Advertisement
Guest User

Logcat A7R/Bootloop/Miui Installation

a guest
Jul 2nd, 2015
249
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 261.24 KB | None | 0 0
  1. --------- beginning of /dev/log/system
  2.  
  3. __bionic_open_tzdata: couldn't find any tzdata when looking for localtime!
  4.  
  5. __bionic_open_tzdata: couldn't find any tzdata when looking for GMT!
  6.  
  7. __bionic_open_tzdata: couldn't find any tzdata when looking for posixrules!
  8.  
  9. E/POAD ( 178): boot_mode = 0
  10.  
  11. E/POAD ( 178): update boot reason = 0
  12.  
  13. D/Vold ( 125): Check whether nvram restore ready!
  14.  
  15. D/Vold ( 125): nvram restore ready!
  16.  
  17. D/VolumeManager( 125): read st nvram_fd=7 Ret=16 usb=1 adb=1 rndis=0 rec_size=16 rec_num=1
  18.  
  19. D/Vold ( 125): OMADM NVRAM read Ret=0, IsEnable=1, Usb=1, Adb=1, Rndis=0
  20.  
  21. I/Vold ( 125): Vold 2.1 (the revenge) firing up
  22.  
  23. I/VolumeManager( 125): *** This is first boot!
  24.  
  25. D/Vold ( 125): Volume sdcard0 state changing -1 (Initializing) -> 0 (No-Media), bValue(0)
  26.  
  27. I/Vold ( 125): fstab rec: 'sdcard0', 'auto', 8, '/devices/platform/mtk-msdc.0/mmc_host', flag=0x8
  28.  
  29. I/DirectVolume( 125): This is emmc storage (/devices/platform/mtk-msdc.0/mmc_host)
  30.  
  31. D/Vold ( 125): Volume sdcard1 state changing -1 (Initializing) -> 0 (No-Media), bValue(0)
  32.  
  33. I/Vold ( 125): fstab rec: 'sdcard1', 'auto', -1, '/devices/platform/mtk-msdc.1/mmc_host', flag=0x0
  34.  
  35. D/Vold ( 125): Volume usbotg state changing -1 (Initializing) -> 0 (No-Media), bValue(0)
  36.  
  37. I/Vold ( 125): fstab rec: 'usbotg', 'auto', -1, '/devices/platform/mt_usb', flag=0x0
  38.  
  39. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/virtual/block/loop0, action = 1, devtype = disk
  40.  
  41. D/NetlinkEvent( 125): NL action '1'
  42.  
  43. D/NetlinkEvent( 125): NL subsystem 'block'
  44.  
  45. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/virtual/block/loop0'
  46.  
  47. D/NetlinkEvent( 125): NL param 'MAJOR=7'
  48.  
  49. D/NetlinkEvent( 125): NL param 'MINOR=0'
  50.  
  51. D/NetlinkEvent( 125): NL param 'DEVNAME=loop0'
  52.  
  53. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  54.  
  55. D/NetlinkEvent( 125): NL param 'NPARTS=0'
  56.  
  57. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  58.  
  59. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  60.  
  61. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  62.  
  63. W/VolumeManager( 125): No volumes handled block event for '/devices/virtual/block/loop0'
  64.  
  65. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/virtual/block/loop1, action = 1, devtype = disk
  66.  
  67. D/NetlinkEvent( 125): NL action '1'
  68.  
  69. D/NetlinkEvent( 125): NL subsystem 'block'
  70.  
  71. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/virtual/block/loop1'
  72.  
  73. D/NetlinkEvent( 125): NL param 'MAJOR=7'
  74.  
  75. D/NetlinkEvent( 125): NL param 'MINOR=1'
  76.  
  77. D/NetlinkEvent( 125): NL param 'DEVNAME=loop1'
  78.  
  79. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  80.  
  81. D/NetlinkEvent( 125): NL param 'NPARTS=0'
  82.  
  83. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  84.  
  85. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  86.  
  87. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  88.  
  89. W/VolumeManager( 125): No volumes handled block event for '/devices/virtual/block/loop1'
  90.  
  91. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/virtual/block/loop2, action = 1, devtype = disk
  92.  
  93. D/NetlinkEvent( 125): NL action '1'
  94.  
  95. D/NetlinkEvent( 125): NL subsystem 'block'
  96.  
  97. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/virtual/block/loop2'
  98.  
  99. D/NetlinkEvent( 125): NL param 'MAJOR=7'
  100.  
  101. D/NetlinkEvent( 125): NL param 'MINOR=2'
  102.  
  103. D/NetlinkEvent( 125): NL param 'DEVNAME=loop2'
  104.  
  105. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  106.  
  107. D/NetlinkEvent( 125): NL param 'NPARTS=0'
  108.  
  109. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  110.  
  111. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  112.  
  113. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  114.  
  115. W/VolumeManager( 125): No volumes handled block event for '/devices/virtual/block/loop2'
  116.  
  117. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/virtual/block/loop3, action = 1, devtype = disk
  118.  
  119. D/NetlinkEvent( 125): NL action '1'
  120.  
  121. D/NetlinkEvent( 125): NL subsystem 'block'
  122.  
  123. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/virtual/block/loop3'
  124.  
  125. D/NetlinkEvent( 125): NL param 'MAJOR=7'
  126.  
  127. D/NetlinkEvent( 125): NL param 'MINOR=3'
  128.  
  129. D/NetlinkEvent( 125): NL param 'DEVNAME=loop3'
  130.  
  131. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  132.  
  133. D/NetlinkEvent( 125): NL param 'NPARTS=0'
  134.  
  135. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  136.  
  137. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  138.  
  139. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  140.  
  141. W/VolumeManager( 125): No volumes handled block event for '/devices/virtual/block/loop3'
  142.  
  143. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/virtual/block/loop4, action = 1, devtype = disk
  144.  
  145. D/NetlinkEvent( 125): NL action '1'
  146.  
  147. D/NetlinkEvent( 125): NL subsystem 'block'
  148.  
  149. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/virtual/block/loop4'
  150.  
  151. D/NetlinkEvent( 125): NL param 'MAJOR=7'
  152.  
  153. D/NetlinkEvent( 125): NL param 'MINOR=4'
  154.  
  155. D/NetlinkEvent( 125): NL param 'DEVNAME=loop4'
  156.  
  157. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  158.  
  159. D/NetlinkEvent( 125): NL param 'NPARTS=0'
  160.  
  161. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  162.  
  163. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  164.  
  165. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  166.  
  167. W/VolumeManager( 125): No volumes handled block event for '/devices/virtual/block/loop4'
  168.  
  169. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/virtual/block/loop5, action = 1, devtype = disk
  170.  
  171. D/NetlinkEvent( 125): NL action '1'
  172.  
  173. D/NetlinkEvent( 125): NL subsystem 'block'
  174.  
  175. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/virtual/block/loop5'
  176.  
  177. D/NetlinkEvent( 125): NL param 'MAJOR=7'
  178.  
  179. D/NetlinkEvent( 125): NL param 'MINOR=5'
  180.  
  181. D/NetlinkEvent( 125): NL param 'DEVNAME=loop5'
  182.  
  183. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  184.  
  185. D/NetlinkEvent( 125): NL param 'NPARTS=0'
  186.  
  187. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  188.  
  189. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  190.  
  191. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  192.  
  193. W/VolumeManager( 125): No volumes handled block event for '/devices/virtual/block/loop5'
  194.  
  195. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/virtual/block/loop6, action = 1, devtype = disk
  196.  
  197. D/NetlinkEvent( 125): NL action '1'
  198.  
  199. D/NetlinkEvent( 125): NL subsystem 'block'
  200.  
  201. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/virtual/block/loop6'
  202.  
  203. D/NetlinkEvent( 125): NL param 'MAJOR=7'
  204.  
  205. D/NetlinkEvent( 125): NL param 'MINOR=6'
  206.  
  207. D/NetlinkEvent( 125): NL param 'DEVNAME=loop6'
  208.  
  209. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  210.  
  211. D/NetlinkEvent( 125): NL param 'NPARTS=0'
  212.  
  213. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  214.  
  215. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  216.  
  217. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  218.  
  219. W/VolumeManager( 125): No volumes handled block event for '/devices/virtual/block/loop6'
  220.  
  221. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/virtual/block/loop7, action = 1, devtype = disk
  222.  
  223. D/NetlinkEvent( 125): NL action '1'
  224.  
  225. D/NetlinkEvent( 125): NL subsystem 'block'
  226.  
  227. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/virtual/block/loop7'
  228.  
  229. D/NetlinkEvent( 125): NL param 'MAJOR=7'
  230.  
  231. D/NetlinkEvent( 125): NL param 'MINOR=7'
  232.  
  233. D/NetlinkEvent( 125): NL param 'DEVNAME=loop7'
  234.  
  235. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  236.  
  237. D/NetlinkEvent( 125): NL param 'NPARTS=0'
  238.  
  239. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  240.  
  241. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  242.  
  243. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  244.  
  245. W/VolumeManager( 125): No volumes handled block event for '/devices/virtual/block/loop7'
  246.  
  247. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/virtual/block/zram0, action = 1, devtype = disk
  248.  
  249. D/NetlinkEvent( 125): NL action '1'
  250.  
  251. D/NetlinkEvent( 125): NL subsystem 'block'
  252.  
  253. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/virtual/block/zram0'
  254.  
  255. D/NetlinkEvent( 125): NL param 'MAJOR=253'
  256.  
  257. D/NetlinkEvent( 125): NL param 'MINOR=0'
  258.  
  259. D/NetlinkEvent( 125): NL param 'DEVNAME=zram0'
  260.  
  261. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  262.  
  263. D/NetlinkEvent( 125): NL param 'NPARTS=0'
  264.  
  265. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  266.  
  267. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  268.  
  269. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 6
  270.  
  271. W/VolumeManager( 125): No volumes handled block event for '/devices/virtual/block/zram0'
  272.  
  273. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot0, action = 1, devtype = disk
  274.  
  275. E/DirectVolume( 125): 'sdcard0' is pluged in.!!
  276.  
  277. D/NetlinkEvent( 125): NL action '1'
  278.  
  279. D/NetlinkEvent( 125): NL subsystem 'block'
  280.  
  281. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot0'
  282.  
  283. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  284.  
  285. D/NetlinkEvent( 125): NL param 'MINOR=32'
  286.  
  287. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk0boot0'
  288.  
  289. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  290.  
  291. D/NetlinkEvent( 125): NL param 'NPARTS=0'
  292.  
  293. I/VolumeManager( 125): boot disk, skip!!!
  294.  
  295. W/VolumeManager( 125): No volumes handled block event for '/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot0'
  296.  
  297. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot1, action = 1, devtype = disk
  298.  
  299. E/DirectVolume( 125): 'sdcard0' is pluged in.!!
  300.  
  301. D/NetlinkEvent( 125): NL action '1'
  302.  
  303. D/NetlinkEvent( 125): NL subsystem 'block'
  304.  
  305. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot1'
  306.  
  307. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  308.  
  309. D/NetlinkEvent( 125): NL param 'MINOR=64'
  310.  
  311. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk0boot1'
  312.  
  313. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  314.  
  315. D/NetlinkEvent( 125): NL param 'NPARTS=0'
  316.  
  317. I/VolumeManager( 125): boot disk, skip!!!
  318.  
  319. W/VolumeManager( 125): No volumes handled block event for '/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot1'
  320.  
  321. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0, action = 1, devtype = disk
  322.  
  323. E/DirectVolume( 125): 'sdcard0' is pluged in.!!
  324.  
  325. D/NetlinkEvent( 125): NL action '1'
  326.  
  327. D/NetlinkEvent( 125): NL subsystem 'block'
  328.  
  329. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0'
  330.  
  331. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  332.  
  333. D/NetlinkEvent( 125): NL param 'MINOR=0'
  334.  
  335. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk0'
  336.  
  337. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  338.  
  339. D/NetlinkEvent( 125): NL param 'NPARTS=8'
  340.  
  341. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 0
  342.  
  343. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent disk add /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0
  344.  
  345. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent getinto handleDiskAdded
  346.  
  347. D/DirectVolume( 125): Dv::diskIns - waiting for 8 partitions (pending partitions: 8)
  348.  
  349. D/Vold ( 125): Volume sdcard0 state changing 0 (No-Media) -> 2 (Pending), bValue(0)
  350.  
  351. D/VolumeManager( 125): Device '/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0' event handled by volume usbtog
  352.  
  353. E/NetlinkEvent( 125): NetlinkEvent::FindParam(): Parameter 'NPARTS' not found
  354.  
  355. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p1, action = 1, devtype = partition
  356.  
  357. E/DirectVolume( 125): 'sdcard0' is pluged in.!!
  358.  
  359. D/NetlinkEvent( 125): NL action '1'
  360.  
  361. D/NetlinkEvent( 125): NL subsystem 'block'
  362.  
  363. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p1'
  364.  
  365. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  366.  
  367. D/NetlinkEvent( 125): NL param 'MINOR=1'
  368.  
  369. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk0p1'
  370.  
  371. D/NetlinkEvent( 125): NL param 'DEVTYPE=partition'
  372.  
  373. D/NetlinkEvent( 125): NL param 'PARTN=1'
  374.  
  375. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 0
  376.  
  377. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent partition add /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p1
  378.  
  379. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent getinto handlePartitionAdded
  380.  
  381. D/DirectVolume( 125): Dv:partAdd: part_num = 1, minor = 1
  382.  
  383. D/DirectVolume( 125): Dv:partAdd: pending 7 disk
  384.  
  385. D/VolumeManager( 125): Device '/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p1' event handled by volume usbtog
  386.  
  387. E/NetlinkEvent( 125): NetlinkEvent::FindParam(): Parameter 'NPARTS' not found
  388.  
  389. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p2, action = 1, devtype = partition
  390.  
  391. E/DirectVolume( 125): 'sdcard0' is pluged in.!!
  392.  
  393. D/NetlinkEvent( 125): NL action '1'
  394.  
  395. D/NetlinkEvent( 125): NL subsystem 'block'
  396.  
  397. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p2'
  398.  
  399. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  400.  
  401. D/NetlinkEvent( 125): NL param 'MINOR=2'
  402.  
  403. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk0p2'
  404.  
  405. D/NetlinkEvent( 125): NL param 'DEVTYPE=partition'
  406.  
  407. D/NetlinkEvent( 125): NL param 'PARTN=2'
  408.  
  409. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 0
  410.  
  411. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent partition add /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p2
  412.  
  413. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent getinto handlePartitionAdded
  414.  
  415. D/DirectVolume( 125): Dv:partAdd: part_num = 2, minor = 2
  416.  
  417. D/DirectVolume( 125): Dv:partAdd: pending 6 disk
  418.  
  419. D/VolumeManager( 125): Device '/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p2' event handled by volume usbtog
  420.  
  421. E/NetlinkEvent( 125): NetlinkEvent::FindParam(): Parameter 'NPARTS' not found
  422.  
  423. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p3, action = 1, devtype = partition
  424.  
  425. E/DirectVolume( 125): 'sdcard0' is pluged in.!!
  426.  
  427. D/NetlinkEvent( 125): NL action '1'
  428.  
  429. D/NetlinkEvent( 125): NL subsystem 'block'
  430.  
  431. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p3'
  432.  
  433. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  434.  
  435. D/NetlinkEvent( 125): NL param 'MINOR=3'
  436.  
  437. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk0p3'
  438.  
  439. D/NetlinkEvent( 125): NL param 'DEVTYPE=partition'
  440.  
  441. D/NetlinkEvent( 125): NL param 'PARTN=3'
  442.  
  443. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 0
  444.  
  445. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent partition add /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p3
  446.  
  447. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent getinto handlePartitionAdded
  448.  
  449. D/DirectVolume( 125): Dv:partAdd: part_num = 3, minor = 3
  450.  
  451. D/DirectVolume( 125): Dv:partAdd: pending 5 disk
  452.  
  453. D/VolumeManager( 125): Device '/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p3' event handled by volume usbtog
  454.  
  455. E/NetlinkEvent( 125): NetlinkEvent::FindParam(): Parameter 'NPARTS' not found
  456.  
  457. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p4, action = 1, devtype = partition
  458.  
  459. E/DirectVolume( 125): 'sdcard0' is pluged in.!!
  460.  
  461. D/NetlinkEvent( 125): NL action '1'
  462.  
  463. D/NetlinkEvent( 125): NL subsystem 'block'
  464.  
  465. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p4'
  466.  
  467. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  468.  
  469. D/NetlinkEvent( 125): NL param 'MINOR=4'
  470.  
  471. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk0p4'
  472.  
  473. D/NetlinkEvent( 125): NL param 'DEVTYPE=partition'
  474.  
  475. D/NetlinkEvent( 125): NL param 'PARTN=4'
  476.  
  477. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 0
  478.  
  479. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent partition add /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p4
  480.  
  481. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent getinto handlePartitionAdded
  482.  
  483. D/DirectVolume( 125): Dv:partAdd: part_num = 4, minor = 4
  484.  
  485. D/DirectVolume( 125): Dv:partAdd: pending 4 disk
  486.  
  487. D/VolumeManager( 125): Device '/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p4' event handled by volume usbtog
  488.  
  489. E/NetlinkEvent( 125): NetlinkEvent::FindParam(): Parameter 'NPARTS' not found
  490.  
  491. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p5, action = 1, devtype = partition
  492.  
  493. E/DirectVolume( 125): 'sdcard0' is pluged in.!!
  494.  
  495. D/NetlinkEvent( 125): NL action '1'
  496.  
  497. D/NetlinkEvent( 125): NL subsystem 'block'
  498.  
  499. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p5'
  500.  
  501. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  502.  
  503. D/NetlinkEvent( 125): NL param 'MINOR=5'
  504.  
  505. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk0p5'
  506.  
  507. D/NetlinkEvent( 125): NL param 'DEVTYPE=partition'
  508.  
  509. D/NetlinkEvent( 125): NL param 'PARTN=5'
  510.  
  511. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 0
  512.  
  513. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent partition add /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p5
  514.  
  515. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent getinto handlePartitionAdded
  516.  
  517. D/DirectVolume( 125): Dv:partAdd: part_num = 5, minor = 5
  518.  
  519. D/DirectVolume( 125): Dv:partAdd: pending 3 disk
  520.  
  521. D/VolumeManager( 125): Device '/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p5' event handled by volume usbtog
  522.  
  523. E/NetlinkEvent( 125): NetlinkEvent::FindParam(): Parameter 'NPARTS' not found
  524.  
  525. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p6, action = 1, devtype = partition
  526.  
  527. E/DirectVolume( 125): 'sdcard0' is pluged in.!!
  528.  
  529. D/NetlinkEvent( 125): NL action '1'
  530.  
  531. D/NetlinkEvent( 125): NL subsystem 'block'
  532.  
  533. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p6'
  534.  
  535. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  536.  
  537. D/NetlinkEvent( 125): NL param 'MINOR=6'
  538.  
  539. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk0p6'
  540.  
  541. D/NetlinkEvent( 125): NL param 'DEVTYPE=partition'
  542.  
  543. D/NetlinkEvent( 125): NL param 'PARTN=6'
  544.  
  545. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 0
  546.  
  547. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent partition add /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p6
  548.  
  549. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent getinto handlePartitionAdded
  550.  
  551. D/DirectVolume( 125): Dv:partAdd: part_num = 6, minor = 6
  552.  
  553. D/DirectVolume( 125): Dv:partAdd: pending 2 disk
  554.  
  555. D/VolumeManager( 125): Device '/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p6' event handled by volume usbtog
  556.  
  557. E/NetlinkEvent( 125): NetlinkEvent::FindParam(): Parameter 'NPARTS' not found
  558.  
  559. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p7, action = 1, devtype = partition
  560.  
  561. E/DirectVolume( 125): 'sdcard0' is pluged in.!!
  562.  
  563. D/NetlinkEvent( 125): NL action '1'
  564.  
  565. D/NetlinkEvent( 125): NL subsystem 'block'
  566.  
  567. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p7'
  568.  
  569. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  570.  
  571. D/NetlinkEvent( 125): NL param 'MINOR=7'
  572.  
  573. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk0p7'
  574.  
  575. D/NetlinkEvent( 125): NL param 'DEVTYPE=partition'
  576.  
  577. D/NetlinkEvent( 125): NL param 'PARTN=7'
  578.  
  579. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 0
  580.  
  581. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent partition add /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p7
  582.  
  583. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent getinto handlePartitionAdded
  584.  
  585. D/DirectVolume( 125): Dv:partAdd: part_num = 7, minor = 7
  586.  
  587. D/DirectVolume( 125): Dv:partAdd: pending 1 disk
  588.  
  589. D/VolumeManager( 125): Device '/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p7' event handled by volume usbtog
  590.  
  591. E/NetlinkEvent( 125): NetlinkEvent::FindParam(): Parameter 'NPARTS' not found
  592.  
  593. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p8, action = 1, devtype = partition
  594.  
  595. E/DirectVolume( 125): 'sdcard0' is pluged in.!!
  596.  
  597. D/NetlinkEvent( 125): NL action '1'
  598.  
  599. D/NetlinkEvent( 125): NL subsystem 'block'
  600.  
  601. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p8'
  602.  
  603. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  604.  
  605. D/NetlinkEvent( 125): NL param 'MINOR=8'
  606.  
  607. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk0p8'
  608.  
  609. D/NetlinkEvent( 125): NL param 'DEVTYPE=partition'
  610.  
  611. D/NetlinkEvent( 125): NL param 'PARTN=8'
  612.  
  613. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 0
  614.  
  615. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent partition add /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p8
  616.  
  617. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent getinto handlePartitionAdded
  618.  
  619. D/DirectVolume( 125): Dv:partAdd: part_num = 8, minor = 8
  620.  
  621. D/DirectVolume( 125): Dv:partAdd: Got all partitions - ready to rock!
  622.  
  623. D/Vold ( 125): Volume sdcard0 state changing 2 (Pending) -> 1 (Idle-Unmounted), bValue(0)
  624.  
  625. D/VolumeManager( 125): Device '/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0p8' event handled by volume usbtog
  626.  
  627. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot0, action = 1, devtype = disk
  628.  
  629. E/DirectVolume( 125): 'sdcard0' is pluged in.!!
  630.  
  631. D/NetlinkEvent( 125): NL action '1'
  632.  
  633. D/NetlinkEvent( 125): NL subsystem 'block'
  634.  
  635. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot0'
  636.  
  637. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  638.  
  639. D/NetlinkEvent( 125): NL param 'MINOR=32'
  640.  
  641. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk0boot0'
  642.  
  643. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  644.  
  645. D/NetlinkEvent( 125): NL param 'NPARTS=0'
  646.  
  647. I/VolumeManager( 125): boot disk, skip!!!
  648.  
  649. W/VolumeManager( 125): No volumes handled block event for '/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot0'
  650.  
  651. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot1, action = 1, devtype = disk
  652.  
  653. E/DirectVolume( 125): 'sdcard0' is pluged in.!!
  654.  
  655. D/NetlinkEvent( 125): NL action '1'
  656.  
  657. D/NetlinkEvent( 125): NL subsystem 'block'
  658.  
  659. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot1'
  660.  
  661. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  662.  
  663. D/NetlinkEvent( 125): NL param 'MINOR=64'
  664.  
  665. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk0boot1'
  666.  
  667. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  668.  
  669. D/NetlinkEvent( 125): NL param 'NPARTS=0'
  670.  
  671. I/VolumeManager( 125): boot disk, skip!!!
  672.  
  673. W/VolumeManager( 125): No volumes handled block event for '/devices/platform/mtk-msdc.0/mmc_host/mmc0/mmc0:0001/block/mmcblk0/mmcblk0boot1'
  674.  
  675. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.1/mmc_host/mmc1/mmc1:0001/block/mmcblk1, action = 1, devtype = disk
  676.  
  677. E/DirectVolume( 125): 'sdcard1' is pluged in.!!
  678.  
  679. D/NetlinkEvent( 125): NL action '1'
  680.  
  681. D/NetlinkEvent( 125): NL subsystem 'block'
  682.  
  683. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.1/mmc_host/mmc1/mmc1:0001/block/mmcblk1'
  684.  
  685. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  686.  
  687. D/NetlinkEvent( 125): NL param 'MINOR=96'
  688.  
  689. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk1'
  690.  
  691. D/NetlinkEvent( 125): NL param 'DEVTYPE=disk'
  692.  
  693. D/NetlinkEvent( 125): NL param 'NPARTS=1'
  694.  
  695. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 1
  696.  
  697. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 0
  698.  
  699. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent disk add /devices/platform/mtk-msdc.1/mmc_host/mmc1/mmc1:0001/block/mmcblk1
  700.  
  701. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent getinto handleDiskAdded
  702.  
  703. D/DirectVolume( 125): Dv::diskIns - waiting for 1 partitions (pending partitions: 1)
  704.  
  705. D/Vold ( 125): Volume sdcard1 state changing 0 (No-Media) -> 2 (Pending), bValue(0)
  706.  
  707. D/VolumeManager( 125): Device '/devices/platform/mtk-msdc.1/mmc_host/mmc1/mmc1:0001/block/mmcblk1' event handled by volume usbtog
  708.  
  709. E/NetlinkEvent( 125): NetlinkEvent::FindParam(): Parameter 'NPARTS' not found
  710.  
  711. D/Vold ( 125): usbotg: NetlinkHandler onEvent path = /devices/platform/mtk-msdc.1/mmc_host/mmc1/mmc1:0001/block/mmcblk1/mmcblk1p1, action = 1, devtype = partition
  712.  
  713. E/DirectVolume( 125): 'sdcard1' is pluged in.!!
  714.  
  715. D/NetlinkEvent( 125): NL action '1'
  716.  
  717. D/NetlinkEvent( 125): NL subsystem 'block'
  718.  
  719. D/NetlinkEvent( 125): NL param 'DEVPATH=/devices/platform/mtk-msdc.1/mmc_host/mmc1/mmc1:0001/block/mmcblk1/mmcblk1p1'
  720.  
  721. D/NetlinkEvent( 125): NL param 'MAJOR=179'
  722.  
  723. D/NetlinkEvent( 125): NL param 'MINOR=97'
  724.  
  725. D/NetlinkEvent( 125): NL param 'DEVNAME=mmcblk1p1'
  726.  
  727. D/NetlinkEvent( 125): NL param 'DEVTYPE=partition'
  728.  
  729. D/NetlinkEvent( 125): NL param 'PARTN=1'
  730.  
  731. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 1
  732.  
  733. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent goon = 0
  734.  
  735. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent partition add /devices/platform/mtk-msdc.1/mmc_host/mmc1/mmc1:0001/block/mmcblk1/mmcblk1p1
  736.  
  737. D/DirectVolume( 125): usbotg: DirectVolume handleBlockEvent getinto handlePartitionAdded
  738.  
  739. D/DirectVolume( 125): Dv:partAdd: part_num = 1, minor = 97
  740.  
  741. D/DirectVolume( 125): Dv:partAdd: Got all partitions - ready to rock!
  742.  
  743. D/Vold ( 125): Volume sdcard1 state changing 2 (Pending) -> 1 (Idle-Unmounted), bValue(0)
  744.  
  745. D/VolumeManager( 125): Device '/devices/platform/mtk-msdc.1/mmc_host/mmc1/mmc1:0001/block/mmcblk1/mmcblk1p1' event handled by volume usbtog
  746.  
  747. I/Vold ( 125): Coldboot: sem_post() because all uevent has handled
  748.  
  749. I/Vold ( 125): Coldboot: try to wait for uevents, timeout 5s
  750.  
  751. I/Vold ( 125): Coldboot: all uevent has handled
  752.  
  753. D/VolumeManager( 125): swap2Sdcard: The SWAP feature option is enabled in this load.
  754.  
  755. D/VolumeManager( 125): swap2Sdcard: numVolume_inConfigFil=3, numVolume_onBoot=2
  756.  
  757. D/VolumeManager( 125): swap2Sdcard: dv1_old_mountpoint=/mnt/media_rw/sdcard0, dv2_old_mountpoint=/mnt/media_rw/sdcard1
  758.  
  759. D/VolumeManager( 125): swap2Sdcard: dv1_old_mpt=/mnt/media_rw/sdcard0, dv2_old_mpt=/mnt/media_rw/sdcard1
  760.  
  761. D/Vold ( 125): setMountpoint: newMountPoint='/mnt/media_rw/sdcard1', mMountpoint='/mnt/media_rw/sdcard1', mFuseMountpoint='/storage/sdcard1'
  762.  
  763. D/Vold ( 125): setMountpoint: newMountPoint='/mnt/media_rw/sdcard0', mMountpoint='/mnt/media_rw/sdcard0', mFuseMountpoint='/storage/sdcard0'
  764.  
  765. D/Vold ( 125): the property of internal storage before property_set... =
  766.  
  767. D/Vold ( 125): the property of external storage before property_set... =
  768.  
  769. D/Vold ( 125): void create_link_in_meta(const char*)(ext_sd_path = /storage/sdcard0)
  770.  
  771. D/Vold ( 125): This is not meta mode boot.
  772.  
  773. D/Vold ( 125): the property of internal storage after property_set... = /storage/sdcard1
  774.  
  775. D/Vold ( 125): the property of external storage after property_set... = /storage/sdcard0
  776.  
  777. D/VolumeManager( 125): swap2Sdcard: dv1_mountpoint=/mnt/media_rw/sdcard1, dv2_mountpoint=/mnt/media_rw/sdcard0
  778.  
  779. I/sn ( 177): Retry 1
  780.  
  781. I/sn ( 177): Fail to access err=No such file or directory
  782.  
  783. I/sn ( 177): Fail to access err=No such file or directory
  784.  
  785. I/sn ( 177): Fail to access err=No such file or directory
  786.  
  787. I/sn ( 177): Check all possible paths
  788.  
  789. I/sn ( 177): Retry 2
  790.  
  791. I/sn ( 177): Fail to access err=No such file or directory
  792.  
  793. I/sn ( 177): Fail to access err=No such file or directory
  794.  
  795. I/sn ( 177): Fail to access err=No such file or directory
  796.  
  797. I/sn ( 177): Check all possible paths
  798.  
  799. I/sn ( 177): Retry 3
  800.  
  801. I/sn ( 177): Fail to access err=No such file or directory
  802.  
  803. I/sn ( 177): Fail to access err=No such file or directory
  804.  
  805. I/sn ( 177): Fail to access err=No such file or directory
  806.  
  807. I/sn ( 177): Check all possible paths
  808.  
  809. I/sn ( 177): Retry 4
  810.  
  811. I/sn ( 177): Fail to access err=No such file or directory
  812.  
  813. I/sn ( 177): Fail to access err=No such file or directory
  814.  
  815. I/sn ( 177): Fail to access err=No such file or directory
  816.  
  817. I/sn ( 177): Check all possible paths
  818.  
  819. I/sn ( 177): Retry 5
  820.  
  821. I/sn ( 177): Fail to access err=No such file or directory
  822.  
  823. I/sn ( 177): Fail to access err=No such file or directory
  824.  
  825. I/sn ( 177): Fail to access err=No such file or directory
  826.  
  827. I/sn ( 177): Check all possible paths
  828.  
  829. I/sn ( 177): Retry 6
  830.  
  831. I/sn ( 177): Fail to access err=No such file or directory
  832.  
  833. I/sn ( 177): Fail to access err=No such file or directory
  834.  
  835. I/sn ( 177): Fail to access err=No such file or directory
  836.  
  837. I/sn ( 177): Check all possible paths
  838.  
  839. I/sn ( 177): Retry 7
  840.  
  841. I/sn ( 177): Fail to access err=No such file or directory
  842.  
  843. I/sn ( 177): Fail to access err=No such file or directory
  844.  
  845. I/sn ( 177): Fail to access err=No such file or directory
  846.  
  847. I/sn ( 177): Check all possible paths
  848.  
  849. I/sn ( 177): Retry 8
  850.  
  851. I/sn ( 177): Fail to access err=No such file or directory
  852.  
  853. I/sn ( 177): Fail to access err=No such file or directory
  854.  
  855. I/sn ( 177): Fail to access err=No such file or directory
  856.  
  857. I/sn ( 177): Check all possible paths
  858.  
  859. I/sn ( 177): Retry 9
  860.  
  861. I/sn ( 177): Fail to access err=No such file or directory
  862.  
  863. I/sn ( 177): Fail to access err=No such file or directory
  864.  
  865. I/sn ( 177): Fail to access err=No such file or directory
  866.  
  867. I/sn ( 177): Check all possible paths
  868.  
  869. --------- beginning of /dev/log/main
  870.  
  871. I/DEBUG ( 5111): #05 pc 00015ab7 /system/lib/libjavacore.so (register_libcore_icu_ICU(_JNIEnv*)+242)
  872.  
  873. I/DEBUG ( 5111): #06 pc 0000e553 /system/lib/libjavacore.so (JNI_OnLoad+190)
  874.  
  875. I/DEBUG ( 5111): #07 pc 000523c1 /system/lib/libdvm.so (dvmLoadNativeCode(char const*, Object*, char**)+516)
  876.  
  877. I/DEBUG ( 5111): #08 pc 00047911 /system/lib/libdvm.so
  878.  
  879. I/DEBUG ( 5111): #09 pc 0004950d /system/lib/libdvm.so (dvmStartup(int, char const* const*, bool, _JNIEnv*)+6444)
  880.  
  881. I/DEBUG ( 5111): #10 pc 0004fdbd /system/lib/libdvm.so (JNI_CreateJavaVM+596)
  882.  
  883. I/DEBUG ( 5111): #11 pc 00002d79 /system/lib/libnativehelper.so (JniInvocation::JNI_CreateJavaVM(_JavaVM**, _JNIEnv**, void*)+10)
  884.  
  885. I/DEBUG ( 5111): #12 pc 0004ff7f /system/lib/libandroid_runtime.so (android::AndroidRuntime::startVm(_JavaVM**, _JNIEnv**)+1814)
  886.  
  887. I/DEBUG ( 5111): #13 pc 0005025d /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, char const*)+176)
  888.  
  889. I/DEBUG ( 5111): #14 pc 0000105b /system/bin/app_process
  890.  
  891. I/DEBUG ( 5111): #15 pc 0000f31c /system/lib/libc.so (__libc_init+100)
  892.  
  893. I/DEBUG ( 5111): #16 pc 00000d7c /system/bin/app_process
  894.  
  895. I/DEBUG ( 5111):
  896.  
  897. I/DEBUG ( 5111): stack:
  898.  
  899. I/DEBUG ( 5111): bebedb28 419a7940 /system/lib/libdvm.so
  900.  
  901. I/DEBUG ( 5111): bebedb2c 6066a047
  902.  
  903. I/DEBUG ( 5111): bebedb30 418e6aa8
  904.  
  905. I/DEBUG ( 5111): bebedb34 00000000
  906.  
  907. I/DEBUG ( 5111): bebedb38 418e6e14
  908.  
  909. I/DEBUG ( 5111): bebedb3c 419cc178 /dev/ashmem/dalvik-zygote (deleted)
  910.  
  911. I/DEBUG ( 5111): bebedb40 5794efa4 /dev/ashmem/dalvik-LinearAlloc (deleted)
  912.  
  913. I/DEBUG ( 5111): bebedb44 5794efa4 /dev/ashmem/dalvik-LinearAlloc (deleted)
  914.  
  915. I/DEBUG ( 5111): bebedb48 418e6f88
  916.  
  917. I/DEBUG ( 5111): bebedb4c 4197b4f9 /system/lib/libdvm.so (dexParameterIteratorInit(DexParameterIterator*, DexProto const*)+18)
  918.  
  919. I/DEBUG ( 5111): bebedb50 419cc178 /dev/ashmem/dalvik-zygote (deleted)
  920.  
  921. I/DEBUG ( 5111): bebedb54 bebedbb0 [stack]
  922.  
  923. I/Netd ( 5033): execIptablesCommand android_fork_execvp exit
  924.  
  925. I/Netd ( 5033): execIptablesCommand android_fork_execvp enter
  926.  
  927. I/DEBUG ( 5111): bebedb58 5bb860f0 /system/lib/libjavacore.so
  928.  
  929. I/DEBUG ( 5111): bebedb5c 419568d3 /system/lib/libdvm.so
  930.  
  931. I/DEBUG ( 5111): bebedb60 bebedb70 [stack]
  932.  
  933. I/DEBUG ( 5111): bebedb64 bebedb83 [stack]
  934.  
  935. I/DEBUG ( 5111): #00 bebedb68 00000006
  936.  
  937. I/DEBUG ( 5111): bebedb6c 00000002
  938.  
  939. I/DEBUG ( 5111): bebedb70 000013ab
  940.  
  941. I/DEBUG ( 5111): bebedb74 418deb48
  942.  
  943. I/DEBUG ( 5111): bebedb78 418deb48
  944.  
  945. I/DEBUG ( 5111): bebedb7c 400b32b1 /system/lib/libc.so (pthread_kill+52)
  946.  
  947. I/DEBUG ( 5111): #01 bebedb80 00000006
  948.  
  949. I/DEBUG ( 5111): bebedb84 00000000
  950.  
  951. I/DEBUG ( 5111): bebedb88 ffffffff
  952.  
  953. I/DEBUG ( 5111): bebedb8c 400b34c5 /system/lib/libc.so (raise+14)
  954.  
  955. I/DEBUG ( 5111): #02 bebedb90 bebedb9c [stack]
  956.  
  957. I/DEBUG ( 5111): bebedb94 400b21f9 /system/lib/libc.so
  958.  
  959. I/Netd ( 5033): execIptablesCommand android_fork_execvp exit
  960.  
  961. I/Netd ( 5033): execIptablesCommand android_fork_execvp enter
  962.  
  963. I/DEBUG ( 5111):
  964.  
  965. I/DEBUG ( 5111): memory near r1:
  966.  
  967. I/DEBUG ( 5111): 00001388 ffffffff ffffffff ffffffff ffffffff
  968.  
  969. I/DEBUG ( 5111): 00001398 ffffffff ffffffff ffffffff ffffffff
  970.  
  971. I/DEBUG ( 5111): 000013a8 ffffffff ffffffff ffffffff ffffffff
  972.  
  973. I/DEBUG ( 5111): 000013b8 ffffffff ffffffff ffffffff ffffffff
  974.  
  975. I/DEBUG ( 5111): 000013c8 ffffffff ffffffff ffffffff ffffffff
  976.  
  977. I/DEBUG ( 5111): 000013d8 ffffffff ffffffff ffffffff ffffffff
  978.  
  979. I/DEBUG ( 5111): 000013e8 ffffffff ffffffff ffffffff ffffffff
  980.  
  981. I/DEBUG ( 5111): 000013f8 ffffffff ffffffff ffffffff ffffffff
  982.  
  983. I/DEBUG ( 5111): 00001408 ffffffff ffffffff ffffffff ffffffff
  984.  
  985. I/DEBUG ( 5111): 00001418 ffffffff ffffffff ffffffff ffffffff
  986.  
  987. I/DEBUG ( 5111): 00001428 ffffffff ffffffff ffffffff ffffffff
  988.  
  989. I/DEBUG ( 5111): 00001438 ffffffff ffffffff ffffffff ffffffff
  990.  
  991. I/DEBUG ( 5111): 00001448 ffffffff ffffffff ffffffff ffffffff
  992.  
  993. I/DEBUG ( 5111): 00001458 ffffffff ffffffff ffffffff ffffffff
  994.  
  995. I/DEBUG ( 5111): 00001468 ffffffff ffffffff ffffffff ffffffff
  996.  
  997. I/DEBUG ( 5111): 00001478 ffffffff ffffffff ffffffff ffffffff
  998.  
  999. I/DEBUG ( 5111):
  1000.  
  1001. I/DEBUG ( 5111): memory near r6:
  1002.  
  1003. I/DEBUG ( 5111): 00001388 ffffffff ffffffff ffffffff ffffffff
  1004.  
  1005. I/DEBUG ( 5111): 00001398 ffffffff ffffffff ffffffff ffffffff
  1006.  
  1007. I/DEBUG ( 5111): 000013a8 ffffffff ffffffff ffffffff ffffffff
  1008.  
  1009. I/DEBUG ( 5111): 000013b8 ffffffff ffffffff ffffffff ffffffff
  1010.  
  1011. I/DEBUG ( 5111): 000013c8 ffffffff ffffffff ffffffff ffffffff
  1012.  
  1013. I/DEBUG ( 5111): 000013d8 ffffffff ffffffff ffffffff ffffffff
  1014.  
  1015. I/DEBUG ( 5111): 000013e8 ffffffff ffffffff ffffffff ffffffff
  1016.  
  1017. I/DEBUG ( 5111): 000013f8 ffffffff ffffffff ffffffff ffffffff
  1018.  
  1019. I/DEBUG ( 5111): 00001408 ffffffff ffffffff ffffffff ffffffff
  1020.  
  1021. I/DEBUG ( 5111): 00001418 ffffffff ffffffff ffffffff ffffffff
  1022.  
  1023. I/DEBUG ( 5111): 00001428 ffffffff ffffffff ffffffff ffffffff
  1024.  
  1025. I/DEBUG ( 5111): 00001438 ffffffff ffffffff ffffffff ffffffff
  1026.  
  1027. I/DEBUG ( 5111): 00001448 ffffffff ffffffff ffffffff ffffffff
  1028.  
  1029. I/DEBUG ( 5111): 00001458 ffffffff ffffffff ffffffff ffffffff
  1030.  
  1031. I/DEBUG ( 5111): 00001468 ffffffff ffffffff ffffffff ffffffff
  1032.  
  1033. I/DEBUG ( 5111): 00001478 ffffffff ffffffff ffffffff ffffffff
  1034.  
  1035. I/DEBUG ( 5111):
  1036.  
  1037. I/DEBUG ( 5111): memory near r8:
  1038.  
  1039. I/DEBUG ( 5111): 40103ba8 00001000 00001000 00010000 00200000
  1040.  
  1041. I/DEBUG ( 5111): 40103bb8 00000003 400c6c48 bebee964 bebeea0f
  1042.  
  1043. I/DEBUG ( 5111): 40103bc8 2d16584e bebee91c 00000000 40083d20
  1044.  
  1045. I/DEBUG ( 5111): 40103bd8 00000007 00000008 00000000 40084184
  1046.  
  1047. I/DEBUG ( 5111): 40103be8 00000000 40301000 00000009 0000000a
  1048.  
  1049. I/DEBUG ( 5111): 40103bf8 00000000 00000000 00000000 00000000
  1050.  
  1051. I/DEBUG ( 5111): 40103c08 00000000 00000000 00000000 00000000
  1052.  
  1053. I/DEBUG ( 5111): 40103c18 00000000 00000000 00000000 00000000
  1054.  
  1055. I/DEBUG ( 5111): 40103c28 00000000 00000000 00000000 00000000
  1056.  
  1057. I/DEBUG ( 5111): 40103c38 00000000 00000000 00000000 00000000
  1058.  
  1059. I/DEBUG ( 5111): 40103c48 00000000 00000000 00000000 00000000
  1060.  
  1061. I/DEBUG ( 5111): 40103c58 00000000 00000000 00000000 00000000
  1062.  
  1063. I/DEBUG ( 5111): 40103c68 00000000 00000000 00000000 00000000
  1064.  
  1065. I/DEBUG ( 5111): 40103c78 00000000 00000000 00000000 00000000
  1066.  
