connect函数崩溃

来源:互联网 发布:随遇软件 编辑:程序博客网 时间:2024/05/22 03:06

出错日志:

D/dynaservice( 5061): dc_ssl_init(188):.【---------------connect函数崩溃---------------】F/libc    ( 5061): Fatal signal 11 (SIGSEGV), code 1, fault addr 0x353a32300a0d2d in tid 5061 (htfsk)D/AEE/AED (  284): $===AEE===AEE===AEE===$D/AEE/AED (  284): p 0 poll events 1 revents 0D/AEE/AED (  284): not know revents:0D/AEE/AED (  284): p 1 poll events 1 revents 0D/AEE/AED (  284): not know revents:0D/AEE/AED (  284): p 2 poll events 1 revents 1D/AEE/AED (  284): aed_main_fork_worker: generator 0x7f8141a0e0, worker 0x7ff694f9d0, recv_fd 14D/AEE/AED (  284): p 3 poll events 1 revents 0D/AEE/AED (  284): not know revents:0I/AEE/AED ( 5064): handle_request(14)I/AEE/AED ( 5064): check process 5061 name:htfskI/AEE/AED ( 5064): tid 5061 abort msg address is:0x0000000000000000 si_code is:1 (request from 5061:0)I/AEE/AED ( 5064): BOOM: pid=5061 uid=0 gid=0 tid=5061I/AEE/AED ( 5064): [OnPurpose Redunant in void preset_info(aed_report_record*, int, int)] pid: 5061, tid: 5061, name: htfsk  >>> /system/bin/htfsk <<<I/AEE/AED ( 5064): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***W/NativeCrashListener(  783): Couldn't find ProcessRecord for pid 5061I/AEE/AED ( 5064): Build fingerprint: 'alps/full_p92s_hd/p92s_hd:5.1/LMY47D/1507724262:user/test-keys'I/AEE/AED ( 5064): Revision: '0'I/AEE/AED ( 5064): ABI: 'arm64'I/AEE/AED ( 5064): pid: 5061, tid: 5061, name: htfsk  >>> /system/bin/htfsk <<<I/AEE/AED ( 5064): signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x353a32300a0d2dE/AEE/AED ( 5064): AM write failure (32 / Broken pipe)E/AEE/LIBAEE( 5064): aee_try_get_word: read:5061 addr:0x526761563136674d ret:-1, 5E/AEE/LIBAEE( 5064): aee_try_get_word: read:5061 addr:0x5267615631366751 ret:-1, 5I/AEE/AED ( 5064):     x0   0000007f8ac2d414  x1   000000000000001c  x2   0000007fc8449a5c  x3   0000007f8bc99000I/AEE/AED ( 5064):     x4   0000007f8bc9f728  x5   000000000000001c  x6   0000000000800000  x7   000000000000001bI/AEE/AED ( 5064):     x8   0000000000000000  x9   0000007fc8449c88  x10  0000007fc8449c88  x11  0000007f8ac2d430I/AEE/AED ( 5064):     x12  0000000000000028  x13  33353a32300a0d2d  x14  0000007fc84483cc  x15  0000000000000001I/AEE/AED ( 5064):     x16  0000007f8ac3df90  x17  0000007f8bc35590  x18  0000007f8bc9f730  x19  0000000000000010I/AEE/AED ( 5064):     x20  0000007fc8449b18  x21  000000000000000d  x22  0000005590e3a000  x23  0000007fc8449b97I/AEE/AED ( 5064):     x24  0000007fc8449bac  x25  0000000000000000  x26  0000000000000000  x27  0000000000000000I/AEE/AED ( 5064):     x28  0000000000000000  x29  0000007fc8449a40  x30  0000007f8bc355d0I/AEE/AED ( 5064):     sp   0000007fc8449a40  pc   0000007f8bc35520  pstate 0000000080000000I/AEE/AED ( 5064): I/AEE/AED ( 5064): backtrace:I/AEE/AED ( 5064):     #00 pc 0000000000060520  /system/lib64/libc.so (__findenv+52)I/AEE/AED ( 5064):     #01 pc 00000000000605cc  /system/lib64/libc.so (getenv+60)I/AEE/AED ( 5064):     #02 pc 0000000000000c34  /system/lib64/libnetd_client.so (FwmarkClient::shouldSetFwmark(int)+28)I/AEE/AED ( 5064):     #03 pc 0000000000000f8c  /system/lib64/libnetd_client.soI/AEE/AED ( 5064):     #04 pc 000000000001b534  /system/lib64/libc.so (connect+16)I/AEE/AED ( 5064):     #05 pc 000000000000807c  /system/bin/htfskI/AEE/AED ( 5064):     #06 pc 00000000000102a8  /system/bin/htfskI/AEE/AED ( 5064):     #07 pc 00000000000172e8  /system/bin/htfskI/AEE/AED ( 5064):     #08 pc 526761563136674d  <unknown>I/AEE/AED ( 5064): I/AEE/AED ( 5064): Tombstone written to: /data/tombstones/tombstone_00V/AEE/AED ( 5064): dashboard_record_update() : rec->module = /system/bin/htfsk D/AEE/AED ( 5064): Duplicated exception, cnt = 9 D/AEE/AED ( 5064): Last exception time: 1513567421 D/AEE/AED ( 5064): cur time: 1513567596 D/AEE/AED ( 5064): Skip for Exp level'0'D/AEE/AED (  284): $===AEE===AEE===AEE===$D/AEE/AED (  284): p 0 poll events 1 revents 0D/AEE/AED (  284): not know revents:0D/AEE/AED (  284): p 1 poll events 1 revents 0D/AEE/AED (  284): not know revents:0D/AEE/AED (  284): p 2 poll events 1 revents 0D/AEE/AED (  284): not know revents:0D/AEE/AED (  284): p 3 poll events 1 revents 0D/AEE/AED (  284): not know revents:0V/SettingsInterface(  783):  from settings cache , name = dropbox:SYSTEM_TOMBSTONE , value = nullI/BootReceiver(  783): Copying /data/tombstones/tombstone_00 to DropBox (SYSTEM_TOMBSTONE)V/SettingsInterface(  783):  from settings cache , name = dropbox:SYSTEM_TOMBSTONE , value = nullV/SettingsInterface(  783):  from settings cache , name = dropbox_age_seconds , value = nullV/SettingsInterface(  783):  from settings cache , name = dropbox_max_files , value = nullV/SettingsInterface(  783):  from settings cache , name = dropbox_quota_percent , value = nullV/SettingsInterface(  783):  from settings cache , name = dropbox_reserve_percent , value = nullV/SettingsInterface(  783):  from settings cache , name = dropbox_quota_kb , value = nullV/ActivityManager(  783): Broadcast: Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } ordered=false userid=0 callerApp=ProcessRecord{1d2e737a 783:system/1000}D/WifiHW  (  783): enter -->wifi_send_command cmd=IFNAME=wlan0 SCAN TYPE=ONLY freq=2427D/wpa_supplicant( 1304): wlan0: Control interface command 'SCAN TYPE=ONLY freq=2427'D/wpa_supplicant( 1304): hw.num_modes = 3D/wpa_supplicant( 1304): wlan0: Setting scan request: 0.000000 secD/wpa_supplicant( 1304): wlan0: Starting AP scan for wildcard SSIDD/wpa_supplicant( 1304): WPS: Building WPS IE for Probe RequestD/wpa_supplicant( 1304): WPS:  * Version (hardcoded 0x10)D/wpa_supplicant( 1304): WPS:  * Request TypeD/wpa_supplicant( 1304): WPS:  * Config Methods (4288)D/wpa_supplicant( 1304): WPS:  * UUID-ED/wpa_supplicant( 1304): WPS:  * Primary Device TypeD/wpa_supplicant( 1304): WPS:  * RF Bands (3)D/wpa_supplicant( 1304): WPS:  * Association StateD/wpa_supplicant( 1304): WPS:  * Configuration Error (0)D/wpa_supplicant( 1304): WPS:  * Device Password ID (0)D/wpa_supplicant( 1304): WPS:  * ManufacturerD/wpa_supplicant( 1304): WPS:  * Model NameD/wpa_supplicant( 1304): WPS:  * Model NumberD/wpa_supplicant( 1304): WPS:  * Device NameD/wpa_supplicant( 1304): WPS:  * Version2 (0x20)D/wpa_supplicant( 1304): P2P: * P2P IE headerD/wpa_supplicant( 1304): P2P: * Capability dev=25 group=00D/wpa_supplicant( 1304): P2P: * Listen Channel: Regulatory Class 81 Channel 6D/wpa_supplicant( 1304): wlan0: Limit manual scan to specified channelsD/wpa_supplicant( 1304): wlan0: Add radio work 'scan'@0x7f8301c380D/wpa_supplicant( 1304): wlan0: First radio work item in the queue - schedule start immediatelyD/wpa_supplicant( 1304): wlan0: Starting radio work 'scan'@0x7f8301c380 after 0.000038 second waitD/wpa_supplicant( 1304): wlan0: nl80211: scan requestD/wpa_supplicant( 1304): nl80211: Scan SSID - hexdump(len=0): [NULL]D/wpa_supplicant( 1304): nl80211: Scan extra IEs - hexdump(len=144): dd 7b 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 42 88 10 47 00 10 bb 1b cb a2 68 df 59 a1 ac d5 06 f8 7d 60 ba 04 10 54 00 08 00 0a 00 50 f2 04 00 05 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 04 61 6c 70 73 10 23 00 03 50 39 32 10 24 00 03 50 39 32 10 11 00 0c 66 75 6c 6c 5f 70 39 32 73 5f 68 64 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 43 4e 04 51 06D/wpa_supplicant( 1304): nl80211: Scan frequency 2427 MHzD/wpa_supplicant( 1304): Scan requested (ret=0) - scan timeout 30 secondsD/wpa_supplicant( 1304): nl80211: Event message availableD/wpa_supplicant( 1304): nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0D/wpa_supplicant( 1304): wlan0: nl80211: Scan triggerD/wpa_supplicant( 1304): wlan0: Event SCAN_STARTED (49) receivedD/wpa_supplicant( 1304): wlan0: Own scan request started a scan in 0.000104 secondsD/wpa_supplicant( 1304): CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_783-2\x00D/[BT3.0+HS]PAL(  545): == chip_reset_fd is set ==D/[BT3.0+HS]PAL(  545): D/[BT3.0+HS]PAL(  545): Recv Netlink Packet [212:00000011:00:0:0] [33:]D/[BT3.0+HS]PAL(  545): D/[BT3.0+HS]PAL(  545): Unknown command from wifi driverD/[BT3.0+HS]PAL(  545): D/WifiHW  (  783): [1] get event: IFNAME=wlan0 <3>CTRL-EVENT-SCAN-STARTED D/WifiHW  (  783): [2] get event: IFNAME=wlan0 CTRL-EVENT-SCAN-STARTED D/WifiHW  (  783): enter -->wifi_wait_on_socket buflen=2048D/WifiHW  (  783): enter -->wifi_ctrl_recvD/WifiHW  (  783): leave --> reply=OKD/WifiHW  (  783): D/WifiHW  (  783): enter -->wifi_send_command cmd=IFNAME=wlan0 SIGNAL_POLLD/wpa_supplicant( 1304): wlan0: Control interface command 'SIGNAL_POLL'D/WifiHW  (  783): leave --> reply=RSSI=-20D/WifiHW  (  783): LINKSPEED=135D/WifiHW  (  783): NOISE=9999D/WifiHW  (  783): FREQUENCY=2427D/WifiHW  (  783): I/WifiStateMachine(  783): fetchRssiLinkSpeedAndFrequencyNative, newRssi:-20, newLinkSpeed:135, SSID:"test"D/WifiStateMachine(  783): mLastSignalLevel:4, newSignalLevel:4D/dynaservice( 5065): SaveParamToFile(40):uiResult:1