Giter VIP home page Giter VIP logo

playintegrityfix's Introduction

Play Integrity Fix

This module tries to fix Play Integrity and SafetyNet verdicts to get a valid attestation.

NOTE

If you use a custom ROM, make sure it is signed with the maintainer's private keys, otherwise, you will never be able to pass the Device verdict.

This module is not made to hide the root, nor to avoid detections in other apps. It only serves to obtain the Device verdict in the Play Integrity tests and certify your device. All issues created to report a non-Google app not working will be closed without notice.

Tutorial

You will need root and Zygisk, so you must choose ONE of this three setups:

After flashing and reboot your device, you can check PI and SN using these apps:

NOTE: if you get an error message about a limit, you need to use another app, this is because a lot of users are requesting an attestation.

NOTE: SafetyNet is obsolete, more info here: https://developer.android.com/privacy-and-security/safetynet/deprecation-timeline

Also, if you are using custom rom or custom kernel, be sure that your kernel name isn't blacklisted, you can check it running uname -r command. This is a list of banned strings: https://xdaforums.com/t/module-play-integrity-fix-safetynet-fix.4607985/post-89308909

Verdicts

After requesting an attestation in Play Integrity API you should get this result:

  • MEETS_BASIC_INTEGRITY ✅
  • MEETS_DEVICE_INTEGRITY ✅
  • MEETS_STRONG_INTEGRITY ❌
  • MEETS_VIRTUAL_INTEGRITY ❌

You can know more about verdicts in this post: https://xdaforums.com/t/info-play-integrity-api-replacement-for-safetynet.4479337/

And in SafetyNet you should get this:

  • basicIntegrity: true
  • ctsProfileMatch: true
  • evaluationType: BASIC

NOTE: Strong verdict is impossible to pass on unlocked bootloader devices, there are few devices and "exploits" which will allow you to pass it, but, in normal conditions, this verdict will be green only if you are using stock ROM and locked bootloader. The old posts talking about Strong pass was an "exploit" in Google servers, obviously, now it's patched.

FAQ

https://xdaforums.com/t/pif-faq.4653307/

Download

https://github.com/chiteroman/PlayIntegrityFix/releases/latest

Donations

PayPal

playintegrityfix's People

Contributors

aviraxp avatar canerkaraca23 avatar chiteroman avatar dependabot[bot] avatar gradle-update-robot avatar hassanmirza01 avatar huskydg avatar osm0sis avatar tryigit avatar visionr1 avatar xantredev avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

playintegrityfix's Issues

Unable to update

Due to releases and source being nuked, I'm now stuck with an update option in Magisk but can't update. Could you repush 12.3 even if it's not fully working yet?
Screenshot_20231116-112917_M@gisk
Screenshot_20231116-112922_M@gisk
Screenshot_20231116-112928_M@gisk

Google play services crashing on A13

Process: com.google.android.gms.unstable
PID: 22219
UID: 10107
Frozen: false
Flags: 0xa0cabec5
Package: com.google.android.gms v234313039 (23.43.13 (190408-577232161))
PID: 22219
Foreground: No
Process-Runtime: 1945166
Build: realme/RMX3311EEA/RE58B2L1:13/TP1A.220905.001/S.1383667_1_12f:user/release-keys
Loading-Progress: 1.0
Dropped-Count: 0

Process name is com.google.android.gms.unstable, not key_process
keyProcess: 0


Build fingerprint: 'realme/RMX3311EEA/RE58B2L1:13/TP1A.220905.001/S.1383667_1_12f:user/release-keys'
Revision: '0'
ABI: 'arm64'
Timestamp: 2023-11-09 00:32:32.123713909+0200
Process uptime: 1946s
Cmdline: com.google.android.gms.unstable
pid: 22219, tid: 22237, name: binder:22219_1 >>> com.google.android.gms.unstable <<<
uid: 10107
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0000000000000000
Cause: null pointer dereference
x0 0000007ad8c6f2b8 x1 0000007ad8c6f1f0 x2 0000007ad8c6f1f0 x3 0000000001000000
x4 0000007b935142c0 x5 0000000000000000 x6 0000000000000000 x7 7f7f7f7f7f7f7f7f
x8 0000000000000000 x9 57095261bb896e1a x10 0000000000000042 x11 fffffffffffffffd
x12 0000007ad8c6da20 x13 0000000000000036 x14 0000007ad8c6ed68 x15 0000000034155555
x16 0000007b8278e9c8 x17 0000007b82711d90 x18 0000007a76f1c000 x19 0000007ad8c6f2b8
x20 0000007ad8c6f2b8 x21 0000007b9698353c x22 0000007b969834dc x23 0000007b82794098
x24 0000000001000000 x25 0000007ad8c70000 x26 0000007b969834e0 x27 0000000070f0eae0
x28 0000000000000000 x29 0000007ad8c6f1d0
lr 0000007b82714e90 sp 0000007ad8c6f1d0 pc 0000007b935142e4 pst 0000000060001000
backtrace:
#00 pc 00000000000c02e4 /system/lib64/libandroid_runtime.so (void android::(anonymous namespace)::ReadProperty<android::(anonymous namespace)::SystemProperties_getSS(_JNIEnv*, _jclass*, _jstring*, _jstring*)::$_0>(prop_info const*, android::(anonymous namespace)::SystemProperties_getSS(_JNIEnv*, _jclass*, _jstring*, _jstring*)::$_0&&)::'lambda'(void*, char const*, char const*, unsigned int)::__invoke(void*, char const*, char const*, unsigned int)+36) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#01 pc 000000000007ce8c /apex/com.android.runtime/lib64/bionic/libc.so (SystemProperties::ReadCallback(prop_info const*, void ()(void, char const*, char const*, unsigned int), void*)+260) (BuildId: e9653d1f6c173c6b86b171a5be6af6eb)
#2 pc 00000000000bff48 /system/lib64/libandroid_runtime.so (long android::(anonymous namespace)::SystemProperties_get_integralH(long, long)+52) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#3 pc 0000000000e8e1e4 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.OneTraceExtImpl.isOneTraceEnable+100)
#4 pc 0000000000e8e888 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.OneTraceExtImpl.isEnable+40)
#5 pc 0000000000bc565c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Binder.execTransactInternal+396)
#6 pc 0000000000bc5410 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Binder.execTransact+288)
#7 pc 0000000000333fa4 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+612) (BuildId: 4cfdaa9e5146c43e20ae36ee1caf9b7f)
#8 pc 0000000000332020 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeVirtualOrInterfaceWithVarArgsart::ArtMethod*(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+772) (BuildId: 4cfdaa9e5146c43e20ae36ee1caf9b7f)
#9 pc 0000000000561490 /apex/com.android.art/lib64/libart.so (art::JNI::CallBooleanMethodV(_JNIEnv*, _jobject*, _jmethodID*, std::__va_list)+192) (BuildId: 4cfdaa9e5146c43e20ae36ee1caf9b7f)
#10 pc 00000000000c4714 /system/lib64/libandroid_runtime.so (_JNIEnv::CallBooleanMethod(_jobject*, _jmethodID*, ...)+124) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#11 pc 0000000000179020 /system/lib64/libandroid_runtime.so (JavaBBinder::onTransact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+160) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#12 pc 0000000000054a1c /system/lib64/libbinder.so (android::BBinder::transact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+240) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#13 pc 000000000005fbd8 /system/lib64/libbinder.so (android::IPCThreadState::executeCommand(int)+1036) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#14 pc 000000000005f700 /system/lib64/libbinder.so (android::IPCThreadState::getAndExecuteCommand()+164) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#15 pc 000000000005ffc4 /system/lib64/libbinder.so (android::IPCThreadState::joinThreadPool(bool)+72) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#16 pc 000000000009007c /system/lib64/libbinder.so (android::PoolThread::threadLoop()+28) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#17 pc 0000000000013414 /system/lib64/libutils.so (android::Thread::_threadLoop(void*)+424) (BuildId: a14105df1ece31a331c10a1341ca9da3)
#18 pc 00000000000cd5a0 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::javaThreadShell(void*)+144) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#19 pc 00000000000e5a08 /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+208) (BuildId: e9653d1f6c173c6b86b171a5be6af6eb)
#20 pc 000000000007f27c /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+68) (BuildId: e9653d1f6c173c6b86b171a5be6af6eb)

Gms.unstable crashing v11 pre-release

Process: com.google.android.gms.unstable
PID: 13247
UID: 10099
Frozen: false
Flags: 0xa0cabec5
Package: com.google.android.gms v234313039 (23.43.13 (190408-577232161))
PID: 13247
Foreground: No
Process-Runtime: 800
Build: realme/RMX3311EEA/RE58B2L1:13/TP1A.220905.001/S.1383667_1_12f:user/release-keys
Loading-Progress: 1.0
Dropped-Count: 0

Process name is com.google.android.gms.unstable, not key_process
keyProcess: 0


Build fingerprint: 'realme/RMX3311EEA/RE58B2L1:13/TP1A.220905.001/S.1383667_1_12f:user/release-keys'
Revision: '0'
ABI: 'arm64'
Timestamp: 2023-11-07 14:14:26.137589617+0200
Process uptime: 2s
Cmdline: com.google.android.gms.unstable
pid: 13247, tid: 13360, name: binder:13247_2 >>> com.google.android.gms.unstable <<<
uid: 10099
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0000000000000000
Cause: null pointer dereference
x0 00000070615802b8 x1 00000070615801f0 x2 00000070615801f0 x3 0000000001000000
x4 00000071811402c0 x5 0000000000000000 x6 0000000000000000 x7 7f7f7f7f7f7f7f7f
x8 0000000000000000 x9 3e869ab436886e8b x10 000000000000001f x11 fffffffffffffffd
x12 000000706157ea20 x13 000000000000001a x14 000000706157fd68 x15 0000000034155555
x16 000000716ab2b9c8 x17 000000716aaaed90 x18 0000007061028000 x19 00000070615802b8
x20 00000070615802b8 x21 000000718d2ab53c x22 000000718d2ab4dc x23 000000716ab31098
x24 0000000001000000 x25 0000007061581000 x26 000000718d2ab4e0 x27 000000006fa11ae0
x28 0000000000000000 x29 00000070615801d0
lr 000000716aab1e90 sp 00000070615801d0 pc 00000071811402e4 pst 0000000060001000
backtrace:
#00 pc 00000000000c02e4 /system/lib64/libandroid_runtime.so (void android::(anonymous namespace)::ReadProperty<android::(anonymous namespace)::SystemProperties_getSS(_JNIEnv*, _jclass*, _jstring*, _jstring*)::$_0>(prop_info const*, android::(anonymous namespace)::SystemProperties_getSS(_JNIEnv*, _jclass*, _jstring*, _jstring*)::$_0&&)::'lambda'(void*, char const*, char const*, unsigned int)::__invoke(void*, char const*, char const*, unsigned int)+36) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#01 pc 000000000007ce8c /apex/com.android.runtime/lib64/bionic/libc.so (SystemProperties::ReadCallback(prop_info const*, void ()(void, char const*, char const*, unsigned int), void*)+260) (BuildId: e9653d1f6c173c6b86b171a5be6af6eb)
#2 pc 00000000000bff48 /system/lib64/libandroid_runtime.so (long android::(anonymous namespace)::SystemProperties_get_integralH(long, long)+52) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#3 pc 0000000000e8e1e4 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.OneTraceExtImpl.isOneTraceEnable+100)
#4 pc 0000000000e8e888 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.OneTraceExtImpl.isEnable+40)
#5 pc 0000000000bc565c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Binder.execTransactInternal+396)
#6 pc 0000000000bc5410 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Binder.execTransact+288)
#7 pc 0000000000333fa4 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+612) (BuildId: 4cfdaa9e5146c43e20ae36ee1caf9b7f)
#8 pc 0000000000332020 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeVirtualOrInterfaceWithVarArgsart::ArtMethod*(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+772) (BuildId: 4cfdaa9e5146c43e20ae36ee1caf9b7f)
#9 pc 0000000000561490 /apex/com.android.art/lib64/libart.so (art::JNI::CallBooleanMethodV(_JNIEnv*, _jobject*, _jmethodID*, std::__va_list)+192) (BuildId: 4cfdaa9e5146c43e20ae36ee1caf9b7f)
#10 pc 00000000000c4714 /system/lib64/libandroid_runtime.so (_JNIEnv::CallBooleanMethod(_jobject*, _jmethodID*, ...)+124) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#11 pc 0000000000179020 /system/lib64/libandroid_runtime.so (JavaBBinder::onTransact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+160) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#12 pc 0000000000054a1c /system/lib64/libbinder.so (android::BBinder::transact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+240) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#13 pc 000000000005fbd8 /system/lib64/libbinder.so (android::IPCThreadState::executeCommand(int)+1036) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#14 pc 000000000005f700 /system/lib64/libbinder.so (android::IPCThreadState::getAndExecuteCommand()+164) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#15 pc 000000000005ffc4 /system/lib64/libbinder.so (android::IPCThreadState::joinThreadPool(bool)+72) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#16 pc 000000000009007c /system/lib64/libbinder.so (android::PoolThread::threadLoop()+28) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#17 pc 0000000000013414 /system/lib64/libutils.so (android::Thread::_threadLoop(void*)+424) (BuildId: a14105df1ece31a331c10a1341ca9da3)
#18 pc 00000000000cd5a0 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::javaThreadShell(void*)+144) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#19 pc 00000000000e5a08 /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+208) (BuildId: e9653d1f6c173c6b86b171a5be6af6eb)
#20 pc 000000000007f27c /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+68) (BuildId: e9653d1f6c173c6b86b171a5be6af6eb)

root detection

v11 cause some bank app detect root

roll back to v10 all work fine

Can you add a feature

Sony video enhancement also fix with Kdrag0n safetynet fix, but safetynet broken after Google's update so I try some other modules to fix it.
Both yours and Displax's just fix the safetynet but video enhancement fix doesn't support yet.
Thank you so much if you can add this feature

MEET_DEVICE_INTEGRITY not passing on v9.9 (OnePlus 7 Pro GM1913, Android 13 Custom ROM)

Just saw your posts in the XDA thread. Sorry to bother you!

Hello! Hopefully this is the right place to ask.

Contactless payment stopped working on my OnePlus 7 Pro (Project Elixir Custom ROM if that matters) randomly today. I saw your posts on Reddit instructing to try installing either your module or the SN Fix 2.4.0 MOD.

In my case, neither of them allow me to pass MEET_DEVICE_INTEGRITY in the Play Integrity API Checker. I've got the Magisk app hidden with Zygisk enabled, DenyList enforced with all of my banking apps added to it, as well as all Google Apps and services (including Wallet of course). I should probably mention the basic integrity check passes with no issues and so do all YASNAC checks. None of my other banking apps detect root either.

I'd appreciate your help greatly!

Edit: Tried v11 as well, but to no avail.

V13 gms crashing

Process: com.google.android.gms.unstable
PID: 10662
UID: 10101
Frozen: false
Flags: 0xa0cabec5
Package: com.google.android.gms v234414039 (23.44.14 (190408-580326705))
PID: 10662
Foreground: No
Process-Runtime: 73341
Build: realme/RMX3311EEA/RE58B2L1:13/TP1A.220905.001/S.1383667_1_12f:user/release-keys
Loading-Progress: 1.0
Dropped-Count: 0

Process name is com.google.android.gms.unstable, not key_process
keyProcess: 0


Build fingerprint: 'realme/RMX3311EEA/RE58B2L1:13/TP1A.220905.001/S.1383667_1_12f:user/release-keys'
Revision: '0'
ABI: 'arm64'
Timestamp: 2023-11-16 23:18:04.682636941+0200
Process uptime: 74s
Cmdline: com.google.android.gms.unstable
pid: 10662, tid: 13680, name: binder:10662_6 >>> com.google.android.gms.unstable <<<
uid: 10101
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0000000000000000
Cause: null pointer dereference
x0 000000768f4fd2b8 x1 000000768f4fd1f0 x2 000000768f4fd1f0 x3 0000000001000000
x4 000000772b7052c0 x5 0000000000000011 x6 000000768f4fd1f2 x7 00000001da8efd37
x8 0000000000000000 x9 0000007693d66000 x10 0101010101010101 x11 0101010101010101
x12 00000076a4333e68 x13 00000076a4333e88 x14 0000000000000004 x15 0000000071eabc30
x16 0000007693d637d8 x17 000000773bf5c8c0 x18 0000007627600000 x19 000000768f4fd2b8
x20 000000768f4fd2b8 x21 00000077495b353c x22 00000077495b34dc x23 000000773bfe2098
x24 0000000001000000 x25 000000768f4fe000 x26 00000077495b34e0 x27 0000000070d21ae0
x28 0000000000000000 x29 000000768f4fd1d0
lr 000000773bf62e90 sp 000000768f4fd1d0 pc 000000772b7052e4 pst 0000000080001000
backtrace:
#00 pc 00000000000c02e4 /system/lib64/libandroid_runtime.so (void android::(anonymous namespace)::ReadProperty<android::(anonymous namespace)::SystemProperties_getSS(_JNIEnv*, _jclass*, _jstring*, _jstring*)::$_0>(prop_info const*, android::(anonymous namespace)::SystemProperties_getSS(_JNIEnv*, _jclass*, _jstring*, _jstring*)::$_0&&)::'lambda'(void*, char const*, char const*, unsigned int)::__invoke(void*, char const*, char const*, unsigned int)+36) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#01 pc 000000000007ce8c /apex/com.android.runtime/lib64/bionic/libc.so (SystemProperties::ReadCallback(prop_info const*, void ()(void, char const*, char const*, unsigned int), void*)+260) (BuildId: e9653d1f6c173c6b86b171a5be6af6eb)
#2 pc 00000000000bff48 /system/lib64/libandroid_runtime.so (long android::(anonymous namespace)::SystemProperties_get_integralH(long, long)+52) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#3 pc 0000000000e8e1e4 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.OneTraceExtImpl.isOneTraceEnable+100)
#4 pc 0000000000e8e888 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.OneTraceExtImpl.isEnable+40)
#5 pc 0000000000bc565c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Binder.execTransactInternal+396)
#6 pc 0000000000bc5410 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Binder.execTransact+288)
#7 pc 0000000000333fa4 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+612) (BuildId: 4cfdaa9e5146c43e20ae36ee1caf9b7f)
#8 pc 0000000000332020 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeVirtualOrInterfaceWithVarArgsart::ArtMethod*(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+772) (BuildId: 4cfdaa9e5146c43e20ae36ee1caf9b7f)
#9 pc 0000000000561490 /apex/com.android.art/lib64/libart.so (art::JNI::CallBooleanMethodV(_JNIEnv*, _jobject*, _jmethodID*, std::__va_list)+192) (BuildId: 4cfdaa9e5146c43e20ae36ee1caf9b7f)
#10 pc 00000000000c4714 /system/lib64/libandroid_runtime.so (_JNIEnv::CallBooleanMethod(_jobject*, _jmethodID*, ...)+124) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#11 pc 0000000000179020 /system/lib64/libandroid_runtime.so (JavaBBinder::onTransact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+160) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#12 pc 0000000000054a1c /system/lib64/libbinder.so (android::BBinder::transact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+240) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#13 pc 000000000005fbd8 /system/lib64/libbinder.so (android::IPCThreadState::executeCommand(int)+1036) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#14 pc 000000000005f700 /system/lib64/libbinder.so (android::IPCThreadState::getAndExecuteCommand()+164) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#15 pc 000000000005ffc4 /system/lib64/libbinder.so (android::IPCThreadState::joinThreadPool(bool)+72) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#16 pc 000000000009007c /system/lib64/libbinder.so (android::PoolThread::threadLoop()+28) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#17 pc 0000000000013414 /system/lib64/libutils.so (android::Thread::_threadLoop(void*)+424) (BuildId: a14105df1ece31a331c10a1341ca9da3)
#18 pc 00000000000cd5a0 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::javaThreadShell(void*)+144) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#19 pc 00000000000e5a08 /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+208) (BuildId: e9653d1f6c173c6b86b171a5be6af6eb)
#20 pc 000000000007f27c /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+68) (BuildId: e9653d1f6c173c6b86b171a5be6af6eb)

Netflix not showing in playstore

Netflix is not available in playstore even if it passes play integrity. I tried clear data of playstore and playservices, and I'm using latest fix.it passes play integrity.
Screenshot_20231117-075158_Google_Play_Store
Screenshot_20231117-075208_Google_Play_Store
Screenshot_20231117-075227_KernelSU

This phone can't be set up to use tap to pay.

Hello I have been having issues with trying to get the Integrity Fix working again after resetting my phone due to a boot loop and I have reinstalled magisk, then I have also installed the Integrity Fix and its BASIC but I can't add my card so I am unable to use google wallet/ pay

Can you please publish the full source code?

Hello and thank you for releasing and supporting such a good module!

Being security-paranoid, i'm afraid of using closed-source root modules.
Can you please publish all the rest of the source code and build scripts?
Especially sources for the java part (classes.dex)
And also module building parts like post-fs-data.sh etc
I think it would be useful for supporting the android root ecosystem security

Thank you again!

Explain what the module does

Can you add a more detailed explanation to the README?

The set properties are self-explanatory, but what fields are modified in android.os.Build to make it work?

Device mismatched by Google

The props that are being modified by the module breaks Google device detection and makes some Pixel features unusable.

To reproduce :
Goto Google Device Activity then disconnect from your device then reconnect, Your device will change it's name, In my case it either detects as Nexus or Asus.

CTS Profile & Basic Integrity were failed

Redmi K40
xiaomi.eu 14.0.6.0 (Android 13 TKQ1.220829.002)
Magisk 26.4
LSPosed 1.9.2
PlayIntegrityFix v12.3

safetynet check result:
CTS Profile --> Failed
basic Integrity --> Failed

BUT PlayIntegrityFix downgrade to V9.8,CTS profile & basic Integrity were PASS.

Question: Xiaomi.eu

Hello, thank a lot for your work!

I tried to look for a reason why the play integrity checks don't work in Xiaomi.eu roms but I failed to understand the exact cause.

It seems that even though the checks fail I can still use Google Wallet but I find it somewhat fragile. It used to work for a couple of days and then stopped working.
Is it because of Xiaomi.eu rom?

May I ask you to provide more details related to the issue?
I'd also be very glad if you can suggest some alternatives, workarounds, additional modules to use, etc.

Thank you!

[ pixel 8 - device integrity fail ]

Screenshot_20231117-013316
Screenshot_20231117-013028

Device : pixel 8 latest stock rom

Bootloader : relocked - kernelsu resigned

Using zygisk next + v13 play integrity fix

Device integrity : NO

Integrity check not passing

OnePlus 7t pro
Magisk delta 26301
Crdroid android 13
Latest V13 of integrity module
Tried to clear cache of Google wallet Google play store
Cleared data and cache of Google services framework
Cleared cache of gms
Rebooted tried removing and reinstalling module
Still not passing

Checked in Google play store itself as well

Screenshot_20231117-111514_TB Checker

I am a newbie

Sorry to bother, how do I flush your module, I already have the magisk installed.

Thank you

Clarification on documentation and GMS

Main page here states:

If you are using Shamiko and have deny list disabled, you must manually add GMS main and unstable processes to hide list or DroidGuard will detect root.

However there is a bunch of conflicting info in the XDA thread. It appears that if using the PIF module you do not need to add GMS (or any GApps) to the Deny List. I also think I saw a post from you stating this and it is confirmed not to be needed by me and other users.

This bit in the docs brings up confusion. Can you update it to remove or clarify this requirement for use with PIF?

Thanks man!

Device integrity pass but wallet does not work

Android version 14
evolution X custom rom
Mod version 13
Basic and device integrity passes
Google wallet>account>tap to pay set up, "phone does not meet security requirements"
Google Playstore ,framework and wallet data formated

CTS Profile fail on One UI 5.1 and microg

This module is the best I have ever tried for passing safetynet and play integrity, however, while it works on the same rom setup (rooted samsung stock one ui) with original play services, it does not seem to pass CTS Profile check on microg no matter what I do, I tried reinstalling the rom many times and use different approaches to hide root like denylist, magisk hide and even shamiko, cts profile seems unbothered, could it be module related or does it depend on my rom?

Suggestion: Closed Source But Code Audited By Trusted Members

Hi, person formerly known on XDA as 73Sydney here,

Just wanted to float a suggestion here, as i no longer XDA, but given years worth of questioning over closed source root related apps/frameworks...Magisk Alpha springs to mind as one closed source project that still garners FUD (i use it myself and dont panic), i thought id float the idea of perhaps negating mistrust with this project going closed source by suggesting it be peer reviewed by a trusted XDA member, and theres a very short list i would suggest and at the top of mine would be @osm0sis, as his knowledge of magisk etc and involvement gives him rare experience and credibility.

While in some projects, see Magisk Alpha as mentioned earlier, this isnt always possible, i personally believe where possible anything thats injecting code on a users device should be either open sourced or ideally at worst peer reviewed/audited.

Just my 5 cents....

Confusing thing

In app play intregity shows this
Screenshot_20231117-062257_Play Integrity API Checker

But in the TB checker app different results
Screenshot_20231117-062243_TB Checker

I use v13

Gms crashing v12.2 version

Process: com.google.android.gms.unstable
PID: 10897
UID: 10107
Frozen: false
Flags: 0xa0cabec5
Package: com.google.android.gms v234414039 (23.44.14 (190408-580326705))
PID: 10897
Foreground: No
Process-Runtime: 17969
Build: realme/RMX3311EEA/RE58B2L1:13/TP1A.220905.001/S.1383667_1_12f:user/release-keys
Loading-Progress: 1.0
Dropped-Count: 0

Process name is com.google.android.gms.unstable, not key_process
keyProcess: 0


Build fingerprint: 'realme/RMX3311EEA/RE58B2L1:13/TP1A.220905.001/S.1383667_1_12f:user/release-keys'
Revision: '0'
ABI: 'arm64'
Timestamp: 2023-11-10 21:24:20.242693211+0200
Process uptime: 18s
Cmdline: com.google.android.gms.unstable
pid: 10897, tid: 10914, name: binder:10897_2 >>> com.google.android.gms.unstable <<<
uid: 10107
signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x0000000000000000
Cause: null pointer dereference
x0 00000075b92fc2b8 x1 00000075b92fc1f0 x2 00000075b92fc1f0 x3 0000000001000000
x4 00000076c81cb2c0 x5 0000000000000000 x6 0000000000000000 x7 7f7f7f7fff7f7f7f
x8 0000000000000000 x9 10796aff2d565fe4 x10 0000000000000026 x11 fffffffffffffffd
x12 00000075b92faa10 x13 000000000000001a x14 00000075b92fbd58 x15 0000000034155555
x16 00000076cc18c9c8 x17 00000076cc10fd90 x18 00000000f601f7f6 x19 00000075b92fc2b8
x20 00000075b92fc2b8 x21 00000076db14353c x22 00000076db1434dc x23 00000076cc192098
x24 0000000001000000 x25 00000075b92fd000 x26 00000076db1434e0 x27 0000000070372ae0
x28 0000000000000000 x29 00000075b92fc1d0
lr 00000076cc112e90 sp 00000075b92fc1d0 pc 00000076c81cb2e4 pst 0000000060001000
backtrace:
#00 pc 00000000000c02e4 /system/lib64/libandroid_runtime.so (void android::(anonymous namespace)::ReadProperty<android::(anonymous namespace)::SystemProperties_getSS(_JNIEnv*, _jclass*, _jstring*, _jstring*)::$_0>(prop_info const*, android::(anonymous namespace)::SystemProperties_getSS(_JNIEnv*, _jclass*, _jstring*, _jstring*)::$_0&&)::'lambda'(void*, char const*, char const*, unsigned int)::__invoke(void*, char const*, char const*, unsigned int)+36) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#01 pc 000000000007ce8c /apex/com.android.runtime/lib64/bionic/libc.so (SystemProperties::ReadCallback(prop_info const*, void ()(void, char const*, char const*, unsigned int), void*)+260) (BuildId: e9653d1f6c173c6b86b171a5be6af6eb)
#2 pc 00000000000bff48 /system/lib64/libandroid_runtime.so (long android::(anonymous namespace)::SystemProperties_get_integralH(long, long)+52) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#3 pc 0000000000e8e1e4 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.OneTraceExtImpl.isOneTraceEnable+100)
#4 pc 0000000000e8e888 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.OneTraceExtImpl.isEnable+40)
#5 pc 0000000000bc565c /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Binder.execTransactInternal+396)
#6 pc 0000000000bc5410 /data/misc/apexdata/com.android.art/dalvik-cache/arm64/boot.oat (android.os.Binder.execTransact+288)
#7 pc 0000000000333fa4 /apex/com.android.art/lib64/libart.so (art_quick_invoke_stub+612) (BuildId: 4cfdaa9e5146c43e20ae36ee1caf9b7f)
#8 pc 0000000000332020 /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeVirtualOrInterfaceWithVarArgsart::ArtMethod*(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, art::ArtMethod*, std::__va_list)+772) (BuildId: 4cfdaa9e5146c43e20ae36ee1caf9b7f)
#9 pc 0000000000561490 /apex/com.android.art/lib64/libart.so (art::JNI::CallBooleanMethodV(_JNIEnv*, _jobject*, _jmethodID*, std::__va_list)+192) (BuildId: 4cfdaa9e5146c43e20ae36ee1caf9b7f)
#10 pc 00000000000c4714 /system/lib64/libandroid_runtime.so (_JNIEnv::CallBooleanMethod(_jobject*, _jmethodID*, ...)+124) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#11 pc 0000000000179020 /system/lib64/libandroid_runtime.so (JavaBBinder::onTransact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+160) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#12 pc 0000000000054a1c /system/lib64/libbinder.so (android::BBinder::transact(unsigned int, android::Parcel const&, android::Parcel*, unsigned int)+240) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#13 pc 000000000005fbd8 /system/lib64/libbinder.so (android::IPCThreadState::executeCommand(int)+1036) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#14 pc 000000000005f700 /system/lib64/libbinder.so (android::IPCThreadState::getAndExecuteCommand()+164) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#15 pc 000000000005ffc4 /system/lib64/libbinder.so (android::IPCThreadState::joinThreadPool(bool)+72) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#16 pc 000000000009007c /system/lib64/libbinder.so (android::PoolThread::threadLoop()+28) (BuildId: f8bf2eec502e0e2b2f0020036c32cdd5)
#17 pc 0000000000013414 /system/lib64/libutils.so (android::Thread::_threadLoop(void*)+424) (BuildId: a14105df1ece31a331c10a1341ca9da3)
#18 pc 00000000000cd5a0 /system/lib64/libandroid_runtime.so (android::AndroidRuntime::javaThreadShell(void*)+144) (BuildId: 9e59e66cb05b88d47dd2e4e2bf3fb3eb)
#19 pc 00000000000e5a08 /apex/com.android.runtime/lib64/bionic/libc.so (__pthread_start(void*)+208) (BuildId: e9653d1f6c173c6b86b171a5be6af6eb)
#20 pc 000000000007f27c /apex/com.android.runtime/lib64/bionic/libc.so (__start_thread+68) (BuildId: e9653d1f6c173c6b86b171a5be6af6eb)

[Not an issue] Discord Server

Hello. Would you mind creating a discord server for Play Integrity Fix? I think it would be really benefitial to create some private rooms for development so google employees can't clearly see what are you trying to achieve in order to bypass play integrity other way than just replacing fingerprint.

If you would be into it, i can, of couse, help you with setting up the discord server.

Failing to pass safetynet check

OnePlus 7T Pro
Crdroid 9.10
Magisk delta 26301
Play integrity fix 12.3

YASNAC safetynet attestation failing
Gpay doesn't work
Haven't changed anything in magisk or anywhere else just starting failing
Was working fine yesterday morning but now the check fails

Screenshot_20231116-091807_Yet Another SafetyNet Attestation Checker

I will flash play integrity v13 but Gpay don't working

I am follow all this steps

Clear Google Wallet cache.
Clear Google Play Store cache.
Clear GSF (com.google.android.gsf) data and cache.
Flash my module in Magisk/KernelSU (if you already have my module, just ignore this step)
Then reboot device and should work. Also some users recommend to clear GMS data and cache but for me it wasn't necessary.

Xiaomi mi 11 t pro. Help me please.
Screenshot_2023-11-17-00-38-39-576_gr nikolasspyr integritycheck

Module breaks Google Play Services

Hello, I'm using Nothing Phone 2.
The fix was working for me earlier but now it breaks play services for me when I flash it. Nothing works. Google/Chrome/ Other Apps all stop working.

They start to function again when I disable the module.

I'm using lsposed as well but that doesn't seem to affect anything.

Error getting token from Google -Api error

When I try the play integrity API checker on my pixel 7 pro a message shows up:"Error getting token from Google
The calling app UID (user id) does not match the one from Package Manager.
This shouldn't happen. If it does please open an issue on Github."

When I use YASNAC the result is:"Google Play Services API error
17: APLNOT_CONNECTED"

Wallet tap to pay broke today

I saw on XDA this happened to quite a few people and I am posting here because I would like to help not just myself but others too.

So, how can I help figuring out what the change was?

I have a Pixel 4 (flame), Magisk 26.4, Safetynet v12.1. I used Displax’s before.

My Denylist contained Wallet and YASNAC. YASNAC passes Basic and CTS. Installed https://github.com/1nikolas/play-integrity-checker-app added to denylist, as expected it passed MEETS_DEVICE_INTEGRITY and MEETS_BASIC_INTEGRITY and fails MEETS_STRONG_INTEGRITY. So far so good.

But still, wallet tap to pay no longer works and complains the phone is not secure. I have hidden Magisk and rebooted, no change.

Had Systemless Host and Tarb modules installed, disabled them and rebooted, no change.

How do I proceed?

Reboot not necessarily required

Issue

The README says to clear the caches,.optionally install the module and restart the app. If the user has installed the module but forgot to clear caches or did not do it correctly, they do not necessarily need to reboot the device.

Solution

Reword the README so that it includes that if the module is correctly installed, but integrity is still failing, clearing the cache, as well as stopping Google Wallet in the settings and starting it again works too.

Additional context

I assume rebooting effectively does the same. We clear the cache, so that at the next time the app starts the integrity status does not persist. Stopping the app after clearing the cache has the same effect.

Automatically clear the cache of the apps

Issue

When Google updates their signatures, we have to update the module and clear the caches of each of the mentioned apps manually. This is tedious work that can be automated.

Solution

Automatically clear the cache of the apps (with approval by pressing the volume buttons for example) when installing the module.

Pixel 8 Pro cannot pass CTS profile match(KernelSU)

On the same system and device, Magisk 26.4 can work normally, but KernelSU cannot pass the verification.

Screenshot_20231118-192223
Screenshot_20231118-192253
Screenshot_20231118-192300

Thank you for reading.

Device: Google Pixel 8 Pro(husky)
System: Android 14 UD1A.231105.004
KernelSU: 11366
Play Integrity Fix: v13.0
Zygisk Next: v4.0.8.1

Error getting token from Google

"The calling app is making too many requests to the API and hence is throttled.

This shouldn't happen. If it does please open an issue on Github"
the message I've got when API checking. Payments wasn't working, but when I deleted your module from magisk it have worked. Thank you

App Breaking

Just saw your thread and use this one safetynet-fix-mod
Sorry and case closed thankyou

Some Apps are breaking and loop forcing close google chrome, photos, facebook etc..
Tested: V9.9 and V11
Devices Android 10, Magisk Official

How to refresh FCM tokens after clear GSF data

Once the GSF data is cleared, it will generate a new DeviceID, and seems all the old FCM tokens stopped working. So all the apps are unable to receive FCM push by their previous registered tokens.

In Google's official FCM document: https://firebase.google.com/docs/cloud-messaging/manage-tokens

It says the token can be invalid, and the apps should refresh the token. So is there any way to manually make the old token invalid, and let the apps register a new token, except clear data/reinstalling the apps (I don't want to re-configure lots of apps)

Gms crashing on Pixel 7

backtrace:

