Magisk General Support / Discussion

Search This thread

J.Michael

Recognized Contributor
Jan 20, 2018
1,818
2,072
Samsung Galaxy Tab A series
my magisk is "d52ea1b0-alpha:MAGISK:R (25210)"

how do I go back to the latest stable version?

thank you.
If Magisk is working, get the APK of the version you want, change the name of the file so it ends in ".zip", and use the Magisk manager app to install it as if it were a module.
 

zgfg

Senior Member
Oct 10, 2016
8,976
6,716
Redmi K20 / Xiaomi Mi 9T
Xiaomi Mi 11 Ultra
can I flash/install the zip in twrp?
That old method is still valid if the appropriate TWRP (more generally, a custom recovery, it could be OrangeFox, SHRP, etc) exists for the particular phone and ROM

However, there are phones for whom no custom recovery was ported

Or worse, there is a custom recovery (like TWRP) but it does not support storage encryption, etc

For those reasons, and to avoid reports being wrongly addressed to Magisk: "I flashed Magisk through TWRP but it did not install properly" or similar - John does not recommend flashing Magisk through TWRP and instead he recommends the patch and flash method

---

Hence to put it simple - if you know that on your same phone, with the same TWRP and the same ROM you previously and successfully used TWRP to flash Magisk, then no reason it should not work properly again

But if you upgraded the ROM, particularly the Android version, then there is a chance that your old TWRP may not work properly anymore

Hence it depends (there is no definite answer Yes or No). You should know for your phone/ROM/TWRP or you should try
 

pndwal

Senior Member
This with @mrjuniork's leave (thanks):
Not sure who you're addressing here or accusing, but who's spreading lies? And who ever suggested John was part of any 'Alpha' group?!... No one's lying that I've seen...

And to go even farther.
Canary= bleeding edge
Beta= almost stable
Official/alpha(term not app=stable
Hence husky using Delta name because Delta would be before Canary. Backwards alphabet like most projects. Idk where you think Alpha would before Canary. Read the GitHub she was using. She was pulling from the main branch and basically re-forking it with a commit or 2 changed from Canary. More than likely small things like package name and update channel. Literally above in John's own post from over a year ago he denounced them using that name. He didn't say anything about him being in it..if he did start it, why use that name and then call them out for using that name? I mean that sounds off. It's a good story though. She is a contributor, or was or whatever she is now. She flipped on being open source with Alpha. That is fact. Shared in a Chinese only TG. I wouldn't trust it. "Confusing."
... Seems you may be responding to @zgfg's post here, but let me clarify for everyone:

Alpha has been around for a long while, and was originally vvb2060's (Nangong Xueshan's) personal fork. It was not a group effort, and still probably isn't, although vv may well oblige other LSP Devs like @canyie with experimental support for new Shamiko functions etc; after all theses Devs all contribute to that now.

'Alpha' experimental builds go back to 2018 with 'Lite' and 'MTK' builds going back at least to May 2020.

These were clearly test builds for fixes later to be merged into official Magisk with feedback/testing provided by Devs native Chinese Telegram community, and Magisk would be completely different if it hadn't been for them. However, until recent times, Alpha and other forks have gone relatively unnoticed despite their impact.

Alpha was always basically the test fork for vv's fixes, and her changes have been at the forefront of Magisk development for some years now... So many major innovations in official Magisk have been developed in vv's Alpha fork and in her lesser known Lite, MTK and other branches...

Just to mention a sampling I posted more than a year ago: MTK compatibility, single package delivery, 64bit support, sepolicy fixes, several isolated process fixes, fixes for UID, MicroG, process names, file based encryption, mount rules for Sammy, auto-close issues bot, reboot menu, multi-user and shared user id compatibility fixes, hidden apps, Chinese doc translations, offline restore app, unsupported environment checking, fix for apex path (a big one), permission fixes, module Installation fixes, Kotlin code cleanup, MagiskHide stopping fix, Renamable App / single package Magisk archive (developed in cooperation with John).... And countless more recent commits for various devices/compatibility, new functionality and major refactoring of magiskinit injection, sepolicy rules and so on...

As @zgfg mentioned, users here have been testing / discussing @vvb2060's innovations for a good while; Existing Magisk is already very much @vvb2060's, and she is now not just a contributor but an official Magisk Dev...

Far from 'pulling/changing a commit or two, likely small things like package name and update channel', Alpha has added/tested many major innovations and compatibility fixes before they were ever merged in Canary... Alpha is a prime reason John has made comments like:

I had already posted about vv's Alpha, and Lite (test branch for whitelist MagiskHide hidelist for bypassing isolated process leak detections banks had started using) Magisk forks but switched to Alpha for daily use in May 2021 simply because (with his new Android Security job) John was no longer updating official Magisk and this was a way to test fixes in the melting pot without any Canary builds available...

After posting about my Alpha use experience (I said there is "presently no better substitute for Canary builds with regular updates that I'm aware of"), several members here like @zgfg also moved to Alpha in or after August 2021. This was because John had not produced Magisk updates for many months pending the result of Google's internal review of his open-source project as a new 'big tec' employee (see https://topjohnwu.medium.com/state-of-magisk-2021-fe29fdaee458 ), but was now again making commits/fixes in Magisk channels as he, along with vvb2060 and other Devs, was developing new Zygisk Magisk hooking functionality... This was a fairly long process including replacing much MagiskHide/HideList code with the different if simpler DenyList, and still no Canary builds were forthcoming until October 24...