  1067. I/DEBUG ( 5111): 40103c88 00000000 00000000 00000000 00000000
  1068.  
  1069. I/DEBUG ( 5111): 40103c98 00000000 00000000 00000000 00000000
  1070.  
  1071. I/DEBUG ( 5111):
  1072.  
  1073. I/DEBUG ( 5111): memory near r9:
  1074.  
  1075. I/DEBUG ( 5111): 418e3e78 bebedf48 bebedf34 4023b49e 00000000
  1076.  
  1077. I/DEBUG ( 5111): 418e3e88 00000000 00000000 00000000 00000023
  1078.  
  1079. I/DEBUG ( 5111): 418e3e98 419a037c 00000000 00000001 418e6aa8
  1080.  
  1081. I/DEBUG ( 5111): 418e3ea8 00000000 00000000 00000000 00000013
  1082.  
  1083. I/DEBUG ( 5111): 418e3eb8 0000002e 00000000 00000000 0000002b
  1084.  
  1085. I/DEBUG ( 5111): 418e3ec8 7379732f 2f6d6574 6d617266 726f7765
  1086.  
  1087. I/DEBUG ( 5111): 418e3ed8 656d2f6b 74616964 6f2d6b65 616a2e70
  1088.  
  1089. I/DEBUG ( 5111): 418e3ee8 00000072 00000013 65726f63 72616a2e
  1090.  
  1091. I/DEBUG ( 5111): 418e3ef8 00000000 0000001b 736e6f63 70797263
  1092.  
  1093. I/DEBUG ( 5111): 418e3f08 616a2e74 00000072 00000000 00000013
  1094.  
  1095. I/DEBUG ( 5111): 418e3f18 74686b6f 6a2e7074 00007261 0000001b
  1096.  
  1097. I/DEBUG ( 5111): 418e3f28 65726f63 6e756a2d 6a2e7469 00007261
  1098.  
  1099. I/DEBUG ( 5111): 418e3f38 00000000 0000001b 6e756f62 61637963
  1100.  
  1101. I/DEBUG ( 5111): 418e3f48 656c7473 72616a2e 00000000 00000013
  1102.  
  1103. I/DEBUG ( 5111): 418e3f58 2e747865 0072616a 00000000 0000001b
  1104.  
  1105. I/DEBUG ( 5111): 418e3f68 6d617266 726f7765 616a2e6b 00000072
  1106.  
  1107. I/DEBUG ( 5111):
  1108.  
  1109. I/DEBUG ( 5111): memory near sl:
  1110.  
  1111. I/DEBUG ( 5111): 5b078f84 63617661 2e65726f 00006f73 7461502f
  1112.  
  1113. I/DEBUG ( 5111): 5b078f94 0000001b 7379732f 2f6d6574 2f727375
  1114.  
  1115. I/DEBUG ( 5111): 5b078fa4 00756369 746e4965 00000031 726f466c
  1116.  
  1117. I/DEBUG ( 5111): 5b078fb4 3b74616d 62617400 00000021 3b786564
  1118.  
  1119. I/DEBUG ( 5111): 5b078fc4 00000000 00000000 00000011 00000000
  1120.  
  1121. I/DEBUG ( 5111): 5b078fd4 00000000 00000030 0000001a 5b06a000
  1122.  
  1123. I/DEBUG ( 5111): 5b078fe4 0000f000 59e5afe0 00000001 00000000
  1124.  
  1125. I/DEBUG ( 5111): 5b078ff4 00000007 00000007 00000007 0a796564
  1126.  
  1127. I/DEBUG ( 5111): 5b079004 00363330 00000028 00022090 000220b8
  1128.  
  1129. I/DEBUG ( 5111): 5b079014 0000036c 00022428 00003c00 00000000
  1130.  
  1131. I/DEBUG ( 5111): 5b079024 aba5d33e 0a786564 00353330 dfc59663
  1132.  
  1133. I/DEBUG ( 5111): 5b079034 46292994 fb5698cd 090babaf 9aab2356
  1134.  
  1135. I/DEBUG ( 5111): 5b079044 58a797ba 00022090 00000070 12345678
  1136.  
  1137. I/DEBUG ( 5111): 5b079054 00000000 00000000 00021fc0 000006c5
  1138.  
  1139. I/DEBUG ( 5111): 5b079064 00000070 00000082 00001b84 000000bf
  1140.  
  1141. I/DEBUG ( 5111): 5b079074 00001d8c 00000259 00002680 00000257
  1142.  
  1143. I/DEBUG ( 5111):
  1144.  
  1145. I/DEBUG ( 5111): memory near fp:
  1146.  
  1147. I/DEBUG ( 5111): 419aa108 418e7000 419aa004 419a29d0 419aa22c
  1148.  
  1149. I/DEBUG ( 5111): 419aa118 40087eb8 00000001 418e7000 00000100
  1150.  
  1151. I/DEBUG ( 5111): 419aa128 6a62696c 63617661 2e65726f 00006f73
  1152.  
  1153. I/DEBUG ( 5111): 419aa138 00000000 00000000 00000000 00000000
  1154.  
  1155. I/DEBUG ( 5111): 419aa148 00000000 00000000 00000000 00000000
  1156.  
  1157. I/DEBUG ( 5111): 419aa158 00000000 00000000 00000000 00000000
  1158.  
  1159. I/DEBUG ( 5111): 419aa168 00000000 00000000 00000000 00000000
  1160.  
  1161. I/Netd ( 5033): execIptablesCommand android_fork_execvp exit
  1162.  
  1163. I/Netd ( 5033): execIptablesCommand android_fork_execvp enter
  1164.  
  1165. I/DEBUG ( 5111): 419aa178 00000000 00000000 00000000 00000000
  1166.  
  1167. I/DEBUG ( 5111): 419aa188 00000000 00000000 00000000 00000000
  1168.  
  1169. I/DEBUG ( 5111): 419aa198 00000000 00000000 00000000 00000000
  1170.  
  1171. I/DEBUG ( 5111): 419aa1a8 5bb5b034 00000008 00000000 5bb5b000
  1172.  
  1173. I/DEBUG ( 5111): 419aa1b8 00034000 00000000 5bb8c690 00000000
  1174.  
  1175. I/DEBUG ( 5111): 419aa1c8 00000000 00000000 00000001 5bb5dd88
  1176.  
  1177. I/DEBUG ( 5111): 419aa1d8 5bb5b148 00000209 000002c4 5bb62478
  1178.  
  1179. I/DEBUG ( 5111): 419aa1e8 5bb62c9c 5bb8c8a4 5bb665dc 000001d4
  1180.  
  1181. I/DEBUG ( 5111): 419aa1f8 5bb637ac 000005c6 00000000 00000000
  1182.  
  1183. I/DEBUG ( 5111):
  1184.  
  1185. I/DEBUG ( 5111): memory near ip:
  1186.  
  1187. I/DEBUG ( 5111): 418deb28 00000000 00000000 00000000 00000000
  1188.  
  1189. I/DEBUG ( 5111): 418deb38 00000000 00000000 00000000 00000000
  1190.  
  1191. I/DEBUG ( 5111): 418deb48 7379732f 2f6d6574 2f727375 2f756369
  1192.  
  1193. I/DEBUG ( 5111): 418deb58 64756369 6c313574 7461642e 00000000
  1194.  
  1195. I/DEBUG ( 5111): 418deb68 65676465 6d6f7266 68746170 766c6c2e
  1196.  
  1197. I/DEBUG ( 5111): 418deb78 6f72706d 756f2e66 00000074 00000000
  1198.  
  1199. I/DEBUG ( 5111): 418deb88 65676465 6d6f7266 68746170 766c6c2e
  1200.  
  1201. I/DEBUG ( 5111): 418deb98 6f72706d 756f2e66 00000074 00000000
  1202.  
  1203. I/DEBUG ( 5111): 418deba8 418debc8 00000000 00000000 00000000
  1204.  
  1205. I/DEBUG ( 5111): 418debb8 00000000 00000000 00000000 00000000
  1206.  
  1207. I/DEBUG ( 5111): 418debc8 418debe8 00000000 00000000 00000000
  1208.  
  1209. I/DEBUG ( 5111): 418debd8 00000000 00000000 00000000 00000000
  1210.  
  1211. I/DEBUG ( 5111): 418debe8 418dec08 00000000 00000000 00000000
  1212.  
  1213. I/DEBUG ( 5111): 418debf8 00000000 00000000 00000000 00000000
  1214.  
  1215. I/DEBUG ( 5111): 418dec08 418dec28 00000000 00000000 00000000
  1216.  
  1217. I/DEBUG ( 5111): 418dec18 00000000 00000000 00000000 00000000
  1218.  
  1219. I/DEBUG ( 5111):
  1220.  
  1221. I/DEBUG ( 5111): memory near sp:
  1222.  
  1223. I/DEBUG ( 5111): bebedb48 418e6f88 4197b4f9 419cc178 bebedbb0
  1224.  
  1225. I/DEBUG ( 5111): bebedb58 5bb860f0 419568d3 bebedb70 bebedb83
  1226.  
  1227. I/DEBUG ( 5111): bebedb68 00000006 00000002 000013ab 418deb48
  1228.  
  1229. I/DEBUG ( 5111): bebedb78 418deb48 400b32b1 00000006 00000000
  1230.  
  1231. I/DEBUG ( 5111): bebedb88 ffffffff 400b34c5 bebedb9c 400b21f9
  1232.  
  1233. I/DEBUG ( 5111): bebedb98 0000001f ffffffdf bebedc44 2d16584e
  1234.  
  1235. I/DEBUG ( 5111): bebedba8 bebedc44 bebedc44 00000000 bebedc44
  1236.  
  1237. I/DEBUG ( 5111): bebedbb8 00000000 400c1aa8 4009796d 5bb70abb
  1238.  
  1239. I/DEBUG ( 5111): bebedbc8 400f2998 00000011 5794f0bc 59a18438
  1240.  
  1241. I/DEBUG ( 5111): bebedbd8 00000003 00000003 00000000 419cc178
  1242.  
  1243. I/DEBUG ( 5111): bebedbe8 5bb8611f 5bb8610c 5bb8da00 00000002
  1244.  
  1245. I/DEBUG ( 5111): bebedbf8 5794f0a8 419cc178 5794f0a8 bebedc2c
  1246.  
  1247. I/DEBUG ( 5111): bebedc08 5bb8611f 41932035 00000000 41936897
  1248.  
  1249. I/DEBUG ( 5111): bebedc18 1ea00005 5bb86080 00000003 5bb8d9e8
  1250.  
  1251. I/DEBUG ( 5111): bebedc28 00000001 bebedc44 5bb86080 41932035
  1252.  
  1253. I/DEBUG ( 5111): bebedc38 1ea00005 41932f99 418e3e98 418deb68
  1254.  
  1255. I/DEBUG ( 5111):
  1256.  
  1257. I/DEBUG ( 5111): code around pc:
  1258.  
  1259. I/DEBUG ( 5111): 400c21d4 e8bd00f0 e3700a01 912fff1e e2600000
  1260.  
  1261. I/DEBUG ( 5111): 400c21e4 ea00b702 e92d50f0 e3a07f43 ef000000
  1262.  
  1263. I/DEBUG ( 5111): 400c21f4 e8bd50f0 e3700a01 912fff1e e2600000
  1264.  
  1265. I/DEBUG ( 5111): 400c2204 ea00b6fa e92d50f0 e3a070ee ef000000
  1266.  
  1267. I/DEBUG ( 5111): 400c2214 e8bd50f0 e3700a01 912fff1e e2600000
  1268.  
  1269. I/DEBUG ( 5111): 400c2224 ea00b6f2 00000000 00000000 e92d400f
  1270.  
  1271. I/DEBUG ( 5111): 400c2234 e1a03000 e1a00001 e1a01003 eb000040
  1272.  
  1273. I/DEBUG ( 5111): 400c2244 e8bd400f e12fff1e e320f000 e92d403f
  1274.  
  1275. I/DEBUG ( 5111): 400c2254 e2522040 ba00002c e1a05001 e2455c01
  1276.  
  1277. I/DEBUG ( 5111): 400c2264 f5d5f000 f5d5f040 f5d5f080 f5d5f0c0
  1278.  
  1279. I/DEBUG ( 5111): 400c2274 e2411040 e2400040 e1a05000 e1a04001
  1280.  
  1281. I/DEBUG ( 5111): 400c2284 f424020d f424420d f405022d f405422d
  1282.  
  1283. I/DEBUG ( 5111): 400c2294 e2522040 ba00001c e2411040 e2400040
  1284.  
  1285. I/DEBUG ( 5111): 400c22a4 e1a05000 e1a04001 f424020d f424420d
  1286.  
  1287. I/DEBUG ( 5111): 400c22b4 f405022d f405422d e2522040 ba000012
  1288.  
  1289. I/DEBUG ( 5111): 400c22c4 e2411040 e2400040 e1a05000 e1a04001
  1290.  
  1291. I/DEBUG ( 5111):
  1292.  
  1293. I/DEBUG ( 5111): code around lr:
  1294.  
  1295. I/DEBUG ( 5111): 400b3290 447b4b13 42b3e010 4812d10e 44786a1e
  1296.  
  1297. I/DEBUG ( 5111): 400b32a0 eb08f7f8 e9d8f00d 46224631 ef9cf00e
  1298.  
  1299. I/DEBUG ( 5111): 400b32b0 d00a3001 e00b2400 2b00681b 480ad1eb
  1300.  
  1301. I/DEBUG ( 5111): 400b32c0 44782403 eaf6f7f8 f001e002 6804fa1b
  1302.  
  1303. I/DEBUG ( 5111): 400b32d0 fa18f001 46206005 bf00bd70 0005095a
  1304.  
  1305. I/DEBUG ( 5111): 400b32e0 0005094e 00050946 00050922 bf7ef7ff
  1306.  
  1307. I/DEBUG ( 5111): 400b32f0 43f0e92d 4a3d4b3c 589c447b 6823b08b
  1308.  
  1309. I/DEBUG ( 5111): 400b3300 460d4606 f0019309 46a1f9fd 8000f8d0
  1310.  
  1311. I/DEBUG ( 5111): 400b3310 d0482d00 f00f4628 280ffed5 d8444604
  1312.  
  1313. I/DEBUG ( 5111): 400b3320 ffe4f7ff d1064286 4629200f e8a2f00d
  1314.  
  1315. I/DEBUG ( 5111): 400b3330 d03c2800 482ee02e f7f84478 482dea3a
  1316.  
  1317. I/DEBUG ( 5111): 400b3340 e0154478 d11342b0 482b6a06 f7f84478
  1318.  
  1319. I/DEBUG ( 5111): 400b3350 4a2aeab2 447a2120 a8014633 e84af015
  1320.  
  1321. I/DEBUG ( 5111): 400b3360 a8012101 ef52f021 46061c42 e011d104
  1322.  
  1323. I/DEBUG ( 5111): 400b3370 28006800 e02cd1e6 46294630 f00d4622
  1324.  
  1325. I/DEBUG ( 5111): 400b3380 1c43e8de d11e4607 f9bcf001 29046801
  1326.  
  1327. I/Netd ( 5033): execIptablesCommand android_fork_execvp exit
  1328.  
  1329. I/Netd ( 5033): execIptablesCommand android_fork_execvp enter
  1330.  
  1331. I/Netd ( 5033): execIptablesCommand android_fork_execvp exit
  1332.  
  1333. I/Netd ( 5033): execIptablesCommand android_fork_execvp enter
  1334.  
  1335. I/Netd ( 5033): execIptablesCommand android_fork_execvp exit
  1336.  
  1337. I/Netd ( 5033): execIptablesCommand android_fork_execvp enter
  1338.  
  1339. I/Netd ( 5033): execIptablesCommand android_fork_execvp exit
  1340.  
  1341. I/Netd ( 5033): execIptablesCommand android_fork_execvp enter
  1342.  
  1343. D/ImgSensorDrv( 5036): [impSearchSensor][impSearchSensor] Err-ctrlCode (I/O error)
  1344.  
  1345. D/ImgSensorDrv( 5036): [getCurrentSensorType][getCurrentSensorType]
  1346.  
  1347. D/ImgSensorDrv( 5036): [getInfo][getInfo]
  1348.  
  1349. D/ImgSensorDrv( 5036): [getSocketPosition][getSocketPosition]:[1][1]
  1350.  
  1351. D/ImgSensorDrv( 5036): [impSearchSensor]sensor ID mismatch
  1352.  
  1353. D/ImgSensorDrv( 5036): [impSearchSensor]set sensor driver id =10003
  1354.  
  1355. I/Netd ( 5033): execIptablesCommand android_fork_execvp exit
  1356.  
  1357. I/Netd ( 5033): execIptablesCommand android_fork_execvp enter
  1358.  
  1359. I/Netd ( 5033): execIptablesCommand android_fork_execvp exit
  1360.  
  1361. I/Netd ( 5033): execIptablesCommand android_fork_execvp enter
  1362.  
  1363. I/Netd ( 5033): execIptablesCommand android_fork_execvp exit
  1364.  
  1365. I/Netd ( 5033): execIptablesCommand android_fork_execvp enter
  1366.  
  1367. I/Netd ( 5033): execIptablesCommand android_fork_execvp exit
  1368.  
  1369. I/Netd ( 5033): execIptablesCommand android_fork_execvp enter
  1370.  
  1371. I/Netd ( 5033): execIptablesCommand android_fork_execvp exit
  1372.  
  1373. I/Netd ( 5033): execIptablesCommand android_fork_execvp enter
  1374.  
  1375. V/AEE/AED ( 5111): dashboard_record_update() : rec->module = zygote
  1376.  
  1377. D/AEE/AED ( 5111): Skip duplicated exception !
  1378.  
  1379. D/AEE/AED ( 5111): Exception Class: 1
  1380.  
  1381. D/AEE/AED ( 5111): Module: zygote
  1382.  
  1383. D/AEE/AED ( 5111): Count: 38
  1384.  
  1385. D/AEE/AED ( 5111): Last exception time: 1388537659
  1386.  
  1387. D/AEE/AED ( 5111):
  1388.  
  1389. V/AEE/AED ( 5111): aed_ne_session() - skipped
  1390.  
  1391. I/Netd ( 5033): execIptablesCommand android_fork_execvp exit
  1392.  
  1393. I/Netd ( 5033): execIptablesCommand android_fork_execvp enter
  1394.  
  1395. D/AEE/AED ( 132): $===AEE===AEE===AEE===$
  1396.  
  1397. D/AEE/AED ( 132): p 0 poll events 1 revents 0
  1398.  
  1399. D/AEE/AED ( 132): not know revents:0
  1400.  
  1401. D/AEE/AED ( 132): p 1 poll events 1 revents 0
  1402.  
  1403. D/AEE/AED ( 132): not know revents:0
  1404.  
  1405. D/AEE/AED ( 132): p 2 poll events 1 revents 0
  1406.  
  1407. D/AEE/AED ( 132): not know revents:0
  1408.  
  1409. D/AEE/AED ( 132): p 3 poll events 1 revents 0
  1410.  
  1411. D/AEE/AED ( 132): not know revents:0
  1412.  
  1413. D/AEE/AED ( 132): p 4 poll events 1 revents 0
  1414.  
  1415. D/AEE/AED ( 132): not know revents:0
  1416.  
  1417. I/ServiceManager( 124): service 'SurfaceFlinger' died
  1418.  
  1419. D/IPCThreadState( 5063): [DN #5] BR_DEAD_BINDER cookie 0xb72f2ca8
  1420.  
  1421. W/SurfaceComposerClient( 5063): ComposerService remote (surfaceflinger) died [0xb72f2ca8]
  1422.  
  1423. D/BootAnimation( 5063): [BootAnimation binderDied 172]start
  1424.  
  1425. D/BootAnimation( 5063): SurfaceFlinger died, exiting...
  1426.  
  1427. I/ServiceManager( 124): service 'media.audio_flinger' died
  1428.  
  1429. I/ServiceManager( 124): service 'media.player' died
  1430.  
  1431. I/ServiceManager( 124): service 'memory.dumper' died
  1432.  
  1433. I/AKMD2 ( 5152): AK8963/B for Android v20110826 (Library: v3.1.0.1012) started.
  1434.  
  1435. I/AKMD2 ( 5152): Debug: ON
  1436.  
  1437. I/AKMD2 ( 5152): Debug level: 4
  1438.  
  1439. I/AKMD2 ( 5152): Output to: LOGD
  1440.  
  1441. I/AKMD2 ( 5152): AK8963/B for Android end (-2).
  1442.  
  1443. D/ADB_SERVICES( 190): recv: CNXN 01000000 00001000 0007 host::
  1444.  
  1445. D/ADB_SERVICES( 190): adb: online
  1446.  
  1447. D/ADB_SERVICES( 190): Calling send_connect
  1448.  
  1449. W/ADB_SERVICES( 190): create_local_service_socket() name=shell:export ANDROID_LOG_TAGS="" ; exec logcat -f D:\\log.txt
  1450.  
  1451. W/ADB_SERVICES( 190): service_to_fd() name=shell:export ANDROID_LOG_TAGS="" ; exec logcat -f D:\\log.txt
  1452.  
  1453. W/ADB_SERVICES( 190): read_meminfo() mem_free=303880
  1454.  
  1455. W/ADB_SERVICES( 190): create_subprocess() ret_fd=17 pid=5153
  1456.  
  1457. W/ADB_SERVICES( 190): LS(3): bound to 'shell:export ANDROID_LOG_TAGS="" ; exec logcat -f D:\\log.txt' via 17
  1458.  
  1459. D/ADB_SERVICES( 190): adb local_socket_ready list (17)
  1460.  
  1461. W/ADB_SERVICES( 5153): adb: unable to open /proc/5153/oom_adj
  1462.  
  1463. D/ADB_SERVICES( 190): adb socket read list (17)
  1464.  
  1465. D/ADB_SERVICES( 190): read_data=27
  1466.  
  1467. D/ADB_SERVICES( 190): max_read_time=0.000085 max_send_time=0.000048
  1468.  
  1469. D/ADB_SERVICES( 190): closing because is_eof=1 r=1 s->fde.force_eof=0
  1470.  
  1471. W/ADB_SERVICES( 190): entered. LS(3) fd=17
  1472.  
  1473. I/Netd ( 5154): Netd 1.0 starting
  1474.  
  1475. W/InterfaceController( 5154): Warning (dlopen failed: library "/system/lib/libnetcmdiface.so" not found) while opening the net interface command library
  1476.  
  1477. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1478.  
  1479. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1480.  
  1481. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1482.  
  1483. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1484.  
  1485. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1486.  
  1487. I/SurfaceFlinger( 5155): [int main(int, char**)] set surfaceflinger is in root user, adjust caps for its thread
  1488.  
  1489. I/SurfaceFlinger( 5155): SurfaceFlinger is starting
  1490.  
  1491. I/SurfaceFlinger( 5155): SurfaceFlinger's main thread ready to run. Initializing graphics H/W...
  1492.  
  1493. W/linker ( 5157): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  1494.  
  1495. D/libEGL ( 5155): loaded /system/lib/egl/libEGL_mali.so
  1496.  
  1497. D/libEGL ( 5155): loaded /system/lib/egl/libGLESv1_CM_mali.so
  1498.  
  1499. D/libEGL ( 5155): loaded /system/lib/egl/libGLESv2_mali.so
  1500.  
  1501. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1502.  
  1503. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1504.  
  1505. W/linker ( 5156): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  1506.  
  1507. E/cutils-trace( 5155): Error opening trace file: No such file or directory (2)
  1508.  
  1509. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1510.  
  1511. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1512.  
  1513. I/[MALI][Gralloc]( 5155): dlopen libsec_mem.so fail
  1514.  
  1515. I/gralloc ( 5155): [Gralloc] refreshRate = 0, info.pixclock = ffffffff
  1516.  
  1517. I/gralloc ( 5155): [Gralloc] info.upper_margin = ffffffff, info.lower_margin = ffffffff
  1518.  
  1519. I/gralloc ( 5155): [Gralloc] info.yres = 356, info.hsync_len = ffffffff
  1520.  
  1521. I/gralloc ( 5155): [Gralloc] info.left_margin = ffffffff, info.right_margin = ffffffff
  1522.  
  1523. I/[MALI][Gralloc]( 5155): ro_dpi: 210.000000
  1524.  
  1525. I/[MALI][Gralloc]( 5155): using (fd=20)
  1526.  
  1527. I/[MALI][Gralloc]( 5155): id = mtkfb
  1528.  
  1529. I/[MALI][Gralloc]( 5155): xres = 480 px
  1530.  
  1531. I/[MALI][Gralloc]( 5155): yres = 854 px
  1532.  
  1533. I/[MALI][Gralloc]( 5155): xres_virtual = 480 px
  1534.  
  1535. I/[MALI][Gralloc]( 5155): yres_virtual = 2562 px
  1536.  
  1537. I/[MALI][Gralloc]( 5155): bpp = 32
  1538.  
  1539. I/[MALI][Gralloc]( 5155): r = 16:8
  1540.  
  1541. I/[MALI][Gralloc]( 5155): g = 8:8
  1542.  
  1543. I/[MALI][Gralloc]( 5155): b = 0:8
  1544.  
  1545. I/[MALI][Gralloc]( 5155): width = 58 mm (210.206894 dpi)
  1546.  
  1547. I/[MALI][Gralloc]( 5155): height = 103 mm (210.598053 dpi)
  1548.  
  1549. I/[MALI][Gralloc]( 5155): refresh rate = 60.00 Hz
  1550.  
  1551. I/[MALI][Gralloc]( 5155): init_framebuffer va: 0xb57c0000 mva: 0x9f400000
  1552.  
  1553. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1554.  
  1555. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1556.  
  1557. I/hwcomposer( 5155): [DPY] Display Information:
  1558.  
  1559. I/hwcomposer( 5155): [DPY] # fo devices : 1
  1560.  
  1561. I/hwcomposer( 5155): [DPY] -----------------------------
  1562.  
  1563. I/hwcomposer( 5155): [DPY] Device id : 0
  1564.  
  1565. I/hwcomposer( 5155): [DPY] Width : 480
  1566.  
  1567. I/hwcomposer( 5155): [DPY] Height : 854
  1568.  
  1569. I/hwcomposer( 5155): [DPY] xdpi : 210.000000
  1570.  
  1571. I/hwcomposer( 5155): [DPY] ydpi : 210.000000
  1572.  
  1573. I/hwcomposer( 5155): [DPY] vsync : 1
  1574.  
  1575. I/hwcomposer( 5155): [DPY] refresh : 16233766
  1576.  
  1577. I/hwcomposer( 5155): [DPY] connected : 1
  1578.  
  1579. I/hwcomposer( 5155): [DPY] subtype : 0
  1580.  
  1581. W/hwcomposer( 5155): [EVENT] HW VSync State(1)
  1582.  
  1583. W/hwcomposer( 5155): [EVENT] Start to listen uevent, addr.nl_pid(5155)
  1584.  
  1585. I/hwcomposer( 5155): [WKR] Set priority to RR: 268435543
  1586.  
  1587. I/hwcomposer( 5155): [WKR] Set priority to RR: 268435543
  1588.  
  1589. I/hwcomposer( 5155): [WKR] Set priority to RR: 268435543
  1590.  
  1591. I/SurfaceFlinger( 5155): Using composer version 1.2
  1592.  
  1593. I/hwcomposer( 5155): [HWC] getConfigs Display(0)
  1594.  
  1595. I/hwcomposer( 5155): [HWC] getAttributes Display(0)
  1596.  
  1597. I/hwcomposer( 5155): [HWC] getConfigs Display(1)
  1598.  
  1599. I/hwcomposer( 5155): [HWC] getAttributes Display(1)
  1600.  
  1601. E/hwcomposer( 5155): [HWC] Failed to get display attributes (dpy=1 is not connected)
  1602.  
  1603. I/SurfaceFlinger( 5155): EGL informations:
  1604.  
  1605. I/SurfaceFlinger( 5155): vendor : Android
  1606.  
  1607. I/SurfaceFlinger( 5155): version : 1.4 Android META-EGL
  1608.  
  1609. I/SurfaceFlinger( 5155): extensions: EGL_KHR_get_all_proc_addresses EGL_ANDROID_presentation_time EGL_KHR_image EGL_KHR_image_base EGL_KHR_image_pixmap EGL_KHR_gl_texture_2D_image EGL_KHR_gl_texture_cubemap_image EGL_KHR_gl_renderbuffer_image EGL_KHR_fence_sync EGL_EXT_create_context_robustness EGL_ANDROID_image_native_buffer EGL_ANDROID_recordable
  1610.  
  1611. I/SurfaceFlinger( 5155): Client API: OpenGL_ES
  1612.  
  1613. I/SurfaceFlinger( 5155): EGLSurface: 8-8-8-8, config=0x60000014
  1614.  
  1615. E/ ( 5155): appName=/system/bin/surfaceflinger, acAppName=/system/bin/surfaceflinger
  1616.  
  1617. E/ ( 5155): 1
  1618.  
  1619. I/hwcomposer( 5155): [WKR] Set priority to RR: 268435543
  1620.  
  1621. I/hwcomposer( 5155): [WKR] Set priority to RR: 268435543
  1622.  
  1623. E/ ( 5155): appName=/system/bin/surfaceflinger, acAppName=/system/bin/surfaceflinger
  1624.  
  1625. E/ ( 5155): 1
  1626.  
  1627. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1628.  
  1629. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1630.  
  1631. I/SurfaceFlinger( 5155): OpenGL ES informations:
  1632.  
  1633. I/SurfaceFlinger( 5155): vendor : ARM
  1634.  
  1635. I/SurfaceFlinger( 5155): renderer : Mali-400 MP
  1636.  
  1637. I/SurfaceFlinger( 5155): version : OpenGL ES 2.0
  1638.  
  1639. I/SurfaceFlinger( 5155): extensions: GL_EXT_debug_marker GL_OES_texture_npot GL_OES_compressed_ETC1_RGB8_texture GL_OES_standard_derivatives GL_OES_EGL_image GL_OES_depth24 GL_ARM_rgba8 GL_ARM_mali_shader_binary GL_OES_depth_texture GL_OES_packed_depth_stencil GL_EXT_texture_format_BGRA8888 GL_OES_vertex_half_float GL_EXT_blend_minmax GL_OES_EGL_image_external GL_OES_EGL_sync GL_OES_rgb8_rgba8 GL_EXT_multisampled_render_to_texture GL_EXT_discard_framebuffer GL_OES_get_program_binary GL_ARM_mali_program_binary GL_EXT_shader_texture_lod GL_EXT_robustness GL_OES_depth_texture_cube_map GL_KHR_debug
  1640.  
  1641. I/SurfaceFlinger( 5155): GL_MAX_TEXTURE_SIZE = 4096
  1642.  
  1643. I/SurfaceFlinger( 5155): GL_MAX_VIEWPORT_DIMS = 4096
  1644.  
  1645. I/SurfaceFlinger( 5155): [void android::SurfaceFlinger::setMTKProperties(android::String8&)]
  1646.  
  1647. I/SurfaceFlinger( 5155): ========================================================================
  1648.  
  1649. I/SurfaceFlinger( 5155): [AOSP part]
  1650.  
  1651. I/SurfaceFlinger( 5155): debug.sf.showupdates (mDebugRegion): 0
  1652.  
  1653. I/SurfaceFlinger( 5155): debug.sf.ddms (mDebugDDMS): 0
  1654.  
  1655. I/SurfaceFlinger( 5155): [MTK SF part]
  1656.  
  1657. I/SurfaceFlinger( 5155): ro.sf.hwrotation (mHwRotation): 0
  1658.  
  1659. I/SurfaceFlinger( 5155): debug.sf.busyswap (mBusySwap): 1
  1660.  
  1661. I/SurfaceFlinger( 5155): debug.sf.log_repaint (mLogRepaint): 0
  1662.  
  1663. I/SurfaceFlinger( 5155): debug.sf.log_buffer (mLogBuffer): 0
  1664.  
  1665. I/SurfaceFlinger( 5155): debug.sf.log_transaction (mLogTransaction): 0
  1666.  
  1667. I/SurfaceFlinger( 5155): debug.sf.line_g3d (mLineG3D): 0
  1668.  
  1669. I/SurfaceFlinger( 5155): debug.sf.line_ss (mLineScreenShot): 0
  1670.  
  1671. I/SurfaceFlinger( 5155): debug.sf.slowmotion (mDelayTime): 0
  1672.  
  1673. I/SurfaceFlinger( 5155): debug.sf.contbufsenable (mContBufsDump): 0
  1674.  
  1675. I/SurfaceFlinger( 5155): [MTK GUI part]
  1676.  
  1677. I/SurfaceFlinger( 5155): debug.bq.line: 0
  1678.  
  1679. I/SurfaceFlinger( 5155): debug.st.line: 0
  1680.  
  1681. I/SurfaceFlinger( 5155): ========================================================================
  1682.  
  1683. I/SurfaceFlinger( 5155):
  1684.  
  1685. I/BufferQueue( 5155): [unnamed-5155-0](this:0xb784f2d8,id:0,api:0,p:-1,c:-1) BufferQueue
  1686.  
  1687. I/GLConsumer( 5155): [void android::RingBuffer<TYPE>::resize(uint32_t, bool) [with TYPE = android::sp<android::BackupBuffer>; uint32_t = unsigned int]] 0xb784f984 resize to 10 (force=true)
  1688.  
  1689. I/GLConsumer( 5155): [void android::RingBuffer<TYPE>::resize(uint32_t, bool) [with TYPE = android::sp<android::BackupBuffer>; uint32_t = unsigned int]] 0xb784f984 resize to 0 (force=false)
  1690.  
  1691. I/BufferQueue( 5155): [unnamed-5155-0](this:0xb784f2d8,id:0,api:0,p:-1,c:5155) consumerConnect consumer=(5155:/system/bin/surfaceflinger) controlledByApp=false
  1692.  
  1693. I/BufferQueue( 5155): [unnamed-5155-0](this:0xb784f2d8,id:0,api:0,p:-1,c:5155) setConsumerName: unnamed-5155-0
  1694.  
  1695. I/BufferQueue( 5155): [FrameBufferSurface_0](this:0xb784f2d8,id:0,api:0,p:-1,c:5155) setConsumerName: FrameBufferSurface_0
  1696.  
  1697. I/BufferQueue( 5155): [FrameBufferSurface_0](this:0xb784f2d8,id:0,api:0,p:-1,c:5155) setDefaultBufferSize: w=480, h=854
  1698.  
  1699. I/BufferQueue( 5155): [FrameBufferSurface_0](this:0xb784f2d8,id:0,api:0,p:5155,c:5155) connect: api=1 producer=(5155:/system/bin/surfaceflinger) producerControlledByApp=false
  1700.  
  1701. I/BufferQueue( 5155): [FrameBufferSurface_0](this:0xb784f2d8,id:0,api:1,p:5155,c:5155) new GraphicBuffer needed
  1702.  
  1703. D/BufferQueue( 5155): [OLD] gb:NULL
  1704.  
  1705. I/[MALI][Gralloc]( 5155): alloc_framebuffer va: 0xb57c0000 mva: 0x9f400000
  1706.  
  1707. I/GraphicBuffer( 5155): allocate buffer (w:480 h:854 f:1) handle(0xb7854290) err(0)
  1708.  
  1709. I/BufferQueue( 5155): [NEW] gb=0xb7854188, handle=0xb7854290, w=480, h=854, s=480, fmt=1
  1710.  
  1711. D/BufferQueue( 5155): [FrameBufferSurface_0](this:0xb784f2d8,id:0,api:1,p:5155,c:5155) cancelBuffer: slot=0
  1712.  
  1713. I/MaliEGL ( 5155): [Mali]window_type=1, is_framebuffer=1, errnum = 0
  1714.  
  1715. I/MaliEGL ( 5155): [Mali]surface->num_buffers=3, surface->num_frames=3, win_min_undequeued=1
  1716.  
  1717. I/MaliEGL ( 5155): [Mali]max_allowed_dequeued_buffers=2
  1718.  
  1719. I/BufferQueue( 5155): [FrameBufferSurface_0](this:0xb784f2d8,id:0,api:1,p:5155,c:5155) setBufferCount: count=3
  1720.  
  1721. I/BufferQueue( 5155): [FrameBufferSurface_0](this:0xb784f2d8,id:0,api:1,p:5155,c:5155) getReleasedBuffers: returning mask 0xffffffff
  1722.  
  1723. I/GraphicBuffer( 5155): free buffer (w:480 h:854 f:1) handle(0xb7854290)
  1724.  
  1725. I/SurfaceFlinger( 5155): [setProjection] clear DisplayDevice(type:0) dirty region while booting
  1726.  
  1727. I/BufferQueue( 5155): [FrameBufferSurface_0](this:0xb784f2d8,id:0,api:1,p:5155,c:5155) new GraphicBuffer needed
  1728.  
  1729. D/BufferQueue( 5155): [OLD] gb:NULL
  1730.  
  1731. I/[MALI][Gralloc]( 5155): alloc_framebuffer va: 0xb57c0000 mva: 0x9f400000
  1732.  
  1733. I/GraphicBuffer( 5155): allocate buffer (w:480 h:854 f:1) handle(0xb78551a8) err(0)
  1734.  
  1735. I/BufferQueue( 5155): [NEW] gb=0xb78545a8, handle=0xb78551a8, w=480, h=854, s=480, fmt=1
  1736.  
  1737. I/SurfaceFlinger( 5155): set priority to RR:268435540
  1738.  
  1739. I/SurfaceFlinger( 5155): [android::SFWatchDog::SFWatchDog()]
  1740.  
  1741. I/SurfaceFlinger( 5155): [virtual void android::SFWatchDog::onFirstRef()]
  1742.  
  1743. I/SurfaceFlinger( 5155): [uint32_t android::SFWatchDog::registerNodeName(const char*)] name=SurfaceFlinger, index=0
  1744.  
  1745. I/SurfaceFlinger( 5155): [virtual android::status_t android::SFWatchDog::readyToRun()]
  1746.  
  1747. I/SurfaceFlinger( 5155): EventThread Client Pid (5155) created
  1748.  
  1749. I/SurfaceFlinger( 5155): [void android::SurfaceFlinger::checkEnableBootAnim()] boot reason = '0'
  1750.  
  1751. I/boot ( 5155): mBootAnimationEnabled = 1
  1752.  
  1753. I/boot ( 5155): BOOTPROF:BootAnimation:Start:212334
  1754.  
  1755. D/SurfaceFlinger( 5155): Screen acquired, type=0 flinger=0xb7835578
  1756.  
  1757. I/hwcomposer( 5155): [HWC] Blank(0) Display(0)
  1758.  
  1759. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1760.  
  1761. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1762.  
  1763. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1764.  
  1765. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1766.  
  1767. I/SurfaceFlinger( 5155): Blur.initialize. minification:19, blurRadius:5, useHighPrecision:0
  1768.  
  1769. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1770.  
  1771. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1772.  
  1773. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1774.  
  1775. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1776.  
  1777. I/SurfaceFlinger( 5155): Skip composition for [Built-in Screen (type:0)] since dirtyRegion is empty
  1778.  
  1779. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1780.  
  1781. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1782.  
  1783. W/linker ( 5183): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  1784.  
  1785. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1786.  
  1787. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1788.  
  1789. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1790.  
  1791. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1792.  
  1793. D/BootAnimation( 5183): [BootAnimation frameworks/base/cmds/bootanimation/bootanimation_main.cpp main 41]start Jan 5 2015 19:01:52
  1794.  
  1795. D/BootAnimation( 5183): [BootAnimation main 52]noBootAnimation=0
  1796.  
  1797. D/BootAnimation( 5183): [BootAnimation main 76]setBoot=1,sePaly=1,setRotated=0
  1798.  
  1799. D/BootAnimation( 5183): [BootAnimation main 82]nVolume=-1
  1800.  
  1801. D/BootAnimation( 5183): before new BootAnimation...
  1802.  
  1803. D/BootAnimation( 5183): [BootAnimation main 96]before new BootAnimation...
  1804.  
  1805. D/BootAnimation( 5183): [BootAnimation frameworks/base/cmds/bootanimation/BootAnimation.cpp BootAnimation 122]
  1806.  
  1807. I/mediaserver( 5157): ServiceManager: 0xb743ae70
  1808.  
  1809. I/AudioFlinger( 5157): Using default 3000 mSec as standby time.
  1810.  
  1811. D/MediaPlayerService( 5157): MediaPlayerService created
  1812.  
  1813. V/MemoryDumper( 5157): Instantiate memory dumper service...
  1814.  
  1815. V/MemoryDumper( 5157): MemoryDumper created, dump file=/sdcard/memstatus_5157
  1816.  
  1817. I/CameraService( 5157): CameraService started (pid=5157)
  1818.  
  1819. D/CameraService( 5157): CameraService::onFirstRef
  1820.  
  1821. D/BootAnimation( 5183): [BootAnimation BootAnimation 138]bBootOrShutDown=1,bPlayMP3=1,bShutRotate=0
  1822.  
  1823. D/BootAnimation( 5183): [BootAnimation onFirstRef 153]start
  1824.  
  1825. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1826.  
  1827. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1828.  
  1829. D/BootAnimation( 5183): [BootAnimation onFirstRef 162]end
  1830.  
  1831. D/BootAnimation( 5183): joinThreadPool...
  1832.  
  1833. D/BootAnimation( 5183): [BootAnimation main 99]before joinThreadPool...
  1834.  
  1835. D/BootAnimation( 5183): [BootAnimation readyToRun 490]open bootanimation.zip, ms=212434
  1836.  
  1837. D/BootAnimation( 5183): access resource (/system/media/bootanimation.zip) success, break
  1838.  
  1839. D/BootAnimation( 5183): animation file path: /system/media/bootanimation.zip
  1840.  
  1841. D/BootAnimation( 5183): [BootAnimation readyToRun 497]after check bootanimation.zip,mAndroidAnimation=0, ms=212434
  1842.  
  1843. D/BootAnimation( 5183): [BootAnimation readyToRun 521]end
  1844.  
  1845. D/BootAnimation( 5183): [BootAnimation threadLoop 527]start
  1846.  
  1847. D/BootAnimation( 5183): enter threadLoop()
  1848.  
  1849. D/BootAnimation( 5183): access resource (/system/media/bootaudio.mp3) success, break
  1850.  
  1851. D/BootAnimation( 5183): bBootOrShutDown lifen: 1
  1852.  
  1853. D/BootAnimation( 5183): sound file path: /system/media/bootaudio.mp3
  1854.  
  1855. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1856.  
  1857. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1858.  
  1859. I/IspDrv ( 5157): {IspDrv} [IspDrvImp] getpid[0x00001425],gettid[0x00001425]
  1860.  
  1861. D/MtkCam/module( 5157): [instantiate_camera_module]
  1862.  
  1863.  
  1864. D/MtkCam/Utils/Property( 5157): [clear] pid/tid=5157/5157
  1865.  
  1866.  
  1867. I/CameraService( 5157): Loaded "MediaTek Camera Module" camera module
  1868.  
  1869. D/MtkCam/MtkCamUtils( 5157): [CamDevMetaInfoMap::clear] pid/tid=5157/5157
  1870.  
  1871.  
  1872. D/SensorHal( 5157): [getInstance][SensorHalImp] getInstance
  1873.  
  1874. D/SensorHal( 5157): [createImp][createImp]: 0
  1875.  
  1876. D/SeninfDrvImp( 5157): [getInstance][getInstance]
  1877.  
  1878. D/SeninfDrvImp( 5157): [SeninfDrvImp][SeninfDrvImp]
  1879.  
  1880. D/SeninfDrvImp( 5157): [init][init]: 0
  1881.  
  1882. I/IspDrv ( 5157): {IspDrv} [getInstance] Gdma: 0.
  1883.  
  1884. I/IspDrv ( 5157): {IspDrv} [init] +,mInitCount(0),m_fgIsGdmaMode(0)
  1885.  
  1886. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] mpIspDrvRegMap malloc:(0-th) ===> [start-->now: 0.032000 ms]
  1887.  
  1888. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] 1st open(ISP_DRV_DEV_NAME, O_RDWR):(1-th) ===> [start-->now: 0.146000 ms] [last-->now: 0.114000 ms]
  1889.  
  1890. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] mpIspHwRegAddr mmap():(2-th) ===> [start-->now: 0.256000 ms] [last-->now: 0.110000 ms]
  1891.  
  1892. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pRTBufTbl mmap():(3-th) ===> [start-->now: 0.327000 ms] [last-->now: 0.071000 ms]
  1893.  
  1894. I/IspDrv ( 5157): {IspDrv} [reset] ISP SW RESET[0x0000000e]
  1895.  
  1896. I/IspDrv ( 5157): {IspDrv} [init] ISP Global Count: 1.
  1897.  
  1898. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] kRefCntCtrl and ISP reset():(4-th) ===> [start-->now: 0.526000 ms] [last-->now: 0.199000 ms]
  1899.  
  1900. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] IMemDrv::createInstance():(5-th) ===> [start-->now: 0.580000 ms] [last-->now: 0.054000 ms]
  1901.  
  1902. I/Drv/IMem( 5157): Drv/IMem[init] open ion id(17).
  1903.  
  1904. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->init():(6-th) ===> [start-->now: 1.029000 ms] [last-->now: 0.449000 ms]
  1905.  
  1906. I/IspDrv ( 5157): {IspDrv} [init] m_ispVirRegBufInfo.size(2097156)
  1907.  
  1908. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->allocVirtBuf(m_ispVirRegBufInfo):(7-th) ===> [start-->now: 2.044000 ms] [last-->now: 1.015000 ms]
  1909.  
  1910. I/Drv/IMem( 5157): Drv/IMem[mapPhyAddr] mID(0x12),S(0x200004),V(xb51c6000),P(0x40000),S/C(0/0)
  1911.  
  1912. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->mapPhyAddr():(8-th) ===> [start-->now: 2.260000 ms] [last-->now: 0.216000 ms]
  1913.  
  1914. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(mpIspVirRegBuffer):(9-th) ===> [start-->now: 3.664000 ms] [last-->now: 1.404000 ms]
  1915.  
  1916. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->allocVirtBuf(m_ispCQDescBufInfo):(10-th) ===> [start-->now: 3.911000 ms] [last-->now: 0.247000 ms]
  1917.  
  1918. I/Drv/IMem( 5157): Drv/IMem[mapPhyAddr] mID(0x13),S(0x818),V(xb51c5000),P(0x280000),S/C(0/0)
  1919.  
  1920. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->mapPhyAddr(m_ispCQDescBufInfo):(11-th) ===> [start-->now: 4.095000 ms] [last-->now: 0.184000 ms]
  1921.  
  1922. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memcpy(mpIspCQDescriptorVirt[i]):(12-th) ===> [start-->now: 4.125000 ms] [last-->now: 0.030000 ms]
  1923.  
  1924. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(mpIspCQDescriptorVirt[CQ0C]):(13-th) ===> [start-->now: 4.142000 ms] [last-->now: 0.017000 ms]
  1925.  
  1926. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(tdriMgrInfoCq1):(14-th) ===> [start-->now: 4.155000 ms] [last-->now: 0.013000 ms]
  1927.  
  1928. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(tdriMgrInfoCq2):(15-th) ===> [start-->now: 4.168000 ms] [last-->now: 0.013000 ms]
  1929.  
  1930. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] atomic_inc:(16-th) ===> [start-->now: 4.182000 ms] [last-->now: 0.014000 ms]
  1931.  
  1932. I/IspDrv ( 5157): {IspDrv} [init] -,ret(1),mInitCount(1)
  1933.  
  1934. I/IspDrv ( 5157): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] Exit:(17-th) ===> [start-->now: 4.201000 ms] [last-->now: 0.019000 ms]
  1935.  
  1936. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1937.  
  1938. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1939.  
  1940. D/SeninfDrvImp( 5157): [init][init]: X
  1941.  
  1942. D/SeninfDrvImp( 5157): [setTg1PhaseCounter][setTg1PhaseCounter] pcEn(1) clkPol(1)
  1943.  
  1944. D/ImgSensorDrv( 5157): [impSearchSensor]SENSOR search start
  1945.  
  1946. D/ImgSensorDrv( 5157): [impSearchSensor][impSearchSensor] m_fdSensor = 20
  1947.  
  1948. D/ImgSensorDrv( 5157): [impSearchSensor]impSearchSensor search to sub
  1949.  
  1950. D/ImgSensorDrv( 5157): [impSearchSensor]set sensor driver id =10000
  1951.  
  1952. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1953.  
  1954. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1955.  
  1956. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1957.  
  1958. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1959.  
  1960. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1961.  
  1962. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1963.  
  1964. W/linker ( 5156): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  1965.  
  1966. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1967.  
  1968. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1969.  
  1970. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1971.  
  1972. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1973.  
  1974. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1975.  
  1976. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1977.  
  1978. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1979.  
  1980. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1981.  
  1982. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1983.  
  1984. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1985.  
  1986. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1987.  
  1988. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1989.  
  1990. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1991.  
  1992. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1993.  
  1994. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1995.  
  1996. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  1997.  
  1998. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  1999.  
  2000. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2001.  
  2002. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2003.  
  2004. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2005.  
  2006. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2007.  
  2008. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2009.  
  2010. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2011.  
  2012. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2013.  
  2014. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2015.  
  2016. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2017.  
  2018. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2019.  
  2020. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2021.  
  2022. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2023.  
  2024. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2025.  
  2026. D/AndroidRuntime( 5156):
  2027.  
  2028. D/AndroidRuntime( 5156): >>>>>> AndroidRuntime START com.android.internal.os.ZygoteInit <<<<<<
  2029.  
  2030. D/AndroidRuntime( 5156): CheckJNI is OFF
  2031.  
  2032. D/AndroidRuntime( 5156): language=-Duser.language=en region=-Duser.region=UK
  2033.  
  2034. D/dalvikvm( 5156): boot class :
  2035.  
  2036. D/dalvikvm( 5156): (0) core.jar
  2037.  
  2038. D/dalvikvm( 5156): (1) conscrypt.jar
  2039.  
  2040. D/dalvikvm( 5156): (2) okhttp.jar
  2041.  
  2042. D/dalvikvm( 5156): (3) core-junit.jar
  2043.  
  2044. D/dalvikvm( 5156): (4) bouncycastle.jar
  2045.  
  2046. D/dalvikvm( 5156): (5) ext.jar
  2047.  
  2048. D/dalvikvm( 5156): (6) framework.jar
  2049.  
  2050. D/dalvikvm( 5156): (7) framework2.jar
  2051.  
  2052. D/dalvikvm( 5156): (8) telephony-common.jar
  2053.  
  2054. D/dalvikvm( 5156): (9) voip-common.jar
  2055.  
  2056. D/dalvikvm( 5156): (10) mms-common.jar
  2057.  
  2058. D/dalvikvm( 5156): (11) android.policy.jar
  2059.  
  2060. D/dalvikvm( 5156): (12) services.jar
  2061.  
  2062. D/dalvikvm( 5156): (13) apache-xml.jar
  2063.  
  2064. D/dalvikvm( 5156): (14) webviewchromium.jar
  2065.  
  2066. D/dalvikvm( 5156): (15) mediatek-common.jar
  2067.  
  2068. D/dalvikvm( 5156): (16) mediatek-framework.jar
  2069.  
  2070. D/dalvikvm( 5156): (17) CustomProperties.jar
  2071.  
  2072. D/dalvikvm( 5156): (18) mediatek-telephony-common.jar
  2073.  
  2074. D/dalvikvm( 5156): (19) mediatek-tablet.jar
  2075.  
  2076. D/dalvikvm( 5156): (20) immr_framework.jar
  2077.  
  2078. D/dalvikvm( 5156): (21) am.jar
  2079.  
  2080. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2081.  
  2082. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2083.  
  2084. D/dalvikvm( 5156): threadid=1: interp stack at 0x579ad000
  2085.  
  2086. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/core.jar /data/dalvik-cache/system@framework@core.jar@classes.dex
  2087.  
  2088. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/conscrypt.jar /data/dalvik-cache/system@framework@conscrypt.jar@classes.dex
  2089.  
  2090. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/okhttp.jar /data/dalvik-cache/system@framework@okhttp.jar@classes.dex
  2091.  
  2092. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/core-junit.jar /data/dalvik-cache/system@framework@core-junit.jar@classes.dex
  2093.  
  2094. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/bouncycastle.jar /data/dalvik-cache/system@framework@bouncycastle.jar@classes.dex
  2095.  
  2096. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2097.  
  2098. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2099.  
  2100. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/ext.jar /data/dalvik-cache/system@framework@ext.jar@classes.dex
  2101.  
  2102. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/framework.jar /data/dalvik-cache/system@framework@framework.jar@classes.dex
  2103.  
  2104. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/framework2.jar /data/dalvik-cache/system@framework@framework2.jar@classes.dex
  2105.  
  2106. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/telephony-common.jar /data/dalvik-cache/system@framework@telephony-common.jar@classes.dex
  2107.  
  2108. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/voip-common.jar /data/dalvik-cache/system@framework@voip-common.jar@classes.dex
  2109.  
  2110. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/mms-common.jar /data/dalvik-cache/system@framework@mms-common.jar@classes.dex
  2111.  
  2112. D/ImgSensorDrv( 5157): [impSearchSensor][impSearchSensor] Err-ctrlCode (I/O error)
  2113.  
  2114. D/ImgSensorDrv( 5157): [getCurrentSensorType][getCurrentSensorType]
  2115.  
  2116. D/ImgSensorDrv( 5157): [getInfo][getInfo]
  2117.  
  2118. D/ImgSensorDrv( 5157): [getSocketPosition][getSocketPosition]:[1][1]
  2119.  
  2120. D/ImgSensorDrv( 5157): [impSearchSensor]sensor ID mismatch
  2121.  
  2122. D/ImgSensorDrv( 5157): [impSearchSensor]set sensor driver id =10001
  2123.  
  2124. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/android.policy.jar /data/dalvik-cache/system@framework@android.policy.jar@classes.dex
  2125.  
  2126. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2127.  
  2128. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2129.  
  2130. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/services.jar /data/dalvik-cache/system@framework@services.jar@classes.dex
  2131.  
  2132. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/apache-xml.jar /data/dalvik-cache/system@framework@apache-xml.jar@classes.dex
  2133.  
  2134. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/webviewchromium.jar /data/dalvik-cache/system@framework@webviewchromium.jar@classes.dex
  2135.  
  2136. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/mediatek-common.jar /data/dalvik-cache/system@framework@mediatek-common.jar@classes.dex
  2137.  
  2138. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/mediatek-framework.jar /data/dalvik-cache/system@framework@mediatek-framework.jar@classes.dex
  2139.  
  2140. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/CustomProperties.jar /data/dalvik-cache/system@framework@CustomProperties.jar@classes.dex
  2141.  
  2142. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/mediatek-telephony-common.jar /data/dalvik-cache/system@framework@mediatek-telephony-common.jar@classes.dex
  2143.  
  2144. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/mediatek-tablet.jar /data/dalvik-cache/system@framework@mediatek-tablet.jar@classes.dex
  2145.  
  2146. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/immr_framework.jar /data/dalvik-cache/system@framework@immr_framework.jar@classes.dex
  2147.  
  2148. D/dalvikvm( 5156): Unable to stat classpath element '/data/app/com.miui.sdk-1.apk'
  2149.  
  2150. D/dalvikvm( 5156): Unable to stat classpath element '/data/app/com.miui.sdk-2.apk'
  2151.  
  2152. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2153.  
  2154. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2155.  
  2156. D/dalvikvm( 5156): open_cached_dex_file : /system/app/miui.apk /data/dalvik-cache/system@app@miui.apk@classes.dex
  2157.  
  2158. D/dalvikvm( 5156): Unable to stat classpath element '/data/app/com.miui.framework-1.apk'
  2159.  
  2160. D/dalvikvm( 5156): Unable to stat classpath element '/data/app/com.miui.framework-2.apk'
  2161.  
  2162. D/dalvikvm( 5156): open_cached_dex_file : /system/app/MiuiFramework.apk /data/dalvik-cache/system@app@MiuiFramework.apk@classes.dex
  2163.  
  2164. D/dalvikvm( 5156): process bootclasspath ex!!
  2165.  
  2166. D/dalvikvm( 5156): open_cached_dex_file : /system/framework/mediatek-op.jar /data/dalvik-cache/system@framework@mediatek-op.jar@classes.dex
  2167.  
  2168. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2169.  
  2170. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2171.  
  2172. D/dalvikvm( 5156): Trying to load lib libjavacore.so 0x0
  2173.  
  2174. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2175.  
  2176. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2177.  
  2178. D/dalvikvm( 5156): Added shared lib libjavacore.so 0x0
  2179.  
  2180. E/ICU ( 5156): Couldn't open '/system/usr/icu/icudt51l.dat': No such file or directory
  2181.  
  2182. F/libc ( 5156): Fatal signal 6 (SIGABRT) at 0x00001424 (code=-6), thread 5156 (zygote)
  2183.  
  2184. D/AEE/AED ( 132): $===AEE===AEE===AEE===$
  2185.  
  2186. D/AEE/AED ( 132): p 0 poll events 1 revents 0
  2187.  
  2188. D/AEE/AED ( 132): not know revents:0
  2189.  
  2190. D/AEE/AED ( 132): p 1 poll events 1 revents 0
  2191.  
  2192. D/AEE/AED ( 132): not know revents:0
  2193.  
  2194. D/AEE/AED ( 132): p 2 poll events 1 revents 1
  2195.  
  2196. D/AEE/AED ( 132): aed_main_fork_worker: generator 0x39c0d0, worker 0xbe81a828, recv_fd 15
  2197.  
  2198. D/AEE/AED ( 132): p 3 poll events 1 revents 0
  2199.  
  2200. D/AEE/AED ( 132): not know revents:0
  2201.  
  2202. D/AEE/AED ( 132): p 4 poll events 1 revents 0
  2203.  
  2204. D/AEE/AED ( 132): not know revents:0
  2205.  
  2206. I/DEBUG ( 5222): handle_request(15)
  2207.  
  2208. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2209.  
  2210. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2211.  
  2212. I/DEBUG ( 5222): check process 5156 name:zygote
  2213.  
  2214. I/DEBUG ( 5222): tid 5156 abort msg address is:0
  2215.  
  2216. I/DEBUG ( 5222): BOOM: pid=5156 uid=0 gid=0 tid=5156
  2217.  
  2218. I/DEBUG ( 5222): [OnPurpose Redunant in preset_info] pid: 5156, tid: 5156, name: zygote >>> zygote <<<
  2219.  
  2220. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2221.  
  2222. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2223.  
  2224. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2225.  
  2226. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2227.  
  2228. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2229.  
  2230. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2231.  
  2232. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2233.  
  2234. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2235.  
  2236. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2237.  
  2238. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2239.  
  2240. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2241.  
  2242. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2243.  
  2244. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2245.  
  2246. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2247.  
  2248. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2249.  
  2250. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2251.  
  2252. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2253.  
  2254. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2255.  
  2256. D/ImgSensorDrv( 5157): [impSearchSensor][impSearchSensor] Err-ctrlCode (I/O error)
  2257.  
  2258. D/ImgSensorDrv( 5157): [getCurrentSensorType][getCurrentSensorType]
  2259.  
  2260. D/ImgSensorDrv( 5157): [getInfo][getInfo]
  2261.  
  2262. D/ImgSensorDrv( 5157): [getSocketPosition][getSocketPosition]:[1][1]
  2263.  
  2264. D/ImgSensorDrv( 5157): [impSearchSensor]sensor ID mismatch
  2265.  
  2266. D/ImgSensorDrv( 5157): [impSearchSensor]set sensor driver id =10002
  2267.  
  2268. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2269.  
  2270. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2271.  
  2272. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2273.  
  2274. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2275.  
  2276. I/DEBUG ( 5222): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
  2277.  
  2278. I/DEBUG ( 5222): Build fingerprint: 'alps/lcsh92_wet_jb9/lcsh92_wet_jb9:4.4.2/KOT49H/:user/release-keys'
  2279.  
  2280. I/DEBUG ( 5222): pid: 5156, tid: 5156, name: zygote >>> zygote <<<
  2281.  
  2282. I/DEBUG ( 5222): signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
  2283.  
  2284. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2285.  
  2286. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2287.  
  2288. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2289.  
  2290. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2291.  
  2292. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2293.  
  2294. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2295.  
  2296. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2297.  
  2298. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2299.  
  2300. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2301.  
  2302. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2303.  
  2304. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2305.  
  2306. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2307.  
  2308. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2309.  
  2310. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2311.  
  2312. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2313.  
  2314. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2315.  
  2316. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2317.  
  2318. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2319.  
  2320. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2321.  
  2322. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2323.  
  2324. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2325.  
  2326. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2327.  
  2328. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2329.  
  2330. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2331.  
  2332. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2333.  
  2334. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2335.  
  2336. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2337.  
  2338. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2339.  
  2340. I/DEBUG ( 5222): r0 00000000 r1 00001424 r2 00000006 r3 00000000
  2341.  
  2342. I/DEBUG ( 5222): r4 00000006 r5 00000002 r6 00001424 r7 0000010c
  2343.  
  2344. I/DEBUG ( 5222): r8 40194bc8 r9 41974e98 sl 5b109fa7 fp 41a3b128
  2345.  
  2346. I/DEBUG ( 5222): ip 4196fb48 sp bee3fb68 lr 401442b1 pc 401531f4 cpsr 00070010
  2347.  
  2348. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2349.  
  2350. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2351.  
  2352. I/DEBUG ( 5222):
  2353.  
  2354. I/DEBUG ( 5222): backtrace:
  2355.  
  2356. I/DEBUG ( 5222): #00 pc 000261f4 /system/lib/libc.so (tgkill+12)
  2357.  
  2358. I/DEBUG ( 5222): #01 pc 000172ad /system/lib/libc.so (pthread_kill+48)
  2359.  
  2360. I/DEBUG ( 5222): #02 pc 000174c1 /system/lib/libc.so (raise+10)
  2361.  
  2362. I/DEBUG ( 5222): #03 pc 000161f5 /system/lib/libc.so
  2363.  
  2364. I/DEBUG ( 5222): #04 pc 00025aa4 /system/lib/libc.so (abort+4)
  2365.  
  2366. I/DEBUG ( 5222): #05 pc 00015ab7 /system/lib/libjavacore.so (register_libcore_icu_ICU(_JNIEnv*)+242)
  2367.  
  2368. I/DEBUG ( 5222): #06 pc 0000e553 /system/lib/libjavacore.so (JNI_OnLoad+190)
  2369.  
  2370. I/DEBUG ( 5222): #07 pc 000523c1 /system/lib/libdvm.so (dvmLoadNativeCode(char const*, Object*, char**)+516)
  2371.  
  2372. I/DEBUG ( 5222): #08 pc 00047911 /system/lib/libdvm.so
  2373.  
  2374. I/DEBUG ( 5222): #09 pc 0004950d /system/lib/libdvm.so (dvmStartup(int, char const* const*, bool, _JNIEnv*)+6444)
  2375.  
  2376. I/DEBUG ( 5222): #10 pc 0004fdbd /system/lib/libdvm.so (JNI_CreateJavaVM+596)
  2377.  
  2378. I/DEBUG ( 5222): #11 pc 00002d79 /system/lib/libnativehelper.so (JniInvocation::JNI_CreateJavaVM(_JavaVM**, _JNIEnv**, void*)+10)
  2379.  
  2380. I/DEBUG ( 5222): #12 pc 0004ff7f /system/lib/libandroid_runtime.so (android::AndroidRuntime::startVm(_JavaVM**, _JNIEnv**)+1814)
  2381.  
  2382. I/DEBUG ( 5222): #13 pc 0005025d /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, char const*)+176)
  2383.  
  2384. I/DEBUG ( 5222): #14 pc 0000105b /system/bin/app_process
  2385.  
  2386. I/DEBUG ( 5222): #15 pc 0000f31c /system/lib/libc.so (__libc_init+100)
  2387.  
  2388. I/DEBUG ( 5222): #16 pc 00000d7c /system/bin/app_process
  2389.  
  2390. I/DEBUG ( 5222):
  2391.  
  2392. I/DEBUG ( 5222): stack:
  2393.  
  2394. I/DEBUG ( 5222): bee3fb28 41a38940 /system/lib/libdvm.so
  2395.  
  2396. I/DEBUG ( 5222): bee3fb2c 6066a047
  2397.  
  2398. I/DEBUG ( 5222): bee3fb30 41977aa8
  2399.  
  2400. I/DEBUG ( 5222): bee3fb34 00000000
  2401.  
  2402. I/DEBUG ( 5222): bee3fb38 41977e14
  2403.  
  2404. I/DEBUG ( 5222): bee3fb3c 41a5d178 /dev/ashmem/dalvik-zygote (deleted)
  2405.  
  2406. I/DEBUG ( 5222): bee3fb40 579dffa4 /dev/ashmem/dalvik-LinearAlloc (deleted)
  2407.  
  2408. I/DEBUG ( 5222): bee3fb44 579dffa4 /dev/ashmem/dalvik-LinearAlloc (deleted)
  2409.  
  2410. I/DEBUG ( 5222): bee3fb48 41977f88
  2411.  
  2412. I/DEBUG ( 5222): bee3fb4c 41a0c4f9 /system/lib/libdvm.so (dexParameterIteratorInit(DexParameterIterator*, DexProto const*)+18)
  2413.  
  2414. I/DEBUG ( 5222): bee3fb50 41a5d178 /dev/ashmem/dalvik-zygote (deleted)
  2415.  
  2416. I/DEBUG ( 5222): bee3fb54 bee3fbb0 [stack]
  2417.  
  2418. I/DEBUG ( 5222): bee3fb58 5bc170f0 /system/lib/libjavacore.so
  2419.  
  2420. I/DEBUG ( 5222): bee3fb5c 419e78d3 /system/lib/libdvm.so
  2421.  
  2422. I/DEBUG ( 5222): bee3fb60 bee3fb70 [stack]
  2423.  
  2424. I/DEBUG ( 5222): bee3fb64 bee3fb83 [stack]
  2425.  
  2426. I/DEBUG ( 5222): #00 bee3fb68 00000006
  2427.  
  2428. I/DEBUG ( 5222): bee3fb6c 00000002
  2429.  
  2430. I/DEBUG ( 5222): bee3fb70 00001424
  2431.  
  2432. I/DEBUG ( 5222): bee3fb74 4196fb48
  2433.  
  2434. I/DEBUG ( 5222): bee3fb78 4196fb48
  2435.  
  2436. I/DEBUG ( 5222): bee3fb7c 401442b1 /system/lib/libc.so (pthread_kill+52)
  2437.  
  2438. I/DEBUG ( 5222): #01 bee3fb80 00000006
  2439.  
  2440. I/DEBUG ( 5222): bee3fb84 00000000
  2441.  
  2442. I/DEBUG ( 5222): bee3fb88 ffffffff
  2443.  
  2444. I/DEBUG ( 5222): bee3fb8c 401444c5 /system/lib/libc.so (raise+14)
  2445.  
  2446. I/DEBUG ( 5222): #02 bee3fb90 bee3fb9c [stack]
  2447.  
  2448. I/DEBUG ( 5222): bee3fb94 401431f9 /system/lib/libc.so
  2449.  
  2450. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2451.  
  2452. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2453.  
  2454. I/DEBUG ( 5222):
  2455.  
  2456. I/DEBUG ( 5222): memory near r1:
  2457.  
  2458. I/DEBUG ( 5222): 00001404 ffffffff ffffffff ffffffff ffffffff
  2459.  
  2460. I/DEBUG ( 5222): 00001414 ffffffff ffffffff ffffffff ffffffff
  2461.  
  2462. I/DEBUG ( 5222): 00001424 ffffffff ffffffff ffffffff ffffffff
  2463.  
  2464. I/DEBUG ( 5222): 00001434 ffffffff ffffffff ffffffff ffffffff
  2465.  
  2466. I/DEBUG ( 5222): 00001444 ffffffff ffffffff ffffffff ffffffff
  2467.  
  2468. I/DEBUG ( 5222): 00001454 ffffffff ffffffff ffffffff ffffffff
  2469.  
  2470. I/DEBUG ( 5222): 00001464 ffffffff ffffffff ffffffff ffffffff
  2471.  
  2472. I/DEBUG ( 5222): 00001474 ffffffff ffffffff ffffffff ffffffff
  2473.  
  2474. I/DEBUG ( 5222): 00001484 ffffffff ffffffff ffffffff ffffffff
  2475.  
  2476. I/DEBUG ( 5222): 00001494 ffffffff ffffffff ffffffff ffffffff
  2477.  
  2478. I/DEBUG ( 5222): 000014a4 ffffffff ffffffff ffffffff ffffffff
  2479.  
  2480. I/DEBUG ( 5222): 000014b4 ffffffff ffffffff ffffffff ffffffff
  2481.  
  2482. I/DEBUG ( 5222): 000014c4 ffffffff ffffffff ffffffff ffffffff
  2483.  
  2484. I/DEBUG ( 5222): 000014d4 ffffffff ffffffff ffffffff ffffffff
  2485.  
  2486. I/DEBUG ( 5222): 000014e4 ffffffff ffffffff ffffffff ffffffff
  2487.  
  2488. I/DEBUG ( 5222): 000014f4 ffffffff ffffffff ffffffff ffffffff
  2489.  
  2490. I/DEBUG ( 5222):
  2491.  
  2492. I/DEBUG ( 5222): memory near r6:
  2493.  
  2494. I/DEBUG ( 5222): 00001404 ffffffff ffffffff ffffffff ffffffff
  2495.  
  2496. I/DEBUG ( 5222): 00001414 ffffffff ffffffff ffffffff ffffffff
  2497.  
  2498. I/DEBUG ( 5222): 00001424 ffffffff ffffffff ffffffff ffffffff
  2499.  
  2500. I/DEBUG ( 5222): 00001434 ffffffff ffffffff ffffffff ffffffff
  2501.  
  2502. I/DEBUG ( 5222): 00001444 ffffffff ffffffff ffffffff ffffffff
  2503.  
  2504. I/DEBUG ( 5222): 00001454 ffffffff ffffffff ffffffff ffffffff
  2505.  
  2506. I/DEBUG ( 5222): 00001464 ffffffff ffffffff ffffffff ffffffff
  2507.  
  2508. I/DEBUG ( 5222): 00001474 ffffffff ffffffff ffffffff ffffffff
  2509.  
  2510. I/DEBUG ( 5222): 00001484 ffffffff ffffffff ffffffff ffffffff
  2511.  
  2512. I/DEBUG ( 5222): 00001494 ffffffff ffffffff ffffffff ffffffff
  2513.  
  2514. I/DEBUG ( 5222): 000014a4 ffffffff ffffffff ffffffff ffffffff
  2515.  
  2516. I/DEBUG ( 5222): 000014b4 ffffffff ffffffff ffffffff ffffffff
  2517.  
  2518. I/DEBUG ( 5222): 000014c4 ffffffff ffffffff ffffffff ffffffff
  2519.  
  2520. I/DEBUG ( 5222): 000014d4 ffffffff ffffffff ffffffff ffffffff
  2521.  
  2522. I/DEBUG ( 5222): 000014e4 ffffffff ffffffff ffffffff ffffffff
  2523.  
  2524. I/DEBUG ( 5222): 000014f4 ffffffff ffffffff ffffffff ffffffff
  2525.  
  2526. I/DEBUG ( 5222):
  2527.  
  2528. I/DEBUG ( 5222): memory near r8:
  2529.  
  2530. I/DEBUG ( 5222): 40194ba8 00001000 00001000 00010000 00200000
  2531.  
  2532. I/DEBUG ( 5222): 40194bb8 00000003 40157c48 bee40964 bee40a0f
  2533.  
  2534. I/DEBUG ( 5222): 40194bc8 1e265dda bee4091c 00000000 40114d20
  2535.  
  2536. I/DEBUG ( 5222): 40194bd8 00000007 00000008 00000000 40115184
  2537.  
  2538. I/DEBUG ( 5222): 40194be8 00000000 4134d000 00000009 0000000a
  2539.  
  2540. I/DEBUG ( 5222): 40194bf8 00000000 00000000 00000000 00000000
  2541.  
  2542. I/DEBUG ( 5222): 40194c08 00000000 00000000 00000000 00000000
  2543.  
  2544. I/DEBUG ( 5222): 40194c18 00000000 00000000 00000000 00000000
  2545.  
  2546. I/DEBUG ( 5222): 40194c28 00000000 00000000 00000000 00000000
  2547.  
  2548. I/DEBUG ( 5222): 40194c38 00000000 00000000 00000000 00000000
  2549.  
  2550. I/DEBUG ( 5222): 40194c48 00000000 00000000 00000000 00000000
  2551.  
  2552. I/DEBUG ( 5222): 40194c58 00000000 00000000 00000000 00000000
  2553.  
  2554. I/DEBUG ( 5222): 40194c68 00000000 00000000 00000000 00000000
  2555.  
  2556. I/DEBUG ( 5222): 40194c78 00000000 00000000 00000000 00000000
  2557.  
  2558. I/DEBUG ( 5222): 40194c88 00000000 00000000 00000000 00000000
  2559.  
  2560. I/DEBUG ( 5222): 40194c98 00000000 00000000 00000000 00000000
  2561.  
  2562. I/DEBUG ( 5222):
  2563.  
  2564. I/DEBUG ( 5222): memory near r9:
  2565.  
  2566. I/DEBUG ( 5222): 41974e78 bee3ff48 bee3ff34 402cc49e 00000000
  2567.  
  2568. I/DEBUG ( 5222): 41974e88 00000000 00000000 00000000 00000023
  2569.  
  2570. I/DEBUG ( 5222): 41974e98 41a3137c 00000000 00000001 41977aa8
  2571.  
  2572. I/DEBUG ( 5222): 41974ea8 00000000 00000000 00000000 00000013
  2573.  
  2574. I/DEBUG ( 5222): 41974eb8 0000002e 00000000 00000000 0000002b
  2575.  
  2576. I/DEBUG ( 5222): 41974ec8 7379732f 2f6d6574 6d617266 726f7765
  2577.  
  2578. I/DEBUG ( 5222): 41974ed8 656d2f6b 74616964 6f2d6b65 616a2e70
  2579.  
  2580. I/DEBUG ( 5222): 41974ee8 00000072 00000013 65726f63 72616a2e
  2581.  
  2582. I/DEBUG ( 5222): 41974ef8 00000000 0000001b 736e6f63 70797263
  2583.  
  2584. I/DEBUG ( 5222): 41974f08 616a2e74 00000072 00000000 00000013
  2585.  
  2586. I/DEBUG ( 5222): 41974f18 74686b6f 6a2e7074 00007261 0000001b
  2587.  
  2588. I/DEBUG ( 5222): 41974f28 65726f63 6e756a2d 6a2e7469 00007261
  2589.  
  2590. I/DEBUG ( 5222): 41974f38 00000000 0000001b 6e756f62 61637963
  2591.  
  2592. I/DEBUG ( 5222): 41974f48 656c7473 72616a2e 00000000 00000013
  2593.  
  2594. I/DEBUG ( 5222): 41974f58 2e747865 0072616a 00000000 0000001b
  2595.  
  2596. I/DEBUG ( 5222): 41974f68 6d617266 726f7765 616a2e6b 00000072
  2597.  
  2598. I/DEBUG ( 5222):
  2599.  
  2600. I/DEBUG ( 5222): memory near sl:
  2601.  
  2602. I/DEBUG ( 5222): 5b109f84 63617661 2e65726f 00006f73 7461502f
  2603.  
  2604. I/DEBUG ( 5222): 5b109f94 0000001b 7379732f 2f6d6574 2f727375
  2605.  
  2606. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2607.  
  2608. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2609.  
  2610. I/DEBUG ( 5222): 5b109fa4 00756369 746e4965 00000031 726f466c
  2611.  
  2612. I/DEBUG ( 5222): 5b109fb4 3b74616d 62617400 00000021 3b786564
  2613.  
  2614. I/DEBUG ( 5222): 5b109fc4 00000000 00000000 00000011 00000000
  2615.  
  2616. I/DEBUG ( 5222): 5b109fd4 00000000 00000030 0000001a 5b0fb000
  2617.  
  2618. I/DEBUG ( 5222): 5b109fe4 0000f000 59eebfe0 00000001 00000000
  2619.  
  2620. I/DEBUG ( 5222): 5b109ff4 00000007 00000007 00000007 0a796564
  2621.  
  2622. I/DEBUG ( 5222): 5b10a004 00363330 00000028 00022090 000220b8
  2623.  
  2624. I/DEBUG ( 5222): 5b10a014 0000036c 00022428 00003c00 00000000
  2625.  
  2626. I/DEBUG ( 5222): 5b10a024 aba5d33e 0a786564 00353330 dfc59663
  2627.  
  2628. I/DEBUG ( 5222): 5b10a034 46292994 fb5698cd 090babaf 9aab2356
  2629.  
  2630. I/DEBUG ( 5222): 5b10a044 58a797ba 00022090 00000070 12345678
  2631.  
  2632. I/DEBUG ( 5222): 5b10a054 00000000 00000000 00021fc0 000006c5
  2633.  
  2634. I/DEBUG ( 5222): 5b10a064 00000070 00000082 00001b84 000000bf
  2635.  
  2636. I/DEBUG ( 5222): 5b10a074 00001d8c 00000259 00002680 00000257
  2637.  
  2638. I/DEBUG ( 5222):
  2639.  
  2640. I/DEBUG ( 5222): memory near fp:
  2641.  
  2642. I/DEBUG ( 5222): 41a3b108 41978000 41a3b004 41a339d0 41a3b22c
  2643.  
  2644. I/DEBUG ( 5222): 41a3b118 40118eb8 00000001 41978000 00000100
  2645.  
  2646. I/DEBUG ( 5222): 41a3b128 6a62696c 63617661 2e65726f 00006f73
  2647.  
  2648. I/DEBUG ( 5222): 41a3b138 00000000 00000000 00000000 00000000
  2649.  
  2650. I/DEBUG ( 5222): 41a3b148 00000000 00000000 00000000 00000000
  2651.  
  2652. I/DEBUG ( 5222): 41a3b158 00000000 00000000 00000000 00000000
  2653.  
  2654. I/DEBUG ( 5222): 41a3b168 00000000 00000000 00000000 00000000
  2655.  
  2656. I/DEBUG ( 5222): 41a3b178 00000000 00000000 00000000 00000000
  2657.  
  2658. I/DEBUG ( 5222): 41a3b188 00000000 00000000 00000000 00000000
  2659.  
  2660. I/DEBUG ( 5222): 41a3b198 00000000 00000000 00000000 00000000
  2661.  
  2662. I/DEBUG ( 5222): 41a3b1a8 5bbec034 00000008 00000000 5bbec000
  2663.  
  2664. I/DEBUG ( 5222): 41a3b1b8 00034000 00000000 5bc1d690 00000000
  2665.  
  2666. I/DEBUG ( 5222): 41a3b1c8 00000000 00000000 00000001 5bbeed88
  2667.  
  2668. I/DEBUG ( 5222): 41a3b1d8 5bbec148 00000209 000002c4 5bbf3478
  2669.  
  2670. I/DEBUG ( 5222): 41a3b1e8 5bbf3c9c 5bc1d8a4 5bbf75dc 000001d4
  2671.  
  2672. I/DEBUG ( 5222): 41a3b1f8 5bbf47ac 000005c6 00000000 00000000
  2673.  
  2674. I/DEBUG ( 5222):
  2675.  
  2676. I/DEBUG ( 5222): memory near ip:
  2677.  
  2678. I/DEBUG ( 5222): 4196fb28 00000000 00000000 00000000 00000000
  2679.  
  2680. I/DEBUG ( 5222): 4196fb38 00000000 00000000 00000000 00000000
  2681.  
  2682. I/DEBUG ( 5222): 4196fb48 7379732f 2f6d6574 2f727375 2f756369
  2683.  
  2684. I/DEBUG ( 5222): 4196fb58 64756369 6c313574 7461642e 00000000
  2685.  
  2686. I/DEBUG ( 5222): 4196fb68 65676465 6d6f7266 68746170 766c6c2e
  2687.  
  2688. I/DEBUG ( 5222): 4196fb78 6f72706d 756f2e66 00000074 00000000
  2689.  
  2690. I/DEBUG ( 5222): 4196fb88 65676465 6d6f7266 68746170 766c6c2e
  2691.  
  2692. I/DEBUG ( 5222): 4196fb98 6f72706d 756f2e66 00000074 00000000
  2693.  
  2694. I/DEBUG ( 5222): 4196fba8 4196fbc8 00000000 00000000 00000000
  2695.  
  2696. I/DEBUG ( 5222): 4196fbb8 00000000 00000000 00000000 00000000
  2697.  
  2698. I/DEBUG ( 5222): 4196fbc8 4196fbe8 00000000 00000000 00000000
  2699.  
  2700. I/DEBUG ( 5222): 4196fbd8 00000000 00000000 00000000 00000000
  2701.  
  2702. I/DEBUG ( 5222): 4196fbe8 4196fc08 00000000 00000000 00000000
  2703.  
  2704. I/DEBUG ( 5222): 4196fbf8 00000000 00000000 00000000 00000000
  2705.  
  2706. I/DEBUG ( 5222): 4196fc08 4196fc28 00000000 00000000 00000000
  2707.  
  2708. I/DEBUG ( 5222): 4196fc18 00000000 00000000 00000000 00000000
  2709.  
  2710. I/DEBUG ( 5222):
  2711.  
  2712. I/DEBUG ( 5222): memory near sp:
  2713.  
  2714. I/DEBUG ( 5222): bee3fb48 41977f88 41a0c4f9 41a5d178 bee3fbb0
  2715.  
  2716. I/DEBUG ( 5222): bee3fb58 5bc170f0 419e78d3 bee3fb70 bee3fb83
  2717.  
  2718. I/DEBUG ( 5222): bee3fb68 00000006 00000002 00001424 4196fb48
  2719.  
  2720. I/DEBUG ( 5222): bee3fb78 4196fb48 401442b1 00000006 00000000
  2721.  
  2722. I/DEBUG ( 5222): bee3fb88 ffffffff 401444c5 bee3fb9c 401431f9
  2723.  
  2724. I/DEBUG ( 5222): bee3fb98 0000001f ffffffdf bee3fc44 1e265dda
  2725.  
  2726. I/DEBUG ( 5222): bee3fba8 bee3fc44 bee3fc44 00000000 bee3fc44
  2727.  
  2728. I/DEBUG ( 5222): bee3fbb8 00000000 40152aa8 4012896d 5bc01abb
  2729.  
  2730. I/DEBUG ( 5222): bee3fbc8 40183998 00000011 579e00bc 59aa9438
  2731.  
  2732. I/DEBUG ( 5222): bee3fbd8 00000003 00000003 00000000 41a5d178
  2733.  
  2734. I/DEBUG ( 5222): bee3fbe8 5bc1711f 5bc1710c 5bc1ea00 00000002
  2735.  
  2736. I/DEBUG ( 5222): bee3fbf8 579e00a8 41a5d178 579e00a8 bee3fc2c
  2737.  
  2738. I/DEBUG ( 5222): bee3fc08 5bc1711f 419c3035 00000000 419c7897
  2739.  
  2740. I/DEBUG ( 5222): bee3fc18 1ea00005 5bc17080 00000003 5bc1e9e8
  2741.  
  2742. I/DEBUG ( 5222): bee3fc28 00000001 bee3fc44 5bc17080 419c3035
  2743.  
  2744. I/DEBUG ( 5222): bee3fc38 1ea00005 419c3f99 41974e98 4196fb68
  2745.  
  2746. I/DEBUG ( 5222):
  2747.  
  2748. I/DEBUG ( 5222): code around pc:
  2749.  
  2750. I/DEBUG ( 5222): 401531d4 e8bd00f0 e3700a01 912fff1e e2600000
  2751.  
  2752. I/DEBUG ( 5222): 401531e4 ea00b702 e92d50f0 e3a07f43 ef000000
  2753.  
  2754. I/DEBUG ( 5222): 401531f4 e8bd50f0 e3700a01 912fff1e e2600000
  2755.  
  2756. I/DEBUG ( 5222): 40153204 ea00b6fa e92d50f0 e3a070ee ef000000
  2757.  
  2758. I/DEBUG ( 5222): 40153214 e8bd50f0 e3700a01 912fff1e e2600000
  2759.  
  2760. I/DEBUG ( 5222): 40153224 ea00b6f2 00000000 00000000 e92d400f
  2761.  
  2762. I/DEBUG ( 5222): 40153234 e1a03000 e1a00001 e1a01003 eb000040
  2763.  
  2764. I/DEBUG ( 5222): 40153244 e8bd400f e12fff1e e320f000 e92d403f
  2765.  
  2766. I/DEBUG ( 5222): 40153254 e2522040 ba00002c e1a05001 e2455c01
  2767.  
  2768. I/DEBUG ( 5222): 40153264 f5d5f000 f5d5f040 f5d5f080 f5d5f0c0
  2769.  
  2770. I/DEBUG ( 5222): 40153274 e2411040 e2400040 e1a05000 e1a04001
  2771.  
  2772. I/DEBUG ( 5222): 40153284 f424020d f424420d f405022d f405422d
  2773.  
  2774. I/DEBUG ( 5222): 40153294 e2522040 ba00001c e2411040 e2400040
  2775.  
  2776. I/DEBUG ( 5222): 401532a4 e1a05000 e1a04001 f424020d f424420d
  2777.  
  2778. I/DEBUG ( 5222): 401532b4 f405022d f405422d e2522040 ba000012
  2779.  
  2780. I/DEBUG ( 5222): 401532c4 e2411040 e2400040 e1a05000 e1a04001
  2781.  
  2782. I/DEBUG ( 5222):
  2783.  
  2784. I/DEBUG ( 5222): code around lr:
  2785.  
  2786. I/DEBUG ( 5222): 40144290 447b4b13 42b3e010 4812d10e 44786a1e
  2787.  
  2788. I/DEBUG ( 5222): 401442a0 eb08f7f8 e9d8f00d 46224631 ef9cf00e
  2789.  
  2790. I/DEBUG ( 5222): 401442b0 d00a3001 e00b2400 2b00681b 480ad1eb
  2791.  
  2792. I/DEBUG ( 5222): 401442c0 44782403 eaf6f7f8 f001e002 6804fa1b
  2793.  
  2794. I/DEBUG ( 5222): 401442d0 fa18f001 46206005 bf00bd70 0005095a
  2795.  
  2796. I/DEBUG ( 5222): 401442e0 0005094e 00050946 00050922 bf7ef7ff
  2797.  
  2798. I/DEBUG ( 5222): 401442f0 43f0e92d 4a3d4b3c 589c447b 6823b08b
  2799.  
