The Magic Mask for Android

Downloads

This is not an officially supported Google product

Introduction

Magisk is a suite of open source software for customizing Android, supporting devices higher than Android 5.0.
Some highlight features:

  • MagiskSU: Provide root access for applications
  • Magisk Modules: Modify read-only partitions by installing modules
  • MagiskBoot: The most complete tool for unpacking and repacking Android boot images

Downloads

Github is the only source where you can get official Magisk information and downloads.

Useful Links

Bug Reports

Only bug reports from Canary builds will be accepted.

For installation issues, upload both boot image and install logs.
For Magisk issues, upload boot logcat or dmesg.
For Magisk app crashes, record and upload the logcat when the crash occurs.

Building and Development

  • Magisk builds on any OS Android Studio supports. Install Android Studio and do the initial setups.
  • Clone sources: git clone --recurse-submodules https://github.com/topjohnwu/Magisk.git
  • Install Python 3.6+
    (Windows only: select 'Add Python to PATH' in installer, and run pip install colorama after install)
  • Configure to use the JDK bundled in Android Studio:
    • macOS: export JAVA_HOME="/Applications/Android Studio.app/Contents/jre/Contents/Home"
    • Linux: export PATH="/path/to/androidstudio/jre/bin:$PATH"
    • Windows: Add C:\Path\To\Android Studio\jre\bin to environment variable PATH
  • Set environment variable ANDROID_SDK_ROOT to the Android SDK folder (can be found in Android Studio settings)
  • Run ./build.py ndk to let the script download and install NDK for you
  • To start building, run build.py to see your options.
    For each action, use -h to access help (e.g. ./build.py all -h)
  • To start development, open the project with Android Studio. The IDE can be used for both app (Kotlin/Java) and native (C++/C) sources.
  • Optionally, set custom configs with config.prop. A sample config.prop.sample is provided.
  • To sign APKs and zips with your own private keys, set signing configs in config.prop. For more info, check Google's Documentation.

Translation Contributions

Default string resources for the Magisk app and its stub APK are located here:

  • app/src/main/res/values/strings.xml
  • stub/src/main/res/values/strings.xml

Translate each and place them in the respective locations ([module]/src/main/res/values-[lang]/strings.xml).

License

Magisk, including all git submodules are free software:
you can redistribute it and/or modify it under the terms of the
GNU General Public License as published by the Free Software Foundation,
either version 3 of the License, or (at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program.  If not, see <http://www.gnu.org/licenses/>.
Comments
  • Magisk 22101 (22.+) not detected by Manager (

    Magisk 22101 (22.+) not detected by Manager ("N/A"), but SU still working on Android 6.0 (+) Marshmallow with Samsung Note 4 SM-N910F TouchWiz, armeabi-v7a and other devices

    Device: Samsung Note 4, SM-N910F, armeabi-v7a Android version: Android 6.0, Marshmallow Magisk version name: f623b988 Magisk version code: 22101

    Full Magisk Version Information: f623b988 (22101) (20), (all 22+) UI: TouchWiz Recovery: TWRP

    Issue 1: Magisk (Manager) does not install/patch within the app, creating that signature error Issue 2: Magisk (Manager) does not detect patched Magisk, shows only n/a Issue 3: Magisk (Manager) wants to install current Manager though it is installed Issue 4: Magisk (Manager) does not offer all features to control SU, hide, etc., though Magisk is patched and SU requests working

    Done so far without solving the problem:

    uninstalled/reinstalled Manager
    unpatched/repatched stock boot via TWRP
    repatched Magisk boot-image via TWRP (no self-patched boot.img - ask, if I shall try to retrieve it)
    

    The terminal-emulator can run magisk -v (f623b988) or magisk -V (22101) correctly.

    Last Version without these Issues: Magisk 8.0.7 (pre 22)

    Please let me know, what additional infromation is needed and how to access, if necessary, before closing the threat.

    PS: I followed for the logs this guide https://didgeridoohan.com/magisk/MagiskHelp

    Logs:

    1. Excerpt of attached Magisk_install_log (/download): magisk_install_log_2021-04-09T164405Z.log
    • Target image: /dev/block/
    • Device platform: armeabi-v7a
    • Installing: f623b988 (22101) ! Unable to check signature ! Installation failed
    1. Excerpt of attached magisk.log (/cache): magisk.log
    02-06 22:26:21.519   373   373 I : Magisk f623b988(22101) daemon started
     02-06 22:26:21.526   373   373 I : * Device API level: 23
     02-06 22:26:21.531   373   375 D : resetprop: getprop [ro.crypto.state]: [unencrypted]
     02-06 22:26:21.532   373   375 I : ** post-fs-data mode running
     02-06 22:26:21.533   373   375 I : * Mounting mirrors
     02-06 22:26:21.534   373   375 I : mount: /sbin/.magisk/mirror/system
     02-06 22:26:21.534   373   375 I : mount: /sbin/.magisk/mirror/data
     02-06 22:26:21.534   373   375 I : link: /sbin/.magisk/mirror/cache
     02-06 22:26:21.534   373   375 I : link: /sbin/.magisk/mirror/persist
     02-06 22:26:21.534   373   375 I : link: /sbin/.magisk/mirror/vendor
     02-06 22:26:21.534   373   375 I : * Initializing Magisk environment
     02-06 22:26:21.747   373   375 D : resetprop: prop [persist.sys.safemode] does not exist
     02-06 22:26:25.069   373   375 I : * Running post-fs-data.d scripts
     02-06 22:26:25.075   373   375 D : bind_mnt: /sbin/.magisk/modules <- /sbin/.magisk/mirror/data/adb/modules
     02-06 22:26:25.077   373   375 I : * Running module post-fs-data scripts
     02-06 22:26:25.077   373   375 I : * Loading modules
     02-06 23:26:27.343   373   734 I : ** late_start service mode running
     02-06 23:26:27.379   373   734 I : * Running service.d scripts
     02-06 23:26:27.379   373   734 I : * Running module service scripts
     04-09 16:39:18.193   373  5364 I : ** boot_complete triggered
     04-09 16:43:43.161   373 11689 D : su: request from pid=[11685], client=[16]
     04-09 16:43:43.165   373 11689 D : su: request from uid=[10269]
     04-09 16:43:43.165   373 11689 D : su: waiting child pid=[11690]
     04-09 16:43:43.165 11690 11690 D : su: fork handler
     04-09 16:43:43.166 11690 11690 D : su: use global namespace
     04-09 16:45:35.416   373 12539 D : su: request from pid=[12534], client=[17]
     04-09 16:45:35.417   373 12539 D : su: request from uid=[10295]
     04-09 16:45:39.651   373 12539 D : su: waiting child pid=[12566]
     04-09 16:45:39.651 12566 12566 D : su: fork handler
     04-09 16:45:39.653 12566 12566 D : su: use namespace of pid=[12534]
     04-09 16:45:53.548   373 12848 D : su: request from pid=[12845], client=[18]
     04-09 16:45:53.548   373 12848 D : su: request from uid=[10295]
     04-09 16:45:57.262   373 12848 D : su: waiting child pid=[12896]
     04-09 16:45:57.262 12896 12896 D : su: fork handler
     04-09 16:45:57.263 12896 12896 D : su: use namespace of pid=[12845]
    
    1. Excerpt of TWRP Recovery last.log (cache/recovery): last_log.log
    I:Set page: 'install'
    I:Set page: 'flash_confirm'
    I:Set page: 'flash_zip'
    I:operation_start: 'Flashing'
    Installiere Zip '/sdcard/Download/magisk/Magisk-f623b988(22101).zip'
    Suche nach Digest-Datei...
    Digest-Prüfung übersprungen: keine Digest-Datei gefunden
    I:Update binary zip
    I:Zip does not contain SELinux file_contexts file in its root.
    I:Legacy property environment not used in updater.
    Archive:  /sdcard/Download/magisk/Magisk-f623b988(22101).zip
      inflating: lib/x86/libbusybox.so
      inflating: lib/armeabi-v7a/libbusybox.so
    unzip: short read
    Archive:  /sdcard/Download/magisk/Magisk-f623b988(22101).zip
      inflating: lib/x86/libmagisk64.so
      inflating: assets/chromeos/futility
      inflating: assets/chromeos/kernel_data_key.vbprivk
      inflating: lib/armeabi-v7a/libmagiskboot.so
      inflating: assets/uninstaller.sh
      inflating: lib/armeabi-v7a/libmagiskinit.so
      inflating: META-INF/com/google/android/update-binary
      inflating: lib/x86/libmagiskboot.so
      inflating: lib/armeabi-v7a/libmagisk64.so
      inflating: assets/addon.d.sh
      inflating: lib/x86/libmagiskinit.so
      inflating: lib/armeabi-v7a/libmagisk32.so
      inflating: assets/boot_patch.sh
      inflating: assets/chromeos/kernel.keyblock
      inflating: assets/util_functions.sh
      inflating: META-INF/com/google/android/updater-script
      inflating: lib/x86/libmagisk32.so
    **********************************
     Magisk f623b988(22101) Installer 
    **********************************
    - Mounting /system
    - Target image: /dev/block/mmcblk0p17
    - Device platform: arm
    - Constructing environment
    java.io.IOException: ioctl failed: EINVAL (Invalid argument)
    	at libcore.io.IoBridge.available(IoBridge.java:74)
    	at java.io.FileInputStream.available(FileInputStream.java:108)
    	at java.io.BufferedInputStream.read(BufferedInputStream.java:274)
    	at com.topjohnwu.signing.SignBoot.fullRead(SignBoot.java:100)
    	at com.topjohnwu.signing.SignBoot.verifySignature(SignBoot.java:155)
    	at com.topjohnwu.signing.SignBoot.main(SignBoot.java:350)
    Caused by: android.system.ErrnoException: ioctl failed: EINVAL (Invalid argument)
    	at libcore.io.Posix.ioctlInt(Native Method)
    	at libcore.io.ForwardingOs.ioctlInt(ForwardingOs.java:103)
    	at libcore.io.IoBridge.available(IoBridge.java:58)
    	... 5 more
    - Unpacking boot image
    Parsing boot image: [/dev/block/mmcblk0p17]
    HEADER_VER      [0]
    KERNEL_SZ       [9879096]
    RAMDISK_SZ      [2886352]
    SECOND_SZ       [0]
    EXTRA_SZ        [3407872]
    PAGESIZE        [4096]
    NAME            [SYSMAGIC000KU]
    CMDLINE         [console=null androidboot.hardware=qcom user_debug=23 msm_rtb.filter=0x3b7 dwc3_msm.cpu_to_affin=1]
    CHECKSUM        [7c2318906ff8666f1c9df3b993922944aa9c6850000000000000000000000000]
    KERNEL_FMT      [raw]
    RAMDISK_FMT     [gzip]
    EXTRA_FMT       [raw]
    SAMSUNG_SEANDROID
    - Checking ramdisk status
    Loading cpio: [ramdisk.cpio]
    - Magisk patched boot image detected
    Loading cpio: [ramdisk.cpio]
    Remove [overlay.d]
    Remove [overlay.d/sbin]
    Remove [overlay.d/sbin/magisk32.xz]
    Remove [.backup/.rmlist]
    Remove [.backup]
    Remove [.backup/.magisk]
    Move [.backup/fstab.qcom] -> [fstab.qcom]
    Move [.backup/init] -> [init]
    Dump cpio: [ramdisk.cpio]
    - Patching ramdisk
    Loading cpio: [ramdisk.cpio]
    Add entry [init] (0750)
    Create directory [overlay.d] (0750)
    Create directory [overlay.d/sbin] (0750)
    Add entry [overlay.d/sbin/magisk32.xz] (0644)
    Patch with flag KEEPVERITY=[false] KEEPFORCEENCRYPT=[false]
    Found fstab file [fstab.qcom]
    Remove pattern [,verify]
    Loading cpio: [ramdisk.cpio.orig]
    Backup mismatch entry: [fstab.qcom] -> [.backup/fstab.qcom]
    Backup mismatch entry: [init] -> [.backup/init]
    Record new entry: [overlay.d] -> [.backup/.rmlist]
    Record new entry: [overlay.d/sbin] -> [.backup/.rmlist]
    Record new entry: [overlay.d/sbin/magisk32.xz] -> [.backup/.rmlist]
    Create directory [.backup] (0000)
    Add entry [.backup/.magisk] (0000)
    Dump cpio: [ramdisk.cpio]
    Loading dtbs from [extra]
    - Repacking boot image
    Parsing boot image: [/dev/block/mmcblk0p17]
    HEADER_VER      [0]
    KERNEL_SZ       [9879096]
    RAMDISK_SZ      [2886352]
    SECOND_SZ       [0]
    EXTRA_SZ        [3407872]
    PAGESIZE        [4096]
    NAME            [SYSMAGIC000KU]
    CMDLINE         [console=null androidboot.hardware=qcom user_debug=23 msm_rtb.filter=0x3b7 dwc3_msm.cpu_to_affin=1]
    CHECKSUM        [7c2318906ff8666f1c9df3b993922944aa9c6850000000000000000000000000]
    KERNEL_FMT      [raw]
    RAMDISK_FMT     [gzip]
    EXTRA_FMT       [raw]
    SAMSUNG_SEANDROID
    Repack to boot image: [new-boot.img]
    HEADER_VER      [0]
    KERNEL_SZ       [9879096]
    RAMDISK_SZ      [2886630]
    SECOND_SZ       [0]
    EXTRA_SZ        [3407872]
    PAGESIZE        [4096]
    NAME            [SYSMAGIC000KU]
    CMDLINE         [console=null androidboot.hardware=qcom user_debug=23 msm_rtb.filter=0x3b7 dwc3_msm.cpu_to_affin=1]
    CHECKSUM        [905c567083e0de8531c8df6ceb83dd46a13c6ce6000000000000000000000000]
    - Flashing new boot image
    Cleaning up...
    - Unmounting partitions
    - Done
    I:Updater process ended with RC=0
    I:Install took 9 second(s).
    Partitions-Informationen werden aktualisiert...
    I:Data backup size is 14699MB, free: 498MB.
    I:Unable to mount '/usbstorage'
    I:Actual block device: '', current file system: 'vfat'
    ...Fertig
    I:Set page: 'flash_done'
    I:operation_end - status=0
    I:Set page: 'confirm_action'
    I:Set page: 'action_page'
    I:operation_start: 'Format'
    Formatiere Cache mit make_ext4fs...
    Creating filesystem with parameters:
        Size: 209715200
        Block size: 4096
        Blocks per group: 32768
        Inodes per group: 6400
        Inode size: 256
        Journal blocks: 1024
        Label: 
        Blocks: 51200
        Block groups: 2
        Reserved block group size: 15
    Created filesystem with 11/12800 inodes and 1865/51200 blocks
    warning: wipe_block_device: Wipe via secure discard failed, used discard instead
    
    I:Recreating /cache/recovery folder.
    I:Copying file /etc/recovery.fstab to /cache/recovery/recovery.fstab
    I:Version number saved to '/cache/recovery/.version'
    Partitions-Informationen werden aktualisiert...
    I:Data backup size is 14699MB, free: 498MB.
    I:Unable to mount '/usbstorage'
    I:Actual block device: '', current file system: 'vfat'
    ...Fertig
    I:Set page: 'action_complete'
    I:operation_end - status=0
    I:operation_start: 'Format'
    Dalvik Cache-Verzeichnisse bereinigen...
    Bereinigt: /data/dalvik-cache...
    -- Dalvik Cache-Verzeichnisse bereinigt!
    Partitions-Informationen werden aktualisiert...
    I:Set page: 'clear_vars'
    I:Set page: 'flash_done'
    I:Data backup size is 13777MB, free: 1421MB.
    I:Unable to mount '/usbstorage'
    I:Actual block device: '', current file system: 'vfat'
    ...Fertig
    I:operation_end - status=0
    I:Set page: 'clear_vars'
    I:Set page: 'install'
    I:Set page: 'main'
    I:Set page: 'clear_vars'
    I:Set page: 'main2'
    I:Set page: 'advanced'
    I:Set page: 'copylog'
    I:Set page: 'action_page'
    I:operation_start: 'Copy Log'
    I:Copying file /tmp/recovery.log to /data/media/0/recovery.log
    Kernel-Log wurde nach /data/media/0/dmesg.log kopiert
    Recovery-Log wurde nach /data/media/0/recovery.log kopiert.
    I:Set page: 'action_complete'
    I:operation_end - status=0
    I:Set page: 'reboot_system_routine'
    I:Set page: 'rebootcheck'
    I:Set page: 'appcheck'
    I:operation_start: 'Check for TWRP App'
    I:App found at '/data/app/me.twrp.twrpapp-2'
    I:operation_end - status=0
    I:Copying file /cache/recovery/log to /cache/recovery/last_log
    Neustart...
    

    Related issues:

    #4107 (closed - not enough info) #4169 (closed - by bot) #4173 (closed - incorrect assigned version code)

  • vbmeta error no sign info (samsung A51 exynos 9611)

    vbmeta error no sign info (samsung A51 exynos 9611)

    Hi When using AP magisk patched tar it makes vbmeta error with dowload screen: ODIN MODE (AVB Fail), vbmeta: error verifying vbmeta image: OK_NOT_SIGNED, VERIFICATION_DISABLED bit is set, custom vbmeta No sign info, vbmeta . magisk_install_log_KEEPON.log magisk_install_log_KEEPOFF.log

    SM-A515F with A515FXXU1ASKJ firmware Android 10 has 2 vbmeta: vbmeta.img and vbmeta_samsung.img in AP. vbmeta_stock_imgs.zip

    Only flashing boot.img makes bootloop. Magisk versions tested from 19.3, 20.3 to latest canary build.

    TWRP is not available. The error appears after flashing and changing vbmeta.img. Bootloader is unlocked, KG is checking. With original vbmeta magisk recovery is not accepted.

    What should be done to work?

  • com.starfinanz.mobile.android.pushtan detects root with enabled Magisk Hide

    com.starfinanz.mobile.android.pushtan detects root with enabled Magisk Hide

    The mentioned app (https://play.google.com/store/apps/details?id=com.starfinanz.mobile.android.pushtan) here is able to detect root on your device while Magisk Hide is enabled. It immediatly stop all functionality and force close itself, once I run Magisk-unistaller.zip the app works as expected.

    Is there any chance you can provide an updated Magisk Hide :)

    That would be awesome, in general i can live with the short uninstall but since I loos all my settings and modules it is some kind of stupid workaround.

    I'm not sure it helps but this is the logcat output of the app

    |: adb logcat| grep 10976 02-15 15:56:54.021 10976 10976 W main : type=1400 audit(0.0:24525): avc: denied { create } for name="cgroup.procs" scontext=u:r:zygote:s0 tcontext=u:object_r:cgroup:s0 tclass=file permissive=0 02-15 15:56:54.021 10976 10976 W main : type=1400 audit(0.0:24526): avc: denied { read } for name="u:object_r:bg_boot_complete_prop:s0" dev="tmpfs" ino=22568 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:bg_boot_complete_prop:s0 tclass=file permissive=0 02-15 15:56:54.021 10976 10976 W main : type=1400 audit(0.0:24527): avc: denied { read } for name="u:object_r:bg_daemon_prop:s0" dev="tmpfs" ino=22569 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:bg_daemon_prop:s0 tclass=file permissive=0 02-15 15:56:54.021 10976 10976 W main : type=1400 audit(0.0:24528): avc: denied { read } for name="u:object_r:bluetooth_a2dp_offload_prop:s0" dev="tmpfs" ino=22570 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:bluetooth_a2dp_offload_prop:s0 tclass=file permissive=0 02-15 15:56:54.021 10976 10976 W main : type=1400 audit(0.0:24529): avc: denied { read } for name="u:object_r:bluetooth_prop:s0" dev="tmpfs" ino=22571 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:bluetooth_prop:s0 tclass=file permissive=0 02-15 15:56:54.021 10976 10976 W main : type=1400 audit(0.0:24530): avc: denied { read } for name="u:object_r:bootloader_boot_reason_prop:s0" dev="tmpfs" ino=22572 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:bootloader_boot_reason_prop:s0 tclass=file permissive=0 02-15 15:56:54.021 10976 10976 W main : type=1400 audit(0.0:24531): avc: denied { read } for name="u:object_r:boottime_prop:s0" dev="tmpfs" ino=22573 scontext=u:r:untrusted_app_27:s0:c512,c768 tcontext=u:object_r:boottime_prop:s0 tclass=file permissive=0 02-15 15:56:54.026 907 1037 I ActivityManager: Start proc 10976:com.starfinanz.mobile.android.pushtan/u0a120 for activity com.starfinanz.mobile.android.pushtan/com.starfinanz.mobile.android.spushtan.SPushTan 02-15 15:56:54.027 630 652 I Magisk : proc_monitor: com.starfinanz.mobile.android.pushtan/com.starfinanz.mobile.android.spushtan.SPushTan PID=[10976] ns=[4026534514] 02-15 15:56:54.034 10976 10976 E android.pushta: Not starting debugger since process cannot load the jdwp agent. 02-15 15:56:54.038 907 1726 D OnePlusSmartBoostManager: writeHotCount com.starfinanz.mobile.android.pushtan, pid=10976 02-15 15:56:54.041 10976 10991 I android.pushta: The ClassLoaderContext is a special shared library. 02-15 15:56:54.050 10976 10976 I android.pushta: The ClassLoaderContext is a special shared library. 02-15 15:56:54.103 10976 10976 I Perf : Connecting to perf service. 02-15 15:56:54.104 10976 10976 E libc : Access denied finding property "vendor.perf.iop_v3.enable" 02-15 15:56:54.104 10976 10976 E libc : Access denied finding property "vendor.perf.iop_v3.enable.debug" 02-15 15:56:54.255 10976 10976 E Report : Exiting: 02-15 15:56:54.255 10976 10976 E Report : tcxhbytu.ztt0LKgE: 00 02-15 15:56:54.255 10976 10976 E Report : at tcxhbytu.m3enVAIE.tX4sAa6m(Unknown Source:62) 02-15 15:56:54.255 10976 10976 E Report : at tcxhbytu.m3enVAIE.bkcAFLQ7(Unknown Source:0) 02-15 15:56:54.255 10976 10976 E Report : at java.lang.Runtime.nativeLoad(Native Method) 02-15 15:56:54.255 10976 10976 E Report : at java.lang.Runtime.loadLibrary0(Runtime.java:1014) 02-15 15:56:54.255 10976 10976 E Report : at java.lang.System.loadLibrary(System.java:1669) 02-15 15:56:54.255 10976 10976 E Report : at tcxhbytu.QxNeaVUy.M4BXOCgN(Unknown Source:43) 02-15 15:56:54.255 10976 10976 E Report : at tcxhbytu.dSJFB3li.s690a1e3(Unknown Source:13) 02-15 15:56:54.255 10976 10976 E Report : at tcxhbytu.dSJFB3li.MqwVss_j(Unknown Source:24) 02-15 15:56:54.255 10976 10976 E Report : at tcxhbytu.dSJFB3li.eJbRTX8R(Unknown Source:6) 02-15 15:56:54.255 10976 10976 E Report : at akm.(Unknown Source:0) 02-15 15:56:54.255 10976 10976 E Report : at java.lang.Class.newInstance(Native Method) 02-15 15:56:54.255 10976 10976 E Report : at android.app.AppComponentFactory.instantiateApplication(AppComponentFactory.java:50) 02-15 15:56:54.255 10976 10976 E Report : at android.app.Instrumentation.newApplication(Instrumentation.java:1124) 02-15 15:56:54.255 10976 10976 E Report : at android.app.LoadedApk.makeApplication(LoadedApk.java:1087) 02-15 15:56:54.255 10976 10976 E Report : at android.app.ActivityThread.handleBindApplication(ActivityThread.java:6010) 02-15 15:56:54.255 10976 10976 E Report : at android.app.ActivityThread.access$1300(ActivityThread.java:207) 02-15 15:56:54.255 10976 10976 E Report : at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1748) 02-15 15:56:54.255 10976 10976 E Report : at android.os.Handler.dispatchMessage(Handler.java:106) 02-15 15:56:54.255 10976 10976 E Report : at android.os.Looper.loop(Looper.java:193) 02-15 15:56:54.255 10976 10976 E Report : at android.app.ActivityThread.main(ActivityThread.java:6863) 02-15 15:56:54.255 10976 10976 E Report : at java.lang.reflect.Method.invoke(Native Method) 02-15 15:56:54.255 10976 10976 E Report : at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:537) 02-15 15:56:54.255 10976 10976 E Report : at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:858) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: FATAL EXCEPTION: main 02-15 15:56:54.255 10976 10976 E AndroidRuntime: Process: com.starfinanz.mobile.android.pushtan, PID: 10976 02-15 15:56:54.255 10976 10976 E AndroidRuntime: tcxhbytu.ztt0LKgE: 00 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at tcxhbytu.m3enVAIE.tX4sAa6m(Unknown Source:62) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at tcxhbytu.m3enVAIE.bkcAFLQ7(Unknown Source:0) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at java.lang.Runtime.nativeLoad(Native Method) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at java.lang.Runtime.loadLibrary0(Runtime.java:1014) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at java.lang.System.loadLibrary(System.java:1669) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at tcxhbytu.QxNeaVUy.M4BXOCgN(Unknown Source:43) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at tcxhbytu.dSJFB3li.s690a1e3(Unknown Source:13) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at tcxhbytu.dSJFB3li.MqwVss_j(Unknown Source:24) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at tcxhbytu.dSJFB3li.eJbRTX8R(Unknown Source:6) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at akm.(Unknown Source:0) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at java.lang.Class.newInstance(Native Method) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at android.app.AppComponentFactory.instantiateApplication(AppComponentFactory.java:50) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at android.app.Instrumentation.newApplication(Instrumentation.java:1124) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at android.app.LoadedApk.makeApplication(LoadedApk.java:1087) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at android.app.ActivityThread.handleBindApplication(ActivityThread.java:6010) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at android.app.ActivityThread.access$1300(ActivityThread.java:207) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at android.app.ActivityThread$H.handleMessage(ActivityThread.java:1748) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at android.os.Handler.dispatchMessage(Handler.java:106) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at android.os.Looper.loop(Looper.java:193) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at android.app.ActivityThread.main(ActivityThread.java:6863) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at java.lang.reflect.Method.invoke(Native Method) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:537) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:858) 02-15 15:56:54.255 10976 10976 E AndroidRuntime: Attempt to invoke virtual method 'android.content.Context android.app.Application.getApplicationContext()' on a null object reference 02-15 15:56:54.262 10976 10976 I Process : Sending signal. PID: 10976 SIG: 9 02-15 15:56:54.277 658 658 I Zygote : Process 10976 exited due to signal (9) 02-15 15:56:54.870 907 1035 E ActivityManager: Handle untracked process die start : com.starfinanz.mobile.android.pushtan, pid : 10976 02-15 15:56:54.870 907 1035 I ActivityManager: Process com.starfinanz.mobile.android.pushtan (pid 10976) has died: vis +99TOP 02-15 15:56:54.870 907 1042 W libprocessgroup: kill(-10976, 9) failed: No such process 02-15 15:56:54.915 907 1042 W libprocessgroup: kill(-10976, 9) failed: No such process 02-15 15:56:54.915 907 1042 I libprocessgroup: Successfully killed process cgroup uid 10120 pid 10976 in 45ms

  • Systemless hosts may result in system freezes (F2FS driver bug)

    Systemless hosts may result in system freezes (F2FS driver bug)

    topjohnwu EDIT:

    This is caused by an F2FS driver issue that unfortunately Magisk is unable to fix. The only way around it is to use a custom kernel with the required fix. For more technical details, please check the reply by @freak07: https://github.com/topjohnwu/Magisk/issues/3171#issuecomment-729814931

    Original message:

    Using current canary (MM299, Magisk 20425) enabling the systemless hosts feature results in freezing all of the system. Can only hard rebooted. Without hosts it works good so far.

  • Bootloop after installing the patched boot image on Android 11 on Sony Xperia 5 II (needed system_ext removed from fstab)

    Bootloop after installing the patched boot image on Android 11 on Sony Xperia 5 II (needed system_ext removed from fstab)

    ISSUE DESCRIPTION

    After trying to install Magisk with the patched magisk_boot.img from the latest Canary (and Beta) version of the Manager, the device is unable to boot and goes into the bootloop.

    The reboot occurs right after the SONY logo shows up, hence ADB is not able to connect to the device (previously enabled on the working unrooted system). So logcat and dmesg seem unable to be acquired.

    fastboot boot also fails to execute (was trying to do what was suggested in https://github.com/topjohnwu/Magisk/issues/3292#issuecomment-707997803, but it seems that it doesn't work with the unmodified version of the boot image as well):

    ❯ fastboot boot .\magisk_patched_boot_X-FLASH-ALL-2389.img
    
    Sending 'boot.img' (98304 KB)                      OKAY [  2.397s]
    Booting                                            FAILED (remote: 'unknown command')
    fastboot: error: Command failed
    

    DEVICE DESCRIPTION

    Model: Sony Xperia 5 II (XQ-AS52) Android version: 11 System build version: 58.1.A.1.178 Security patch version: December 2020 Google Play update version: January 2021

    Boot image from the system: boot_X-FLASH-ALL-2389.img (GDrive)

    /proc/mounts output
    /dev/block/dm-5 / ext4 ro,seclabel,relatime,discard 0 0
    tmpfs /dev tmpfs rw,seclabel,nosuid,relatime,size=3927372k,nr_inodes=981843,mode=755 0 0
    devpts /dev/pts devpts rw,seclabel,relatime,mode=600,ptmxmode=000 0 0
    proc /proc proc rw,relatime,gid=3009,hidepid=2 0 0
    sysfs /sys sysfs rw,seclabel,relatime 0 0
    selinuxfs /sys/fs/selinux selinuxfs rw,relatime 0 0
    tmpfs /mnt tmpfs rw,seclabel,nosuid,nodev,noexec,relatime,size=3927372k,nr_inodes=981843,mode=755,gid=1000 0 0
    tmpfs /mnt/installer tmpfs rw,seclabel,nosuid,nodev,noexec,relatime,size=3927372k,nr_inodes=981843,mode=755,gid=1000 0 0
    tmpfs /mnt/androidwritable tmpfs rw,seclabel,nosuid,nodev,noexec,relatime,size=3927372k,nr_inodes=981843,mode=755,gid=1000 0 0
    /dev/block/by-name/metadata /metadata ext4 rw,seclabel,nosuid,nodev,noatime,discard 0 0
    /dev/block/dm-6 /product ext4 ro,seclabel,relatime,discard 0 0
    /dev/block/dm-7 /vendor ext4 ro,seclabel,relatime,discard 0 0
    /dev/block/dm-8 /odm ext4 ro,seclabel,relatime,discard 0 0
    tmpfs /apex tmpfs rw,seclabel,nosuid,nodev,noexec,relatime,size=3927372k,nr_inodes=981843,mode=755 0 0
    tmpfs /linkerconfig tmpfs rw,seclabel,nosuid,nodev,noexec,relatime,size=3927372k,nr_inodes=981843,mode=755 0 0
    none /dev/blkio cgroup rw,nosuid,nodev,noexec,relatime,blkio 0 0
    none /dev/cg2_bpf cgroup2 rw,nosuid,nodev,noexec,relatime 0 0
    none /dev/cpuctl cgroup rw,nosuid,nodev,noexec,relatime,cpu 0 0
    none /acct cgroup rw,nosuid,nodev,noexec,relatime,cpuacct 0 0
    none /dev/cpuset cgroup rw,nosuid,nodev,noexec,relatime,cpuset,noprefix,release_agent=/sbin/cpuset_release_agent 0 0
    none /dev/freezer cgroup rw,nosuid,nodev,noexec,relatime,freezer 0 0
    none /dev/memcg cgroup rw,nosuid,nodev,noexec,relatime,memory 0 0
    none /dev/stune cgroup rw,nosuid,nodev,noexec,relatime,schedtune 0 0
    tracefs /sys/kernel/tracing tracefs rw,seclabel,relatime 0 0
    none /config configfs rw,nosuid,nodev,noexec,relatime 0 0
    binder /dev/binderfs binder rw,relatime,max=1048576,stats=global 0 0
    none /sys/fs/fuse/connections fusectl rw,relatime 0 0
    bpf /sys/fs/bpf bpf rw,nosuid,nodev,noexec,relatime 0 0
    pstore /sys/fs/pstore pstore rw,seclabel,nosuid,nodev,noexec,relatime 0 0
    /dev/block/bootdevice/by-name/persist /mnt/vendor/persist ext4 rw,seclabel,nosuid,nodev,noatime,discard 0 0
    /dev/block/bootdevice/by-name/spunvm /mnt/vendor/spunvm vfat rw,context=u:object_r:vendor_spunvm_file:s0,noatime,uid=1000,gid=1000,fmask=0007,dmask=0007,allow_utime=0020,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro 0 0
    /dev/block/bootdevice/by-name/modem_a /vendor/firmware_mnt vfat ro,context=u:object_r:firmware_file:s0,relatime,uid=1000,gid=1000,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro 0 0
    /dev/block/bootdevice/by-name/dsp_a /vendor/dsp ext4 ro,seclabel,nosuid,nodev,relatime 0 0
    /dev/block/bootdevice/by-name/bluetooth_a /vendor/bt_firmware vfat ro,context=u:object_r:bt_firmware_file:s0,relatime,uid=1002,gid=3002,fmask=0337,dmask=0227,codepage=437,iocharset=iso8859-1,shortname=lower,errors=remount-ro 0 0
    /dev/block/dm-9 /oem ext4 ro,seclabel,relatime 0 0
    /dev/block/bootdevice/by-name/appslog /mnt/rca ext4 rw,seclabel,nosuid,nodev,noexec,noatime,discard 0 0
    /dev/block/bootdevice/by-name/diag /mnt/idd ext4 rw,seclabel,nosuid,nodev,noexec,noatime,discard 0 0
    /dev/block/bootdevice/by-name/userdata /data f2fs rw,lazytime,seclabel,nosuid,nodev,noatime,background_gc=on,discard,no_heap,user_xattr,inline_xattr,acl,inline_data,inline_dentry,flush_merge,extent_cache,mode=adaptive,active_logs=6,reserve_root=32768,resuid=0,resgid=1065,inlinecrypt,alloc_mode=default,fsync_mode=nobarrier 0 0
    tmpfs /linkerconfig tmpfs rw,seclabel,nosuid,nodev,noexec,relatime,size=3927372k,nr_inodes=981843,mode=755 0 0
    /dev/block/bootdevice/by-name/userdata /data/user/0 f2fs rw,lazytime,seclabel,nosuid,nodev,noatime,background_gc=on,discard,no_heap,user_xattr,inline_xattr,acl,inline_data,inline_dentry,flush_merge,extent_cache,mode=adaptive,active_logs=6,reserve_root=32768,resuid=0,resgid=1065,inlinecrypt,alloc_mode=default,fsync_mode=nobarrier 0 0
    tmpfs /data_mirror tmpfs rw,seclabel,nosuid,nodev,noexec,relatime,size=3927372k,nr_inodes=981843,mode=700,gid=1000 0 0
    /dev/block/bootdevice/by-name/userdata /data_mirror/data_ce/null f2fs rw,lazytime,seclabel,nosuid,nodev,noatime,background_gc=on,discard,no_heap,user_xattr,inline_xattr,acl,inline_data,inline_dentry,flush_merge,extent_cache,mode=adaptive,active_logs=6,reserve_root=32768,resuid=0,resgid=1065,inlinecrypt,alloc_mode=default,fsync_mode=nobarrier 0 0
    /dev/block/bootdevice/by-name/userdata /data_mirror/data_ce/null/0 f2fs rw,lazytime,seclabel,nosuid,nodev,noatime,background_gc=on,discard,no_heap,user_xattr,inline_xattr,acl,inline_data,inline_dentry,flush_merge,extent_cache,mode=adaptive,active_logs=6,reserve_root=32768,resuid=0,resgid=1065,inlinecrypt,alloc_mode=default,fsync_mode=nobarrier 0 0
    /dev/block/bootdevice/by-name/userdata /data_mirror/data_de/null f2fs rw,lazytime,seclabel,nosuid,nodev,noatime,background_gc=on,discard,no_heap,user_xattr,inline_xattr,acl,inline_data,inline_dentry,flush_merge,extent_cache,mode=adaptive,active_logs=6,reserve_root=32768,resuid=0,resgid=1065,inlinecrypt,alloc_mode=default,fsync_mode=nobarrier 0 0
    /dev/block/bootdevice/by-name/userdata /data_mirror/cur_profiles f2fs rw,lazytime,seclabel,nosuid,nodev,noatime,background_gc=on,discard,no_heap,user_xattr,inline_xattr,acl,inline_data,inline_dentry,flush_merge,extent_cache,mode=adaptive,active_logs=6,reserve_root=32768,resuid=0,resgid=1065,inlinecrypt,alloc_mode=default,fsync_mode=nobarrier 0 0
    /dev/block/dm-10 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-10 /apex/com.android.neuralnetworks ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-11 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-11 /apex/com.android.conscrypt ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-12 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-12 /apex/com.android.ipsec ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-13 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-13 /apex/com.android.wifi ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-14 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-14 /apex/com.android.resolv ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-15 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-15 /apex/com.android.extservices ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-16 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-16 /apex/com.android.tzdata ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-17 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-17 /apex/com.android.media ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-18 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-18 /apex/com.android.mediaprovider ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-19 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-19 /apex/com.android.tethering ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-20 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-20 /apex/com.android.cellbroadcast ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-21 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-21 /apex/com.android.sdkext ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-22 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-22 /apex/com.android.media.swcodec ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-23 /apex/com.android.permission[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-23 /apex/com.android.permission ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-24 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-24 /apex/com.android.adbd ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-25 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/dm-25 /apex/com.android.os.statsd ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/loop22 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/loop22 /apex/com.android.vndk.v30 ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/loop23 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/loop23 /apex/com.android.art ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/loop24 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/loop24 /apex/com.android.runtime ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/loop25 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/loop25 /apex/com.android.i18n ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/loop26 /apex/[email protected] ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/loop26 /apex/com.android.apex.cts.shim ext4 ro,dirsync,seclabel,nodev,noatime 0 0
    /dev/block/bootdevice/by-name/LTALabel /mnt/lta-label ext4 rw,seclabel,nosuid,nodev,noexec,noatime,nobarrier 0 0
    tmpfs /storage tmpfs rw,seclabel,nosuid,nodev,noexec,relatime,size=3927372k,nr_inodes=981843,mode=755,gid=1000 0 0
    adb /dev/usb-ffs/adb functionfs rw,relatime 0 0
    diag /dev/ffs-diag functionfs rw,relatime 0 0
    diag_mdm /dev/ffs-diag-1 functionfs rw,relatime 0 0
    diag_mdm2 /dev/ffs-diag-2 functionfs rw,relatime 0 0
    /data/media /mnt/runtime/default/emulated sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,derive_gid,default_normal,unshared_obb 0 0
    /data/media /mnt/runtime/read/emulated sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=23,derive_gid,default_normal,unshared_obb 0 0
    /data/media /mnt/runtime/write/emulated sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=7,derive_gid,default_normal,unshared_obb 0 0
    /data/media /mnt/runtime/full/emulated sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=7,derive_gid,default_normal,unshared_obb 0 0
    /dev/fuse /storage/emulated fuse rw,lazytime,nosuid,nodev,noexec,noatime,user_id=0,group_id=0,allow_other 0 0
    /dev/fuse /mnt/installer/0/emulated fuse rw,lazytime,nosuid,nodev,noexec,noatime,user_id=0,group_id=0,allow_other 0 0
    /dev/fuse /mnt/androidwritable/0/emulated fuse rw,lazytime,nosuid,nodev,noexec,noatime,user_id=0,group_id=0,allow_other 0 0
    /dev/fuse /mnt/user/0/emulated fuse rw,lazytime,nosuid,nodev,noexec,noatime,user_id=0,group_id=0,allow_other 0 0
    /data/media /mnt/pass_through/0/emulated sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=7,derive_gid,default_normal,unshared_obb 0 0
    /data/media /mnt/androidwritable/0/emulated/0/Android/data sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,derive_gid,default_normal,unshared_obb 0 0
    /data/media /mnt/installer/0/emulated/0/Android/data sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,derive_gid,default_normal,unshared_obb 0 0
    /data/media /storage/emulated/0/Android/data sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,derive_gid,default_normal,unshared_obb 0 0
    /data/media /mnt/user/0/emulated/0/Android/data sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,derive_gid,default_normal,unshared_obb 0 0
    /data/media /mnt/androidwritable/0/emulated/0/Android/obb sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,derive_gid,default_normal,unshared_obb 0 0
    /data/media /storage/emulated/0/Android/obb sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,derive_gid,default_normal,unshared_obb 0 0
    /data/media /mnt/user/0/emulated/0/Android/obb sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,multiuser,mask=6,derive_gid,default_normal,unshared_obb 0 0
    /data/media /mnt/installer/0/emulated/0/Android/obb sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,multiuser,mask=7,derive_gid,default_normal,unshared_obb 0 0
    /dev/block/vold/public:179,1 /mnt/media_rw/3931-3334 texfat rw,dirsync,nosuid,nodev,noexec,noatime,uid=1023,gid=1023,umask=0007,allow_utime=0020,codepage=437,iocharset=utf8,min_prealloc_size=64k,max_prealloc_size=375560k,writeback_boundary=4M,readahead=4M,fail_safe,inode64,hidden=show,errors=continue 0 0
    /mnt/media_rw/3931-3334 /mnt/runtime/default/3931-3334 sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=1015,mask=6,nocache 0 0
    /mnt/media_rw/3931-3334 /mnt/runtime/read/3931-3334 sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,mask=18,nocache 0 0
    /mnt/media_rw/3931-3334 /mnt/runtime/write/3931-3334 sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,mask=18,nocache 0 0
    /mnt/media_rw/3931-3334 /mnt/runtime/full/3931-3334 sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,mask=7,nocache 0 0
    /dev/fuse /storage/3931-3334 fuse rw,lazytime,nosuid,nodev,noexec,noatime,user_id=0,group_id=0,allow_other 0 0
    /dev/fuse /mnt/installer/0/3931-3334 fuse rw,lazytime,nosuid,nodev,noexec,noatime,user_id=0,group_id=0,allow_other 0 0
    /dev/fuse /mnt/androidwritable/0/3931-3334 fuse rw,lazytime,nosuid,nodev,noexec,noatime,user_id=0,group_id=0,allow_other 0 0
    /dev/fuse /mnt/user/0/3931-3334 fuse rw,lazytime,nosuid,nodev,noexec,noatime,user_id=0,group_id=0,allow_other 0 0
    /mnt/media_rw/3931-3334 /mnt/pass_through/0/3931-3334 sdcardfs rw,nosuid,nodev,noexec,noatime,fsuid=1023,fsgid=1023,gid=9997,mask=7,nocache 0 0
    