Alpha allowed many of us to test John's official commits (vv was largely focused on testing and contributing to John's changes at this time also) and early Zygisk / Denylist during those 3 months without the need to build personal Magisk 'snapshots' ourselves... (Of course there would also have been official CI builds available, but Alpha had the advantage of filtering out most broken test builds.) This is the period @zgfg was referring to in his post; effectively, as you put it, 'Alpha was before Canary' at least in publishing test builds publicly for some 3 months...

In October, with Zygisk in 23010, most of us moved back to official Canary for daily use/testing. 😜

Lastly, John has never 'denounced' Alpha (or vv) for using the Alpha name; he simply stated:

... It seems that vv was quite agreeable too, and that Alpha discussion group you mentioned even hosted a contest to choose a new name... In the end it seems changing the package name from Magisk to Alpha was mutually acceptable however (so it's just Alpha, not Alpha Magisk)...

Hope this little (recent) history lesson helps. 🙂 PW

Edit: Please be careful if responding to this. 😜
 
Last edited:

pndwal

Senior Member
can I flash/install the zip in twrp?
That should work for 25.2, but may not work properly going forward... Due to recent refactoring you'd only get limited Magisk from 25207, and, depending on fixes it may still not work w/ 25211...

Flashing .zip as module from Magisk App is better because this (and issues others mention above) don't exist when boot image is patched with system booted...

Of course there are other way to bypass version checking/downgrade prevention but this is the simplest method I've seen...
my magisk is "d52ea1b0-alpha:MAGISK:R (25210)"

how do I go back to the latest stable version?

thank you.
Further, when downgrading especially, it can be necessary to wipe Magisk configuration to avoid issues with changes in magisk.db or Magisk directories made for newer builds... Neglecting this may cause confusing issues...

You can simply delete /data/adb/magisk.db and contents of /data/adb/magisk (this leaves modules) after flashing the downgrade.zip (can be before rebooting) and these configuration files/directories will be rebuilt clean on reboot... 👍 PW
 
Last edited:

pndwal

Senior Member
That didnt work for me. I installed stable as module, cleared directory and magisk.db and now im at version 25200 App and 2510 magisk and though systemless Module showed Up finally, adaway refuses His Job...
Do you mean 25.1 Magisk?... So you used 25.1 package for.zip... anyway, you can simply take Direct Install from current 25.2 App to get 25.2 Magisk since you no longer need downgrade prevention bypass...

Edit: If you mean 25210 Magisk you should ensure you download and use 25.2 package (click v25.2 in Magisk GitHub main page) for .zip installation as module to downgrade Magisk (core binaries running) to last Stable release... PW
 
Last edited:

Nergal di Cuthah

Senior Member
Sep 20, 2013
2,114
1,160
Google Pixel 6 Pro
That didnt work for me. I installed stable as module, cleared directory and magisk.db and now im at version 25200 App and 2510 magisk and though systemless Module showed Up finally, adaway refuses His Job...
I believe you mean 25210 which is broken and loads no modules including systemless hosts, roll your boot back to 25209 or stable
 

Vincent_40

Senior Member
Oct 8, 2015
667
165
France
Pixel 7Pro stable march SP.
Some modules didn't work properly with Magisk stable 25.210, but work on 25.209 (V4A, Lsposed, PLE,....).
It seems last stable broke something.
 

kullurumanoj

Senior Member
Aug 10, 2014
55
22
Hyderabad
Can someone please help me in hiding the root for Yes bank app. I was able to hide the root from all the banking apps but no luck with the yes bank after recent update. I have hidden it from denylist in magisk added to hide my list, also enabled it with in lsposed app hide my list app. All the other apps are working fine except this. Is there a way to find which app is the reason for the root detection. CTS profile, playstore is certified too.

 

wugga3

Senior Member
Oct 15, 2014
140
42
Ontario
OnePlus 7T
Can someone please help me in hiding the root for Yes bank app. I was able to hide the root from all the banking apps but no luck with the yes bank after recent update. I have hidden it from denylist in magisk added to hide my list, also enabled it with in lsposed app hide my list app. All the other apps are working fine except this. Is there a way to find which app is the reason for the root detection. CTS profile, playstore is certified too.

I'm not any expert ... But... OnePlus 7T on OOS12 (latest) and official magisk stable 25.2 (not hidden) with enforce denylist with Yes bank on deny list gets me past the root detection error I got before adding into deny list in magisk.... So may be force stop Yes bank then clear data/cache... ? Worked for me to get to the registration screen without error. I don't have/use lsposed so I'm unable to assist with that matter. Clear data and retry?


EDIT: to add that my device is OEM unlocked...
And.. universal safetynet fix v2.3.2 mod 2.1 kdragOn mod by displax
Unable totake screenshots of bank app due to sensitive information on registration screen...
And I don't use Yes....
 
Last edited:
  • Like
Reactions: ipdev and J.Michael

pndwal

Senior Member
Can someone please help me in hiding the root for Yes bank app. I was able to hide the root from all the banking apps but no luck with the yes bank after recent update. I have hidden it from denylist in magisk added to hide my list, also enabled it with in lsposed app hide my list app. All the other apps are working fine except this. Is there a way to find which app is the reason for the root detection. CTS profile, playstore is certified too.

My device:
Xiaomi RN8T stock A11 MIUI
Magisk Canary 25209
Latest Shamiko public release (for proper root hiding]
[LSPosed Hide My AppList, but not needed for this app]

This app is detecting OEM unlocking when enabled in Developer options (even if enabled with developer options disabled)... With the above setup I get:
IMG_20230326_131240.jpg

With OEM unlocking disabled:
IMG_20230326_131401.jpg

... It's not detecting USB debugging or Developer Options itself...

I have disabled OEM unlocking on my device and rebooted and all is fine... While I believe this is normally safe with the important exception of Magisk use with relocked bootloader (ie. with custom keys set to allow relocking with custom mods incl. Magisk etc), I'm not certain of this... Others may like to verify the safety of disabling OEM unlocking with normal (unlocked device) Magisk use...

The App can be used by disabling OEM unlocking before a reboot however, so you can always enable it again before a reboot...

Hope this fixes your issue! 👍 PW
 
  • Like
Reactions: ipdev and HippoMan

asripath

Senior Member
Jul 12, 2020
269
224
Redmi K20 Pro
Samsung Galaxy Tab A8
My device:
Xiaomi RN8T stock A11 MIUI
Magisk Canary 25209
Latest Shamiko public release (for proper root hiding]
[LSPosed Hide My AppList, but not needed for this app]

This app is detecting OEM unlocking when enabled in Developer options (even if enabled with developer options disabled)... With the above setup I get:
View attachment 5872335
With OEM unlocking disabled:
View attachment 5872341
... It's not detecting USB debugging or Developer Options itself...

I have disabled OEM unlocking on my device and rebooted and all is fine... While I believe this is normally safe with the important exception of Magisk use with relocked bootloader (ie. with custom keys set to allow relocking with custom mods incl. Magisk etc), I'm not certain of this... Others may like to verify the safety of disabling OEM unlocking with normal (unlocked device) Magisk use...

The App can be used by disabling OEM unlocking before a reboot however, so you can always enable it again before a reboot...

Hope this fixes your issue! 👍 PW
Accessibility service(not granted to the app) and
VPN (Netguard) also seem to trigger it's sensitivity
 

Attachments

  • Screenshot_20230326-090847_YES Bank.png
    Screenshot_20230326-090847_YES Bank.png
    103.7 KB · Views: 42
  • Screenshot_20230326-090950_YES Bank.png
    Screenshot_20230326-090950_YES Bank.png
    102.5 KB · Views: 43
  • Like
Reactions: ipdev and pndwal

asripath

Senior Member
Jul 12, 2020
269
224
Redmi K20 Pro
Samsung Galaxy Tab A8
Can someone please help me in hiding the root for Yes bank app. I was able to hide the root from all the banking apps but no luck with the yes bank after recent update. I have hidden it from denylist in magisk added to hide my list, also enabled it with in lsposed app hide my list app. All the other apps are working fine except this. Is there a way to find which app is the reason for the root detection. CTS profile, playstore is certified too.

Have you tried using the app
In parallel space/shelter/insular/island ?
 

pndwal

Senior Member
Accessibility service(not granted to the app) and
VPN (Netguard) also seem to trigger it's sensitivity
... Guess those are additional issues on your device with your setup (and your solutions may help if the member uses similar settings)...

However the member specifically said:
Can someone please help me in hiding the root for Yes bank app... Is there a way to find ... the reason for the root detection.
... OEM unlock triggers the "device appears to be rooted" Security Alert notice...

The Security Alert notices you show concern different issues... PW
 

asripath

Senior Member
Jul 12, 2020
269
224
Redmi K20 Pro
Samsung Galaxy Tab A8
... Guess those are additional issues on your device with your setup (and your solutions may help if the member uses similar settings)...

The member specifically said:

... OEM unlock triggers the "device appears to be rooted" Security Alert notice...

The Security Alert notices you show concern different issues... PW
True...

"Is there a way to find which app is the reason for the root detection"

Don't use yes Bank...
was just helping out in diagnosing the issue.

Rooted with delta and magisk hide...
Don't get OEM unlock error
(maybe it doesn't trigger on delta).

Btw the user did not upload any screenshots
Of his detections...
would help more in identifying the issue
 
  • Like
Reactions: pndwal

zgfg

Senior Member
Oct 10, 2016
8,976
6,716
Redmi K20 / Xiaomi Mi 9T
Xiaomi Mi 11 Ultra
Accessibility service(not granted to the app) and
VPN (Netguard) also seem to trigger it's sensitivity
If I correctly understand your screenshots, for Accessibility and VPN you have options to Close the app or Skip (and continue to use)?

I had a similar case with one MDM - it found Accessibility and warned but let me continue

Btw, Ruru also warns about Accessibility (screenshot)

It will be stupid if banking and similar apps prohibit the use of regular Google features like Accessibility (users with disabilities) and VPN (users may need for their work)
 

Attachments

  • Screenshot_2023-03-26-08-49-40-757_com.byxiaorun.detector.jpg
    Screenshot_2023-03-26-08-49-40-757_com.byxiaorun.detector.jpg
    357.5 KB · Views: 36

pndwal

Senior Member
True...

