Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 09-14 23:58:40.627 I/ActivityManager(2093): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.HOME] flg=0x10200000 cmp=com.mycolorscreen.themer/.Launcher} from pid 2093
- 09-14 23:58:40.697 W/GA-SERVICE(2785): Thread[Thread-11800,5,main]: Using destination https://ssl.google-analytics.com
- 09-14 23:58:40.707 W/FlurryAgent(2495): Start session
- 09-14 23:58:40.707 D/HockeyApp(2495): Looking for exceptions in: /data/data/com.mycolorscreen.themer/files
- 09-14 23:58:40.717 D/HockeyApp(2495): Current handler class = net.hockeyapp.android.h
- 09-14 23:58:40.807 I/art (2495): GcCauseBackground sticky partial concurrent mark sweep GC freed 5317(291KB) AllocSpace objects, 0(0B) LOS objects, 5% free, 134MB/141MB, paused 8.497ms total 30.577ms
- 09-14 23:58:41.167 I/art (2495): GcCauseBackground partial concurrent mark sweep GC freed 6258(506KB) AllocSpace objects, 5(14MB) LOS objects, 5% free, 120MB/127MB, paused 6.983ms total 152.683ms
- 09-14 23:58:41.217 I/art (2263): Heap trim of managed (duration=5.359479ms, advised=4MB) and native (duration=19.972031ms, advised=2MB) heaps. Managed heap utilization of 29%.
- 09-14 23:58:41.257 I/Choreographer(2495): Skipped 31 frames! The application may be doing too much work on its main thread.
- 09-14 23:58:41.387 W/ResourceType(2495): CREATING STRING CACHE OF 104 bytes
- 09-14 23:58:41.467 D/NiLS (2945): window state has been changed:com.mycolorscreen.themer
- 09-14 23:58:41.487 D/NiLS (2945): window content has been changed:com.mycolorscreen.themer
- 09-14 23:58:41.517 I/Timeline(2093): Timeline: Activity_windows_visible id: ActivityRecord{6621cec8 u0 com.mycolorscreen.themer/.Launcher t1} time:101148052
- 09-14 23:58:41.767 I/ImageUtil(2495): Display Width : 1080 Column Width : 216 Total Padding : 120 Number of expected grid columns : 4
- 09-14 23:58:41.777 I/Timeline(2495): Timeline: Activity_idle id: android.os.BinderProxy@657c4420 time:101148318
- 09-14 23:58:42.117 I/art (2495): GcCauseBackground partial concurrent mark sweep GC freed 15322(1173KB) AllocSpace objects, 4(27MB) LOS objects, 7% free, 105MB/113MB, paused 11.748ms total 63.073ms
- 09-14 23:58:42.397 W/FlurryAgent(2495): FlurryDataSender: report 755b7881-1d87-4d5b-b36e-acc32f2c0c1d sent. HTTP response: 200 : OK
- 09-14 23:58:42.477 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:58:42.477 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:58:42.477 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:58:42.477 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:58:42.477 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000000]
- 09-14 23:58:42.477 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:58:42.477 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:58:42.477 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000000
- 09-14 23:58:42.477 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:58:42.477 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:58:42.477 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:58:42.477 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:58:42.477 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:58:42.477 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:58:42.477 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
- 09-14 23:58:42.477 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:58:42.477 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:58:42.487 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:58:42.487 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:58:42.487 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:58:42.487 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:58:42.487 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000000]
- 09-14 23:58:42.487 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:58:42.497 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:58:42.497 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000000
- 09-14 23:58:42.497 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:58:42.497 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:58:42.497 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:58:42.497 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:58:42.497 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:58:42.497 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:58:42.497 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
- 09-14 23:58:42.497 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:58:42.497 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:58:42.947 I/art (2495): GcCauseBackground sticky partial concurrent mark sweep GC freed 1553(66KB) AllocSpace objects, 0(0B) LOS objects, 5% free, 127MB/134MB, paused 6.212ms total 13.391ms
- 09-14 23:58:42.967 I/art (2495): GcCauseBackground sticky partial concurrent mark sweep GC freed 626(24KB) AllocSpace objects, 0(0B) LOS objects, 5% free, 127MB/134MB, paused 7.032ms total 11.557ms
- 09-14 23:58:43.227 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:58:43.227 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:58:43.227 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:58:43.227 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:58:43.237 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000002]
- 09-14 23:58:43.237 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:58:43.237 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:58:43.237 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000002
- 09-14 23:58:43.237 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:58:43.237 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:58:43.237 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:58:43.237 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:58:43.237 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:58:43.237 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:58:43.237 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
- 09-14 23:58:43.237 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:58:43.237 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:58:43.327 I/art (2495): GcCauseBackground partial concurrent mark sweep GC freed 7516(513KB) AllocSpace objects, 4(14MB) LOS objects, 5% free, 128MB/135MB, paused 5.558ms total 60.404ms
- 09-14 23:58:43.357 I/Timeline(2495): Timeline: Activity_launch_request id:com.mycolorscreen.themer time:101149897
- 09-14 23:58:43.357 I/ActivityManager(2093): START u0 {act=com.mycolorscreen.themer.ACTION_THEMER_ACTION cmp=com.mycolorscreen.themer/.Launcher bnds=[0,1563][270,1775] (has extras)} from pid 2495
- 09-14 23:58:43.367 W/ResourceType(2495): No known package when getting name for resource number 0x9c00000e
- 09-14 23:58:43.377 D/HockeyApp(2495): Looking for exceptions in: /data/data/com.mycolorscreen.themer/files
- 09-14 23:58:43.377 D/HockeyApp(2495): Current handler class = net.hockeyapp.android.h
- 09-14 23:58:47.627 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:58:47.627 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:58:47.627 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:58:47.627 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:58:47.627 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000000]
- 09-14 23:58:47.627 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:58:47.627 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:58:47.627 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000000
- 09-14 23:58:47.627 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:58:47.627 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:58:47.627 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:58:47.627 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:58:47.637 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:58:47.637 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:58:47.637 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:58:47.637 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:58:47.637 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
- 09-14 23:58:47.637 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:58:47.637 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:58:47.637 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:58:47.657 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:58:47.657 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000000]
- 09-14 23:58:47.657 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:58:47.657 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:58:47.657 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000000
- 09-14 23:58:47.657 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:58:47.667 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:58:47.667 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:58:47.667 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:58:47.667 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:58:47.667 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:58:47.667 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:58:47.667 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:58:47.667 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
- 09-14 23:58:48.257 I/Timeline(2495): Timeline: Activity_launch_request id:com.twitter.android time:101154791
- 09-14 23:58:48.257 I/ActivityManager(2093): START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 cmp=com.twitter.android/.StartActivity} from pid 2495
- 09-14 23:58:48.337 W/art (211): Could not get current activity
- 09-14 23:58:48.337 I/ActivityManager(2093): Start proc com.twitter.android for activity com.twitter.android/.StartActivity: pid=798 uid=10168 gids={50168, 3003, 1028, 1015, 1023}
- 09-14 23:58:48.347 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:58:48.347 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:58:48.347 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:58:48.347 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:58:48.357 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000002]
- 09-14 23:58:48.357 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:58:48.367 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:58:48.367 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000002
- 09-14 23:58:48.367 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:58:48.367 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:58:48.367 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:58:48.367 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:58:48.387 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:58:48.387 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:58:48.417 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
- 09-14 23:58:48.417 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:58:48.417 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:58:48.417 I/art (2093): Heap trim of managed (duration=22.161407ms, advised=8MB) and native (duration=3.990624ms, advised=1656KB) heaps. Managed heap utilization of 52%.
- 09-14 23:58:48.437 I/f (2495): Received Action : com.mycolorscreen.themer.ACTION_APP_UPDATED_IN_MOSTUSED
- 09-14 23:58:48.487 I/ImageUtil(2495): Display Width : 1080 Column Width : 216 Total Padding : 120 Number of expected grid columns : 4
- 09-14 23:58:48.567 I/Crashlytics(798): Initializing Crashlytics 1.1.11.11
- 09-14 23:58:49.127 V/Peek (798): onEnterForeground stopping peek...
- 09-14 23:58:49.637 E/PhoneNumberUtil(798): missing metadata: /com/google/i18n/phonenumbers/data/PhoneNumberMetadataProto_CA
- 09-14 23:58:49.747 E/AndroidRuntime(798): FATAL EXCEPTION: AsyncTask #2
- 09-14 23:58:49.747 E/AndroidRuntime(798): Process: com.twitter.android, PID: 798
- 09-14 23:58:49.747 E/AndroidRuntime(798): java.lang.RuntimeException: An error occured while executing doInBackground()
- 09-14 23:58:49.747 E/AndroidRuntime(798): at android.os.AsyncTask$3.done(AsyncTask.java:300)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at java.util.concurrent.FutureTask.finishCompletion(FutureTask.java:355)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at java.util.concurrent.FutureTask.setException(FutureTask.java:222)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at java.util.concurrent.FutureTask.run(FutureTask.java:242)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at android.os.AsyncTask$SerialExecutor$1.run(AsyncTask.java:231)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1112)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:587)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at java.lang.Thread.run(Thread.java:811)
- 09-14 23:58:49.747 E/AndroidRuntime(798): Caused by: java.lang.IllegalStateException: missing metadata: /com/google/i18n/phonenumbers/data/PhoneNumberMetadataProto_CA
- 09-14 23:58:49.747 E/AndroidRuntime(798): at com.google.i18n.phonenumbers.PhoneNumberUtil.a(Twttr:619)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at com.google.i18n.phonenumbers.PhoneNumberUtil.f(Twttr:2033)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at com.google.i18n.phonenumbers.PhoneNumberUtil.a(Twttr:2913)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at com.google.i18n.phonenumbers.PhoneNumberUtil.a(Twttr:2775)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at com.google.i18n.phonenumbers.PhoneNumberUtil.a(Twttr:2765)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at com.twitter.android.util.ae.a(Twttr:481)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at com.twitter.android.util.ae.p(Twttr:327)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at com.twitter.android.util.ak.a(Twttr:267)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at com.twitter.android.util.ak.doInBackground(Twttr:238)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at android.os.AsyncTask$2.call(AsyncTask.java:288)
- 09-14 23:58:49.747 E/AndroidRuntime(798): at java.util.concurrent.FutureTask.run(FutureTask.java:237)
- 09-14 23:58:49.747 E/AndroidRuntime(798): ... 4 more
- 09-14 23:58:49.747 W/ActivityManager(2093): Force finishing activity com.twitter.android/.StartActivity
- 09-14 23:58:49.877 E/Crashlytics(798): Failed to retrieve settings from https://settings.crashlytics.com/spi/v2/platforms/android/apps/com.twitter.android/settings
- 09-14 23:58:49.877 E/Crashlytics(798): com.crashlytics.android.internal.aD: java.net.ConnectException: failed to connect to settings.crashlytics.com/127.0.0.1 (port 443) after 10000ms: isConnected failed: ECONNREFUSED (Connection refused)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.crashlytics.android.internal.bw.b(Twttr:1391)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.crashlytics.android.internal.bw.f(Twttr:1664)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.crashlytics.android.internal.bw.d(Twttr:1576)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.crashlytics.android.internal.bw.c(Twttr:1590)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.crashlytics.android.internal.ao.a(Twttr:63)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.crashlytics.android.internal.ay.a(Twttr:48)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.crashlytics.android.internal.ay.a(Twttr:36)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.crashlytics.android.internal.at.c(Twttr:125)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.crashlytics.android.d.b(Twttr:884)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.crashlytics.android.d.a(Twttr:54)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.crashlytics.android.ba.a(Twttr:839)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.crashlytics.android.internal.bc.run(Twttr:13)
- 09-14 23:58:49.877 E/Crashlytics(798): at java.lang.Thread.run(Thread.java:811)
- 09-14 23:58:49.877 E/Crashlytics(798): Caused by: java.net.ConnectException: failed to connect to settings.crashlytics.com/127.0.0.1 (port 443) after 10000ms: isConnected failed: ECONNREFUSED (Connection refused)
- 09-14 23:58:49.877 E/Crashlytics(798): at libcore.io.IoBridge.isConnected(IoBridge.java:223)
- 09-14 23:58:49.877 E/Crashlytics(798): at libcore.io.IoBridge.connectErrno(IoBridge.java:161)
- 09-14 23:58:49.877 E/Crashlytics(798): at libcore.io.IoBridge.connect(IoBridge.java:112)
- 09-14 23:58:49.877 E/Crashlytics(798): at java.net.PlainSocketImpl.connect(PlainSocketImpl.java:192)
- 09-14 23:58:49.877 E/Crashlytics(798): at java.net.PlainSocketImpl.connect(PlainSocketImpl.java:459)
- 09-14 23:58:49.877 E/Crashlytics(798): at java.net.Socket.connect(Socket.java:843)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.android.okhttp.internal.Platform.connectSocket(Platform.java:131)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.android.okhttp.Connection.connect(Connection.java:101)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.android.okhttp.internal.http.HttpEngine.connect(HttpEngine.java:294)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.android.okhttp.internal.http.HttpEngine.sendSocketRequest(HttpEngine.java:255)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.android.okhttp.internal.http.HttpEngine.sendRequest(HttpEngine.java:206)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.android.okhttp.internal.http.HttpURLConnectionImpl.execute(HttpURLConnectionImpl.java:345)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.android.okhttp.internal.http.HttpURLConnectionImpl.getResponse(HttpURLConnectionImpl.java:296)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.android.okhttp.internal.http.HttpURLConnectionImpl.getHeaderField(HttpURLConnectionImpl.java:143)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.android.okhttp.internal.http.HttpsURLConnectionImpl.getHeaderField(HttpsURLConnectionImpl.java:226)
- 09-14 23:58:49.877 E/Crashlytics(798): at com.crashlytics.android.internal.bw.a(Twttr:1912)
- 09-14 23:58:49.877 E/Crashlytics(798): ... 10 more
- 09-14 23:58:49.877 E/Crashlytics(798): Caused by: libcore.io.ErrnoException: isConnected failed: ECONNREFUSED (Connection refused)
- 09-14 23:58:49.877 E/Crashlytics(798): at libcore.io.IoBridge.isConnected(IoBridge.java:208)
- 09-14 23:58:49.877 E/Crashlytics(798): ... 25 more
- 09-14 23:58:49.937 E/Crashlytics(798): Failed to retrieve settings from https://settings.crashlytics.com/spi/v2/platforms/android/apps/com.twitter.android/settings
- 09-14 23:58:49.937 E/Crashlytics(798): com.crashlytics.android.internal.aD: java.net.ConnectException: failed to connect to settings.crashlytics.com/127.0.0.1 (port 443) after 10000ms: isConnected failed: ECONNREFUSED (Connection refused)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.crashlytics.android.internal.bw.b(Twttr:1391)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.crashlytics.android.internal.bw.f(Twttr:1664)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.crashlytics.android.internal.bw.d(Twttr:1576)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.crashlytics.android.internal.bw.c(Twttr:1590)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.crashlytics.android.internal.ao.a(Twttr:63)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.crashlytics.android.internal.ay.a(Twttr:48)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.crashlytics.android.internal.ay.a(Twttr:36)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.crashlytics.android.internal.at.c(Twttr:125)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.crashlytics.android.internal.c.a(Twttr:30)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.crashlytics.android.internal.d.a(Twttr:93)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.crashlytics.android.internal.bc.run(Twttr:13)
- 09-14 23:58:49.937 E/Crashlytics(798): at java.lang.Thread.run(Thread.java:811)
- 09-14 23:58:49.937 E/Crashlytics(798): Caused by: java.net.ConnectException: failed to connect to settings.crashlytics.com/127.0.0.1 (port 443) after 10000ms: isConnected failed: ECONNREFUSED (Connection refused)
- 09-14 23:58:49.937 E/Crashlytics(798): at libcore.io.IoBridge.isConnected(IoBridge.java:223)
- 09-14 23:58:49.937 E/Crashlytics(798): at libcore.io.IoBridge.connectErrno(IoBridge.java:161)
- 09-14 23:58:49.937 E/Crashlytics(798): at libcore.io.IoBridge.connect(IoBridge.java:112)
- 09-14 23:58:49.937 E/Crashlytics(798): at java.net.PlainSocketImpl.connect(PlainSocketImpl.java:192)
- 09-14 23:58:49.937 E/Crashlytics(798): at java.net.PlainSocketImpl.connect(PlainSocketImpl.java:459)
- 09-14 23:58:49.937 E/Crashlytics(798): at java.net.Socket.connect(Socket.java:843)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.android.okhttp.internal.Platform.connectSocket(Platform.java:131)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.android.okhttp.Connection.connect(Connection.java:101)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.android.okhttp.internal.http.HttpEngine.connect(HttpEngine.java:294)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.android.okhttp.internal.http.HttpEngine.sendSocketRequest(HttpEngine.java:255)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.android.okhttp.internal.http.HttpEngine.sendRequest(HttpEngine.java:206)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.android.okhttp.internal.http.HttpURLConnectionImpl.execute(HttpURLConnectionImpl.java:345)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.android.okhttp.internal.http.HttpURLConnectionImpl.getResponse(HttpURLConnectionImpl.java:296)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.android.okhttp.internal.http.HttpURLConnectionImpl.getHeaderField(HttpURLConnectionImpl.java:143)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.android.okhttp.internal.http.HttpsURLConnectionImpl.getHeaderField(HttpsURLConnectionImpl.java:226)
- 09-14 23:58:49.937 E/Crashlytics(798): at com.crashlytics.android.internal.bw.a(Twttr:1912)
- 09-14 23:58:49.937 E/Crashlytics(798): ... 9 more
- 09-14 23:58:49.937 E/Crashlytics(798): Caused by: libcore.io.ErrnoException: isConnected failed: ECONNREFUSED (Connection refused)
- 09-14 23:58:49.937 E/Crashlytics(798): at libcore.io.IoBridge.isConnected(IoBridge.java:208)
- 09-14 23:58:49.937 E/Crashlytics(798): ... 24 more
- 09-14 23:58:50.057 I/WindowManager(2093): Screenshot max retries 4 of Token{66818768 ActivityRecord{66cf7a20 u0 com.twitter.android/.StartActivity t455 f}} appWin=Window{666326e8 u0 Starting com.twitter.android} drawState=4
- 09-14 23:58:50.057 W/WindowManager(2093): Screenshot failure taking screenshot for (1080x1920) to layer 21035
- 09-14 23:58:50.157 I/Choreographer(798): Skipped 40 frames! The application may be doing too much work on its main thread.
- 09-14 23:58:50.187 I/Adreno-EGL(798): <qeglDrvAPI_eglInitialize:320>: EGL 1.4 QUALCOMM Build: I0404c4692afb8623f95c43aeb6d5e13ed4b30ddbDate: 11/06/13
- 09-14 23:58:50.187 D/NiLS (2945): window state has been changed:android
- 09-14 23:58:50.237 D/OpenGLRenderer(798): Enabling debug mode 0
- 09-14 23:58:50.267 D/NiLS (2945): window content has been changed:android
- 09-14 23:58:50.277 D/HockeyApp(2495): Looking for exceptions in: /data/data/com.mycolorscreen.themer/files
- 09-14 23:58:50.277 D/HockeyApp(2495): Current handler class = net.hockeyapp.android.h
- 09-14 23:58:50.327 I/Timeline(2495): Timeline: Activity_idle id: android.os.BinderProxy@657c4420 time:101156867
- 09-14 23:58:50.517 I/Timeline(2093): Timeline: Activity_windows_visible id: ActivityRecord{6621cec8 u0 com.mycolorscreen.themer/.Launcher t1} time:101157056
- 09-14 23:58:50.707 I/art (798): Heap trim of managed (duration=15.137552ms, advised=816KB) and native (duration=4.669010ms, advised=4KB) heaps. Managed heap utilization of 61%.
- 09-14 23:58:50.947 V/Peek (798): onEnterBackground starting peek...
- 09-14 23:58:52.017 I/Process (798): Sending signal. PID: 798 SIG: 9
- 09-14 23:58:52.027 W/InputMethodManagerService(2093): Window already focused, ignoring focus gain of: com.android.internal.view.IInputMethodClient$Stub$Proxy@6613b008 attribute=null, token = android.os.BinderProxy@659771e8
- 09-14 23:58:52.057 I/ActivityManager(2093): Process com.twitter.android (pid 798) has died.
- 09-14 23:58:52.057 F/ActivityManager(2093): Service ServiceRecord{66be9420 u0 com.twitter.android/com.twitter.internal.android.service.AsyncService} in process ProcessRecord{664e40f8 798:com.twitter.android/u0a168} not same as in map: null
- 09-14 23:58:52.127 D/NiLS (2945): window state has been changed:com.mycolorscreen.themer
- 09-14 23:58:52.217 W/DnsProxyListener(207): Error writing DNS result to client
- 09-14 23:58:52.217 W/DnsProxyListener(207): Error writing DNS result to client
- 09-14 23:58:52.217 W/SocketClient(207): write error (Broken pipe)
- 09-14 23:58:52.217 W/SocketClient(207): write error (Broken pipe)
- 09-14 23:58:52.257 W/DnsProxyListener(207): Error writing DNS result to client
- 09-14 23:58:52.257 W/SocketClient(207): write error (Broken pipe)
- 09-14 23:58:52.697 I/ActivityManager(2093): START u0 {act=com.android.systemui.recent.action.TOGGLE_RECENTS flg=0x10800000 cmp=com.android.systemui/.recent.RecentsActivity} from pid 2263
- 09-14 23:58:52.737 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:58:52.747 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:58:52.747 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:58:52.747 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:58:52.747 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000000]
- 09-14 23:58:52.747 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:58:52.747 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:58:52.747 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000000
- 09-14 23:58:52.747 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:58:52.747 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:58:52.747 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:58:52.747 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:58:52.747 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:58:52.747 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:58:52.747 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:58:52.747 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
- 09-14 23:58:52.747 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:58:52.747 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:58:52.747 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:58:52.747 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:58:52.747 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:58:52.747 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000000]
- 09-14 23:58:52.747 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:58:52.747 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:58:52.747 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000000
- 09-14 23:58:52.757 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:58:52.757 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:58:52.757 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:58:52.757 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:58:52.757 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:58:52.757 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:58:52.757 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
- 09-14 23:58:52.757 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:58:52.757 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:58:52.797 I/Timeline(2093): Timeline: Activity_windows_visible id: ActivityRecord{65f2d400 u0 com.android.systemui/.recent.RecentsActivity t399} time:101159335
- 09-14 23:58:52.847 I/Timeline(2263): Timeline: Activity_idle id: android.os.BinderProxy@65935a08 time:101159383
- 09-14 23:58:52.847 W/FlurryAgent(2495): Trying to end session
- 09-14 23:58:52.907 D/NiLS (2945): window state has been changed:com.android.systemui
- 09-14 23:58:52.957 D/NiLS (2945): window content has been changed:com.android.systemui
- 09-14 23:58:52.957 D/NiLS (2945): event:EventType: TYPE_WINDOW_CONTENT_CHANGED; EventTime: 101159382; PackageName: com.android.systemui; MovementGranularity: 0; Action: 0 [ ClassName: android.widget.TextView; Text: []; ContentDescription: null; ItemCount: -1; CurrentItemIndex: -1; IsEnabled: true; IsPassword: false; IsChecked: false; IsFullScreen: false; Scrollable: false; BeforeText: null; FromIndex: -1; ToIndex: -1; ScrollX: -1; ScrollY: -1; MaxScrollX: -1; MaxScrollY: -1; AddedCount: -1; RemovedCount: -1; ParcelableData: null ]; recordCount: 0
- 09-14 23:58:52.957 D/NiLS (2945): window content has been changed:com.android.systemui
- 09-14 23:58:53.477 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:58:53.477 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:58:53.477 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:58:53.477 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:58:53.477 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000002]
- 09-14 23:58:53.477 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:58:53.477 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:58:53.477 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000002
- 09-14 23:58:53.477 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:58:53.477 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:58:53.477 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:58:53.487 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:58:53.487 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:58:53.487 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:58:53.487 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:58:53.487 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
- 09-14 23:58:53.497 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:58:53.587 V/PhoneStatusBar(2263): setLightsOn(true)
- 09-14 23:58:53.677 I/Timeline(376): Timeline: Activity_idle id: android.os.BinderProxy@657c21f8 time:101160218
- 09-14 23:58:53.697 V/PhoneStatusBar(2263): setLightsOn(true)
- 09-14 23:58:53.717 D/NiLS (2945): window state has been changed:com.nolanlawson.logcat
- 09-14 23:58:53.857 I/Timeline(2093): Timeline: Activity_windows_visible id: ActivityRecord{65d86c50 u0 com.nolanlawson.logcat/.LogcatActivity t453} time:101160391
- 09-14 23:58:54.127 D/NiLS (2945): window content has been changed:com.nolanlawson.logcat
- 09-14 23:58:57.867 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:58:57.867 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:58:57.867 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:58:57.867 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:58:57.887 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000000]
- 09-14 23:58:57.887 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:58:57.887 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:58:57.887 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000000
- 09-14 23:58:57.887 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:58:57.887 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:58:57.887 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:58:57.897 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:58:57.897 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:58:57.897 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:58:57.897 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:58:57.897 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:58:57.917 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
- 09-14 23:58:57.917 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:58:57.917 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:58:57.917 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:58:57.917 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:58:57.917 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000000]
- 09-14 23:58:57.917 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:58:57.917 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:58:57.917 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000000
- 09-14 23:58:57.917 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:58:57.917 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:58:57.917 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:58:57.917 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:58:57.917 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:58:57.917 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:58:57.917 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:58:57.917 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:58:57.917 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
- 09-14 23:58:58.597 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:58:58.597 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:58:58.597 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:58:58.597 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:58:58.597 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000002]
- 09-14 23:58:58.597 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:58:58.597 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:58:58.597 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000002
- 09-14 23:58:58.597 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:58:58.607 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:58:58.607 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:58:58.607 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:58:58.607 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:58:58.607 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:58:58.607 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:58:58.607 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:58:58.607 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
- 09-14 23:59:00.197 I/art (2495): Heap trim of managed (duration=9.133332ms, advised=5MB) and native (duration=4.986407ms, advised=2MB) heaps. Managed heap utilization of 55%.
- 09-14 23:59:02.857 W/FlurryAgent(2495): Ending session
- 09-14 23:59:02.977 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:59:02.997 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:59:02.997 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:59:02.997 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:59:02.997 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000000]
- 09-14 23:59:02.997 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:59:02.997 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:59:02.997 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000000
- 09-14 23:59:02.997 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:59:02.997 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:59:02.997 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:59:02.997 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:59:02.997 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:59:02.997 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:59:02.997 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
- 09-14 23:59:02.997 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:59:02.997 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:59:03.007 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:59:03.007 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:59:03.007 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:59:03.007 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:59:03.007 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000000]
- 09-14 23:59:03.007 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:59:03.007 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:59:03.007 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000000
- 09-14 23:59:03.007 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:59:03.007 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:59:03.007 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:59:03.007 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:59:03.007 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:59:03.007 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:59:03.007 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
- 09-14 23:59:03.007 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:59:03.007 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:59:03.727 V/QcrilMsgTunnelSocket(30707): After reading offset = 0 remaining = 4 countRead = 4
- 09-14 23:59:03.727 D/QcrilMsgTunnelSocket(30707): messageLength extracted from first 4 inputStream reads = 29
- 09-14 23:59:03.727 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 0
- 09-14 23:59:03.727 V/QcrilMsgTunnelSocket(30707): offset = 0 remaining = 29 countRead = 29
- 09-14 23:59:03.727 D/QcrilMsgTunnelSocket(30707): readRilMessage: Buffer = [B@657ce8f0 HexData = [0100000004040000110000005155414c434f4d4def0308000100000002]
- 09-14 23:59:03.727 V/QcrilMsgTunnelSocket(30707): Read packet: 29 bytes. Data Available = 32 Position = 0
- 09-14 23:59:03.727 D/QcrilMsgTunnelSocket(30707): processResponse. message type = 1. Data Available = 28
- 09-14 23:59:03.727 D/QcrilMsgTunnelSocket(30707): ByteArray from parcel = 5155414c434f4d4def0308000100000002
- 09-14 23:59:03.727 D/QcrilMsgTunnelSocket(30707): Received RIL_UNSOL_OEM_HOOK_RAW message
- 09-14 23:59:03.727 D/QcrilMsgTunnelSocket(30707): Oem ID in RIL_UNSOL_OEM_HOOK_RAW is QUALCOMM
- 09-14 23:59:03.727 D/QcrilMsgTunnelSocket(30707): OEM ID check Passed
- 09-14 23:59:03.727 D/QcrilMsgTunnelSocket(30707): Response ID in RIL_UNSOL_OEM_HOOK_RAW is 525295
- 09-14 23:59:03.727 D/QcrilMsgTunnelSocket(30707): Response ID 525295is not served in this process.
- 09-14 23:59:03.727 D/QcrilMsgTunnelSocket(30707): To broadcast an Intent via the notifier to external apps
- 09-14 23:59:03.727 D/QcrilMsgTunnelIfaceManager(30707): handleMessage what=0
- 09-14 23:59:03.727 D/QcrilMsgTunnelIfaceManager(30707): Broadcasting intent ACTION_UNSOL_RESPONSE_OEM_HOOK_RAW
- 09-14 23:59:03.747 V/QcrilMsgTunnelSocket(30707): Before reading offset = 0 remaining = 4 countRead = 0
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement