出错日志:
D/dynaservice( 5061): dc_ssl_init(188): .
【---------------connect函数崩溃---------------】
F/libc ( 5061): Fatal signal 11 (SIGSEGV), code 1, fault addr 0x353a32300a0d2d in tid 5061 (htfsk)
D/AEE/AED ( 284): $===AEE===AEE===AEE===$
D/AEE/AED ( 284): p 0 poll events 1 revents 0
D/AEE/AED ( 284): not know revents:0
D/AEE/AED ( 284): p 1 poll events 1 revents 0
D/AEE/AED ( 284): not know revents:0
D/AEE/AED ( 284): p 2 poll events 1 revents 1
D/AEE/AED ( 284): aed_main_fork_worker: generator 0x7f8141a0e0, worker 0x7ff694f9d0, recv_fd 14
D/AEE/AED ( 284): p 3 poll events 1 revents 0
D/AEE/AED ( 284): not know revents:0
I/AEE/AED ( 5064): handle_request(14)
I/AEE/AED ( 5064): check process 5061 name:htfsk
I/AEE/AED ( 5064): tid 5061 abort msg address is:0x0000000000000000 si_code is:1 (request from 5061:0)
I/AEE/AED ( 5064): BOOM: pid=5061 uid=0 gid=0 tid=5061
I/AEE/AED ( 5064): [OnPurpose Redunant in void preset_info(aed_report_record*, int, int)] pid: 5061, tid: 5061, name: htfsk >>> /system/bin/htfsk <<<
I/AEE/AED ( 5064): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
W/NativeCrashListener( 783): Couldn't find ProcessRecord for pid 5061
I/AEE/AED ( 5064): Build fingerprint: 'alps/full_p92s_hd/p92s_hd:5.1/LMY47D/1507724262:user/test-keys'
I/AEE/AED ( 5064): Revision: '0'
I/AEE/AED ( 5064): ABI: 'arm64'
I/AEE/AED ( 5064): pid: 5061, tid: 5061, name: htfsk >>> /system/bin/htfsk <<<
I/AEE/AED ( 5064): signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x353a32300a0d2d
E/AEE/AED ( 5064): AM write failure (32 / Broken pipe)
E/AEE/LIBAEE( 5064): aee_try_get_word: read:5061 addr:0x526761563136674d ret:-1, 5
E/AEE/LIBAEE( 5064): aee_try_get_word: read:5061 addr:0x5267615631366751 ret:-1, 5
I/AEE/AED ( 5064): x0 0000007f8ac2d414 x1 000000000000001c x2 0000007fc8449a5c x3 0000007f8bc99000
I/AEE/AED ( 5064): x4 0000007f8bc9f728 x5 000000000000001c x6 0000000000800000 x7 000000000000001b
I/AEE/AED ( 5064): x8 0000000000000000 x9 0000007fc8449c88 x10 0000007fc8449c88 x11 0000007f8ac2d430
I/AEE/AED ( 5064): x12 0000000000000028 x13 33353a32300a0d2d x14 0000007fc84483cc x15 0000000000000001
I/AEE/AED ( 5064): x16 0000007f8ac3df90 x17 0000007f8bc35590 x18 0000007f8bc9f730 x19 0000000000000010
I/AEE/AED ( 5064): x20 0000007fc8449b18 x21 000000000000000d x22 0000005590e3a000 x23 0000007fc8449b97
I/AEE/AED ( 5064): x24 0000007fc8449bac x25 0000000000000000 x26 0000000000000000 x27 0000000000000000
I/AEE/AED ( 5064): x28 0000000000000000 x29 0000007fc8449a40 x30 0000007f8bc355d0
I/AEE/AED ( 5064): sp 0000007fc8449a40 pc 0000007f8bc35520 pstate 0000000080000000
I/AEE/AED ( 5064):
I/AEE/AED ( 5064): backtrace:
I/AEE/AED ( 5064): #00 pc 0000000000060520 /system/lib64/libc.so (__findenv+52)
I/AEE/AED ( 5064): #01 pc 00000000000605cc /system/lib64/libc.so (getenv+60)
I/AEE/AED ( 5064): #02 pc 0000000000000c34 /system/lib64/libnetd_client.so (FwmarkClient::shouldSetFwmark(int)+28)
I/AEE/AED ( 5064): #03 pc 0000000000000f8c /system/lib64/libnetd_client.so
I/AEE/AED ( 5064): #04 pc 000000000001b534 /system/lib64/libc.so (connect+16)
I/AEE/AED ( 5064): #05 pc 000000000000807c /system/bin/htfsk
I/AEE/AED ( 5064): #06 pc 00000000000102a8 /system/bin/htfsk
I/AEE/AED ( 5064): #07 pc 00000000000172e8 /system/bin/htfsk
I/AEE/AED ( 5064): #08 pc 526761563136674d
I/AEE/AED ( 5064):
I/AEE/AED ( 5064): Tombstone written to: /data/tombstones/tombstone_00
V/AEE/AED ( 5064): dashboard_record_update() : rec->module = /system/bin/htfsk
D/AEE/AED ( 5064): Duplicated exception, cnt = 9
D/AEE/AED ( 5064): Last exception time: 1513567421
D/AEE/AED ( 5064): cur time: 1513567596
D/AEE/AED ( 5064): Skip for Exp level'0'
D/AEE/AED ( 284): $===AEE===AEE===AEE===$
D/AEE/AED ( 284): p 0 poll events 1 revents 0
D/AEE/AED ( 284): not know revents:0
D/AEE/AED ( 284): p 1 poll events 1 revents 0
D/AEE/AED ( 284): not know revents:0
D/AEE/AED ( 284): p 2 poll events 1 revents 0
D/AEE/AED ( 284): not know revents:0
D/AEE/AED ( 284): p 3 poll events 1 revents 0
D/AEE/AED ( 284): not know revents:0
V/SettingsInterface( 783): from settings cache , name = dropbox:SYSTEM_TOMBSTONE , value = null
I/BootReceiver( 783): Copying /data/tombstones/tombstone_00 to DropBox (SYSTEM_TOMBSTONE)
V/SettingsInterface( 783): from settings cache , name = dropbox:SYSTEM_TOMBSTONE , value = null
V/SettingsInterface( 783): from settings cache , name = dropbox_age_seconds , value = null
V/SettingsInterface( 783): from settings cache , name = dropbox_max_files , value = null
V/SettingsInterface( 783): from settings cache , name = dropbox_quota_percent , value = null
V/SettingsInterface( 783): from settings cache , name = dropbox_reserve_percent , value = null
V/SettingsInterface( 783): from settings cache , name = dropbox_quota_kb , value = null
V/ActivityManager( 783): Broadcast: Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } ordered=false userid=0 callerApp=ProcessRecord{1d2e737a 783:system/1000}
D/WifiHW ( 783): enter -->wifi_send_command cmd=IFNAME=wlan0 SCAN TYPE=ONLY freq=2427
D/wpa_supplicant( 1304): wlan0: Control interface command 'SCAN TYPE=ONLY freq=2427'
D/wpa_supplicant( 1304): hw.num_modes = 3
D/wpa_supplicant( 1304): wlan0: Setting scan request: 0.000000 sec
D/wpa_supplicant( 1304): wlan0: Starting AP scan for wildcard SSID
D/wpa_supplicant( 1304): WPS: Building WPS IE for Probe Request
D/wpa_supplicant( 1304): WPS: * Version (hardcoded 0x10)
D/wpa_supplicant( 1304): WPS: * Request Type
D/wpa_supplicant( 1304): WPS: * Config Methods (4288)
D/wpa_supplicant( 1304): WPS: * UUID-E
D/wpa_supplicant( 1304): WPS: * Primary Device Type
D/wpa_supplicant( 1304): WPS: * RF Bands (3)
D/wpa_supplicant( 1304): WPS: * Association State
D/wpa_supplicant( 1304): WPS: * Configuration Error (0)
D/wpa_supplicant( 1304): WPS: * Device Password ID (0)
D/wpa_supplicant( 1304): WPS: * Manufacturer
