there's a hardcoded 32-byte AES key the firmware uses to encrypt passwords... except they fucked up (made an array of u32 and not u8) and 3/4 of the key is zeroes
not that it matters a lot given it's hardcoded
kill it!!!
(there are 51 instance of killall something in this .so, of which 23 are killall -9)

@whitequark Incredible.
I can't decide if that's a potential attempt at "optimization" (moving the static prefix from the format string to the variable initializer); it's the only thing I can come up with that makes sense (even though it doesn't actually make sense as an optimization).
But it's probably better not to try to make sense of it.
@whitequark Ah, 0x207370 is "ps "; I missed that (I wasn't sure what the numbers were but I don't Rust). That makes more sense, but the rest is still baffling.
Now I'm wondering if it would be a viable method of obfuscation. Probably not difficult to reverse, but annoying and fills the decompilation with chaff.