11-10 21:35:44.938 14335 14335 F DEBUG   : *** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
11-10 21:35:44.938 14335 14335 F DEBUG   : Build fingerprint: 'google/cheetah/cheetah:14/UP1A.231005.007/10754064:user/release-keys'
11-10 21:35:44.938 14335 14335 F DEBUG   : Revision: 'MP1.0'
11-10 21:35:44.938 14335 14335 F DEBUG   : ABI: 'arm64'
11-10 21:35:44.938 14335 14335 F DEBUG   : Timestamp: 2023-11-10 21:35:44.695333303-0500
11-10 21:35:44.938 14335 14335 F DEBUG   : Process uptime: 1s
11-10 21:35:44.938 14335 14335 F DEBUG   : Cmdline: zygote64
11-10 21:35:44.938 14335 14335 F DEBUG   : pid: 14311, tid: 14311, name: id.gms.unstable  >>> zygote64 <<<
11-10 21:35:44.938 14335 14335 F DEBUG   : uid: 10164
11-10 21:35:44.938 14335 14335 F DEBUG   : tagged_addr_ctrl: 0000000000000001 (PR_TAGGED_ADDR_ENABLE)
11-10 21:35:44.938 14335 14335 F DEBUG   : signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x5a6100003059eab2
11-10 21:35:44.938 14335 14335 F DEBUG   :     x0  000000001c15faac  x1  5a61000000020002  x2  000000765ef6f640  x3  0000007ff64c4938
11-10 21:35:44.938 14335 14335 F DEBUG   :     x4  0000000073139474  x5  0000007ff64c4928  x6  797469726f697250  x7  0000007657ca6c68
11-10 21:35:44.938 14335 14335 F DEBUG   :     x8  0000000000000068  x9  0000000000000007  x10 0000000000000000  x11 000000791a0d8000
11-10 21:35:44.938 14335 14335 F DEBUG   :     x12 0000000073139450  x13 0000000000000007  x14 b40000785efed2b0  x15 b40000775efcf670
11-10 21:35:44.938 14335 14335 F DEBUG   :     x16 000000000c15faac  x17 000000003fffffff  x18 000000791a382000  x19 b40000775efcf650
11-10 21:35:44.938 14335 14335 F DEBUG   :     x20 b4000076befde6f0  x21 000000791a0d8000  x22 0000007ff64c4b7c  x23 0000000000000000
11-10 21:35:44.938 14335 14335 F DEBUG   :     x24 00000000703d79b0  x25 0000007ff64c4ea8  x26 0000007ff64c4ef8  x27 0000007ff64c4ea8
11-10 21:35:44.938 14335 14335 F DEBUG   :     x28 0000007ff64c4f50  x29 0000007ff64c4ca0
11-10 21:35:44.938 14335 14335 F DEBUG   :     lr  000000765cd3a1cc  sp  0000007ff64c4af0  pc  000000765cd3a6a8  pst 0000000020001000
11-10 21:35:44.938 14335 14335 F DEBUG   : 21 total frames
11-10 21:35:44.938 14335 14335 F DEBUG   : backtrace:
11-10 21:35:44.938 14335 14335 F DEBUG   :       #00 pc 000000000033a6a8  /apex/com.android.art/lib64/libart.so (art::Object_internalClone(_JNIEnv*, _jobject*) (.__uniq.93429965329032005513714586366871002690)+1376) (BuildId: b221ddf9493596dec8a84b0692083bef)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #01 pc 000000000009b1dc  /system/framework/arm64/boot.oat (art_jni_trampoline+92) (BuildId: 62fc68c27e58cc4127778fe0fd1815427d050b5a)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #02 pc 00000000000a2bd0  /system/framework/arm64/boot.oat (java.lang.Object.clone+336) (BuildId: 62fc68c27e58cc4127778fe0fd1815427d050b5a)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #03 pc 000000000015f2c4  /system/framework/arm64/boot.oat (java.lang.Thread.getState+68) (BuildId: 62fc68c27e58cc4127778fe0fd1815427d050b5a)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #04 pc 000000000015f984  /system/framework/arm64/boot.oat (java.lang.Thread.setPriority+68) (BuildId: 62fc68c27e58cc4127778fe0fd1815427d050b5a)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #05 pc 000000000058ab30  /apex/com.android.art/lib64/libart.so (nterp_helper+4016) (BuildId: b221ddf9493596dec8a84b0692083bef)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #06 pc 0000000000513dec  /system/framework/framework.jar (com.android.internal.os.Zygote.specializeAppProcess+56)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #07 pc 000000000058a364  /apex/com.android.art/lib64/libart.so (nterp_helper+2020) (BuildId: b221ddf9493596dec8a84b0692083bef)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #08 pc 000000000051375c  /system/framework/framework.jar (com.android.internal.os.Zygote.childMain+728)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #09 pc 0000000000589bb4  /apex/com.android.art/lib64/libart.so (nterp_helper+52) (BuildId: b221ddf9493596dec8a84b0692083bef)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #10 pc 00000000005138e4  /system/framework/framework.jar (com.android.internal.os.Zygote.forkSimpleApps+16)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #11 pc 0000000000756190  /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteConnection.processCommand+1104) (BuildId: 4f98e15322c58b22e9630bb1efbf0633eb3f0536)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #12 pc 000000000075ca38  /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteServer.runSelectLoop+2136) (BuildId: 4f98e15322c58b22e9630bb1efbf0633eb3f0536)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #13 pc 0000000000758e28  /system/framework/arm64/boot-framework.oat (com.android.internal.os.ZygoteInit.main+3080) (BuildId: 4f98e15322c58b22e9630bb1efbf0633eb3f0536)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #14 pc 0000000000360680  /apex/com.android.art/lib64/libart.so (art_quick_invoke_static_stub+640) (BuildId: b221ddf9493596dec8a84b0692083bef)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #15 pc 00000000004942a0  /apex/com.android.art/lib64/libart.so (art::JValue art::InvokeWithVarArgs<_jmethodID*>(art::ScopedObjectAccessAlreadyRunnable const&, _jobject*, _jmethodID*, std::__va_list)+516) (BuildId: b221ddf9493596dec8a84b0692083bef)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #16 pc 0000000000553310  /apex/com.android.art/lib64/libart.so (art::JNI<true>::CallStaticVoidMethodV(_JNIEnv*, _jclass*, _jmethodID*, std::__va_list)+112) (BuildId: b221ddf9493596dec8a84b0692083bef)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #17 pc 00000000000d9ca8  /system/lib64/libandroid_runtime.so (_JNIEnv::CallStaticVoidMethod(_jclass*, _jmethodID*, ...)+104) (BuildId: 13df5aafcce6ced5850008051295413b)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #18 pc 00000000000e5e2c  /system/lib64/libandroid_runtime.so (android::AndroidRuntime::start(char const*, android::Vector<android::String8> const&, bool)+860) (BuildId: 13df5aafcce6ced5850008051295413b)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #19 pc 000000000000254c  /system/bin/app_process64 (main+1260) (BuildId: e8762c072e6c37bb8093e340cc42e9f2)
11-10 21:35:44.938 14335 14335 F DEBUG   :       #20 pc 00000000000546e8  /apex/com.android.runtime/lib64/bionic/libc.so (__libc_init+104) (BuildId: 19c32900d9d702c303d2b4164fbba76c)

Relevant logs:

11-10 21:35:44.488 14311 14311 I id.gms.unstable: Using CollectorTypeCC GC.
11-10 21:35:44.491 13775 13775 W CrashLoopRemedyLog: unable to delete remedy log, instaCrash: false
11-10 21:35:44.492 13775 13775 W CrashLoopRemedyLog: unable to delete remedy log, instaCrash: true
11-10 21:35:44.493 14311 14311 E id.gms.unstable: Not starting debugger since process cannot load the jdwp agent.
11-10 21:35:44.496  1523  2205 V StorageRedirect: requestCheckProcess: pid=14311, uid=10164, pkg=com.google.android.gms
11-10 21:35:44.499  1523  2686 V StorageRedirect: requestCheckProcess: pid=14311, uid=10164, pkg=com.google.android.gms, proc=com.google.android.gms.unstable
11-10 21:35:44.500  1523  2205 V StorageRedirect: requestCheckProcess: []
11-10 21:35:44.502 14311 14311 D PIF/Native: Starting to hook...
11-10 21:35:44.502 14311 14311 W shadowhook_tag: shadowhook version 1.0.8: shadowhook init(mode: UNIQUE, debuggable: true), return: 0, real-init: yes
11-10 21:35:44.502 14311 14311 I shadowhook_tag: shadowhook: hook_sym_name(libc.so, __system_property_read_callback, 0x7648330814) ...
11-10 21:35:44.502 14311 14311 I shadowhook_tag: exit: gap, 78f8d6e900 - 78f8d6f000 (load_bias 78f8c9a000, d4900 - d5000), NFZ 1, READABLE 1
11-10 21:35:44.502 14311 14311 I shadowhook_tag: exit: gap, 78f91cf120 - 78f91d0000 (load_bias 78f8c9a000, 535120 - 536000), NFZ 0, READABLE 1
11-10 21:35:44.502 14311 14311 I shadowhook_tag: exit: gap fill zero, 78f8d6e900 - 78f8d6f000 (load_bias 78f8c9a000, d4900 - d5000), READABLE 1
11-10 21:35:44.502 14311 14311 I shadowhook_tag: exit: gap resize, 78f8d6e900 - 78f8d6eff0 (load_bias 78f8c9a000, d4900 - d4ff0)
11-10 21:35:44.502 14311 14311 I shadowhook_tag: exit: in-library alloc, at 78f8d6e910 (load_bias 78f8c9a000, d4910), len 16
11-10 21:35:44.502 14311 14311 I shadowhook_tag: exit: alloc in library, exit 78f8d6e910, pc 78f8d09af0, distance 64e20, range [-8000000, 7fffffc]
11-10 21:35:44.502 14311 14311 I shadowhook_tag: a64 rewrite: type 0, inst aa0003e8
11-10 21:35:44.502 14311 14311 I shadowhook_tag: a64: hook (WITH EXIT) OK. target 78f8d09af0 -> exit 78f8d6e910 -> new 7648330814 -> enter 7919c33000 -> remaining 78f8d09af4
11-10 21:35:44.502 14311 14311 I shadowhook_tag: switch: hook in UNIQUE mode OK: target_addr 78f8d09af0, new_addr 7648330814
11-10 21:35:44.502 14311 14311 I shadowhook_tag: shadowhook: hook_sym_name(libc.so, __system_property_read_callback, 0x7648330814) OK. return: 0xb40000770efd7460. 0 - OK
11-10 21:35:44.502 14311 14311 D PIF/Native: Got __system_property_read_callback handle and hooked it at 0xb40000770efd7460
11-10 21:35:44.502 14311 14311 D PIF/Native: get system classloader
11-10 21:35:44.502 14311 14311 D PIF/Native: create buffer
11-10 21:35:44.503 14311 14311 D PIF/Native: create class loader
11-10 21:35:44.505  1731  2298 D ConnectivityService: NetReassign [no changes] [c 1] [a 1] [i 7]
11-10 21:35:44.505 14311 14311 D PIF/Native: load class
11-10 21:35:44.505 14311 14311 D PIF/Native: call init
11-10 21:35:44.451 14179 14179 I CdoRouter: ServiceLoader init cost 7 ms
11-10 21:35:44.506 14311 14311 D PIF/Java: [PRODUCT] -> [cheetah] is now: [WW_Phone]
11-10 21:35:44.506 14311 14311 D PIF/Java: [DEVICE] -> [cheetah] is now: [ASUS_X00HD_4]
11-10 21:35:44.506 14311 14311 D PIF/Java: [MANUFACTURER] -> [Google] is now: [Asus]
11-10 21:35:44.506 14311 14311 D PIF/Java: [BRAND] -> [google] is now: [Asus]
11-10 21:35:44.506 14311 14311 D PIF/Java: [MODEL] -> [Pixel 7 Pro] is now: [ASUS_X00HD]
11-10 21:35:44.506 14311 14311 D PIF/Java: [FINGERPRINT] -> [google/cheetah/cheetah:14/UP1A.231005.007/10754064:user/release-keys] is now: [asus/WW_Phone/ASUS_X00HD_4:7.1.1/NMF26F/14.2016.1801.372-20180119:user/release-keys]
11-10 21:35:44.506 14179 14179 I CdoRouter: [ProviderPool] >>> find provider with reflection: class a.a.a.xx2
11-10 21:35:44.507 14179 14179 I CdoRouter: [ServiceLoader] [SingletonPool] >>> create instance: class a.a.a.xx2, result = a.a.a.xx2@59295ff, initializer = com.heytap.cdo.component.service.e$b@b57bfcc 
11-10 21:35:44.507 14311 14311 D PIF/Java: Spoof KeyStoreSpi and Provider done!
11-10 21:35:44.508 14311 14311 D PIF/Native: clean
11-10 21:35:44.513  1731  5528 I ActivityManager: Process com.heytap.market (pid 13684) has died: cch+5 CEM 
11-10 21:35:44.514  1731  1985 I libprocessgroup: Successfully killed process cgroup uid 10291 pid 13684 in 0ms
11-10 21:35:44.518  1161  1161 I Zygote  : Process 13684 exited due to signal 9 (Killed)
11-10 21:35:44.522 14311 14311 F libc    : Fatal signal 11 (SIGSEGV), code 1 (SEGV_MAPERR), fault addr 0x5a6100003059eab2 in tid 14311 (id.gms.unstable), pid 14311 (id.gms.unstable)

Installed modules: Shamiko, Sui

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.