sanfengAndroid / FakeXposed

Hide xposed, root, file redirection, etc.
Apache License 2.0
635 stars 193 forks source link

小米 7.12 datafilter崩溃 #9

Open netstu opened 3 years ago

netstu commented 3 years ago

红米5 plus android 7.12

日志如下: 021-06-13 07:01:27.541 5638-5638/? D/HookLog: environments: test_key=sanfengandroid 2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register VMDebug result: 1 2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register Throwable result: 1 2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register Throwable result: 1 2021-06-13 07:01:27.541 5638-5638/? D/HookLog: register UNIXProcess result: 1 2021-06-13 07:01:27.543 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2" 2021-06-13 07:01:27.543 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322 2021-06-13 07:01:27.543 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0" 2021-06-13 07:01:27.543 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46 2021-06-13 07:01:27.544 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/data/com.zilia.john/shared_prefs/CustomizeApps.xml, mode: 0\n" 2021-06-13 07:01:27.545 5638-5638/? V/HookLog: [Monitor system_property_get] "name: debug.force_rtl, value: 0" 2021-06-13 07:01:27.546 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mnc, value: 9999" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mnc, value: 9999" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.547 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.548 5638-5638/? V/HookLog: [Monitor system_property_get] "name: debug.atrace.tags.enableflags, value: 0" 2021-06-13 07:01:27.548 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.debuggable, value: 0" 2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter, mode: 0\n" 2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user/0/com.sanfengandroid.datafilter/cache, mode: 0\n" 2021-06-13 07:01:27.549 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter, mode: 0\n" 2021-06-13 07:01:27.550 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/user_de/0/com.sanfengandroid.datafilter/code_cache, mode: 0\n" 2021-06-13 07:01:27.550 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.gfx.driver.0, value: " 2021-06-13 07:01:27.551 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2" 2021-06-13 07:01:27.551 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322 2021-06-13 07:01:27.551 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0" 2021-06-13 07:01:27.551 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46 2021-06-13 07:01:27.551 5638-5663/? V/HookLog: [Monitor system_property_get] "name: debug.egl.profiler, value: " 2021-06-13 07:01:27.552 5638-5663/? V/HookLog: [Monitor system_property_get] "name: debug.prerotation.disable, value: " 2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mnc, value: 9999" 2021-06-13 07:01:27.558 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.559 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.559 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY' 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000037 second wait 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL] 2021-06-13 07:01:27.561 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: nl80211: Event message available 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000131 seconds 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00 2021-06-13 07:01:27.562 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Event message available 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000828 seconds 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes) 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 401 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00 2021-06-13 07:01:27.563 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24 2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00 2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.002999 seconds 2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0 2021-06-13 07:01:27.564 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS' 2021-06-13 07:01:27.565 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383 2021-06-13 07:01:27.566 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385 2021-06-13 07:01:27.566 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17 2021-06-13 07:01:27.567 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS' 2021-06-13 07:01:27.567 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383 2021-06-13 07:01:27.568 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2" 2021-06-13 07:01:27.568 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322 2021-06-13 07:01:27.568 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0" 2021-06-13 07:01:27.568 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46 2021-06-13 07:01:27.568 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385 2021-06-13 07:01:27.570 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899 2021-06-13 07:01:27.571 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000b6000000 2021-06-13 07:01:27.572 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899 2021-06-13 07:01:27.573 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.text.PrecomputedText$Params" 2021-06-13 07:01:27.574 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000b6000000 2021-06-13 07:01:27.574 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861 2021-06-13 07:01:27.576 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861 2021-06-13 07:01:27.577 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326 2021-06-13 07:01:27.578 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326 2021-06-13 07:01:27.578 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0 2021-06-13 07:01:27.579 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0 2021-06-13 07:01:27.580 5638-5638/? V/HookLog: [Monitor system_property_get] "name: debug.second-display.pkg, value: " 2021-06-13 07:01:27.581 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/framework-res, mode: 0\n" 2021-06-13 07:01:27.582 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/icons, mode: 0\n" 2021-06-13 07:01:27.582 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection========== 2021-06-13 07:01:27.582 5638-5638/? V/HookLog: [Monitor open] "path /system/media/theme/default/icons flags: 0" 2021-06-13 07:01:27.582 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322 2021-06-13 07:01:27.583 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /system/media/theme/default/icons, flags: 0, mode: 0" 2021-06-13 07:01:27.583 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 46 2021-06-13 07:01:27.583 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0 2021-06-13 07:01:27.583 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already 2021-06-13 07:01:27.584 5638-5643/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2" 2021-06-13 07:01:27.585 5638-5643/? V/HookLog: Monitor: syscall invoke number: 322 2021-06-13 07:01:27.585 5638-5643/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0" 2021-06-13 07:01:27.585 5638-5643/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 47 2021-06-13 07:01:27.598 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/lockscreen, mode: 0\n" 2021-06-13 07:01:27.599 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/system/theme/framework-miui-res, mode: 0\n" 2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.core-1.apk, mode: 0\n" 2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.core-2.apk, mode: 0\n" 2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.system-1.apk, mode: 0\n" 2021-06-13 07:01:27.602 5638-5638/? V/HookLog: [Monitor faccessat] "dirfd: -100 path: /data/app/com.miui.system-2.apk, mode: 0\n" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor system_property_get] "name: debug.force_rtl, value: 0" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mnc, value: 9999" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.604 5638-5638/? V/HookLog: [Monitor system_property_get] "name: ro.miui.mcc, value: 9460" 2021-06-13 07:01:27.607 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.util.MemoryIntArray" 2021-06-13 07:01:27.607 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.os.ParcelFileDescriptor" 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY' 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000039 second wait 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL] 2021-06-13 07:01:27.610 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: nl80211: Event message available 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000116 seconds 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00 2021-06-13 07:01:27.611 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24 2021-06-13 07:01:27.611 1577-1619/? I/Timeline: Timeline: App_transition_stopped time:98718 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Event message available 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000805 seconds 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes) 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 402 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00 2021-06-13 07:01:27.612 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24 2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00 2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.002926 seconds 2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0 2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS' 2021-06-13 07:01:27.613 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383 2021-06-13 07:01:27.614 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: android.graphics.Insets" 2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] send(AppTransitionFinishedEvent) 2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] -> ForcedResizableInfoActivityController [0x94b3e6f, P1] onBusEvent(AppTransitionFinishedEvent) 2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] onBusEvent(AppTransitionFinishedEvent) duration: 17 microseconds, avg: 25 2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] send(AppTransitionFinishedEvent) 2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] -> ForcedResizableInfoActivityController [0x94b3e6f, P1] onBusEvent(AppTransitionFinishedEvent) 2021-06-13 07:01:27.614 1815-1815/? D/EventBus: [1815, u0] onBusEvent(AppTransitionFinishedEvent) duration: 5 microseconds, avg: 23 2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385 2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS' 2021-06-13 07:01:27.615 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17 2021-06-13 07:01:27.615 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383 2021-06-13 07:01:27.616 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385 2021-06-13 07:01:27.617 5638-5638/? V/HookLog: [Monitor system_property_get] "name: interceptor.debug.on, value: " 2021-06-13 07:01:27.617 5638-5638/? V/HookLog: [Monitor system_property_get] "name: interceptor.enabled, value: " 2021-06-13 07:01:27.618 5638-5638/? V/HookLog: [Monitor open] "path /dev/ashmem flags: 2" 2021-06-13 07:01:27.618 5638-5638/? V/HookLog: Monitor: syscall invoke number: 322 2021-06-13 07:01:27.618 5638-5638/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /dev/ashmem, flags: 2, mode: 0" 2021-06-13 07:01:27.618 5638-5638/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: 48 2021-06-13 07:01:27.618 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899 2021-06-13 07:01:27.619 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000bb000000 2021-06-13 07:01:27.620 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899 2021-06-13 07:01:27.621 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000bb000000 2021-06-13 07:01:27.621 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v25.Android_Os_Process_class" 2021-06-13 07:01:27.621 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v25.Android_Os_Process_class" 2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor getenv] "Monitor: getenv name: ANDROID_DATA" 2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor open] "path /data/dalvik-cache/arm/system@framework@volley.jar@classes.dex.flock flags: 66" 2021-06-13 07:01:27.622 5638-5664/? V/HookLog: Monitor: syscall invoke number: 322 2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [syscall intercept_openat] "fd: -100, path: /data/dalvik-cache/arm/system@framework@volley.jar@classes.dex.flock, flags: 66, mode: 438" 2021-06-13 07:01:27.622 5638-5664/? V/HookLog: Monitor: 'syscall' invoke number: 322, result: -1 2021-06-13 07:01:27.622 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v24.Android_Os_Process_class" 2021-06-13 07:01:27.622 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v24.Android_Os_Process_class" 2021-06-13 07:01:27.622 5638-5664/? V/HookLog: [Monitor android_dlopen_ext] "filename: /system/framework/oat/arm/volley.odex, flag: 0x0, extinfo: 0xe00dd0e0" 2021-06-13 07:01:27.623 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861

