connect函数崩溃
来源:互联网 发布:随遇软件 编辑:程序博客网 时间:2024/05/22 03:06
出错日志:
D/dynaservice( 5061): dc_ssl_init(188):.【---------------connect函数崩溃---------------】F/libc ( 5061): Fatal signal 11 (SIGSEGV), code 1, fault addr 0x353a32300a0d2d in tid 5061 (htfsk)D/AEE/AED ( 284): $===AEE===AEE===AEE===$D/AEE/AED ( 284): p 0 poll events 1 revents 0D/AEE/AED ( 284): not know revents:0D/AEE/AED ( 284): p 1 poll events 1 revents 0D/AEE/AED ( 284): not know revents:0D/AEE/AED ( 284): p 2 poll events 1 revents 1D/AEE/AED ( 284): aed_main_fork_worker: generator 0x7f8141a0e0, worker 0x7ff694f9d0, recv_fd 14D/AEE/AED ( 284): p 3 poll events 1 revents 0D/AEE/AED ( 284): not know revents:0I/AEE/AED ( 5064): handle_request(14)I/AEE/AED ( 5064): check process 5061 name:htfskI/AEE/AED ( 5064): tid 5061 abort msg address is:0x0000000000000000 si_code is:1 (request from 5061:0)I/AEE/AED ( 5064): BOOM: pid=5061 uid=0 gid=0 tid=5061I/AEE/AED ( 5064): [OnPurpose Redunant in void preset_info(aed_report_record*, int, int)] pid: 5061, tid: 5061, name: htfsk >>> /system/bin/htfsk <<<I/AEE/AED ( 5064): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***W/NativeCrashListener( 783): Couldn't find ProcessRecord for pid 5061I/AEE/AED ( 5064): Build fingerprint: 'alps/full_p92s_hd/p92s_hd:5.1/LMY47D/1507724262:user/test-keys'I/AEE/AED ( 5064): Revision: '0'I/AEE/AED ( 5064): ABI: 'arm64'I/AEE/AED ( 5064): pid: 5061, tid: 5061, name: htfsk >>> /system/bin/htfsk <<<I/AEE/AED ( 5064): signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x353a32300a0d2dE/AEE/AED ( 5064): AM write failure (32 / Broken pipe)E/AEE/LIBAEE( 5064): aee_try_get_word: read:5061 addr:0x526761563136674d ret:-1, 5E/AEE/LIBAEE( 5064): aee_try_get_word: read:5061 addr:0x5267615631366751 ret:-1, 5I/AEE/AED ( 5064): x0 0000007f8ac2d414 x1 000000000000001c x2 0000007fc8449a5c x3 0000007f8bc99000I/AEE/AED ( 5064): x4 0000007f8bc9f728 x5 000000000000001c x6 0000000000800000 x7 000000000000001bI/AEE/AED ( 5064): x8 0000000000000000 x9 0000007fc8449c88 x10 0000007fc8449c88 x11 0000007f8ac2d430I/AEE/AED ( 5064): x12 0000000000000028 x13 33353a32300a0d2d x14 0000007fc84483cc x15 0000000000000001I/AEE/AED ( 5064): x16 0000007f8ac3df90 x17 0000007f8bc35590 x18 0000007f8bc9f730 x19 0000000000000010I/AEE/AED ( 5064): x20 0000007fc8449b18 x21 000000000000000d x22 0000005590e3a000 x23 0000007fc8449b97I/AEE/AED ( 5064): x24 0000007fc8449bac x25 0000000000000000 x26 0000000000000000 x27 0000000000000000I/AEE/AED ( 5064): x28 0000000000000000 x29 0000007fc8449a40 x30 0000007f8bc355d0I/AEE/AED ( 5064): sp 0000007fc8449a40 pc 0000007f8bc35520 pstate 0000000080000000I/AEE/AED ( 5064): I/AEE/AED ( 5064): backtrace:I/AEE/AED ( 5064): #00 pc 0000000000060520 /system/lib64/libc.so (__findenv+52)I/AEE/AED ( 5064): #01 pc 00000000000605cc /system/lib64/libc.so (getenv+60)I/AEE/AED ( 5064): #02 pc 0000000000000c34 /system/lib64/libnetd_client.so (FwmarkClient::shouldSetFwmark(int)+28)I/AEE/AED ( 5064): #03 pc 0000000000000f8c /system/lib64/libnetd_client.soI/AEE/AED ( 5064): #04 pc 000000000001b534 /system/lib64/libc.so (connect+16)I/AEE/AED ( 5064): #05 pc 000000000000807c /system/bin/htfskI/AEE/AED ( 5064): #06 pc 00000000000102a8 /system/bin/htfskI/AEE/AED ( 5064): #07 pc 00000000000172e8 /system/bin/htfskI/AEE/AED ( 5064): #08 pc 526761563136674d <unknown>I/AEE/AED ( 5064): I/AEE/AED ( 5064): Tombstone written to: /data/tombstones/tombstone_00V/AEE/AED ( 5064): dashboard_record_update() : rec->module = /system/bin/htfsk D/AEE/AED ( 5064): Duplicated exception, cnt = 9 D/AEE/AED ( 5064): Last exception time: 1513567421 D/AEE/AED ( 5064): cur time: 1513567596 D/AEE/AED ( 5064): Skip for Exp level'0'D/AEE/AED ( 284): $===AEE===AEE===AEE===$D/AEE/AED ( 284): p 0 poll events 1 revents 0D/AEE/AED ( 284): not know revents:0D/AEE/AED ( 284): p 1 poll events 1 revents 0D/AEE/AED ( 284): not know revents:0D/AEE/AED ( 284): p 2 poll events 1 revents 0D/AEE/AED ( 284): not know revents:0D/AEE/AED ( 284): p 3 poll events 1 revents 0D/AEE/AED ( 284): not know revents:0V/SettingsInterface( 783): from settings cache , name = dropbox:SYSTEM_TOMBSTONE , value = nullI/BootReceiver( 783): Copying /data/tombstones/tombstone_00 to DropBox (SYSTEM_TOMBSTONE)V/SettingsInterface( 783): from settings cache , name = dropbox:SYSTEM_TOMBSTONE , value = nullV/SettingsInterface( 783): from settings cache , name = dropbox_age_seconds , value = nullV/SettingsInterface( 783): from settings cache , name = dropbox_max_files , value = nullV/SettingsInterface( 783): from settings cache , name = dropbox_quota_percent , value = nullV/SettingsInterface( 783): from settings cache , name = dropbox_reserve_percent , value = nullV/SettingsInterface( 783): from settings cache , name = dropbox_quota_kb , value = nullV/ActivityManager( 783): Broadcast: Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } ordered=false userid=0 callerApp=ProcessRecord{1d2e737a 783:system/1000}D/WifiHW ( 783): enter -->wifi_send_command cmd=IFNAME=wlan0 SCAN TYPE=ONLY freq=2427D/wpa_supplicant( 1304): wlan0: Control interface command 'SCAN TYPE=ONLY freq=2427'D/wpa_supplicant( 1304): hw.num_modes = 3D/wpa_supplicant( 1304): wlan0: Setting scan request: 0.000000 secD/wpa_supplicant( 1304): wlan0: Starting AP scan for wildcard SSIDD/wpa_supplicant( 1304): WPS: Building WPS IE for Probe RequestD/wpa_supplicant( 1304): WPS: * Version (hardcoded 0x10)D/wpa_supplicant( 1304): WPS: * Request TypeD/wpa_supplicant( 1304): WPS: * Config Methods (4288)D/wpa_supplicant( 1304): WPS: * UUID-ED/wpa_supplicant( 1304): WPS: * Primary Device TypeD/wpa_supplicant( 1304): WPS: * RF Bands (3)D/wpa_supplicant( 1304): WPS: * Association StateD/wpa_supplicant( 1304): WPS: * Configuration Error (0)D/wpa_supplicant( 1304): WPS: * Device Password ID (0)D/wpa_supplicant( 1304): WPS: * ManufacturerD/wpa_supplicant( 1304): WPS: * Model NameD/wpa_supplicant( 1304): WPS: * Model NumberD/wpa_supplicant( 1304): WPS: * Device NameD/wpa_supplicant( 1304): WPS: * Version2 (0x20)D/wpa_supplicant( 1304): P2P: * P2P IE headerD/wpa_supplicant( 1304): P2P: * Capability dev=25 group=00D/wpa_supplicant( 1304): P2P: * Listen Channel: Regulatory Class 81 