  2800. I/DEBUG ( 5222): 40144300 460d4606 f0019309 46a1f9fd 8000f8d0
  2801.  
  2802. I/DEBUG ( 5222): 40144310 d0482d00 f00f4628 280ffed5 d8444604
  2803.  
  2804. I/DEBUG ( 5222): 40144320 ffe4f7ff d1064286 4629200f e8a2f00d
  2805.  
  2806. I/DEBUG ( 5222): 40144330 d03c2800 482ee02e f7f84478 482dea3a
  2807.  
  2808. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2809.  
  2810. I/DEBUG ( 5222): 40144340 e0154478 d11342b0 482b6a06 f7f84478
  2811.  
  2812. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2813.  
  2814. I/DEBUG ( 5222): 40144350 4a2aeab2 447a2120 a8014633 e84af015
  2815.  
  2816. I/DEBUG ( 5222): 40144360 a8012101 ef52f021 46061c42 e011d104
  2817.  
  2818. I/DEBUG ( 5222): 40144370 28006800 e02cd1e6 46294630 f00d4622
  2819.  
  2820. I/DEBUG ( 5222): 40144380 1c43e8de d11e4607 f9bcf001 29046801
  2821.  
  2822. D/ImgSensorDrv( 5157): [impSearchSensor][impSearchSensor] Err-ctrlCode (I/O error)
  2823.  
  2824. D/ImgSensorDrv( 5157): [getCurrentSensorType][getCurrentSensorType]
  2825.  
  2826. D/ImgSensorDrv( 5157): [getInfo][getInfo]
  2827.  
  2828. D/ImgSensorDrv( 5157): [getSocketPosition][getSocketPosition]:[1][1]
  2829.  
  2830. D/ImgSensorDrv( 5157): [impSearchSensor]sensor ID mismatch
  2831.  
  2832. D/ImgSensorDrv( 5157): [impSearchSensor]set sensor driver id =10003
  2833.  
  2834. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2835.  
  2836. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2837.  
  2838. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2839.  
  2840. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2841.  
  2842. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2843.  
  2844. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2845.  
  2846. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2847.  
  2848. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2849.  
  2850. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2851.  
  2852. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2853.  
  2854. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2855.  
  2856. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2857.  
  2858. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2859.  
  2860. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2861.  
  2862. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2863.  
  2864. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2865.  
  2866. V/AEE/AED ( 5222): dashboard_record_update() : rec->module = zygote
  2867.  
  2868. D/AEE/AED ( 5222): Skip duplicated exception !
  2869.  
  2870. D/AEE/AED ( 5222): Exception Class: 1
  2871.  
  2872. D/AEE/AED ( 5222): Module: zygote
  2873.  
  2874. D/AEE/AED ( 5222): Count: 39
  2875.  
  2876. D/AEE/AED ( 5222): Last exception time: 1388537664
  2877.  
  2878. D/AEE/AED ( 5222):
  2879.  
  2880. V/AEE/AED ( 5222): aed_ne_session() - skipped
  2881.  
  2882. I/Netd ( 5154): execIptablesCommand android_fork_execvp exit
  2883.  
  2884. I/Netd ( 5154): execIptablesCommand android_fork_execvp enter
  2885.  
  2886. D/AEE/AED ( 132): $===AEE===AEE===AEE===$
  2887.  
  2888. D/AEE/AED ( 132): p 0 poll events 1 revents 0
  2889.  
  2890. D/AEE/AED ( 132): not know revents:0
  2891.  
  2892. D/AEE/AED ( 132): p 1 poll events 1 revents 0
  2893.  
  2894. D/AEE/AED ( 132): not know revents:0
  2895.  
  2896. D/AEE/AED ( 132): p 2 poll events 1 revents 0
  2897.  
  2898. D/AEE/AED ( 132): not know revents:0
  2899.  
  2900. D/AEE/AED ( 132): p 3 poll events 1 revents 0
  2901.  
  2902. D/AEE/AED ( 132): not know revents:0
  2903.  
  2904. D/AEE/AED ( 132): p 4 poll events 1 revents 0
  2905.  
  2906. D/AEE/AED ( 132): not know revents:0
  2907.  
  2908. I/ServiceManager( 124): service 'SurfaceFlinger' died
  2909.  
  2910. D/IPCThreadState( 5183): [DN #5] BR_DEAD_BINDER cookie 0xb8a34ce8
  2911.  
  2912. W/SurfaceComposerClient( 5183): ComposerService remote (surfaceflinger) died [0xb8a34ce8]
  2913.  
  2914. D/BootAnimation( 5183): [BootAnimation binderDied 172]start
  2915.  
  2916. D/BootAnimation( 5183): SurfaceFlinger died, exiting...
  2917.  
  2918. I/ServiceManager( 124): service 'media.audio_flinger' died
  2919.  
  2920. I/ServiceManager( 124): service 'media.player' died
  2921.  
  2922. I/ServiceManager( 124): service 'memory.dumper' died
  2923.  
  2924. I/AKMD2 ( 5263): AK8963/B for Android v20110826 (Library: v3.1.0.1012) started.
  2925.  
  2926. I/AKMD2 ( 5263): Debug: ON
  2927.  
  2928. I/AKMD2 ( 5263): Debug level: 4
  2929.  
  2930. I/AKMD2 ( 5263): Output to: LOGD
  2931.  
  2932. I/AKMD2 ( 5263): AK8963/B for Android end (-2).
  2933.  
  2934. I/Netd ( 5268): Netd 1.0 starting
  2935.  
  2936. W/InterfaceController( 5268): Warning (dlopen failed: library "/system/lib/libnetcmdiface.so" not found) while opening the net interface command library
  2937.  
  2938. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  2939.  
  2940. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  2941.  
  2942. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  2943.  
  2944. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  2945.  
  2946. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  2947.  
  2948. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  2949.  
  2950. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  2951.  
  2952. I/SurfaceFlinger( 5269): [int main(int, char**)] set surfaceflinger is in root user, adjust caps for its thread
  2953.  
  2954. I/SurfaceFlinger( 5269): SurfaceFlinger is starting
  2955.  
  2956. W/linker ( 5271): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  2957.  
  2958. I/SurfaceFlinger( 5269): SurfaceFlinger's main thread ready to run. Initializing graphics H/W...
  2959.  
  2960. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  2961.  
  2962. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  2963.  
  2964. D/libEGL ( 5269): loaded /system/lib/egl/libEGL_mali.so
  2965.  
  2966. D/libEGL ( 5269): loaded /system/lib/egl/libGLESv1_CM_mali.so
  2967.  
  2968. D/libEGL ( 5269): loaded /system/lib/egl/libGLESv2_mali.so
  2969.  
  2970. I/[MALI][Gralloc]( 5269): dlopen libsec_mem.so fail
  2971.  
  2972. I/gralloc ( 5269): [Gralloc] refreshRate = 0, info.pixclock = ffffffff
  2973.  
  2974. I/gralloc ( 5269): [Gralloc] info.upper_margin = ffffffff, info.lower_margin = ffffffff
  2975.  
  2976. I/gralloc ( 5269): [Gralloc] info.yres = 356, info.hsync_len = ffffffff
  2977.  
  2978. I/gralloc ( 5269): [Gralloc] info.left_margin = ffffffff, info.right_margin = ffffffff
  2979.  
  2980. I/[MALI][Gralloc]( 5269): ro_dpi: 210.000000
  2981.  
  2982. I/[MALI][Gralloc]( 5269): using (fd=20)
  2983.  
  2984. I/[MALI][Gralloc]( 5269): id = mtkfb
  2985.  
  2986. I/[MALI][Gralloc]( 5269): xres = 480 px
  2987.  
  2988. I/[MALI][Gralloc]( 5269): yres = 854 px
  2989.  
  2990. I/[MALI][Gralloc]( 5269): xres_virtual = 480 px
  2991.  
  2992. I/[MALI][Gralloc]( 5269): yres_virtual = 2562 px
  2993.  
  2994. I/[MALI][Gralloc]( 5269): bpp = 32
  2995.  
  2996. I/[MALI][Gralloc]( 5269): r = 16:8
  2997.  
  2998. I/[MALI][Gralloc]( 5269): g = 8:8
  2999.  
  3000. I/[MALI][Gralloc]( 5269): b = 0:8
  3001.  
  3002. I/[MALI][Gralloc]( 5269): width = 58 mm (210.206894 dpi)
  3003.  
  3004. I/[MALI][Gralloc]( 5269): height = 103 mm (210.598053 dpi)
  3005.  
  3006. I/[MALI][Gralloc]( 5269): refresh rate = 60.00 Hz
  3007.  
  3008. I/[MALI][Gralloc]( 5269): init_framebuffer va: 0xb57ab000 mva: 0x9f400000
  3009.  
  3010. W/linker ( 5270): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  3011.  
  3012. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3013.  
  3014. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3015.  
  3016. E/cutils-trace( 5269): Error opening trace file: No such file or directory (2)
  3017.  
  3018. I/hwcomposer( 5269): [DPY] Display Information:
  3019.  
  3020. I/hwcomposer( 5269): [DPY] # fo devices : 1
  3021.  
  3022. I/hwcomposer( 5269): [DPY] -----------------------------
  3023.  
  3024. I/hwcomposer( 5269): [DPY] Device id : 0
  3025.  
  3026. I/hwcomposer( 5269): [DPY] Width : 480
  3027.  
  3028. I/hwcomposer( 5269): [DPY] Height : 854
  3029.  
  3030. I/hwcomposer( 5269): [DPY] xdpi : 210.000000
  3031.  
  3032. I/hwcomposer( 5269): [DPY] ydpi : 210.000000
  3033.  
  3034. I/hwcomposer( 5269): [DPY] vsync : 1
  3035.  
  3036. I/hwcomposer( 5269): [DPY] refresh : 16233766
  3037.  
  3038. I/hwcomposer( 5269): [DPY] connected : 1
  3039.  
  3040. I/hwcomposer( 5269): [DPY] subtype : 0
  3041.  
  3042. W/hwcomposer( 5269): [EVENT] HW VSync State(1)
  3043.  
  3044. W/hwcomposer( 5269): [EVENT] Start to listen uevent, addr.nl_pid(5269)
  3045.  
  3046. I/SurfaceFlinger( 5269): Using composer version 1.2
  3047.  
  3048. I/hwcomposer( 5269): [HWC] getConfigs Display(0)
  3049.  
  3050. I/hwcomposer( 5269): [HWC] getAttributes Display(0)
  3051.  
  3052. I/hwcomposer( 5269): [HWC] getConfigs Display(1)
  3053.  
  3054. I/hwcomposer( 5269): [HWC] getAttributes Display(1)
  3055.  
  3056. E/hwcomposer( 5269): [HWC] Failed to get display attributes (dpy=1 is not connected)
  3057.  
  3058. I/SurfaceFlinger( 5269): EGL informations:
  3059.  
  3060. I/SurfaceFlinger( 5269): vendor : Android
  3061.  
  3062. I/SurfaceFlinger( 5269): version : 1.4 Android META-EGL
  3063.  
  3064. I/SurfaceFlinger( 5269): extensions: EGL_KHR_get_all_proc_addresses EGL_ANDROID_presentation_time EGL_KHR_image EGL_KHR_image_base EGL_KHR_image_pixmap EGL_KHR_gl_texture_2D_image EGL_KHR_gl_texture_cubemap_image EGL_KHR_gl_renderbuffer_image EGL_KHR_fence_sync EGL_EXT_create_context_robustness EGL_ANDROID_image_native_buffer EGL_ANDROID_recordable
  3065.  
  3066. I/SurfaceFlinger( 5269): Client API: OpenGL_ES
  3067.  
  3068. I/SurfaceFlinger( 5269): EGLSurface: 8-8-8-8, config=0x60000014
  3069.  
  3070. E/ ( 5269): appName=/system/bin/surfaceflinger, acAppName=/system/bin/surfaceflinger
  3071.  
  3072. E/ ( 5269): 1
  3073.  
  3074. I/hwcomposer( 5269): [WKR] Set priority to RR: 268435543
  3075.  
  3076. I/hwcomposer( 5269): [WKR] Set priority to RR: 268435543
  3077.  
  3078. I/hwcomposer( 5269): [WKR] Set priority to RR: 268435543
  3079.  
  3080. I/hwcomposer( 5269): [WKR] Set priority to RR: 268435543
  3081.  
  3082. E/ ( 5269): appName=/system/bin/surfaceflinger, acAppName=/system/bin/surfaceflinger
  3083.  
  3084. E/ ( 5269): 1
  3085.  
  3086. I/SurfaceFlinger( 5269): OpenGL ES informations:
  3087.  
  3088. I/SurfaceFlinger( 5269): vendor : ARM
  3089.  
  3090. I/SurfaceFlinger( 5269): renderer : Mali-400 MP
  3091.  
  3092. I/SurfaceFlinger( 5269): version : OpenGL ES 2.0
  3093.  
  3094. I/SurfaceFlinger( 5269): extensions: GL_EXT_debug_marker GL_OES_texture_npot GL_OES_compressed_ETC1_RGB8_texture GL_OES_standard_derivatives GL_OES_EGL_image GL_OES_depth24 GL_ARM_rgba8 GL_ARM_mali_shader_binary GL_OES_depth_texture GL_OES_packed_depth_stencil GL_EXT_texture_format_BGRA8888 GL_OES_vertex_half_float GL_EXT_blend_minmax GL_OES_EGL_image_external GL_OES_EGL_sync GL_OES_rgb8_rgba8 GL_EXT_multisampled_render_to_texture GL_EXT_discard_framebuffer GL_OES_get_program_binary GL_ARM_mali_program_binary GL_EXT_shader_texture_lod GL_EXT_robustness GL_OES_depth_texture_cube_map GL_KHR_debug
  3095.  
  3096. I/SurfaceFlinger( 5269): GL_MAX_TEXTURE_SIZE = 4096
  3097.  
  3098. I/SurfaceFlinger( 5269): GL_MAX_VIEWPORT_DIMS = 4096
  3099.  
  3100. I/SurfaceFlinger( 5269): [void android::SurfaceFlinger::setMTKProperties(android::String8&)]
  3101.  
  3102. I/SurfaceFlinger( 5269): ========================================================================
  3103.  
  3104. I/SurfaceFlinger( 5269): [AOSP part]
  3105.  
  3106. I/SurfaceFlinger( 5269): debug.sf.showupdates (mDebugRegion): 0
  3107.  
  3108. I/SurfaceFlinger( 5269): debug.sf.ddms (mDebugDDMS): 0
  3109.  
  3110. I/SurfaceFlinger( 5269): [MTK SF part]
  3111.  
  3112. I/SurfaceFlinger( 5269): ro.sf.hwrotation (mHwRotation): 0
  3113.  
  3114. I/SurfaceFlinger( 5269): debug.sf.busyswap (mBusySwap): 1
  3115.  
  3116. I/SurfaceFlinger( 5269): debug.sf.log_repaint (mLogRepaint): 0
  3117.  
  3118. I/SurfaceFlinger( 5269): debug.sf.log_buffer (mLogBuffer): 0
  3119.  
  3120. I/SurfaceFlinger( 5269): debug.sf.log_transaction (mLogTransaction): 0
  3121.  
  3122. I/SurfaceFlinger( 5269): debug.sf.line_g3d (mLineG3D): 0
  3123.  
  3124. I/SurfaceFlinger( 5269): debug.sf.line_ss (mLineScreenShot): 0
  3125.  
  3126. I/SurfaceFlinger( 5269): debug.sf.slowmotion (mDelayTime): 0
  3127.  
  3128. I/SurfaceFlinger( 5269): debug.sf.contbufsenable (mContBufsDump): 0
  3129.  
  3130. I/SurfaceFlinger( 5269): [MTK GUI part]
  3131.  
  3132. I/SurfaceFlinger( 5269): debug.bq.line: 0
  3133.  
  3134. I/SurfaceFlinger( 5269): debug.st.line: 0
  3135.  
  3136. I/SurfaceFlinger( 5269): ========================================================================
  3137.  
  3138. I/SurfaceFlinger( 5269):
  3139.  
  3140. I/BufferQueue( 5269): [unnamed-5269-0](this:0xb87e5330,id:0,api:0,p:-1,c:-1) BufferQueue
  3141.  
  3142. I/GLConsumer( 5269): [void android::RingBuffer<TYPE>::resize(uint32_t, bool) [with TYPE = android::sp<android::BackupBuffer>; uint32_t = unsigned int]] 0xb87e59b4 resize to 10 (force=true)
  3143.  
  3144. I/GLConsumer( 5269): [void android::RingBuffer<TYPE>::resize(uint32_t, bool) [with TYPE = android::sp<android::BackupBuffer>; uint32_t = unsigned int]] 0xb87e59b4 resize to 0 (force=false)
  3145.  
  3146. I/BufferQueue( 5269): [unnamed-5269-0](this:0xb87e5330,id:0,api:0,p:-1,c:5269) consumerConnect consumer=(5269:/system/bin/surfaceflinger) controlledByApp=false
  3147.  
  3148. I/BufferQueue( 5269): [unnamed-5269-0](this:0xb87e5330,id:0,api:0,p:-1,c:5269) setConsumerName: unnamed-5269-0
  3149.  
  3150. I/BufferQueue( 5269): [FrameBufferSurface_0](this:0xb87e5330,id:0,api:0,p:-1,c:5269) setConsumerName: FrameBufferSurface_0
  3151.  
  3152. I/BufferQueue( 5269): [FrameBufferSurface_0](this:0xb87e5330,id:0,api:0,p:-1,c:5269) setDefaultBufferSize: w=480, h=854
  3153.  
  3154. I/BufferQueue( 5269): [FrameBufferSurface_0](this:0xb87e5330,id:0,api:0,p:5269,c:5269) connect: api=1 producer=(5269:/system/bin/surfaceflinger) producerControlledByApp=false
  3155.  
  3156. I/BufferQueue( 5269): [FrameBufferSurface_0](this:0xb87e5330,id:0,api:1,p:5269,c:5269) new GraphicBuffer needed
  3157.  
  3158. D/BufferQueue( 5269): [OLD] gb:NULL
  3159.  
  3160. I/[MALI][Gralloc]( 5269): alloc_framebuffer va: 0xb57ab000 mva: 0x9f400000
  3161.  
  3162. I/GraphicBuffer( 5269): allocate buffer (w:480 h:854 f:1) handle(0xb87ea2b8) err(0)
  3163.  
  3164. I/BufferQueue( 5269): [NEW] gb=0xb87ea1a0, handle=0xb87ea2b8, w=480, h=854, s=480, fmt=1
  3165.  
  3166. D/BufferQueue( 5269): [FrameBufferSurface_0](this:0xb87e5330,id:0,api:1,p:5269,c:5269) cancelBuffer: slot=0
  3167.  
  3168. I/MaliEGL ( 5269): [Mali]window_type=1, is_framebuffer=1, errnum = 0
  3169.  
  3170. I/MaliEGL ( 5269): [Mali]surface->num_buffers=3, surface->num_frames=3, win_min_undequeued=1
  3171.  
  3172. I/MaliEGL ( 5269): [Mali]max_allowed_dequeued_buffers=2
  3173.  
  3174. I/BufferQueue( 5269): [FrameBufferSurface_0](this:0xb87e5330,id:0,api:1,p:5269,c:5269) setBufferCount: count=3
  3175.  
  3176. I/BufferQueue( 5269): [FrameBufferSurface_0](this:0xb87e5330,id:0,api:1,p:5269,c:5269) getReleasedBuffers: returning mask 0xffffffff
  3177.  
  3178. I/GraphicBuffer( 5269): free buffer (w:480 h:854 f:1) handle(0xb87ea2b8)
  3179.  
  3180. I/SurfaceFlinger( 5269): [setProjection] clear DisplayDevice(type:0) dirty region while booting
  3181.  
  3182. I/BufferQueue( 5269): [FrameBufferSurface_0](this:0xb87e5330,id:0,api:1,p:5269,c:5269) new GraphicBuffer needed
  3183.  
  3184. D/BufferQueue( 5269): [OLD] gb:NULL
  3185.  
  3186. I/[MALI][Gralloc]( 5269): alloc_framebuffer va: 0xb57ab000 mva: 0x9f400000
  3187.  
  3188. I/GraphicBuffer( 5269): allocate buffer (w:480 h:854 f:1) handle(0xb87eb1d0) err(0)
  3189.  
  3190. I/BufferQueue( 5269): [NEW] gb=0xb87ea5d0, handle=0xb87eb1d0, w=480, h=854, s=480, fmt=1
  3191.  
  3192. I/SurfaceFlinger( 5269): set priority to RR:268435540
  3193.  
  3194. I/SurfaceFlinger( 5269): [android::SFWatchDog::SFWatchDog()]
  3195.  
  3196. I/SurfaceFlinger( 5269): [virtual void android::SFWatchDog::onFirstRef()]
  3197.  
  3198. I/SurfaceFlinger( 5269): [uint32_t android::SFWatchDog::registerNodeName(const char*)] name=SurfaceFlinger, index=0
  3199.  
  3200. I/SurfaceFlinger( 5269): [virtual android::status_t android::SFWatchDog::readyToRun()]
  3201.  
  3202. I/SurfaceFlinger( 5269): EventThread Client Pid (5269) created
  3203.  
  3204. I/SurfaceFlinger( 5269): [void android::SurfaceFlinger::checkEnableBootAnim()] boot reason = '0'
  3205.  
  3206. I/boot ( 5269): mBootAnimationEnabled = 1
  3207.  
  3208. I/boot ( 5269): BOOTPROF:BootAnimation:Start:218032
  3209.  
  3210. D/SurfaceFlinger( 5269): Screen acquired, type=0 flinger=0xb87cb578
  3211.  
  3212. I/hwcomposer( 5269): [HWC] Blank(0) Display(0)
  3213.  
  3214. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3215.  
  3216. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3217.  
  3218. I/SurfaceFlinger( 5269): Blur.initialize. minification:19, blurRadius:5, useHighPrecision:0
  3219.  
  3220. I/hwcomposer( 5269): [WKR] Set priority to RR: 268435543
  3221.  
  3222. I/SurfaceFlinger( 5269): Skip composition for [Built-in Screen (type:0)] since dirtyRegion is empty
  3223.  
  3224. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3225.  
  3226. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3227.  
  3228. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3229.  
  3230. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3231.  
  3232. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3233.  
  3234. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3235.  
  3236. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3237.  
  3238. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3239.  
  3240. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3241.  
  3242. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3243.  
  3244. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3245.  
  3246. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3247.  
  3248. W/linker ( 5298): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  3249.  
  3250. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3251.  
  3252. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3253.  
  3254. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3255.  
  3256. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3257.  
  3258. D/BootAnimation( 5298): [BootAnimation frameworks/base/cmds/bootanimation/bootanimation_main.cpp main 41]start Jan 5 2015 19:01:52
  3259.  
  3260. D/BootAnimation( 5298): [BootAnimation main 52]noBootAnimation=0
  3261.  
  3262. D/BootAnimation( 5298): [BootAnimation main 76]setBoot=1,sePaly=1,setRotated=0
  3263.  
  3264. D/BootAnimation( 5298): [BootAnimation main 82]nVolume=-1
  3265.  
  3266. D/BootAnimation( 5298): before new BootAnimation...
  3267.  
  3268. D/BootAnimation( 5298): [BootAnimation main 96]before new BootAnimation...
  3269.  
  3270. D/BootAnimation( 5298): [BootAnimation frameworks/base/cmds/bootanimation/BootAnimation.cpp BootAnimation 122]
  3271.  
  3272. D/BootAnimation( 5298): [BootAnimation BootAnimation 138]bBootOrShutDown=1,bPlayMP3=1,bShutRotate=0
  3273.  
  3274. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3275.  
  3276. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3277.  
  3278. D/BootAnimation( 5298): [BootAnimation onFirstRef 153]start
  3279.  
  3280. D/BootAnimation( 5298): [BootAnimation onFirstRef 162]end
  3281.  
  3282. D/BootAnimation( 5298): joinThreadPool...
  3283.  
  3284. D/BootAnimation( 5298): [BootAnimation main 99]before joinThreadPool...
  3285.  
  3286. D/BootAnimation( 5298): [BootAnimation readyToRun 490]open bootanimation.zip, ms=218155
  3287.  
  3288. D/BootAnimation( 5298): access resource (/system/media/bootanimation.zip) success, break
  3289.  
  3290. D/BootAnimation( 5298): animation file path: /system/media/bootanimation.zip
  3291.  
  3292. D/BootAnimation( 5298): [BootAnimation readyToRun 497]after check bootanimation.zip,mAndroidAnimation=0, ms=218156
  3293.  
  3294. D/BootAnimation( 5298): [BootAnimation readyToRun 521]end
  3295.  
  3296. D/BootAnimation( 5298): [BootAnimation threadLoop 527]start
  3297.  
  3298. D/BootAnimation( 5298): enter threadLoop()
  3299.  
  3300. D/BootAnimation( 5298): access resource (/system/media/bootaudio.mp3) success, break
  3301.  
  3302. D/BootAnimation( 5298): bBootOrShutDown lifen: 1
  3303.  
  3304. D/BootAnimation( 5298): sound file path: /system/media/bootaudio.mp3
  3305.  
  3306. I/ServiceManager( 5298): Waiting for service media.audio_flinger...
  3307.  
  3308. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3309.  
  3310. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3311.  
  3312. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3313.  
  3314. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3315.  
  3316. I/mediaserver( 5271): ServiceManager: 0xb6f6be70
  3317.  
  3318. I/AudioFlinger( 5271): Using default 3000 mSec as standby time.
  3319.  
  3320. D/MediaPlayerService( 5271): MediaPlayerService created
  3321.  
  3322. V/MemoryDumper( 5271): Instantiate memory dumper service...
  3323.  
  3324. V/MemoryDumper( 5271): MemoryDumper created, dump file=/sdcard/memstatus_5271
  3325.  
  3326. I/CameraService( 5271): CameraService started (pid=5271)
  3327.  
  3328. D/CameraService( 5271): CameraService::onFirstRef
  3329.  
  3330. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3331.  
  3332. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3333.  
  3334. I/IspDrv ( 5271): {IspDrv} [IspDrvImp] getpid[0x00001497],gettid[0x00001497]
  3335.  
  3336. D/MtkCam/module( 5271): [instantiate_camera_module]
  3337.  
  3338.  
  3339. D/MtkCam/Utils/Property( 5271): [clear] pid/tid=5271/5271
  3340.  
  3341.  
  3342. I/CameraService( 5271): Loaded "MediaTek Camera Module" camera module
  3343.  
  3344. D/MtkCam/MtkCamUtils( 5271): [CamDevMetaInfoMap::clear] pid/tid=5271/5271
  3345.  
  3346.  
  3347. D/SensorHal( 5271): [getInstance][SensorHalImp] getInstance
  3348.  
  3349. D/SensorHal( 5271): [createImp][createImp]: 0
  3350.  
  3351. D/SeninfDrvImp( 5271): [getInstance][getInstance]
  3352.  
  3353. D/SeninfDrvImp( 5271): [SeninfDrvImp][SeninfDrvImp]
  3354.  
  3355. D/SeninfDrvImp( 5271): [init][init]: 0
  3356.  
  3357. I/IspDrv ( 5271): {IspDrv} [getInstance] Gdma: 0.
  3358.  
  3359. I/IspDrv ( 5271): {IspDrv} [init] +,mInitCount(0),m_fgIsGdmaMode(0)
  3360.  
  3361. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] mpIspDrvRegMap malloc:(0-th) ===> [start-->now: 0.023000 ms]
  3362.  
  3363. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] 1st open(ISP_DRV_DEV_NAME, O_RDWR):(1-th) ===> [start-->now: 0.124000 ms] [last-->now: 0.101000 ms]
  3364.  
  3365. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] mpIspHwRegAddr mmap():(2-th) ===> [start-->now: 0.219000 ms] [last-->now: 0.095000 ms]
  3366.  
  3367. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pRTBufTbl mmap():(3-th) ===> [start-->now: 0.274000 ms] [last-->now: 0.055000 ms]
  3368.  
  3369. I/IspDrv ( 5271): {IspDrv} [reset] ISP SW RESET[0x0000000e]
  3370.  
  3371. I/IspDrv ( 5271): {IspDrv} [init] ISP Global Count: 1.
  3372.  
  3373. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] kRefCntCtrl and ISP reset():(4-th) ===> [start-->now: 0.432000 ms] [last-->now: 0.158000 ms]
  3374.  
  3375. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] IMemDrv::createInstance():(5-th) ===> [start-->now: 0.476000 ms] [last-->now: 0.044000 ms]
  3376.  
  3377. I/Drv/IMem( 5271): Drv/IMem[init] open ion id(17).
  3378.  
  3379. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->init():(6-th) ===> [start-->now: 0.939000 ms] [last-->now: 0.463000 ms]
  3380.  
  3381. I/IspDrv ( 5271): {IspDrv} [init] m_ispVirRegBufInfo.size(2097156)
  3382.  
  3383. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3384.  
  3385. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3386.  
  3387. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->allocVirtBuf(m_ispVirRegBufInfo):(7-th) ===> [start-->now: 1.948000 ms] [last-->now: 1.009000 ms]
  3388.  
  3389. I/Drv/IMem( 5271): Drv/IMem[mapPhyAddr] mID(0x12),S(0x200004),V(xb518d000),P(0x40000),S/C(0/0)
  3390.  
  3391. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->mapPhyAddr():(8-th) ===> [start-->now: 2.187000 ms] [last-->now: 0.239000 ms]
  3392.  
  3393. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(mpIspVirRegBuffer):(9-th) ===> [start-->now: 3.600000 ms] [last-->now: 1.413000 ms]
  3394.  
  3395. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->allocVirtBuf(m_ispCQDescBufInfo):(10-th) ===> [start-->now: 3.828000 ms] [last-->now: 0.228000 ms]
  3396.  
  3397. I/Drv/IMem( 5271): Drv/IMem[mapPhyAddr] mID(0x13),S(0x818),V(xb518c000),P(0x280000),S/C(0/0)
  3398.  
  3399. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->mapPhyAddr(m_ispCQDescBufInfo):(11-th) ===> [start-->now: 4.036000 ms] [last-->now: 0.208000 ms]
  3400.  
  3401. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memcpy(mpIspCQDescriptorVirt[i]):(12-th) ===> [start-->now: 4.067000 ms] [last-->now: 0.031000 ms]
  3402.  
  3403. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(mpIspCQDescriptorVirt[CQ0C]):(13-th) ===> [start-->now: 4.085000 ms] [last-->now: 0.018000 ms]
  3404.  
  3405. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(tdriMgrInfoCq1):(14-th) ===> [start-->now: 4.099000 ms] [last-->now: 0.014000 ms]
  3406.  
  3407. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(tdriMgrInfoCq2):(15-th) ===> [start-->now: 4.113000 ms] [last-->now: 0.014000 ms]
  3408.  
  3409. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] atomic_inc:(16-th) ===> [start-->now: 4.127000 ms] [last-->now: 0.014000 ms]
  3410.  
  3411. I/IspDrv ( 5271): {IspDrv} [init] -,ret(1),mInitCount(1)
  3412.  
  3413. I/IspDrv ( 5271): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] Exit:(17-th) ===> [start-->now: 4.147000 ms] [last-->now: 0.020000 ms]
  3414.  
  3415. D/SeninfDrvImp( 5271): [init][init]: X
  3416.  
  3417. D/SeninfDrvImp( 5271): [setTg1PhaseCounter][setTg1PhaseCounter] pcEn(1) clkPol(1)
  3418.  
  3419. D/ImgSensorDrv( 5271): [impSearchSensor]SENSOR search start
  3420.  
  3421. D/ImgSensorDrv( 5271): [impSearchSensor][impSearchSensor] m_fdSensor = 20
  3422.  
  3423. D/ImgSensorDrv( 5271): [impSearchSensor]impSearchSensor search to sub
  3424.  
  3425. D/ImgSensorDrv( 5271): [impSearchSensor]set sensor driver id =10000
  3426.  
  3427. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3428.  
  3429. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3430.  
  3431. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3432.  
  3433. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3434.  
  3435. W/linker ( 5270): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  3436.  
  3437. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3438.  
  3439. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3440.  
  3441. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3442.  
  3443. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3444.  
  3445. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3446.  
  3447. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3448.  
  3449. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3450.  
  3451. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3452.  
  3453. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3454.  
  3455. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3456.  
  3457. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3458.  
  3459. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3460.  
  3461. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3462.  
  3463. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3464.  
  3465. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3466.  
  3467. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3468.  
  3469. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3470.  
  3471. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3472.  
  3473. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3474.  
  3475. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3476.  
  3477. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3478.  
  3479. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3480.  
  3481. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3482.  
  3483. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3484.  
  3485. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3486.  
  3487. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3488.  
  3489. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3490.  
  3491. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3492.  
  3493. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3494.  
  3495. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3496.  
  3497. D/AndroidRuntime( 5270):
  3498.  
  3499. D/AndroidRuntime( 5270): >>>>>> AndroidRuntime START com.android.internal.os.ZygoteInit <<<<<<
  3500.  
  3501. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3502.  
  3503. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3504.  
  3505. D/AndroidRuntime( 5270): CheckJNI is OFF
  3506.  
  3507. D/AndroidRuntime( 5270): language=-Duser.language=en region=-Duser.region=UK
  3508.  
  3509. D/dalvikvm( 5270): boot class :
  3510.  
  3511. D/dalvikvm( 5270): (0) core.jar
  3512.  
  3513. D/dalvikvm( 5270): (1) conscrypt.jar
  3514.  
  3515. D/dalvikvm( 5270): (2) okhttp.jar
  3516.  
  3517. D/dalvikvm( 5270): (3) core-junit.jar
  3518.  
  3519. D/dalvikvm( 5270): (4) bouncycastle.jar
  3520.  
  3521. D/dalvikvm( 5270): (5) ext.jar
  3522.  
  3523. D/dalvikvm( 5270): (6) framework.jar
  3524.  
  3525. D/dalvikvm( 5270): (7) framework2.jar
  3526.  
  3527. D/dalvikvm( 5270): (8) telephony-common.jar
  3528.  
  3529. D/dalvikvm( 5270): (9) voip-common.jar
  3530.  
  3531. D/dalvikvm( 5270): (10) mms-common.jar
  3532.  
  3533. D/dalvikvm( 5270): (11) android.policy.jar
  3534.  
  3535. D/dalvikvm( 5270): (12) services.jar
  3536.  
  3537. D/dalvikvm( 5270): (13) apache-xml.jar
  3538.  
  3539. D/dalvikvm( 5270): (14) webviewchromium.jar
  3540.  
  3541. D/dalvikvm( 5270): (15) mediatek-common.jar
  3542.  
  3543. D/dalvikvm( 5270): (16) mediatek-framework.jar
  3544.  
  3545. D/dalvikvm( 5270): (17) CustomProperties.jar
  3546.  
  3547. D/dalvikvm( 5270): (18) mediatek-telephony-common.jar
  3548.  
  3549. D/dalvikvm( 5270): (19) mediatek-tablet.jar
  3550.  
  3551. D/dalvikvm( 5270): (20) immr_framework.jar
  3552.  
  3553. D/dalvikvm( 5270): (21) am.jar
  3554.  
  3555. D/dalvikvm( 5270): threadid=1: interp stack at 0x57999000
  3556.  
  3557. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/core.jar /data/dalvik-cache/system@framework@core.jar@classes.dex
  3558.  
  3559. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3560.  
  3561. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3562.  
  3563. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/conscrypt.jar /data/dalvik-cache/system@framework@conscrypt.jar@classes.dex
  3564.  
  3565. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/okhttp.jar /data/dalvik-cache/system@framework@okhttp.jar@classes.dex
  3566.  
  3567. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/core-junit.jar /data/dalvik-cache/system@framework@core-junit.jar@classes.dex
  3568.  
  3569. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/bouncycastle.jar /data/dalvik-cache/system@framework@bouncycastle.jar@classes.dex
  3570.  
  3571. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/ext.jar /data/dalvik-cache/system@framework@ext.jar@classes.dex
  3572.  
  3573. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/framework.jar /data/dalvik-cache/system@framework@framework.jar@classes.dex
  3574.  
  3575. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/framework2.jar /data/dalvik-cache/system@framework@framework2.jar@classes.dex
  3576.  
  3577. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3578.  
  3579. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3580.  
  3581. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/telephony-common.jar /data/dalvik-cache/system@framework@telephony-common.jar@classes.dex
  3582.  
  3583. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/voip-common.jar /data/dalvik-cache/system@framework@voip-common.jar@classes.dex
  3584.  
  3585. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/mms-common.jar /data/dalvik-cache/system@framework@mms-common.jar@classes.dex
  3586.  
  3587. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/android.policy.jar /data/dalvik-cache/system@framework@android.policy.jar@classes.dex
  3588.  
  3589. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/services.jar /data/dalvik-cache/system@framework@services.jar@classes.dex
  3590.  
  3591. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/apache-xml.jar /data/dalvik-cache/system@framework@apache-xml.jar@classes.dex
  3592.  
  3593. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/webviewchromium.jar /data/dalvik-cache/system@framework@webviewchromium.jar@classes.dex
  3594.  
  3595. D/ImgSensorDrv( 5271): [impSearchSensor][impSearchSensor] Err-ctrlCode (I/O error)
  3596.  
  3597. D/ImgSensorDrv( 5271): [getCurrentSensorType][getCurrentSensorType]
  3598.  
  3599. D/ImgSensorDrv( 5271): [getInfo][getInfo]
  3600.  
  3601. D/ImgSensorDrv( 5271): [getSocketPosition][getSocketPosition]:[1][1]
  3602.  
  3603. D/ImgSensorDrv( 5271): [impSearchSensor]sensor ID mismatch
  3604.  
  3605. D/ImgSensorDrv( 5271): [impSearchSensor]set sensor driver id =10001
  3606.  
  3607. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3608.  
  3609. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/mediatek-common.jar /data/dalvik-cache/system@framework@mediatek-common.jar@classes.dex
  3610.  
  3611. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3612.  
  3613. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/mediatek-framework.jar /data/dalvik-cache/system@framework@mediatek-framework.jar@classes.dex
  3614.  
  3615. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/CustomProperties.jar /data/dalvik-cache/system@framework@CustomProperties.jar@classes.dex
  3616.  
  3617. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/mediatek-telephony-common.jar /data/dalvik-cache/system@framework@mediatek-telephony-common.jar@classes.dex
  3618.  
  3619. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/mediatek-tablet.jar /data/dalvik-cache/system@framework@mediatek-tablet.jar@classes.dex
  3620.  
  3621. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/immr_framework.jar /data/dalvik-cache/system@framework@immr_framework.jar@classes.dex
  3622.  
  3623. D/dalvikvm( 5270): Unable to stat classpath element '/data/app/com.miui.sdk-1.apk'
  3624.  
  3625. D/dalvikvm( 5270): Unable to stat classpath element '/data/app/com.miui.sdk-2.apk'
  3626.  
  3627. D/dalvikvm( 5270): open_cached_dex_file : /system/app/miui.apk /data/dalvik-cache/system@app@miui.apk@classes.dex
  3628.  
  3629. D/dalvikvm( 5270): Unable to stat classpath element '/data/app/com.miui.framework-1.apk'
  3630.  
  3631. D/dalvikvm( 5270): Unable to stat classpath element '/data/app/com.miui.framework-2.apk'
  3632.  
  3633. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3634.  
  3635. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3636.  
  3637. D/dalvikvm( 5270): open_cached_dex_file : /system/app/MiuiFramework.apk /data/dalvik-cache/system@app@MiuiFramework.apk@classes.dex
  3638.  
  3639. D/dalvikvm( 5270): process bootclasspath ex!!
  3640.  
  3641. D/dalvikvm( 5270): open_cached_dex_file : /system/framework/mediatek-op.jar /data/dalvik-cache/system@framework@mediatek-op.jar@classes.dex
  3642.  
  3643. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3644.  
  3645. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3646.  
  3647. D/dalvikvm( 5270): Trying to load lib libjavacore.so 0x0
  3648.  
  3649. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3650.  
  3651. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3652.  
  3653. D/dalvikvm( 5270): Added shared lib libjavacore.so 0x0
  3654.  
  3655. E/ICU ( 5270): Couldn't open '/system/usr/icu/icudt51l.dat': No such file or directory
  3656.  
  3657. F/libc ( 5270): Fatal signal 6 (SIGABRT) at 0x00001496 (code=-6), thread 5270 (zygote)
  3658.  
  3659. D/AEE/AED ( 132): $===AEE===AEE===AEE===$
  3660.  
  3661. D/AEE/AED ( 132): p 0 poll events 1 revents 0
  3662.  
  3663. D/AEE/AED ( 132): not know revents:0
  3664.  
  3665. D/AEE/AED ( 132): p 1 poll events 1 revents 0
  3666.  
  3667. D/AEE/AED ( 132): not know revents:0
  3668.  
  3669. D/AEE/AED ( 132): p 2 poll events 1 revents 1
  3670.  
  3671. D/AEE/AED ( 132): aed_main_fork_worker: generator 0x39c0d0, worker 0xbe81a828, recv_fd 15
  3672.  
  3673. D/AEE/AED ( 132): p 3 poll events 1 revents 0
  3674.  
  3675. D/AEE/AED ( 132): not know revents:0
  3676.  
  3677. D/AEE/AED ( 132): p 4 poll events 1 revents 0
  3678.  
  3679. D/AEE/AED ( 132): not know revents:0
  3680.  
  3681. I/DEBUG ( 5347): handle_request(15)
  3682.  
  3683. I/DEBUG ( 5347): check process 5270 name:zygote
  3684.  
  3685. I/DEBUG ( 5347): tid 5270 abort msg address is:0
  3686.  
  3687. I/DEBUG ( 5347): BOOM: pid=5270 uid=0 gid=0 tid=5270
  3688.  
  3689. I/DEBUG ( 5347): [OnPurpose Redunant in preset_info] pid: 5270, tid: 5270, name: zygote >>> zygote <<<
  3690.  
  3691. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3692.  
  3693. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3694.  
  3695. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3696.  
  3697. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3698.  
  3699. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3700.  
  3701. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3702.  
  3703. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3704.  
  3705. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3706.  
  3707. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3708.  
  3709. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3710.  
  3711. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3712.  
  3713. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3714.  
  3715. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3716.  
  3717. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3718.  
  3719. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3720.  
  3721. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3722.  
  3723. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3724.  
  3725. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3726.  
  3727. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3728.  
  3729. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3730.  
  3731. D/ImgSensorDrv( 5271): [impSearchSensor][impSearchSensor] Err-ctrlCode (I/O error)
  3732.  
  3733. D/ImgSensorDrv( 5271): [getCurrentSensorType][getCurrentSensorType]
  3734.  
  3735. D/ImgSensorDrv( 5271): [getInfo][getInfo]
  3736.  
  3737. D/ImgSensorDrv( 5271): [getSocketPosition][getSocketPosition]:[1][1]
  3738.  
  3739. D/ImgSensorDrv( 5271): [impSearchSensor]sensor ID mismatch
  3740.  
  3741. D/ImgSensorDrv( 5271): [impSearchSensor]set sensor driver id =10002
  3742.  
  3743. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3744.  
  3745. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3746.  
  3747. I/DEBUG ( 5347): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
  3748.  
  3749. I/DEBUG ( 5347): Build fingerprint: 'alps/lcsh92_wet_jb9/lcsh92_wet_jb9:4.4.2/KOT49H/:user/release-keys'
  3750.  
  3751. I/DEBUG ( 5347): pid: 5270, tid: 5270, name: zygote >>> zygote <<<
  3752.  
  3753. I/DEBUG ( 5347): signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
  3754.  
  3755. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3756.  
  3757. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3758.  
  3759. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3760.  
  3761. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3762.  
  3763. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3764.  
  3765. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3766.  
  3767. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3768.  
  3769. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3770.  
  3771. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3772.  
  3773. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3774.  
  3775. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3776.  
  3777. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3778.  
  3779. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3780.  
  3781. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3782.  
  3783. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3784.  
  3785. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3786.  
  3787. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3788.  
  3789. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3790.  
  3791. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3792.  
  3793. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3794.  
  3795. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3796.  
  3797. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3798.  
  3799. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3800.  
  3801. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3802.  
  3803. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3804.  
  3805. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3806.  
  3807. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3808.  
  3809. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3810.  
  3811. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3812.  
  3813. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3814.  
  3815. I/DEBUG ( 5347): r0 00000000 r1 00001496 r2 00000006 r3 00000000
  3816.  
  3817. I/DEBUG ( 5347): r4 00000006 r5 00000002 r6 00001496 r7 0000010c
  3818.  
  3819. I/DEBUG ( 5347): r8 40180bc8 r9 41960e98 sl 5b0f5fa7 fp 41a27128
  3820.  
  3821. I/DEBUG ( 5347): ip 4195bb48 sp be876b68 lr 401302b1 pc 4013f1f4 cpsr 00070010
  3822.  
  3823. I/DEBUG ( 5347):
  3824.  
  3825. I/DEBUG ( 5347): backtrace:
  3826.  
  3827. I/DEBUG ( 5347): #00 pc 000261f4 /system/lib/libc.so (tgkill+12)
  3828.  
  3829. I/DEBUG ( 5347): #01 pc 000172ad /system/lib/libc.so (pthread_kill+48)
  3830.  
  3831. I/DEBUG ( 5347): #02 pc 000174c1 /system/lib/libc.so (raise+10)
  3832.  
  3833. I/DEBUG ( 5347): #03 pc 000161f5 /system/lib/libc.so
  3834.  
  3835. I/DEBUG ( 5347): #04 pc 00025aa4 /system/lib/libc.so (abort+4)
  3836.  
  3837. I/DEBUG ( 5347): #05 pc 00015ab7 /system/lib/libjavacore.so (register_libcore_icu_ICU(_JNIEnv*)+242)
  3838.  
  3839. I/DEBUG ( 5347): #06 pc 0000e553 /system/lib/libjavacore.so (JNI_OnLoad+190)
  3840.  
  3841. I/DEBUG ( 5347): #07 pc 000523c1 /system/lib/libdvm.so (dvmLoadNativeCode(char const*, Object*, char**)+516)
  3842.  
  3843. I/DEBUG ( 5347): #08 pc 00047911 /system/lib/libdvm.so
  3844.  
  3845. I/DEBUG ( 5347): #09 pc 0004950d /system/lib/libdvm.so (dvmStartup(int, char const* const*, bool, _JNIEnv*)+6444)
  3846.  
  3847. I/DEBUG ( 5347): #10 pc 0004fdbd /system/lib/libdvm.so (JNI_CreateJavaVM+596)
  3848.  
  3849. I/DEBUG ( 5347): #11 pc 00002d79 /system/lib/libnativehelper.so (JniInvocation::JNI_CreateJavaVM(_JavaVM**, _JNIEnv**, void*)+10)
  3850.  
  3851. I/DEBUG ( 5347): #12 pc 0004ff7f /system/lib/libandroid_runtime.so (android::AndroidRuntime::startVm(_JavaVM**, _JNIEnv**)+1814)
  3852.  
  3853. I/DEBUG ( 5347): #13 pc 0005025d /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, char const*)+176)
  3854.  
  3855. I/DEBUG ( 5347): #14 pc 0000105b /system/bin/app_process
  3856.  
  3857. I/DEBUG ( 5347): #15 pc 0000f31c /system/lib/libc.so (__libc_init+100)
  3858.  
  3859. I/DEBUG ( 5347): #16 pc 00000d7c /system/bin/app_process
  3860.  
  3861. I/DEBUG ( 5347):
  3862.  
  3863. I/DEBUG ( 5347): stack:
  3864.  
  3865. I/DEBUG ( 5347): be876b28 41a24940 /system/lib/libdvm.so
  3866.  
  3867. I/DEBUG ( 5347): be876b2c 6066a047
  3868.  
  3869. I/DEBUG ( 5347): be876b30 41963aa8
  3870.  
  3871. I/DEBUG ( 5347): be876b34 00000000
  3872.  
  3873. I/DEBUG ( 5347): be876b38 41963e14
  3874.  
  3875. I/DEBUG ( 5347): be876b3c 41a49178 /dev/ashmem/dalvik-zygote (deleted)
  3876.  
  3877. I/DEBUG ( 5347): be876b40 579cbfa4 /dev/ashmem/dalvik-LinearAlloc (deleted)
  3878.  
  3879. I/DEBUG ( 5347): be876b44 579cbfa4 /dev/ashmem/dalvik-LinearAlloc (deleted)
  3880.  
  3881. I/DEBUG ( 5347): be876b48 41963f88
  3882.  
  3883. I/DEBUG ( 5347): be876b4c 419f84f9 /system/lib/libdvm.so (dexParameterIteratorInit(DexParameterIterator*, DexProto const*)+18)
  3884.  
  3885. I/DEBUG ( 5347): be876b50 41a49178 /dev/ashmem/dalvik-zygote (deleted)
  3886.  
  3887. I/DEBUG ( 5347): be876b54 be876bb0 [stack]
  3888.  
  3889. I/DEBUG ( 5347): be876b58 5bc030f0 /system/lib/libjavacore.so
  3890.  
  3891. I/DEBUG ( 5347): be876b5c 419d38d3 /system/lib/libdvm.so
  3892.  
  3893. I/DEBUG ( 5347): be876b60 be876b70 [stack]
  3894.  
  3895. I/DEBUG ( 5347): be876b64 be876b83 [stack]
  3896.  
  3897. I/DEBUG ( 5347): #00 be876b68 00000006
  3898.  
  3899. I/DEBUG ( 5347): be876b6c 00000002
  3900.  
  3901. I/DEBUG ( 5347): be876b70 00001496
  3902.  
  3903. I/DEBUG ( 5347): be876b74 4195bb48
  3904.  
  3905. I/DEBUG ( 5347): be876b78 4195bb48
  3906.  
  3907. I/DEBUG ( 5347): be876b7c 401302b1 /system/lib/libc.so (pthread_kill+52)
  3908.  
  3909. I/DEBUG ( 5347): #01 be876b80 00000006
  3910.  
  3911. I/DEBUG ( 5347): be876b84 00000000
  3912.  
  3913. I/DEBUG ( 5347): be876b88 ffffffff
  3914.  
  3915. I/DEBUG ( 5347): be876b8c 401304c5 /system/lib/libc.so (raise+14)
  3916.  
  3917. I/DEBUG ( 5347): #02 be876b90 be876b9c [stack]
  3918.  
  3919. I/DEBUG ( 5347): be876b94 4012f1f9 /system/lib/libc.so
  3920.  
  3921. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3922.  
  3923. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3924.  
  3925. I/DEBUG ( 5347):
  3926.  
  3927. I/DEBUG ( 5347): memory near r1:
  3928.  
  3929. I/DEBUG ( 5347): 00001474 ffffffff ffffffff ffffffff ffffffff
  3930.  
  3931. I/DEBUG ( 5347): 00001484 ffffffff ffffffff ffffffff ffffffff
  3932.  
  3933. I/DEBUG ( 5347): 00001494 ffffffff ffffffff ffffffff ffffffff
  3934.  
  3935. I/DEBUG ( 5347): 000014a4 ffffffff ffffffff ffffffff ffffffff
  3936.  
  3937. I/DEBUG ( 5347): 000014b4 ffffffff ffffffff ffffffff ffffffff
  3938.  
  3939. I/DEBUG ( 5347): 000014c4 ffffffff ffffffff ffffffff ffffffff
  3940.  
  3941. I/DEBUG ( 5347): 000014d4 ffffffff ffffffff ffffffff ffffffff
  3942.  
  3943. I/DEBUG ( 5347): 000014e4 ffffffff ffffffff ffffffff ffffffff
  3944.  
  3945. I/DEBUG ( 5347): 000014f4 ffffffff ffffffff ffffffff ffffffff
  3946.  
  3947. I/DEBUG ( 5347): 00001504 ffffffff ffffffff ffffffff ffffffff
  3948.  
  3949. I/DEBUG ( 5347): 00001514 ffffffff ffffffff ffffffff ffffffff
  3950.  
  3951. I/DEBUG ( 5347): 00001524 ffffffff ffffffff ffffffff ffffffff
  3952.  
  3953. I/DEBUG ( 5347): 00001534 ffffffff ffffffff ffffffff ffffffff
  3954.  
  3955. I/DEBUG ( 5347): 00001544 ffffffff ffffffff ffffffff ffffffff
  3956.  
  3957. I/DEBUG ( 5347): 00001554 ffffffff ffffffff ffffffff ffffffff
  3958.  
  3959. I/DEBUG ( 5347): 00001564 ffffffff ffffffff ffffffff ffffffff
  3960.  
  3961. I/DEBUG ( 5347):
  3962.  
  3963. I/DEBUG ( 5347): memory near r6:
  3964.  
  3965. I/DEBUG ( 5347): 00001474 ffffffff ffffffff ffffffff ffffffff
  3966.  
  3967. I/DEBUG ( 5347): 00001484 ffffffff ffffffff ffffffff ffffffff
  3968.  
  3969. I/DEBUG ( 5347): 00001494 ffffffff ffffffff ffffffff ffffffff
  3970.  
  3971. I/DEBUG ( 5347): 000014a4 ffffffff ffffffff ffffffff ffffffff
  3972.  
  3973. I/DEBUG ( 5347): 000014b4 ffffffff ffffffff ffffffff ffffffff
  3974.  
  3975. I/DEBUG ( 5347): 000014c4 ffffffff ffffffff ffffffff ffffffff
  3976.  
  3977. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  3978.  
  3979. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  3980.  
  3981. I/DEBUG ( 5347): 000014d4 ffffffff ffffffff ffffffff ffffffff
  3982.  
  3983. I/DEBUG ( 5347): 000014e4 ffffffff ffffffff ffffffff ffffffff
  3984.  
  3985. I/DEBUG ( 5347): 000014f4 ffffffff ffffffff ffffffff ffffffff
  3986.  
  3987. I/DEBUG ( 5347): 00001504 ffffffff ffffffff ffffffff ffffffff
  3988.  
  3989. I/DEBUG ( 5347): 00001514 ffffffff ffffffff ffffffff ffffffff
  3990.  
  3991. I/DEBUG ( 5347): 00001524 ffffffff ffffffff ffffffff ffffffff
  3992.  
  3993. I/DEBUG ( 5347): 00001534 ffffffff ffffffff ffffffff ffffffff
  3994.  
  3995. I/DEBUG ( 5347): 00001544 ffffffff ffffffff ffffffff ffffffff
  3996.  
  3997. I/DEBUG ( 5347): 00001554 ffffffff ffffffff ffffffff ffffffff
  3998.  
  3999. I/DEBUG ( 5347): 00001564 ffffffff ffffffff ffffffff ffffffff
  4000.  
  4001. I/DEBUG ( 5347):
  4002.  
  4003. I/DEBUG ( 5347): memory near r8:
  4004.  
  4005. I/DEBUG ( 5347): 40180ba8 00001000 00001000 00010000 00200000
  4006.  
  4007. I/DEBUG ( 5347): 40180bb8 00000003 40143c48 be877964 be877a0f
  4008.  
  4009. I/DEBUG ( 5347): 40180bc8 dc50e34f be87791c 00000000 40100d20
  4010.  
  4011. I/DEBUG ( 5347): 40180bd8 00000007 00000008 00000000 40101184
  4012.  
  4013. I/DEBUG ( 5347): 40180be8 00000000 402ed000 00000009 0000000a
  4014.  
  4015. I/DEBUG ( 5347): 40180bf8 00000000 00000000 00000000 00000000
  4016.  
  4017. I/DEBUG ( 5347): 40180c08 00000000 00000000 00000000 00000000
  4018.  
  4019. I/DEBUG ( 5347): 40180c18 00000000 00000000 00000000 00000000
  4020.  
  4021. I/DEBUG ( 5347): 40180c28 00000000 00000000 00000000 00000000
  4022.  
  4023. I/DEBUG ( 5347): 40180c38 00000000 00000000 00000000 00000000
  4024.  
  4025. I/DEBUG ( 5347): 40180c48 00000000 00000000 00000000 00000000
  4026.  
  4027. I/DEBUG ( 5347): 40180c58 00000000 00000000 00000000 00000000
  4028.  
  4029. I/DEBUG ( 5347): 40180c68 00000000 00000000 00000000 00000000
  4030.  
  4031. I/DEBUG ( 5347): 40180c78 00000000 00000000 00000000 00000000
  4032.  
  4033. I/DEBUG ( 5347): 40180c88 00000000 00000000 00000000 00000000
  4034.  
  4035. I/DEBUG ( 5347): 40180c98 00000000 00000000 00000000 00000000
  4036.  
  4037. I/DEBUG ( 5347):
  4038.  
  4039. I/DEBUG ( 5347): memory near r9:
  4040.  
  4041. I/DEBUG ( 5347): 41960e78 be876f48 be876f34 402b849e 00000000
  4042.  
  4043. I/DEBUG ( 5347): 41960e88 00000000 00000000 00000000 00000023
  4044.  
  4045. I/DEBUG ( 5347): 41960e98 41a1d37c 00000000 00000001 41963aa8
  4046.  
  4047. I/DEBUG ( 5347): 41960ea8 00000000 00000000 00000000 00000013
  4048.  
  4049. I/DEBUG ( 5347): 41960eb8 0000002e 00000000 00000000 0000002b
  4050.  
  4051. I/DEBUG ( 5347): 41960ec8 7379732f 2f6d6574 6d617266 726f7765
  4052.  
  4053. I/DEBUG ( 5347): 41960ed8 656d2f6b 74616964 6f2d6b65 616a2e70
  4054.  
  4055. I/DEBUG ( 5347): 41960ee8 00000072 00000013 65726f63 72616a2e
  4056.  
  4057. I/DEBUG ( 5347): 41960ef8 00000000 0000001b 736e6f63 70797263
  4058.  
  4059. I/DEBUG ( 5347): 41960f08 616a2e74 00000072 00000000 00000013
  4060.  
  4061. I/DEBUG ( 5347): 41960f18 74686b6f 6a2e7074 00007261 0000001b
  4062.  
  4063. I/DEBUG ( 5347): 41960f28 65726f63 6e756a2d 6a2e7469 00007261
  4064.  
  4065. I/DEBUG ( 5347): 41960f38 00000000 0000001b 6e756f62 61637963
  4066.  
  4067. I/DEBUG ( 5347): 41960f48 656c7473 72616a2e 00000000 00000013
  4068.  
  4069. I/DEBUG ( 5347): 41960f58 2e747865 0072616a 00000000 0000001b
  4070.  
  4071. I/DEBUG ( 5347): 41960f68 6d617266 726f7765 616a2e6b 00000072
  4072.  
  4073. I/DEBUG ( 5347):
  4074.  
  4075. I/DEBUG ( 5347): memory near sl:
  4076.  
  4077. I/DEBUG ( 5347): 5b0f5f84 63617661 2e65726f 00006f73 7461502f
  4078.  
  4079. I/DEBUG ( 5347): 5b0f5f94 0000001b 7379732f 2f6d6574 2f727375
  4080.  
  4081. I/DEBUG ( 5347): 5b0f5fa4 00756369 746e4965 00000031 726f466c
  4082.  
  4083. I/DEBUG ( 5347): 5b0f5fb4 3b74616d 62617400 00000021 3b786564
  4084.  
  4085. I/DEBUG ( 5347): 5b0f5fc4 00000000 00000000 00000011 00000000
  4086.  
  4087. I/DEBUG ( 5347): 5b0f5fd4 00000000 00000030 0000001a 5b0e7000
  4088.  
  4089. I/DEBUG ( 5347): 5b0f5fe4 0000f000 59ed7fe0 00000001 00000000
  4090.  
  4091. I/DEBUG ( 5347): 5b0f5ff4 00000007 00000007 00000007 0a796564
  4092.  
  4093. I/DEBUG ( 5347): 5b0f6004 00363330 00000028 00022090 000220b8
  4094.  
  4095. I/DEBUG ( 5347): 5b0f6014 0000036c 00022428 00003c00 00000000
  4096.  
  4097. I/DEBUG ( 5347): 5b0f6024 aba5d33e 0a786564 00353330 dfc59663
  4098.  
  4099. I/DEBUG ( 5347): 5b0f6034 46292994 fb5698cd 090babaf 9aab2356
  4100.  
  4101. I/DEBUG ( 5347): 5b0f6044 58a797ba 00022090 00000070 12345678
  4102.  
  4103. I/DEBUG ( 5347): 5b0f6054 00000000 00000000 00021fc0 000006c5
  4104.  
  4105. I/DEBUG ( 5347): 5b0f6064 00000070 00000082 00001b84 000000bf
  4106.  
  4107. I/DEBUG ( 5347): 5b0f6074 00001d8c 00000259 00002680 00000257
  4108.  
  4109. I/DEBUG ( 5347):
  4110.  
  4111. I/DEBUG ( 5347): memory near fp:
  4112.  
  4113. I/DEBUG ( 5347): 41a27108 41964000 41a27004 41a1f9d0 41a2722c
  4114.  
  4115. I/DEBUG ( 5347): 41a27118 40104eb8 00000001 41964000 00000100
  4116.  
  4117. I/DEBUG ( 5347): 41a27128 6a62696c 63617661 2e65726f 00006f73
  4118.  
  4119. I/DEBUG ( 5347): 41a27138 00000000 00000000 00000000 00000000
  4120.  
  4121. I/DEBUG ( 5347): 41a27148 00000000 00000000 00000000 00000000
  4122.  
  4123. I/DEBUG ( 5347): 41a27158 00000000 00000000 00000000 00000000
  4124.  
  4125. I/DEBUG ( 5347): 41a27168 00000000 00000000 00000000 00000000
  4126.  
  4127. I/DEBUG ( 5347): 41a27178 00000000 00000000 00000000 00000000
  4128.  
  4129. I/DEBUG ( 5347): 41a27188 00000000 00000000 00000000 00000000
  4130.  
  4131. I/DEBUG ( 5347): 41a27198 00000000 00000000 00000000 00000000
  4132.  
  4133. I/DEBUG ( 5347): 41a271a8 5bbd8034 00000008 00000000 5bbd8000
  4134.  
  4135. I/DEBUG ( 5347): 41a271b8 00034000 00000000 5bc09690 00000000
  4136.  
  4137. I/DEBUG ( 5347): 41a271c8 00000000 00000000 00000001 5bbdad88
  4138.  
  4139. I/DEBUG ( 5347): 41a271d8 5bbd8148 00000209 000002c4 5bbdf478
  4140.  
  4141. I/DEBUG ( 5347): 41a271e8 5bbdfc9c 5bc098a4 5bbe35dc 000001d4
  4142.  
  4143. I/DEBUG ( 5347): 41a271f8 5bbe07ac 000005c6 00000000 00000000
  4144.  
  4145. I/DEBUG ( 5347):
  4146.  
  4147. I/DEBUG ( 5347): memory near ip:
  4148.  
  4149. I/DEBUG ( 5347): 4195bb28 00000000 00000000 00000000 00000000
  4150.  
  4151. I/DEBUG ( 5347): 4195bb38 00000000 00000000 00000000 00000000
  4152.  
  4153. I/DEBUG ( 5347): 4195bb48 7379732f 2f6d6574 2f727375 2f756369
  4154.  
  4155. I/DEBUG ( 5347): 4195bb58 64756369 6c313574 7461642e 00000000
  4156.  
  4157. I/DEBUG ( 5347): 4195bb68 65676465 6d6f7266 68746170 766c6c2e
  4158.  
  4159. I/DEBUG ( 5347): 4195bb78 6f72706d 756f2e66 00000074 00000000
  4160.  
  4161. I/DEBUG ( 5347): 4195bb88 65676465 6d6f7266 68746170 766c6c2e
  4162.  
  4163. I/DEBUG ( 5347): 4195bb98 6f72706d 756f2e66 00000074 00000000
  4164.  
  4165. I/DEBUG ( 5347): 4195bba8 4195bbc8 00000000 00000000 00000000
  4166.  
  4167. I/DEBUG ( 5347): 4195bbb8 00000000 00000000 00000000 00000000
  4168.  
  4169. I/DEBUG ( 5347): 4195bbc8 4195bbe8 00000000 00000000 00000000
  4170.  
  4171. I/DEBUG ( 5347): 4195bbd8 00000000 00000000 00000000 00000000
  4172.  
  4173. I/DEBUG ( 5347): 4195bbe8 4195bc08 00000000 00000000 00000000
  4174.  
  4175. I/DEBUG ( 5347): 4195bbf8 00000000 00000000 00000000 00000000
  4176.  
  4177. I/DEBUG ( 5347): 4195bc08 4195bc28 00000000 00000000 00000000
  4178.  
  4179. I/DEBUG ( 5347): 4195bc18 00000000 00000000 00000000 00000000
  4180.  
  4181. I/DEBUG ( 5347):
  4182.  
  4183. I/DEBUG ( 5347): memory near sp:
  4184.  
  4185. I/DEBUG ( 5347): be876b48 41963f88 419f84f9 41a49178 be876bb0
  4186.  
  4187. I/DEBUG ( 5347): be876b58 5bc030f0 419d38d3 be876b70 be876b83
  4188.  
  4189. I/DEBUG ( 5347): be876b68 00000006 00000002 00001496 4195bb48
  4190.  
  4191. I/DEBUG ( 5347): be876b78 4195bb48 401302b1 00000006 00000000
  4192.  
  4193. I/DEBUG ( 5347): be876b88 ffffffff 401304c5 be876b9c 4012f1f9
  4194.  
  4195. I/DEBUG ( 5347): be876b98 0000001f ffffffdf be876c44 dc50e34f
  4196.  
  4197. I/DEBUG ( 5347): be876ba8 be876c44 be876c44 00000000 be876c44
  4198.  
  4199. I/DEBUG ( 5347): be876bb8 00000000 4013eaa8 4011496d 5bbedabb
  4200.  
  4201. I/DEBUG ( 5347): be876bc8 4016f998 00000011 579cc0bc 59a95438
  4202.  
  4203. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  4204.  
  4205. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  4206.  
  4207. I/DEBUG ( 5347): be876bd8 00000003 00000003 00000000 41a49178
  4208.  
  4209. I/DEBUG ( 5347): be876be8 5bc0311f 5bc0310c 5bc0aa00 00000002
  4210.  
  4211. I/DEBUG ( 5347): be876bf8 579cc0a8 41a49178 579cc0a8 be876c2c
  4212.  
  4213. I/DEBUG ( 5347): be876c08 5bc0311f 419af035 00000000 419b3897
  4214.  
  4215. I/DEBUG ( 5347): be876c18 1ea00005 5bc03080 00000003 5bc0a9e8
  4216.  
  4217. I/DEBUG ( 5347): be876c28 00000001 be876c44 5bc03080 419af035
  4218.  
  4219. I/DEBUG ( 5347): be876c38 1ea00005 419aff99 41960e98 4195bb68
  4220.  
  4221. I/DEBUG ( 5347):
  4222.  
  4223. I/DEBUG ( 5347): code around pc:
  4224.  
  4225. I/DEBUG ( 5347): 4013f1d4 e8bd00f0 e3700a01 912fff1e e2600000
  4226.  
  4227. I/DEBUG ( 5347): 4013f1e4 ea00b702 e92d50f0 e3a07f43 ef000000
  4228.  
  4229. I/DEBUG ( 5347): 4013f1f4 e8bd50f0 e3700a01 912fff1e e2600000
  4230.  
  4231. I/DEBUG ( 5347): 4013f204 ea00b6fa e92d50f0 e3a070ee ef000000
  4232.  
  4233. I/DEBUG ( 5347): 4013f214 e8bd50f0 e3700a01 912fff1e e2600000
  4234.  
  4235. I/DEBUG ( 5347): 4013f224 ea00b6f2 00000000 00000000 e92d400f
  4236.  
  4237. I/DEBUG ( 5347): 4013f234 e1a03000 e1a00001 e1a01003 eb000040
  4238.  
  4239. I/DEBUG ( 5347): 4013f244 e8bd400f e12fff1e e320f000 e92d403f
  4240.  
  4241. I/DEBUG ( 5347): 4013f254 e2522040 ba00002c e1a05001 e2455c01
  4242.  
  4243. I/DEBUG ( 5347): 4013f264 f5d5f000 f5d5f040 f5d5f080 f5d5f0c0
  4244.  
  4245. I/DEBUG ( 5347): 4013f274 e2411040 e2400040 e1a05000 e1a04001
  4246.  
  4247. I/DEBUG ( 5347): 4013f284 f424020d f424420d f405022d f405422d
  4248.  
  4249. I/DEBUG ( 5347): 4013f294 e2522040 ba00001c e2411040 e2400040
  4250.  
  4251. I/DEBUG ( 5347): 4013f2a4 e1a05000 e1a04001 f424020d f424420d
  4252.  
  4253. I/DEBUG ( 5347): 4013f2b4 f405022d f405422d e2522040 ba000012
  4254.  
  4255. I/DEBUG ( 5347): 4013f2c4 e2411040 e2400040 e1a05000 e1a04001
  4256.  
  4257. I/DEBUG ( 5347):
  4258.  
  4259. I/DEBUG ( 5347): code around lr:
  4260.  
  4261. I/DEBUG ( 5347): 40130290 447b4b13 42b3e010 4812d10e 44786a1e
  4262.  
  4263. I/DEBUG ( 5347): 401302a0 eb08f7f8 e9d8f00d 46224631 ef9cf00e
  4264.  
  4265. I/DEBUG ( 5347): 401302b0 d00a3001 e00b2400 2b00681b 480ad1eb
  4266.  
  4267. I/DEBUG ( 5347): 401302c0 44782403 eaf6f7f8 f001e002 6804fa1b
  4268.  
  4269. I/DEBUG ( 5347): 401302d0 fa18f001 46206005 bf00bd70 0005095a
  4270.  
  4271. I/DEBUG ( 5347): 401302e0 0005094e 00050946 00050922 bf7ef7ff
  4272.  
  4273. I/DEBUG ( 5347): 401302f0 43f0e92d 4a3d4b3c 589c447b 6823b08b
  4274.  
  4275. I/DEBUG ( 5347): 40130300 460d4606 f0019309 46a1f9fd 8000f8d0
  4276.  
  4277. I/DEBUG ( 5347): 40130310 d0482d00 f00f4628 280ffed5 d8444604
  4278.  
  4279. I/DEBUG ( 5347): 40130320 ffe4f7ff d1064286 4629200f e8a2f00d
  4280.  
  4281. I/DEBUG ( 5347): 40130330 d03c2800 482ee02e f7f84478 482dea3a
  4282.  
  4283. I/DEBUG ( 5347): 40130340 e0154478 d11342b0 482b6a06 f7f84478
  4284.  
  4285. I/DEBUG ( 5347): 40130350 4a2aeab2 447a2120 a8014633 e84af015
  4286.  
  4287. I/DEBUG ( 5347): 40130360 a8012101 ef52f021 46061c42 e011d104
  4288.  
  4289. I/DEBUG ( 5347): 40130370 28006800 e02cd1e6 46294630 f00d4622
  4290.  
  4291. I/DEBUG ( 5347): 40130380 1c43e8de d11e4607 f9bcf001 29046801
  4292.  
  4293. D/ImgSensorDrv( 5271): [impSearchSensor][impSearchSensor] Err-ctrlCode (I/O error)
  4294.  
  4295. D/ImgSensorDrv( 5271): [getCurrentSensorType][getCurrentSensorType]
  4296.  
  4297. D/ImgSensorDrv( 5271): [getInfo][getInfo]
  4298.  
  4299. D/ImgSensorDrv( 5271): [getSocketPosition][getSocketPosition]:[1][1]
  4300.  
  4301. D/ImgSensorDrv( 5271): [impSearchSensor]sensor ID mismatch
  4302.  
  4303. D/ImgSensorDrv( 5271): [impSearchSensor]set sensor driver id =10003
  4304.  
  4305. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  4306.  
  4307. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  4308.  
  4309. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  4310.  
  4311. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  4312.  
  4313. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  4314.  
  4315. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  4316.  
  4317. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  4318.  
  4319. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  4320.  
  4321. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  4322.  
  4323. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  4324.  
  4325. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  4326.  
  4327. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  4328.  
  4329. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  4330.  
  4331. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  4332.  
  4333. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  4334.  
  4335. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  4336.  
  4337. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  4338.  
  4339. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  4340.  
  4341. V/AEE/AED ( 5347): dashboard_record_update() : rec->module = zygote
  4342.  
  4343. D/AEE/AED ( 5347): Skip duplicated exception !
  4344.  
  4345. D/AEE/AED ( 5347): Exception Class: 1
  4346.  
  4347. D/AEE/AED ( 5347): Module: zygote
  4348.  
  4349. D/AEE/AED ( 5347): Count: 40
  4350.  
  4351. D/AEE/AED ( 5347): Last exception time: 1388537668
  4352.  
  4353. D/AEE/AED ( 5347):
  4354.  
  4355. V/AEE/AED ( 5347): aed_ne_session() - skipped
  4356.  
  4357. D/AEE/AED ( 132): $===AEE===AEE===AEE===$
  4358.  
  4359. D/AEE/AED ( 132): p 0 poll events 1 revents 0
  4360.  
  4361. D/AEE/AED ( 132): not know revents:0
  4362.  
  4363. D/AEE/AED ( 132): p 1 poll events 1 revents 0
  4364.  
  4365. D/AEE/AED ( 132): not know revents:0
  4366.  
  4367. D/AEE/AED ( 132): p 2 poll events 1 revents 0
  4368.  
  4369. D/AEE/AED ( 132): not know revents:0
  4370.  
  4371. D/AEE/AED ( 132): p 3 poll events 1 revents 0
  4372.  
  4373. D/AEE/AED ( 132): not know revents:0
  4374.  
  4375. D/AEE/AED ( 132): p 4 poll events 1 revents 0
  4376.  
  4377. D/AEE/AED ( 132): not know revents:0
  4378.  
  4379. I/Netd ( 5268): execIptablesCommand android_fork_execvp exit
  4380.  
  4381. I/Netd ( 5268): execIptablesCommand android_fork_execvp enter
  4382.  
  4383. I/ServiceManager( 124): service 'SurfaceFlinger' died
  4384.  
  4385. D/IPCThreadState( 5298): [DN #5] BR_DEAD_BINDER cookie 0xb7282ce0
  4386.  
  4387. W/SurfaceComposerClient( 5298): ComposerService remote (surfaceflinger) died [0xb7282ce0]
  4388.  
  4389. D/BootAnimation( 5298): [BootAnimation binderDied 172]start
  4390.  
  4391. D/BootAnimation( 5298): SurfaceFlinger died, exiting...
  4392.  
  4393. I/ServiceManager( 124): service 'media.audio_flinger' died
  4394.  
  4395. I/ServiceManager( 124): service 'media.player' died
  4396.  
  4397. I/ServiceManager( 124): service 'memory.dumper' died
  4398.  
  4399. I/AKMD2 ( 5388): AK8963/B for Android v20110826 (Library: v3.1.0.1012) started.
  4400.  
  4401. I/AKMD2 ( 5388): Debug: ON
  4402.  
  4403. I/AKMD2 ( 5388): Debug level: 4
  4404.  
  4405. I/AKMD2 ( 5388): Output to: LOGD
  4406.  
  4407. I/AKMD2 ( 5388): AK8963/B for Android end (-2).
  4408.  
  4409. I/Netd ( 5389): Netd 1.0 starting
  4410.  
  4411. W/InterfaceController( 5389): Warning (dlopen failed: library "/system/lib/libnetcmdiface.so" not found) while opening the net interface command library
  4412.  
  4413. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4414.  
  4415. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4416.  
  4417. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4418.  
  4419. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4420.  
  4421. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4422.  
  4423. I/SurfaceFlinger( 5390): [int main(int, char**)] set surfaceflinger is in root user, adjust caps for its thread
  4424.  
  4425. I/SurfaceFlinger( 5390): SurfaceFlinger is starting
  4426.  
  4427. I/SurfaceFlinger( 5390): SurfaceFlinger's main thread ready to run. Initializing graphics H/W...
  4428.  
  4429. W/linker ( 5392): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  4430.  
  4431. D/libEGL ( 5390): loaded /system/lib/egl/libEGL_mali.so
  4432.  
  4433. D/libEGL ( 5390): loaded /system/lib/egl/libGLESv1_CM_mali.so
  4434.  
  4435. D/libEGL ( 5390): loaded /system/lib/egl/libGLESv2_mali.so
  4436.  
  4437. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4438.  
  4439. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4440.  
  4441. W/linker ( 5391): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  4442.  
  4443. I/[MALI][Gralloc]( 5390): dlopen libsec_mem.so fail
  4444.  
  4445. I/gralloc ( 5390): [Gralloc] refreshRate = 0, info.pixclock = ffffffff
  4446.  
  4447. I/gralloc ( 5390): [Gralloc] info.upper_margin = ffffffff, info.lower_margin = ffffffff
  4448.  
  4449. I/gralloc ( 5390): [Gralloc] info.yres = 356, info.hsync_len = ffffffff
  4450.  
  4451. I/gralloc ( 5390): [Gralloc] info.left_margin = ffffffff, info.right_margin = ffffffff
  4452.  
  4453. I/[MALI][Gralloc]( 5390): ro_dpi: 210.000000
  4454.  
  4455. I/[MALI][Gralloc]( 5390): using (fd=20)
  4456.  
  4457. I/[MALI][Gralloc]( 5390): id = mtkfb
  4458.  
  4459. I/[MALI][Gralloc]( 5390): xres = 480 px
  4460.  
  4461. I/[MALI][Gralloc]( 5390): yres = 854 px
  4462.  
  4463. I/[MALI][Gralloc]( 5390): xres_virtual = 480 px
  4464.  
  4465. I/[MALI][Gralloc]( 5390): yres_virtual = 2562 px
  4466.  
  4467. I/[MALI][Gralloc]( 5390): bpp = 32
  4468.  
  4469. I/[MALI][Gralloc]( 5390): r = 16:8
  4470.  
  4471. I/[MALI][Gralloc]( 5390): g = 8:8
  4472.  
  4473. I/[MALI][Gralloc]( 5390): b = 0:8
  4474.  
  4475. I/[MALI][Gralloc]( 5390): width = 58 mm (210.206894 dpi)
  4476.  
  4477. I/[MALI][Gralloc]( 5390): height = 103 mm (210.598053 dpi)
  4478.  
  4479. I/[MALI][Gralloc]( 5390): refresh rate = 60.00 Hz
  4480.  
  4481. I/[MALI][Gralloc]( 5390): init_framebuffer va: 0xb57a3000 mva: 0x9f400000
  4482.  
  4483. E/cutils-trace( 5390): Error opening trace file: No such file or directory (2)
  4484.  
  4485. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4486.  
  4487. I/hwcomposer( 5390): [DPY] Display Information:
  4488.  
  4489. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4490.  
  4491. I/hwcomposer( 5390): [DPY] # fo devices : 1
  4492.  
  4493. I/hwcomposer( 5390): [DPY] -----------------------------
  4494.  
  4495. I/hwcomposer( 5390): [DPY] Device id : 0
  4496.  
  4497. I/hwcomposer( 5390): [DPY] Width : 480
  4498.  
  4499. I/hwcomposer( 5390): [DPY] Height : 854
  4500.  
  4501. I/hwcomposer( 5390): [DPY] xdpi : 210.000000
  4502.  
  4503. I/hwcomposer( 5390): [DPY] ydpi : 210.000000
  4504.  
  4505. I/hwcomposer( 5390): [DPY] vsync : 1
  4506.  
  4507. I/hwcomposer( 5390): [DPY] refresh : 16233766
  4508.  
  4509. I/hwcomposer( 5390): [DPY] connected : 1
  4510.  
  4511. I/hwcomposer( 5390): [DPY] subtype : 0
  4512.  
  4513. W/hwcomposer( 5390): [EVENT] HW VSync State(1)
  4514.  
  4515. W/hwcomposer( 5390): [EVENT] Start to listen uevent, addr.nl_pid(5390)
  4516.  
  4517. I/hwcomposer( 5390): [WKR] Set priority to RR: 268435543
  4518.  
  4519. I/hwcomposer( 5390): [WKR] Set priority to RR: 268435543
  4520.  
  4521. I/hwcomposer( 5390): [WKR] Set priority to RR: 268435543
  4522.  
  4523. I/hwcomposer( 5390): [WKR] Set priority to RR: 268435543
  4524.  
  4525. I/hwcomposer( 5390): [WKR] Set priority to RR: 268435543
  4526.  
  4527. I/SurfaceFlinger( 5390): Using composer version 1.2
  4528.  
  4529. I/hwcomposer( 5390): [HWC] getConfigs Display(0)
  4530.  
  4531. I/hwcomposer( 5390): [HWC] getAttributes Display(0)
  4532.  
  4533. I/hwcomposer( 5390): [HWC] getConfigs Display(1)
  4534.  
  4535. I/hwcomposer( 5390): [HWC] getAttributes Display(1)
  4536.  
  4537. E/hwcomposer( 5390): [HWC] Failed to get display attributes (dpy=1 is not connected)
  4538.  
  4539. I/SurfaceFlinger( 5390): EGL informations:
  4540.  
  4541. I/SurfaceFlinger( 5390): vendor : Android
  4542.  
  4543. I/SurfaceFlinger( 5390): version : 1.4 Android META-EGL
  4544.  
  4545. I/SurfaceFlinger( 5390): extensions: EGL_KHR_get_all_proc_addresses EGL_ANDROID_presentation_time EGL_KHR_image EGL_KHR_image_base EGL_KHR_image_pixmap EGL_KHR_gl_texture_2D_image EGL_KHR_gl_texture_cubemap_image EGL_KHR_gl_renderbuffer_image EGL_KHR_fence_sync EGL_EXT_create_context_robustness EGL_ANDROID_image_native_buffer EGL_ANDROID_recordable
  4546.  
  4547. I/SurfaceFlinger( 5390): Client API: OpenGL_ES
  4548.  
  4549. I/SurfaceFlinger( 5390): EGLSurface: 8-8-8-8, config=0x60000014
  4550.  
  4551. E/ ( 5390): appName=/system/bin/surfaceflinger, acAppName=/system/bin/surfaceflinger
  4552.  
  4553. E/ ( 5390): 1
  4554.  
  4555. E/ ( 5390): appName=/system/bin/surfaceflinger, acAppName=/system/bin/surfaceflinger
  4556.  
  4557. E/ ( 5390): 1
  4558.  
  4559. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4560.  
  4561. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4562.  
  4563. I/SurfaceFlinger( 5390): OpenGL ES informations:
  4564.  
  4565. I/SurfaceFlinger( 5390): vendor : ARM
  4566.  
  4567. I/SurfaceFlinger( 5390): renderer : Mali-400 MP
  4568.  
  4569. I/SurfaceFlinger( 5390): version : OpenGL ES 2.0
  4570.  
  4571. I/SurfaceFlinger( 5390): extensions: GL_EXT_debug_marker GL_OES_texture_npot GL_OES_compressed_ETC1_RGB8_texture GL_OES_standard_derivatives GL_OES_EGL_image GL_OES_depth24 GL_ARM_rgba8 GL_ARM_mali_shader_binary GL_OES_depth_texture GL_OES_packed_depth_stencil GL_EXT_texture_format_BGRA8888 GL_OES_vertex_half_float GL_EXT_blend_minmax GL_OES_EGL_image_external GL_OES_EGL_sync GL_OES_rgb8_rgba8 GL_EXT_multisampled_render_to_texture GL_EXT_discard_framebuffer GL_OES_get_program_binary GL_ARM_mali_program_binary GL_EXT_shader_texture_lod GL_EXT_robustness GL_OES_depth_texture_cube_map GL_KHR_debug
  4572.  
  4573. I/SurfaceFlinger( 5390): GL_MAX_TEXTURE_SIZE = 4096
  4574.  
  4575. I/SurfaceFlinger( 5390): GL_MAX_VIEWPORT_DIMS = 4096
  4576.  
  4577. I/SurfaceFlinger( 5390): [void android::SurfaceFlinger::setMTKProperties(android::String8&)]
  4578.  
  4579. I/SurfaceFlinger( 5390): ========================================================================
  4580.  
  4581. I/SurfaceFlinger( 5390): [AOSP part]
  4582.  
  4583. I/SurfaceFlinger( 5390): debug.sf.showupdates (mDebugRegion): 0
  4584.  
  4585. I/SurfaceFlinger( 5390): debug.sf.ddms (mDebugDDMS): 0
  4586.  
  4587. I/SurfaceFlinger( 5390): [MTK SF part]
  4588.  
  4589. I/SurfaceFlinger( 5390): ro.sf.hwrotation (mHwRotation): 0
  4590.  
  4591. I/SurfaceFlinger( 5390): debug.sf.busyswap (mBusySwap): 1
  4592.  
  4593. I/SurfaceFlinger( 5390): debug.sf.log_repaint (mLogRepaint): 0
  4594.  
  4595. I/SurfaceFlinger( 5390): debug.sf.log_buffer (mLogBuffer): 0
  4596.  
  4597. I/SurfaceFlinger( 5390): debug.sf.log_transaction (mLogTransaction): 0
  4598.  
  4599. I/SurfaceFlinger( 5390): debug.sf.line_g3d (mLineG3D): 0
  4600.  
  4601. I/SurfaceFlinger( 5390): debug.sf.line_ss (mLineScreenShot): 0
  4602.  
  4603. I/SurfaceFlinger( 5390): debug.sf.slowmotion (mDelayTime): 0
  4604.  
  4605. I/SurfaceFlinger( 5390): debug.sf.contbufsenable (mContBufsDump): 0
  4606.  
  4607. I/SurfaceFlinger( 5390): [MTK GUI part]
  4608.  
  4609. I/SurfaceFlinger( 5390): debug.bq.line: 0
  4610.  
  4611. I/SurfaceFlinger( 5390): debug.st.line: 0
  4612.  
  4613. I/SurfaceFlinger( 5390): ========================================================================
  4614.  
  4615. I/SurfaceFlinger( 5390):
  4616.  
  4617. I/BufferQueue( 5390): [unnamed-5390-0](this:0xb8bc32e8,id:0,api:0,p:-1,c:-1) BufferQueue
  4618.  
  4619. I/GLConsumer( 5390): [void android::RingBuffer<TYPE>::resize(uint32_t, bool) [with TYPE = android::sp<android::BackupBuffer>; uint32_t = unsigned int]] 0xb8bc3994 resize to 10 (force=true)
  4620.  
  4621. I/GLConsumer( 5390): [void android::RingBuffer<TYPE>::resize(uint32_t, bool) [with TYPE = android::sp<android::BackupBuffer>; uint32_t = unsigned int]] 0xb8bc3994 resize to 0 (force=false)
  4622.  
  4623. I/BufferQueue( 5390): [unnamed-5390-0](this:0xb8bc32e8,id:0,api:0,p:-1,c:5390) consumerConnect consumer=(5390:/system/bin/surfaceflinger) controlledByApp=false
  4624.  
  4625. I/BufferQueue( 5390): [unnamed-5390-0](this:0xb8bc32e8,id:0,api:0,p:-1,c:5390) setConsumerName: unnamed-5390-0
  4626.  
  4627. I/BufferQueue( 5390): [FrameBufferSurface_0](this:0xb8bc32e8,id:0,api:0,p:-1,c:5390) setConsumerName: FrameBufferSurface_0
  4628.  
  4629. I/BufferQueue( 5390): [FrameBufferSurface_0](this:0xb8bc32e8,id:0,api:0,p:-1,c:5390) setDefaultBufferSize: w=480, h=854
  4630.  
  4631. I/BufferQueue( 5390): [FrameBufferSurface_0](this:0xb8bc32e8,id:0,api:0,p:5390,c:5390) connect: api=1 producer=(5390:/system/bin/surfaceflinger) producerControlledByApp=false
  4632.  
  4633. I/BufferQueue( 5390): [FrameBufferSurface_0](this:0xb8bc32e8,id:0,api:1,p:5390,c:5390) new GraphicBuffer needed
  4634.  
  4635. D/BufferQueue( 5390): [OLD] gb:NULL
  4636.  
  4637. I/[MALI][Gralloc]( 5390): alloc_framebuffer va: 0xb57a3000 mva: 0x9f400000
  4638.  
  4639. I/GraphicBuffer( 5390): allocate buffer (w:480 h:854 f:1) handle(0xb8bc82a0) err(0)
  4640.  
  4641. I/BufferQueue( 5390): [NEW] gb=0xb8bc8198, handle=0xb8bc82a0, w=480, h=854, s=480, fmt=1
  4642.  
  4643. D/BufferQueue( 5390): [FrameBufferSurface_0](this:0xb8bc32e8,id:0,api:1,p:5390,c:5390) cancelBuffer: slot=0
  4644.  
  4645. I/MaliEGL ( 5390): [Mali]window_type=1, is_framebuffer=1, errnum = 0
  4646.  
  4647. I/MaliEGL ( 5390): [Mali]surface->num_buffers=3, surface->num_frames=3, win_min_undequeued=1
  4648.  
  4649. I/MaliEGL ( 5390): [Mali]max_allowed_dequeued_buffers=2
  4650.  
  4651. I/BufferQueue( 5390): [FrameBufferSurface_0](this:0xb8bc32e8,id:0,api:1,p:5390,c:5390) setBufferCount: count=3
  4652.  
  4653. I/BufferQueue( 5390): [FrameBufferSurface_0](this:0xb8bc32e8,id:0,api:1,p:5390,c:5390) getReleasedBuffers: returning mask 0xffffffff
  4654.  
  4655. I/GraphicBuffer( 5390): free buffer (w:480 h:854 f:1) handle(0xb8bc82a0)
  4656.  
  4657. I/SurfaceFlinger( 5390): [setProjection] clear DisplayDevice(type:0) dirty region while booting
  4658.  
  4659. I/BufferQueue( 5390): [FrameBufferSurface_0](this:0xb8bc32e8,id:0,api:1,p:5390,c:5390) new GraphicBuffer needed
  4660.  
  4661. D/BufferQueue( 5390): [OLD] gb:NULL
  4662.  
  4663. I/[MALI][Gralloc]( 5390): alloc_framebuffer va: 0xb57a3000 mva: 0x9f400000
  4664.  
  4665. I/GraphicBuffer( 5390): allocate buffer (w:480 h:854 f:1) handle(0xb8bc91b8) err(0)
  4666.  
  4667. I/BufferQueue( 5390): [NEW] gb=0xb8bc85b8, handle=0xb8bc91b8, w=480, h=854, s=480, fmt=1
  4668.  
  4669. I/SurfaceFlinger( 5390): set priority to RR:268435540
  4670.  
  4671. I/SurfaceFlinger( 5390): [android::SFWatchDog::SFWatchDog()]
  4672.  
  4673. I/SurfaceFlinger( 5390): [virtual void android::SFWatchDog::onFirstRef()]
  4674.  
  4675. I/SurfaceFlinger( 5390): [uint32_t android::SFWatchDog::registerNodeName(const char*)] name=SurfaceFlinger, index=0
  4676.  
  4677. I/SurfaceFlinger( 5390): [virtual android::status_t android::SFWatchDog::readyToRun()]
  4678.  
  4679. I/SurfaceFlinger( 5390): EventThread Client Pid (5390) created
  4680.  
  4681. I/SurfaceFlinger( 5390): [void android::SurfaceFlinger::checkEnableBootAnim()] boot reason = '0'
  4682.  
  4683. I/boot ( 5390): mBootAnimationEnabled = 1
  4684.  
  4685. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4686.  
  4687. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4688.  
  4689. I/boot ( 5390): BOOTPROF:BootAnimation:Start:222710
  4690.  
  4691. D/SurfaceFlinger( 5390): Screen acquired, type=0 flinger=0xb8ba9578
  4692.  
  4693. I/hwcomposer( 5390): [HWC] Blank(0) Display(0)
  4694.  
  4695. I/SurfaceFlinger( 5390): Blur.initialize. minification:19, blurRadius:5, useHighPrecision:0
  4696.  
  4697. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4698.  
  4699. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4700.  
  4701. I/SurfaceFlinger( 5390): Skip composition for [Built-in Screen (type:0)] since dirtyRegion is empty
  4702.  
  4703. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4704.  
  4705. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4706.  
  4707. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4708.  
  4709. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4710.  
  4711. W/linker ( 5418): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  4712.  
  4713. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4714.  
  4715. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4716.  
  4717. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4718.  
  4719. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4720.  
  4721. D/BootAnimation( 5418): [BootAnimation frameworks/base/cmds/bootanimation/bootanimation_main.cpp main 41]start Jan 5 2015 19:01:52
  4722.  
  4723. D/BootAnimation( 5418): [BootAnimation main 52]noBootAnimation=0
  4724.  
  4725. D/BootAnimation( 5418): [BootAnimation main 76]setBoot=1,sePaly=1,setRotated=0
  4726.  
  4727. D/BootAnimation( 5418): [BootAnimation main 82]nVolume=-1
  4728.  
  4729. D/BootAnimation( 5418): before new BootAnimation...
  4730.  
  4731. D/BootAnimation( 5418): [BootAnimation main 96]before new BootAnimation...
  4732.  
  4733. D/BootAnimation( 5418): [BootAnimation frameworks/base/cmds/bootanimation/BootAnimation.cpp BootAnimation 122]
  4734.  
  4735. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4736.  
  4737. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4738.  
  4739. D/BootAnimation( 5418): [BootAnimation BootAnimation 138]bBootOrShutDown=1,bPlayMP3=1,bShutRotate=0
  4740.  
  4741. D/BootAnimation( 5418): [BootAnimation onFirstRef 153]start
  4742.  
  4743. D/BootAnimation( 5418): [BootAnimation onFirstRef 162]end
  4744.  
  4745. D/BootAnimation( 5418): joinThreadPool...
  4746.  
  4747. D/BootAnimation( 5418): [BootAnimation main 99]before joinThreadPool...
  4748.  
  4749. D/BootAnimation( 5418): [BootAnimation readyToRun 490]open bootanimation.zip, ms=222808
  4750.  
  4751. D/BootAnimation( 5418): access resource (/system/media/bootanimation.zip) success, break
  4752.  
  4753. D/BootAnimation( 5418): animation file path: /system/media/bootanimation.zip
  4754.  
  4755. D/BootAnimation( 5418): [BootAnimation readyToRun 497]after check bootanimation.zip,mAndroidAnimation=0, ms=222808
  4756.  
  4757. D/BootAnimation( 5418): [BootAnimation readyToRun 521]end
  4758.  
  4759. D/BootAnimation( 5418): [BootAnimation threadLoop 527]start
  4760.  
  4761. D/BootAnimation( 5418): enter threadLoop()
  4762.  
  4763. D/BootAnimation( 5418): access resource (/system/media/bootaudio.mp3) success, break
  4764.  
  4765. D/BootAnimation( 5418): bBootOrShutDown lifen: 1
  4766.  
  4767. D/BootAnimation( 5418): sound file path: /system/media/bootaudio.mp3
  4768.  
  4769. I/ServiceManager( 5418): Waiting for service media.audio_flinger...
  4770.  
  4771. I/mediaserver( 5392): ServiceManager: 0xb800ee70
  4772.  
  4773. I/AudioFlinger( 5392): Using default 3000 mSec as standby time.
  4774.  
  4775. D/MediaPlayerService( 5392): MediaPlayerService created
  4776.  
  4777. V/MemoryDumper( 5392): Instantiate memory dumper service...
  4778.  
  4779. V/MemoryDumper( 5392): MemoryDumper created, dump file=/sdcard/memstatus_5392
  4780.  
  4781. I/CameraService( 5392): CameraService started (pid=5392)
  4782.  
  4783. D/CameraService( 5392): CameraService::onFirstRef
  4784.  
  4785. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4786.  
  4787. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4788.  
  4789. I/IspDrv ( 5392): {IspDrv} [IspDrvImp] getpid[0x00001510],gettid[0x00001510]
  4790.  
  4791. D/MtkCam/module( 5392): [instantiate_camera_module]
  4792.  
  4793.  
  4794. D/MtkCam/Utils/Property( 5392): [clear] pid/tid=5392/5392
  4795.  
  4796.  
  4797. I/CameraService( 5392): Loaded "MediaTek Camera Module" camera module
  4798.  
  4799. D/MtkCam/MtkCamUtils( 5392): [CamDevMetaInfoMap::clear] pid/tid=5392/5392
  4800.  
  4801.  
  4802. D/SensorHal( 5392): [getInstance][SensorHalImp] getInstance
  4803.  
  4804. D/SensorHal( 5392): [createImp][createImp]: 0
  4805.  
  4806. D/SeninfDrvImp( 5392): [getInstance][getInstance]
  4807.  
  4808. D/SeninfDrvImp( 5392): [SeninfDrvImp][SeninfDrvImp]
  4809.  
  4810. D/SeninfDrvImp( 5392): [init][init]: 0
  4811.  
  4812. I/IspDrv ( 5392): {IspDrv} [getInstance] Gdma: 0.
  4813.  
  4814. I/IspDrv ( 5392): {IspDrv} [init] +,mInitCount(0),m_fgIsGdmaMode(0)
  4815.  
  4816. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] mpIspDrvRegMap malloc:(0-th) ===> [start-->now: 0.044000 ms]
  4817.  
  4818. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] 1st open(ISP_DRV_DEV_NAME, O_RDWR):(1-th) ===> [start-->now: 0.179000 ms] [last-->now: 0.135000 ms]
  4819.  
  4820. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] mpIspHwRegAddr mmap():(2-th) ===> [start-->now: 0.300000 ms] [last-->now: 0.121000 ms]
  4821.  
  4822. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pRTBufTbl mmap():(3-th) ===> [start-->now: 0.377000 ms] [last-->now: 0.077000 ms]
  4823.  
  4824. I/IspDrv ( 5392): {IspDrv} [reset] ISP SW RESET[0x0000000e]
  4825.  
  4826. I/IspDrv ( 5392): {IspDrv} [init] ISP Global Count: 1.
  4827.  
  4828. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] kRefCntCtrl and ISP reset():(4-th) ===> [start-->now: 0.548000 ms] [last-->now: 0.171000 ms]
  4829.  
  4830. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] IMemDrv::createInstance():(5-th) ===> [start-->now: 0.601000 ms] [last-->now: 0.053000 ms]
  4831.  
  4832. I/Drv/IMem( 5392): Drv/IMem[init] open ion id(17).
  4833.  
  4834. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4835.  
  4836. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4837.  
  4838. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->init():(6-th) ===> [start-->now: 1.051000 ms] [last-->now: 0.450000 ms]
  4839.  
  4840. I/IspDrv ( 5392): {IspDrv} [init] m_ispVirRegBufInfo.size(2097156)
  4841.  
  4842. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->allocVirtBuf(m_ispVirRegBufInfo):(7-th) ===> [start-->now: 2.015000 ms] [last-->now: 0.964000 ms]
  4843.  
  4844. I/Drv/IMem( 5392): Drv/IMem[mapPhyAddr] mID(0x12),S(0x200004),V(xb5244000),P(0x40000),S/C(0/0)
  4845.  
  4846. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->mapPhyAddr():(8-th) ===> [start-->now: 2.260000 ms] [last-->now: 0.245000 ms]
  4847.  
  4848. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(mpIspVirRegBuffer):(9-th) ===> [start-->now: 3.699000 ms] [last-->now: 1.439000 ms]
  4849.  
  4850. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->allocVirtBuf(m_ispCQDescBufInfo):(10-th) ===> [start-->now: 3.944000 ms] [last-->now: 0.245000 ms]
  4851.  
  4852. I/Drv/IMem( 5392): Drv/IMem[mapPhyAddr] mID(0x13),S(0x818),V(xb5243000),P(0x280000),S/C(0/0)
  4853.  
  4854. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->mapPhyAddr(m_ispCQDescBufInfo):(11-th) ===> [start-->now: 4.168000 ms] [last-->now: 0.224000 ms]
  4855.  
  4856. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memcpy(mpIspCQDescriptorVirt[i]):(12-th) ===> [start-->now: 4.204000 ms] [last-->now: 0.036000 ms]
  4857.  
  4858. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(mpIspCQDescriptorVirt[CQ0C]):(13-th) ===> [start-->now: 4.230000 ms] [last-->now: 0.026000 ms]
  4859.  
  4860. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(tdriMgrInfoCq1):(14-th) ===> [start-->now: 4.245000 ms] [last-->now: 0.015000 ms]
  4861.  
  4862. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(tdriMgrInfoCq2):(15-th) ===> [start-->now: 4.259000 ms] [last-->now: 0.014000 ms]
  4863.  
  4864. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] atomic_inc:(16-th) ===> [start-->now: 4.273000 ms] [last-->now: 0.014000 ms]
  4865.  
  4866. I/IspDrv ( 5392): {IspDrv} [init] -,ret(1),mInitCount(1)
  4867.  
  4868. I/IspDrv ( 5392): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] Exit:(17-th) ===> [start-->now: 4.292000 ms] [last-->now: 0.019000 ms]
  4869.  
  4870. D/SeninfDrvImp( 5392): [init][init]: X
  4871.  
  4872. D/SeninfDrvImp( 5392): [setTg1PhaseCounter][setTg1PhaseCounter] pcEn(1) clkPol(1)
  4873.  
  4874. D/ImgSensorDrv( 5392): [impSearchSensor]SENSOR search start
  4875.  
  4876. D/ImgSensorDrv( 5392): [impSearchSensor][impSearchSensor] m_fdSensor = 20
  4877.  
  4878. D/ImgSensorDrv( 5392): [impSearchSensor]impSearchSensor search to sub
  4879.  
  4880. D/ImgSensorDrv( 5392): [impSearchSensor]set sensor driver id =10000
  4881.  
  4882. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4883.  
  4884. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4885.  
  4886. W/linker ( 5391): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  4887.  
  4888. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4889.  
  4890. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4891.  
  4892. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4893.  
  4894. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4895.  
  4896. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4897.  
  4898. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4899.  
  4900. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4901.  
  4902. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4903.  
  4904. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4905.  
  4906. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4907.  
  4908. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4909.  
  4910. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4911.  
  4912. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4913.  
  4914. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4915.  
  4916. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4917.  
  4918. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4919.  
  4920. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4921.  
  4922. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4923.  
  4924. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4925.  
  4926. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4927.  
  4928. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4929.  
  4930. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4931.  
  4932. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4933.  
  4934. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4935.  
  4936. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4937.  
  4938. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4939.  
  4940. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4941.  
  4942. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4943.  
  4944. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4945.  
  4946. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4947.  
  4948. D/AndroidRuntime( 5391):
  4949.  
  4950. D/AndroidRuntime( 5391): >>>>>> AndroidRuntime START com.android.internal.os.ZygoteInit <<<<<<
  4951.  
  4952. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  4953.  
  4954. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  4955.  
  4956. D/AndroidRuntime( 5391): CheckJNI is OFF
  4957.  
  4958. D/AndroidRuntime( 5391): language=-Duser.language=en region=-Duser.region=UK
  4959.  
  4960. D/dalvikvm( 5391): boot class :
  4961.  
  4962. D/dalvikvm( 5391): (0) core.jar
  4963.  
  4964. D/dalvikvm( 5391): (1) conscrypt.jar
  4965.  
  4966. D/dalvikvm( 5391): (2) okhttp.jar
  4967.  
  4968. D/dalvikvm( 5391): (3) core-junit.jar
  4969.  
  4970. D/dalvikvm( 5391): (4) bouncycastle.jar
  4971.  
  4972. D/dalvikvm( 5391): (5) ext.jar
  4973.  
  4974. D/dalvikvm( 5391): (6) framework.jar
  4975.  
  4976. D/dalvikvm( 5391): (7) framework2.jar
  4977.  
  4978. D/dalvikvm( 5391): (8) telephony-common.jar
  4979.  
  4980. D/dalvikvm( 5391): (9) voip-common.jar
  4981.  
  4982. D/dalvikvm( 5391): (10) mms-common.jar
  4983.  
  4984. D/dalvikvm( 5391): (11) android.policy.jar
  4985.  
  4986. D/dalvikvm( 5391): (12) services.jar
  4987.  
  4988. D/dalvikvm( 5391): (13) apache-xml.jar
  4989.  
  4990. D/dalvikvm( 5391): (14) webviewchromium.jar
  4991.  
  4992. D/dalvikvm( 5391): (15) mediatek-common.jar
  4993.  
  4994. D/dalvikvm( 5391): (16) mediatek-framework.jar
  4995.  
  4996. D/dalvikvm( 5391): (17) CustomProperties.jar
  4997.  
  4998. D/dalvikvm( 5391): (18) mediatek-telephony-common.jar
  4999.  
  5000. D/dalvikvm( 5391): (19) mediatek-tablet.jar
  5001.  
  5002. D/dalvikvm( 5391): (20) immr_framework.jar
  5003.  
  5004. D/dalvikvm( 5391): (21) am.jar
  5005.  
  5006. D/dalvikvm( 5391): threadid=1: interp stack at 0x5799a000
  5007.  
  5008. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/core.jar /data/dalvik-cache/system@framework@core.jar@classes.dex
  5009.  
  5010. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/conscrypt.jar /data/dalvik-cache/system@framework@conscrypt.jar@classes.dex
  5011.  
  5012. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5013.  
  5014. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5015.  
  5016. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/okhttp.jar /data/dalvik-cache/system@framework@okhttp.jar@classes.dex
  5017.  
  5018. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/core-junit.jar /data/dalvik-cache/system@framework@core-junit.jar@classes.dex
  5019.  
  5020. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/bouncycastle.jar /data/dalvik-cache/system@framework@bouncycastle.jar@classes.dex
  5021.  
  5022. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/ext.jar /data/dalvik-cache/system@framework@ext.jar@classes.dex
  5023.  
  5024. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/framework.jar /data/dalvik-cache/system@framework@framework.jar@classes.dex
  5025.  
  5026. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/framework2.jar /data/dalvik-cache/system@framework@framework2.jar@classes.dex
  5027.  
  5028. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5029.  
  5030. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5031.  
  5032. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/telephony-common.jar /data/dalvik-cache/system@framework@telephony-common.jar@classes.dex
  5033.  
  5034. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/voip-common.jar /data/dalvik-cache/system@framework@voip-common.jar@classes.dex
  5035.  
  5036. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/mms-common.jar /data/dalvik-cache/system@framework@mms-common.jar@classes.dex
  5037.  
  5038. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/android.policy.jar /data/dalvik-cache/system@framework@android.policy.jar@classes.dex
  5039.  
  5040. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/services.jar /data/dalvik-cache/system@framework@services.jar@classes.dex
  5041.  
  5042. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/apache-xml.jar /data/dalvik-cache/system@framework@apache-xml.jar@classes.dex
  5043.  
  5044. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/webviewchromium.jar /data/dalvik-cache/system@framework@webviewchromium.jar@classes.dex
  5045.  
  5046. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/mediatek-common.jar /data/dalvik-cache/system@framework@mediatek-common.jar@classes.dex
  5047.  
  5048. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5049.  
  5050. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5051.  
  5052. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/mediatek-framework.jar /data/dalvik-cache/system@framework@mediatek-framework.jar@classes.dex
  5053.  
  5054. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/CustomProperties.jar /data/dalvik-cache/system@framework@CustomProperties.jar@classes.dex
  5055.  
  5056. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/mediatek-telephony-common.jar /data/dalvik-cache/system@framework@mediatek-telephony-common.jar@classes.dex
  5057.  
  5058. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/mediatek-tablet.jar /data/dalvik-cache/system@framework@mediatek-tablet.jar@classes.dex
  5059.  
  5060. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/immr_framework.jar /data/dalvik-cache/system@framework@immr_framework.jar@classes.dex
  5061.  
  5062. D/dalvikvm( 5391): Unable to stat classpath element '/data/app/com.miui.sdk-1.apk'
  5063.  
  5064. D/dalvikvm( 5391): Unable to stat classpath element '/data/app/com.miui.sdk-2.apk'
  5065.  
  5066. D/dalvikvm( 5391): open_cached_dex_file : /system/app/miui.apk /data/dalvik-cache/system@app@miui.apk@classes.dex
  5067.  
  5068. D/dalvikvm( 5391): Unable to stat classpath element '/data/app/com.miui.framework-1.apk'
  5069.  
  5070. D/dalvikvm( 5391): Unable to stat classpath element '/data/app/com.miui.framework-2.apk'
  5071.  
  5072. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5073.  
  5074. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5075.  
  5076. D/dalvikvm( 5391): open_cached_dex_file : /system/app/MiuiFramework.apk /data/dalvik-cache/system@app@MiuiFramework.apk@classes.dex
  5077.  
  5078. D/dalvikvm( 5391): process bootclasspath ex!!
  5079.  
  5080. D/ImgSensorDrv( 5392): [impSearchSensor][impSearchSensor] Err-ctrlCode (I/O error)
  5081.  
  5082. D/ImgSensorDrv( 5392): [getCurrentSensorType][getCurrentSensorType]
  5083.  
  5084. D/ImgSensorDrv( 5392): [getInfo][getInfo]
  5085.  
  5086. D/dalvikvm( 5391): open_cached_dex_file : /system/framework/mediatek-op.jar /data/dalvik-cache/system@framework@mediatek-op.jar@classes.dex
  5087.  
  5088. D/ImgSensorDrv( 5392): [getSocketPosition][getSocketPosition]:[1][1]
  5089.  
  5090. D/ImgSensorDrv( 5392): [impSearchSensor]sensor ID mismatch
  5091.  
  5092. D/ImgSensorDrv( 5392): [impSearchSensor]set sensor driver id =10001
  5093.  
  5094. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5095.  
  5096. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5097.  
  5098. D/dalvikvm( 5391): Trying to load lib libjavacore.so 0x0
  5099.  
  5100. D/dalvikvm( 5391): Added shared lib libjavacore.so 0x0
  5101.  
  5102. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5103.  
  5104. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5105.  
  5106. E/ICU ( 5391): Couldn't open '/system/usr/icu/icudt51l.dat': No such file or directory
  5107.  
  5108. F/libc ( 5391): Fatal signal 6 (SIGABRT) at 0x0000150f (code=-6), thread 5391 (zygote)
  5109.  
  5110. D/AEE/AED ( 132): $===AEE===AEE===AEE===$
  5111.  
  5112. D/AEE/AED ( 132): p 0 poll events 1 revents 0
  5113.  
  5114. D/AEE/AED ( 132): not know revents:0
  5115.  
  5116. D/AEE/AED ( 132): p 1 poll events 1 revents 0
  5117.  
  5118. D/AEE/AED ( 132): not know revents:0
  5119.  
  5120. D/AEE/AED ( 132): p 2 poll events 1 revents 1
  5121.  
  5122. D/AEE/AED ( 132): aed_main_fork_worker: generator 0x39c0d0, worker 0xbe81a828, recv_fd 15
  5123.  
  5124. D/AEE/AED ( 132): p 3 poll events 1 revents 0
  5125.  
  5126. D/AEE/AED ( 132): not know revents:0
  5127.  
  5128. D/AEE/AED ( 132): p 4 poll events 1 revents 0
  5129.  
  5130. D/AEE/AED ( 132): not know revents:0
  5131.  
  5132. I/DEBUG ( 5454): handle_request(15)
  5133.  
  5134. I/DEBUG ( 5454): check process 5391 name:zygote
  5135.  
  5136. I/DEBUG ( 5454): tid 5391 abort msg address is:0
  5137.  
  5138. I/DEBUG ( 5454): BOOM: pid=5391 uid=0 gid=0 tid=5391
  5139.  
  5140. I/DEBUG ( 5454): [OnPurpose Redunant in preset_info] pid: 5391, tid: 5391, name: zygote >>> zygote <<<
  5141.  
  5142. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5143.  
  5144. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5145.  
  5146. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5147.  
  5148. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5149.  
  5150. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5151.  
  5152. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5153.  
  5154. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5155.  
  5156. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5157.  
  5158. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5159.  
  5160. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5161.  
  5162. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5163.  
  5164. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5165.  
  5166. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5167.  
  5168. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5169.  
  5170. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5171.  
  5172. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5173.  
  5174. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5175.  
  5176. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5177.  
  5178. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5179.  
  5180. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5181.  
  5182. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5183.  
  5184. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5185.  
  5186. I/DEBUG ( 5454): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
  5187.  
  5188. I/DEBUG ( 5454): Build fingerprint: 'alps/lcsh92_wet_jb9/lcsh92_wet_jb9:4.4.2/KOT49H/:user/release-keys'
  5189.  
  5190. I/DEBUG ( 5454): pid: 5391, tid: 5391, name: zygote >>> zygote <<<
  5191.  
  5192. I/DEBUG ( 5454): signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
  5193.  
  5194. D/ImgSensorDrv( 5392): [impSearchSensor][impSearchSensor] Err-ctrlCode (I/O error)
  5195.  
  5196. D/ImgSensorDrv( 5392): [getCurrentSensorType][getCurrentSensorType]
  5197.  
  5198. D/ImgSensorDrv( 5392): [getInfo][getInfo]
  5199.  
  5200. D/ImgSensorDrv( 5392): [getSocketPosition][getSocketPosition]:[1][1]
  5201.  
  5202. D/ImgSensorDrv( 5392): [impSearchSensor]sensor ID mismatch
  5203.  
  5204. D/ImgSensorDrv( 5392): [impSearchSensor]set sensor driver id =10002
  5205.  
  5206. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5207.  
  5208. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5209.  
  5210. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5211.  
  5212. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5213.  
  5214. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5215.  
  5216. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5217.  
  5218. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5219.  
  5220. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5221.  
  5222. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5223.  
  5224. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5225.  
  5226. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5227.  
  5228. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5229.  
  5230. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5231.  
  5232. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5233.  
  5234. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5235.  
  5236. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5237.  
  5238. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5239.  
  5240. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5241.  
  5242. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5243.  
  5244. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5245.  
  5246. I/DEBUG ( 5454): r0 00000000 r1 0000150f r2 00000006 r3 00000000
  5247.  
  5248. I/DEBUG ( 5454): r4 00000006 r5 00000002 r6 0000150f r7 0000010c
  5249.  
  5250. I/DEBUG ( 5454): r8 40181bc8 r9 41961e98 sl 5b0f6fa7 fp 41a28128
  5251.  
  5252. I/DEBUG ( 5454): ip 4195cb48 sp bea2fb68 lr 401312b1 pc 401401f4 cpsr 00070010
  5253.  
  5254. I/DEBUG ( 5454):
  5255.  
  5256. I/DEBUG ( 5454): backtrace:
  5257.  
  5258. I/DEBUG ( 5454): #00 pc 000261f4 /system/lib/libc.so (tgkill+12)
  5259.  
  5260. I/DEBUG ( 5454): #01 pc 000172ad /system/lib/libc.so (pthread_kill+48)
  5261.  
  5262. I/DEBUG ( 5454): #02 pc 000174c1 /system/lib/libc.so (raise+10)
  5263.  
  5264. I/DEBUG ( 5454): #03 pc 000161f5 /system/lib/libc.so
  5265.  
  5266. I/DEBUG ( 5454): #04 pc 00025aa4 /system/lib/libc.so (abort+4)
  5267.  
  5268. I/DEBUG ( 5454): #05 pc 00015ab7 /system/lib/libjavacore.so (register_libcore_icu_ICU(_JNIEnv*)+242)
  5269.  
  5270. I/DEBUG ( 5454): #06 pc 0000e553 /system/lib/libjavacore.so (JNI_OnLoad+190)
  5271.  
  5272. I/DEBUG ( 5454): #07 pc 000523c1 /system/lib/libdvm.so (dvmLoadNativeCode(char const*, Object*, char**)+516)
  5273.  
  5274. I/DEBUG ( 5454): #08 pc 00047911 /system/lib/libdvm.so
  5275.  
  5276. I/DEBUG ( 5454): #09 pc 0004950d /system/lib/libdvm.so (dvmStartup(int, char const* const*, bool, _JNIEnv*)+6444)
  5277.  
  5278. I/DEBUG ( 5454): #10 pc 0004fdbd /system/lib/libdvm.so (JNI_CreateJavaVM+596)
  5279.  
  5280. I/DEBUG ( 5454): #11 pc 00002d79 /system/lib/libnativehelper.so (JniInvocation::JNI_CreateJavaVM(_JavaVM**, _JNIEnv**, void*)+10)
  5281.  
  5282. I/DEBUG ( 5454): #12 pc 0004ff7f /system/lib/libandroid_runtime.so (android::AndroidRuntime::startVm(_JavaVM**, _JNIEnv**)+1814)
  5283.  
  5284. I/DEBUG ( 5454): #13 pc 0005025d /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, char const*)+176)
  5285.  
  5286. I/DEBUG ( 5454): #14 pc 0000105b /system/bin/app_process
  5287.  
  5288. I/DEBUG ( 5454): #15 pc 0000f31c /system/lib/libc.so (__libc_init+100)
  5289.  
  5290. I/DEBUG ( 5454): #16 pc 00000d7c /system/bin/app_process
  5291.  
  5292. I/DEBUG ( 5454):
  5293.  
  5294. I/DEBUG ( 5454): stack:
  5295.  
  5296. I/DEBUG ( 5454): bea2fb28 41a25940 /system/lib/libdvm.so
  5297.  
  5298. I/DEBUG ( 5454): bea2fb2c 6066a047
  5299.  
  5300. I/DEBUG ( 5454): bea2fb30 41964aa8
  5301.  
  5302. I/DEBUG ( 5454): bea2fb34 00000000
  5303.  
  5304. I/DEBUG ( 5454): bea2fb38 41964e14
  5305.  
  5306. I/DEBUG ( 5454): bea2fb3c 41a4a178 /dev/ashmem/dalvik-zygote (deleted)
  5307.  
  5308. I/DEBUG ( 5454): bea2fb40 579ccfa4 /dev/ashmem/dalvik-LinearAlloc (deleted)
  5309.  
  5310. I/DEBUG ( 5454): bea2fb44 579ccfa4 /dev/ashmem/dalvik-LinearAlloc (deleted)
  5311.  
  5312. I/DEBUG ( 5454): bea2fb48 41964f88
  5313.  
  5314. I/DEBUG ( 5454): bea2fb4c 419f94f9 /system/lib/libdvm.so (dexParameterIteratorInit(DexParameterIterator*, DexProto const*)+18)
  5315.  
  5316. I/DEBUG ( 5454): bea2fb50 41a4a178 /dev/ashmem/dalvik-zygote (deleted)
  5317.  
  5318. I/DEBUG ( 5454): bea2fb54 bea2fbb0 [stack]
  5319.  
  5320. I/DEBUG ( 5454): bea2fb58 5bc040f0 /system/lib/libjavacore.so
  5321.  
  5322. I/DEBUG ( 5454): bea2fb5c 419d48d3 /system/lib/libdvm.so
  5323.  
  5324. I/DEBUG ( 5454): bea2fb60 bea2fb70 [stack]
  5325.  
  5326. I/DEBUG ( 5454): bea2fb64 bea2fb83 [stack]
  5327.  
  5328. I/DEBUG ( 5454): #00 bea2fb68 00000006
  5329.  
  5330. I/DEBUG ( 5454): bea2fb6c 00000002
  5331.  
  5332. I/DEBUG ( 5454): bea2fb70 0000150f
  5333.  
  5334. I/DEBUG ( 5454): bea2fb74 4195cb48
  5335.  
  5336. I/DEBUG ( 5454): bea2fb78 4195cb48
  5337.  
  5338. I/DEBUG ( 5454): bea2fb7c 401312b1 /system/lib/libc.so (pthread_kill+52)
  5339.  
  5340. I/DEBUG ( 5454): #01 bea2fb80 00000006
  5341.  
  5342. I/DEBUG ( 5454): bea2fb84 00000000
  5343.  
  5344. I/DEBUG ( 5454): bea2fb88 ffffffff
  5345.  
  5346. I/DEBUG ( 5454): bea2fb8c 401314c5 /system/lib/libc.so (raise+14)
  5347.  
  5348. I/DEBUG ( 5454): #02 bea2fb90 bea2fb9c [stack]
  5349.  
  5350. I/DEBUG ( 5454): bea2fb94 401301f9 /system/lib/libc.so
  5351.  
  5352. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5353.  
  5354. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5355.  
  5356. I/DEBUG ( 5454):
  5357.  
  5358. I/DEBUG ( 5454): memory near r1:
  5359.  
  5360. I/DEBUG ( 5454): 000014ec ffffffff ffffffff ffffffff ffffffff
  5361.  
  5362. I/DEBUG ( 5454): 000014fc ffffffff ffffffff ffffffff ffffffff
  5363.  
  5364. I/DEBUG ( 5454): 0000150c ffffffff ffffffff ffffffff ffffffff
  5365.  
  5366. I/DEBUG ( 5454): 0000151c ffffffff ffffffff ffffffff ffffffff
  5367.  
  5368. I/DEBUG ( 5454): 0000152c ffffffff ffffffff ffffffff ffffffff
  5369.  
  5370. I/DEBUG ( 5454): 0000153c ffffffff ffffffff ffffffff ffffffff
  5371.  
  5372. I/DEBUG ( 5454): 0000154c ffffffff ffffffff ffffffff ffffffff
  5373.  
  5374. I/DEBUG ( 5454): 0000155c ffffffff ffffffff ffffffff ffffffff
  5375.  
  5376. I/DEBUG ( 5454): 0000156c ffffffff ffffffff ffffffff ffffffff
  5377.  
  5378. I/DEBUG ( 5454): 0000157c ffffffff ffffffff ffffffff ffffffff
  5379.  
  5380. I/DEBUG ( 5454): 0000158c ffffffff ffffffff ffffffff ffffffff
  5381.  
  5382. I/DEBUG ( 5454): 0000159c ffffffff ffffffff ffffffff ffffffff
  5383.  
  5384. I/DEBUG ( 5454): 000015ac ffffffff ffffffff ffffffff ffffffff
  5385.  
  5386. I/DEBUG ( 5454): 000015bc ffffffff ffffffff ffffffff ffffffff
  5387.  
  5388. I/DEBUG ( 5454): 000015cc ffffffff ffffffff ffffffff ffffffff
  5389.  
  5390. I/DEBUG ( 5454): 000015dc ffffffff ffffffff ffffffff ffffffff
  5391.  
  5392. I/DEBUG ( 5454):
  5393.  
  5394. I/DEBUG ( 5454): memory near r6:
  5395.  
  5396. I/DEBUG ( 5454): 000014ec ffffffff ffffffff ffffffff ffffffff
  5397.  
  5398. I/DEBUG ( 5454): 000014fc ffffffff ffffffff ffffffff ffffffff
  5399.  
  5400. I/DEBUG ( 5454): 0000150c ffffffff ffffffff ffffffff ffffffff
  5401.  
  5402. I/DEBUG ( 5454): 0000151c ffffffff ffffffff ffffffff ffffffff
  5403.  
  5404. I/DEBUG ( 5454): 0000152c ffffffff ffffffff ffffffff ffffffff
  5405.  
  5406. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5407.  
  5408. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5409.  
  5410. I/DEBUG ( 5454): 0000153c ffffffff ffffffff ffffffff ffffffff
  5411.  
  5412. I/DEBUG ( 5454): 0000154c ffffffff ffffffff ffffffff ffffffff
  5413.  
  5414. I/DEBUG ( 5454): 0000155c ffffffff ffffffff ffffffff ffffffff
  5415.  
  5416. I/DEBUG ( 5454): 0000156c ffffffff ffffffff ffffffff ffffffff
  5417.  
  5418. I/DEBUG ( 5454): 0000157c ffffffff ffffffff ffffffff ffffffff
  5419.  
  5420. I/DEBUG ( 5454): 0000158c ffffffff ffffffff ffffffff ffffffff
  5421.  
  5422. I/DEBUG ( 5454): 0000159c ffffffff ffffffff ffffffff ffffffff
  5423.  
  5424. I/DEBUG ( 5454): 000015ac ffffffff ffffffff ffffffff ffffffff
  5425.  
  5426. I/DEBUG ( 5454): 000015bc ffffffff ffffffff ffffffff ffffffff
  5427.  
  5428. I/DEBUG ( 5454): 000015cc ffffffff ffffffff ffffffff ffffffff
  5429.  
  5430. I/DEBUG ( 5454): 000015dc ffffffff ffffffff ffffffff ffffffff
  5431.  
  5432. I/DEBUG ( 5454):
  5433.  
  5434. I/DEBUG ( 5454): memory near r8:
  5435.  
  5436. I/DEBUG ( 5454): 40181ba8 00001000 00001000 00010000 00200000
  5437.  
  5438. I/DEBUG ( 5454): 40181bb8 00000003 40144c48 bea30964 bea30a0f
  5439.  
  5440. I/DEBUG ( 5454): 40181bc8 1d876a9e bea3091c 00000000 40101d20
  5441.  
  5442. I/DEBUG ( 5454): 40181bd8 00000007 00000008 00000000 40102184
  5443.  
  5444. I/DEBUG ( 5454): 40181be8 00000000 40b43000 00000009 0000000a
  5445.  
  5446. I/DEBUG ( 5454): 40181bf8 00000000 00000000 00000000 00000000
  5447.  
  5448. I/DEBUG ( 5454): 40181c08 00000000 00000000 00000000 00000000
  5449.  
  5450. I/DEBUG ( 5454): 40181c18 00000000 00000000 00000000 00000000
  5451.  
  5452. I/DEBUG ( 5454): 40181c28 00000000 00000000 00000000 00000000
  5453.  
  5454. I/DEBUG ( 5454): 40181c38 00000000 00000000 00000000 00000000
  5455.  
  5456. I/DEBUG ( 5454): 40181c48 00000000 00000000 00000000 00000000
  5457.  
  5458. I/DEBUG ( 5454): 40181c58 00000000 00000000 00000000 00000000
  5459.  
  5460. I/DEBUG ( 5454): 40181c68 00000000 00000000 00000000 00000000
  5461.  
  5462. I/DEBUG ( 5454): 40181c78 00000000 00000000 00000000 00000000
  5463.  
  5464. I/DEBUG ( 5454): 40181c88 00000000 00000000 00000000 00000000
  5465.  
  5466. I/DEBUG ( 5454): 40181c98 00000000 00000000 00000000 00000000
  5467.  
  5468. I/DEBUG ( 5454):
  5469.  
  5470. I/DEBUG ( 5454): memory near r9:
  5471.  
  5472. I/DEBUG ( 5454): 41961e78 bea2ff48 bea2ff34 402b949e 00000000
  5473.  
  5474. I/DEBUG ( 5454): 41961e88 00000000 00000000 00000000 00000023
  5475.  
  5476. I/DEBUG ( 5454): 41961e98 41a1e37c 00000000 00000001 41964aa8
  5477.  
  5478. I/DEBUG ( 5454): 41961ea8 00000000 00000000 00000000 00000013
  5479.  
  5480. I/DEBUG ( 5454): 41961eb8 0000002e 00000000 00000000 0000002b
  5481.  
  5482. I/DEBUG ( 5454): 41961ec8 7379732f 2f6d6574 6d617266 726f7765
  5483.  
  5484. I/DEBUG ( 5454): 41961ed8 656d2f6b 74616964 6f2d6b65 616a2e70
  5485.  
  5486. I/DEBUG ( 5454): 41961ee8 00000072 00000013 65726f63 72616a2e
  5487.  
  5488. I/DEBUG ( 5454): 41961ef8 00000000 0000001b 736e6f63 70797263
  5489.  
  5490. I/DEBUG ( 5454): 41961f08 616a2e74 00000072 00000000 00000013
  5491.  
  5492. I/DEBUG ( 5454): 41961f18 74686b6f 6a2e7074 00007261 0000001b
  5493.  
  5494. I/DEBUG ( 5454): 41961f28 65726f63 6e756a2d 6a2e7469 00007261
  5495.  
  5496. I/DEBUG ( 5454): 41961f38 00000000 0000001b 6e756f62 61637963
  5497.  
  5498. I/DEBUG ( 5454): 41961f48 656c7473 72616a2e 00000000 00000013
  5499.  
  5500. I/DEBUG ( 5454): 41961f58 2e747865 0072616a 00000000 0000001b
  5501.  
  5502. I/DEBUG ( 5454): 41961f68 6d617266 726f7765 616a2e6b 00000072
  5503.  
  5504. I/DEBUG ( 5454):
  5505.  
  5506. I/DEBUG ( 5454): memory near sl:
  5507.  
  5508. I/DEBUG ( 5454): 5b0f6f84 63617661 2e65726f 00006f73 7461502f
  5509.  
  5510. I/DEBUG ( 5454): 5b0f6f94 0000001b 7379732f 2f6d6574 2f727375
  5511.  
  5512. I/DEBUG ( 5454): 5b0f6fa4 00756369 746e4965 00000031 726f466c
  5513.  
  5514. I/DEBUG ( 5454): 5b0f6fb4 3b74616d 62617400 00000021 3b786564
  5515.  
  5516. I/DEBUG ( 5454): 5b0f6fc4 00000000 00000000 00000011 00000000
  5517.  
  5518. I/DEBUG ( 5454): 5b0f6fd4 00000000 00000030 0000001a 5b0e8000
  5519.  
  5520. I/DEBUG ( 5454): 5b0f6fe4 0000f000 59ed8fe0 00000001 00000000
  5521.  
  5522. I/DEBUG ( 5454): 5b0f6ff4 00000007 00000007 00000007 0a796564
  5523.  
  5524. I/DEBUG ( 5454): 5b0f7004 00363330 00000028 00022090 000220b8
  5525.  
  5526. I/DEBUG ( 5454): 5b0f7014 0000036c 00022428 00003c00 00000000
  5527.  
  5528. I/DEBUG ( 5454): 5b0f7024 aba5d33e 0a786564 00353330 dfc59663
  5529.  
  5530. I/DEBUG ( 5454): 5b0f7034 46292994 fb5698cd 090babaf 9aab2356
  5531.  
  5532. I/DEBUG ( 5454): 5b0f7044 58a797ba 00022090 00000070 12345678
  5533.  
