We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
红米5 plus android 7.12
日志如下: 021-06-13 07:01:27.541 5638-5638/? D/HookLog: environments: test_key=sanfengandroid 2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register VMDebug result: 1 2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register Throwable result: 1 2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register Throwable result: 1 2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register UNIXProcess result: 1 2021-06-13 07:01:27.543 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2" 2021-06-13 07:01:27.543 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322 2021-06-13 07:01:27.543 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0" 2021-06-13 07:01:27.543 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46 2021-06-13 07:01:27.544 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/data/com.zilia.john/shared_prefs/CustomizeApps.xml, mode: 0\n" 2021-06-13 07:01:27.545 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.force_rtl, value: 0" 2021-06-13 07:01:27.546 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.548 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.atrace.tags.enableflags, value: 0" 2021-06-13 07:01:27.548 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.debuggable, value: 0" 2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter, mode: 0\n" 2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter/cache, mode: 0\n" 2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter, mode: 0\n" 2021-06-13 07:01:27.550 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter/code_cache, mode: 0\n" 2021-06-13 07:01:27.550 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.gfx.driver.0, value: " 2021-06-13 07:01:27.551 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2" 2021-06-13 07:01:27.551 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322 2021-06-13 07:01:27.551 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0" 2021-06-13 07:01:27.551 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46 2021-06-13 07:01:27.551 5638-5663/? V/HookLog: [Monitor __system_property_get] "name: debug.egl.profiler, value: " 2021-06-13 07:01:27.552 5638-5663/? V/HookLog: [Monitor __system_property_get] "name: debug.prerotation.disable, value: " 2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999" 2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.559 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.559 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY' 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000037 second wait 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL] 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: nl80211: Event message available 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000131 seconds 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Event message available 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000828 seconds 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes) 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 401 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24 2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00 2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.002999 seconds 2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0 2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS' 2021-06-13 07:01:27.565 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383 2021-06-13 07:01:27.566 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385 2021-06-13 07:01:27.566 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17 2021-06-13 07:01:27.567 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS' 2021-06-13 07:01:27.567 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383 2021-06-13 07:01:27.568 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2" 2021-06-13 07:01:27.568 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322 2021-06-13 07:01:27.568 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0" 2021-06-13 07:01:27.568 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46 2021-06-13 07:01:27.568 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385 2021-06-13 07:01:27.570 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899 2021-06-13 07:01:27.571 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000b6000000 2021-06-13 07:01:27.572 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899 2021-06-13 07:01:27.573 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.text.PrecomputedText$Params" 2021-06-13 07:01:27.574 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000b6000000 2021-06-13 07:01:27.574 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861 2021-06-13 07:01:27.576 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861 2021-06-13 07:01:27.577 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326 2021-06-13 07:01:27.578 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326 2021-06-13 07:01:27.578 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0 2021-06-13 07:01:27.579 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0 2021-06-13 07:01:27.580 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.second-display.pkg, value: " 2021-06-13 07:01:27.581 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/framework-res, mode: 0\n" 2021-06-13 07:01:27.582 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/icons, mode: 0\n" 2021-06-13 07:01:27.582 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection========== 2021-06-13 07:01:27.582 5638-5638/? V/HookLog: [Monitor open] "path /system/media/theme/default/icons flags: 0" 2021-06-13 07:01:27.582 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322 2021-06-13 07:01:27.583 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /system/media/theme/default/icons, flags: 0, mode: 0" 2021-06-13 07:01:27.583 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46 2021-06-13 07:01:27.583 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0 2021-06-13 07:01:27.583 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already 2021-06-13 07:01:27.584 5638-5643/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2" 2021-06-13 07:01:27.585 5638-5643/? V/HookLog: Monitor: syscall invoke number: 322 2021-06-13 07:01:27.585 5638-5643/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0" 2021-06-13 07:01:27.585 5638-5643/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 47 2021-06-13 07:01:27.598 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/lockscreen, mode: 0\n" 2021-06-13 07:01:27.599 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/framework-miui-res, mode: 0\n" 2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.core-1.apk, mode: 0\n" 2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.core-2.apk, mode: 0\n" 2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.system-1.apk, mode: 0\n" 2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.system-2.apk, mode: 0\n" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.force_rtl, value: 0" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.607 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.util.MemoryIntArray" 2021-06-13 07:01:27.607 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.os.ParcelFileDescriptor" 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY' 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000039 second wait 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL] 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: nl80211: Event message available 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000116 seconds 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24 2021-06-13 07:01:27.611 1577-1619/? I/Timeline: Timeline: App_transition_stopped time:98718 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Event message available 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000805 seconds 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes) 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 402 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24 2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00 2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.002926 seconds 2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0 2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS' 2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383 2021-06-13 07:01:27.614 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.graphics.Insets" 2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] send(AppTransitionFinishedEvent) 2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] -> ForcedResizableInfoActivityController [0x94b3e6f, P1] onBusEvent(AppTransitionFinishedEvent) 