG: #132 pc 007feb2b [stack:ff294000]

请问如何解决?

@qaz734913414
Copy link
Author

qaz734913414 commented Aug 2, 2019

运行demo中的andriod工程也报createSession,请问大家有遇到这种情况吗?
http://chuantu.xyz/t6/702/1564724257x1031866013.png

@jxt1234
Copy link
Collaborator

jxt1234 commented Aug 2, 2019

修正了,更新下试试

@qaz734913414
Copy link
Author

更新so,问题已解决

@yeRuiHuan
Copy link

yeRuiHuan commented Aug 13, 2019

运行android程序,只加载libMNN.so进行识别没有问题,但尝试加上libMNN_vulkan.so的时候,报了类似的错误。
backtrace: 2019-08-13 15:44:17.046 17464-17464/? A/DEBUG: #00 pc 00000000000ab0dc /vendor/lib64/hw/vulkan.sdm845.so (A6xResource::HwConvSparseMemoryRangeToBindInfo(QglAllocatorStack const*, QglSystemAllocationScope, QglSparseImageMemoryBindInfo const*, QglLinkedList*) const+52) 2019-08-13 15:44:17.046 17464-17464/? A/DEBUG: #01 pc 00000000000c3e2c /vendor/lib64/hw/vulkan.sdm845.so (A6xDescriptorSet::HwUpdateWriteDescriptors(QglDescriptorWriteData const*)+1140) 2019-08-13 15:44:17.046 17464-17464/? A/DEBUG: #02 pc 0000000000053d34 /vendor/lib64/hw/vulkan.sdm845.so (qglinternal::vkUpdateDescriptorSets(VkDevice_T*, unsigned int, VkWriteDescriptorSet const*, unsigned int, VkCopyDescriptorSet const*)+532) 2019-08-13 15:44:17.046 17464-17464/? A/DEBUG: #03 pc 000000000000fdf0 /data/app/com.insta360.ymncomnn-NOzNUcx2DhVHrZi5GweLSw==/lib/arm64/libMNN_Vulkan.so 2019-08-13 15:44:17.046 17464-17464/? A/DEBUG: #04 pc 0000000000011c0c /data/app/com.insta360.ymncomnn-NOzNUcx2DhVHrZi5GweLSw==/lib/arm64/libMNN_Vulkan.so 2019-08-13 15:44:17.046 17464-17464/? A/DEBUG: #05 pc 0000000000010c30 /data/app/com.insta360.ymncomnn-NOzNUcx2DhVHrZi5GweLSw==/lib/arm64/libMNN_Vulkan.so 2019-08-13 15:44:17.046 17464-17464/? A/DEBUG: #06 pc 0000000000028b08 /data/app/com.insta360.ymncomnn-NOzNUcx2DhVHrZi5GweLSw==/lib/arm64/libMNN.so 2019-08-13 15:44:17.046 17464-17464/? A/DEBUG: #07 pc 0000000000028f40 /data/app/com.insta360.ymncomnn-NOzNUcx2DhVHrZi5GweLSw==/lib/arm64/libMNN.so 2019-08-13 15:44:17.046 17464-17464/? A/DEBUG: #08 pc 0000000000032ed8 /data/app/com.insta360.ymncomnn-NOzNUcx2DhVHrZi5GweLSw==/lib/arm64/libMNN.so 2019-08-13 15:44:17.046 17464-17464/? A/DEBUG: #09 pc 00000000000191d4 /data/app/com.insta360.ymncomnn-NOzNUcx2DhVHrZi5GweLSw==/lib/arm64/libMNN.so (MNN::Interpreter::createSession(MNN::ScheduleConfig const&)+356)

看log也是在createSession的时候崩掉的,不过在那之前vulkan和libMNN_vulkan被调用过。

这是我的CMakeLists.txt文件(不知道需不需要,我添加了android studio自带的libvulkan.so):
`cmake_minimum_required(VERSION 3.10.2)

set(IMPORTED_LIB_PATH ${CMAKE_SOURCE_DIR}/../jniLibs) #第三方库路径
set (CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -fopenmp")
set (CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -fopenmp")

#Vulkan支持
find_package(Vulkan REQUIRED)
message(STATUS "Vulkan Include = ${Vulkan_INCLUDE_DIR}")
message(STATUS "Vulkan Lib = ${Vulkan_LIBRARY}")

#添加mnn静态库并包含include下的多个.h文件
add_library (MNN SHARED IMPORTED)
set_target_properties(MNN PROPERTIES IMPORTED_LOCATION ${IMPORTED_LIB_PATH}/${ANDROID_ABI}/libMNN.so)
include_directories(${CMAKE_SOURCE_DIR}/../include)

#添加mnn_vulkan
add_library (MNN_Vulkan SHARED IMPORTED)
set_target_properties(MNN_Vulkan PROPERTIES IMPORTED_LOCATION ${IMPORTED_LIB_PATH}/${ANDROID_ABI}/libMNN_Vulkan.so)

#include_directories(${Vulkan_INCLUDE_DIR})

#创建自己的so库:yolovmobilenetvcoco
add_library( yolovmobilenetvcoco SHARED
...)

find_library( log-lib log)
target_link_libraries(yolovmobilenetvcoco
MNN
MNN_Vulkan
${Vulkan_LIBRARY}
${log-lib}
)`

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants