-
Notifications
You must be signed in to change notification settings - Fork 296
Description
分支名:feature/paddle-x
复制libs/android/cxx中的预测库替换android/app中的预测库
替换
android/shell运行结果:
➜ ppocr_demo git:(feature/paddle-x) ✗ ./run.sh
./ppocr_demo/: 10 files pushed, 0 skipped. 7.5 MB/s (44804570 bytes in 5.690s)
WARNING: linker: Warning: "/data/local/tmp/ppocr_demo/libpaddle_light_api_shared.so" unused DT entry: DT_RPATH (type 0xf arg 0x32b1) (ignoring)
The detection visualized image saved in ./test_img_result.jpg
0 纯臻营养护发素 0.993706
1 产品信息/参数 0.991225
2 (45元/每公斤,100公斤起订) 0.938893
3 每瓶22元,1000瓶起订) 0.988353
4 【品牌】:代加工方式/OEMODM 0.97557
5 【品名】:纯臻营养护发素 0.986914
6 ODMOEM 0.929891
7 【产品编号】:YM-X-3011 0.964156
8 【净含量】:220ml 0.976404
9 【适用人群】:适合所有肤质 0.987942
10 【主要成分】:鲸蜡硬脂醇、燕麦β-葡聚 0.968315
11 糖、椰油酰胺丙基甜菜碱、泛醒 0.941537
12 (成品包材) 0.974796
13 【主要功能】:可紧致头发磷层,从而达到 0.988799
14 即时持久改善头发光泽的效果,给干燥的头 0.989547
15 发足够的滋养 0.998413
花费了2.4533秒
/data/local/tmp/ppocr_demo/test_img_result.jpg: ...ed, 0 skipped. 0.6 MB/s (105195 bytes in 0.161s)
### app下运行报错:
2024-12-25 11:51:43.116 7777-7777 debug=== com...le.lite.demo.object_detection D NN model on SD card /storage/emulated/0/Android/data/com.baidu.paddle.lite.demo.object_detection/files/PP-OCRv4_mobile_det.nb
2024-12-25 11:51:43.117 7777-7777 Utils com...le.lite.demo.object_detection D copyAssets nnFileName: ch_ppocr_mobile_v2.0_cls_slim_opt.nb
2024-12-25 11:51:43.119 7777-7777 debug=== com...le.lite.demo.object_detection D NN model on SD card /storage/emulated/0/Android/data/com.baidu.paddle.lite.demo.object_detection/files/ch_ppocr_mobile_v2.0_cls_slim_opt.nb
2024-12-25 11:51:43.119 7777-7777 Utils com...le.lite.demo.object_detection D copyAssets nnFileName: PP-OCRv4_mobile_rec.nb
2024-12-25 11:51:43.120 7777-7777 debug=== com...le.lite.demo.object_detection D NN model on SD card /storage/emulated/0/Android/data/com.baidu.paddle.lite.demo.object_detection/files/PP-OCRv4_mobile_rec.nb
2024-12-25 11:51:43.124 7777-7777 mali_so com...le.lite.demo.object_detection I [File] : hardware/arm/maliT760/driver/product/base/src/mali_base_kbase.c; [Line] : 1392; [Func] : base_context_deal_with_version_affairs_rk_ext;
arm_release_ver of this mali_so is 'g18p0-01eac0', rk_so_ver is '2 '.
2024-12-25 11:51:43.124 7777-7777 mali_so com...le.lite.demo.object_detection I [File] : hardware/arm/maliT760/driver/product/base/src/mali_base_kbase.c; [Line] : 1408; [Func] : base_context_deal_with_version_affairs_rk_ext;
arm_release_vers are match. to set the full mali_ver 'g18p0-01eac0-2' as value of 'sys.gmali.version'.
2024-12-25 11:51:43.129 7777-7777 libc com...le.lite.demo.object_detection A Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x20 in tid 7777 (bject_detection), pid 7777 (bject_detection)
2024-12-25 11:51:43.154 7811-7811 crash_dump64 pid-7811 I obtaining output fd from tombstoned, type: kDebuggerdTombstoneProto
2024-12-25 11:51:43.154 296-296 tombstoned tombstoned I received crash request for pid 7777
2024-12-25 11:51:43.154 7811-7811 crash_dump64 pid-7811 I performing dump of process 7777 (target tid = 7777)
2024-12-25 11:51:43.866 248-248 logd pid-248 I logdr: UID=10104 GID=10104 PID=7811 n tail=0 logMask=8 pid=7777 start=0ns deadline=0ns
2024-12-25 11:51:43.866 248-248 logd pid-248 I logdr: UID=10104 GID=10104 PID=7811 n tail=0 logMask=1 pid=7777 start=0ns deadline=0ns
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A Build fingerprint: 'rockchip/rk3588_t/rk3588_t:13/TQ3C.230805.001.B2/eng.fzm.20240620.095044:userdebug/release-keys'
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A Revision: '0'
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A ABI: 'arm64'
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A Timestamp: 2024-12-25 11:51:43.160215403+0800
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A Process uptime: 1s
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A Cmdline: com.baidu.paddle.lite.demo.object_detection
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A pid: 7777, tid: 7777, name: bject_detection >>> com.baidu.paddle.lite.demo.object_detection <<<
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A uid: 10104
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0000000000000020
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A Cause: null pointer dereference
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x0 0000007435515330 x1 000000768879054c x2 000000768879054c x3 0000000000000010
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x4 0000000000000000 x5 0000000000000078 x6 666e695f65766173 x7 6c65646f6d5f7265
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x8 0000000000000000 x9 ce5d000000038104 x10 0000000000038000 x11 0000000000000004
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x12 0000000035515368 x13 0000000000000001 x14 0000000000000001 x15 0000000000005319
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x16 0000000000000001 x17 00000076886fb10c x18 000000737297f2b0 x19 0000007feb304490
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x20 0000000000000000 x21 0000007feb304498 x22 0000000000000020 x23 00000076a76df000
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x24 00000073ef200880 x25 00000076a76df000 x26 0000000000000081 x27 0000007feb304b98
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A x28 0000007feb304a80 x29 0000007feb304a80
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A lr 000000737262f450 sp 0000007feb304410 pc 000000737262f450 pst 0000000060001000
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A backtrace:
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #00 pc 000000000040b450 /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/lib/arm64/libpaddle_light_api_shared.so (BuildId: 76318fbd5af7abcd3f5476b343abeb53bc9bc21b)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #1 pc 000000000040a83c /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/lib/arm64/libpaddle_light_api_shared.so (BuildId: 76318fbd5af7abcd3f5476b343abeb53bc9bc21b)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #2 pc 000000000040a124 /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/lib/arm64/libpaddle_light_api_shared.so (BuildId: 76318fbd5af7abcd3f5476b343abeb53bc9bc21b)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #3 pc 000000000040ad08 /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/lib/arm64/libpaddle_light_api_shared.so (std::__ndk1::shared_ptrpaddle::lite_api::PaddlePredictor paddle::lite_api::CreatePaddlePredictorpaddle::lite_api::MobileConfig(paddle::lite_api::MobileConfig const&)+48) (BuildId: 76318fbd5af7abcd3f5476b343abeb53bc9bc21b)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #4 pc 00000000000aedb0 /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/lib/arm64/libNative.so (BuildId: 3573f804df141344f892092ba23ed1f1965eb207)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #5 pc 000000000009a564 /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/lib/arm64/libNative.so (BuildId: 3573f804df141344f892092ba23ed1f1965eb207)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #6 pc 00000000000957e4 /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/lib/arm64/libNative.so (Java_com_baidu_paddle_lite_demo_ppocr_1demo_Native_nativeInit+232) (BuildId: 3573f804df141344f892092ba23ed1f1965eb207)
2024-12-25 11:51:43.310 7811-7811 DEBUG pid-7811 A #7 pc 000000000021a354 /apex/com.android.art/lib64/libart.so (art_quick_generic_jni_trampoline+148) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.314 7811-7811 DEBUG pid-7811 A #8 pc 0000000000209b68 /apex/com.android.art/lib64/libart.so (nterp_helper+2152) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.314 7811-7811 DEBUG pid-7811 A #9 pc 00000000001ad5d4 [anon:dalvik-classes.dex extracted in memory from /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/base.apk] (com.baidu.paddle.lite.demo.ppocr_demo.Native.init+0)
2024-12-25 11:51:43.314 7811-7811 DEBUG pid-7811 A #10 pc 000000000020a958 /apex/com.android.art/lib64/libart.so (nterp_helper+5720) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.314 7811-7811 DEBUG pid-7811 A #11 pc 00000000001ad294 [anon:dalvik-classes.dex extracted in memory from /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/base.apk] (com.baidu.paddle.lite.demo.ppocr_demo.MainActivity.checkRun+216)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #12 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #13 pc 00000000001ad566 [anon:dalvik-classes.dex extracted in memory from /data/app/~~rZT-h-tu0UevjpZRqkEMvw==/com.baidu.paddle.lite.demo.object_detection-eWQVkg0t4LWDhX1WJSI8ZQ==/base.apk] (com.baidu.paddle.lite.demo.ppocr_demo.MainActivity.onResume+6)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #14 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #15 pc 000000000022a3d2 /system/framework/framework.jar (android.app.Instrumentation.callActivityOnResume+6)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #16 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #17 pc 00000000001c5598 /system/framework/framework.jar (android.app.Activity.performResume+128)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #18 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #19 pc 00000000001b63fe /system/framework/framework.jar (android.app.ActivityThread.performResumeActivity+182)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #20 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #21 pc 00000000001bc24c /system/framework/framework.jar (android.app.ActivityThread.handleResumeActivity+12)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #22 pc 000000000020a958 /apex/com.android.art/lib64/libart.so (nterp_helper+5720) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #23 pc 00000000002b6908 /system/framework/framework.jar (android.app.servertransaction.ResumeActivityItem.execute+32)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #24 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #25 pc 00000000002b3a8c /system/framework/framework.jar (android.app.servertransaction.ActivityTransactionItem.execute+8)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #26 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #27 pc 00000000002b7a44 /system/framework/framework.jar (android.app.servertransaction.TransactionExecutor.executeLifecycleState+64)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #28 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #29 pc 00000000002b78e2 /system/framework/framework.jar (android.app.servertransaction.TransactionExecutor.execute+158)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #30 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #31 pc 00000000001b2e78 /system/framework/framework.jar (android.app.ActivityThread$H.handleMessage+276)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #32 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #33 pc 000000000047f7ae /system/framework/framework.jar (android.os.Handler.dispatchMessage+38)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #34 pc 000000000020a254 /apex/com.android.art/lib64/libart.so (nterp_helper+3924) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #35 pc 00000000004a63c2 /system/framework/framework.jar (android.os.Looper.loopOnce+346)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #36 pc 0000000000209334 /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #37 pc 00000000004a6a62 /system/framework/framework.jar (android.os.Looper.loop+162)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #38 pc 0000000000209334 /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #39 pc 00000000001bd76e /system/framework/framework.jar (android.app.ActivityThread.main+202)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #40 pc 0000000000210c00 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+576) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #41 pc 0000000000279790 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+236) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #42 pc 0000000000602780 /apex/com.android.art/lib64/libart.so (_jobject* art::InvokeMethod<(art::PointerSize)8>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jobject*, _jobject*, unsigned long)+1396) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #43 pc 0000000000584158 /apex/com.android.art/lib64/libart.so (art::Method_invoke(_JNIEnv*, _jobject*, _jobject*, _jobjectArray*)+48) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #44 pc 0000000000099148 /system/framework/arm64/boot.oat (art_jni_trampoline+120) (BuildId: 87b08e02b2245437b28f15a710c1909b81a235f4)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #45 pc 000000000020a2b0 /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #46 pc 0000000000405b5e /system/framework/framework.jar (com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run+22)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #47 pc 00000000007c023c /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+3228) (BuildId: 7ca60dc286cb06f96bffa12114419fac1a057afa)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #48 pc 0000000000210c00 /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+576) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #49 pc 0000000000279790 /apex/com.android.art/lib64/libart.so (art::ArtMethod::Invoke(art::Thread*, unsigned int*, unsigned int, art::JValue*, char const*)+236) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #50 pc 0000000000602ed8 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgsart::ArtMethod*(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+448) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #51 pc 0000000000603394 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+92) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #52 pc 00000000004f0f6c /apex/com.android.art/lib64/libart.so (art::JNI::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+596) (BuildId: 499c2699a3444f5f106778c61af92356)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #53 pc 00000000000bcad0 /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+120) (BuildId: e68d1a1aff94289c08c096bc76a31fc7)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #54 pc 00000000000c85c4 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vectorandroid::String8 const&, bool)+840) (BuildId: e68d1a1aff94289c08c096bc76a31fc7)
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #55 pc 0000000000002554 /system/bin/app_process64 (main+1280) (BuildId: 094580f53da62691fcd1d29c5f6dde69)
---------------------------- PROCESS ENDED (7777) for package com.baidu.paddle.lite.demo.object_detection ----------------------------
2024-12-25 11:51:43.315 7811-7811 DEBUG pid-7811 A #56 pc 000000000004a1f4 /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+96) (BuildId: 4e07915368c859b1910c68c84a8de75f)
2024-12-25 11:51:43.327 296-296 tombstoned tombstoned E Tombstone written to: tombstone_18
2024-12-25 11:51:43.327 628-722 RKLOG system_process D =========generate tombstone bugreport[idx=4]: {0x39263865, 3, 3, 28299}