2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] onBusEvent(AppTransitionFinishedEvent) duration: 17 microseconds, avg: 25 2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] send(AppTransitionFinishedEvent) 2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] -> ForcedResizableInfoActivityController [0x94b3e6f, P1] onBusEvent(AppTransitionFinishedEvent) 2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] onBusEvent(AppTransitionFinishedEvent) duration: 5 microseconds, avg: 23 2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385 2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS' 2021-06-13 07:01:27.615 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17 2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383 2021-06-13 07:01:27.616 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385 2021-06-13 07:01:27.617 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: interceptor.debug.on, value: " 2021-06-13 07:01:27.617 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: interceptor.enabled, value: " 2021-06-13 07:01:27.618 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2" 2021-06-13 07:01:27.618 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322 2021-06-13 07:01:27.618 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0" 2021-06-13 07:01:27.618 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 48 2021-06-13 07:01:27.618 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899 2021-06-13 07:01:27.619 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000bb000000 2021-06-13 07:01:27.620 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899 2021-06-13 07:01:27.621 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000bb000000 2021-06-13 07:01:27.621 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v25.Android_Os_Process_class" 2021-06-13 07:01:27.621 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v25.Android_Os_Process_class" 2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor getenv] "Monitor: getenv name: ANDROID_DATA" 2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor open] "path /data/dalvik-cache/arm/system@framework@volley.jar@classes.dex.flock flags: 66" 2021-06-13 07:01:27.622 5638-5664/? V/HookLog: Monitor: syscall invoke number: 322 2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /data/dalvik-cache/arm/system@framework@volley.jar@classes.dex.flock, flags: 66, mode: 438" 2021-06-13 07:01:27.622 5638-5664/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: -1 2021-06-13 07:01:27.622 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v24.Android_Os_Process_class" 2021-06-13 07:01:27.622 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v24.Android_Os_Process_class" 2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor android_dlopen_ext] "filename: /system/framework/oat/arm/volley.odex, flag: 0x0, extinfo: 0xe00dd0e0" 2021-06-13 07:01:27.623 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
--------- beginning of crash
2021-06-13 07:01:27.623 5638-5664/? A/libc: Fatal signal 11 (SIGSEGV), code 1, fault addr 0x51 in tid 5664 (interceptor-thr) 2021-06-13 07:01:27.623 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v23.Android_Os_Process_class" 2021-06-13 07:01:27.623 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v23.Android_Os_Process_class" 2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v22.Android_Os_Process_class" 2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v22.Android_Os_Process_class" 2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v21.Android_Os_Process_class" 2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v21.Android_Os_Process_class" 2021-06-13 07:01:27.624 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861 2021-06-13 07:01:27.625 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v20.Android_Os_Process_class" 2021-06-13 07:01:27.625 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v20.Android_Os_Process_class" 2021-06-13 07:01:27.625 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326 2021-06-13 07:01:27.626 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326 2021-06-13 07:01:27.626 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0 2021-06-13 07:01:27.627 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0 2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection========== 2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0 2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY' 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000038 second wait 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL] 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Event message available 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000100 seconds 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Event message available 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000258 seconds 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes) 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 403 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.001427 seconds 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS' 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS' 2021-06-13 07:01:27.661 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383 2021-06-13 07:01:27.662 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385 2021-06-13 07:01:27.663 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17 2021-06-13 07:01:27.663 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385 2021-06-13 07:01:27.665 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899 2021-06-13 07:01:27.666 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000c0000000 2021-06-13 07:01:27.666 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899 2021-06-13 07:01:27.667 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000c0000000 2021-06-13 07:01:27.668 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861 2021-06-13 07:01:27.669 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861 2021-06-13 07:01:27.670 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326 2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326 2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0 2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0 2021-06-13 07:01:27.674 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection========== 2021-06-13 07:01:27.674 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0 2021-06-13 07:01:27.675 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already 2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** 2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: Build fingerprint: 'xiaomi/vince/vince:7.1.2/N2G47H/V9.0.4.0.NEGCNEI:user/release-keys' 2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: Revision: '0' 2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: ABI: 'arm' 2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: pid: 5638, tid: 5664, name: interceptor-thr >>> com.sanfengandroid.datafilter <<< 2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x51 2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r0 00000051 r1 e00dd008 r2 00000003 r3 00039000 2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r4 e821e008 r5 00000025 r6 00000000 r7 e00dd0c8 2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r8 e017b000 r9 e7b50c63 sl 00000000 fp 00000001 2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: ip e00dd0c8 sp e00dd008 lr e670fb2b pc e670fb44 cpsr 000f0030 2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: backtrace: 2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #00 pc 00009b44 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so 2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #1 pc 00009b27 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so 2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #2 pc 00009295 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so 2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #3 pc 00009277 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so 2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #4 pc 0000b59f /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so (call_namespace_function+418) 2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #5 pc 0000392f /data/app/com.sanfengandroid.datafilter-2/lib/arm/libhookh.so (offset 0x11000) 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY' 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000037 second wait 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL] 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Event message available 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received
The text was updated successfully, but these errors were encountered:
再测,oppo 7.1.1 正常使用,完美
Sorry, something went wrong.
No branches or pull requests
红米5 plus
android 7.12
日志如下:
021-06-13 07:01:27.541 5638-5638/? D/HookLog: environments: test_key=sanfengandroid
2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register VMDebug result: 1
2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register Throwable result: 1
2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register Throwable result: 1
2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register UNIXProcess result: 1
2021-06-13 07:01:27.543 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.543 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.543 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.543 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46
2021-06-13 07:01:27.544 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/data/com.zilia.john/shared_prefs/CustomizeApps.xml, mode: 0\n"
2021-06-13 07:01:27.545 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.force_rtl, value: 0"
2021-06-13 07:01:27.546 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.548 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.atrace.tags.enableflags, value: 0"
2021-06-13 07:01:27.548 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.debuggable, value: 0"
2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter, mode: 0\n"
2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter/cache, mode: 0\n"
2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter, mode: 0\n"
2021-06-13 07:01:27.550 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter/code_cache, mode: 0\n"
2021-06-13 07:01:27.550 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.gfx.driver.0, value: "
2021-06-13 07:01:27.551 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.551 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.551 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.551 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46
2021-06-13 07:01:27.551 5638-5663/? V/HookLog: [Monitor __system_property_get] "name: debug.egl.profiler, value: "
2021-06-13 07:01:27.552 5638-5663/? V/HookLog: [Monitor __system_property_get] "name: debug.prerotation.disable, value: "
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999"
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.559 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.559 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY'
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000037 second wait
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL]
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000131 seconds
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000828 seconds
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes)
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 401
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.002999 seconds
2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0
2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.565 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.566 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.566 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17
2021-06-13 07:01:27.567 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.567 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.568 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.568 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.568 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.568 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46
2021-06-13 07:01:27.568 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.570 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.571 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000b6000000
2021-06-13 07:01:27.572 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.573 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.text.PrecomputedText$Params"
2021-06-13 07:01:27.574 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000b6000000
2021-06-13 07:01:27.574 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.576 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.577 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.578 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.578 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.579 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.580 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.second-display.pkg, value: "
2021-06-13 07:01:27.581 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/framework-res, mode: 0\n"
2021-06-13 07:01:27.582 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/icons, mode: 0\n"
2021-06-13 07:01:27.582 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection==========
2021-06-13 07:01:27.582 5638-5638/? V/HookLog: [Monitor open] "path /system/media/theme/default/icons flags: 0"
2021-06-13 07:01:27.582 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.583 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /system/media/theme/default/icons, flags: 0, mode: 0"
2021-06-13 07:01:27.583 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46
2021-06-13 07:01:27.583 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0
2021-06-13 07:01:27.583 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already
2021-06-13 07:01:27.584 5638-5643/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.585 5638-5643/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.585 5638-5643/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.585 5638-5643/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 47
2021-06-13 07:01:27.598 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/lockscreen, mode: 0\n"
2021-06-13 07:01:27.599 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/framework-miui-res, mode: 0\n"
2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.core-1.apk, mode: 0\n"
2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.core-2.apk, mode: 0\n"
2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.system-1.apk, mode: 0\n"
2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.system-2.apk, mode: 0\n"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.force_rtl, value: 0"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.607 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.util.MemoryIntArray"
2021-06-13 07:01:27.607 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.os.ParcelFileDescriptor"
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY'
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000039 second wait
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL]
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000116 seconds
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.611 1577-1619/? I/Timeline: Timeline: App_transition_stopped time:98718
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000805 seconds
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes)
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 402
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.002926 seconds
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.614 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.graphics.Insets"
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] send(AppTransitionFinishedEvent)
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] -> ForcedResizableInfoActivityController [0x94b3e6f, P1] onBusEvent(AppTransitionFinishedEvent)
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] onBusEvent(AppTransitionFinishedEvent) duration: 17 microseconds, avg: 25
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] send(AppTransitionFinishedEvent)
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] -> ForcedResizableInfoActivityController [0x94b3e6f, P1] onBusEvent(AppTransitionFinishedEvent)
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] onBusEvent(AppTransitionFinishedEvent) duration: 5 microseconds, avg: 23
2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.615 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17
2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.616 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.617 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: interceptor.debug.on, value: "
2021-06-13 07:01:27.617 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: interceptor.enabled, value: "
2021-06-13 07:01:27.618 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.618 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.618 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.618 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 48
2021-06-13 07:01:27.618 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.619 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000bb000000
2021-06-13 07:01:27.620 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.621 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000bb000000
2021-06-13 07:01:27.621 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v25.Android_Os_Process_class"
2021-06-13 07:01:27.621 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v25.Android_Os_Process_class"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor getenv] "Monitor: getenv name: ANDROID_DATA"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor open] "path /data/dalvik-cache/arm/system@framework@volley.jar@classes.dex.flock flags: 66"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /data/dalvik-cache/arm/system@framework@volley.jar@classes.dex.flock, flags: 66, mode: 438"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: -1
2021-06-13 07:01:27.622 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v24.Android_Os_Process_class"
2021-06-13 07:01:27.622 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v24.Android_Os_Process_class"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor android_dlopen_ext] "filename: /system/framework/oat/arm/volley.odex, flag: 0x0, extinfo: 0xe00dd0e0"
2021-06-13 07:01:27.623 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.623 5638-5664/? A/libc: Fatal signal 11 (SIGSEGV), code 1, fault addr 0x51 in tid 5664 (interceptor-thr)
2021-06-13 07:01:27.623 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v23.Android_Os_Process_class"
2021-06-13 07:01:27.623 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v23.Android_Os_Process_class"
2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v22.Android_Os_Process_class"
2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v22.Android_Os_Process_class"
2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v21.Android_Os_Process_class"
2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v21.Android_Os_Process_class"
2021-06-13 07:01:27.624 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.625 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v20.Android_Os_Process_class"
2021-06-13 07:01:27.625 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v20.Android_Os_Process_class"
2021-06-13 07:01:27.625 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.626 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.626 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.627 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection==========
2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0
2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY'
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000038 second wait
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL]
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000100 seconds
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000258 seconds
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes)
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 403
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.001427 seconds
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.661 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.662 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.663 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17
2021-06-13 07:01:27.663 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.665 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.666 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000c0000000
2021-06-13 07:01:27.666 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.667 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000c0000000
2021-06-13 07:01:27.668 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.669 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.670 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.674 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection==========
2021-06-13 07:01:27.674 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0
2021-06-13 07:01:27.675 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already
2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: Build fingerprint: 'xiaomi/vince/vince:7.1.2/N2G47H/V9.0.4.0.NEGCNEI:user/release-keys'
2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: Revision: '0'
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: ABI: 'arm'
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: pid: 5638, tid: 5664, name: interceptor-thr >>> com.sanfengandroid.datafilter <<<
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x51
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r0 00000051 r1 e00dd008 r2 00000003 r3 00039000
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r4 e821e008 r5 00000025 r6 00000000 r7 e00dd0c8
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r8 e017b000 r9 e7b50c63 sl 00000000 fp 00000001
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: ip e00dd0c8 sp e00dd008 lr e670fb2b pc e670fb44 cpsr 000f0030
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: backtrace:
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #00 pc 00009b44 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #1 pc 00009b27 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #2 pc 00009295 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #3 pc 00009277 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #4 pc 0000b59f /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so (call_namespace_function+418)
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #5 pc 0000392f /data/app/com.sanfengandroid.datafilter-2/lib/arm/libhookh.so (offset 0x11000)
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY'
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000037 second wait
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL]
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received
The text was updated successfully, but these errors were encountered: