connect函数崩溃

出错日志:

D/dynaservice( 5061): dc_ssl_init(188):	.
【---------------connect函数崩溃---------------】
F/libc    ( 5061): Fatal signal 11 (SIGSEGV), code 1, fault addr 0x353a32300a0d2d in tid 5061 (htfsk)
D/AEE/AED (  284): $===AEE===AEE===AEE===$
D/AEE/AED (  284): p 0 poll events 1 revents 0
D/AEE/AED (  284): not know revents:0
D/AEE/AED (  284): p 1 poll events 1 revents 0
D/AEE/AED (  284): not know revents:0
D/AEE/AED (  284): p 2 poll events 1 revents 1
D/AEE/AED (  284): aed_main_fork_worker: generator 0x7f8141a0e0, worker 0x7ff694f9d0, recv_fd 14
D/AEE/AED (  284): p 3 poll events 1 revents 0
D/AEE/AED (  284): not know revents:0
I/AEE/AED ( 5064): handle_request(14)
I/AEE/AED ( 5064): check process 5061 name:htfsk
I/AEE/AED ( 5064): tid 5061 abort msg address is:0x0000000000000000 si_code is:1 (request from 5061:0)
I/AEE/AED ( 5064): BOOM: pid=5061 uid=0 gid=0 tid=5061
I/AEE/AED ( 5064): [OnPurpose Redunant in void preset_info(aed_report_record*, int, int)] pid: 5061, tid: 5061, name: htfsk  >>> /system/bin/htfsk <<<
I/AEE/AED ( 5064): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
W/NativeCrashListener(  783): Couldn't find ProcessRecord for pid 5061
I/AEE/AED ( 5064): Build fingerprint: 'alps/full_p92s_hd/p92s_hd:5.1/LMY47D/1507724262:user/test-keys'
I/AEE/AED ( 5064): Revision: '0'
I/AEE/AED ( 5064): ABI: 'arm64'
I/AEE/AED ( 5064): pid: 5061, tid: 5061, name: htfsk  >>> /system/bin/htfsk <<<
I/AEE/AED ( 5064): signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x353a32300a0d2d
E/AEE/AED ( 5064): AM write failure (32 / Broken pipe)
E/AEE/LIBAEE( 5064): aee_try_get_word: read:5061 addr:0x526761563136674d ret:-1, 5
E/AEE/LIBAEE( 5064): aee_try_get_word: read:5061 addr:0x5267615631366751 ret:-1, 5
I/AEE/AED ( 5064):     x0   0000007f8ac2d414  x1   000000000000001c  x2   0000007fc8449a5c  x3   0000007f8bc99000
I/AEE/AED ( 5064):     x4   0000007f8bc9f728  x5   000000000000001c  x6   0000000000800000  x7   000000000000001b
I/AEE/AED ( 5064):     x8   0000000000000000  x9   0000007fc8449c88  x10  0000007fc8449c88  x11  0000007f8ac2d430
I/AEE/AED ( 5064):     x12  0000000000000028  x13  33353a32300a0d2d  x14  0000007fc84483cc  x15  0000000000000001
I/AEE/AED ( 5064):     x16  0000007f8ac3df90  x17  0000007f8bc35590  x18  0000007f8bc9f730  x19  0000000000000010
I/AEE/AED ( 5064):     x20  0000007fc8449b18  x21  000000000000000d  x22  0000005590e3a000  x23  0000007fc8449b97
I/AEE/AED ( 5064):     x24  0000007fc8449bac  x25  0000000000000000  x26  0000000000000000  x27  0000000000000000
I/AEE/AED ( 5064):     x28  0000000000000000  x29  0000007fc8449a40  x30  0000007f8bc355d0
I/AEE/AED ( 5064):     sp   0000007fc8449a40  pc   0000007f8bc35520  pstate 0000000080000000
I/AEE/AED ( 5064): 
I/AEE/AED ( 5064): backtrace:
I/AEE/AED ( 5064):     #00 pc 0000000000060520  /system/lib64/libc.so (__findenv+52)
I/AEE/AED ( 5064):     #01 pc 00000000000605cc  /system/lib64/libc.so (getenv+60)
I/AEE/AED ( 5064):     #02 pc 0000000000000c34  /system/lib64/libnetd_client.so (FwmarkClient::shouldSetFwmark(int)+28)
I/AEE/AED ( 5064):     #03 pc 0000000000000f8c  /system/lib64/libnetd_client.so
I/AEE/AED ( 5064):     #04 pc 000000000001b534  /system/lib64/libc.so (connect+16)
I/AEE/AED ( 5064):     #05 pc 000000000000807c  /system/bin/htfsk
I/AEE/AED ( 5064):     #06 pc 00000000000102a8  /system/bin/htfsk
I/AEE/AED ( 5064):     #07 pc 00000000000172e8  /system/bin/htfsk
I/AEE/AED ( 5064):     #08 pc 526761563136674d  
I/AEE/AED ( 5064): 
I/AEE/AED ( 5064): Tombstone written to: /data/tombstones/tombstone_00
V/AEE/AED ( 5064): dashboard_record_update() : rec->module = /system/bin/htfsk 
D/AEE/AED ( 5064): Duplicated exception, cnt = 9 
D/AEE/AED ( 5064): Last exception time: 1513567421 
D/AEE/AED ( 5064): cur time: 1513567596 
D/AEE/AED ( 5064): Skip for Exp level'0'
D/AEE/AED (  284): $===AEE===AEE===AEE===$
D/AEE/AED (  284): p 0 poll events 1 revents 0
D/AEE/AED (  284): not know revents:0
D/AEE/AED (  284): p 1 poll events 1 revents 0
D/AEE/AED (  284): not know revents:0
D/AEE/AED (  284): p 2 poll events 1 revents 0
D/AEE/AED (  284): not know revents:0
D/AEE/AED (  284): p 3 poll events 1 revents 0
D/AEE/AED (  284): not know revents:0
V/SettingsInterface(  783):  from settings cache , name = dropbox:SYSTEM_TOMBSTONE , value = null
I/BootReceiver(  783): Copying /data/tombstones/tombstone_00 to DropBox (SYSTEM_TOMBSTONE)
V/SettingsInterface(  783):  from settings cache , name = dropbox:SYSTEM_TOMBSTONE , value = null
V/SettingsInterface(  783):  from settings cache , name = dropbox_age_seconds , value = null
V/SettingsInterface(  783):  from settings cache , name = dropbox_max_files , value = null
V/SettingsInterface(  783):  from settings cache , name = dropbox_quota_percent , value = null
V/SettingsInterface(  783):  from settings cache , name = dropbox_reserve_percent , value = null
V/SettingsInterface(  783):  from settings cache , name = dropbox_quota_kb , value = null
V/ActivityManager(  783): Broadcast: Intent { act=android.intent.action.DROPBOX_ENTRY_ADDED flg=0x10 (has extras) } ordered=false userid=0 callerApp=ProcessRecord{1d2e737a 783:system/1000}
D/WifiHW  (  783): enter -->wifi_send_command cmd=IFNAME=wlan0 SCAN TYPE=ONLY freq=2427
D/wpa_supplicant( 1304): wlan0: Control interface command 'SCAN TYPE=ONLY freq=2427'
D/wpa_supplicant( 1304): hw.num_modes = 3
D/wpa_supplicant( 1304): wlan0: Setting scan request: 0.000000 sec
D/wpa_supplicant( 1304): wlan0: Starting AP scan for wildcard SSID
D/wpa_supplicant( 1304): WPS: Building WPS IE for Probe Request
D/wpa_supplicant( 1304): WPS:  * Version (hardcoded 0x10)
D/wpa_supplicant( 1304): WPS:  * Request Type
D/wpa_supplicant( 1304): WPS:  * Config Methods (4288)
D/wpa_supplicant( 1304): WPS:  * UUID-E
D/wpa_supplicant( 1304): WPS:  * Primary Device Type
D/wpa_supplicant( 1304): WPS:  * RF Bands (3)
D/wpa_supplicant( 1304): WPS:  * Association State
D/wpa_supplicant( 1304): WPS:  * Configuration Error (0)
D/wpa_supplicant( 1304): WPS:  * Device Password ID (0)
D/wpa_supplicant( 1304): WPS:  * Manufacturer
D/wpa_supplicant( 1304): WPS:  * Model Name
D/wpa_supplicant( 1304): WPS:  * Model Number
D/wpa_supplicant( 1304): WPS:  * Device Name
D/wpa_supplicant( 1304): WPS:  * Version2 (0x20)
D/wpa_supplicant( 1304): P2P: * P2P IE header
D/wpa_supplicant( 1304): P2P: * Capability dev=25 group=00
D/wpa_supplicant( 1304): P2P: * Listen Channel: Regulatory Class 81 Channel 6
D/wpa_supplicant( 1304): wlan0: Limit manual scan to specified channels
D/wpa_supplicant( 1304): wlan0: Add radio work 'scan'@0x7f8301c380
D/wpa_supplicant( 1304): wlan0: First radio work item in the queue - schedule start immediately
D/wpa_supplicant( 1304): wlan0: Starting radio work 'scan'@0x7f8301c380 after 0.000038 second wait
D/wpa_supplicant( 1304): wlan0: nl80211: scan request
D/wpa_supplicant( 1304): nl80211: Scan SSID - hexdump(len=0): [NULL]
D/wpa_supplicant( 1304): nl80211: Scan extra IEs - hexdump(len=144): dd 7b 00 50 f2 04 10 4a 00 01 10 10 3a 00 01 00 10 08 00 02 42 88 10 47 00 10 bb 1b cb a2 68 df 59 a1 ac d5 06 f8 7d 60 ba 04 10 54 00 08 00 0a 00 50 f2 04 00 05 10 3c 00 01 03 10 02 00 02 00 00 10 09 00 02 00 00 10 12 00 02 00 00 10 21 00 04 61 6c 70 73 10 23 00 03 50 39 32 10 24 00 03 50 39 32 10 11 00 0c 66 75 6c 6c 5f 70 39 32 73 5f 68 64 10 49 00 06 00 37 2a 00 01 20 dd 11 50 6f 9a 09 02 02 00 25 00 06 05 00 43 4e 04 51 06
D/wpa_supplicant( 1304): nl80211: Scan frequency 2427 MHz
D/wpa_supplicant( 1304): Scan requested (ret=0) - scan timeout 30 seconds
D/wpa_supplicant( 1304): nl80211: Event message available
D/wpa_supplicant( 1304): nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
D/wpa_supplicant( 1304): wlan0: nl80211: Scan trigger
D/wpa_supplicant( 1304): wlan0: Event SCAN_STARTED (49) received
D/wpa_supplicant( 1304): wlan0: Own scan request started a scan in 0.000104 seconds
D/wpa_supplicant( 1304): CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_783-2\x00
D/[BT3.0+HS]PAL(  545): == chip_reset_fd is set ==
D/[BT3.0+HS]PAL(  545): 
D/[BT3.0+HS]PAL(  545): Recv Netlink Packet [212:00000011:00:0:0] [33:]
D/[BT3.0+HS]PAL(  545): 
D/[BT3.0+HS]PAL(  545): Unknown command from wifi driver
D/[BT3.0+HS]PAL(  545): 
D/WifiHW  (  783): [1] get event: IFNAME=wlan0 <3>CTRL-EVENT-SCAN-STARTED 
D/WifiHW  (  783): [2] get event: IFNAME=wlan0 CTRL-EVENT-SCAN-STARTED 
D/WifiHW  (  783): enter -->wifi_wait_on_socket buflen=2048
D/WifiHW  (  783): enter -->wifi_ctrl_recv
D/WifiHW  (  783): leave --> reply=OK
D/WifiHW  (  783): 
D/WifiHW  (  783): enter -->wifi_send_command cmd=IFNAME=wlan0 SIGNAL_POLL
D/wpa_supplicant( 1304): wlan0: Control interface command 'SIGNAL_POLL'
D/WifiHW  (  783): leave --> reply=RSSI=-20
D/WifiHW  (  783): LINKSPEED=135
D/WifiHW  (  783): NOISE=9999
D/WifiHW  (  783): FREQUENCY=2427
D/WifiHW  (  783): 
I/WifiStateMachine(  783): fetchRssiLinkSpeedAndFrequencyNative, newRssi:-20, newLinkSpeed:135, SSID:"test"
D/WifiStateMachine(  783): mLastSignalLevel:4, newSignalLevel:4
D/dynaservice( 5065): SaveParamToFile(40):	uiResult:1

你可能感兴趣的:(C++/C,android)