--------- beginning of crash

2021-06-13 07:01:27.623 5638-5664/? A/libc: Fatal signal 11 (SIGSEGV), code 1, fault addr 0x51 in tid 5664 (interceptor-thr) 2021-06-13 07:01:27.623 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v23.Android_Os_Process_class" 2021-06-13 07:01:27.623 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v23.Android_Os_Process_class" 2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v22.Android_Os_Process_class" 2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v22.Android_Os_Process_class" 2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v21.Android_Os_Process_class" 2021-06-13 07:01:27.624 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v21.Android_Os_Process_class" 2021-06-13 07:01:27.624 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861 2021-06-13 07:01:27.625 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v20.Android_Os_Process_class" 2021-06-13 07:01:27.625 5638-5638/? V/HookLog: [Monitor Class_classForName] "Fake classForName: com.miui.internal.variable.v20.Android_Os_Process_class" 2021-06-13 07:01:27.625 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326 2021-06-13 07:01:27.626 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326 2021-06-13 07:01:27.626 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0 2021-06-13 07:01:27.627 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0 2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection========== 2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0 2021-06-13 07:01:27.630 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY' 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000038 second wait 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL] 2021-06-13 07:01:27.658 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Event message available 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Own scan request started a scan in 0.000100 seconds 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Event message available 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 34 (NL80211_CMD_NEW_SCAN_RESULTS) received for wlan0 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: nl80211: New scan results available 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Scan included frequencies: 2412 2417 2422 2427 2432 2437 2442 2447 2452 2457 2462 2467 2472 5180 5200 5220 5240 5260 5280 5300 5320 5745 5765 5785 5805 5825 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_RESULTS (3) received 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: Scan completed in 0.000258 seconds 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Associated on 2437 MHz 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Associated with dc:fe:18:26:b5:df 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Received scan results (17 BSSes) 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: nl80211: Scan results indicate BSS status with dc:fe:18:26:b5:df as associated 2021-06-13 07:01:27.659 2025-2025/? D/wpa_supplicant: wlan0: BSS: Start scan result update 403 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: BSS: last_scan_res_used=17/32 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Scan-only results received 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=0 send_len=24 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_766-2\x00 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: ctrl_sock-sendmsg: sock=8 sndbuf=212992 outq=768 send_len=24 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL_IFACE monitor sent successfully to /data/misc/wifi/sockets/wpa_ctrl_1577-2\x00 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Radio work 'scan'@0x7fa9e2e360 done in 0.001427 seconds 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: radio_work_free('scan'@0x7fa9e2e360: num_active_works --> 0 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS' 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383 2021-06-13 07:01:27.660 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN_RESULTS' 2021-06-13 07:01:27.661 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1383 2021-06-13 07:01:27.662 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385 2021-06-13 07:01:27.663 1577-2126/? E/IzatSvc_Wiper: W/Num of elements returned by LOWI 17 2021-06-13 07:01:27.663 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3385 2021-06-13 07:01:27.665 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899 2021-06-13 07:01:27.666 1577-1728/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000c0000000 2021-06-13 07:01:27.666 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3899 2021-06-13 07:01:27.667 1577-1726/? D/WifiNative-HAL: Inconsistent SSID on BSSID '74:0a:e1:98:53:db': '7oqAClXX' vs '': ie=000001088c129824b048606c03019d05040002000030140100000fac040100000fac040100000fac0800002d1aef111bffff0000000000000000000001000000000000000000003d169d0704000000ffff00000000000000000000000000007208376f7141436c5858710701010001000009bf0ca219c033faff6303faff6303c005019b00ffffdd0f00e0fc400000000000fd0438000000dd0b00a0c600010000c0000000 2021-06-13 07:01:27.668 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861 2021-06-13 07:01:27.669 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3861 2021-06-13 07:01:27.670 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326 2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=1326 2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0 2021-06-13 07:01:27.671 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=0 2021-06-13 07:01:27.674 1577-1726/? D/WifiQualifiedNetworkSelector:: ==========start qualified Network Selection========== 2021-06-13 07:01:27.674 1577-1726/? D/WifiQualifiedNetworkSelector:: Current network is: "liu" ,ID is: 0 2021-06-13 07:01:27.675 1577-1726/? D/WifiQualifiedNetworkSelector:: Quit qualified Network Selection since it is not forced and current network is qualified already 2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: 2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: Build fingerprint: 'xiaomi/vince/vince:7.1.2/N2G47H/V9.0.4.0.NEGCNEI:user/release-keys' 2021-06-13 07:01:27.692 5665-5665/? A/DEBUG: Revision: '0' 2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: ABI: 'arm' 2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: pid: 5638, tid: 5664, name: interceptor-thr >>> com.sanfengandroid.datafilter <<< 2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x51 2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r0 00000051 r1 e00dd008 r2 00000003 r3 00039000 2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r4 e821e008 r5 00000025 r6 00000000 r7 e00dd0c8 2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: r8 e017b000 r9 e7b50c63 sl 00000000 fp 00000001 2021-06-13 07:01:27.693 5665-5665/? A/DEBUG: ip e00dd0c8 sp e00dd008 lr e670fb2b pc e670fb44 cpsr 000f0030 2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: backtrace: 2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #00 pc 00009b44 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so 2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #01 pc 00009b27 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so 2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #02 pc 00009295 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so 2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #03 pc 00009277 /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so 2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #04 pc 0000b59f /data/app/com.sanfengandroid.datafilter-2/lib/arm/libfake-linker-24.so (call_namespace_function+418) 2021-06-13 07:01:27.694 5665-5665/? A/DEBUG: #05 pc 0000392f /data/app/com.sanfengandroid.datafilter-2/lib/arm/libhookh.so (offset 0x11000) 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Control interface command 'SCAN TYPE=ONLY' 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Setting scan request: 0.000000 sec 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: CTRL-DEBUG: global_ctrl_sock-sendto: sock=8 sndbuf=212992 outq=0 send_len=3 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Starting AP scan for wildcard SSID 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Add radio work 'scan'@0x7fa9e2e360 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: First radio work item in the queue - schedule start immediately 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Starting radio work 'scan'@0x7fa9e2e360 after 0.000037 second wait 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: nl80211: scan request 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Scan SSID - hexdump(len=0): [NULL] 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Scan extra IEs - hexdump(len=7): 7f 05 00 00 0a 02 01 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: Scan requested (ret=0) - scan timeout 30 seconds 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Event message available 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: nl80211: Drv Event 33 (NL80211_CMD_TRIGGER_SCAN) received for wlan0 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: nl80211: Scan trigger 2021-06-13 07:01:27.707 2025-2025/? D/wpa_supplicant: wlan0: Event SCAN_STARTED (47) received

netstu commented 3 years ago

再测,oppo 7.1.1 正常使用,完美