Saroj,

  Please try to give rw perm on sd card as saiyram wrote in last mail.

  If you still have problem, try to run 'zygote' and 'runtime' manually and
not init directly.
  You can see that steps in this mail chain, I sent to saiyiram few days
back.
  Also use strace to start runtime ( its already mentioned in that steps) ,
it gives lots of info
  and easy to figure out whats going wrong.


On Thu, Feb 19, 2009 at 10:32 PM, Sayiram K N <sayiram.koth...@gmail.com>wrote:

> Hi saroj
>   do the following to your SD card from the linux PC
> at the root level execute this command
>
> chmod -R a+rw .
> then try again to load the andoird. this time you can have it.
>
> Sayiram K N
>
> On Thu, Feb 19, 2009 at 11:11 PM, Rizvan S <porting.begin...@gmail.com>wrote:
>
>> Hi Saroj,
>>
>>  You have to mention which steps you are following to start android.
>>  Please describe your porting details  and steps before this log.
>>  Saiyram was also getting this kind of issue and now he is fine.
>>
>>
>>
>>
>> On Thu, Feb 19, 2009 at 2:06 AM, saroj <saroj...@gmail.com> wrote:
>>
>>>
>>>
>>> Hi,
>>>
>>> I am getting error during my android booting:
>>>
>>> I/PackageManager( 1716): /system/framework/framework-res.apk changed;
>>> unpacking
>>> D/PackageManager( 1716): Scanning app dir /system/app
>>> I/PackageManager( 1716): /system/app/PackageInstaller.apk changed;
>>> collecting ce
>>> rts
>>> D/dalvikvm( 1716): GC freed 5506 objects / 489560 bytes in 80ms
>>> I/DEBUG   ( 1693): *** *** *** *** *** *** *** *** *** *** *** *** ***
>>> *** *** *
>>> **
>>> I/DEBUG   ( 1693): Build fingerprint: 'generic/generic/generic/:1.0/
>>> TC3/eng.deep
>>> ak.singal.20090119.170753:eng/test-keys'
>>> I/DEBUG   ( 1693): pid: 1716, tid: 1732  >>> system_server <<<
>>> I/DEBUG   ( 1693): signal 11 (SIGSEGV), fault addr ad6336e0
>>> I/DEBUG   ( 1693):  r0 00000000  r1 00000000  r2 ad6336e0  r3 00ad9910
>>> I/DEBUG   ( 1693):  r4 454a2d84  r5 000c2120  r6 00089ab0  r7 0000000b
>>> I/DEBUG   ( 1693):  r8 454a2da0  r9 41017b38  10 41017b28  fp 00000001
>>> I/DEBUG   ( 1693):  ip ad5c17a0  sp 454a2ca0  lr ad21c93d  pc
>>> ad553f52  cpsr 200
>>> 00030
>>> I/DEBUG   ( 1693):          #00  pc ad553f52  /system/lib/libicuuc.so
>>> I/DEBUG   ( 1693):          #01  pc afe0dd84  /system/lib/libc.so
>>> I/DEBUG   ( 1693):          #02  pc afe0a320  /system/lib/libc.so
>>> I/DEBUG   ( 1693):          #03  pc ad53eaf8  /system/lib/libicuuc.so
>>> I/DEBUG   ( 1693):          #04  pc ad54f1b6  /system/lib/libicuuc.so
>>> I/DEBUG   ( 1693):          #05  pc ad21cd88  /system/lib/
>>> libnativehelper.so
>>> I/DEBUG   ( 1693):          #06  pc ad00d9f4  /system/lib/libdvm.so
>>> I/DEBUG   ( 1693):          #07  pc ad04123e  /system/lib/libdvm.so
>>> I/DEBUG   ( 1693):          #08  pc ad012748  /system/lib/libdvm.so
>>> I/DEBUG   ( 1693):          #09  pc ad02a92c  /system/lib/libdvm.so
>>> I/DEBUG   ( 1693):          #10  pc ad0169d0  /system/lib/libdvm.so
>>> I/DEBUG   ( 1693):          #11  pc ad051f40  /system/lib/libdvm.so
>>> I/DEBUG   ( 1693):          #12  pc ad051f60  /system/lib/libdvm.so
>>> I/DEBUG   ( 1693):          #13  pc ad047668  /system/lib/libdvm.so
>>> I/DEBUG   ( 1693):          #14  pc afe0ed48  /system/lib/libc.so
>>> I/DEBUG   ( 1693):          #15  pc afe0e8bc  /system/lib/libc.so
>>> I/DEBUG   ( 1693): stack:
>>> I/DEBUG   ( 1693):     454a2c60  00000100
>>> I/DEBUG   ( 1693):     454a2c64  454a2da0
>>> I/DEBUG   ( 1693):     454a2c68  41017b38
>>> I/DEBUG   ( 1693):     454a2c6c  41017b28
>>> I/DEBUG   ( 1693):     454a2c70  00000001
>>> I/DEBUG   ( 1693):     454a2c74  000c2120  [heap]
>>> I/DEBUG   ( 1693):     454a2c78  454a2d84
>>> I/DEBUG   ( 1693):     454a2c7c  ad5c16d4
>>> I/DEBUG   ( 1693):     454a2c80  41017b40
>>> I/DEBUG   ( 1693):     454a2c84  ad553487  /system/lib/libicuuc.so
>>> I/DEBUG   ( 1693):     454a2c88  454a2d84
>>> I/DEBUG   ( 1693):     454a2c8c  00000000
>>> I/DEBUG   ( 1693):     454a2c90  00089ab0  [heap]
>>> I/DEBUG   ( 1693):     454a2c94  ad5534c5  /system/lib/libicuuc.so
>>> I/DEBUG   ( 1693):     454a2c98  df002777
>>> I/DEBUG   ( 1693):     454a2c9c  e3a070ad
>>> I/DEBUG   ( 1693): #00 454a2ca0  ad5bcce4
>>> I/DEBUG   ( 1693):     454a2ca4  ad23611c
>>> I/DEBUG   ( 1693):     454a2ca8  4363d1e0
>>> I/DEBUG   ( 1693):     454a2cac  000c2120  [heap]
>>> I/DEBUG   ( 1693):     454a2cb0  00000000
>>> I/DEBUG   ( 1693):     454a2cb4  00000000
>>> I/DEBUG   ( 1693):     454a2cb8  454a2da0
>>> I/DEBUG   ( 1693):     454a2cbc  ad5bcce4
>>> I/DEBUG   ( 1693):     454a2cc0  41017b4c
>>> I/DEBUG   ( 1693):     454a2cc4  454a2d84
>>> I/DEBUG   ( 1693):     454a2cc8  ad5c16d4
>>> I/DEBUG   ( 1693):     454a2ccc  00000148
>>> I/DEBUG   ( 1693):     454a2cd0  001ba6f0  [heap]
>>> I/DEBUG   ( 1693):     454a2cd4  afe0dd88  /system/lib/libc.so
>>> I/DEBUG   ( 1693): #01 454a2cd8  00002bb4
>>> I/DEBUG   ( 1693):     454a2cdc  afe0e11c  /system/lib/libc.so
>>> I/DEBUG   ( 1693):     454a2ce0  00002bb4
>>> I/DEBUG   ( 1693):     454a2ce4  00000003
>>> I/DEBUG   ( 1693):     454a2ce8  000000da
>>> I/DEBUG   ( 1693):     454a2cec  000001b8
>>> I/DEBUG   ( 1693):     454a2cf0  454a2d5c
>>> I/DEBUG   ( 1693):     454a2cf4  afe0a323  /system/lib/libc.so
>>> I/DEBUG   ( 1693): debuggerd committing suicide to free the zombie!
>>> I/DEBUG   ( 1746): debuggerd: Jan 19 2009 17:28:23
>>> I/ServiceManager( 1690): service 'SurfaceFlinger' died
>>> I/ServiceManager( 1690): service 'power' died
>>> I/ServiceManager( 1690): service 'batteryinfo' died
>>> I/ServiceManager( 1690): service 'telephony.registry' died
>>> D/Zygote  ( 1695): Process 1716 terminated by signal (11)
>>> I/Zygote  ( 1695): Exit zygote because system server (1716) has
>>> terminated
>>> E/installd( 1698): eof
>>> E/installd( 1698): failed to read size
>>> I/installd( 1698): closing connection
>>>
>>>
>>> Pls tell me the reason.
>>>
>>> Thanking you in advance.
>>>
>>>
>>> Regards,
>>> Saroj
>>>
>>> On Feb 19, 11:08 am, Rizvan S <porting.begin...@gmail.com> wrote:
>>> > On Wed, Feb 18, 2009 at 1:09 AM, Saroj (सरोज) <saroj...@gmail.com>
>>> wrote:
>>> > > Hi Saiyram,
>>> >
>>> > > How you solve your android booting problem ?
>>> >
>>> >   Do you still have issue to get Android up on your board ?
>>> >
>>> >
>>> >
>>> > > bye
>>> > > saroj
>>> >
>>> > > On Wed, Feb 18, 2009 at 2:33 PM, Rizvan S <
>>> porting.begin...@gmail.com>wrote:
>>> >
>>> > >> HI Saiyram,
>>> >
>>> > >> Good to see that Android is up and running on your board.
>>> >
>>> > >> WAN ? I dont have hands on this but as per my understanding, if its
>>> > >> working on
>>> > >> your linux ( target linux for your board ), you have to just
>>> customize it
>>> > >> to work
>>> > >> on android as same other driver i.e LCD/keypard/touchscreen.
>>> > >> Plz check with other guys who have actually worked on WAN on Android
>>> > >> platform.
>>> >
>>> > >> On Wed, Feb 18, 2009 at 12:56 AM, Sayiram K N <
>>> sayiram.koth...@gmail.com>wrote:
>>> >
>>> > >>> Hi Rizvan
>>> > >>>    i am successfully loaded the android the on to PXA27x board.
>>> > >>> i would like to integrate the WAN modules to it. is it part of
>>> > >>> opensource??
>>> > >>> Sayiram
>>> >
>>> > >>> On Fri, Feb 13, 2009 at 7:43 PM, Sayiram K N <
>>> sayiram.koth...@gmail.com>wrote:
>>>  >
>>> > >>>> Hi rizvan
>>> > >>>>   here is the latest logs:
>>> > >>>> IXED, 3, 0x1a6) = 0xa71a6000
>>> > >>>> 00:00:40.049783 close(3)                = 0
>>> > >>>> 00:00:40.444326 open("libdrm1.so", O_RDONLY|O_LARGEFILE) = -1
>>> ENOENT (No
>>> > >>>> such file or directory)
>>> > >>>> 00:00:40.446060 open("/system/lib/libdrm1.so",
>>> O_RDONLY|O_LARGEFILE) = 3
>>> > >>>> 00:00:40.447633 lseek(3, 0, SEEK_SET)   = 0
>>> > >>>> 00:00:40.448703 read(3,
>>> > >>>>
>>> "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0(\0\1\0\0\0\374\30\0\0004\0\0\0d\202\0\0\2\0\0\0044\0
>>> > >>>>
>>> \0\4\0(\0\21\0\20\0\1\0\0p\300w\0\0\300w\0\0\300w\0\0\30\3\0\0\30\3\0\0\4\0\0\0\4\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\330z\0\0\330z\0\0\5\0\0\0\0\20\0\0\1\0\0\0\0\200\0\0\0\200\0\0\0\200\0\0\314\1\0\0\340\t\0\0\6\0\0\0\0\20\0\0\2\0\0\0,\200\0\0,\200\0\0,\200\0\0\330\0\0\0\330\0\0\0\6\0\0\0\4\0\0\0\0"...,
>>> > >>>> 4096) = 4096
>>> > >>>> 00:00:40.504604 lseek(3, -8, SEEK_END)  = 34060
>>> > >>>> 00:00:40.505677 read(3, "\0\0\200\235PRE ", 8) = 8
>>> > >>>> 00:00:40.599856 mmap2(0x9d800000, 36864, PROT_READ|PROT_EXEC,
>>> > >>>> MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x9d800000
>>> > >>>> 00:00:40.601571 mmap2(0x9d800000, 31448, PROT_READ|PROT_EXEC,
>>> > >>>> MAP_PRIVATE|MAP_FIXED, 3, 0) = 0x9d800000