  5534. I/DEBUG ( 5454): 5b0f7054 00000000 00000000 00021fc0 000006c5
  5535.  
  5536. I/DEBUG ( 5454): 5b0f7064 00000070 00000082 00001b84 000000bf
  5537.  
  5538. I/DEBUG ( 5454): 5b0f7074 00001d8c 00000259 00002680 00000257
  5539.  
  5540. I/DEBUG ( 5454):
  5541.  
  5542. I/DEBUG ( 5454): memory near fp:
  5543.  
  5544. I/DEBUG ( 5454): 41a28108 41965000 41a28004 41a209d0 41a2822c
  5545.  
  5546. I/DEBUG ( 5454): 41a28118 40105eb8 00000001 41965000 00000100
  5547.  
  5548. I/DEBUG ( 5454): 41a28128 6a62696c 63617661 2e65726f 00006f73
  5549.  
  5550. I/DEBUG ( 5454): 41a28138 00000000 00000000 00000000 00000000
  5551.  
  5552. I/DEBUG ( 5454): 41a28148 00000000 00000000 00000000 00000000
  5553.  
  5554. I/DEBUG ( 5454): 41a28158 00000000 00000000 00000000 00000000
  5555.  
  5556. I/DEBUG ( 5454): 41a28168 00000000 00000000 00000000 00000000
  5557.  
  5558. I/DEBUG ( 5454): 41a28178 00000000 00000000 00000000 00000000
  5559.  
  5560. I/DEBUG ( 5454): 41a28188 00000000 00000000 00000000 00000000
  5561.  
  5562. I/DEBUG ( 5454): 41a28198 00000000 00000000 00000000 00000000
  5563.  
  5564. I/DEBUG ( 5454): 41a281a8 5bbd9034 00000008 00000000 5bbd9000
  5565.  
  5566. I/DEBUG ( 5454): 41a281b8 00034000 00000000 5bc0a690 00000000
  5567.  
  5568. I/DEBUG ( 5454): 41a281c8 00000000 00000000 00000001 5bbdbd88
  5569.  
  5570. I/DEBUG ( 5454): 41a281d8 5bbd9148 00000209 000002c4 5bbe0478
  5571.  
  5572. I/DEBUG ( 5454): 41a281e8 5bbe0c9c 5bc0a8a4 5bbe45dc 000001d4
  5573.  
  5574. I/DEBUG ( 5454): 41a281f8 5bbe17ac 000005c6 00000000 00000000
  5575.  
  5576. I/DEBUG ( 5454):
  5577.  
  5578. I/DEBUG ( 5454): memory near ip:
  5579.  
  5580. I/DEBUG ( 5454): 4195cb28 00000000 00000000 00000000 00000000
  5581.  
  5582. I/DEBUG ( 5454): 4195cb38 00000000 00000000 00000000 00000000
  5583.  
  5584. I/DEBUG ( 5454): 4195cb48 7379732f 2f6d6574 2f727375 2f756369
  5585.  
  5586. I/DEBUG ( 5454): 4195cb58 64756369 6c313574 7461642e 00000000
  5587.  
  5588. I/DEBUG ( 5454): 4195cb68 65676465 6d6f7266 68746170 766c6c2e
  5589.  
  5590. I/DEBUG ( 5454): 4195cb78 6f72706d 756f2e66 00000074 00000000
  5591.  
  5592. I/DEBUG ( 5454): 4195cb88 65676465 6d6f7266 68746170 766c6c2e
  5593.  
  5594. I/DEBUG ( 5454): 4195cb98 6f72706d 756f2e66 00000074 00000000
  5595.  
  5596. I/DEBUG ( 5454): 4195cba8 4195cbc8 00000000 00000000 00000000
  5597.  
  5598. I/DEBUG ( 5454): 4195cbb8 00000000 00000000 00000000 00000000
  5599.  
  5600. I/DEBUG ( 5454): 4195cbc8 4195cbe8 00000000 00000000 00000000
  5601.  
  5602. I/DEBUG ( 5454): 4195cbd8 00000000 00000000 00000000 00000000
  5603.  
  5604. I/DEBUG ( 5454): 4195cbe8 4195cc08 00000000 00000000 00000000
  5605.  
  5606. I/DEBUG ( 5454): 4195cbf8 00000000 00000000 00000000 00000000
  5607.  
  5608. I/DEBUG ( 5454): 4195cc08 4195cc28 00000000 00000000 00000000
  5609.  
  5610. I/DEBUG ( 5454): 4195cc18 00000000 00000000 00000000 00000000
  5611.  
  5612. I/DEBUG ( 5454):
  5613.  
  5614. I/DEBUG ( 5454): memory near sp:
  5615.  
  5616. I/DEBUG ( 5454): bea2fb48 41964f88 419f94f9 41a4a178 bea2fbb0
  5617.  
  5618. I/DEBUG ( 5454): bea2fb58 5bc040f0 419d48d3 bea2fb70 bea2fb83
  5619.  
  5620. I/DEBUG ( 5454): bea2fb68 00000006 00000002 0000150f 4195cb48
  5621.  
  5622. I/DEBUG ( 5454): bea2fb78 4195cb48 401312b1 00000006 00000000
  5623.  
  5624. I/DEBUG ( 5454): bea2fb88 ffffffff 401314c5 bea2fb9c 401301f9
  5625.  
  5626. I/DEBUG ( 5454): bea2fb98 0000001f ffffffdf bea2fc44 1d876a9e
  5627.  
  5628. I/DEBUG ( 5454): bea2fba8 bea2fc44 bea2fc44 00000000 bea2fc44
  5629.  
  5630. I/DEBUG ( 5454): bea2fbb8 00000000 4013faa8 4011596d 5bbeeabb
  5631.  
  5632. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5633.  
  5634. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5635.  
  5636. I/DEBUG ( 5454): bea2fbc8 40170998 00000011 579cd0bc 59a96438
  5637.  
  5638. I/DEBUG ( 5454): bea2fbd8 00000003 00000003 00000000 41a4a178
  5639.  
  5640. I/DEBUG ( 5454): bea2fbe8 5bc0411f 5bc0410c 5bc0ba00 00000002
  5641.  
  5642. I/DEBUG ( 5454): bea2fbf8 579cd0a8 41a4a178 579cd0a8 bea2fc2c
  5643.  
  5644. I/DEBUG ( 5454): bea2fc08 5bc0411f 419b0035 00000000 419b4897
  5645.  
  5646. I/DEBUG ( 5454): bea2fc18 1ea00005 5bc04080 00000003 5bc0b9e8
  5647.  
  5648. I/DEBUG ( 5454): bea2fc28 00000001 bea2fc44 5bc04080 419b0035
  5649.  
  5650. I/DEBUG ( 5454): bea2fc38 1ea00005 419b0f99 41961e98 4195cb68
  5651.  
  5652. I/DEBUG ( 5454):
  5653.  
  5654. I/DEBUG ( 5454): code around pc:
  5655.  
  5656. I/DEBUG ( 5454): 401401d4 e8bd00f0 e3700a01 912fff1e e2600000
  5657.  
  5658. I/DEBUG ( 5454): 401401e4 ea00b702 e92d50f0 e3a07f43 ef000000
  5659.  
  5660. I/DEBUG ( 5454): 401401f4 e8bd50f0 e3700a01 912fff1e e2600000
  5661.  
  5662. I/DEBUG ( 5454): 40140204 ea00b6fa e92d50f0 e3a070ee ef000000
  5663.  
  5664. I/DEBUG ( 5454): 40140214 e8bd50f0 e3700a01 912fff1e e2600000
  5665.  
  5666. I/DEBUG ( 5454): 40140224 ea00b6f2 00000000 00000000 e92d400f
  5667.  
  5668. I/DEBUG ( 5454): 40140234 e1a03000 e1a00001 e1a01003 eb000040
  5669.  
  5670. I/DEBUG ( 5454): 40140244 e8bd400f e12fff1e e320f000 e92d403f
  5671.  
  5672. I/DEBUG ( 5454): 40140254 e2522040 ba00002c e1a05001 e2455c01
  5673.  
  5674. I/DEBUG ( 5454): 40140264 f5d5f000 f5d5f040 f5d5f080 f5d5f0c0
  5675.  
  5676. I/DEBUG ( 5454): 40140274 e2411040 e2400040 e1a05000 e1a04001
  5677.  
  5678. I/DEBUG ( 5454): 40140284 f424020d f424420d f405022d f405422d
  5679.  
  5680. I/DEBUG ( 5454): 40140294 e2522040 ba00001c e2411040 e2400040
  5681.  
  5682. I/DEBUG ( 5454): 401402a4 e1a05000 e1a04001 f424020d f424420d
  5683.  
  5684. I/DEBUG ( 5454): 401402b4 f405022d f405422d e2522040 ba000012
  5685.  
  5686. I/DEBUG ( 5454): 401402c4 e2411040 e2400040 e1a05000 e1a04001
  5687.  
  5688. I/DEBUG ( 5454):
  5689.  
  5690. I/DEBUG ( 5454): code around lr:
  5691.  
  5692. I/DEBUG ( 5454): 40131290 447b4b13 42b3e010 4812d10e 44786a1e
  5693.  
  5694. I/DEBUG ( 5454): 401312a0 eb08f7f8 e9d8f00d 46224631 ef9cf00e
  5695.  
  5696. I/DEBUG ( 5454): 401312b0 d00a3001 e00b2400 2b00681b 480ad1eb
  5697.  
  5698. I/DEBUG ( 5454): 401312c0 44782403 eaf6f7f8 f001e002 6804fa1b
  5699.  
  5700. I/DEBUG ( 5454): 401312d0 fa18f001 46206005 bf00bd70 0005095a
  5701.  
  5702. I/DEBUG ( 5454): 401312e0 0005094e 00050946 00050922 bf7ef7ff
  5703.  
  5704. I/DEBUG ( 5454): 401312f0 43f0e92d 4a3d4b3c 589c447b 6823b08b
  5705.  
  5706. I/DEBUG ( 5454): 40131300 460d4606 f0019309 46a1f9fd 8000f8d0
  5707.  
  5708. I/DEBUG ( 5454): 40131310 d0482d00 f00f4628 280ffed5 d8444604
  5709.  
  5710. I/DEBUG ( 5454): 40131320 ffe4f7ff d1064286 4629200f e8a2f00d
  5711.  
  5712. I/DEBUG ( 5454): 40131330 d03c2800 482ee02e f7f84478 482dea3a
  5713.  
  5714. I/DEBUG ( 5454): 40131340 e0154478 d11342b0 482b6a06 f7f84478
  5715.  
  5716. I/DEBUG ( 5454): 40131350 4a2aeab2 447a2120 a8014633 e84af015
  5717.  
  5718. I/DEBUG ( 5454): 40131360 a8012101 ef52f021 46061c42 e011d104
  5719.  
  5720. I/DEBUG ( 5454): 40131370 28006800 e02cd1e6 46294630 f00d4622
  5721.  
  5722. I/DEBUG ( 5454): 40131380 1c43e8de d11e4607 f9bcf001 29046801
  5723.  
  5724. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5725.  
  5726. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5727.  
  5728. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5729.  
  5730. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5731.  
  5732. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5733.  
  5734. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5735.  
  5736. D/ImgSensorDrv( 5392): [impSearchSensor][impSearchSensor] Err-ctrlCode (I/O error)
  5737.  
  5738. D/ImgSensorDrv( 5392): [getCurrentSensorType][getCurrentSensorType]
  5739.  
  5740. D/ImgSensorDrv( 5392): [getInfo][getInfo]
  5741.  
  5742. D/ImgSensorDrv( 5392): [getSocketPosition][getSocketPosition]:[1][1]
  5743.  
  5744. D/ImgSensorDrv( 5392): [impSearchSensor]sensor ID mismatch
  5745.  
  5746. D/ImgSensorDrv( 5392): [impSearchSensor]set sensor driver id =10003
  5747.  
  5748. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5749.  
  5750. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5751.  
  5752. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5753.  
  5754. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5755.  
  5756. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5757.  
  5758. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5759.  
  5760. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5761.  
  5762. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5763.  
  5764. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5765.  
  5766. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5767.  
  5768. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5769.  
  5770. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5771.  
  5772. V/AEE/AED ( 5454): dashboard_record_update() : rec->module = zygote
  5773.  
  5774. D/AEE/AED ( 5454): Skip duplicated exception !
  5775.  
  5776. D/AEE/AED ( 5454): Exception Class: 1
  5777.  
  5778. D/AEE/AED ( 5454): Module: zygote
  5779.  
  5780. D/AEE/AED ( 5454): Count: 41
  5781.  
  5782. D/AEE/AED ( 5454): Last exception time: 1388537674
  5783.  
  5784. D/AEE/AED ( 5454):
  5785.  
  5786. V/AEE/AED ( 5454): aed_ne_session() - skipped
  5787.  
  5788. D/AEE/AED ( 132): $===AEE===AEE===AEE===$
  5789.  
  5790. D/AEE/AED ( 132): p 0 poll events 1 revents 0
  5791.  
  5792. D/AEE/AED ( 132): not know revents:0
  5793.  
  5794. D/AEE/AED ( 132): p 1 poll events 1 revents 0
  5795.  
  5796. D/AEE/AED ( 132): not know revents:0
  5797.  
  5798. D/AEE/AED ( 132): p 2 poll events 1 revents 0
  5799.  
  5800. D/AEE/AED ( 132): not know revents:0
  5801.  
  5802. D/AEE/AED ( 132): p 3 poll events 1 revents 0
  5803.  
  5804. D/AEE/AED ( 132): not know revents:0
  5805.  
  5806. D/AEE/AED ( 132): p 4 poll events 1 revents 0
  5807.  
  5808. D/AEE/AED ( 132): not know revents:0
  5809.  
  5810. I/Netd ( 5389): execIptablesCommand android_fork_execvp exit
  5811.  
  5812. I/Netd ( 5389): execIptablesCommand android_fork_execvp enter
  5813.  
  5814. I/ServiceManager( 124): service 'SurfaceFlinger' died
  5815.  
  5816. D/IPCThreadState( 5418): [DN #5] BR_DEAD_BINDER cookie 0xb79e1a10
  5817.  
  5818. W/SurfaceComposerClient( 5418): ComposerService remote (surfaceflinger) died [0xb79e1a10]
  5819.  
  5820. D/BootAnimation( 5418): [BootAnimation binderDied 172]start
  5821.  
  5822. D/BootAnimation( 5418): SurfaceFlinger died, exiting...
  5823.  
  5824. I/ServiceManager( 124): service 'media.audio_flinger' died
  5825.  
  5826. I/ServiceManager( 124): service 'media.player' died
  5827.  
  5828. I/ServiceManager( 124): service 'memory.dumper' died
  5829.  
  5830. I/AKMD2 ( 5490): AK8963/B for Android v20110826 (Library: v3.1.0.1012) started.
  5831.  
  5832. I/AKMD2 ( 5490): Debug: ON
  5833.  
  5834. I/AKMD2 ( 5490): Debug level: 4
  5835.  
  5836. I/AKMD2 ( 5490): Output to: LOGD
  5837.  
  5838. I/AKMD2 ( 5490): AK8963/B for Android end (-2).
  5839.  
  5840. I/Netd ( 5495): Netd 1.0 starting
  5841.  
  5842. W/InterfaceController( 5495): Warning (dlopen failed: library "/system/lib/libnetcmdiface.so" not found) while opening the net interface command library
  5843.  
  5844. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  5845.  
  5846. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  5847.  
  5848. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  5849.  
  5850. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  5851.  
  5852. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  5853.  
  5854. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  5855.  
  5856. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  5857.  
  5858. W/linker ( 5498): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  5859.  
  5860. I/SurfaceFlinger( 5496): [int main(int, char**)] set surfaceflinger is in root user, adjust caps for its thread
  5861.  
  5862. I/SurfaceFlinger( 5496): SurfaceFlinger is starting
  5863.  
  5864. I/SurfaceFlinger( 5496): SurfaceFlinger's main thread ready to run. Initializing graphics H/W...
  5865.  
  5866. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  5867.  
  5868. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  5869.  
  5870. D/libEGL ( 5496): loaded /system/lib/egl/libEGL_mali.so
  5871.  
  5872. D/libEGL ( 5496): loaded /system/lib/egl/libGLESv1_CM_mali.so
  5873.  
  5874. D/libEGL ( 5496): loaded /system/lib/egl/libGLESv2_mali.so
  5875.  
  5876. W/linker ( 5497): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  5877.  
  5878. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  5879.  
  5880. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  5881.  
  5882. E/cutils-trace( 5496): Error opening trace file: No such file or directory (2)
  5883.  
  5884. I/[MALI][Gralloc]( 5496): dlopen libsec_mem.so fail
  5885.  
  5886. I/gralloc ( 5496): [Gralloc] refreshRate = 0, info.pixclock = ffffffff
  5887.  
  5888. I/gralloc ( 5496): [Gralloc] info.upper_margin = ffffffff, info.lower_margin = ffffffff
  5889.  
  5890. I/gralloc ( 5496): [Gralloc] info.yres = 356, info.hsync_len = ffffffff
  5891.  
  5892. I/gralloc ( 5496): [Gralloc] info.left_margin = ffffffff, info.right_margin = ffffffff
  5893.  
  5894. I/[MALI][Gralloc]( 5496): ro_dpi: 210.000000
  5895.  
  5896. I/[MALI][Gralloc]( 5496): using (fd=20)
  5897.  
  5898. I/[MALI][Gralloc]( 5496): id = mtkfb
  5899.  
  5900. I/[MALI][Gralloc]( 5496): xres = 480 px
  5901.  
  5902. I/[MALI][Gralloc]( 5496): yres = 854 px
  5903.  
  5904. I/[MALI][Gralloc]( 5496): xres_virtual = 480 px
  5905.  
  5906. I/[MALI][Gralloc]( 5496): yres_virtual = 2562 px
  5907.  
  5908. I/[MALI][Gralloc]( 5496): bpp = 32
  5909.  
  5910. I/[MALI][Gralloc]( 5496): r = 16:8
  5911.  
  5912. I/[MALI][Gralloc]( 5496): g = 8:8
  5913.  
  5914. I/[MALI][Gralloc]( 5496): b = 0:8
  5915.  
  5916. I/[MALI][Gralloc]( 5496): width = 58 mm (210.206894 dpi)
  5917.  
  5918. I/[MALI][Gralloc]( 5496): height = 103 mm (210.598053 dpi)
  5919.  
  5920. I/[MALI][Gralloc]( 5496): refresh rate = 60.00 Hz
  5921.  
  5922. I/[MALI][Gralloc]( 5496): init_framebuffer va: 0xb571c000 mva: 0x9f400000
  5923.  
  5924. I/hwcomposer( 5496): [DPY] Display Information:
  5925.  
  5926. I/hwcomposer( 5496): [DPY] # fo devices : 1
  5927.  
  5928. I/hwcomposer( 5496): [DPY] -----------------------------
  5929.  
  5930. I/hwcomposer( 5496): [DPY] Device id : 0
  5931.  
  5932. I/hwcomposer( 5496): [DPY] Width : 480
  5933.  
  5934. I/hwcomposer( 5496): [DPY] Height : 854
  5935.  
  5936. I/hwcomposer( 5496): [DPY] xdpi : 210.000000
  5937.  
  5938. I/hwcomposer( 5496): [DPY] ydpi : 210.000000
  5939.  
  5940. I/hwcomposer( 5496): [DPY] vsync : 1
  5941.  
  5942. I/hwcomposer( 5496): [DPY] refresh : 16233766
  5943.  
  5944. I/hwcomposer( 5496): [DPY] connected : 1
  5945.  
  5946. I/hwcomposer( 5496): [DPY] subtype : 0
  5947.  
  5948. W/hwcomposer( 5496): [EVENT] HW VSync State(1)
  5949.  
  5950. W/hwcomposer( 5496): [EVENT] Start to listen uevent, addr.nl_pid(5496)
  5951.  
  5952. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  5953.  
  5954. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  5955.  
  5956. I/SurfaceFlinger( 5496): Using composer version 1.2
  5957.  
  5958. I/hwcomposer( 5496): [HWC] getConfigs Display(0)
  5959.  
  5960. I/hwcomposer( 5496): [HWC] getAttributes Display(0)
  5961.  
  5962. I/hwcomposer( 5496): [HWC] getConfigs Display(1)
  5963.  
  5964. I/hwcomposer( 5496): [HWC] getAttributes Display(1)
  5965.  
  5966. E/hwcomposer( 5496): [HWC] Failed to get display attributes (dpy=1 is not connected)
  5967.  
  5968. I/SurfaceFlinger( 5496): EGL informations:
  5969.  
  5970. I/SurfaceFlinger( 5496): vendor : Android
  5971.  
  5972. I/SurfaceFlinger( 5496): version : 1.4 Android META-EGL
  5973.  
  5974. I/SurfaceFlinger( 5496): extensions: EGL_KHR_get_all_proc_addresses EGL_ANDROID_presentation_time EGL_KHR_image EGL_KHR_image_base EGL_KHR_image_pixmap EGL_KHR_gl_texture_2D_image EGL_KHR_gl_texture_cubemap_image EGL_KHR_gl_renderbuffer_image EGL_KHR_fence_sync EGL_EXT_create_context_robustness EGL_ANDROID_image_native_buffer EGL_ANDROID_recordable
  5975.  
  5976. I/SurfaceFlinger( 5496): Client API: OpenGL_ES
  5977.  
  5978. I/SurfaceFlinger( 5496): EGLSurface: 8-8-8-8, config=0x60000014
  5979.  
  5980. E/ ( 5496): appName=/system/bin/surfaceflinger, acAppName=/system/bin/surfaceflinger
  5981.  
  5982. E/ ( 5496): 1
  5983.  
  5984. I/hwcomposer( 5496): [WKR] Set priority to RR: 268435543
  5985.  
  5986. I/hwcomposer( 5496): [WKR] Set priority to RR: 268435543
  5987.  
  5988. I/hwcomposer( 5496): [WKR] Set priority to RR: 268435543
  5989.  
  5990. I/hwcomposer( 5496): [WKR] Set priority to RR: 268435543
  5991.  
  5992. I/hwcomposer( 5496): [WKR] Set priority to RR: 268435543
  5993.  
  5994. E/ ( 5496): appName=/system/bin/surfaceflinger, acAppName=/system/bin/surfaceflinger
  5995.  
  5996. E/ ( 5496): 1
  5997.  
  5998. I/SurfaceFlinger( 5496): OpenGL ES informations:
  5999.  
  6000. I/SurfaceFlinger( 5496): vendor : ARM
  6001.  
  6002. I/SurfaceFlinger( 5496): renderer : Mali-400 MP
  6003.  
  6004. I/SurfaceFlinger( 5496): version : OpenGL ES 2.0
  6005.  
  6006. I/SurfaceFlinger( 5496): extensions: GL_EXT_debug_marker GL_OES_texture_npot GL_OES_compressed_ETC1_RGB8_texture GL_OES_standard_derivatives GL_OES_EGL_image GL_OES_depth24 GL_ARM_rgba8 GL_ARM_mali_shader_binary GL_OES_depth_texture GL_OES_packed_depth_stencil GL_EXT_texture_format_BGRA8888 GL_OES_vertex_half_float GL_EXT_blend_minmax GL_OES_EGL_image_external GL_OES_EGL_sync GL_OES_rgb8_rgba8 GL_EXT_multisampled_render_to_texture GL_EXT_discard_framebuffer GL_OES_get_program_binary GL_ARM_mali_program_binary GL_EXT_shader_texture_lod GL_EXT_robustness GL_OES_depth_texture_cube_map GL_KHR_debug
  6007.  
  6008. I/SurfaceFlinger( 5496): GL_MAX_TEXTURE_SIZE = 4096
  6009.  
  6010. I/SurfaceFlinger( 5496): GL_MAX_VIEWPORT_DIMS = 4096
  6011.  
  6012. I/SurfaceFlinger( 5496): [void android::SurfaceFlinger::setMTKProperties(android::String8&)]
  6013.  
  6014. I/SurfaceFlinger( 5496): ========================================================================
  6015.  
  6016. I/SurfaceFlinger( 5496): [AOSP part]
  6017.  
  6018. I/SurfaceFlinger( 5496): debug.sf.showupdates (mDebugRegion): 0
  6019.  
  6020. I/SurfaceFlinger( 5496): debug.sf.ddms (mDebugDDMS): 0
  6021.  
  6022. I/SurfaceFlinger( 5496): [MTK SF part]
  6023.  
  6024. I/SurfaceFlinger( 5496): ro.sf.hwrotation (mHwRotation): 0
  6025.  
  6026. I/SurfaceFlinger( 5496): debug.sf.busyswap (mBusySwap): 1
  6027.  
  6028. I/SurfaceFlinger( 5496): debug.sf.log_repaint (mLogRepaint): 0
  6029.  
  6030. I/SurfaceFlinger( 5496): debug.sf.log_buffer (mLogBuffer): 0
  6031.  
  6032. I/SurfaceFlinger( 5496): debug.sf.log_transaction (mLogTransaction): 0
  6033.  
  6034. I/SurfaceFlinger( 5496): debug.sf.line_g3d (mLineG3D): 0
  6035.  
  6036. I/SurfaceFlinger( 5496): debug.sf.line_ss (mLineScreenShot): 0
  6037.  
  6038. I/SurfaceFlinger( 5496): debug.sf.slowmotion (mDelayTime): 0
  6039.  
  6040. I/SurfaceFlinger( 5496): debug.sf.contbufsenable (mContBufsDump): 0
  6041.  
  6042. I/SurfaceFlinger( 5496): [MTK GUI part]
  6043.  
  6044. I/SurfaceFlinger( 5496): debug.bq.line: 0
  6045.  
  6046. I/SurfaceFlinger( 5496): debug.st.line: 0
  6047.  
  6048. I/SurfaceFlinger( 5496): ========================================================================
  6049.  
  6050. I/SurfaceFlinger( 5496):
  6051.  
  6052. I/BufferQueue( 5496): [unnamed-5496-0](this:0xb7e2f340,id:0,api:0,p:-1,c:-1) BufferQueue
  6053.  
  6054. I/GLConsumer( 5496): [void android::RingBuffer<TYPE>::resize(uint32_t, bool) [with TYPE = android::sp<android::BackupBuffer>; uint32_t = unsigned int]] 0xb7e2f9c4 resize to 10 (force=true)
  6055.  
  6056. I/GLConsumer( 5496): [void android::RingBuffer<TYPE>::resize(uint32_t, bool) [with TYPE = android::sp<android::BackupBuffer>; uint32_t = unsigned int]] 0xb7e2f9c4 resize to 0 (force=false)
  6057.  
  6058. I/BufferQueue( 5496): [unnamed-5496-0](this:0xb7e2f340,id:0,api:0,p:-1,c:5496) consumerConnect consumer=(5496:/system/bin/surfaceflinger) controlledByApp=false
  6059.  
  6060. I/BufferQueue( 5496): [unnamed-5496-0](this:0xb7e2f340,id:0,api:0,p:-1,c:5496) setConsumerName: unnamed-5496-0
  6061.  
  6062. I/BufferQueue( 5496): [FrameBufferSurface_0](this:0xb7e2f340,id:0,api:0,p:-1,c:5496) setConsumerName: FrameBufferSurface_0
  6063.  
  6064. I/BufferQueue( 5496): [FrameBufferSurface_0](this:0xb7e2f340,id:0,api:0,p:-1,c:5496) setDefaultBufferSize: w=480, h=854
  6065.  
  6066. I/BufferQueue( 5496): [FrameBufferSurface_0](this:0xb7e2f340,id:0,api:0,p:5496,c:5496) connect: api=1 producer=(5496:/system/bin/surfaceflinger) producerControlledByApp=false
  6067.  
  6068. I/BufferQueue( 5496): [FrameBufferSurface_0](this:0xb7e2f340,id:0,api:1,p:5496,c:5496) new GraphicBuffer needed
  6069.  
  6070. D/BufferQueue( 5496): [OLD] gb:NULL
  6071.  
  6072. I/[MALI][Gralloc]( 5496): alloc_framebuffer va: 0xb571c000 mva: 0x9f400000
  6073.  
  6074. I/GraphicBuffer( 5496): allocate buffer (w:480 h:854 f:1) handle(0xb7e342a0) err(0)
  6075.  
  6076. I/BufferQueue( 5496): [NEW] gb=0xb7e34188, handle=0xb7e342a0, w=480, h=854, s=480, fmt=1
  6077.  
  6078. D/BufferQueue( 5496): [FrameBufferSurface_0](this:0xb7e2f340,id:0,api:1,p:5496,c:5496) cancelBuffer: slot=0
  6079.  
  6080. I/MaliEGL ( 5496): [Mali]window_type=1, is_framebuffer=1, errnum = 0
  6081.  
  6082. I/MaliEGL ( 5496): [Mali]surface->num_buffers=3, surface->num_frames=3, win_min_undequeued=1
  6083.  
  6084. I/MaliEGL ( 5496): [Mali]max_allowed_dequeued_buffers=2
  6085.  
  6086. I/BufferQueue( 5496): [FrameBufferSurface_0](this:0xb7e2f340,id:0,api:1,p:5496,c:5496) setBufferCount: count=3
  6087.  
  6088. I/BufferQueue( 5496): [FrameBufferSurface_0](this:0xb7e2f340,id:0,api:1,p:5496,c:5496) getReleasedBuffers: returning mask 0xffffffff
  6089.  
  6090. I/GraphicBuffer( 5496): free buffer (w:480 h:854 f:1) handle(0xb7e342a0)
  6091.  
  6092. I/SurfaceFlinger( 5496): [setProjection] clear DisplayDevice(type:0) dirty region while booting
  6093.  
  6094. I/BufferQueue( 5496): [FrameBufferSurface_0](this:0xb7e2f340,id:0,api:1,p:5496,c:5496) new GraphicBuffer needed
  6095.  
  6096. D/BufferQueue( 5496): [OLD] gb:NULL
  6097.  
  6098. I/[MALI][Gralloc]( 5496): alloc_framebuffer va: 0xb571c000 mva: 0x9f400000
  6099.  
  6100. I/GraphicBuffer( 5496): allocate buffer (w:480 h:854 f:1) handle(0xb7e351b8) err(0)
  6101.  
  6102. I/BufferQueue( 5496): [NEW] gb=0xb7e345b8, handle=0xb7e351b8, w=480, h=854, s=480, fmt=1
  6103.  
  6104. I/SurfaceFlinger( 5496): set priority to RR:268435540
  6105.  
  6106. I/SurfaceFlinger( 5496): [android::SFWatchDog::SFWatchDog()]
  6107.  
  6108. I/SurfaceFlinger( 5496): [virtual void android::SFWatchDog::onFirstRef()]
  6109.  
  6110. I/SurfaceFlinger( 5496): [uint32_t android::SFWatchDog::registerNodeName(const char*)] name=SurfaceFlinger, index=0
  6111.  
  6112. I/SurfaceFlinger( 5496): [virtual android::status_t android::SFWatchDog::readyToRun()]
  6113.  
  6114. I/SurfaceFlinger( 5496): EventThread Client Pid (5496) created
  6115.  
  6116. I/SurfaceFlinger( 5496): [void android::SurfaceFlinger::checkEnableBootAnim()] boot reason = '0'
  6117.  
  6118. I/boot ( 5496): mBootAnimationEnabled = 1
  6119.  
  6120. I/boot ( 5496): BOOTPROF:BootAnimation:Start:227428
  6121.  
  6122. D/SurfaceFlinger( 5496): Screen acquired, type=0 flinger=0xb7e15578
  6123.  
  6124. I/hwcomposer( 5496): [HWC] Blank(0) Display(0)
  6125.  
  6126. I/SurfaceFlinger( 5496): Blur.initialize. minification:19, blurRadius:5, useHighPrecision:0
  6127.  
  6128. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6129.  
  6130. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6131.  
  6132. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6133.  
  6134. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6135.  
  6136. I/SurfaceFlinger( 5496): Skip composition for [Built-in Screen (type:0)] since dirtyRegion is empty
  6137.  
  6138. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6139.  
  6140. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6141.  
  6142. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6143.  
  6144. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6145.  
  6146. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6147.  
  6148. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6149.  
  6150. W/linker ( 5524): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  6151.  
  6152. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6153.  
  6154. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6155.  
  6156. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6157.  
  6158. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6159.  
  6160. D/BootAnimation( 5524): [BootAnimation frameworks/base/cmds/bootanimation/bootanimation_main.cpp main 41]start Jan 5 2015 19:01:52
  6161.  
  6162. D/BootAnimation( 5524): [BootAnimation main 52]noBootAnimation=0
  6163.  
  6164. D/BootAnimation( 5524): [BootAnimation main 76]setBoot=1,sePaly=1,setRotated=0
  6165.  
  6166. D/BootAnimation( 5524): [BootAnimation main 82]nVolume=-1
  6167.  
  6168. D/BootAnimation( 5524): before new BootAnimation...
  6169.  
  6170. D/BootAnimation( 5524): [BootAnimation main 96]before new BootAnimation...
  6171.  
  6172. D/BootAnimation( 5524): [BootAnimation frameworks/base/cmds/bootanimation/BootAnimation.cpp BootAnimation 122]
  6173.  
  6174. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6175.  
  6176. D/BootAnimation( 5524): [BootAnimation BootAnimation 138]bBootOrShutDown=1,bPlayMP3=1,bShutRotate=0
  6177.  
  6178. D/BootAnimation( 5524): [BootAnimation onFirstRef 153]start
  6179.  
  6180. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6181.  
  6182. D/BootAnimation( 5524): [BootAnimation onFirstRef 162]end
  6183.  
  6184. D/BootAnimation( 5524): joinThreadPool...
  6185.  
  6186. D/BootAnimation( 5524): [BootAnimation main 99]before joinThreadPool...
  6187.  
  6188. D/BootAnimation( 5524): [BootAnimation readyToRun 490]open bootanimation.zip, ms=227543
  6189.  
  6190. D/BootAnimation( 5524): access resource (/system/media/bootanimation.zip) success, break
  6191.  
  6192. D/BootAnimation( 5524): animation file path: /system/media/bootanimation.zip
  6193.  
  6194. D/BootAnimation( 5524): [BootAnimation readyToRun 497]after check bootanimation.zip,mAndroidAnimation=0, ms=227544
  6195.  
  6196. D/BootAnimation( 5524): [BootAnimation readyToRun 521]end
  6197.  
  6198. D/BootAnimation( 5524): [BootAnimation threadLoop 527]start
  6199.  
  6200. D/BootAnimation( 5524): enter threadLoop()
  6201.  
  6202. D/BootAnimation( 5524): access resource (/system/media/bootaudio.mp3) success, break
  6203.  
  6204. D/BootAnimation( 5524): bBootOrShutDown lifen: 1
  6205.  
  6206. D/BootAnimation( 5524): sound file path: /system/media/bootaudio.mp3
  6207.  
  6208. I/ServiceManager( 5524): Waiting for service media.audio_flinger...
  6209.  
  6210. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6211.  
  6212. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6213.  
  6214. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6215.  
  6216. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6217.  
  6218. I/mediaserver( 5498): ServiceManager: 0xb88d7e70
  6219.  
  6220. I/AudioFlinger( 5498): Using default 3000 mSec as standby time.
  6221.  
  6222. D/MediaPlayerService( 5498): MediaPlayerService created
  6223.  
  6224. V/MemoryDumper( 5498): Instantiate memory dumper service...
  6225.  
  6226. V/MemoryDumper( 5498): MemoryDumper created, dump file=/sdcard/memstatus_5498
  6227.  
  6228. I/CameraService( 5498): CameraService started (pid=5498)
  6229.  
  6230. D/CameraService( 5498): CameraService::onFirstRef
  6231.  
  6232. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6233.  
  6234. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6235.  
  6236. I/IspDrv ( 5498): {IspDrv} [IspDrvImp] getpid[0x0000157a],gettid[0x0000157a]
  6237.  
  6238. D/MtkCam/module( 5498): [instantiate_camera_module]
  6239.  
  6240.  
  6241. D/MtkCam/Utils/Property( 5498): [clear] pid/tid=5498/5498
  6242.  
  6243.  
  6244. I/CameraService( 5498): Loaded "MediaTek Camera Module" camera module
  6245.  
  6246. D/MtkCam/MtkCamUtils( 5498): [CamDevMetaInfoMap::clear] pid/tid=5498/5498
  6247.  
  6248.  
  6249. D/SensorHal( 5498): [getInstance][SensorHalImp] getInstance
  6250.  
  6251. D/SensorHal( 5498): [createImp][createImp]: 0
  6252.  
  6253. D/SeninfDrvImp( 5498): [getInstance][getInstance]
  6254.  
  6255. D/SeninfDrvImp( 5498): [SeninfDrvImp][SeninfDrvImp]
  6256.  
  6257. D/SeninfDrvImp( 5498): [init][init]: 0
  6258.  
  6259. I/IspDrv ( 5498): {IspDrv} [getInstance] Gdma: 0.
  6260.  
  6261. I/IspDrv ( 5498): {IspDrv} [init] +,mInitCount(0),m_fgIsGdmaMode(0)
  6262.  
  6263. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] mpIspDrvRegMap malloc:(0-th) ===> [start-->now: 0.032000 ms]
  6264.  
  6265. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] 1st open(ISP_DRV_DEV_NAME, O_RDWR):(1-th) ===> [start-->now: 0.146000 ms] [last-->now: 0.114000 ms]
  6266.  
  6267. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] mpIspHwRegAddr mmap():(2-th) ===> [start-->now: 0.258000 ms] [last-->now: 0.112000 ms]
  6268.  
  6269. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pRTBufTbl mmap():(3-th) ===> [start-->now: 0.328000 ms] [last-->now: 0.070000 ms]
  6270.  
  6271. I/IspDrv ( 5498): {IspDrv} [reset] ISP SW RESET[0x0000000e]
  6272.  
  6273. I/IspDrv ( 5498): {IspDrv} [init] ISP Global Count: 1.
  6274.  
  6275. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] kRefCntCtrl and ISP reset():(4-th) ===> [start-->now: 0.516000 ms] [last-->now: 0.188000 ms]
  6276.  
  6277. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] IMemDrv::createInstance():(5-th) ===> [start-->now: 0.579000 ms] [last-->now: 0.063000 ms]
  6278.  
  6279. I/Drv/IMem( 5498): Drv/IMem[init] open ion id(17).
  6280.  
  6281. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->init():(6-th) ===> [start-->now: 1.095000 ms] [last-->now: 0.516000 ms]
  6282.  
  6283. I/IspDrv ( 5498): {IspDrv} [init] m_ispVirRegBufInfo.size(2097156)
  6284.  
  6285. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6286.  
  6287. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6288.  
  6289. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->allocVirtBuf(m_ispVirRegBufInfo):(7-th) ===> [start-->now: 2.120000 ms] [last-->now: 1.025000 ms]
  6290.  
  6291. I/Drv/IMem( 5498): Drv/IMem[mapPhyAddr] mID(0x12),S(0x200004),V(xb5217000),P(0x40000),S/C(0/0)
  6292.  
  6293. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->mapPhyAddr():(8-th) ===> [start-->now: 2.365000 ms] [last-->now: 0.245000 ms]
  6294.  
  6295. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(mpIspVirRegBuffer):(9-th) ===> [start-->now: 3.706000 ms] [last-->now: 1.341000 ms]
  6296.  
  6297. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->allocVirtBuf(m_ispCQDescBufInfo):(10-th) ===> [start-->now: 3.935000 ms] [last-->now: 0.229000 ms]
  6298.  
  6299. I/Drv/IMem( 5498): Drv/IMem[mapPhyAddr] mID(0x13),S(0x818),V(xb5216000),P(0x280000),S/C(0/0)
  6300.  
  6301. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] m_pIMemDrv->mapPhyAddr(m_ispCQDescBufInfo):(11-th) ===> [start-->now: 4.143000 ms] [last-->now: 0.208000 ms]
  6302.  
  6303. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memcpy(mpIspCQDescriptorVirt[i]):(12-th) ===> [start-->now: 4.180000 ms] [last-->now: 0.037000 ms]
  6304.  
  6305. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(mpIspCQDescriptorVirt[CQ0C]):(13-th) ===> [start-->now: 4.204000 ms] [last-->now: 0.024000 ms]
  6306.  
  6307. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(tdriMgrInfoCq1):(14-th) ===> [start-->now: 4.223000 ms] [last-->now: 0.019000 ms]
  6308.  
  6309. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] memset(tdriMgrInfoCq2):(15-th) ===> [start-->now: 4.243000 ms] [last-->now: 0.020000 ms]
  6310.  
  6311. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] atomic_inc:(16-th) ===> [start-->now: 4.262000 ms] [last-->now: 0.019000 ms]
  6312.  
  6313. I/IspDrv ( 5498): {IspDrv} [init] -,ret(1),mInitCount(1)
  6314.  
  6315. I/IspDrv ( 5498): {IspDrv} [ProfilingPrint] [Event_IspDrv_Init] Exit:(17-th) ===> [start-->now: 4.295000 ms] [last-->now: 0.033000 ms]
  6316.  
  6317. D/SeninfDrvImp( 5498): [init][init]: X
  6318.  
  6319. D/SeninfDrvImp( 5498): [setTg1PhaseCounter][setTg1PhaseCounter] pcEn(1) clkPol(1)
  6320.  
  6321. D/ImgSensorDrv( 5498): [impSearchSensor]SENSOR search start
  6322.  
  6323. D/ImgSensorDrv( 5498): [impSearchSensor][impSearchSensor] m_fdSensor = 20
  6324.  
  6325. D/ImgSensorDrv( 5498): [impSearchSensor]impSearchSensor search to sub
  6326.  
  6327. D/ImgSensorDrv( 5498): [impSearchSensor]set sensor driver id =10000
  6328.  
  6329. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6330.  
  6331. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6332.  
  6333. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6334.  
  6335. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6336.  
  6337. W/linker ( 5497): libvc1dec_sa.ca7.so has text relocations. This is wasting memory and is a security risk. Please fix.
  6338.  
  6339. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6340.  
  6341. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6342.  
  6343. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6344.  
  6345. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6346.  
  6347. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6348.  
  6349. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6350.  
  6351. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6352.  
  6353. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6354.  
  6355. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6356.  
  6357. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6358.  
  6359. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6360.  
  6361. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6362.  
  6363. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6364.  
  6365. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6366.  
  6367. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6368.  
  6369. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6370.  
  6371. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6372.  
  6373. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6374.  
  6375. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6376.  
  6377. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6378.  
  6379. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6380.  
  6381. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6382.  
  6383. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6384.  
  6385. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6386.  
  6387. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6388.  
  6389. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6390.  
  6391. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6392.  
  6393. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6394.  
  6395. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6396.  
  6397. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6398.  
  6399. D/AndroidRuntime( 5497):
  6400.  
  6401. D/AndroidRuntime( 5497): >>>>>> AndroidRuntime START com.android.internal.os.ZygoteInit <<<<<<
  6402.  
  6403. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6404.  
  6405. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6406.  
  6407. D/AndroidRuntime( 5497): CheckJNI is OFF
  6408.  
  6409. D/AndroidRuntime( 5497): language=-Duser.language=en region=-Duser.region=UK
  6410.  
  6411. D/dalvikvm( 5497): boot class :
  6412.  
  6413. D/dalvikvm( 5497): (0) core.jar
  6414.  
  6415. D/dalvikvm( 5497): (1) conscrypt.jar
  6416.  
  6417. D/dalvikvm( 5497): (2) okhttp.jar
  6418.  
  6419. D/dalvikvm( 5497): (3) core-junit.jar
  6420.  
  6421. D/dalvikvm( 5497): (4) bouncycastle.jar
  6422.  
  6423. D/dalvikvm( 5497): (5) ext.jar
  6424.  
  6425. D/dalvikvm( 5497): (6) framework.jar
  6426.  
  6427. D/dalvikvm( 5497): (7) framework2.jar
  6428.  
  6429. D/dalvikvm( 5497): (8) telephony-common.jar
  6430.  
  6431. D/dalvikvm( 5497): (9) voip-common.jar
  6432.  
  6433. D/dalvikvm( 5497): (10) mms-common.jar
  6434.  
  6435. D/dalvikvm( 5497): (11) android.policy.jar
  6436.  
  6437. D/dalvikvm( 5497): (12) services.jar
  6438.  
  6439. D/dalvikvm( 5497): (13) apache-xml.jar
  6440.  
  6441. D/dalvikvm( 5497): (14) webviewchromium.jar
  6442.  
  6443. D/dalvikvm( 5497): (15) mediatek-common.jar
  6444.  
  6445. D/dalvikvm( 5497): (16) mediatek-framework.jar
  6446.  
  6447. D/dalvikvm( 5497): (17) CustomProperties.jar
  6448.  
  6449. D/dalvikvm( 5497): (18) mediatek-telephony-common.jar
  6450.  
  6451. D/dalvikvm( 5497): (19) mediatek-tablet.jar
  6452.  
  6453. D/dalvikvm( 5497): (20) immr_framework.jar
  6454.  
  6455. D/dalvikvm( 5497): (21) am.jar
  6456.  
  6457. D/dalvikvm( 5497): threadid=1: interp stack at 0x5797a000
  6458.  
  6459. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/core.jar /data/dalvik-cache/system@framework@core.jar@classes.dex
  6460.  
  6461. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/conscrypt.jar /data/dalvik-cache/system@framework@conscrypt.jar@classes.dex
  6462.  
  6463. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6464.  
  6465. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6466.  
  6467. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/okhttp.jar /data/dalvik-cache/system@framework@okhttp.jar@classes.dex
  6468.  
  6469. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/core-junit.jar /data/dalvik-cache/system@framework@core-junit.jar@classes.dex
  6470.  
  6471. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/bouncycastle.jar /data/dalvik-cache/system@framework@bouncycastle.jar@classes.dex
  6472.  
  6473. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/ext.jar /data/dalvik-cache/system@framework@ext.jar@classes.dex
  6474.  
  6475. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/framework.jar /data/dalvik-cache/system@framework@framework.jar@classes.dex
  6476.  
  6477. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/framework2.jar /data/dalvik-cache/system@framework@framework2.jar@classes.dex
  6478.  
  6479. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/telephony-common.jar /data/dalvik-cache/system@framework@telephony-common.jar@classes.dex
  6480.  
  6481. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6482.  
  6483. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6484.  
  6485. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/voip-common.jar /data/dalvik-cache/system@framework@voip-common.jar@classes.dex
  6486.  
  6487. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/mms-common.jar /data/dalvik-cache/system@framework@mms-common.jar@classes.dex
  6488.  
  6489. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/android.policy.jar /data/dalvik-cache/system@framework@android.policy.jar@classes.dex
  6490.  
  6491. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/services.jar /data/dalvik-cache/system@framework@services.jar@classes.dex
  6492.  
  6493. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/apache-xml.jar /data/dalvik-cache/system@framework@apache-xml.jar@classes.dex
  6494.  
  6495. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/webviewchromium.jar /data/dalvik-cache/system@framework@webviewchromium.jar@classes.dex
  6496.  
  6497. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/mediatek-common.jar /data/dalvik-cache/system@framework@mediatek-common.jar@classes.dex
  6498.  
  6499. D/ImgSensorDrv( 5498): [impSearchSensor][impSearchSensor] Err-ctrlCode (I/O error)
  6500.  
  6501. D/ImgSensorDrv( 5498): [getCurrentSensorType][getCurrentSensorType]
  6502.  
  6503. D/ImgSensorDrv( 5498): [getInfo][getInfo]
  6504.  
  6505. D/ImgSensorDrv( 5498): [getSocketPosition][getSocketPosition]:[1][1]
  6506.  
  6507. D/ImgSensorDrv( 5498): [impSearchSensor]sensor ID mismatch
  6508.  
  6509. D/ImgSensorDrv( 5498): [impSearchSensor]set sensor driver id =10001
  6510.  
  6511. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/mediatek-framework.jar /data/dalvik-cache/system@framework@mediatek-framework.jar@classes.dex
  6512.  
  6513. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6514.  
  6515. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6516.  
  6517. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/CustomProperties.jar /data/dalvik-cache/system@framework@CustomProperties.jar@classes.dex
  6518.  
  6519. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/mediatek-telephony-common.jar /data/dalvik-cache/system@framework@mediatek-telephony-common.jar@classes.dex
  6520.  
  6521. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/mediatek-tablet.jar /data/dalvik-cache/system@framework@mediatek-tablet.jar@classes.dex
  6522.  
  6523. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/immr_framework.jar /data/dalvik-cache/system@framework@immr_framework.jar@classes.dex
  6524.  
  6525. D/dalvikvm( 5497): Unable to stat classpath element '/data/app/com.miui.sdk-1.apk'
  6526.  
  6527. D/dalvikvm( 5497): Unable to stat classpath element '/data/app/com.miui.sdk-2.apk'
  6528.  
  6529. D/dalvikvm( 5497): open_cached_dex_file : /system/app/miui.apk /data/dalvik-cache/system@app@miui.apk@classes.dex
  6530.  
  6531. D/dalvikvm( 5497): Unable to stat classpath element '/data/app/com.miui.framework-1.apk'
  6532.  
  6533. D/dalvikvm( 5497): Unable to stat classpath element '/data/app/com.miui.framework-2.apk'
  6534.  
  6535. D/dalvikvm( 5497): open_cached_dex_file : /system/app/MiuiFramework.apk /data/dalvik-cache/system@app@MiuiFramework.apk@classes.dex
  6536.  
  6537. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6538.  
  6539. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6540.  
  6541. D/dalvikvm( 5497): process bootclasspath ex!!
  6542.  
  6543. D/dalvikvm( 5497): open_cached_dex_file : /system/framework/mediatek-op.jar /data/dalvik-cache/system@framework@mediatek-op.jar@classes.dex
  6544.  
  6545. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6546.  
  6547. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6548.  
  6549. D/dalvikvm( 5497): Trying to load lib libjavacore.so 0x0
  6550.  
  6551. D/dalvikvm( 5497): Added shared lib libjavacore.so 0x0
  6552.  
  6553. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6554.  
  6555. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6556.  
  6557. E/ICU ( 5497): Couldn't open '/system/usr/icu/icudt51l.dat': No such file or directory
  6558.  
  6559. F/libc ( 5497): Fatal signal 6 (SIGABRT) at 0x00001579 (code=-6), thread 5497 (zygote)
  6560.  
  6561. D/AEE/AED ( 132): $===AEE===AEE===AEE===$
  6562.  
  6563. D/AEE/AED ( 132): p 0 poll events 1 revents 0
  6564.  
  6565. D/AEE/AED ( 132): not know revents:0
  6566.  
  6567. D/AEE/AED ( 132): p 1 poll events 1 revents 0
  6568.  
  6569. D/AEE/AED ( 132): not know revents:0
  6570.  
  6571. D/AEE/AED ( 132): p 2 poll events 1 revents 1
  6572.  
  6573. D/AEE/AED ( 132): aed_main_fork_worker: generator 0x39c0d0, worker 0xbe81a828, recv_fd 15
  6574.  
  6575. D/AEE/AED ( 132): p 3 poll events 1 revents 0
  6576.  
  6577. D/AEE/AED ( 132): not know revents:0
  6578.  
  6579. D/AEE/AED ( 132): p 4 poll events 1 revents 0
  6580.  
  6581. D/AEE/AED ( 132): not know revents:0
  6582.  
  6583. I/DEBUG ( 5573): handle_request(15)
  6584.  
  6585. I/DEBUG ( 5573): check process 5497 name:zygote
  6586.  
  6587. I/DEBUG ( 5573): tid 5497 abort msg address is:0
  6588.  
  6589. I/DEBUG ( 5573): BOOM: pid=5497 uid=0 gid=0 tid=5497
  6590.  
  6591. I/DEBUG ( 5573): [OnPurpose Redunant in preset_info] pid: 5497, tid: 5497, name: zygote >>> zygote <<<
  6592.  
  6593. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6594.  
  6595. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6596.  
  6597. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6598.  
  6599. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6600.  
  6601. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6602.  
  6603. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6604.  
  6605. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6606.  
  6607. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6608.  
  6609. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6610.  
  6611. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6612.  
  6613. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6614.  
  6615. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6616.  
  6617. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6618.  
  6619. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6620.  
  6621. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6622.  
  6623. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6624.  
  6625. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6626.  
  6627. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6628.  
  6629. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6630.  
  6631. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6632.  
  6633. D/ImgSensorDrv( 5498): [impSearchSensor][impSearchSensor] Err-ctrlCode (I/O error)
  6634.  
  6635. D/ImgSensorDrv( 5498): [getCurrentSensorType][getCurrentSensorType]
  6636.  
  6637. D/ImgSensorDrv( 5498): [getInfo][getInfo]
  6638.  
  6639. D/ImgSensorDrv( 5498): [getSocketPosition][getSocketPosition]:[1][1]
  6640.  
  6641. D/ImgSensorDrv( 5498): [impSearchSensor]sensor ID mismatch
  6642.  
  6643. D/ImgSensorDrv( 5498): [impSearchSensor]set sensor driver id =10002
  6644.  
  6645. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6646.  
  6647. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6648.  
  6649. I/DEBUG ( 5573): *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
  6650.  
  6651. I/DEBUG ( 5573): Build fingerprint: 'alps/lcsh92_wet_jb9/lcsh92_wet_jb9:4.4.2/KOT49H/:user/release-keys'
  6652.  
  6653. I/DEBUG ( 5573): pid: 5497, tid: 5497, name: zygote >>> zygote <<<
  6654.  
  6655. I/DEBUG ( 5573): signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
  6656.  
  6657. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6658.  
  6659. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6660.  
  6661. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6662.  
  6663. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6664.  
  6665. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6666.  
  6667. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6668.  
  6669. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6670.  
  6671. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6672.  
  6673. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6674.  
  6675. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6676.  
  6677. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6678.  
  6679. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6680.  
  6681. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6682.  
  6683. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6684.  
  6685. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6686.  
  6687. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6688.  
  6689. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6690.  
  6691. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6692.  
  6693. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6694.  
  6695. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6696.  
  6697. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6698.  
  6699. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6700.  
  6701. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6702.  
  6703. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6704.  
  6705. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6706.  
  6707. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6708.  
  6709. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6710.  
  6711. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6712.  
  6713. I/DEBUG ( 5573): r0 00000000 r1 00001579 r2 00000006 r3 00000000
  6714.  
  6715. I/DEBUG ( 5573): r4 00000006 r5 00000002 r6 00001579 r7 0000010c
  6716.  
  6717. I/DEBUG ( 5573): r8 40161bc8 r9 41941e98 sl 5b0d6fa7 fp 41a08128
  6718.  
  6719. I/DEBUG ( 5573): ip 4193cb48 sp bebaeb68 lr 401112b1 pc 401201f4 cpsr 00070010
  6720.  
  6721. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6722.  
  6723. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6724.  
  6725. I/DEBUG ( 5573):
  6726.  
  6727. I/DEBUG ( 5573): backtrace:
  6728.  
  6729. I/DEBUG ( 5573): #00 pc 000261f4 /system/lib/libc.so (tgkill+12)
  6730.  
  6731. I/DEBUG ( 5573): #01 pc 000172ad /system/lib/libc.so (pthread_kill+48)
  6732.  
  6733. I/DEBUG ( 5573): #02 pc 000174c1 /system/lib/libc.so (raise+10)
  6734.  
  6735. I/DEBUG ( 5573): #03 pc 000161f5 /system/lib/libc.so
  6736.  
  6737. I/DEBUG ( 5573): #04 pc 00025aa4 /system/lib/libc.so (abort+4)
  6738.  
  6739. I/DEBUG ( 5573): #05 pc 00015ab7 /system/lib/libjavacore.so (register_libcore_icu_ICU(_JNIEnv*)+242)
  6740.  
  6741. I/DEBUG ( 5573): #06 pc 0000e553 /system/lib/libjavacore.so (JNI_OnLoad+190)
  6742.  
  6743. I/DEBUG ( 5573): #07 pc 000523c1 /system/lib/libdvm.so (dvmLoadNativeCode(char const*, Object*, char**)+516)
  6744.  
  6745. I/DEBUG ( 5573): #08 pc 00047911 /system/lib/libdvm.so
  6746.  
  6747. I/DEBUG ( 5573): #09 pc 0004950d /system/lib/libdvm.so (dvmStartup(int, char const* const*, bool, _JNIEnv*)+6444)
  6748.  
  6749. I/DEBUG ( 5573): #10 pc 0004fdbd /system/lib/libdvm.so (JNI_CreateJavaVM+596)
  6750.  
  6751. I/DEBUG ( 5573): #11 pc 00002d79 /system/lib/libnativehelper.so (JniInvocation::JNI_CreateJavaVM(_JavaVM**, _JNIEnv**, void*)+10)
  6752.  
  6753. I/DEBUG ( 5573): #12 pc 0004ff7f /system/lib/libandroid_runtime.so (android::AndroidRuntime::startVm(_JavaVM**, _JNIEnv**)+1814)
  6754.  
  6755. I/DEBUG ( 5573): #13 pc 0005025d /system/lib/libandroid_runtime.so (android::AndroidRuntime::start(char const*, char const*)+176)
  6756.  
  6757. I/DEBUG ( 5573): #14 pc 0000105b /system/bin/app_process
  6758.  
  6759. I/DEBUG ( 5573): #15 pc 0000f31c /system/lib/libc.so (__libc_init+100)
  6760.  
  6761. I/DEBUG ( 5573): #16 pc 00000d7c /system/bin/app_process
  6762.  
  6763. I/DEBUG ( 5573):
  6764.  
  6765. I/DEBUG ( 5573): stack:
  6766.  
  6767. I/DEBUG ( 5573): bebaeb28 41a05940 /system/lib/libdvm.so
  6768.  
  6769. I/DEBUG ( 5573): bebaeb2c 6066a047
  6770.  
  6771. I/DEBUG ( 5573): bebaeb30 41944aa8
  6772.  
  6773. I/DEBUG ( 5573): bebaeb34 00000000
  6774.  
  6775. I/DEBUG ( 5573): bebaeb38 41944e14
  6776.  
  6777. I/DEBUG ( 5573): bebaeb3c 41a2a178 /dev/ashmem/dalvik-zygote (deleted)
  6778.  
  6779. I/DEBUG ( 5573): bebaeb40 579acfa4 /dev/ashmem/dalvik-LinearAlloc (deleted)
  6780.  
  6781. I/DEBUG ( 5573): bebaeb44 579acfa4 /dev/ashmem/dalvik-LinearAlloc (deleted)
  6782.  
  6783. I/DEBUG ( 5573): bebaeb48 41944f88
  6784.  
  6785. I/DEBUG ( 5573): bebaeb4c 419d94f9 /system/lib/libdvm.so (dexParameterIteratorInit(DexParameterIterator*, DexProto const*)+18)
  6786.  
  6787. I/DEBUG ( 5573): bebaeb50 41a2a178 /dev/ashmem/dalvik-zygote (deleted)
  6788.  
  6789. I/DEBUG ( 5573): bebaeb54 bebaebb0 [stack]
  6790.  
  6791. I/DEBUG ( 5573): bebaeb58 5bbe40f0 /system/lib/libjavacore.so
  6792.  
  6793. I/DEBUG ( 5573): bebaeb5c 419b48d3 /system/lib/libdvm.so
  6794.  
  6795. I/DEBUG ( 5573): bebaeb60 bebaeb70 [stack]
  6796.  
  6797. I/DEBUG ( 5573): bebaeb64 bebaeb83 [stack]
  6798.  
  6799. I/DEBUG ( 5573): #00 bebaeb68 00000006
  6800.  
  6801. I/DEBUG ( 5573): bebaeb6c 00000002
  6802.  
  6803. I/DEBUG ( 5573): bebaeb70 00001579
  6804.  
  6805. I/DEBUG ( 5573): bebaeb74 4193cb48
  6806.  
  6807. I/DEBUG ( 5573): bebaeb78 4193cb48
  6808.  
  6809. I/DEBUG ( 5573): bebaeb7c 401112b1 /system/lib/libc.so (pthread_kill+52)
  6810.  
  6811. I/DEBUG ( 5573): #01 bebaeb80 00000006
  6812.  
  6813. I/DEBUG ( 5573): bebaeb84 00000000
  6814.  
  6815. I/DEBUG ( 5573): bebaeb88 ffffffff
  6816.  
  6817. I/DEBUG ( 5573): bebaeb8c 401114c5 /system/lib/libc.so (raise+14)
  6818.  
  6819. I/DEBUG ( 5573): #02 bebaeb90 bebaeb9c [stack]
  6820.  
  6821. I/DEBUG ( 5573): bebaeb94 401101f9 /system/lib/libc.so
  6822.  
  6823. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6824.  
  6825. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6826.  
  6827. I/DEBUG ( 5573):
  6828.  
  6829. I/DEBUG ( 5573): memory near r1:
  6830.  
  6831. I/DEBUG ( 5573): 00001558 ffffffff ffffffff ffffffff ffffffff
  6832.  
  6833. I/DEBUG ( 5573): 00001568 ffffffff ffffffff ffffffff ffffffff
  6834.  
  6835. I/DEBUG ( 5573): 00001578 ffffffff ffffffff ffffffff ffffffff
  6836.  
  6837. I/DEBUG ( 5573): 00001588 ffffffff ffffffff ffffffff ffffffff
  6838.  
  6839. I/DEBUG ( 5573): 00001598 ffffffff ffffffff ffffffff ffffffff
  6840.  
  6841. I/DEBUG ( 5573): 000015a8 ffffffff ffffffff ffffffff ffffffff
  6842.  
  6843. I/DEBUG ( 5573): 000015b8 ffffffff ffffffff ffffffff ffffffff
  6844.  
  6845. I/DEBUG ( 5573): 000015c8 ffffffff ffffffff ffffffff ffffffff
  6846.  
  6847. I/DEBUG ( 5573): 000015d8 ffffffff ffffffff ffffffff ffffffff
  6848.  
  6849. I/DEBUG ( 5573): 000015e8 ffffffff ffffffff ffffffff ffffffff
  6850.  
  6851. I/DEBUG ( 5573): 000015f8 ffffffff ffffffff ffffffff ffffffff
  6852.  
  6853. I/DEBUG ( 5573): 00001608 ffffffff ffffffff ffffffff ffffffff
  6854.  
  6855. I/DEBUG ( 5573): 00001618 ffffffff ffffffff ffffffff ffffffff
  6856.  
  6857. I/DEBUG ( 5573): 00001628 ffffffff ffffffff ffffffff ffffffff
  6858.  
  6859. I/DEBUG ( 5573): 00001638 ffffffff ffffffff ffffffff ffffffff
  6860.  
  6861. I/DEBUG ( 5573): 00001648 ffffffff ffffffff ffffffff ffffffff
  6862.  
  6863. I/DEBUG ( 5573):
  6864.  
  6865. I/DEBUG ( 5573): memory near r6:
  6866.  
  6867. I/DEBUG ( 5573): 00001558 ffffffff ffffffff ffffffff ffffffff
  6868.  
  6869. I/DEBUG ( 5573): 00001568 ffffffff ffffffff ffffffff ffffffff
  6870.  
  6871. I/DEBUG ( 5573): 00001578 ffffffff ffffffff ffffffff ffffffff
  6872.  
  6873. I/DEBUG ( 5573): 00001588 ffffffff ffffffff ffffffff ffffffff
  6874.  
  6875. I/DEBUG ( 5573): 00001598 ffffffff ffffffff ffffffff ffffffff
  6876.  
  6877. I/DEBUG ( 5573): 000015a8 ffffffff ffffffff ffffffff ffffffff
  6878.  
  6879. I/DEBUG ( 5573): 000015b8 ffffffff ffffffff ffffffff ffffffff
  6880.  
  6881. I/DEBUG ( 5573): 000015c8 ffffffff ffffffff ffffffff ffffffff
  6882.  
  6883. I/DEBUG ( 5573): 000015d8 ffffffff ffffffff ffffffff ffffffff
  6884.  
  6885. I/DEBUG ( 5573): 000015e8 ffffffff ffffffff ffffffff ffffffff
  6886.  
  6887. I/DEBUG ( 5573): 000015f8 ffffffff ffffffff ffffffff ffffffff
  6888.  
  6889. I/DEBUG ( 5573): 00001608 ffffffff ffffffff ffffffff ffffffff
  6890.  
  6891. I/DEBUG ( 5573): 00001618 ffffffff ffffffff ffffffff ffffffff
  6892.  
  6893. I/DEBUG ( 5573): 00001628 ffffffff ffffffff ffffffff ffffffff
  6894.  
  6895. I/DEBUG ( 5573): 00001638 ffffffff ffffffff ffffffff ffffffff
  6896.  
  6897. I/DEBUG ( 5573): 00001648 ffffffff ffffffff ffffffff ffffffff
  6898.  
  6899. I/DEBUG ( 5573):
  6900.  
  6901. I/DEBUG ( 5573): memory near r8:
  6902.  
  6903. I/DEBUG ( 5573): 40161ba8 00001000 00001000 00010000 00200000
  6904.  
  6905. I/DEBUG ( 5573): 40161bb8 00000003 40124c48 bebaf964 bebafa0f
  6906.  
  6907. I/DEBUG ( 5573): 40161bc8 ec93f117 bebaf91c 00000000 400e1d20
  6908.  
  6909. I/DEBUG ( 5573): 40161bd8 00000007 00000008 00000000 400e2184
  6910.  
  6911. I/DEBUG ( 5573): 40161be8 00000000 415dd000 00000009 0000000a
  6912.  
  6913. I/DEBUG ( 5573): 40161bf8 00000000 00000000 00000000 00000000
  6914.  
  6915. I/DEBUG ( 5573): 40161c08 00000000 00000000 00000000 00000000
  6916.  
  6917. I/DEBUG ( 5573): 40161c18 00000000 00000000 00000000 00000000
  6918.  
  6919. I/DEBUG ( 5573): 40161c28 00000000 00000000 00000000 00000000
  6920.  
  6921. I/DEBUG ( 5573): 40161c38 00000000 00000000 00000000 00000000
  6922.  
  6923. I/DEBUG ( 5573): 40161c48 00000000 00000000 00000000 00000000
  6924.  
  6925. I/DEBUG ( 5573): 40161c58 00000000 00000000 00000000 00000000
  6926.  
  6927. I/DEBUG ( 5573): 40161c68 00000000 00000000 00000000 00000000
  6928.  
  6929. I/DEBUG ( 5573): 40161c78 00000000 00000000 00000000 00000000
  6930.  
  6931. I/DEBUG ( 5573): 40161c88 00000000 00000000 00000000 00000000
  6932.  
  6933. I/DEBUG ( 5573): 40161c98 00000000 00000000 00000000 00000000
  6934.  
  6935. I/DEBUG ( 5573):
  6936.  
  6937. I/DEBUG ( 5573): memory near r9:
  6938.  
  6939. I/DEBUG ( 5573): 41941e78 bebaef48 bebaef34 4029949e 00000000
  6940.  
  6941. I/DEBUG ( 5573): 41941e88 00000000 00000000 00000000 00000023
  6942.  
  6943. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  6944.  
  6945. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  6946.  
  6947. I/DEBUG ( 5573): 41941e98 419fe37c 00000000 00000001 41944aa8
  6948.  
  6949. I/DEBUG ( 5573): 41941ea8 00000000 00000000 00000000 00000013
  6950.  
  6951. I/DEBUG ( 5573): 41941eb8 0000002e 00000000 00000000 0000002b
  6952.  
  6953. I/DEBUG ( 5573): 41941ec8 7379732f 2f6d6574 6d617266 726f7765
  6954.  
  6955. I/DEBUG ( 5573): 41941ed8 656d2f6b 74616964 6f2d6b65 616a2e70
  6956.  
  6957. I/DEBUG ( 5573): 41941ee8 00000072 00000013 65726f63 72616a2e
  6958.  
  6959. I/DEBUG ( 5573): 41941ef8 00000000 0000001b 736e6f63 70797263
  6960.  
  6961. I/DEBUG ( 5573): 41941f08 616a2e74 00000072 00000000 00000013
  6962.  
  6963. I/DEBUG ( 5573): 41941f18 74686b6f 6a2e7074 00007261 0000001b
  6964.  
  6965. I/DEBUG ( 5573): 41941f28 65726f63 6e756a2d 6a2e7469 00007261
  6966.  
  6967. I/DEBUG ( 5573): 41941f38 00000000 0000001b 6e756f62 61637963
  6968.  
  6969. I/DEBUG ( 5573): 41941f48 656c7473 72616a2e 00000000 00000013
  6970.  
  6971. I/DEBUG ( 5573): 41941f58 2e747865 0072616a 00000000 0000001b
  6972.  
  6973. I/DEBUG ( 5573): 41941f68 6d617266 726f7765 616a2e6b 00000072
  6974.  
  6975. I/DEBUG ( 5573):
  6976.  
  6977. I/DEBUG ( 5573): memory near sl:
  6978.  
  6979. I/DEBUG ( 5573): 5b0d6f84 63617661 2e65726f 00006f73 7461502f
  6980.  
  6981. I/DEBUG ( 5573): 5b0d6f94 0000001b 7379732f 2f6d6574 2f727375
  6982.  
  6983. I/DEBUG ( 5573): 5b0d6fa4 00756369 746e4965 00000031 726f466c
  6984.  
  6985. I/DEBUG ( 5573): 5b0d6fb4 3b74616d 62617400 00000021 3b786564
  6986.  
  6987. I/DEBUG ( 5573): 5b0d6fc4 00000000 00000000 00000011 00000000
  6988.  
  6989. I/DEBUG ( 5573): 5b0d6fd4 00000000 00000030 0000001a 5b0c8000
  6990.  
  6991. I/DEBUG ( 5573): 5b0d6fe4 0000f000 59eb8fe0 00000001 00000000
  6992.  
  6993. I/DEBUG ( 5573): 5b0d6ff4 00000007 00000007 00000007 0a796564
  6994.  
  6995. I/DEBUG ( 5573): 5b0d7004 00363330 00000028 00022090 000220b8
  6996.  
  6997. I/DEBUG ( 5573): 5b0d7014 0000036c 00022428 00003c00 00000000
  6998.  
  6999. I/DEBUG ( 5573): 5b0d7024 aba5d33e 0a786564 00353330 dfc59663
  7000.  
  7001. I/DEBUG ( 5573): 5b0d7034 46292994 fb5698cd 090babaf 9aab2356
  7002.  
  7003. I/DEBUG ( 5573): 5b0d7044 58a797ba 00022090 00000070 12345678
  7004.  
  7005. I/DEBUG ( 5573): 5b0d7054 00000000 00000000 00021fc0 000006c5
  7006.  
  7007. I/DEBUG ( 5573): 5b0d7064 00000070 00000082 00001b84 000000bf
  7008.  
  7009. I/DEBUG ( 5573): 5b0d7074 00001d8c 00000259 00002680 00000257
  7010.  
  7011. I/DEBUG ( 5573):
  7012.  
  7013. I/DEBUG ( 5573): memory near fp:
  7014.  
  7015. I/DEBUG ( 5573): 41a08108 41945000 41a08004 41a009d0 41a0822c
  7016.  
  7017. I/DEBUG ( 5573): 41a08118 400e5eb8 00000001 41945000 00000100
  7018.  
  7019. I/DEBUG ( 5573): 41a08128 6a62696c 63617661 2e65726f 00006f73
  7020.  
  7021. I/DEBUG ( 5573): 41a08138 00000000 00000000 00000000 00000000
  7022.  
  7023. I/DEBUG ( 5573): 41a08148 00000000 00000000 00000000 00000000
  7024.  
  7025. I/DEBUG ( 5573): 41a08158 00000000 00000000 00000000 00000000
  7026.  
  7027. I/DEBUG ( 5573): 41a08168 00000000 00000000 00000000 00000000
  7028.  
  7029. I/DEBUG ( 5573): 41a08178 00000000 00000000 00000000 00000000
  7030.  
  7031. I/DEBUG ( 5573): 41a08188 00000000 00000000 00000000 00000000
  7032.  
  7033. I/DEBUG ( 5573): 41a08198 00000000 00000000 00000000 00000000
  7034.  
  7035. I/DEBUG ( 5573): 41a081a8 5bbb9034 00000008 00000000 5bbb9000
  7036.  
  7037. I/DEBUG ( 5573): 41a081b8 00034000 00000000 5bbea690 00000000
  7038.  
  7039. I/DEBUG ( 5573): 41a081c8 00000000 00000000 00000001 5bbbbd88
  7040.  
  7041. I/DEBUG ( 5573): 41a081d8 5bbb9148 00000209 000002c4 5bbc0478
  7042.  
  7043. I/DEBUG ( 5573): 41a081e8 5bbc0c9c 5bbea8a4 5bbc45dc 000001d4
  7044.  
  7045. I/DEBUG ( 5573): 41a081f8 5bbc17ac 000005c6 00000000 00000000
  7046.  
  7047. I/DEBUG ( 5573):
  7048.  
  7049. I/DEBUG ( 5573): memory near ip:
  7050.  
  7051. I/DEBUG ( 5573): 4193cb28 00000000 00000000 00000000 00000000
  7052.  
  7053. I/DEBUG ( 5573): 4193cb38 00000000 00000000 00000000 00000000
  7054.  
  7055. I/DEBUG ( 5573): 4193cb48 7379732f 2f6d6574 2f727375 2f756369
  7056.  
  7057. I/DEBUG ( 5573): 4193cb58 64756369 6c313574 7461642e 00000000
  7058.  
  7059. I/DEBUG ( 5573): 4193cb68 65676465 6d6f7266 68746170 766c6c2e
  7060.  
  7061. I/DEBUG ( 5573): 4193cb78 6f72706d 756f2e66 00000074 00000000
  7062.  
  7063. I/DEBUG ( 5573): 4193cb88 65676465 6d6f7266 68746170 766c6c2e
  7064.  
  7065. I/DEBUG ( 5573): 4193cb98 6f72706d 756f2e66 00000074 00000000
  7066.  
  7067. I/DEBUG ( 5573): 4193cba8 4193cbc8 00000000 00000000 00000000
  7068.  
  7069. I/DEBUG ( 5573): 4193cbb8 00000000 00000000 00000000 00000000
  7070.  
  7071. I/DEBUG ( 5573): 4193cbc8 4193cbe8 00000000 00000000 00000000
  7072.  
  7073. I/DEBUG ( 5573): 4193cbd8 00000000 00000000 00000000 00000000
  7074.  
  7075. I/DEBUG ( 5573): 4193cbe8 4193cc08 00000000 00000000 00000000
  7076.  
  7077. I/DEBUG ( 5573): 4193cbf8 00000000 00000000 00000000 00000000
  7078.  
  7079. I/DEBUG ( 5573): 4193cc08 4193cc28 00000000 00000000 00000000
  7080.  
  7081. I/DEBUG ( 5573): 4193cc18 00000000 00000000 00000000 00000000
  7082.  
  7083. I/DEBUG ( 5573):
  7084.  
  7085. I/DEBUG ( 5573): memory near sp:
  7086.  
  7087. I/DEBUG ( 5573): bebaeb48 41944f88 419d94f9 41a2a178 bebaebb0
  7088.  
  7089. I/DEBUG ( 5573): bebaeb58 5bbe40f0 419b48d3 bebaeb70 bebaeb83
  7090.  
  7091. I/DEBUG ( 5573): bebaeb68 00000006 00000002 00001579 4193cb48
  7092.  
  7093. I/DEBUG ( 5573): bebaeb78 4193cb48 401112b1 00000006 00000000
  7094.  
  7095. I/DEBUG ( 5573): bebaeb88 ffffffff 401114c5 bebaeb9c 401101f9
  7096.  
  7097. I/DEBUG ( 5573): bebaeb98 0000001f ffffffdf bebaec44 ec93f117
  7098.  
  7099. I/DEBUG ( 5573): bebaeba8 bebaec44 bebaec44 00000000 bebaec44
  7100.  
  7101. I/DEBUG ( 5573): bebaebb8 00000000 4011faa8 400f596d 5bbceabb
  7102.  
  7103. I/DEBUG ( 5573): bebaebc8 40150998 00000011 579ad0bc 59a76438
  7104.  
  7105. I/DEBUG ( 5573): bebaebd8 00000003 00000003 00000000 41a2a178
  7106.  
  7107. I/DEBUG ( 5573): bebaebe8 5bbe411f 5bbe410c 5bbeba00 00000002
  7108.  
  7109. I/DEBUG ( 5573): bebaebf8 579ad0a8 41a2a178 579ad0a8 bebaec2c
  7110.  
  7111. I/DEBUG ( 5573): bebaec08 5bbe411f 41990035 00000000 41994897
  7112.  
  7113. I/DEBUG ( 5573): bebaec18 1ea00005 5bbe4080 00000003 5bbeb9e8
  7114.  
  7115. I/DEBUG ( 5573): bebaec28 00000001 bebaec44 5bbe4080 41990035
  7116.  
  7117. I/DEBUG ( 5573): bebaec38 1ea00005 41990f99 41941e98 4193cb68
  7118.  
  7119. I/DEBUG ( 5573):
  7120.  
  7121. I/DEBUG ( 5573): code around pc:
  7122.  
  7123. I/DEBUG ( 5573): 401201d4 e8bd00f0 e3700a01 912fff1e e2600000
  7124.  
  7125. I/DEBUG ( 5573): 401201e4 ea00b702 e92d50f0 e3a07f43 ef000000
  7126.  
  7127. I/DEBUG ( 5573): 401201f4 e8bd50f0 e3700a01 912fff1e e2600000
  7128.  
  7129. I/DEBUG ( 5573): 40120204 ea00b6fa e92d50f0 e3a070ee ef000000
  7130.  
  7131. I/DEBUG ( 5573): 40120214 e8bd50f0 e3700a01 912fff1e e2600000
  7132.  
  7133. I/DEBUG ( 5573): 40120224 ea00b6f2 00000000 00000000 e92d400f
  7134.  
  7135. I/DEBUG ( 5573): 40120234 e1a03000 e1a00001 e1a01003 eb000040
  7136.  
  7137. I/DEBUG ( 5573): 40120244 e8bd400f e12fff1e e320f000 e92d403f
  7138.  
  7139. I/DEBUG ( 5573): 40120254 e2522040 ba00002c e1a05001 e2455c01
  7140.  
  7141. I/DEBUG ( 5573): 40120264 f5d5f000 f5d5f040 f5d5f080 f5d5f0c0
  7142.  
  7143. I/DEBUG ( 5573): 40120274 e2411040 e2400040 e1a05000 e1a04001
  7144.  
  7145. I/DEBUG ( 5573): 40120284 f424020d f424420d f405022d f405422d
  7146.  
  7147. I/DEBUG ( 5573): 40120294 e2522040 ba00001c e2411040 e2400040
  7148.  
  7149. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  7150.  
  7151. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  7152.  
  7153. I/DEBUG ( 5573): 401202a4 e1a05000 e1a04001 f424020d f424420d
  7154.  
  7155. I/DEBUG ( 5573): 401202b4 f405022d f405422d e2522040 ba000012
  7156.  
  7157. I/DEBUG ( 5573): 401202c4 e2411040 e2400040 e1a05000 e1a04001
  7158.  
  7159. I/DEBUG ( 5573):
  7160.  
  7161. I/DEBUG ( 5573): code around lr:
  7162.  
  7163. I/DEBUG ( 5573): 40111290 447b4b13 42b3e010 4812d10e 44786a1e
  7164.  
  7165. I/DEBUG ( 5573): 401112a0 eb08f7f8 e9d8f00d 46224631 ef9cf00e
  7166.  
  7167. I/DEBUG ( 5573): 401112b0 d00a3001 e00b2400 2b00681b 480ad1eb
  7168.  
  7169. I/DEBUG ( 5573): 401112c0 44782403 eaf6f7f8 f001e002 6804fa1b
  7170.  
  7171. I/DEBUG ( 5573): 401112d0 fa18f001 46206005 bf00bd70 0005095a
  7172.  
  7173. I/DEBUG ( 5573): 401112e0 0005094e 00050946 00050922 bf7ef7ff
  7174.  
  7175. I/DEBUG ( 5573): 401112f0 43f0e92d 4a3d4b3c 589c447b 6823b08b
  7176.  
  7177. I/DEBUG ( 5573): 40111300 460d4606 f0019309 46a1f9fd 8000f8d0
  7178.  
  7179. I/DEBUG ( 5573): 40111310 d0482d00 f00f4628 280ffed5 d8444604
  7180.  
  7181. I/DEBUG ( 5573): 40111320 ffe4f7ff d1064286 4629200f e8a2f00d
  7182.  
  7183. I/DEBUG ( 5573): 40111330 d03c2800 482ee02e f7f84478 482dea3a
  7184.  
  7185. I/DEBUG ( 5573): 40111340 e0154478 d11342b0 482b6a06 f7f84478
  7186.  
  7187. I/DEBUG ( 5573): 40111350 4a2aeab2 447a2120 a8014633 e84af015
  7188.  
  7189. I/DEBUG ( 5573): 40111360 a8012101 ef52f021 46061c42 e011d104
  7190.  
  7191. I/DEBUG ( 5573): 40111370 28006800 e02cd1e6 46294630 f00d4622
  7192.  
  7193. I/DEBUG ( 5573): 40111380 1c43e8de d11e4607 f9bcf001 29046801
  7194.  
  7195. D/ImgSensorDrv( 5498): [impSearchSensor][impSearchSensor] Err-ctrlCode (I/O error)
  7196.  
  7197. D/ImgSensorDrv( 5498): [getCurrentSensorType][getCurrentSensorType]
  7198.  
  7199. D/ImgSensorDrv( 5498): [getInfo][getInfo]
  7200.  
  7201. D/ImgSensorDrv( 5498): [getSocketPosition][getSocketPosition]:[1][1]
  7202.  
  7203. D/ImgSensorDrv( 5498): [impSearchSensor]sensor ID mismatch
  7204.  
  7205. D/ImgSensorDrv( 5498): [impSearchSensor]set sensor driver id =10003
  7206.  
  7207. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  7208.  
  7209. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  7210.  
  7211. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  7212.  
  7213. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  7214.  
  7215. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  7216.  
  7217. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  7218.  
  7219. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  7220.  
  7221. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  7222.  
  7223. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  7224.  
  7225. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  7226.  
  7227. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  7228.  
  7229. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  7230.  
  7231. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  7232.  
  7233. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  7234.  
  7235. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  7236.  
  7237. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  7238.  
  7239. V/AEE/AED ( 5573): dashboard_record_update() : rec->module = zygote
  7240.  
  7241. D/AEE/AED ( 5573): Skip duplicated exception !
  7242.  
  7243. D/AEE/AED ( 5573): Exception Class: 1
  7244.  
  7245. D/AEE/AED ( 5573): Module: zygote
  7246.  
  7247. D/AEE/AED ( 5573): Count: 42
  7248.  
  7249. D/AEE/AED ( 5573): Last exception time: 1388537679
  7250.  
  7251. D/AEE/AED ( 5573):
  7252.  
  7253. V/AEE/AED ( 5573): aed_ne_session() - skipped
  7254.  
  7255. I/Netd ( 5495): execIptablesCommand android_fork_execvp exit
  7256.  
  7257. I/Netd ( 5495): execIptablesCommand android_fork_execvp enter
  7258.  
  7259. D/AEE/AED ( 132): $===AEE===AEE===AEE===$
  7260.  
  7261. D/AEE/AED ( 132): p 0 poll events 1 revents 0
  7262.  
  7263. D/AEE/AED ( 132): not know revents:0
  7264.  
  7265. D/AEE/AED ( 132): p 1 poll events 1 revents 0
  7266.  
  7267. D/AEE/AED ( 132): not know revents:0
  7268.  
  7269. D/AEE/AED ( 132): p 2 poll events 1 revents 0
  7270.  
  7271. D/AEE/AED ( 132): not know revents:0
  7272.  
  7273. D/AEE/AED ( 132): p 3 poll events 1 revents 0
  7274.  
  7275. D/AEE/AED ( 132): not know revents:0
  7276.  
  7277. D/AEE/AED ( 132): p 4 poll events 1 revents 0
  7278.  
  7279. D/AEE/AED ( 132): not know revents:0
  7280.  
  7281. I/ServiceManager( 124): service 'SurfaceFlinger' died
  7282.  
  7283. D/IPCThreadState( 5524): [DN #5] BR_DEAD_BINDER cookie 0xb8733cb0
  7284.  
  7285. W/SurfaceComposerClient( 5524): ComposerService remote (surfaceflinger) died [0xb8733cb0]
  7286.  
  7287. D/BootAnimation( 5524): [BootAnimation binderDied 172]start
  7288.  
  7289. D/BootAnimation( 5524): SurfaceFlinger died, exiting...
  7290.  
  7291. I/ServiceManager( 124): service 'media.audio_flinger' died
  7292.  
  7293. I/ServiceManager( 124): service 'media.player' died
  7294.  
  7295. I/ServiceManager( 124): service 'memory.dumper' died
  7296.  
  7297. I/AKMD2 ( 5613): AK8963/B for Android v20110826 (Library: v3.1.0.1012) started.
  7298.  
  7299. I/AKMD2 ( 5613): Debug: ON
  7300.  
  7301. I/AKMD2 ( 5613): Debug level: 4
  7302.  
  7303. I/AKMD2 ( 5613): Output to: LOGD
  7304.  
  7305. I/AKMD2 ( 5613): AK8963/B for Android end (-2).
  7306.  
  7307. D/ADB_SERVICES( 190): adb fdevent_process list (4) (11) (17)
  7308.  
  7309. W/ADB_SERVICES( 190): create_local_service_socket() name=shell:export ANDROID_LOG_TAGS="" ; exec logcat -d
  7310.  
  7311. W/ADB_SERVICES( 190): service_to_fd() name=shell:export ANDROID_LOG_TAGS="" ; exec logcat -d
  7312.  
  7313. W/ADB_SERVICES( 190): read_meminfo() mem_free=303700
  7314.  
  7315. W/ADB_SERVICES( 190): create_subprocess() ret_fd=17 pid=5614
  7316.  
  7317. W/ADB_SERVICES( 190): LS(4): bound to 'shell:export ANDROID_LOG_TAGS="" ; exec logcat -d' via 17
  7318.  
  7319. D/ADB_SERVICES( 190): adb local_socket_ready list (17)
  7320.  
  7321. W/ADB_SERVICES( 5614): adb: unable to open /proc/5614/oom_adj
  7322.  
  7323. D/ADB_SERVICES( 190): adb socket read list (17)
  7324.  
  7325. D/ADB_SERVICES( 190): read_data=63
  7326.  
  7327. D/ADB_SERVICES( 190): max_read_time=0.000088 max_send_time=0.000048
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement