How To Guide [GUIDE] Pixel 6 Pro "raven": Unlock Bootloader, Update, Root, Pass SafetyNet

Search This thread

Tombay1969

Member
May 11, 2011
20
0
Hi all, I installed the Bliss 16.3 yesterday, it is rooted with Magisk. Now I have an update available in System -Updater and wanted to install it with root. I am on Magisk Uninstall-Restore Image. Then I installed the update since it hasn't restarted yet, went to Magisk and click Install on inactive slot and click Let's go in the top right and the device reboots. When it starts, it doesn't install anything and where it has restarted, there is still a new update available under System Updater Bliss 16.3 from 01/14/2023. I've tried it 3 times today but the update is always there. What am I doing wrong? somehow the update doesn't seem to grab it.
 

V0latyle

Forum Moderator
Staff member
Hi all, I installed the Bliss 16.3 yesterday, it is rooted with Magisk. Now I have an update available in System -Updater and wanted to install it with root. I am on Magisk Uninstall-Restore Image. Then I installed the update since it hasn't restarted yet, went to Magisk and click Install on inactive slot and click Let's go in the top right and the device reboots. When it starts, it doesn't install anything and where it has restarted, there is still a new update available under System Updater Bliss 16.3 from 01/14/2023. I've tried it 3 times today but the update is always there. What am I doing wrong? somehow the update doesn't seem to grab it.
This thread is for the stock firmware, we do not provide support for custom ROMs
 
  • Like
Reactions: digger16309

Nergal di Cuthah

Senior Member
Sep 20, 2013
2,019
1,078
Google Pixel 6 Pro
Right i have the safetynet fix installed but im still failing cts profile and google play store play protect certification is not certified
Do you have today's modded version of safetynetfix by displax Screenshot_20230212-142148.png
 

V0latyle

Forum Moderator
Staff member
If you're having issues with the Universal SafetyNet Fix module, please ask your questions in that thread:
 

Nergal di Cuthah

Senior Member
Sep 20, 2013
2,019
1,078
Google Pixel 6 Pro

silocybin

Member
Aug 28, 2022
41
5
If you're having issues with the Universal SafetyNet Fix module, please ask your questions in that thread:
my issue is fixed sorry about that
 

Top Liked Posts

  • 1
    ........... Make sure you're using a type A to type C cable, as C to C cables don't seem to work correctly.
    Good to know - I've always used the original C to C cable without issues. Guess it depends on the pc (my is fairly recent)
    1
    For me update on latest march update is not going to sucess with Root unfortunately :(
    Till now I was using Magisk Delta and used Pixelflasher - worked everytime like a charm.

    Now after march update I lost root and am not able to regain it. I patched boot image with Delta Magisk but when booting (live or flash), root is not present.

    When selecting Canary Build from Magisk, Pixelflasher is telling
    WARNING! Problematic Magisk Manager Version: 981ccabb:25210 is installed. Advised not to use this version.

    Anyone facing similar issues and is able to help to regain Root?

    Edit:
    There seems to be an issue between latest Magisk and March update...
    I had to downgrade from 25210 to 25206 which works now flawlessly as usual.
    I had the same exact problem, on delta and using PixelFlasher. After some trial and error I figured out how to get it back to where it was. It's actually really simple. Just uninstall any instance of the Magisk app you have installed, including any hidden magisk app you may have forgotten to unhide (uninstall them just like any other app by long pressing on the app and dragging it to the top where it says uninstall). Once you have all instances of the Magisk app uninstalled, just use PixelFlasher like you normally do. Download the March update, process and patch it, flash it and let PixelFlasher do it's thing. Thats it, you're back to where you were before you lost root except now you're on the March release. All your modules will still be there and enabled (just remember to keep data when flashing). Let me know how it goes.
    1
    I usually like to be on the latest build as well, so as soon as I see that there aren't any major issues, I upgrade (still using the OG CLI method, not PixelFlasher, though am going to look into it). It looks like there have been more problems than usual this month. Is there a link to the changelog for the March update anywhere? Thanks for the come-back.
    It really does seem like there are more issues than normal this month. The changelog is posted around here somewhere but I can't remember where I seen it. I highly recommend using PixelFlasher to update your device, it's a very well put together program that Badabing2003 created. I can't say enough good things about it, really well done. It literally takes me 224 seconds every month to update, except this month do to an error on my part. Give it a go, if you have any questions or run into any issues PM me and I'll help you out.
  • 3
    Hey all! Tryna do the Feb update by following the steps "Update and Root Factory Image" but can't!

    archive does not contain 'vendor_other.img'
    Sending sparse 'super' 1/1 (4194303 KB) FAILED (Sparse file is too large or invalid)
    fastboot: error: Command failed

    I've done this tons of times. What's wrong and what should I do?

    p.s. platform tools and all drivers are up to date.
    Are you using the correct factory image for your device? It should have "raven" in the file name.

    Also, Platform Tools 34.0.0 is known to have problems. Use 33.0.3
    3
    FYI, Platform Tools 34.0.1 still has the fastbootd problems as well so don't update to that.
    1
    Are you using the correct factory image for your device? It should have "raven" in the file name.

    Also, Platform Tools 34.0.0 is known to have problems. Use 33.0.3
    Yeah, I definitely know what I'm doing. Installing 33.0.3 has completely resolved the problem. Thank you for help, you're the MVP.
    1
    Installing the March update today via the factory image and fastboot (as I usually do) I found that patching and flashing boot.img as I usually do didn't work: it booted OK (albeit slower than usual), but no root.

    I eventually realised that this is the release-candidate issue mentioned above, now affecting regular updates (so beware!)

    After a lot of fruitless experimentation with Pixel 7 boot images etc (none of which worked), I discovered to my relief that the latest Alpha of the Magisk app does the trick fine (usual method: patch boot.img on the device and then boot from it or flash it with fastboot as normal.)

    To what release-candidate issue are you referring? I was on QPR beta, and just flashed the March (release) update on P6P. Did my usual thing, patch the boot, flash-all, flash the patched boot, got root, no issues. I'm on Magisk 25210.

    I have my own unrelated issue that I've seen in the past few months--after flash-all and flash patched boot, restart takes me to an corrupted image. To fix it, I simply re-flash again and everything works.

    Interesting but haven't seen that elsewhere (yet) and curious if this can be confirmed.

    Add me to the list of those who DID NOT have the issue @ermintrude had.
    1
    Not a release candidate at all, but the *regular* March update from Google's factory image site: it's
    raven-tq2a.230305.008.e1-factory-def2deef.zip

    What I was saying was not that I had installed a release candidate, but that I had run into the same problems with a regular update as those who *had* installed a release candidate.

    It was posted on Google's site very late: only a day or so ago.
    This is the first time I've ever run into issues updating the monthly on my P6P, Part my fault because I forgot to unhide Magisk (although I didn't think this would cause issues as it hasn't in the past) but somehow I lost root. Not all that big of a deal as I uninstalled Magisk and patched the new update and that fixed the issue but for some strange unknown reason I'm now showing Magisk Delta (which is what I installed), but I'm also showing the icon for the hidden Magisk app which I uninstalled prior to re-rooting. I'm guessing that one of the files must have been left behind. Strangely, everything is working perfectly, Passes root check and integrity, all my modules are there and working as well. Seeing everything is working as it should and I'm not having any issues I'm just going to leave it as is. I think if I try to uninstall the old Magisk app it might take a file with it that shouldn't be uninstalled and I don't feel like doing a full wipe if I don't need to. Anyone else have an issue similar to this please let me know.
  • 97
    ⚠️⚠️⚠️ WARNING! IF YOU ARE UPDATING TO ANDROID 13 FOR THE FIRST TIME, READ THIS FIRST!⚠️⚠️⚠️

    If you are looking for my guide on a different Pixel, find it here:
    Update 6-20-22: Magisk 25.1 is recommended as this includes fixes for OTA updates, as well as support for the Android 13 beta.
    Discussion thread for migration to 24.0+.

    DO NOT use any version of Magisk lower than Canary 23016 as it does not yet incorporate the necessary fixes for Android 12 and your device.


    WARNING: YOU AND YOU ALONE ARE RESPONSIBLE FOR ANYTHING THAT HAPPENS TO YOUR DEVICE. THIS GUIDE IS WRITTEN WITH THE EXPRESS ASSUMPTION THAT YOU ARE FAMILIAR WITH ADB, MAGISK, ANDROID, AND ROOT. IT IS YOUR RESPONSIBILITY TO ENSURE YOU KNOW WHAT YOU ARE DOING.

    Prerequisites:


    Android Source - Setting up a device for development


    1. Follow these instructions to enable Developer Options and USB Debugging.
    2. Enable OEM Unlocking. If this option is grayed out, unlocking the bootloader is not possible.
    3. Connect your device to your PC, and open a command window in your Platform Tools folder.
    4. Ensure ADB sees your device:
      Code:
      adb devices
      If you don't see a device, make sure USB Debugging is enabled, reconnect the USB cable, or try a different USB cable.
      If you see "unauthorized", you need to authorize the connection on your device.
      If you see the device without "unauthorized", you're good to go.
    5. Reboot to bootloader:
      Code:
      adb reboot bootloader
    6. Unlock bootloader: THIS WILL WIPE YOUR DEVICE!
      Code:
      fastboot flashing unlock
      Select Continue on the device screen.

    1. Install Magisk on your device.
    2. Download the factory zip for your build.
    3. Inside the factory zip is the update zip: "device-image-buildnumber.zip". Open this, and extract boot.img
    4. Copy boot.img to your device.
    5. Patch boot.img with Magisk: "Install" > "Select and Patch a File"
    6. Copy the patched image back to your PC. It will be named "magisk_patched-23xxx_xxxxx.img". Rename this to "master root.img" and retain it for future updates.
    7. Reboot your device to bootloader.
    8. Flash the patched image:
      Code:
      fastboot flash boot <drag and drop master root.img here>
    9. Reboot to Android. Open Magisk to confirm root - under Magisk at the top, you should see "Installed: <Magisk build number>

    1. Before you download the OTA, open Magisk, tap Uninstall, then Restore Images. If you have any Magisk modules that modify system, uninstall them now.
    2. Take the OTA update when prompted. To check for updates manually, go to Settings > System > System Update > Check for Update
    3. Allow the update to download and install. DO NOT REBOOT WHEN PROMPTED. Open Magisk, tap Install at the top, then Install to inactive slot. Magisk will then reboot your device.
    4. You should now be updated with root.

    1. Download the OTA.
    2. Reboot to recovery and sideload the OTA:
      Code:
      adb reboot sideload
      Once in recovery:
      Code:
      adb sideload ota.zip
    3. When the OTA completes, you will be in recovery mode. Select "Reboot to system now".
    4. Allow system to boot and wait for the update to complete. You must let the system do this before proceeding.
    5. Reboot to bootloader.
    6. Boot the master root image (See note 1):
      Code:
      fastboot boot <drag and drop master root.img here>
      Note: If you prefer, you can download the factory zip and manually patch the new boot image, then flash it after the update. Do not flash an older boot image after updating.
    7. Your device should boot with root. Open Magisk, tap Install, and select Direct Install.
    8. Reboot your device. You should now be updated with root.
    Note: You can use Payload Dumper to extract the contents of the OTA if you want to manually patch the new boot image. However, I will not cover that in this guide.

    Please note that the factory update process expects an updated bootloader and radio. If these are not up to date, the update will fail.
    1. Download the factory zip and extract the contents.
    2. Reboot to bootloader.
    3. Compare bootloader versions between phone screen and bootloader.img build number
      Code:
      fastboot flash bootloader <drag and drop new bootloader.img here>
      If bootloader is updated, reboot to bootloader.
    4. Compare baseband versions between phone screen and radio.img build number
      Code:
      fastboot flash radio <drag and drop radio.img here>
      If radio is updated, reboot to bootloader.
    5. Apply update:
      Code:
      fastboot update --skip-reboot image-codename-buildnumber.zip
      When the update completes, the device will be in fastbootd. Reboot to bootloader.
    6. Boot the master root image (See note 1):
      Code:
      fastboot boot <drag and drop master root.img here>
      Note: If you prefer, you can manually patch the new boot image, then flash it after the update. Do not flash an older boot image after updating.
    7. Your device should boot with root. Open Magisk, tap Install, and select Direct Install.
    8. Reboot your device. You should now be updated with root.
    Note: If you prefer, you can update using the flash-all script included in the factory zip. You will have to copy the script, bootloader image, radio image, and update zip into the Platform Tools folder; you will then have to edit the script to remove the -w option so it doesn't wipe your device.
    The scripted commands should look like this:
    Code:
    fastboot flash bootloader <bootloader image name>
    fastboot reboot bootloader
    ping -n 5 127.0.0.1 > nul
    fastboot flash radio <radio image name>
    fastboot reboot bootloader
    ping -n 5 127.0.0.1 > nul
    fastboot update  --skip-reboot <image-device-buildnumber.zip>
    Once this completes, you can reboot to bootloader and either boot your master patched image, or if you patched the new image, flash it at this time.

    PixelFlasher by @badabing2003 is an excellent tool that streamlines the update process - it even patches the boot image for you.
    The application essentially automates the ADB interface to make updating and rooting much easier. However, it is STRONGLY recommended that you still learn the "basics" of using ADB.

    For instructions, downloads, and support, please refer to the PixelFlasher thread.

    1. Follow the instructions on the Android Flash Tool to update your device. Make sure Lock Bootloader and Wipe Device are UNCHECKED.
    2. When the update completes, the device will be in fastbootd. Reboot to bootloader.
    3. Boot the master root image (See note 1):
      Code:
      fastboot boot <drag and drop master root.img here>
      Note: If you prefer, you can download the factory zip and manually patch the new boot image, then flash it after the update. Do not flash an older boot image after updating.
    4. Your device should boot with root. Open Magisk, tap Install, and select Direct Install.
    5. Reboot your device. You should now be updated with root.

    SafetyNet has been deprecated for the new Play Integrity API. More information here.

    In a nutshell, Play Integrity uses the same mechanisms as SafetyNet for the BASIC and DEVICE verdicts, but uses the Trusted Execution Environment to validate those verdicts. TEE does not function on an unlocked bootloader, so legacy SafetyNet solutions will fail.

    However, @Displax has modified the original Universal SafetyNet Fix by kdrag0n; his mod is able to bypass TEE, meaning that the device will pass BASIC and DEVICE integrity.

    Mod available here. Do not use MagiskHide Props Config with this mod.

    This is my configuration that is passing Safety Net. I will not provide instructions on how to accomplish this. Attempt at your own risk.

    Zygisk + DenyList enabled
    All subcomponents of these apps hidden under DenyList:
    • Google Play Store
    • GPay
    • Any banking/financial apps
    • Any DRM media apps
    Modules:
    • Universal SafetyNet Fix 2.3.1 Mod - XDA post
    To check SafetyNet status:
    To check Play Integrity status:
    I do not provide support for Magisk or modules. If you need help with Magisk, here is the Magisk General Support thread. For support specifically with Magisk v24+, see this thread.

    Points of note:
    • The boot image is NOT the bootloader image. Do not confuse the two - YOU are expected to know the difference. Flashing the wrong image to bootloader could brick your device.
    • While the Magisk app is used for patching the boot image, the app and the patch are separate. This is what you should see in Magisk for functioning root:
      screenshot_20211218-194517-png.5486339
    • "Installed" shows the version of patch in the boot image. If this says N/A, you do not have root access - the boot image is not patched, or you have a problem with Magisk.
    • "App" simply shows the version of the app itself.
    • If you do not have a patched master boot image, you will need to download the factory zip if you haven't already, extract the system update inside it, then patch boot.img.
    • If you prefer updating with the factory image, you can also extract and manually patch the boot image if desired.
    • Some Magisk modules, especially those that modify read only partitions like /system, may cause a boot loop after updating. As a general rule, disable these modules before updating. You are responsible for knowing what you have installed, and what modules to disable.


    Credits:
    Thanks to @ipdev , @kdrag0n , @Didgeridoohan , and last but not least, @topjohnwu for all their hard work!
    9
    Magisk Stable is now at version 24.1, so I will no longer be providing any Magisk updates.

    You can use any version of Magisk now - Stable, Beta, or Canary. as long as it is 23016 or newer.

    Once again, if you want to switch versions of Maagisk, it is HIGHLY RECOMMENDED that you "Complete Uninstall" within Magisk before installing the new version. Multiple instances of Magisk can break root.

    If you simply want to update Magisk, the best way to do so is from within the app.


    Once the February update is out, I will perform some testing with installing to inactive slot, and if it works, I will update this guide.

    Given the low activity on this thread, I will probably close it if everything goes well with the next update.

    Thank you all for your testing and contributions.
    8
    My update process is to remove vbmeta.img (in addition to removing the -w flag in the flash-all script) from the factory zip before I flash it in fastboot. Seems to have worked so far, ymmv.
    7
    Now THIS is a useful thread! Thanks 👍

    I might try to root my P6P this week-end.

    If I already took the OTA from Google, can I just go to #6? (there's no data on my phone yet, just BL unlocked)

    "6. Reflash vbmeta to disable boot verification"
    7
    Magisk Canary updated to 23019
    Changes:
    - [Zygisk] Skip loading modules into the Magisk app to prevent conflicts
    - [MagiskBoot] Change `zopfli` to a more reasonable config so it doesn't take forever
    - [General] Several `BusyBox` changes

    Preferred method of update is from within Magisk app.


    If installing for the first time, here is the APK Download