DenyList, Magisk Hide module (find the link, etc, among previous posts)For me, the application does not open at all, as if it detects the zygisk process![]()
After updating opened fine for me but on running Play Integrity Check I got:After today's TB checker app update from Google Play, the app is not working, any solution ?
.... updated TB Checker.... everything configured as previously.... and it still works.... all ok for me
Updated yesterday to v2.5.5.... after getting Play Store notification. After a while, just ran the app and everything was okay. (Cleared nothing.).... Suggest clearing data as seems updated app may not play nicely with old config data...
I did everything, TB checker still doesn't work, open error, I found this info in the Cat logAfter updating opened fine for me but on running Play Integrity Check I got:
View attachment 5877831
... Cleared all app data... Seem to get more invasive (annoying) adds now, plus is this new?:
View attachment 5877835
... Selected Don't Allow and ran Play Integrity Check again... All fine now... (Only strongIntegrity and virtualIntegrity red... All green for Root and Xposed checks.)
Suggest clearing data as seems updated app may not play nicely with old config data... PW
But today, got a message saying 'app is not official'. Went to Play Store and updated again to v2.5.7.... All fine now. WTH!Updated yesterday to v2.5.5.... after getting Play Store notification. After a while, just ran the app and everything was okay. (Cleared nothing.)
Assuming Play Store is still working fine, are you running Hide My Applist, PrivacySpace or similar Xposed/Magisk modules?... Are you hiding Play Store in any templates, in 'apps invisible' or in other hide lists? PWI did everything, TB checker still doesn't work, open error, I found this info in the Cat log![]()
In HMA, I only have 2 apps hidden in the Google Play Store, Lucky Pacher and HManager, nothing else. I completely do not understand why after today's update of TB checker the application does not work at all, error open app ... Yesterday on the previous version it worked normallyAssuming Play Store is still working fine, are you running Hide My Applist, PrivacySpace or similar Xposed/Magisk modules?... Are you hiding Play Store in any templates, in 'apps invisible' or in other hide lists? PW
I'm not clear what "hidden in the Google Play Store" means... As I asked, do you have Play Store itself in any templates or 'apps invisible' lists?...In HMA, I only have 2 apps hidden in the Google Play Store, Lucky Pacher and HManager, nothing else. I completely do not understand why after today's update of TB checker the application does not work at all, error open app ... Yesterday on the previous version it worked normally![]()
No ads with AdAway
I have to say with regret that Magisk Delta is dead... There will no more updates. Thank all for using Magisk Delta along with those days, we have many memories that should never be faded. I will miss you
Now it sees google play store but TB checker still not workingI'm not clear what "hidden in the Google Play Store" means... As I asked, do you have Play Store itself in any templates or 'apps invisible' lists?...
Clearly from your screenshot, TB Checker can't find Play Store... That's why I suspected app hiding... May be some other mod setting or anomaly on your system also... PW
Assuming that the TG message is not an April fool's joke ...I had a suspicion this was going to happen.
This was posted in the Delta Telegram group:
Past midnight in Japan, Apr 2 - the post is crossed on TGI had a suspicion this was going to happen.
This was posted in the Delta Telegram group:
So april fools then? Lol odd joke.
Please explain "2 apps hidden in the Google Play Store".Now it sees google play store but TB checker still not working. It remains to wait for the next update, and if there is still an error open TB checker, it remains to completely remove Magisk root and check if this application will start working
. Unfortunately, I don't see any other option
.
What version of TB Checker do you have? v2.5.7.r289.a8dd9b9 seems to work fine.... sees google play store but TB checker still not working....
The HManager app for the Huawei router and Lucky Patcher is detected as a malicious app in the Google Play store, so I hide these two apps in the HMA for the Google Play store.
I have installed exactly the same version as you, I have open TB checker error all the time... Something is blocking the application from starting, but I have no idea what.What version of TB Checker do you have? v2.5.7.r289.a8dd9b9 seems to work fine.
Try without lucky patcher installed it's known to be a factor in root detection (i know it's in HMA but might still be an issue.The HManager app for the Huawei router and Lucky Patcher is detected as a malicious app in the Google Play store, so I hide these two apps in the HMA for the Google Play store.
I have installed exactly the same version as you, I have open TB checker error all the time... Something is blocking the application from starting, but I have no idea what.
I have been visiting with an old friend who lives now in Florida today and didn't even think about the fact that it is indeed, April fool's day, lol!
Thanks, I realize it is only needed for custom Kernel cases.Yeah, if I want to run a custom kernel (Pixel 7) then I need to wipe. Should have sideloaded (not booted up), then gone into bootloader and runfastboot flash vbmeta --disable-verity --disable-verification vbmeta.img
to that slot. Once booted after sideload/flashing the firmware it's too late as it's enabled after booting. Don't think it matters if you do it before or after flashing the patched image, just as long as you do it before you boot up. Oh well, lol...
Nothing to do with what we were testing, just custom kernel related. Seems to also help to avoid getting the redeio
corrupt message when things may not go as expected.
No. Only needed on the Pixel 7 series if you want to flash a custom kernel.
Yeah, if I want to run a custom kernel (Pixel 7) then I need to wipe. Should have sideloaded (not booted up), then gone into bootloader and runOuch, sorry to hear that, now you need a wipe?
So at what point you should have done that?
When flashing the patched image? just add the extra flags?
fastboot flash vbmeta --disable-verity --disable-verification vbmeta.img
to that slot. Once booted after sideload/flashing the firmware it's too late as it's enabled after booting. Don't think it matters if you do it before or after flashing the patched image, just as long as you do it before you boot up. Oh well, lol...eio
corrupt message when things may not go as expected.Okay, did some testing on my Pixel 6 Pro:Update:
On a Pixel 5 device, I managed to have both slots bootable.
One slot rooted, and the other not, both on the same 2023-05 firmware.
The process is as follows (which PF will support OOB in the next release)
- Sideload full OTA
- Reboot to bootloader
- Flash patched image.
- reboot to system (observe root)
- Sideload full OTA
- Reboot to System (no patching, observe no root)
- Switch slot (observe root)
With Pixel 5, one is able to make changes to boot after sideload but before reboot.
It still needs to be tested if this works on Pixel 6, 7 * devices
I find flashing full OTA is slower than flashing full factory, but the benefit of having both slots bootable is a big bonus.
Right, I had forgotten as well,It's been a while since I sideloaded an OTA, but if I remember correctly once the sideloading is complete you'll still be in recovery mode and you have to choose "Reboot to system now" (or something like that) before it reboots. But like I said, it's been a while...
If the "issue" is that you have not yet been able to reproduce the Magisk manager app's "Ramdisk: Yes/No":
Did you try a "wrapper" for the shell script function you found? At the time you reported several script fragments, there was talk of needing to call other functions first to set up environment variables.
Look up the "echo" command. There is a form that causes the shell to echo all lines as they are executed. Do this, redirect output to a log file, and you can crawl through and maybe spot where it first disappoints you.
I'm running into an interesting problem that I can't put my fingers on, and am open to ideas / suggestions.
As you may already know, Magisk embeds the SHA1 of the stock boot image used to create the patch into the patched image, this is great because one can easily determine the source image that was used and validate if it is what it is supposed to be.
And this is exactly what PF does, it extracts the SHA1 from the patched image.
Here's the function code
Python:def extract_sha1(binfile, length = 8): with open(binfile, 'rb') as f: s = f.read() # Find SHA1= pos = s.find(b'\x53\x48\x41\x31\x3D') # Move to that location if pos != -1: # move to 5 characters from the found position f.seek(pos + 5, 0) # read length bytes res = f.read(length) return res.decode("utf-8")
Unlike magiskboot and Android Kitchen Tools by @osm0sis which extracts the ramdisk.cpio and performs magiskboot cpio <ramdisk.cpio> sha1 on it, PF (to keep it lightweight) it just looks for the stringSHA1=
directly on the patched file and then reads the next 8 hex characters and converts them to ascii.
And this has worked flawlessly so far, until this.
Basically what is happening is:
The expected embedded SHA1 is: 40100d6b9512f6dffbb6f6b67c1b878f3bd82d18
With the exception of the red part of the SHA1, everything matches.
In one case 0100 part which is expected to be 30 31 30 30 hex it is instead 89 00 FB 33, and in the other case it is 72 00 FC 15
View attachment 5902493View attachment 5902495
I don't understand why this is happening, my first guess would be some kind of encoding, but then why now and only with this image, my other guess / fear is that perhaps the writing is not clean which would be a bug in Magisk.
Obviously I can skip over the first few bytes and do the validation with the remaining bytes, but I'd hate to take a path like that without understanding why this is happening, who's to say that this thing can't happen on the other portions of the SHA1 string.
If you have any ideas, I'm all ears.
As I expected in advance, problems with Magisk occurred after the OTA update of LineageOS (Pixel 6a).
Updated from a 20.0 build to lineage-20.0-20230429-nightly-bluejay
After the update it was necessary to flash the new boot image again. I have done that. But Magisk simply does not root. Magisk patched the downloaded LineageOS boot-image, saved it in the download folder and that was it.
Magisk was hidden before I did OTA update.
Simply very beautiful. All this after setting up LineageOS to my liking.
And what can I do now except re-flash ROM?
Your wish is my commandI think it would be good to support, and I posted disambiguation due to some confusion above.
Rather than being 'highly discouraged' (it's not; it's plum necessary) patching recovery partition is actually the only option for most A-only devices launched with Android 9 (legacy SAR, circa 2018, 2019) other than Xiaomi models!
Hope you reconsider...PW