-
Notifications
You must be signed in to change notification settings - Fork 194
Description
红米5 plus
android 7.12
日志如下:
021-06-13 07:01:27.541 5638-5638/? D/HookLog: environments: test_key=sanfengandroid
2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register VMDebug result: 1
2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register Throwable result: 1
2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register Throwable result: 1
2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register UNIXProcess result: 1
2021-06-13 07:01:27.543 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.543 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.543 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.543 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46
2021-06-13 07:01:27.544 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/data/com.zilia.john/shared_prefs/CustomizeApps.xml, mode: 0\n"
2021-06-13 07:01:27.545 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.force_rtl, value: 0"
2021-06-13 07:01:27.546 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.548 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.atrace.tags.enableflags, value: 0"
2021-06-13 07:01:27.548 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.debuggable, value: 0"
2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter, mode: 0\n"
2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter/cache, mode: 0\n"
2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter, mode: 0\n"
2021-06-13 07:01:27.550 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter/code_cache, mode: 0\n"
2021-06-13 07:01:27.550 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.gfx.driver.0, value: "
2021-06-13 07:01:27.551 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.551 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.551 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.551 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46
2021-06-13 07:01:27.551 5638-5663/? V/HookLog: [Monitor __system_property_get] "name: debug.egl.profiler, value: "
2021-06-13 07:01:27.552 5638-5663/? V/HookLog: [Monitor __system_property_get] "name: debug.prerotation.disable, value: "
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999"
2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.559 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.559 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY'
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000037 second wait
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL]
2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000131 seconds
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000828 seconds
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes)
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 401
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.002999 seconds
2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0
2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.565 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.566 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.566 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17
2021-06-13 07:01:27.567 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.567 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.568 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.568 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.568 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.568 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46
2021-06-13 07:01:27.568 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.570 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.571 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000b6000000
2021-06-13 07:01:27.572 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.573 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.text.PrecomputedText$Params"
2021-06-13 07:01:27.574 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000b6000000
2021-06-13 07:01:27.574 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.576 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.577 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.578 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.578 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.579 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.580 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.second-display.pkg, value: "
2021-06-13 07:01:27.581 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/framework-res, mode: 0\n"
2021-06-13 07:01:27.582 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/icons, mode: 0\n"
2021-06-13 07:01:27.582 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection==========
2021-06-13 07:01:27.582 5638-5638/? V/HookLog: [Monitor open] "path /system/media/theme/default/icons flags: 0"
2021-06-13 07:01:27.582 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.583 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /system/media/theme/default/icons, flags: 0, mode: 0"
2021-06-13 07:01:27.583 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46
2021-06-13 07:01:27.583 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0
2021-06-13 07:01:27.583 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already
2021-06-13 07:01:27.584 5638-5643/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.585 5638-5643/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.585 5638-5643/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.585 5638-5643/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 47
2021-06-13 07:01:27.598 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/lockscreen, mode: 0\n"
2021-06-13 07:01:27.599 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/framework-miui-res, mode: 0\n"
2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.core-1.apk, mode: 0\n"
2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.core-2.apk, mode: 0\n"
2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.system-1.apk, mode: 0\n"
2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.system-2.apk, mode: 0\n"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: debug.force_rtl, value: 0"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mnc, value: 9999"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: ro.miui.mcc, value: 9460"
2021-06-13 07:01:27.607 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.util.MemoryIntArray"
2021-06-13 07:01:27.607 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.os.ParcelFileDescriptor"
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY'
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000039 second wait
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL]
2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000116 seconds
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.611 1577-1619/? I/Timeline: Timeline: App_transition_stopped time:98718
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000805 seconds
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes)
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 402
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.002926 seconds
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.614 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.graphics.Insets"
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] send(AppTransitionFinishedEvent)
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] -> ForcedResizableInfoActivityController [0x94b3e6f, P1] onBusEvent(AppTransitionFinishedEvent)
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] onBusEvent(AppTransitionFinishedEvent) duration: 17 microseconds, avg: 25
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] send(AppTransitionFinishedEvent)
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] -> ForcedResizableInfoActivityController [0x94b3e6f, P1] onBusEvent(AppTransitionFinishedEvent)
2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] onBusEvent(AppTransitionFinishedEvent) duration: 5 microseconds, avg: 23
2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.615 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17
2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.616 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.617 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: interceptor.debug.on, value: "
2021-06-13 07:01:27.617 5638-5638/? V/HookLog: [Monitor __system_property_get] "name: interceptor.enabled, value: "
2021-06-13 07:01:27.618 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2"
2021-06-13 07:01:27.618 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.618 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0"
2021-06-13 07:01:27.618 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 48
2021-06-13 07:01:27.618 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.619 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000bb000000
2021-06-13 07:01:27.620 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.621 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000bb000000
2021-06-13 07:01:27.621 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v25.Android_Os_Process_class"
2021-06-13 07:01:27.621 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v25.Android_Os_Process_class"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor getenv] "Monitor: getenv name: ANDROID_DATA"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor open] "path /data/dalvik-cache/arm/system@framework@[email protected] flags: 66"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: Monitor: syscall invoke number: 322
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /data/dalvik-cache/arm/system@framework@[email protected], flags: 66, mode: 438"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: -1
2021-06-13 07:01:27.622 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v24.Android_Os_Process_class"
2021-06-13 07:01:27.622 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v24.Android_Os_Process_class"
2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor android_dlopen_ext] "filename: /system/framework/oat/arm/volley.odex, flag: 0x0, extinfo: 0xe00dd0e0"
2021-06-13 07:01:27.623 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
--------- beginning of crash
2021-06-13 07:01:27.623 5638-5664/? A/libc: Fatal signal 11 (SIGSEGV), code 1, fault addr 0x51 in tid 5664 (interceptor-thr)
2021-06-13 07:01:27.623 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v23.Android_Os_Process_class"
2021-06-13 07:01:27.623 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v23.Android_Os_Process_class"
2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v22.Android_Os_Process_class"
2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v22.Android_Os_Process_class"
2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v21.Android_Os_Process_class"
2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v21.Android_Os_Process_class"
2021-06-13 07:01:27.624 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.625 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v20.Android_Os_Process_class"
2021-06-13 07:01:27.625 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v20.Android_Os_Process_class"
2021-06-13 07:01:27.625 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.626 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.626 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.627 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection==========
2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0
2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY'
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000038 second wait
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL]
2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000100 seconds
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000258 seconds
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes)
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated
2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 403
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.001427 seconds
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS'
2021-06-13 07:01:27.661 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383
2021-06-13 07:01:27.662 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.663 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17
2021-06-13 07:01:27.663 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385
2021-06-13 07:01:27.665 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.666 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000c0000000
2021-06-13 07:01:27.666 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899
2021-06-13 07:01:27.667 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000c0000000
2021-06-13 07:01:27.668 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.669 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861
2021-06-13 07:01:27.670 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326
2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0
2021-06-13 07:01:27.674 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection==========
2021-06-13 07:01:27.674 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0
2021-06-13 07:01:27.675 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already
2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: Build fingerprint: 'xiaomi/vince/vince:7.1.2/N2G47H/V9.0.4.0.NEGCNEI:user/release-keys'
2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: Revision: '0'
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: ABI: 'arm'
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: pid: 5638, tid: 5664, name: interceptor-thr >>> com.sanfengandroid.datafilter <<<
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x51
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r0 00000051 r1 e00dd008 r2 00000003 r3 00039000
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r4 e821e008 r5 00000025 r6 00000000 r7 e00dd0c8
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r8 e017b000 r9 e7b50c63 sl 00000000 fp 00000001
2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: ip e00dd0c8 sp e00dd008 lr e670fb2b pc e670fb44 cpsr 000f0030
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: backtrace:
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #00 pc 00009b44 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #1 pc 00009b27 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #2 pc 00009295 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #3 pc 00009277 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #4 pc 0000b59f /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so (call_namespace_function+418)
2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #5 pc 0000392f /data/app/com.sanfengandroid.datafilter-2/lib/arm/libhookh.so (offset 0x11000)
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY'
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000037 second wait
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL]
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Event message available
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger
2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received