D/wpa_supplicant( 1304): WPS: * Model Name
D/wpa_supplicant( 1304): WPS: * Model Number
D/wpa_supplicant( 1304): WPS: * Device Name
D/wpa_supplicant( 1304): WPS: * Version2 (0x20)
D/wpa_supplicant( 1304): P2P: * P2P IE header
D/wpa_supplicant( 1304): P2P: * Capability dev=25 group=00
D/wpa_supplicant( 1304): P2P: * Listen Channel: Regulatory Class 81 Channel 6
D/wpa_supplicant( 1304): wlan0: Limit manual scan to specified channels
D/wpa_supplicant( 1304): wlan0: Add radio work 'scan'@0x7f8301c380
D/wpa_supplicant( 1304): wlan0: First radio work item in the queue - schedule start immediately
D/wpa_supplicant( 1304): wlan0: Starting radio work 'scan'@0x7f8301c380 after 0.000038 second wait
D/wpa_supplicant( 1304): wlan0: nl80211: scan request
D/wpa_supplicant( 1304): nl80211: Scan SSID - hexdump(len=0): [NULL]
D/wpa_supplicant( 1304): nl80211: Scan extra IEs - hexdump(len=144): dd 7b 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 42 88 10 47 00 10 bb 1b cb a2 68 df 59 a1 ac d5 06 f8 7d 60 ba 04 10 54 00 08 00 0a 00 50 f2 04 00 05 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 04 61 6c 70 73 10 23 00 03 50 39 32 10 24 00 03 50 39 32 10 11 00 0c 66 75 6c 6c 5f 70 39 32 73 5f 68 64 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 43 4e 04 51 06
D/wpa_supplicant( 1304): nl80211: Scan frequency 2427 MHz
D/wpa_supplicant( 1304): Scan requested (ret=0) - scan timeout 30 seconds
D/wpa_supplicant( 1304): nl80211: Event message available
D/wpa_supplicant( 1304): nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
D/wpa_supplicant( 1304): wlan0: nl80211: Scan trigger
D/wpa_supplicant( 1304): wlan0: Event SCAN_STARTED (49) received
D/wpa_supplicant( 1304): wlan0: Own scan request started a scan in 0.000104 seconds
D/wpa_supplicant( 1304): CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_783-2\x00
D/[BT3.0+HS]PAL( 545): == chip_reset_fd is set ==
D/[BT3.0+HS]PAL( 545):
D/[BT3.0+HS]PAL( 545): Recv Netlink Packet [212:00000011:00:0:0] [33:]
D/[BT3.0+HS]PAL( 545):
D/[BT3.0+HS]PAL( 545): Unknown command from wifi driver
D/[BT3.0+HS]PAL( 545):
D/WifiHW ( 783): [1] get event: IFNAME=wlan0 <3>CTRL-EVENT-SCAN-STARTED
D/WifiHW ( 783): [2] get event: IFNAME=wlan0 CTRL-EVENT-SCAN-STARTED
D/WifiHW ( 783): enter -->wifi_wait_on_socket buflen=2048
D/WifiHW ( 783): enter -->wifi_ctrl_recv
D/WifiHW ( 783): leave --> reply=OK
D/WifiHW ( 783):
D/WifiHW ( 783): enter -->wifi_send_command cmd=IFNAME=wlan0 SIGNAL_POLL
D/wpa_supplicant( 1304): wlan0: Control interface command 'SIGNAL_POLL'
D/WifiHW ( 783): leave --> reply=RSSI=-20
D/WifiHW ( 783): LINKSPEED=135
D/WifiHW ( 783): NOISE=9999
D/WifiHW ( 783): FREQUENCY=2427
D/WifiHW ( 783):
I/WifiStateMachine( 783): fetchRssiLinkSpeedAndFrequencyNative, newRssi:-20, newLinkSpeed:135, SSID:"test"
D/WifiStateMachine( 783): mLastSignalLevel:4, newSignalLevel:4
D/dynaservice( 5065): SaveParamToFile(40): uiResult:1