>>> > >>>> 00:00:40.602844 mprotect(0x9d800000, 32768,
>>> > >>>> PROT_READ|PROT_WRITE|PROT_EXEC) = 0
>>> > >>>> 00:00:40.603974 mmap2(0x9d808000, 460, PROT_READ|PROT_WRITE,
>>> > >>>> MAP_PRIVATE|MAP_FIXED, 3, 0x8) = 0x9d808000
>>> > >>>> 00:00:40.605378 close(3)                = 0
>>> > >>>> 00:00:40.606587 open("libaes.so", O_RDONLY|O_LARGEFILE) = -1
>>> ENOENT (No
>>> > >>>> such file or directory)
>>> > >>>> 00:00:40.608017 open("/system/lib/libaes.so",
>>> O_RDONLY|O_LARGEFILE) = 3
>>> > >>>> 00:00:40.609554 lseek(3, 0, SEEK_SET)   = 0
>>> > >>>> 00:00:40.610824 read(3,
>>> > >>>>
>>> "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0(\0\1\0\0\0T\4\0\0004\0\0\0000\221\0\0\2\0\0\0044\0
>>> > >>>>
>>> \0\4\0(\0\f\0\v\0\1\0\0p\0\200\0\0\0\200\0\0\0\200\0\0(\0\0\0(\0\0\0\4\0\0\0\4\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0(\200\0\0(\200\0\0\5\0\0\0\0\20\0\0\1\0\0\0\0\220\0\0\0\220\0\0\0\220\0\0\274\0\0\0\274\0\0\0\6\0\0\0\0\20\0\0\2\0\0\0\0\220\0\0\0\220\0\0\0\220\0\0\230\0\0\0\230\0\0\0\6\0\0\0\4\0\0\0\0\0"...,
>>> > >>>> 4096) = 4096
>>> > >>>> 00:00:40.755433 lseek(3, -8, SEEK_END)  = 37648
>>> > >>>> 00:00:40.756503 read(3, "\0\0\300\235PRE ", 8) = 8
>>> > >>>> 00:00:40.765836 mmap2(0x9dc00000, 40960, PROT_READ|PROT_EXEC,
>>> > >>>> MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x9dc00000
>>> > >>>> 00:00:40.767024 mmap2(0x9dc00000, 32808, PROT_READ|PROT_EXEC,
>>> > >>>> MAP_PRIVATE|MAP_FIXED, 3, 0) = 0x9dc00000
>>> > >>>> 00:00:40.768274 mprotect(0x9dc00000, 36864,
>>> > >>>> PROT_READ|PROT_WRITE|PROT_EXEC) = 0
>>> > >>>> 00:00:40.769397 mmap2(0x9dc09000, 188, PROT_READ|PROT_WRITE,
>>> > >>>> MAP_PRIVATE|MAP_FIXED, 3, 0x9) = 0x9dc09000
>>> > >>>> 00:00:40.771252 close(3)                = 0
>>> > >>>> 00:00:40.772407 mprotect(0x9dc00000, 36864, PROT_READ|PROT_EXEC) =
>>> 0
>>> > >>>> 00:00:40.773529 getuid32()              = 0
>>> > >>>> 00:00:40.774577 geteuid32()             = 0
>>> > >>>> 00:00:43.025749 mprotect(0x9d800000, 32768, PROT_READ|PROT_EXEC) =
>>> 0
>>> > >>>> 00:00:43.026950 getuid32()              = 0
>>> > >>>> 00:00:43.027997 geteuid32()             = 0
>>> > >>>> 00:00:43.029107 open("libpvcommon.so", O_RDONLY|O_LARGEFILE) = -1
>>> ENOENT
>>> > >>>> (No such file or directory)
>>> > >>>> 00:00:43.030955 open("/system/lib/libpvcommon.so",
>>> O_RDONLY|O_LARGEFILE)
>>> > >>>> = 3
>>> > >>>> 00:00:43.032781 lseek(3, 0, SEEK_SET)   = 0
>>> > >>>> 00:00:43.033855 read(3,
>>> > >>>>
>>> "\177ELF\1\1\1\0\0\0\0\0\0\0\0\0\3\0(\0\1\0\0\0\330\235\2\0004\0\0\0T\375\6\0\2\0\0\0044\0
>>> > >>>>
>>> \0\4\0(\0\21\0\20\0\1\0\0p\324{\6\0\324{\6\0\324{\6\0\330N\0\0\330N\0\0\4\0\0\0\4\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0\0\0\254\312\6\0\254\312\6\0\5\0\0\0\0\20\0\0\1\0\0\0\0\320\6\0\0\320\6\0\0\320\6\0\274,\0\0\330,\0\0\6\0\0\0\0\20\0\0\2\0\0\0\0\366\6\0\0\366\6\0\0\366\6\0\350\0\0\0\350\0\0\0\6\0\0\0\4"...,
>>> > >>>> 4096) = 4096
>>> > >>>> 00:00:43.192288 lseek(3, -8, SEEK_END)  = 458748
>>> > >>>> 00:00:43.193364 read(3, "\0\0P\247PRE ", 8) = 8
>>> > >>>> 00:00:43.356137 mmap2(0xa7500000, 458752, PROT_READ|PROT_EXEC,
>>> > >>>> MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0xa7500000
>>> > >>>> 00:00:43.357351 mmap2(0xa7500000, 445100, PROT_READ|PROT_EXEC,
>>> > >>>> MAP_PRIVATE|MAP_FIXED, 3, 0) = 0xa7500000
>>> > >>>> 00:00:43.358611 mprotect(0xa7500000, 446464,
>>> > >>>> PROT_READ|PROT_WRITE|PROT_EXEC) = 0
>>> > >>>> 00:00:43.359743 mmap2(0xa756d000, 11452, PROT_READ|PROT_WRITE,
>>> > >>>> MAP_PRIVATE|MAP_FIXED, 3, 0x6d) = 0xa756d000
>>> > >>>> 00:00:43.361643 close(3)                = 0
>>> > >>>> 00:00:44.127173 mprotect(0xa7500000, 446464, PROT_READ|PROT_EXEC)
>>> = 0
>>> > >>>> 00:00:44.128558 getuid32()              = 0
>>> > >>>> 00:00:44.129604 geteuid32()             = 0
>>> > >>>> 00:00:44.595360 mprotect(0xa7000000, 1728512, PROT_READ|PROT_EXEC)
>>> = 0
>>> > >>>> 00:00:44.596663 getuid32()              = 0
>>> > >>>> 00:00:44.597765 geteuid32()             = 0
>>> > >>>> 00:00:44.647237 mprotect(0xab280000, 61440, PROT_READ|PROT_EXEC) =
>>> 0
>>> > >>>> 00:00:44.648474 getuid32()              = 0
>>> > >>>> 00:00:44.649575 geteuid32()             = 0
>>> > >>>> 00:00:44.652711 mprotect(0xa9a00000, 8192, PROT_READ|PROT_EXEC) =
>>> 0
>>> > >>>> 00:00:44.653865 getuid32()              = 0
>>> > >>>> 00:00:44.654955 geteuid32()             = 0
>>> > >>>> 00:00:44.657822 exit_group(-1)          = ?
>>> > >>>> Process 816 detached
>>> > >>>> java.lang.RuntimeException: ANDROID_SOCKET_zygote unset or invalid
>>> > >>>>         at
>>> > >>>>
>>> com.android.internal.os.ZygoteInit.registerZygoteSocket(ZygoteInit.java:156)
>>> > >>>>         at
>>> com.android.internal.os.ZygoteInit.main(ZygoteInit.java:466)
>>> > >>>>         at dalvik.system.NativeStart.main(Native Method)
>>> > >>>> Caused by: java.lang.NumberFormatException: unable to parse 'null'
>>> as
>>> > >>>> integer
>>> > >>>>         at java.lang.Integer.parseInt(Integer.java:362)
>>> > >>>>         at java.lang.Integer.parseInt(Integer.java:341)
>>> > >>>>         at
>>> > >>>>
>>> com.android.internal.os.ZygoteInit.registerZygoteSocket(ZygoteInit.java:154)
>>> > >>>>         ... 2 more
>>> >
>>> > >>>> i have extracted the system.tar and data.tar from the running
>>> > >>>> emulator.from SDK1.0 and my kernel ios 2.6.25 for PXA270.
>>> > >>>> if you have any working system.tar and data.tar will be greatful
>>> to me.
>>> > >>>> i tried using benno's site, but strucked up till RED ball moving
>>> more
>>> > >>>> than 20 minutes.
>>> >
>>> > >>>> On Fri, Feb 13, 2009 at 6:39 PM, Sayiram K N <
>>> sayiram.koth...@gmail.com
>>> > >>>> > wrote:
>>> >
>>> > >>>>> hi rizvan
>>> > >>>>> in the script
>>> > >>>>> export EXTERNAL_STORAGE=/sdcard
>>> > >>>>> but i am using the USB stick. then what could be the media i have
>>> to
>>> > >>>>> give. is it uba2i.e. currently its being recognised like that. or
>>> USB is
>>> > >>>>> sufficient
>>> >
>>> > >>>>> On Fri, Feb 13, 2009 at 12:03 PM, Rizvan S <
>>> porting.begin...@gmail.com
>>> > >>>>> > wrote:
>>> >
>>> > >>>>>> Sayiram,
>>> >
>>> > >>>>>> You have to check that strace log messages, it must give you
>>> hint
>>> > >>>>>> whats going wrong.
>>> > >>>>>> You also have to look in /dev/log/main , this also has log
>>> messages.
>>> >
>>> > >>>>>> Most of time.. I got very useful details with this logs to solve
>>> my
>>> > >>>>>> problem.
>>> > >>>>>> You have to figure out what init do step-by-steps , strace must
>>> give
>>> > >>>>>> you log and details where
>>> > >>>>>> is the problem. You can forward that strace log to me, I will
>>> check in
>>> > >>>>>> case I get time and will reply you.
>>> >
>>> > >>>>>> Thanks
>>> > >>>>>> Rizavan
>>> >
>>> > >>>>>> On Thu, Feb 12, 2009 at 5:42 PM, Sayiram K N <
>>>  > >>>>>> sayiram.koth...@gmail.com> wrote:
>>> >
>>> > >>>>>>> Hi rizvan
>>> > >>>>>>>      my usb stick is recongnised by the target . on the USB
>>> stick
>>> > >>>>>>> i have extracted complete rootfs including system and data
>>> folders.
>>> > >>>>>>> but still, not able to switch to Android GUI. in back ground
>>> robot is
>>> > >>>>>>> flickering and after some time no actions.
>>> > >>>>>>> currently i am loading the kernel from RAM and the FS is
>>> pointing to
>>> > >>>>>>> usb stick i.e. to /sbin/init to mount in standard linux kernel.
>>> once i got
>>> > >>>>>>> the commnad prompt then executing the ./init (tried
>>> ./init_android) but no
>>> > >>>>>>> luck.
>>> > >>>>>>> so tried /system/bin/strcace - xx xx xx xx x /init method which
>>> i got
>>> > >>>>>>> in your earlier mails.but with this i got error saying systrace
>>>  with error
>>> > >>>>>>> and exited.
>>> > >>>>>>> as i am using some git kernel, can you suggest me any other
>>> methos.
>>> > >>>>>>>  can you help me out
>>> > >>>>>>> Sayiram K N
>>> >
>>> > >>>>>>> On Fri, Feb 13, 2009 at 1:14 AM, Rizvan S <
>>> > >>>>>>> porting.begin...@gmail.com> wrote:
>>> >
>>> > >>>>>>>> On your host machine, format usb stick with ext2 and flash
>>> image.
>>> > >>>>>>>> If you are using source then you will have system.image and
>>> > >>>>>>>> userdata.image in
>>> > >>>>>>>> 'android-source/out/target/product/generic' after successful
>>> build.
>>> > >>>>>>>> There is also ramdisk.img in case you want to use.
>>> >
>>> > >>>>>>>> First check whether your target kernel has driver for usb
>>> stick and
>>> > >>>>>>>> you can access stick ( after
>>> > >>>>>>>> mount using respective device node ) on target.  If this
>>> >
>>> > ...
>>> >
>>> > read more »
>>>
>>>
>>
>> --
>> Thanks
>> Rizavan
>>
>>
>>
>>
>> >>
>>


-- 
Thanks
Rizavan

--~--~---------~--~----~------------~-------~--~----~
unsubscribe: android-porting+unsubscr...@googlegroups.com
website: http://groups.google.com/group/android-porting
-~----------~----~----~----~------~----~------~--~---

Reply via email to