How To Guide September 18, 2023 TQ3A.230901.001 Global | .C2 Verizon - Unlock bootloader / Root Pixel 7 Pro [Cheetah] / SafetyNet

Search This thread

Lughnasadh

Senior Member
Mar 23, 2015
5,496
6,557
Google Nexus 5
Huawei Nexus 6P
That was a mistake on my part. I flashed the patched init_boot and I don't have root. It looks like the command failed. Any ideas on what I'm doing wrong?

Code:
anon@dev:~/android/platform-tools$ sudo ./fastboot flash init_boot magisk_patched-25200_IZC7w.img
Warning: skip copying init_boot_b image avb footer (init_boot_b partition size: 8388608, init_boot_b image size: 67108864).
Sending 'init_boot_b' (65536 KB)                   OKAY [  0.491s]
Writing 'init_boot_b'                              FAILED (remote: 'failed to flash partition (init_boot_b)')
fastboot: error: Command failed
anon@dev:~/android/platform-tools$
At first glance it looks like you're using a patched boot.img, not a patched init_boot.img. Says size is 65536 KB. That would be the size of a boot.img. The size of an init_boot.img shoud be around 8192 KB.

EDIT: Ninja'd 🙃
 

powershift

Member
Mar 16, 2022
42
19
At first glance it looks like you're using a patched boot.img, not a patched init_boot.img. Says size is 65536 KB. That would be the size of a boot.img. The size of an init_boot.img shoud be around 8192 KB.

EDIT: Ninja'd 🙃
That was it and the phone is rooted. I'll plan to do this sober next time lol. Thank you!

Code:
anon@dev:~/android/platform-tools$ sudo ./fastboot flash init_boot magisk_patched-25200_dfucY.img
[sudo] password for anon:
Sending 'init_boot_b' (8192 KB)                    OKAY [  0.053s]
Writing 'init_boot_b'                              OKAY [  0.016s]
Finished. Total time: 0.069s
anon@dev:~/android/platform-tools$
 

humb13

Senior Member
Nov 24, 2016
68
14
same thing happened below to @JJT211...i can't believe a bug in platform-tools/fastboot.exe can cause such a hard brick that it would mess up the mobo that it wouldn't even pull power anymore...!
goes to show how vulnerable the pixels are when I'm fastboot(d) and/or in the middle of flashing!

it does seem that, when r34 inevitably causes an error, if you hard reset or keep attempting, it messes up the mobo irreparably (found in both these cases; but only cases I've seen)...

I agree. It seems this time around the developers who write platform tools managed to do the impossible: fry a phone's motherboard with 34.01. The phone is not in the fastboot mode with the screen turned off. When you plug it into the PC, the PC won't see it at all. There is also no reaction when you plug it into a charger.

I had to bite the bullet and replace the phone. I got refurbished one at Amazon for $638 plus tax plus $40 delivery fee because I couldn't wait a week. When I got it and did that OTA upgrade that takes forever, I noticed it only went to the February release. I decided to cross my fingers and attempt a flash-all.bat update to March, only this time using 33.0.1 platform tools. Everything went perfect, no issues of any kind. This is hard proof that 34.0.1 is the culprit.

I know all this is risky. What bothers me about these developers is that despite the fact that this update is known to fry motherboards, it is still online for download. In fact, it took quite a bit of Googling to find 33.0.1. I refuse to believe the developers don't monitor forums such as this one where I'm not the only one complaining. There is a MAJOR problem with 34.0.1 and they keep silent and refuse to do anything about it. If there were any justice in this world I'd send them the bill for my new phone. Oh well.... just write the old phone off and continue, nothing more to do.
 
  • Like
Reactions: roirraW "edor" ehT

simplepinoi177

Forum Moderator
Staff member
I agree. It seems this time around the developers who write platform tools managed to do the impossible: fry a phone's motherboard with 34.01...

... I know all this is risky. What bothers me about these developers is that despite the fact that this update is known to fry motherboards, it is still online for download. In fact, it took quite a bit of Googling to find 33.0.1. I refuse to believe the developers don't monitor forums such as this one where I'm not the only one complaining. There is a MAJOR problem with 34.0.1 and they keep silent and refuse to do anything about it. ...
according to the posts below, Google has acknowledged it, but it is weird that it has not been taken down or made any warning on it; but then again, it's not just Pixels and/or Pixel 6 or 7 that uses platform-tools (the problem lies with not getting into fastbootD mode, which is a mode I believe only in Pixel 6 & 7; as I don't recall it in Pixel 5 or Pixel 2), so maybe Google doesn't want to remove it for it being used in all those other cases (as r34 & RC2 do supposedly address other specific fixes on bugs)....
Some minor good news regarding the platform tools bug, it seems someone from Google finally responded that they are aware of the issue and working on a fix. Maybe in 34.0.2 it will work. 😅

Google concerning Platform Tools bug:

"Thanks, we've identified the root cause of this issue and are working on a fix."

Edit: Ninja'd 😅

 
  • Like
Reactions: roirraW "edor" ehT

Dave_247

Senior Member
according to the posts below, Google has acknowledged it, but it is weird that it has not been taken down or made any warning on it; but then again, it's not just Pixels and/or Pixel 6 or 7 that uses platform-tools (the problem lies with not getting into fastbootD mode, which is a mode I believe only in Pixel 6 & 7; as I don't recall it in Pixel 5 or Pixel 2), so maybe Google doesn't want to remove it for it being used in all those other cases (as r34 & RC2 do supposedly address other specific fixes on bugs)....
In theory I believe it should affect any phone that relies on using fastbootd as part of it's update procedure, however as it's still a relatively new feature in the world of Android, where aside from Google themselves everyone else is notoriously slow to adopt things unless forced, I don't know of any other phones that this could affect as Samsung use their own flashing method and all of the others don't seem to be affected else this would have blown up in a much bigger thing, which I assumed to be because they don't use or rely upon the newer userspace fastboot, or maybe there is something else that I have no idea about.
 
  • Like
Reactions: roirraW "edor" ehT

WoKoschekk

Senior Member
Feb 25, 2019
1,575
1
488
Cologne
Moto G6
Moto G6 Plus
It's the fastboot flashall command that is used to flash a single ZIP with one single command. Every Pixel firmware has a bootloader.img, radio.img and the firmware ZIP inside the downloaded ZIP. This firmware ZIP needs the flashall command. It's a own flash routine to flash the images on their partitions.
 

WoKoschekk

Senior Member
Feb 25, 2019
1,575
1
488
Cologne
Moto G6
Moto G6 Plus
Screenshot_20230320-040436.png
 
  • Like
Reactions: roirraW "edor" ehT

pndwal

Senior Member
... It seems this time around the developers who write platform tools managed to do the impossible: fry a phone's motherboard with 34.01. The phone is not in the fastboot mode with the screen turned off. When you plug it into the PC, the PC won't see it at all. There is also no reaction when you plug it into a charger.

I had to bite the bullet and replace the phone...
The point re. 'Working Fastboot is possible with blackscreen' (again, it may well not apply to P7 series devices, but I only posted about the existence of this phenomenon; users will need to test) was NOT that "the phone is in the fastboot mode with the screen turned off"... Rather, some devices (incl. Qualcomm based) can enter fastboot without the user being aware because (due to some corruption) the screen may simply remain black...

The working method to fix such bricked devices (only know of success with older devices however) was to activate the flash before connecting device, then hold down vol- while connecting usb to PC to cause device to enter 'download' mode and drivers to discover and connect device (even while bootlooping or with 'dead' screen) and flashing to commence... This way the user becomes aware that fastboot flashing is working since there is no indication from device, and no indication on PC unless a trick like pressing vol- while plugging USB succeeds...

Clearly P7 series users would need to experiment with similar tricks to activate a fastboot mode 'blind', not simply hope for fastboot mode to be available when connecting device...

Some EDL mode may also be an avenue for P7 series users to explore... 🙃 PW
 
Last edited:
  • Like
Reactions: roirraW "edor" ehT

WoKoschekk

Senior Member
Feb 25, 2019
1,575
1
488
Cologne
Moto G6
Moto G6 Plus
was NOT that "the phone is in the fastboot mode with the screen turned off"...
no matter if screen is off... or only shows nothing but is turned on... or is simply dead, it will be recognized when it gets connected to a PC. Otherwise it's not in fastboot mode then. A dead screen and no signal via USB means the device is dead.

then hold down vol- while connecting usb to PC to cause device to enter 'download' mode
A Pixel will boot into fastboot mode that way. Connecting a power source to a turned off device boots the charger mode (not the system by default). However, doing this while keep pressing the Vol- button boots it into fastboot mode.
Till now there's no documentation about sth similar like download/EDL mode on a Tensor SoC. I guess Google didn't implement such option to make the devices more secure since EDL is known to bypass the security features of Qualcomm CPUs.
 

humb13

Senior Member
Nov 24, 2016
68
14
In theory I believe it should affect any phone that relies on using fastbootd as part of it's update procedure, however as it's still a relatively new feature in the world of Android, where aside from Google themselves everyone else is notoriously slow to adopt things unless forced

The problem with this logic is the fact that an older version (33.01) works perfectly whereas the newer one doesn't. Shouldn't it be the other way around? There is no question this is a major bug, and from what I'm seeing I'm not the only one who's been burned by it.

Why does the march update has been removed from their repository?

No it hasn't. I just checked and it's still on there. In fact, I upgraded my new Pixel 7 Pro (the one replacing the one the developers fried) with the March update using 33.0.1 and it worked perfectly.

Whatever you do, stick with 33.0.1 for now. Don't even touch 34.0.1.
 
  • Like
Reactions: ShadowJP88

WoKoschekk

Senior Member
Feb 25, 2019
1,575
1
488
Cologne
Moto G6
Moto G6 Plus
The problem with this logic is the fact that an older version (33.01) works perfectly whereas the newer one doesn't.

And that's the reason why (changelog 34.0.0 (February 2023)):

fastboot
  • Improved flashing: flashall will now skip reboots to userspace if it can.

You can read it also in the log of the repo for ADB/Fastboot:

First entry is 667b1ef, 7 weeks ago.
 

WhoIsJohnGalt1979

Senior Member
Jun 12, 2012
419
265
Google Pixel 7 Pro
Had a quick question for all the music aficionados who use a 3.5 mm to USB-C adaptor(small DAC) or use a USB-C DAC to listen to music. I hadn't used one for a while and have been using my Pixel Buds Pro since I got the Pixel 7 pro last year.

I recollect however, that on my Pixel 6 pro, for USB DAC to continue playing music when the screen goes off while using apps like UAPP and Neutron player, I had to set the Default USB configuration to "No Data Transfer". Lo behold, I had to do the same on my Pixel 7 pro too today for the same issue of music stopping on screen off while using a USB DAC. Both apps are set to Unrestricted battery usage.

Is the above the same for everyone else too? Am surprised this functionality hasn't been fixed for Android to handle in natively all this while.

Any comments are welcome in case I am doing something wrong or the issue manifests only in specific DACs.
 
  • Like
Reactions: roirraW "edor" ehT

simplepinoi177

Forum Moderator
Staff member
Had a quick question for all the music aficionados who use a 3.5 mm to USB-C adaptor(small DAC) or use a USB-C DAC to listen to music. I hadn't used one for a while and have been using my Pixel Buds Pro since I got the Pixel 7 pro last year.

I recollect however, that on my Pixel 6 pro, for USB DAC to continue playing music when the screen goes off while using apps like UAPP and Neutron player, I had to set the Default USB configuration to "No Data Transfer". Lo behold, I had to do the same on my Pixel 7 pro too today for the same issue of music stopping on screen off while using a USB DAC. Both apps are set to Unrestricted battery usage.

Is the above the same for everyone else too? Am surprised this functionality hasn't been fixed for Android to handle in natively all this while.

Any comments are welcome in case I am doing something wrong or the issue manifests only in specific DACs.
The thread below in the Pixel 7 (non-pro) forum express your issue as well -- while also coming up with the same workaround you have -- so you might be able to find/connect some other people there as well...!

 

Top Liked Posts

  • There are no posts matching your filters.
  • 12


    13.0.0 (TQ3A.230901.001, Sep 2023)FlashLink6b946f4db4b28d04ff436924f9e9dbf18f989df22c2298bbf7889f1a7db9d515
    13.0.0 (TQ3A.230901.001.C2, Sep 2023, Verizon, Verizon MVNOs)FlashLink5f2b98dc82b80b7f2753ecb2ed02d08689c3ccf53ceae6542b183da8f19e1e36


    7
    I'm not really understanding your complaint. Once stable Android 14 is out, won't the next beta be Android 15 QPR1?
    I also don't understand the article either. Aren't Betas released before the stable of that android version?
    Betas for Android OS versions are released before the stable versions, but these are separate from the QPR betas, which they started with the Pixel 6 series being released. The A14 QPR1 betas (there should be 3 of them, at least, one in each month) are to test the stable release of A14 QPR1, which will be released in December. Then they will start the A14 QPR2 betas, which will test the A14 QPR2 stable release in March. Finally, there will be the A14 QPR3 betas which will test the stable release of A14 QPR3 in June. Of course, all of this assumes they will continue with what they have been doing.

    Then, sometime in February of 2024 they will also release the 1st A15 beta (Developer Preview 1), assuming they abide by their earlier history.

    This year was different, however, with the first A14 QPR1 beta being released before the stable version of A14 will be released. The stable version of A14 was originally scheduled to be released with the September monthly build, but was delayed. Google then decided, for whatever reason, to release the first A14 QPR1 beta now instead of waiting for the first stable A14 build to be released first (Oct. 4).
    4
    Remember to unhide Magisk before you update. Sometimes not doing so has caused issues, and sometimes not.

    Magisk (this time confirmed Stable) v26.3 released:


    4

    10 AM

    No, I don't yet know if I'll go for the 8 Pro, but it's a possibility.
    DO.NOT.TEMPT.ME
    4
    It better be a good release! Cause I'm traveling next week for a month and I need my P7P to be reliable during that time. You can do it Google! 💪
  • 64
    Pixel 7 Pro [Cheetah]

    Updated July 13, 2023
    Note that multiple users in several threads have said that 34.0.4 did not work correctly for them. I recommend sticking with 33.0.3 (below):



    Google Pixel Update


    Here there be dragons. 🐉 I am not responsible for anything at all. 😹

    VERY IMPORTANT - On the Pixel 7/Pro, we use Magisk to patch init_boot.img, NOT boot.img AND we flash the patched init_boot to the init_boot partition - do not flash it to the boot partition.​

    Thanks to @edcsxz, @Lughnasadh, and @AndyYan for news about that and confirming it.

    Moved @mariusnoor's provided zero-day OTA.zip to Post #8 - Old news from the OP.

    Unlocking or locking the bootloader will wipe the device every single time, so be sure to have your data backed up before doing so, or better yet, just unlock it as soon as you get the device.​

    Keep in mind that unlocking the bootloader or rooting might affect your phone's capability to use banking apps such as Google Pay, your local bank's app, or even the ability to install some apps like NetFlix. See Post #2 - Unlocking Bootloader / Rooting / Updating | SafetyNet | ADB/Fastboot & Windows USB Drivers.​

    If you're going to re-lock the bootloader, make sure the ROM you have on your phone is completely stock (by flashing the latest official firmware) BEFORE re-locking it.​

    There are no permanent negative consequences if you unlock or re-lock the bootloader other than it will wipe your phone, and while your bootloader is unlocked you get a brief screen when you boot the phone telling you (and anyone who sees your phone at the time) that it's unlocked. You will also continue to receive updates (if you've merely unlocked the bootloader, you can take updates as normal) unlike Samsung, Sony, et cetera, which have permanent major consequences with reduced functionality even if you un-root and re-lock your bootloader. If you're actually rooted (not just bootloader unlocked), you'll have to perform extra steps to manually update each month, and to keep root/re-root.

    INDEX:

    • Post #2 - Unlocking Bootloader / Rooting / Updating | SafetyNet | ADB/Fastboot & Windows USB Drivers:
      • How to Root the first time / aka How to unlock the Bootloader
      • Unlocking Bootloader (required in order to root)
      • How to update each month (and also how to root)[requires an unlocked bootloader for updating via this factory image method]
        • OPTIONAL: If you want to flash both slots, after this first time, then after do the following
      • SafetyNet
      • Optional steps when updating - flashing custom kernels
        • The two schools of thought on disabling Verity and Verification
      • ADB/Fastboot and Windows USB Drivers - direct download links and the most recent changelog
    • Post #3 - Other, most important resources:
      • A list of other important apps
      • TWRP [not made for the Pixel 7 (or 6) Pro yet - will update when or if ever it has - don't hold your breath]
      • Factory Images (requires an unlocked bootloader)
      • Full OTA Images(doesn't require an unlocked bootloader - you can ask questions in this thread, but I won't be providing the steps necessary, as I always use the factory image)
        • @mariusnoor's provided official URL to download the zero-day OTA to TD1A.220804.031.
      • Check warranty status
      • Official Google Pixel Update and Software Repair (reported as of January 23, 2022 to still not be updated for the Pixel 6/Pro - no idea if it has yet now, or if it will be for the 7/Pro)
      • Official Google Pixel Install fingerprint calibration software (also available at the bottom of the Update and Software Repair page above) - I believe this is only helpful if you've replaced the screen - if it's anything like the Pixel 6 Pro: if you have the screen replaced, then you *must* have the fingerprint reader replaced as well.
      • Find problem apps, Magisk, and LSposed Modules by (three different methods)
      • Official Google Android Flash Tool (OEM Unlocking needs to be toggled on - you do not have to manually unlock the bootloader - their site will do that on its own)
      • How to determine if you already have Verity and Verification disabled (required for custom kernels for now)
      • How to unroot
    • Post #4 - Build ID definitions
    • Post #5 - Blank
    • Post #6 - Regarding P7P 5G model numbers and capabilities, and how to determine your hardware version
    • Post #7 - My personal advice for how to get your device back up and running as you had it before a factory reset
    • Post #8 - Old news from the OP

    Thank you to the following users who have all contributed greatly to my knowledge of Pixels since I came back to XDA a year ago after a few years of mostly inactivity. Apologies if I miss anybody. In alphabetical order:

    44

    Unlocking Bootloader / Rooting / Updating | SafetyNet | ADB/Fastboot & Windows USB Drivers


    Unlocking Bootloader / Rooting / Updating:

    How to Root the first time / aka How to unlock the Bootloader:
    Unlocking the bootloader will factory reset your device. There is no way around this. I highly suggest never re-locking your bootloader once you unlock it. If you do ever re-lock the bootloader, only do so after restoring the phone to 100% stock by using the latest Pixel 7 Pro Factory Image or Official Google Android Flash Tool.

    Verizon variants:
    Will never be able to have their bootloader unlocked. It's like winning the lottery, and just as rare and relatively random. There is nothing that anyone on XDA can do to help you unlock your Verizon variant.

    T-Mobile and AT&T variants:
    Can be unlocked once you pay the phone off, then you contact the carrier and arrange to Carrier unlock the phone. Once the phone is Carrier unlocked, then you can unlock the bootloader with the usual caveats (will wipe the device and there's no way around it).

    The direct-from-Google (or other retailers who aren't U.S. Carriers), the factory Carrier Unlocked Pixels:
    Can be bootloader unlocked at any time. I'd try it first before putting a SIM card in the phone. If OEM unlocking is grayed out, try connecting to Wi-Fi, and reboot if necessary. If it's still grayed out, try with your SIM card, and reboot again. Historically on Pixels, most of the time you can toggle OEM unlocking immediately, but occasionally some users have found it took a little while after being either connected to Wi-Fi or having your SIM card installed in it, and then eventually (hours? day? days?) you can toggle OEM unlocking.

    The rest of the world's carriers:
    No idea. Feel free to ask in the thread and hopefully, someone with specific knowledge will answer.

    Other than trying the things I mentioned above, there is nothing else that anyone on XDA can do to help get OEM unlocking to be ungrayed.

    Unlocking Bootloader (required in order to root)
    The one-time first steps are:
    1. Android Settings
    2. About phone
    3. Click on Build number repeatedly, about seven times
    4. Go back to the main Android Settings
    5. System
    6. Developer options
      • Toggle OEM unlocking on. See @Namelesswonder's tip below (this won't help with variants that are supposed to be bootloader locked):
        Also a little tip for anyone trying to enable OEM unlocking on a device and it is grayed out, you can force the phone to check for eligibility by connecting to the internet in whatever way, going to the dialer, and dialing *#*#2432546#*#* (CHECKIN).
        You should receive a notification from Google Play services with "checkin succeeded" and OEM unlocking should be available immediately if the device is eligible.
        Google account not needed, SIM not needed, no other setup required. Works on completely-skipped-setup-wizard. Just need to make sure to connect to the internet and select the connection as metered to avoid any updates.
      • Toggle USB debugging on.
      • [Optional] I highly suggest you also disable Automatic system updates. Note that in a situation such as the Android 12 serious bootloader security issue, this setting will not keep Google from forcing an update to come through anyway.
    7. How to actually root follows the same steps below as how to update each month.
    8. Download the latest ADB/Fastboot (SDK Platform Tools) and Windows USB Drivers.
    9. Unzip the Platform Tools and Drivers.
    10. NOTE: If you have USB drivers for other Android devices installed, like Samsung, they can alternately sometimes work and not work with Google Pixels. I recommend uninstalling those drivers, or at least updating that driver to Google's driver as instructed below (the Device Manager entry may be different with other OEMs).​

    11. The Windows USB Drivers may have to be installed twice:
      • The first time while your phone is running and unlocked as normal.
        1. In Windows, right-click on the Start Button and choose Device Manager.
        2. Plug your phone into the computer and look for the new hardware entry in Device Manager. Near the top of Device Manager should be Android Device. Click the drop-down arrow to the left of it.
        3. Below Android Device, it should now show Android Composite ADB Interface
        4. Right-click the Android Composite ADB Interface and choose Update driver
        5. Choose Browse my computer for drivers
        6. Click Browse and navigate to where you unzipped the Windows USB drivers to.
        7. Follow the prompts to install the driver.
        8. Keep Device Manager itself open - you'll need it again in a minute, but you can close any other Device Manager windows after you have installed the driver.
        9. Open a Command Prompt and navigate to the platform-tools folder.
        10. Run command:
          Code:
          adb devices
        11. On your Android device, you'll get an ADB prompt. Check the box to always give ADB permission and click OK.
        12. Confirm that the command results in a list of Android devices. When doing these producedures, you should only have the one device you want to work on connected, to keep things simple.
      • The second time to install the driver is while the phone is in Bootloader (fastboot mode), notFastbootD (fastbootd) mode. I know it's confusing.
        • Run command:
          Code:
          adb reboot bootloader
        • Repeat the instructions above starting with "Right-click the Android Composite ADB Interface".
          • This second time installing the drivers while in Bootloader (fastboot mode), it will show up as "Android Bootloader Interface". Thanks @simplepinoi177 for the suggestion to add this detail.
    12. Run command:
      Code:
      fastboot flashing unlock
    13. On the phone, press either the up or down volume button once until you see Unlock the bootloader |>| beside the power button.
    14. Press the power button. The phone will go black for a second and then show near the bottom Device state: unlocked.
    15. After these first-time steps to unlock the bootloader, if you want to root, continue below at the step:
    How to update each month (and also how to root) [requires an unlocked bootloader for updating via this factory image method]
    1. These three instructions only apply if you're already rooted and updating from one firmware version to another:
      • Made sure all Magisk Modules have been updated.
      • Disable all Magisk Modules.
      • UNhide Magisk!
    2. If you are going to use the Official Google Android Flash Tool, then skip the steps I indicate with FAB(Flash-All.Bat).
      • If using the Android Flash Tool to update/dirty flash, you should have the following items notselected:
        • Deselect Wipe
        • Deselect Force Flash all partitions (which will also wipe)
        • Deselect re-lock bootloader
    3. Always use the latest ADB/Fastboot (SDK Platform Tools) and Windows USB Drivers.
    4. Unzip the Platform Tools.
    5. Download the latest Pixel 7 Pro Factory Image (at the bottom of the "Cheetah" section).
    6. Unzip the factory image to the same platform-tools folder, i.e. so that flash-all.bat and all other files are in the same folder as ADB and Fastboot from the platform-tools.
    7. * FAB VERY important - Edit the flash-all.bat (on Windows) or flash-all.sh (on Linux) and remove the -w from the fastboot update image-cheetah-etcetera.zip line. This will keep the script from wiping your phone when you run it.
    8. Extract only the init_boot.img file from the image-cheetah-etcetera.zip to the same platform-tools folder.
    9. Copy the init_boot.img from the PC to the phone's internal storage.
    10. On the phone: Apply Magisk Stable to the new stock init_boot.img. NOTE: It is always possible that an Android Update (Monthly, QPR [Quarterly Platform Release], new major Android versions, and Beta versions) might need a new version of Magisk Stable, Beta, or Canary from GitHub to work correctly. XDA forum for Magisk is here.
      • Launch the Magisk app.
      • Beside "Magisk", click "Install".
      • Click "Select and Patch a File", and choose the init_boot.img that you just copied to the phone's storage.
    11. Copy the Magisk'd init_boot.img (filename similar to magisk_patched-25200_1a2B3c.img)back over to the computer.
    12. * FAB Run commands:
      Code:
      adb reboot bootloader
      flash-all.bat (on Windows)
      or
      flash-all.sh (on Linux)
      
      (Note:  At least two Apple Macintosh users had trouble using the flash-all.sh - at least one of those users, everything went smooth once they used a Windows PC for this part of the process)

      IMPORTANT - The flash-all will take several minutes and reboot on its own several times including to a mode called "FastbootD", and finally reboot into full Android when it's done. Do not interrupt this process. On the FastbootD screen on the phone, do not use any of the manual selection options - let the flash-all script do it's work. Do not unplug your phone until it has fully booted into Android.​

      Thanks to @PurppleMonkey and @xgerryx for suggesting a warning about this. Thanks to @simplepinoi177 for suggesting the "FastbootD" clarification.
    13. On the phone:
      • Wait for the phone to boot normally.
      • OPTIONAL: If you want to flash both slots, after this first time, then after do the following:

        • Code:
          adb reboot bootloader
          fastboot --set-active=other
          flash-all.bat
        So you're doing the flash-all.bat a second time on the second slot.
    14. On the computer:
      • Open a Command Prompt and navigate to the platform-tools folder.
      • Run command:
        Code:
        adb reboot bootloader
      • After phone has rebooted into Bootloader (Fastboot) mode, run command:
        Code:
        fastboot flash init_boot magisk_patched-25200_1a2B3c.img
        fastboot reboot
    15. Unlock the phone.
    16. Confirm that the phone boots completely normally.
    17. Cautiously re-enable Magisk Modules.
    18. Reboot.
    19. Confirm everything worked fine.
    20. If the phone won't boot correctly after having enabled Magisk Modules, see either of the two solutions below:
      • For the future, you don't need to go into safe mode unless that's your preference. I forgot what all it resets, but it's many settings and it's bothersome. I'd rather just reinstall my modules and not have to figure out those Android settings/changes which I come across days or weeks later when I infrequently do something. Have your phone reboot and run this:
        Code:
        adb wait-for-device shell magisk --remove-modules
        I like to just do this first:
        Code:
        adb devices
        So the server is running, then I have the long one pasted and ready to go once the phone turns off.
      • Find problem apps, Magisk, and LSposed Modules by (three different methods) section in my next post. After following that link, you may have to scroll up a little bit and the section title will be highlighted.

    SafetyNet:

    Use whichever of these is newer than the other:
    • @Displax Universal SafetyNet Fix Mod on XDA.
    • Official Universal SafetyNet Fix released by @kdrag0n available at XDA.
    1. Launch the Magisk app.
    2. Go to Magisk's Settings (Gear in top right).
      • Click Hide the Magisk app.
      • When you hide it, you'll have the optional opportunity to change the Magisk app's name to whatever you wish. It doesn't have to be complex to fool apps that check for Magisk.
      • Important: When you have the Magisk app hidden or renamed, you can accidentally install a new copy of Magisk. This situation won't work at all - neither copy of Magisk will work with two installed. This is one reason why I don't completely hide Magisk, so I can tell it's installed because I have it renamed as something easily recognizable.
      • Back to the Magisk app's Settings...
      • Click Systemless hosts. This adds a Magisk Module to Magisk, which you can verify in a later step.
      • Toggle Zygisk on.
      • Toggle Enforce DenyList on.
      • Click Configure DenyList.
        • Add every app that you want to explicitly deny root and the existence of root.
        • You can click the 3-dot menu and choose the options to display system and/or OS apps, if necessary.
        • Note that for many apps, it is not enough to click the single checkmark to the right of the app name in this list. For many but not all apps, you should click on the app name and you'll see it expand to two or more entries, each with its own toggles. In this expanded state, you can now check the single top checkbox beside the main app name and it'll toggle all individual sub-entries.
        • Some apps add new entries to this list from time to time, so if you find that an app used to work for you when rooted and doesn't now, check this list again and look for the entries that aren't fully checked. There will be an incomplete horizontal line above the apps that don't have all of their sub-entries toggled.
        • You can use the Search button at the top of this list to find specific apps quickly.
        • The most common apps you should definitely fully check in this list are:
          • IMPORTANT - There are some things, such as Google Play Services which it's fine to add to the DenyList, but it's perfectly normal when used in combination with the Universal SafetyNet Fix (USNF) that it is back to being unchecked the next time you visit the DenyList. Since USNF takes care of Google Play Services, you don't even have to add it to the DenyList in the first place.​

          • Google Play Store
          • Google Services Framework
          • Google Play Protect Service
          • Wallet
          • GPay
          • Any banking apps.
          • Any streaming apps that use DRM.
          • Any 2FA apps, especially those for work.
          • Some of those Google apps might not need denying, but it doesn't hurt to deny them.
          • Any time you toggle more entries in this list, it may be necessary to reboot the phone for it to take effect.
    3. From the main screen in the Magisk app, go to Modules at the bottom.
    4. Confirm that the Systemless hosts Magisk Module is added to this list, and enabled.
    5. Install the appropriate Magisk Module: Universal SafetyNet Fix referenced above these numbered instructions.
    6. Reboot.
    7. Install from the Play Store:
      • YASNAC - SafetyNet Checker
        • Launch it.
        • Click Run SafetyNet Attestation.
        • It should say:
          • Basic integrity: Pass
          • CTS profile match: Pass
          • Evaluation type: BASIC
      • Play Integrity API Checker
        • Launch it.
        • Click Check.
        • It should have the following with a green checkmark:
          • MEETS_DEVICE_INTEGRITY
          • MEETS_BASIC_INTEGRITY
        • It's normal for MEETS_STRONG_INTEGRITY to have a red X.
      • You don't have to keep these installed, although I keep them handy.
      • Sometimes, clearing app cache and/or data for apps like the Google Play Store, GPay, Wallet and others (and then rebooting) after these steps may help pass SafetyNet as well.
    8. See @V0latyle's explanation (and further linked post) for why we can't achieve STRONG_INTEGRITY with an unlocked bootloader.
    9. See @V0latyle's [DISCUSSION] Play Integrity API regarding why SafetyNet, per se, is actually defunct and replaced with Play Integrity - and New Official Universal SafetyNet Fix released by @kdrag0n v2.4.0 referenced in the steps above takes care of the latter.

    Optional steps when updating - flashing custom kernels:
    • Download the custom kernel of choice on the phone.
      • Be sure to read the particular installation instructions in the kernel threads' OP - any instructions in their OPs takes priority over anything I say here, which is generalized.​

        For now even the AK3 Zip versions of custom kernels requires Verity and Verification to be disabled.
        How to determine if you already have Verity and Verification disabled - see section in Post #3 - Other, most important resources
      • The two schools of thought on disabling Verity and Verification:
        • My post here. If you want to discuss it any, please do so in my thread, or at least not in that custom kernel thread, so as to keep the thread on-topic.
    • Extract the vbmeta.img file from the inner Zip of the factory image zip and put it in the same folder with the latest extracted platform-tools.
    • Hook the phone up to your computer and run the following commands:

      • Code:
        adb reboot bootloader
        [wait for the phone to reboot to bootloader (fastboot mode)]
        Code:
        fastboot flash vbmeta vbmeta.img --disable-verity
        fastboot reboot
    • Unlock the phone once it's booted up.
    • Make sure the Kernel Flasher app is up to date. XDA thread for the Kernel Flasher app is here.
    • Launch Kernel Flasher.
    • Select the slot that's mounted.
    • Choose Flash AK3 Zip.
    • Select the custom kernel zip just downloaded.
    • When it's done flashing, head to Android Settings and perform a Factory Reset, as is currently needed for Despair kernel.
    • If you failed to disable Verity and Verification ahead of time, if you have to, just force the phone off using these instructions: Turn your Pixel phone on & off, then press the Volume Down and Power buttons for a couple of seconds to get into the bootloader (fastboot mode). You'll still have to factory reset after disabling Verity in combination with this kernel, for now.
    • Whenever you use the flash-all to flash your phone, as long as you want to continue to disable Verity and Verification, you'll have to further modify the flash-all script as such:

      • Code:
        fastboot update image-cheetah-buildnumber.zip --disable-verity --disable-verification

    ADB/Fastboot & Windows USB Drivers:

    Platform Tools was updated in August 2022 to v33.0.3 (don't use the newer v34.0.0 - it has issues):

    Release Notes https://developer.android.com/studio/releases/platform-tools:

    33.0.3 (Aug 2022)​

    • adb
      • Don't retry adb root if first attempt failed.
      • Fix track-devices duplicate entry.
      • Add receive windowing (increase throughput on high-latency connections).
      • More specific error messages in the "more than one device" failure cases.
      • Reject unexpected reverse forward requests.
      • Fix install-multi-package on Windows.
    • fastboot
      • Remove e2fsdroid as part of SDK platform-tools.
      • Print OemCmdHandler return message on success.
    You'll need this if you're going to unlock the bootloader on your Pixel 7 Pro: SDK Platform Tools (download links for Windows, Mac, and Linux). Note that you can find links to download the tools elsewhere, but I wouldn't trust them - you never know if they've been modified. Even if the person providing the link didn't do anything intentionally, the tools could be modified without them being aware. Why take a chance of putting your phone security further at risk?

    You can alternately use the tools from the SDK Manager, but most of us will want to stick to the basic tools-only without the complications of the full development manager.
    For Windows, get Google's drivers here Get the Google USB Driver (ADB will likely work while the phone is fully booted, but if you're like me, you'll need these drivers for after you adb reboot-bootloader, to be able to use ADB and Fastboot.
    33
    Please test this UNSF build. Should be passing basic/device integrity.

    Use updated version from main post instead
    23

    Other, most important resources


    A list of other important apps: - be sure to thank the respective OPs:

    How to unroot
    One of these two options:
    1. Official Google Android Flash Tool (OEM Unlocking needs to be toggled on - you do not have to manually unlock the bootloader - their site will do that on its own).
      Select the options to:
      • Wipe
      • Force flash all partitions
      • Re-lock bootloader
    2. Flash the completely stock init_boot.img from the same firmware version that you're on:
      Code:
      adb reboot bootloader
      fastboot flash init_boot init_boot.img

    TWRP [not made for the Pixel 7 (or 6) Pro yet - will update when or if ever it has - don't hold your breath]
    I would guess that this should be the appropriate URL for official TWRP custom recovery for the Pixel 7 Pro, but who knows when/if that will actually be made available, and it may become available unofficially in these forum sections before being made official. I'll adjust this URL as needed. https://twrp.me/google/googlepixel7pro.html.

