This is like my 3rd thread nobody has payed attention to lol.
The Microbes wallpaper is my favorite live wallpaper out there. It runs great on my Motorola Bravo, and I'm wondering why I can't get it running on my Atrix. The only thing I can think of is the screen resolution is off. The Bravo has a screen resolution 800x480, so does the Nexus S. Where as the Atrix has a screen resolution of 540x960 so it doesn't load right...it doesn't load at all.
Is there a way I can edit the apk file to make it work with all screen sizes? I have already looked inside of it and I can't find anything I could edit. Does anyone have any suggestions?
Oh, and the Microbes.apk is attached below.
this was the first thing i got:
Code:
05-29 05:20:30.899 9347 9354 E AndroidRuntime: Caused by: java.lang.UnsatisfiedLinkError: Library microbes_jni not found
i don't see any true errors, but maybe it'll mean more to someone else:
Code:
05-29 05:35:55.580 3349 3666 D dalvikvm: GC_FOR_MALLOC freed 8354 objects / 421832 bytes in 92ms
05-29 05:35:55.949 2266 2266 D dalvikvm: GC_EXPLICIT freed 5302 objects / 308744 bytes in 62ms
05-29 05:35:56.410 1512 3473 I ActivityManager: Start proc com.android.livewallpaper.microbesgl for service com.android.livewallpaper.microbesgl/.MicrobesWallpaper: pid=3781 uid=10146 gids={}
05-29 05:35:56.479 2102 2102 D Launcher: -- loadPreferences()
05-29 05:35:56.629 3781 3789 D libEGL : loaded /system/lib/egl/libGLES_android.so
05-29 05:35:56.629 3781 3789 D libEGL : loaded /system/lib/egl/libEGL_tegra.so
05-29 05:35:56.649 3781 3789 D libEGL : loaded /system/lib/egl/libGLESv1_CM_tegra.so
05-29 05:35:56.679 3781 3789 D libEGL : loaded /system/lib/egl/libGLESv2_tegra.so
05-29 05:35:56.709 3781 3789 D dalvikvm: Trying to load lib /data/data/com.android.livewallpaper.microbesgl/lib/libmicrobes_jni.so 0x4f48d138
05-29 05:35:56.709 3781 3789 D dalvikvm: Added shared lib /data/data/com.android.livewallpaper.microbesgl/lib/libmicrobes_jni.so 0x4f48d138
05-29 05:35:56.709 3781 3789 D dalvikvm: No JNI_OnLoad found in /data/data/com.android.livewallpaper.microbesgl/lib/libmicrobes_jni.so 0x4f48d138, skipping init
05-29 05:35:56.869 3790 3790 I DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
05-29 05:35:56.869 3790 3790 I DEBUG : Build fingerprint: 'MOTO/olyatt/olympus/olympus:2.2.2/OLYFR_U4_1.8.3/1301957996:user/ota-rel-keys,release-keys'
05-29 05:35:56.869 3790 3790 I DEBUG : pid: 3781, tid: 3789 >>> com.android.livewallpaper.microbesgl <<<
05-29 05:35:56.869 3790 3790 I DEBUG : signal 4 (SIGILL), fault addr 82201888
05-29 05:35:56.869 3790 3790 I DEBUG : r0 3e2624a2 r1 415f9650 r2 415f9650 r3 49490f80
05-29 05:35:56.869 3790 3790 I DEBUG : r4 002b97b8 r5 002b97b8 r6 4f498ef8 r7 46529f30
05-29 05:35:56.869 3790 3790 I DEBUG : r8 002bd4a8 r9 8220413c 10 46529f14 fp 0014d348
05-29 05:35:56.869 3790 3790 I DEBUG : ip afb160a8 sp 55d18ad0 lr afb0d67c pc 82201888 cpsr 60000030
05-29 05:35:56.869 3790 3790 I DEBUG : d0 bfc4dc2fc0000000 d1 3ec6cd878c3b46a7
05-29 05:35:56.869 3790 3790 I DEBUG : d2 3f471d31a4ef2332 d3 3f71ba92ba44e6ae
05-29 05:35:56.869 3790 3790 I DEBUG : d4 bfc54e14b7da9475 d5 bf29fe8dba763f84
05-29 05:35:56.869 3790 3790 I DEBUG : d6 3ec99c8c17d75cd4 d7 3fc4c4943e2624a2
05-29 05:35:56.869 3790 3790 I DEBUG : d8 3dcccccd415f9650 d9 c0862b9a00000000
05-29 05:35:56.869 3790 3790 I DEBUG : d10 000000003dbe204c d11 0000000000000000
05-29 05:35:56.869 3790 3790 I DEBUG : d12 0000000000000000 d13 0000000000000000
05-29 05:35:56.869 3790 3790 I DEBUG : d14 0000000000000000 d15 0000000000000000
05-29 05:35:56.869 3790 3790 I DEBUG : scr 80000012
05-29 05:35:56.869 3790 3790 I DEBUG :
05-29 05:35:56.919 3790 3790 I DEBUG : #00 pc 00001888 /data/data/com.android.livewallpaper.microbesgl/lib/libmicrobes_jni.so
05-29 05:35:56.919 3790 3790 I DEBUG : #01 pc 0000d678 /system/lib/libm.so
05-29 05:35:56.919 3790 3790 I DEBUG :
05-29 05:35:56.919 3790 3790 I DEBUG : code around pc:
05-29 05:35:56.919 3790 3790 I DEBUG : 82201868 0a90ee11 9a40eeb0 ebf0f7ff 1a23ed9f
05-29 05:35:56.919 3790 3790 I DEBUG : 82201878 8a81ee08 0a10ee0a 0a10ee18 ebe6f7ff
05-29 05:35:56.919 3790 3790 I DEBUG : 82201888 0b17eddf aacaeeb7 8a02ed94 8ac8eeb7
05-29 05:35:56.919 3790 3790 I DEBUG : 82201898 0a90ee00 1ae0eef7 0ba0ee61 1b12eddf
05-29 05:35:56.919 3790 3790 I DEBUG : 822018a8 0b21ee4a 0b20ee78 8be0eeb7 0a10ee18
05-29 05:35:56.919 3790 3790 I DEBUG :
05-29 05:35:56.919 3790 3790 I DEBUG : code around lr:
05-29 05:35:56.919 3790 3790 I DEBUG : afb0d66c ce377ae7 caffffb3 e1a0100d ebfff5d8
05-29 05:35:56.919 3790 3790 I DEBUG : afb0d67c e2000003 e3500001 0a000032 e3500002
05-29 05:35:56.919 3790 3790 I DEBUG : afb0d68c 0a000028 e3500000 1a00001e ed9d4a00
05-29 05:35:56.919 3790 3790 I DEBUG : afb0d69c ed9d6a01 eeb74ac4 ed9f5b33 eeb76ac6
05-29 05:35:56.919 3790 3790 I DEBUG :
05-29 05:35:56.919 3790 3790 I DEBUG : stack:
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18a90 00000000
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18a94 5b2f7571
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18a98 00000000
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18a9c 00000000
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18aa0 00000000
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18aa4 00000000
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18aa8 80ca1400 /system/lib/libdvm.so
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18aac 4652106d /data/dalvik-cache/[email protected]@[email protected]
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18ab0 46521290 /data/dalvik-cache/[email protected]@[email protected]
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18ab4 002b97b8 [heap]
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18ab8 002b97b8 [heap]
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18abc afb0d67c /system/lib/libm.so
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18ac0 be26e17e
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18ac4 31cd3513
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18ac8 df002777
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18acc e3a070ad
05-29 05:35:56.919 3790 3790 I DEBUG : #01 55d18ad0 3dcccccd
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18ad4 c60ca000
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18ad8 00000000
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18adc 00000000
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18ae0 00000000
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18ae4 00000000
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18ae8 002b97b8 [heap]
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18aec 82201f31 /data/data/com.android.livewallpaper.microbesgl/lib/libmicrobes_jni.so
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18af0 002c3af8 [heap]
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18af4 0000a000 [heap]
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18af8 80c17040 /system/lib/libdvm.so
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18afc 0014d348 [heap]
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18b00 46529f14
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18b04 00000000
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18b08 00000000
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18b0c 00000000
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18b10 00000000
05-29 05:35:56.919 3790 3790 I DEBUG : 55d18b14 55d18b60
05-29 05:35:57.969 1381 1381 D Zygote : Process 3781 terminated by signal (4)
05-29 05:35:58.069 1512 1540 D dalvikvm: GC_FOR_MALLOC freed 41097 objects / 1958764 bytes in 106ms
05-29 05:35:58.069 1512 3538 I WindowManager: WIN DEATH: Window{4fab84f0 com.android.livewallpaper.microbesgl.MicrobesWallpaper paused=false}
05-29 05:35:58.069 1512 3473 I ActivityManager: Process com.android.livewallpaper.microbesgl (pid 3781) has died.
05-29 05:35:58.069 1512 3473 W ActivityManager: Scheduling restart of crashed service com.android.livewallpaper.microbesgl/.MicrobesWallpaper in 5000ms
05-29 05:35:58.069 1512 3537 I WindowManager: WIN DEATH: Window{4fa50460 com.android.livewallpaper.microbesgl.MicrobesWallpaper paused=false}
05-29 05:35:58.069 1512 1526 W WallpaperService: Wallpaper service gone: ComponentInfo{com.android.livewallpaper.microbesgl/com.android.livewallpaper.microbesgl.MicrobesWallpaper}
05-29 05:35:58.069 1512 1526 W WallpaperService: Reverting to built-in wallpaper!
i don't think the "No JNI_OnLoad found" means much b/c i don't think it's necessary
Yea I found that too when I logged too. I couldn't make anything of it lol.
This tread is going under like all the rest I made. Come on now... someone please give some ideas!
itsonlym3 said:
this was the first thing i got:
Code:
05-29 05:20:30.899 9347 9354 E AndroidRuntime: Caused by: java.lang.UnsatisfiedLinkError: Library microbes_jni not found
Click to expand...
Click to collapse
That to me would mean that the Library is missing in turn meaning that there is more then just the APK that is needed, there must have been a folder with other files that was stored on internal memory with the needed files, my guess would be some sort of settings files?, but this is all purely speculation.
EDIT: I don't know how this would be of any use, but the "UnsatisfiedLinkError" normally means the called file is not in the CLASSPATH variable "atleast in windows".
Exthero said:
That to me would mean that the Library is missing in turn meaning that there is more then just the APK that is needed, there must have been a folder with other files that was stored on internal memory with the needed files, my guess would be some sort of settings files?, but this is all purely speculation.
EDIT: I don't know how this would be of any use, but the "UnsatisfiedLinkError" normally means the called file is not in the CLASSPATH variable "atleast in windows".
Click to expand...
Click to collapse
Hmm, no, I made sure there was no other variables when I tested it on my Bravo
Sent from my MB860 using XDA App
I installed the apk is why I didn't get the error anymore.
Sent from my MB860 using XDA Premium App
Every video i tried to play with youtube app or in browser - I got error:
"There was a problem while playing. Touch to retry."
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Electrify locked. I have tried 2.3.5 Hybrid v20 and CyanogenMod7.2 with latest gapps (google services v10.0.84) & youtube (v5.5.30) for gingerbread.
I have tried to add these lines to /system/build.prop:
Code:
sprint.mm.http.proxy=0.0.0.0
sprint.mm.http.port=0
sprint.mm.rtsp.proxy=0.0.0.0
sprint.mm.rtsp.port=0
But nothing helps.
It's strange, but youtube video streaming to my chromecast works fine but playing videos on device is not.
Here is logcat log, when I press video "Play" button in browser:
Code:
# browser video
$ logcat
--------- beginning of /dev/log/main
04-29 22:23:48.905 4925 4925 D MediaCmdReceiver: Connected to server
04-29 22:23:48.905 1612 1652 D MediaCmdSender: New connection, conns list size2
04-29 22:23:48.915 4925 4925 D MediaPlayer: Couldn't open file on client side, trying server side
04-29 22:23:48.915 1450 1450 E OMXPlayer: Creating new NVOMXPlayer: 0x3fa20
04-29 22:23:48.915 1450 1450 E OMXPlayer: onFirstRef ++
04-29 22:23:48.915 1450 1450 E OMXPlayer: onFirstRef --
04-29 22:23:48.915 1450 1450 E OMXPlayer: setdatasource ++
04-29 22:23:48.915 1450 1450 E OMXPlayer: 0x3fa20 setDataSource url=http://r2---sn-huncxa5g0n-hn9e.googlevideo.com/videoplayback?mn=sn-huncxa5g0n-hn9e%2Csn-4g5edn7z&mm=31%2C29&id=o-AGDjQxTFh1Nii6-Nr1hsNdlK8MQKko8jvk_pYSBABPob&ip=46.216.45.198&pl=18&mv=m&mt=1525040203&ms=au%2Crdu&ei=pETmWtjeJ5CKgAedzbfYDw&c=MWEB&ipbits=0&initcwndbps=640000&sparams=clen%2Cdur%2Cei%2Cgir%2Cid%2Cinitcwndbps%2Cip%2Cipbits%2Citag%2Clmt%2Cmime%2Cmm%2Cmn%2Cms%2Cmv%2Cpcm2cms%2Cpl%2Csource%2Cexpire&pcm2cms=yes&mime=video%2F3gpp&fexp=23724337&key=yt6&clen=10242522&gir=yes&dur=373.098&source=youtube&lmt=1518889458212262&fvip=2&expire=1525061892&itag=36&signature=6F7156A94DF5042BC2AD23DEE71FD98F71F5E837.0F4B4EF966FA5224447B0839FF5ECAB224E519FE&cpn=66bgFcjh-wxBtSiY
04-29 22:23:48.915 4925 7040 D MediaCmdReceiver: Thread started
04-29 22:23:48.915 1450 1450 E OMXPlayer: render thread(7041) started: 0x3fa20
04-29 22:23:48.915 1450 7041 E OMXPlayer: STATE_PREPARING - signal wait 0x3fa20
04-29 22:23:48.915 1450 1678 E OMXPlayer: prepareAsync: 0x3fa20
04-29 22:23:48.915 1450 7041 E OMXPlayer: STATE_PREPARING - signal rx'd 0x3fa20
04-29 22:23:48.915 1450 7041 E OMXPlayer: prepare 0x3fa20
04-29 22:23:48.925 1450 7041 E OMXPlayer: 0x3fa20 Creating player for: http://r2---sn-huncxa5g0n-hn9e.googlevideo.com/videoplayback?mn=sn-huncxa5g0n-hn9e%2Csn-4g5edn7z&mm=31%2C29&id=o-AGDjQxTFh1Nii6-Nr1hsNdlK8MQKko8jvk_pYSBABPob&ip=46.216.45.198&pl=18&mv=m&mt=1525040203&ms=au%2Crdu&ei=pETmWtjeJ5CKgAedzbfYDw&c=MWEB&ipbits=0&initcwndbps=640000&sparams=clen%2Cdur%2Cei%2Cgir%2Cid%2Cinitcwndbps%2Cip%2Cipbits%2Citag%2Clmt%2Cmime%2Cmm%2Cmn%2Cms%2Cmv%2Cpcm2cms%2Cpl%2Csource%2Cexpire&pcm2cms=yes&mime=video%2F3gpp&fexp=23724337&key=yt6&clen=10242522&gir=yes&dur=373.098&source=youtube&lmt=1518889458212262&fvip=2&expire=1525061892&itag=36&signature=6F7156A94DF5042BC2AD23DEE71FD98F71F5E837.0F4B4EF966FA5224447B0839FF5ECAB224E519FE&cpn=66bgFcjh-wxBtSiY
04-29 22:23:48.925 1477 1569 D : nvrm_daemon: rt_exist from client: 4
04-29 22:23:48.925 1477 1569 D : NVRM_DAEMON(698): rt_exist -1
04-29 22:23:48.925 1477 1569 D : NVRM_DAEMON(847): creating new client - requested client 4
04-29 22:23:48.925 1477 1569 D : NVRM_DAEMON(729): update client with pid: 1450, tid: 7041, rt_exist: 4
04-29 22:23:48.925 1477 1569 D : nvrm_daemon: rt_exist to client: 4
04-29 22:23:48.925 1477 1569 D : NVRM_DAEMON(1011): master_dispatch_thread() running
04-29 22:23:48.935 1441 1441 I /system/bin/nvrm_daemon: nvrm_daemon: rt_exist from client: 4
04-29 22:23:48.935 1441 1441 I /system/bin/nvrm_daemon: NVRM_DAEMON(698): rt_exist -1
04-29 22:23:48.935 1441 1441 I /system/bin/nvrm_daemon: NVRM_DAEMON(847): creating new client - requested client 4
04-29 22:23:48.935 1441 1441 I /system/bin/nvrm_daemon: NVRM_DAEMON(729): update client with pid: 1450, tid: 7041, rt_exist: 4
04-29 22:23:48.935 1441 1441 I /system/bin/nvrm_daemon: nvrm_daemon: rt_exist to client: 4
04-29 22:23:48.935 1441 1441 I /system/bin/nvrm_daemon: NVRM_DAEMON(1011): master_dispatch_thread() running
04-29 22:23:48.995 1450 7047 D : Line[467]NON Seekable Server
04-29 22:23:48.995 1450 7047 D : Network error response status code is 190
04-29 22:23:49.006 1450 7047 D : Line[467]NON Seekable Server
04-29 22:23:49.006 1450 7047 D : Network error response status code is 190
04-29 22:23:49.015 1450 7047 D : Line[467]NON Seekable Server
04-29 22:23:49.015 1450 7047 D : Network error response status code is 190
04-29 22:23:49.025 1450 7047 D : Line[467]NON Seekable Server
04-29 22:23:49.025 1450 7047 D : Network error response status code is 190
04-29 22:23:49.035 1450 7047 D : Line[467]NON Seekable Server
04-29 22:23:49.035 1450 7047 D : Network error response status code is 190
04-29 22:23:49.045 1450 7047 D : Line[467]NON Seekable Server
04-29 22:23:49.045 1450 7047 D : Network error response status code is 190
04-29 22:23:49.045 1450 7048 D : Event_BlockError from 51SuperParser : Error code - 100005
04-29 22:23:49.045 1450 7048 D : Graph_EventHandler: ERROR for READER [0x80001001]
04-29 22:23:49.055 1450 7048 D : Graph_EventHandler: ERROR for READER [0x80001001]
04-29 22:23:49.055 4925 4932 E MediaPlayer: error (1, 0)
04-29 22:23:49.055 1450 7041 E OMXPlayer: prepare 0x3fa20 exit with error
04-29 22:23:49.055 1450 7041 E OMXPlayer: Error in prepare
04-29 22:23:49.055 1450 7041 E OMXPlayer: Worker Thread Exit -
04-29 22:23:49.055 1477 7045 D : NVRM_DAEMON(504): client process closed connection
04-29 22:23:49.055 1477 7045 D : NVRM_DAEMON(759): remove_client_handle client: 4, pid: 1450, tid: 7041
04-29 22:23:49.055 1477 1569 D : NVRM_DAEMON(568): queue_reaper for 0 0
04-29 22:23:49.055 4925 4925 E MediaPlayer: Error (1,0)
04-29 22:23:49.055 4925 4925 D VideoView: Error: 1,0
04-29 22:23:49.055 1477 1569 D : NVRM_DAEMON(577): ...done
04-29 22:23:49.055 1477 1569 D : NVRM_DAEMON(1011): master_dispatch_thread() running
04-29 22:23:49.065 1441 1441 I /system/bin/nvrm_daemon: NVRM_DAEMON(504): client process closed connection
04-29 22:23:49.065 1441 1441 I /system/bin/nvrm_daemon: NVRM_DAEMON(759): remove_client_handle client: 4, pid: 1450, tid: 7041
04-29 22:23:49.065 1441 1441 I /system/bin/nvrm_daemon: NVRM_DAEMON(568): queue_reaper for 0 0
04-29 22:23:49.065 1441 1441 I /system/bin/nvrm_daemon: NVRM_DAEMON(577): ...done
04-29 22:23:49.065 1441 1441 I /system/bin/nvrm_daemon: NVRM_DAEMON(1011): master_dispatch_thread() running
04-29 22:23:49.095 1450 1450 E OMXPlayer: reset: 0x3fa20
04-29 22:23:49.095 1450 1493 E OMXPlayer: reset: 0x3fa20
04-29 22:23:49.095 1450 1493 E OMXPlayer: destructor: 0x3fa20
04-29 22:23:49.095 1450 1493 D : setting block activity: 1
04-29 22:23:49.095 1450 1493 D : setting block activity: 0
04-29 22:23:49.095 1450 1493 E OMXPlayer: reset done 0x3fa20
04-29 22:23:49.095 1450 1493 E OMXPlayer: destructor: 0x3fa20 done
04-29 22:23:49.095 4925 4925 D MediaCmdReceiver: close
04-29 22:23:49.095 1612 7042 D MediaCmdSenderTh: Receive :bye
04-29 22:23:49.095 1612 7042 D MediaCmdSenderTh: shutdown
04-29 22:23:49.095 1612 7042 D MediaCmdSender: Close connection, conns list size2"
Also, other screenshots and logs are in attachments.
Any help is welcomed.
Firefox plays videos, but I get a pink tint over the video that makes it unwatchable. Audio works fine, though.
Hello,
I just have a question, my Xperia 1 was unlocked and rooted (magisk) on Android 10.
Yesterday, I decided to lock the bootloader, everything was erased from the phone after that. The new Android installation was buggy so I tried to restore the phone using Xperia Companion.
After the restore using Xperia Companion, Now everything is working fine and I was really surprised, my DRM keys are back, I have "L1" using the DRM info app and I can watch Netflix HD content and Amazon Prime Video HD content.
How is that possible ? I thought that by unlocking the bootloader, the DRM keys are lost forever ?
Hmmm do you have any proof?
Hello,
Yes, please see my old messages, I succesfully unlocked ans rooted the device. Now see the screenshot below.
https://ibb.co/7RH2ZdG
Check with *#*#7378423#*#*
Then service info>security
Then see if any ........XXXXX error and share the screenshot.
Thanks
Hello, thanks for your Reply.
It seems that there is No error, but I have confirmation that thé device has already be unlocked
https://imgshare.io/image/screenshot-20200412-1650532.4yP8t
By thé way, i also recieved an OTAsoftware uppgrade. So this is now working too.
titigunner01 said:
By thé way, i also recieved an OTAsoftware uppgrade. So this is now working too.
Click to expand...
Click to collapse
You can receive OTA if you have just locked the bootloader.
But the things in Screenshot looks great. It was a previous way of checking the DRM keys and I don't know if only these things verify the DRM keys in latest versions too.
Is it a matter that the phone restores the DRM under locked bootloader again in Sony or did they remove the DRMs?
But what it matters is you are using apps and things like you have the DRM so may be thats good.:good:
So, after you restored stock ROM, also the boot message "can't be checked for corruption" is gone?
Yes, no message when booting.
Very strange, i wanted to know if everyone else noticed thé same thing.
titigunner01 said:
Yes, no message when booting.
Very strange, i wanted to know if everyone else noticed thé same thing.
Click to expand...
Click to collapse
Eventually I will try on my Xperia 10 II. Hope I have the same luck, thanks!
titigunner01 said:
Hello,
I just have a question, my Xperia 1 was unlocked and rooted (magisk) on Android 10.
Yesterday, I decided to lock the bootloader, everything was erased from the phone after that. The new Android installation was buggy so I tried to restore the phone using Xperia Companion.
After the restore using Xperia Companion, Now everything is working fine and I was really surprised, my DRM keys are back, I have "L1" using the DRM info app and I can watch Netflix HD content and Amazon Prime Video HD content.
How is that possible ? I thought that by unlocking the bootloader, the DRM keys are lost forever ?
Click to expand...
Click to collapse
did you lock the bootloader with flashtool?
I just want to do it too, but can`t I find a guide for xperia 1
No i locked the bootloader using command lines.
Maybe this will work also using Flashtool, Im not sure.
titigunner01 said:
No i locked the bootloader using command lines.
Maybe this will work also using Flashtool, Im not sure.
Click to expand...
Click to collapse
you using this commands?
fastboot oem lock
fastboot flashing lock
fastboot oem relock
fastboot reboot
if not, can you describe step by step how you did it?
I will
thankful to you!
Hello,
Yes, if I remember well, on fastboot mode, i used fastboot oem lock.
After the reboot of the phone, everything was reased. The new installation was really buggy so after that I recovered using Xperia Companion.
interesting - I am wondering if sony still uses the device key in TA 66667 unit and if it gets erased with the first unlock or not.
Deleted
Relock the bootloader, repair with xperia companion and drm keys are back.
Only on xperia 1, 5 and up !
Beware: even though it may look all keys are back, it is still questionable if some function/feature is not permanently missing.
I did some research and it seems xperia 1 bootloader ABL does erase device key, i.e. TA 66667 (0x1046b) unit, on unlock.
So in my opinion even though you can relock and everything looks normal, the device key gets never back.
The question is what (drm) functions are connected to it.
Here more details:
Just extracted abl from J9110_10_55.1.A.0.748_PLUSPL, posted it here:
xperia-1-J9110-55.1.A.0.748-LA2_0_Q_114-ABL-LinuxLoader.zip
Just observing the strings in it, I am not trusting SONY at all with the re-lock of xperia-1:
Code:
$ strings -a LA2_0_Q_114-ABL-LinuxLoader.pe | grep -i 'device key\|[ _]dk'
Size of device key is too large (%d > %d)
Device key is not set, setting to zero
get_dk returned err=%d
Unable to delete dk
get_hwconf_dk returned err=%d
Device Key MiscTA unit size is zero
Failed to allocate memory for Device Key
Device keys not of equal length!
hwconf_x_parser_get_hwc_dk returned err=%d
Device Key length in HWConfig is zero
Failed to get size of TA_DK_NUMBER_UNIT
Failed to delete DK
This looks very similar to stuff implemented in xz1c ABL related to unlock and TA unit 66667 (0x1046b) containing the device key erased with bootloader unlock!
You may also observe if the message "Device key is not set, setting to zero" is present in bootloader log that is stored in 0x802 TA unit (and few other following units containing older boots).
It would be interesting to test TA backup, unlock, relock, TA restore, so that device key would be back.
This tells everything:
From i d a can't see 1046b but see the same function at the bottom (ghidra output)
Code:
void sub_4DDE4()
{
int v0; // w0
__int64 v1; // x3
__int64 v2; // x4
__int64 v3; // x5
__int64 v4; // x6
__int64 v5; // x7
__int64 v6; // x0
__int64 v7; // x1
const char *v8; // x0
__int64 v9; // x2
__int64 v10; // x0
char v11; // zf
int v12; // w0
__int64 v13; // x0
__int64 v14; // x0
unsigned int v15; // w1
__int64 v16; // x2
__int64 v17; // x3
_DWORD *v18; // x4
__int64 v19; // x5
__int64 v20; // x6
__int64 v21; // x7
signed int v22; // [xsp+4h] [xbp-2Ch]
sub_440B4();
if ( v0 )
{
sub_4DF70();
v7 = v6;
v8 = "[ERROR @ %s:%d]:\nFailed to get size of TA_DK_NUMBER_UNIT\n";
v9 = 303i64;
}
else
{
if ( v22 < 1 )
goto LABEL_4;
sub_44318();
if ( !v12 )
goto LABEL_4;
sub_4DF70();
v7 = v13;
v8 = "[ERROR @ %s:%d]:\nFailed to delete DK\n";
v9 = 310i64;
}
sub_589A0(v8, v7, v9, v1, v2, v3, v4, v5);
LABEL_4:
sub_4DF5C();
if ( !v11 )
{
sub_14468(v10);
sub_4DE94(v14, v15, v16, v17, v18, v19, v20, v21);
}
}
Code:
sub_4110C();
[B][COLOR="Red"]sub_4DDE4();[/COLOR][/B]
if ( v0 )
{
sub_41100();
sub_589A0("[ERROR @ %s:%d]:\nUnable to delete dk\n", v1, 1438i64, v2, v3, v4, v5, v6);
goto LABEL_10;
}
sub_3ED48();
if ( !v7 )
{
sub_41100();
sub_589A0("[ERROR @ %s:%d]:\nFailed to delete user sensitive partitions\n", v18, 1443i64, v19, v20, v21, v22, v23);
goto LABEL_10;
}
sub_3EE20();
if ( v8 )
{
sub_41100();
v15 = v14;
v16 = "[ERROR @ %s:%d]:\nFailed to reset rollback counters, error:%d\n";
v17 = 1451i64;
}
else
{
sub_3EDF0();
if ( !v24 )
goto LABEL_10;
sub_41100();
v15 = v25;
v16 = "[ERROR @ %s:%d]:\n[B][COLOR="Red"]Failed to lock the bootloader: [/COLOR][/B]%d\n";
v17 = 1457i64;
}
ghidra
Code:
ulonglong FUN_0005dde4(void)
{
bool in_ZR;
undefined uVar1;
ulonglong uVar2;
undefined8 extraout_x0;
undefined8 local_28;
undefined8 extraout_x0_00;
undefined8 uVar3;
undefined *puVar4;
undefined uVar5;
undefined8 in_x3;
undefined7 uVar6;
undefined uVar7;
undefined8 in_x4;
undefined7 uVar8;
undefined uVar9;
undefined8 in_x5;
undefined7 uVar10;
undefined uVar11;
undefined8 in_x6;
undefined7 uVar12;
undefined uVar13;
undefined8 in_x7;
undefined7 uVar14;
ulonglong uVar15;
undefined in_stack_ffffffffffffffd0;
undefined uVar16;
int local_2c;
uVar14 = (undefined7)((ulonglong)in_x7 >> 8);
uVar13 = (undefined)in_x7;
uVar12 = (undefined7)((ulonglong)in_x6 >> 8);
uVar11 = (undefined)in_x6;
uVar10 = (undefined7)((ulonglong)in_x5 >> 8);
uVar9 = (undefined)in_x5;
uVar8 = (undefined7)((ulonglong)in_x4 >> 8);
uVar7 = (undefined)in_x4;
uVar6 = (undefined7)((ulonglong)in_x3 >> 8);
uVar5 = (undefined)in_x3;
puVar4 = &stack0xffffffffffffffd4;
uVar3 = 0x1046b;
local_28 = DAT_000a90c0;
uVar2 = FUN_000540b4(2);
uVar16 = (undefined)local_2c;
uVar1 = (undefined)uVar2;
if ((int)uVar2 == 0) {
in_ZR = local_2c == 1;
if (local_2c < 1) {
uVar15 = 0;
goto LAB_0005de34;
}
[COLOR="Blue"][B] uVar3 = 0x1046b; // drm key unit[/B][/COLOR]
[COLOR="Red"] uVar2 = FUN_00054318(2); // partition 2
uVar1 = (undefined)uVar2;
uVar15 = uVar2 & 0xffffffff;
if ((int)uVar2 == 0) goto LAB_0005de34;
FUN_0005df70(uVar2,uVar3,puVar4,CONCAT71(uVar6,uVar5),CONCAT71(uVar8,uVar7),
CONCAT71(uVar10,uVar9),CONCAT71(uVar12,uVar11),CONCAT71(uVar14,uVar13));
_uVar1 = "[ERROR @ %s:%d]:\nFailed to delete DK\n";[/COLOR]
puVar4 = (undefined *)0x136;
uVar3 = extraout_x0_00;
}
else {
uVar15 = uVar2 & 0xffffffff;
FUN_0005df70(uVar2,uVar3,puVar4,CONCAT71(uVar6,uVar5),CONCAT71(uVar8,uVar7),
CONCAT71(uVar10,uVar9),CONCAT71(uVar12,uVar11),CONCAT71(uVar14,uVar13));
_uVar1 = "[ERROR @ %s:%d]:\nFailed to get size of TA_DK_NUMBER_UNIT\n";
puVar4 = (undefined *)0x12f;
uVar3 = extraout_x0;
}
uVar1 = FUN_000689a0(_uVar1,uVar3,puVar4,CONCAT71(uVar6,uVar5),CONCAT71(uVar8,uVar7),
CONCAT71(uVar10,uVar9),CONCAT71(uVar12,uVar11),CONCAT71(uVar14,uVar13));
LAB_0005de34:
local_28 = FUN_0005df5c(uVar1,(char)uVar3,(char)puVar4,uVar5,uVar7,uVar9,uVar11,uVar13,
in_stack_ffffffffffffffd0,uVar16,local_28);
if (in_ZR) {
return uVar15;
}
// WARNING: Subroutine does not return
FUN_00024468(local_28,uVar3,puVar4,CONCAT71(uVar6,uVar5),CONCAT71(uVar8,uVar7),
CONCAT71(uVar10,uVar9),CONCAT71(uVar12,uVar11),CONCAT71(uVar14,uVar13));
}
Its very evidently that function sub_4DDE4 is called at the start of lock function, I can tell that drm key is bye bye after you unlock phone, curently I'm unable to figure out what is done with oem lock command & why widevine keys is back but definitelly drm key is lost forever, indication for that is message inside service menu "is even unlocked = yes" !
So how lock is done, in short:
1. drm key bye bye
2. user sensitive partitions deleted (thats why device no more boot & must use sony pc companion in order to repair)
3. rollback counter reset
4. bootloader locked
Some good news for bootloader unlocked xperia 10 owners! I'm managed to get all back after patching secd
Code:
07-25 17:10:29.745 8470 8471 I [email protected]: start init_thread
07-25 17:10:29.745 8470 8471 I [email protected]: listeners registered
07-25 17:10:29.745 8470 8471 D QSEECOMAPI: QSEECom_get_handle sb_length = 0x200
07-25 17:10:29.746 8470 8471 D QSEECOMAPI: App is already loaded QSEE and app id = 131074
07-25 17:10:29.746 579 579 I SELinux : avc: received setenforce notice (enforcing=0)
07-25 17:10:29.747 579 579 W hwservicemanager: Detected instance of [email protected]::IDeviceSecurity (pid: 8470) registering over instance of or with base of [email protected]::IDeviceSecurity (pid: 879).
07-25 17:10:29.751 8470 8471 D QSEECOMAPI: QSEECom_dealloc_memory
07-25 17:10:29.751 8470 8471 D QSEECOMAPI: QSEECom_shutdown_app, app_id = 131074
07-25 17:10:29.752 8470 8471 I libdevice_security_static: get_rooting_status.cpp:80 rooting_status 0
07-25 17:10:29.752 8470 8471 I [email protected]: the bootloader is OK, try to init suntory
07-25 17:10:29.752 8470 8471 I libsuntory_static: utils_blob.cpp:462 process miscTA unit 2022
07-25 17:10:29.754 8470 8471 I libsuntory_static: utils_blob.cpp:497 found blob CKB
07-25 17:10:29.754 8470 8471 I libsuntory_static: utils_blob.cpp:521 match found at index 0
07-25 17:10:29.755 8470 8471 D QSEECOMAPI: QSEECom_get_handle sb_length = 0x4100
07-25 17:10:29.755 8470 8471 D QSEECOMAPI: App is not loaded in QSEE
07-25 17:10:29.755 8470 8471 D QSEECOMAPI: app_arch = 2, total_files = 9
07-25 17:10:29.788 8470 8471 D QSEECOMAPI: Loaded image: APP id = 1179652
07-25 17:10:29.789 8470 8471 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xc00
07-25 17:10:29.789 8470 8471 D QSEECOMAPI: App is already loaded QSEE and app id = 131074
07-25 17:10:29.793 8470 8471 D QSEECOMAPI: QSEECom_dealloc_memory
07-25 17:10:29.793 8470 8471 D QSEECOMAPI: QSEECom_shutdown_app, app_id = 131074
07-25 17:10:29.798 8470 8471 D QSEECOMAPI: QSEECom_dealloc_memory
07-25 17:10:29.798 8470 8471 D QSEECOMAPI: QSEECom_shutdown_app, app_id = 1179652
07-25 17:10:29.798 8470 8471 I libsuntory_static: utils_blob.cpp:121 blob verisfication status: Blob OK
07-25 17:10:29.798 8470 8471 I libsuntory_static: utils_blob.cpp:462 process miscTA unit 2023
07-25 17:10:29.801 8470 8471 I libsuntory_static: utils_blob.cpp:497 found blob WIDEVINE
07-25 17:10:29.801 8470 8471 I libsuntory_static: utils_blob.cpp:521 match found at index 1
07-25 17:10:29.801 8470 8471 D QSEECOMAPI: QSEECom_get_handle sb_length = 0x4100
07-25 17:10:29.801 8470 8471 D QSEECOMAPI: App is not loaded in QSEE
07-25 17:10:29.801 8470 8471 D QSEECOMAPI: app_arch = 2, total_files = 9
07-25 17:10:29.835 8470 8471 D QSEECOMAPI: Loaded image: APP id = 1245188
07-25 17:10:29.835 8470 8471 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xc00
07-25 17:10:29.835 8470 8471 D QSEECOMAPI: App is already loaded QSEE and app id = 131074
07-25 17:10:29.838 8470 8471 D QSEECOMAPI: QSEECom_dealloc_memory
07-25 17:10:29.838 8470 8471 D QSEECOMAPI: QSEECom_shutdown_app, app_id = 131074
07-25 17:10:29.843 8470 8471 D QSEECOMAPI: QSEECom_dealloc_memory
07-25 17:10:29.843 8470 8471 D QSEECOMAPI: QSEECom_shutdown_app, app_id = 1245188
07-25 17:10:29.844 8470 8471 I libsuntory_static: utils_blob.cpp:121 blob verisfication status: Blob OK
07-25 17:10:29.844 8470 8471 I libsuntory_static: utils_blob.cpp:462 process miscTA unit 2024
07-25 17:10:29.846 8470 8471 E libsuntory_static: utils_blob.cpp:477 invalid blob size 1
07-25 17:10:29.846 8470 8471 I libsuntory_static: utils_blob.cpp:462 process miscTA unit 2025
07-25 17:10:29.848 8470 8471 E libsuntory_static: utils_blob.cpp:477 invalid blob size 0
07-25 17:10:29.848 8470 8471 I libsuntory_static: utils_blob.cpp:462 process miscTA unit 2026
07-25 17:10:29.849 8470 8471 E libsuntory_static: utils_blob.cpp:477 invalid blob size 0
07-25 17:10:29.849 8470 8471 I libsuntory_static: utils_blob.cpp:462 process miscTA unit 2027
07-25 17:10:29.850 8470 8471 E libsuntory_static: utils_blob.cpp:477 invalid blob size 0
07-25 17:10:29.850 8470 8471 I libsuntory_static: utils_blob.cpp:462 process miscTA unit 2028
07-25 17:10:29.851 8470 8471 E libsuntory_static: utils_blob.cpp:477 invalid blob size 0
07-25 17:10:29.851 8470 8471 I libsuntory_static: utils_blob.cpp:462 process miscTA unit 2029
07-25 17:10:29.852 8470 8471 E libsuntory_static: utils_blob.cpp:477 invalid blob size 0
07-25 17:10:29.852 8470 8471 I libsuntory_static: utils_blob.cpp:462 process miscTA unit 2030
07-25 17:10:29.853 8470 8471 E libsuntory_static: utils_blob.cpp:477 invalid blob size 0
07-25 17:10:29.853 8470 8471 I libsuntory_static: utils_blob.cpp:462 process miscTA unit 2031
07-25 17:10:29.855 8470 8471 E libsuntory_static: utils_blob.cpp:477 invalid blob size 0
07-25 17:10:29.855 8470 8471 I libsuntory_static: utils_blob.cpp:462 process miscTA unit 2032
07-25 17:10:29.856 8470 8471 E libsuntory_static: utils_blob.cpp:477 invalid blob size 0
07-25 17:10:29.856 8470 8471 I libsuntory_static: utils_blob.cpp:462 process miscTA unit 2033
07-25 17:10:29.857 8470 8471 E libsuntory_static: utils_blob.cpp:477 invalid blob size 0
07-25 17:10:29.857 8470 8471 I libsuntory_static: utils_blob.cpp:462 process miscTA unit 2034
07-25 17:10:29.858 8470 8471 E libsuntory_static: utils_blob.cpp:477 invalid blob size 0
07-25 17:10:29.858 8470 8471 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xa000
07-25 17:10:29.858 8470 8471 D QSEECOMAPI: App is already loaded QSEE and app id = 65537
07-25 17:10:29.862 8470 8471 E KeymasterUtils: TA API Major Version: 4
07-25 17:10:29.862 8470 8471 E KeymasterUtils: TA API Minor Version: 0
07-25 17:10:29.862 8470 8471 E KeymasterUtils: TA Major Version: 4
07-25 17:10:29.862 8470 8471 E KeymasterUtils: TA Minor Version: 162
07-25 17:10:29.866 622 628 D DrmLibTime: got the req here! ret=0
07-25 17:10:29.866 622 628 D DrmLibTime: command id, time_cmd_id = 770
07-25 17:10:29.866 622 628 D DrmLibTime: time_getutcsec starts!
07-25 17:10:29.866 622 628 D DrmLibTime: QSEE Time Listener: time_getutcsec
07-25 17:10:29.866 622 628 D DrmLibTime: QSEE Time Listener: get_utc_seconds
07-25 17:10:29.866 622 628 D DrmLibTime: QSEE Time Listener: time_get_modem_time
07-25 17:10:29.866 622 628 D DrmLibTime: QSEE Time Listener: Checking if ATS_MODEM is set or not.
07-25 17:10:29.866 622 628 D QC-time-services: Lib:time_genoff_operation: pargs->base = 13
07-25 17:10:29.866 622 628 D QC-time-services: Lib:time_genoff_operation: pargs->operation = 2
07-25 17:10:29.866 622 628 D QC-time-services: Lib:time_genoff_operation: pargs->ts_val = 0
07-25 17:10:29.866 622 628 D QC-time-services: Lib:time_genoff_operation: Send to server passed!!
07-25 17:10:29.866 792 800 D QC-time-services: Daemon: Connection accepted:time_genoff
07-25 17:10:29.867 792 8472 D QC-time-services: Daemon:Received base = 13, unit = 1, operation = 2,value = 0
07-25 17:10:29.867 792 8472 D QC-time-services: Daemon:genoff_opr: Base = 13, val = 0, operation = 2
07-25 17:10:29.867 792 8472 D QC-time-services: offset is: 1 for base: 13
07-25 17:10:29.867 622 628 E QC-time-services: Receive Passed == base = 13, unit = 1, operation = 2, result = 0
07-25 17:10:29.867 622 628 D DrmLibTime: QSEE Time Listener: ATS_MODEM is set. Try to retrieve it.
07-25 17:10:29.867 792 800 E QC-time-services: Daemon: Time-services: Waiting to acceptconnection
07-25 17:10:29.867 792 800 D QC-time-services: Daemon: Connection accepted:time_genoff
07-25 17:10:29.867 792 8473 D QC-time-services: Daemon:Received base = 13, unit = 1, operation = 1,value = 0
07-25 17:10:29.868 792 8473 D QC-time-services: Daemon:genoff_opr: Base = 13, val = 0, operation = 1
07-25 17:10:29.868 792 8473 D QC-time-services: Daemon: genoff get for 13
07-25 17:10:29.868 792 8473 D QC-time-services: Daemon:Value read from QTimer mseconds = 1307648
07-25 17:10:29.868 792 8473 D QC-time-services: Daemon:Value read from RTC mseconds on boot = 48462179000
07-25 17:10:29.868 792 8473 D QC-time-services: Daemon:Value read from QTimer mseconds = 1307648
07-25 17:10:29.868 792 8473 D QC-time-services: Daemon:Value read from generic offset = 1547226365549
07-25 17:10:29.868 792 8473 D QC-time-services: Daemon:Delta read on boot mseconds = 48462155118
07-25 17:10:29.868 792 8473 D QC-time-services: Daemon:Final Time = 1595689828315
07-25 17:10:29.868 622 628 D DrmLibTime: QSEE Time Listener: Time GenOff - seconds: 1595689828
07-25 17:10:29.868 622 628 D DrmLibTime: time_getutcsec returns 0, sec = 1595689828; nsec = 0
07-25 17:10:29.868 622 628 D DrmLibTime: time_getutcsec finished!
07-25 17:10:29.868 622 628 D DrmLibTime: iotcl_continue_command finished! and return 0
07-25 17:10:29.868 622 628 D DrmLibTime: before calling ioctl to read the next time_cmd
07-25 17:10:29.868 792 800 E QC-time-services: Daemon: Time-services: Waiting to acceptconnection
07-25 17:10:29.887 8470 8471 D QSEECOMAPI: QSEECom_get_handle sb_length = 0x200
07-25 17:10:29.888 8470 8471 D QSEECOMAPI: App is already loaded QSEE and app id = 131074
07-25 17:10:29.889 8470 8471 D QSEECOMAPI: QSEECom_dealloc_memory
07-25 17:10:29.889 8470 8471 D QSEECOMAPI: QSEECom_shutdown_app, app_id = 131074
07-25 17:10:29.889 8470 8471 I libdevice_security_static: get_imei.cpp:180 imei STR munjeni edited, size 15
07-25 17:10:29.899 8470 8471 E KeyMasterHalDevice: Attest key send cmd failed
07-25 17:10:29.899 8470 8471 E KeyMasterHalDevice: ret: 0
07-25 17:10:29.899 8470 8471 E KeyMasterHalDevice: resp->status: -10003
07-25 17:10:29.906 8470 8471 D QSEECOMAPI: QSEECom_dealloc_memory
07-25 17:10:29.906 8470 8471 D QSEECOMAPI: QSEECom_shutdown_app, app_id = 65537
07-25 17:10:29.906 8470 8471 I [email protected]: key id ANDROID_ATTEST status PROVISIONED
07-25 17:10:29.907 587 587 I tad : MiscTA Unit 2021:
07-25 17:10:29.907 587 587 I tad : WRITTEN (Size 20)
07-25 17:10:29.930 587 587 I tad : Actual erase/write to flash done (count 4, time 1595689829).
07-25 17:10:29.930 587 587 I tad : MiscTA: Write of unit 2021 completed - OK
07-25 17:10:29.930 8470 8471 I [email protected]: suntory initialized
07-25 17:10:29.930 8470 8471 I [email protected]: wait for post_fs proprty
07-25 17:10:29.930 8470 8471 I [email protected]: post_fs property triggered
07-25 17:10:29.930 8470 8471 D QSEECOMAPI: QSEECom_get_handle sb_length = 0x200
07-25 17:10:29.930 8470 8471 D QSEECOMAPI: App is already loaded QSEE and app id = 131074
07-25 17:10:29.932 8470 8471 D QSEECOMAPI: QSEECom_dealloc_memory
07-25 17:10:29.932 8470 8471 D QSEECOMAPI: QSEECom_shutdown_app, app_id = 131074
07-25 17:10:29.932 8470 8471 I libdevice_security_static: get_rooting_status.cpp:80 rooting_status 2
07-25 17:10:29.935 8470 8471 D QSEECOMAPI: QSEECom_get_handle sb_length = 0x200
07-25 17:10:29.935 8470 8471 D QSEECOMAPI: App is already loaded QSEE and app id = 131074
07-25 17:10:29.936 8470 8471 D QSEECOMAPI: QSEECom_dealloc_memory
07-25 17:10:29.936 8470 8471 D QSEECOMAPI: QSEECom_shutdown_app, app_id = 131074
07-25 17:10:29.936 8470 8471 I libdevice_security_static: get_security_config.cpp:68 security configuration 1
07-25 17:10:29.936 8470 8471 D QSEECOMAPI: QSEECom_get_handle sb_length = 0x83c0
07-25 17:10:29.936 8470 8471 D QSEECOMAPI: App is not loaded in QSEE
07-25 17:10:29.936 8470 8471 D QSEECOMAPI: app_arch = 2, total_files = 9
07-25 17:10:29.973 8470 8471 D QSEECOMAPI: Loaded image: APP id = 1310724
07-25 17:10:29.974 8470 8471 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xc00
07-25 17:10:29.974 8470 8471 D QSEECOMAPI: App is already loaded QSEE and app id = 131074
07-25 17:10:29.977 8470 8471 D QSEECOMAPI: QSEECom_dealloc_memory
07-25 17:10:29.977 8470 8471 D QSEECOMAPI: QSEECom_shutdown_app, app_id = 131074
07-25 17:10:29.980 8470 8471 D QSEECOMAPI: QSEECom_dealloc_memory
07-25 17:10:29.980 8470 8471 D QSEECOMAPI: QSEECom_shutdown_app, app_id = 1310724
07-25 17:10:29.982 8470 8471 D QSEECOMAPI: QSEECom_get_handle sb_length = 0x83c0
07-25 17:10:29.982 8470 8471 D QSEECOMAPI: App is not loaded in QSEE
07-25 17:10:29.982 8470 8471 D QSEECOMAPI: app_arch = 2, total_files = 9
07-25 17:10:30.016 8470 8471 D QSEECOMAPI: Loaded image: APP id = 1376260
07-25 17:10:30.016 8470 8471 D QSEECOMAPI: QSEECom_get_handle sb_length = 0xc00
07-25 17:10:30.016 8470 8471 D QSEECOMAPI: App is already loaded QSEE and app id = 131074
07-25 17:10:30.020 8470 8471 D QSEECOMAPI: QSEECom_dealloc_memory
07-25 17:10:30.020 8470 8471 D QSEECOMAPI: QSEECom_shutdown_app, app_id = 131074
07-25 17:10:30.023 8470 8471 D QSEECOMAPI: QSEECom_dealloc_memory
07-25 17:10:30.023 8470 8471 D QSEECOMAPI: QSEECom_shutdown_app, app_id = 1376260
07-25 17:10:30.024 8470 8471 I [email protected]: credmgr initialized
07-25 17:10:30.025 8470 8471 I [email protected]: "vendor.keyprovd.suntory.prov" property set
07-25 17:10:33.798 853 853 I [email protected]: type=1400 audit(0.0:2107): avc: denied { search } for name="kgsl" dev="sysfs" ino=28936 scontext=u:r:hal_memtrack_default:s0 tcontext=u:object_r:sysfs_kgsl:s0 tclass=dir permissive=1 ppid=1 pcomm="init" pgid=1 pgcomm="init"
07-25 17:10:36.689 8372 8372 W adbd : timeout expired while flushing socket, closing
Edit:
Now all ready https://forum.xda-developers.com/xp...m-fix-drm-fix-unlocked-bootloader-53-t4138269