Channel 6D/wpa_supplicant( 1304): wlan0: Limit manual scan to specified channelsD/wpa_supplicant( 1304): wlan0: Add radio work 'scan'@0x7f8301c380D/wpa_supplicant( 1304): wlan0: First radio work item in the queue - schedule start immediatelyD/wpa_supplicant( 1304): wlan0: Starting radio work 'scan'@0x7f8301c380 after 0.000038 second waitD/wpa_supplicant( 1304): wlan0: nl80211: scan requestD/wpa_supplicant( 1304): nl80211: Scan SSID - hexdump(len=0): [NULL]D/wpa_supplicant( 1304): nl80211: Scan extra IEs - hexdump(len=144): dd 7b 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 42 88 10 47 00 10 bb 1b cb a2 68 df 59 a1 ac d5 06 f8 7d 60 ba 04 10 54 00 08 00 0a 00 50 f2 04 00 05 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 04 61 6c 70 73 10 23 00 03 50 39 32 10 24 00 03 50 39 32 10 11 00 0c 66 75 6c 6c 5f 70 39 32 73 5f 68 64 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 43 4e 04 51 06D/wpa_supplicant( 1304): nl80211: Scan frequency 2427 MHzD/wpa_supplicant( 1304): Scan requested (ret=0) - scan timeout 30 secondsD/wpa_supplicant( 1304): nl80211: Event message availableD/wpa_supplicant( 1304): nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0D/wpa_supplicant( 1304): wlan0: nl80211: Scan triggerD/wpa_supplicant( 1304): wlan0: Event SCAN_STARTED (49) receivedD/wpa_supplicant( 1304): wlan0: Own scan request started a scan in 0.000104 secondsD/wpa_supplicant( 1304): CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_783-2\x00D/[BT3.0+HS]PAL( 545): == chip_reset_fd is set ==D/[BT3.0+HS]PAL( 545): D/[BT3.0+HS]PAL( 545): Recv Netlink Packet [212:00000011:00:0:0] [33:]D/[BT3.0+HS]PAL( 545): D/[BT3.0+HS]PAL( 545): Unknown command from wifi driverD/[BT3.0+HS]PAL( 545): D/WifiHW ( 783): [1] get event: IFNAME=wlan0 <3>CTRL-EVENT-SCAN-STARTED D/WifiHW ( 783): [2] get event: IFNAME=wlan0 CTRL-EVENT-SCAN-STARTED D/WifiHW ( 783): enter -->wifi_wait_on_socket buflen=2048D/WifiHW ( 783): enter -->wifi_ctrl_recvD/WifiHW ( 783): leave --> reply=OKD/WifiHW ( 783): D/WifiHW ( 783): enter -->wifi_send_command cmd=IFNAME=wlan0 SIGNAL_POLLD/wpa_supplicant( 1304): wlan0: Control interface command 'SIGNAL_POLL'D/WifiHW ( 783): leave --> reply=RSSI=-20D/WifiHW ( 783): LINKSPEED=135D/WifiHW ( 783): NOISE=9999D/WifiHW ( 783): FREQUENCY=2427D/WifiHW ( 783): I/WifiStateMachine( 783): fetchRssiLinkSpeedAndFrequencyNative, newRssi:-20, newLinkSpeed:135, SSID:"test"D/WifiStateMachine( 783): mLastSignalLevel:4, newSignalLevel:4D/dynaservice( 5065): SaveParamToFile(40):uiResult:1
阅读全文
0 0
- connect函数崩溃
- connect函数
- connect函数
- connect函数
- connect函数
- connect函数
- connect函数
- connect函数
- Connect函数
- connect函数
- connect函数
- 在iTunes Connect查看崩溃日志
- socket函数、connect函数、
- pthread_getschedparam函数 调用崩溃
- 函数return时崩溃
- findContours函数导致崩溃
- connect函数超时设置
- socket connect函数理解
- 第二周
- 【八中*二叉树】这是一棵树吗?
- Android selector中嵌套shape
- Unity(五) Unity3D使用Assetbundle打包加载(Prefab、场景)转载原博客
- 剑指offer 按之字形顺序打印二叉树
- connect函数崩溃
- txt文件加密
- java爬取西刺ip代理练习
- Windows下Qt使用Usb摄像头采集视频实现鼠标事件
- Linux文件系统
- Tomcat 启动问题
- Spring MVC基本配置
- iOS之UIButton
- 一分钟了解阿里云产品:高性能计算HPC