DenyList, Magisk Hide module (find the link, etc, among previous posts)For me, the application does not open at all, as if it detects the zygisk process![]()
After updating opened fine for me but on running Play Integrity Check I got:After today's TB checker app update from Google Play, the app is not working, any solution ?
.... updated TB Checker.... everything configured as previously.... and it still works.... all ok for me
Updated yesterday to v2.5.5.... after getting Play Store notification. After a while, just ran the app and everything was okay. (Cleared nothing.).... Suggest clearing data as seems updated app may not play nicely with old config data...
I did everything, TB checker still doesn't work, open error, I found this info in the Cat logAfter updating opened fine for me but on running Play Integrity Check I got:
View attachment 5877831
... Cleared all app data... Seem to get more invasive (annoying) adds now, plus is this new?:
View attachment 5877835
... Selected Don't Allow and ran Play Integrity Check again... All fine now... (Only strongIntegrity and virtualIntegrity red... All green for Root and Xposed checks.)
Suggest clearing data as seems updated app may not play nicely with old config data... PW
But today, got a message saying 'app is not official'. Went to Play Store and updated again to v2.5.7.... All fine now. WTH!Updated yesterday to v2.5.5.... after getting Play Store notification. After a while, just ran the app and everything was okay. (Cleared nothing.)
Assuming Play Store is still working fine, are you running Hide My Applist, PrivacySpace or similar Xposed/Magisk modules?... Are you hiding Play Store in any templates, in 'apps invisible' or in other hide lists? PWI did everything, TB checker still doesn't work, open error, I found this info in the Cat log![]()
In HMA, I only have 2 apps hidden in the Google Play Store, Lucky Pacher and HManager, nothing else. I completely do not understand why after today's update of TB checker the application does not work at all, error open app ... Yesterday on the previous version it worked normallyAssuming Play Store is still working fine, are you running Hide My Applist, PrivacySpace or similar Xposed/Magisk modules?... Are you hiding Play Store in any templates, in 'apps invisible' or in other hide lists? PW
I'm not clear what "hidden in the Google Play Store" means... As I asked, do you have Play Store itself in any templates or 'apps invisible' lists?...In HMA, I only have 2 apps hidden in the Google Play Store, Lucky Pacher and HManager, nothing else. I completely do not understand why after today's update of TB checker the application does not work at all, error open app ... Yesterday on the previous version it worked normally![]()
No ads with AdAway
I have to say with regret that Magisk Delta is dead... There will no more updates. Thank all for using Magisk Delta along with those days, we have many memories that should never be faded. I will miss you
Now it sees google play store but TB checker still not workingI'm not clear what "hidden in the Google Play Store" means... As I asked, do you have Play Store itself in any templates or 'apps invisible' lists?...
Clearly from your screenshot, TB Checker can't find Play Store... That's why I suspected app hiding... May be some other mod setting or anomaly on your system also... PW
Assuming that the TG message is not an April fool's joke ...I had a suspicion this was going to happen.
This was posted in the Delta Telegram group:
Past midnight in Japan, Apr 2 - the post is crossed on TGI had a suspicion this was going to happen.
This was posted in the Delta Telegram group:
So april fools then? Lol odd joke.
Please explain "2 apps hidden in the Google Play Store".Now it sees google play store but TB checker still not working. It remains to wait for the next update, and if there is still an error open TB checker, it remains to completely remove Magisk root and check if this application will start working
. Unfortunately, I don't see any other option
.
What version of TB Checker do you have? v2.5.7.r289.a8dd9b9 seems to work fine.... sees google play store but TB checker still not working....
The HManager app for the Huawei router and Lucky Patcher is detected as a malicious app in the Google Play store, so I hide these two apps in the HMA for the Google Play store.
I have installed exactly the same version as you, I have open TB checker error all the time... Something is blocking the application from starting, but I have no idea what.What version of TB Checker do you have? v2.5.7.r289.a8dd9b9 seems to work fine.
Try without lucky patcher installed it's known to be a factor in root detection (i know it's in HMA but might still be an issue.The HManager app for the Huawei router and Lucky Patcher is detected as a malicious app in the Google Play store, so I hide these two apps in the HMA for the Google Play store.
I have installed exactly the same version as you, I have open TB checker error all the time... Something is blocking the application from starting, but I have no idea what.
I have been visiting with an old friend who lives now in Florida today and didn't even think about the fact that it is indeed, April fool's day, lol!