    Factory Images (requires an unlocked bootloader)
    It's also handy to have to the full official firmware available, whether it's to recover from accidents or for actual development. Note the official link to the general Factory Images for Nexus and Pixel Devices page. The following link goes directly to the Pixel 7 Pro (Cheetah) section: Pixel 7 Pro Factory Images. I prefer to actually bookmark a link to the device listed immediately below the device I want the firmware for, because Google dumbly (in my opinion) puts the latest firmware at the bottom of the list for each particular device, and that ends up making you scroll a lot after a year or two of monthly updates.

    Full OTA Images (doesn't require an unlocked bootloader - you can ask questions in this thread, but I won't be providing the steps necessary, as I always use the factory image)

    Check warranty status - *may* reveal if a phone is refurbished, only if the phone was refurbished through Google - thanks to @Alekos for making me aware of the site.

    Official Google Pixel Update and Software Repair (reported as of January 23, 2022 to still not be updated for the Pixel 6/Pro - no idea if it has yet now, or if it will be for the 7/Pro)

    Official Google Pixel Install fingerprint calibration software (also available at the bottom of the Update and Software Repair page above) - I believe this is only helpful if you've replaced the screen - if it's anything like the Pixel 6 Pro: if you have the screen replaced, then you *must* have the fingerprint reader replaced as well.

    Find problem apps, Magisk, and LSposed Modules by (three different methods):
    1. Google's Help Page for Find problem apps by rebooting to safe mode - this can be a lifesaver and keep you from having to do a restore to 100% complete stock or even from having to do a factory reset. This will deactivate all Magisk modules, and they'll remain deactivated even after you boot normally after briefly booting to safe mode. You can re-enable the Magisk modules as you wish to try to narrow down the problem if it was caused by a Magisk module. This can even get things working again after a Magisk Module wasn't finished installing and potentially causing a bootloop.
    2. You can also follow @Jon8RFC's advice:
      For the future, you don't need to go into safe mode unless that's your preference. I forgot what all it resets, but it's many settings and it's bothersome. I'd rather just reinstall my modules and not have to figure out those Android settings/changes which I come across days or weeks later when I infrequently do something. Have your phone reboot and run this:
      Code:
      adb wait-for-device shell magisk --remove-modules
      I like to just do this first:
      Code:
      adb devices
      So the server is running, then I have the long one pasted and ready to go once the phone turns off.
      Worked for me yesterday when I accidentally tried some old version of a Magisk Module. You have to reinstall your Magisk Modules, but if you're using a third-party widget, it won't disable them like Safe mode does.
    3. (May only be for mis-behaving LSposed modules):
      In the future try this

      adb wait-for-device shell su -c "touch /data/adb/modules/zygisk_lsposed/disable"
      adb reboot

      Official Google Android Flash Tool (OEM Unlocking needs to be toggled on - you do not have to manually unlock the bootloader - their site will do that on its own)
      OEM unlocking in developer options needs to be toggled on. I don't "believe" you have to actually do the "fastboot flashing unlock" command.

      How to determine if you already have Verity and Verification disabled (required for custom kernels for now)
      I keep seeing this asked, so I added a Magisk module for it to the linked Github release. With the module installed, you can just run:

      Code:
      su
      avbctl get-verity
      avbctl get-verification

      I spent way more time debugging that I downloaded Github's HTML of the update-binary script rather than the raw file than I care to admit. 🤦‍♂️ Off to bed.
      Alternative two more manual ways of checking:
      Since you´re probably already rooted anyway if you plan to flash this kernel, simply reboot your device. After you enter the device immediately take a kernel log with for example EXKM or any other app that allows to do that, terminal, etc.

      Look for that line
      [ 1.273480] init: [libfs_avb]AVB HASHTREE disabled on: /vendor_dlkm

      If you see this line, verity/verification should be disabled.
      I've seen several cases where having the ability to check would have been handy, so I pushed an avbctl binary built against the latest aosp sources here.

      The simplest way to use it would be the following:

      Code:
      adb push avbctl /data/local/tmp
      adb shell
      su
      cd /data/local/tmp
      chmod +x avbctl
      ./avbctl get-verity
      ./avbctl get-verification
    22
    I would expect that once 2.4.0 is released publicly, we should probably go back to using the official release, but conversely, as long as something works for you, there's also not necessarily a need to fix what isn't broken. Personally, I plan on switching once it's made completely public.

    Note that @Displax wasn't trying to replace the official version - they always kept it the same version as the most recent official along with "Mod", "Mod 2", or "Mod 2.1", so that suggests to me they were merely making temporary workarounds until/if the official was updated.
    Indeed. My MOD is a temporary solution until kdrag0n release accurate fix.

    I didn't change the update channel in the module on purpose so that everyone can upgrade to the new official version automatically without any problems.