"Is there a way to find which app is the reason for the root detection"
Yeah, I removed the ref. to 'app' in quoting this above as it seems app detection isn't triggered 'root found' Alert... OEM unlocking enabled is... The question simply assumes it would be an app but that's a red herring; the app in question starts without even using HMA...
Don't use yes Bank...
I don't either... But only because I prefer No Bank... 😁
was just helping out in diagnosing the issue.
And there may be further issues...
Rooted with delta and magisk hide...
Don't get OEM unlock error
(maybe it doesn't trigger on delta).
Maybe...

Is OEM unlocking already disabled in Developer Options?

Also, what USNF version are you using?...

Can you check /data/adb/modules/safetynet-fix/service.sh to see if the lines highlighted (at the end) here:
https://github.com/kdrag0n/safetyne...e9b5d57eb43446f4954/magisk/service.sh#L57-L60
exist?...

That OEM unlock prop change in USNF was proposed and finally rejected by @kdrag0n and removed from @Displax patch set (later merged in official USNF)...

It may still exist in older or forked USNF builds, and may also have been added in other hide-solution mods...
Btw the user did not upload any screenshots
Of his detections...
would help more in identifying the issue
mmm... But said 'root' detected, so seems it's per my 'Alert' screenshot... PW
 
Last edited:

Top Liked Posts

  • 2
    After updating magisk and restarting the phone, the phone goes into bootloop. No update method works... inatall .apk, twrp, directly from the app.Does anyone have a way to update correctly?
    Galaxy s10e
    Lineage 18.1
    Magisk 23.0
    I have run into it (every now and then) updating Magisk using a previously patch image.
    - Magisk patched boot image detected
    Bootloop and/or a forever (infinite) boot.

    If it is just updating Magisk, use a clean (stock) boot image.
    In your case, the stock Lineage 18.1 boot image.

    For me, if the update failed..
    - I normally flash the stock boot image back and reboot.

    Since I still have the newer Magisk app (Manager) installed.
    - Push the stock boot image to the device (if it is not already there).
    - Use the "Select and Patch a File" option to patch the stock boot image.
    - Stock boot image detected
    - Pull the new Magisk patched boot image.
    - Flash (install) the new patched boot image.

    ---

    To complicate my reply.

    Depending on the device..
    I use the hardware key-combo to boot into bootloader.
    - Flash the current stock boot image to the device.
    - Use fastboot to 'boot' a previously patched boot image.
    - Then use the "Direct Install" option to install.
    - Stock boot image detected

    Hope it helps more than confuse. 🙃

    Cheers. :cowboy:
    2
    If I use Magisk 6.1 in my rom every app in denylist crashes.
    The rom is ViperOS, Android 7.1.1, latest security patch. The log is a follows:

    06-05 19:24:01.656 811 1572 I ActivityManager: START u0 {act=android.intent.action.MAIN cat=[android.intent.category.LAUNCHER] flg=0x10200000 cmp=com.ideomobile.maccabi/.ui.splash.SplashActivity} from uid 10156 on display 0
    06-05 19:24:01.716 811 1839 I ActivityManager: Start proc 12403:com.ideomobile.maccabi/u0a123 for activity com.ideomobile.maccabi/.ui.splash.SplashActivity
    06-05 19:24:01.723 427 688 D AudioFlinger: mixer(0xb5983480) throttle end: throttle time(20)
    06-05 19:24:01.730 12403 12403 I Magisk : zygisk32: [com.ideomobile.maccabi] is on the denylist
    06-05 19:24:01.731 12403 12403 E Zygote : Unsupported st_mode 4480
    06-05 19:24:01.731 12403 12403 F art : art/runtime/jni_internal.cc:558] JNI FatalError called: frameworks/base/core/jni/com_android_internal_os_Zygote.cpp:485: Unable to restat file descriptor table.
    06-05 19:24:01.755 12403 12403 F art : art/runtime/runtime.cc:422] Runtime aborting...
    06-05 19:24:01.755 12403 12403 F art : art/runtime/runtime.cc:422] Aborting thread:
    06-05 19:24:01.755 12403 12403 F art : art/runtime/runtime.cc:422] "main" prio=5 tid=1 Native
    06-05 19:24:01.755 12403 12403 F art : art/runtime/runtime.cc:422] | group="" sCount=0 dsCount=0 obj=0x7375c4d0 self=0xb4285400
    06-05 19:24:01.755 12403 12403 F art : art/runtime/runtime.cc:422] | sysTid=426 nice=0 cgrp=default sched=0/0 handle=0xb6f6a534
    06-05 19:24:01.755 12403 12403 F art : art/runtime/runtime.cc:422] | state=? schedstat=( 0 0 0 ) utm=0 stm=0 core=0 HZ=100
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] | stack=0xbe76e000-0xbe770000 stackSize=8MB
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] | held mutexes= "abort lock"
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] kernel: (couldn't read /proc/self/task/426/stack)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] native: (backtrace::Unwind failed for thread 426: Thread doesn't exist)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] at com.android.internal.os.Zygote.nativeForkAndSpecialize(Native method)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] at com.android.internal.os.Zygote.forkAndSpecialize(Zygote.java:97)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] at com.android.internal.os.ZygoteConnection.runOnce(ZygoteConnection.java:230)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] at com.android.internal.os.ZygoteInit.runSelectLoop(ZygoteInit.java:855)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:777)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] Dumping all threads without appropriate locks held: thread list lock mutator lock
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] All threads:
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] DALVIK THREADS (1):
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] "main" prio=5 tid=1 Runnable
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] | group="" sCount=0 dsCount=0 obj=0x7375c4d0 self=0xb4285400
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] | sysTid=426 nice=0 cgrp=default sched=0/0 handle=0xb6f6a534
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] | state=? schedstat=( 0 0 0 ) utm=0 stm=0 core=0 HZ=100
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] | stack=0xbe76e000-0xbe770000 stackSize=8MB
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] | held mutexes= "abort lock" "mutator lock"(shared held)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] kernel: (couldn't read /proc/self/task/426/stack)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] native: (backtrace::Unwind failed for thread 426: Thread doesn't exist)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] at com.android.internal.os.Zygote.nativeForkAndSpecialize(Native method)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] at com.android.internal.os.Zygote.forkAndSpecialize(Zygote.java:97)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] at com.android.internal.os.ZygoteConnection.runOnce(ZygoteConnection.java:230)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] at com.android.internal.os.ZygoteInit.runSelectLoop(ZygoteInit.java:855)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422] at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:777)
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422]
    06-05 19:24:01.756 12403 12403 F art : art/runtime/runtime.cc:422]
    06-05 19:24:01.756 12403 12403 F libc : Fatal signal 6 (SIGABRT), code -6 in tid 12403 (main)
    06-05 19:24:01.757 384 384 W : debuggerd: handling request: pid=12403 uid=0 gid=0 tid=12403
    06-05 19:24:01.830 12417 12417 F DEBUG : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
    06-05 19:24:01.831 12417 12417 F DEBUG : LineageOS Version: 'unknown'
    06-05 19:24:01.831 12417 12417 F DEBUG : Build fingerprint: 'samsung/hltexx/hlte:5.0/LRX21V/N9005XXSGBRI2:user/release-keys'
    06-05 19:24:01.831 12417 12417 F DEBUG : Revision: '0'
    06-05 19:24:01.831 12417 12417 F DEBUG : ABI: 'arm'
    06-05 19:24:01.831 12417 12417 F DEBUG : pid: 12403, tid: 12403, name: main >>> zygote <<<
    06-05 19:24:01.831 12417 12417 F DEBUG : signal 6 (SIGABRT), code -6 (SI_TKILL), fault addr --------
    06-05 19:24:01.843 12417 12417 F DEBUG : Abort message: 'art/runtime/jni_internal.cc:558] JNI FatalError called: frameworks/base/core/jni/com_android_internal_os_Zygote.cpp:485: Unable to restat file descriptor table.'
    06-05 19:24:01.843 12417 12417 F DEBUG : r0 00000000 r1 00003073 r2 00000006 r3 00000008
    06-05 19:24:01.843 12417 12417 F DEBUG : r4 b6f6a58c r5 00000006 r6 b6f6a534 r7 0000010c
    06-05 19:24:01.843 12417 12417 F DEBUG : r8 bef68e90 r9 000001e5 sl 0000000a fp b4285400
    06-05 19:24:01.843 12417 12417 F DEBUG : ip 00000003 sp bef68d50 lr b6041107 pc b6043970 cpsr 60070010
    06-05 19:24:01.865 12417 12417 F DEBUG :
    06-05 19:24:01.865 12417 12417 F DEBUG : backtrace:
    06-05 19:24:01.865 12417 12417 F DEBUG : #00 pc 0004a970 /system/lib/libc.so (tgkill+12)
    06-05 19:24:01.865 12417 12417 F DEBUG : #01 pc 00048103 /system/lib/libc.so (pthread_kill+34)
    06-05 19:24:01.865 12417 12417 F DEBUG : #02 pc 0001d715 /system/lib/libc.so (raise+10)
    06-05 19:24:01.865 12417 12417 F DEBUG : #03 pc 00019261 /system/lib/libc.so (__libc_android_abort+34)
    06-05 19:24:01.865 12417 12417 F DEBUG : #04 pc 00017128 /system/lib/libc.so (abort+4)
    06-05 19:24:01.865 12417 12417 F DEBUG : #05 pc 0031c2a1 /system/lib/libart.so (_ZN3art7Runtime5AbortEPKc+328)
    06-05 19:24:01.865 12417 12417 F DEBUG : #06 pc 000b52eb /system/lib/libart.so (_ZN3art10LogMessageD2Ev+1134)
    06-05 19:24:01.865 12417 12417 F DEBUG : #07 pc 0026386b /system/lib/libart.so (_ZN3art3JNI10FatalErrorEP7_JNIEnvPKc+94)
    06-05 19:24:01.865 12417 12417 F DEBUG : #08 pc 000dabc7 /system/lib/libandroid_runtime.so
    06-05 19:24:01.865 12417 12417 F DEBUG : #09 pc 000dad59 /system/lib/libandroid_runtime.so
    06-05 19:24:01.865 12417 12417 F DEBUG : #10 pc 000da7ff /system/lib/libandroid_runtime.so
    06-05 19:24:01.865 12417 12417 F DEBUG : #11 pc 00019be3 /system/bin/app_process32
    06-05 19:24:01.866 12417 12417 F DEBUG : #12 pc 7344f579 /data/dalvik-cache/arm/[email protected][email protected] (offset 0x281b000)
    06-05 19:24:02.039 12403 12403 W main : type=1701 audit(0.0:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=u:r:zygote:s0 reason="memory violation" sig=6
    06-05 19:24:02.046 384 384 W : debuggerd: resuming target 12403
    06-05 19:24:02.048 811 12430 W ContextImpl: Calling a method in the system process without a qualified user: android.app.ContextImpl.sendBroadcast:877 com.android.server.am.AppErrors.crashApplicationInner:387 com.android.server.am.AppErrors.crashApplication:321 com.android.server.am.ActivityManagerService.handleApplicationCrashInner:13811 com.android.server.am.NativeCrashListener$NativeCrashReporter.run:86
    06-05 19:24:02.050 811 857 I BootReceiver: Copying /data/tombstones/tombstone_07 to DropBox (SYSTEM_TOMBSTONE)
    06-05 19:24:02.052 426 426 I Zygote : Process 12403 exited due to signal (6)
    Generally, in DenyList must be only apps you want to hide Magisk from them (banking apps and so)

    And GMS (Google Play Services) - although, when using Zygisk and USNF, USNF will remove GMS from DenyList

    If some banking apps still crash (or complain) although in DenyList, then they require additional treatment to hide Magisk, root, unlocked BL - USNF, Shamiko, maybe HMA, etc

    Hence first, which apps do crash (and before that, remove 'normal' apps from DenyList if you have them, and reboot)
    1
    Hi! I have POCO M3 Pro 5G (Camellian). The only easy way to install Magisk for me is to replace the stock boot image with Magisk's repacked one and flash it together with the new firmware through fastboot (including empty verity file, by editing flash_all_except_data_storage.bat) - tried both stock MIUI 12.5 and the last 14 (Global).
    But after this Magisk is continuously asking for an "advanced installation", but the "direct install" option has no effect on the phone: Magisk asks and asks for the "advanced install" and also can never update to newer versions.
    Though everything that requires root works fine yet, I'm very curious why Magisk considers it's own installation as inferior and how to overcome this issue.
    I have run into if once or twice.
    Sorry I do not remember exactly how I fixed it. 🙃
    Might have been fixed in Magisk.


    The message comes when the current Magisk (demon) is out of sync with Magisk.
    The last time I ran into it, I do not remember what fixed it. 😥

    Try clearing cache and data of the Magisk app.
    Assuming it is the same version that is patched into your boot image.

    Clear the cache and data of the Magisk app and uninstall the app.
    Reboot and install the Magisk app again.

    Delete /data/adb and let Magisk recreate it.
    This will kill all modules and Magisk settings.

    Good luck. 👍

    Cheers. :cowboy:
    1
    Yeah, I tried that last night... Either the fix is incomplete or I'm missing something as B/L status is still bypassed using LSP TEE Hide module... 🤔 PW
    Null pointer exception for me with this latest v1.4.0 and v1.4.1
    1
    Yeah, I tried that last night... Either the fix is incomplete or I'm missing something as B/L status is still bypassed using LSP TEE Hide module... 🤔 PW
    The old module TEE Hide just throw an exception in getCertificateChain method, so apps can't know if bootloader is locked or not. I will try to update AttestationSpoofer to bypass (again) the locked bootloader. They are using another cert class, because it doesn't call this method like previous versions.
  • 8
    So as well as making it easier to keep root with an ota we can have the same firmware on the device one rooted and one not? So if magisk hide/safetynet/etc aren't working we can boot to the non rooted firmware to use wallet/banking apps etc and then boot back to rooted. Or is it a bit more complicated than that? Never had a pixel device before
    Others have already addressed your question, but for me, the biggest benefit here is to have a safety valve in place where your inactive slot is bootable (without first having to flash the firmware) in case you get into a hairy situation where your active slot becomes unbootable for whatever reason. May be useful in some situations.
    8
    Hello!
    How do you know?
    You must be an expert or something

    Nigerian-Meme.jpg 😜 PW
    7
    Yeah, if I want to run a custom kernel (Pixel 7) then I need to wipe. Should have sideloaded (not booted up), then gone into bootloader and run fastboot flash vbmeta --disable-verity --disable-verification vbmeta.img to that slot. Once booted after sideload/flashing the firmware it's too late as it's enabled after booting. Don't think it matters if you do it before or after flashing the patched image, just as long as you do it before you boot up. Oh well, lol...

    Nothing to do with what we were testing, just custom kernel related. Seems to also help to avoid getting the red eio corrupt message when things may not go as expected.
    Thanks, I realize it is only needed for custom Kernel cases.
    I should add extracting vbmeta from payload.bin then in addition to boot.img / init_boot.img so that the step can be performed if the options are selected.
    6
    I think it would be good to support, and I posted disambiguation due to some confusion above.

    Rather than being 'highly discouraged' (it's not; it's plum necessary 🤪) patching recovery partition is actually the only option for most A-only devices launched with Android 9 (legacy SAR, circa 2018, 2019) other than Xiaomi models!