Ah... Sorry.What I said was once you root something's will never work again which isCORRECT. Of course you can relock bootloader but it won't fix the apps that will never work again and that was my point ffs
to mean you 'can't relock bootloader and go back to stock on Sammy once you trip Knox, and that's something that will never ever work again' rather than 'If you relock bootloader and go to back stock on Sammy, once you trip Knox some things will never ever work again'!...At least you can relock bootloader and go back stock I guess. On Sammy once you trip Knox that's it something's will never ever work again...
As I expected in advance, problems with Magisk occurred after the OTA update of LineageOS (Pixel 6a).
Updated from a 20.0 build to lineage-20.0-20230429-nightly-bluejay
After the update it was necessary to flash the new boot image again. I have done that. But Magisk simply does not root. Magisk patched the downloaded LineageOS boot-image, saved it in the download folder and that was it.
Magisk was hidden before I did OTA update.
Simply very beautiful. All this after setting up LineageOS to my liking.
And what can I do now except re-flash ROM?
Thanks, I realize it is only needed for custom Kernel cases.Yeah, if I want to run a custom kernel (Pixel 7) then I need to wipe. Should have sideloaded (not booted up), then gone into bootloader and runfastboot flash vbmeta --disable-verity --disable-verification vbmeta.img
to that slot. Once booted after sideload/flashing the firmware it's too late as it's enabled after booting. Don't think it matters if you do it before or after flashing the patched image, just as long as you do it before you boot up. Oh well, lol...
Nothing to do with what we were testing, just custom kernel related. Seems to also help to avoid getting the redeio
corrupt message when things may not go as expected.
Others have already addressed your question, but for me, the biggest benefit here is to have a safety valve in place where your inactive slot is bootable (without first having to flash the firmware) in case you get into a hairy situation where your active slot becomes unbootable for whatever reason. May be useful in some situations.So as well as making it easier to keep root with an ota we can have the same firmware on the device one rooted and one not? So if magisk hide/safetynet/etc aren't working we can boot to the non rooted firmware to use wallet/banking apps etc and then boot back to rooted. Or is it a bit more complicated than that? Never had a pixel device before
If the "issue" is that you have not yet been able to reproduce the Magisk manager app's "Ramdisk: Yes/No":
Did you try a "wrapper" for the shell script function you found? At the time you reported several script fragments, there was talk of needing to call other functions first to set up environment variables.
Look up the "echo" command. There is a form that causes the shell to echo all lines as they are executed. Do this, redirect output to a log file, and you can crawl through and maybe spot where it first disappoints you.
I'm running into an interesting problem that I can't put my fingers on, and am open to ideas / suggestions.
As you may already know, Magisk embeds the SHA1 of the stock boot image used to create the patch into the patched image, this is great because one can easily determine the source image that was used and validate if it is what it is supposed to be.
And this is exactly what PF does, it extracts the SHA1 from the patched image.
Here's the function code
Python:def extract_sha1(binfile, length = 8): with open(binfile, 'rb') as f: s = f.read() # Find SHA1= pos = s.find(b'\x53\x48\x41\x31\x3D') # Move to that location if pos != -1: # move to 5 characters from the found position f.seek(pos + 5, 0) # read length bytes res = f.read(length) return res.decode("utf-8")
Unlike magiskboot and Android Kitchen Tools by @osm0sis which extracts the ramdisk.cpio and performs magiskboot cpio <ramdisk.cpio> sha1 on it, PF (to keep it lightweight) it just looks for the stringSHA1=
directly on the patched file and then reads the next 8 hex characters and converts them to ascii.
And this has worked flawlessly so far, until this.
Basically what is happening is:
The expected embedded SHA1 is: 40100d6b9512f6dffbb6f6b67c1b878f3bd82d18
With the exception of the red part of the SHA1, everything matches.
In one case 0100 part which is expected to be 30 31 30 30 hex it is instead 89 00 FB 33, and in the other case it is 72 00 FC 15
View attachment 5902493View attachment 5902495
I don't understand why this is happening, my first guess would be some kind of encoding, but then why now and only with this image, my other guess / fear is that perhaps the writing is not clean which would be a bug in Magisk.
Obviously I can skip over the first few bytes and do the validation with the remaining bytes, but I'd hate to take a path like that without understanding why this is happening, who's to say that this thing can't happen on the other portions of the SHA1 string.
If you have any ideas, I'm all ears.