    Hope you reconsider... 👍 PW
    Your wish is my command :)
    1684447283639.png

    1684447305575.png


    Although with one caveat,
    Yes I can tell if it is Ramdisk yes or no by running a script, but that requires unpacked Magisk, (for not rooted phone, I would need to unpack)
    And although it is true that PF eventually unpacks to create a patch, but within the workflow, that stage is much later, and that stage is dependent on choices a user makes in the above screen.

    Of course it could be worked out and workflow changed to automatically offer / not offer the choice.
    Considering that the target audience is really minute if at all existent, specially considering that the tool has Pixel in its name, and people who have Pixel phone don't need it, and people who need them wouldn't be looking to tools for Pixel Phones ... lol
    I decided the leave it up to the user the choice to have that option visible or not. (no auto detection)
    The tooltip on option suggests not to turn it on unless ...
    1684447779077.png


    I hope that should be enough.
    6
    Update:

    On a Pixel 5 device, I managed to have both slots bootable.
    One slot rooted, and the other not, both on the same 2023-05 firmware.

    The process is as follows (which PF will support OOB in the next release)
    - Sideload full OTA
    - Reboot to bootloader
    - Flash patched image.
    - reboot to system (observe root)
    - Sideload full OTA
    - Reboot to System (no patching, observe no root)
    - Switch slot (observe root)

    With Pixel 5, one is able to make changes to boot after sideload but before reboot.
    It still needs to be tested if this works on Pixel 6, 7 * devices

    I find flashing full OTA is slower than flashing full factory, but the benefit of having both slots bootable is a big bonus.
  • 1094
    This is the place for general support and discussion regarding "Public Releases", which includes both stable and beta releases.
    All information, including troubleshoot guides and notes, are in the Announcement Thread
    156
    Hello, I haven't given much support on XDA lately. It can be resulted from
    • University started and I have limited free time. In fact, I mostly develop during midnight
    • I live in Taiwan, which has large time zone differences between my European/American contributors/testers, which usually forces me to stay up late at night to discuss/test stuffs.
    • The new version is about to come, I don't want to spend effort on supporting old releases
    The planned update is delayed again and again, to some point I think I'll shed some light about what has been happening lately, also along with some announcements.

    New Forum!
    As you might have already discovered, Magisk got its own subforum on XDA! Many thanks to all the support you gave me, and much more information/features/support is about to come!
    **For developers supporting all the devices that are not using standard Android boot format, feel free to create threads in this section (actually, PLEASE do so) for your favorite devices after v7 is out. As I currently know, Asus devices require signing the boot image before flashing, and is model dependant; Sony devices seems to use ELF kernel that is unpatchable, or some has two ramdisks (inner + outer), both requires different workarounds; LG bootloader locked devices has to manually "BUMP" the boot image after flashing Magisk..... and there may be lots of other crazy boot image formats that haven't come up to my attention yet.
    It is impossible for me to support all these non-standard boot images, and I hope the community can collaborate to make Magisk running across all the devices. Overall, community collaboration is what XDA about :D

    The Pixel Phone
    Some of you might already know this news, that the next Pixel Phone right around the corner seems like it does not have ramdisk in boot image, which pretty much wrecked Magisk in all ways. However, it pretty much doomed root itself too. Kernel modifications is inevitable IMO, so I'll try to migrate my scripts to C programs that could possibly be included into the kernel itself. Note that I'm not familiar with linux kernel, I'm not even sure if my idea and concept is correct or not. But once the device is available, I think developers will find a way to bypass all the difficulties, and I'll do my best to learn things ;)

    Current Progress
    In the past month, I've spent quite some time learning SELinux, so that I can avoid using SuperSU's sepolicy patches. Thanks to the helps and tips from @phhusson and @Chainfire, I finally have a much clearer understanding of how SELinux works. The Magisk core parts (the scripts, boot image patches, new features, more supports) are actually done some time ago. What is causing all the delays is the Magisk Manager.
    To be completely honest, although I can code in Java without much issues, Magisk Manager is actually my first Android application, I had to reach out for assistance, and fortunately awesome developers like @DVDandroid and @digitalhigh contributed a lot, which makes the current Manager awesome.
    After the repo system and module management is mostly done, I was about to do some adjustments and release, but what we really done is decided to add another feature: auto-unroot with per-app settings. I decided to wait for it to be finished, and then do my adjustments. Due to reasons that'll be mentioned later, this feature will likely not be available for the next release (should come in future updates)

    Safety Net Disaster
    Those who are using Magisk for Safety Net bypass purposes must have known that Google recently updated the detection method of my Systemless Xposed. I still have no idea what Safety Net is detecting, so currently I cannot fix it on my side (also because I'm busy working on the next update). However, suhide developed by @Chainfire is able to hide Xposed and worked fine.
    However, only my Systemless Xposed v86.2, which is based on SuperSU's su.d, is supported using that method. v86.2 and v86.5 (latest, Magisk based) have nearly identical binaries, and the only difference is the path where the binaries are stored.
    I'm still not sure what's the real issue for it not being supported, I just hope it is not done intentionally.

    Conclusion
    Due to the fact that my Safety Net bypass is not 100% perfect now, I do not want to spend any more time waiting for auto-unroot to be polished. What I'm doing now is finishing up all the things I'd like to change in Magisk Manager (it has been a while since I last contributed to Manager, my fellow developers are doing all the heavy job), which might take a little more time, after that, packed with tons of information to be announced in Magisk Section, I'll release the long awaited update.

    Hope this lengthy post gives you the idea of the whole situation, and again thanks for all your support!!
    121
    Ah, some Chainfire bashing, I hope it is not too late for me to exercise additional villainy.

    First, let me make clear I have nothing against @topjohnwu, nor against Magisk. Magisk is an interesting project and it certainly displays @topjohnwu ingenuity and persistence. I don't doubt we will see more interesting things from his hands.

    -------------------------

    What has happened here is not all that dark and complicated, from either end. I returned from holidays, and someone pointed me at Magisk. My first thought: interesting!

    Among other things, the thread lists some issues with SuperSU, which in combination with the phrase The developer also requests users to not bug Chainfire with compatibility requests for SuperSU with Magisk from the portal article, raised my left eyebrow by nigh half an inch. The popular systemless xposed mod is apparently now based on it, and apparently it now no longer works with SuperSU, and apparently I'm not supposed to fix that, nor any of the other found issues. I found that a bit weird. So yes, I have told @topjohnwu that I was a bit surprised he was posting about issues with SuperSU without notifying me about them (I can't fix or help fix issues I'm not aware of, after all).

    He's also spreading a modified version of the SuperSU package, which is not all that uncommon, nor necessarily a problem. I have not looked into what he modified, I only ran a few quick tests on one of my devices, and found some commonly used commands run as root to be broken. I have informed him of this as well.

    It appears the tool of choice for Magisk is phh's Superuser, because of some of the mentioned issues with SuperSU. That's fine by itself, but fixing issues in that superuser by incorporating SuperSU's binaries into it is a somewhat questionable practise. After all, SuperSU is a commercial closed-source package that helps pay for my dinner, and superuser is a direct competitor. I have informed him that I was surprised he did this without asking for permission. I have expressed similar surprise on him spreading a modified version of LiveBoot (which helps pay for a snack now and then).
    @topjohnwu has also stated that Magisk's scripts are largely influenced by mine (I have not checked). Scripts based on mine are used all over the place on XDA, some people have crafted amazing things based on them, I have never made an issue of this (otherwise I would have just made them binaries). But yes, I have also stated to him that I don't think it's very nice to base something on one program, and then using that to (almost exclusively) push something directly competing with that program.

    tl;dr Towards @topjohnwu, I have:
    - expressed surprise he has issues getting Magisk to work with SuperSU, and has chosen not to inform me about those
    - expressed surprise he is using SuperSU binaries in a competing superuser without permission
    - expressed surprise he is posting a modified LiveBoot without permission
    - informed him of issues with the modified SuperSU he has posted
    - let him know I thought it wasn't very nice to be applying my scripts to benefit seemingly exclusively that same competing superuser

    To be crystal clear:
    - I have not asked for an apology
    - I have not asked for Magisk to be abandoned, neither the root hiding nor systemless module parts, and certainly not systemless xposed
    - I have not made an issue of any of this anywhere, until this post
    - I have not even specifically asked for anything to be taken down (though obviously in my opinion the other superuser package mixed with SuperSU's binaries, as well as the LiveBoot package, should go)
    - I have not reported this thread to XDA moderators for copyright violations or otherwise

    While my conversation with @topjohnwu may not win any awards for being friendly (though it may win some for brevity), I think all things considered my response has been rather mild. To be perfectly honest, until the apology post, I thought this was over with already. I think the apology post was triggered because I haven't replied to his last PM for a while - I was in the zone, it happens.

    To emphasize again, I have nothing against @topjohnwu, Magisk, or systemless xposed, and it is certainly not my goal to see any of them go. If it can be made to work together with SuperSU, great.

    I get it though: you think of something, you want to see if you can make it work, you finally get it to work, you publish it, it takes off - enthusiasm gets the better of you. Maybe in the rush some mistakes are made. That doesn't mean you have to just drop it and run. None of my stuff would make it past 0.1 if I stopped at the first big mistake :)

    Aside from said being in the zone coding, I usually regret actually responding to these sort of things the day after, which has made me hesitant to reply. Surprise me.
    76
    Thread temporarily closed so everyone sees this.

    The flood of "SafetyNet isn't working for me either!" posts are not helpful, at all. Please refrain from posting further, it will be looked into. Please do not forget that not passing SafetyNet is 100% NORMAL AND INTENDED when you have an unlocked booloader or running custom firmware. These are workarounds and they will be worked around in turn.

    The Flash
    Forum Moderator

    EDIT: Thread is reopened... I will be cleaning any SafetyNet posts for a while to keep the thread clean for real issues.
    75
    Hello everyone!

    I am aware that Google has updated Safety Net that makes Magisk itself a no go for Android Pay. In fact, I witnessed the change live while I am developing the new magiskhide, which should hide all Magisk modules and Magisk installed root.

    Google is serious about Safety Net now, clearly hunting down all possibility to run Xposed with Safety Net passed. I spend quite some time examining the new security measures last midnight, and fortunately it seems that it is possible to run Magisk and root along with Safety Net if no Xposed is running. I'm glad I removed the old root toggle at the right time lol, that is no longer feasible with the latest detection.

    So stay tuned for the next update, it will come with bug fixes, along with the new magiskhide to bypass that Safety Net.

    Google, how will a few systemless mods do any harm :p:p