    MAGISK SETUP DESCRIPTION

    Manager version: latest Canary (https://github.com/topjohnwu/magisk_files/commit/f595d0624b70289ed273f933a33075fee986b533) Installation method: patching boot image

  • Do Not Submit MagiskHide Requests

    Do Not Submit MagiskHide Requests

    Any further "MagiskHide" and related root hiding development will no longer be in the official Magisk repo and will not be done by topjohnwu, so all Issues along these lines will be immediately closed.

    See: https://topjohnwu.medium.com/state-of-magisk-2021-fe29fdaee458 And: https://twitter.com/osm0sis/status/1431948577627119618


    You may check this unofficial off-site documentation for any updates going forward: https://www.didgeridoohan.com/magisk/MagiskHide

  • Android 12 failed to load/verify boot images

    Android 12 failed to load/verify boot images

    When I try to flash magisk patched img on my pixel 4a 5g device with the code below,

    "fastboot flash boot magisk_patched.img && fastboot reboot"

    device shows an error "failed to load/verify boot images" and unable to boot

    Device: Google Pixel 4a 5g Android version: 12 (developer beta 3) Magisk version name: 6b34ec3 Magisk version code: 22105

  • Galaxy A8/A8+ incompatibility

    Galaxy A8/A8+ incompatibility

    Hello everyone. Galaxy A8/A8+ users are reporting that flashing Magisk on their phone with Samsung Experience 9.0 (Android 8.0.0) up breaks their baseband, preventing them to use all its related features; after some tries we actually found it's related to the patched "init" file in ramdisk. Here there are the various logs to look closer this issue: https://drive.google.com/open?id=1F0kBmFjG45Zh1-yvDYHVCKip7XEZ8SGo Hope those will be helpful for the possible future fix of the issue, let me know if you need more infos/file to look at. Greetings!

  • Failed to update in recovery patch mode

    Failed to update in recovery patch mode

    Device: Galaxy S10 Android version: 12 One UI 4.1 Magisk version name: canary https://github.com/topjohnwu/Magisk/commit/704f91545e8433c382af25c136d06bee07684d7e Magisk version code: 24305

    First the installer is not detecting that is installed in recovery mode and not marking the check box

    photo_2022-03-31_23-32-24

    So I'm marking it and selecting direct install here are the logs

    magisk_install_log_2022-03-31T23_35_19.log

    After reboot the device stills in same old version and shows the following prompt

    photo_2022-03-31_23-32-15

    Wich gets me to the first screenshoot screen after accepting

    Here are the current flashed boot.img and recovery,img, extracted from AP.tar patched file using canary 24304 cause stable 24.3 was giving me vmbeta download mode error.

    recovery.img-boot.img-magisk_patched-24304.zip

  • magiskboot can't dump /dev/bootimg (NAND device)

    magiskboot can't dump /dev/bootimg (NAND device)

    Hi, I want to install magisk to my older tablet, but the installation of the zip fails with something like it does no know how to patch my boot.img, and I could provide you with my boot.img. So here I am. Dev: Lenovo A7-40 (Lenovo a3500-fl), running stock Android Kit-Kat 4.4.2.

    boot.img: https://drive.google.com/open?id=1xtBvCOUIJIMnGav6I09jT__92IlObSu9

    Thank you!

  • Android 11 MIUI devices need enabled verification in boot.img AVBv2 signature

    Android 11 MIUI devices need enabled verification in boot.img AVBv2 signature

    The Xiaomi device using MT6893 cannot start. After patching the boot, it shows infinite restart. I have disabled the vbmeta test. The models are RedmiNote10Pro and RedmiK40Gaming. I have used magiskboot extra cpio to prompt me that it failed. When I use Android_image_kitchen, the window flashes and nothing is unpacked. I think his boot has been specially encrypted. If you need it, I will upload the boot file for the study... Device: RedmiNote10Pro Android version:11 Magisk version name: V23 Magisk version code: 23001

  • Bluetooth keeps stopping

    Bluetooth keeps stopping

    I have a problem with the Bluetooth that stops working as soon as I install Magisk from TWRP.

    Steps to reproduce:

    • Wipe the phone
    • Restart the phone, add the google account, do basic configuration (both restoring from backup or setting brand new phone causes this issue)
    • Flash Magisk from TWRP
    • As soon as you restart the phone you get the message "Bluetooth keeps stopping" Even after installing the Magisk app

    Crash Log https://pastebin.com/h0zSZHw7 Magisk Log magisk_log_2022-11-13T19.10.51.log

    I tried creating the folder /data/user_de/0/com.xiaomi.bluetooth/databases/ chowning to bluetooth:bluetooth and chmod to 777 but didn't change the situation

    Environments: Device: Redmi Note 8 Android version: Android 10 Magisk version name: https://github.com/topjohnwu/Magisk/commit/cf9957ce4d0f369a7eb83143af8acb9942e516b2 Magisk version code: 25205

  • Module download notification always hangs

    Module download notification always hangs

  • Magisk wants to patch boot part instead of init_boot on devices that ship A13

    Magisk wants to patch boot part instead of init_boot on devices that ship A13

    Device: Pixel 7 Global Android version: 13 (comes with A13 and therefore used init_boot) Magisk version name: latest debug Magisk version code: 25205

    On devices that ship with A13 (pixel 7 for now) magisk isn't able to install on inactive slot after installing (not restarting yet) OTA update. This is due to magisk wanting to patch boot.img instead of init_boot.img while things like ramdisk is moved from boot to init_boot.

  • Magisk won't backup init_boot.img

    Magisk won't backup init_boot.img

    Device: Pixel 7 Android version: 13 Magisk version name: cf9957ce Magisk version code: 25205

    I'm using the latest version of Magisk on my pixel 7 and everything works fine. However, there is a small problem on this platform.

    As Google changed the name of their boot.image from boot.img to init_boot.img, I found Magisk won't backup the factory boot image after patching into a file, and this makes us impossible when we want to restore images.

    A temporary solution is to manually rename init_boot.img to boot.img before selecting it, and everything just works after this, factory boot image can be backed up safe and sound, which also makes restore process success.

    I suspect it's the Magisk strong match the filename boot.img that caused this problem? If so please add support to init_boot.img.

Related tags
BMI_automatics-faceshielding-device - this is a project utilizing STM32, MATLAB,Softmax classifier to achieve a portable face shielding(mask) device

BMI_automatics-faceshielding-device this is a project utilizing STM32, MATLAB,Softmax classifier to achieve a portable face shielding(mask) device in

Dec 23, 2021
Code repo for infos and demos on the DaFit Magic 3 Smartwatch

Magic3_DaFit Code repo for infos and demos on the DaFit Magic 3 Smartwatch Demos: Magic3_Display_test_by_atc1441 = Minimal full buffer Display example

Dec 28, 2021
Macro magic for declaring/calling Objective-C APIs from C11 or C++. Preloads selectors, chooses the correct objc_msgSend to call per method/platform.

OC - Easily Declare/Invoke Objective-C APIs from C11 or C++11 Usage // Call class and instance methods: NSWindow* const nswindow = oc_cls(NSWindow,new

Sep 9, 2022
A customized LGL Android mod menu, containing ESP only for PUBG Mobile 1.3.0 for Android
A customized LGL Android mod menu, containing ESP only for PUBG Mobile 1.3.0 for Android

PUBG Mobile ESP Mod Menu A customized LGL mod menu, containing ESP only for PUBG Mobile 1.3.0 for Android. Everything are fixed so it works with both

Mar 19, 2022
First open source android modding library for Geometry Dash Based on Hooking-and-Patching-android-template

Android-ML First open source android modding library for Geometry Dash Based on Hooking-and-Patching-android-template Installation Download this githu

Jul 17, 2022
A simple library that helps Android developers to execute JavaScript code from Android native side easily without using Webview.

AndroidJSModule A simple library that helps Android developers to execute JavaScript code from Android native side easily without using Webview. Insta

May 24, 2022
A repository for experimenting with elf loading and in-place patching of android native libraries on non-android operating systems.

droidports: A repository for experimenting with elf loading and in-place patching of android native libraries on non-android operating systems. Discla

Nov 25, 2022
Android NDK samples with Android Studio

NDK Samples This repository contains Android NDK samples with Android Studio C++ integration. These samples use the new CMake Android plugin with C++

Dec 1, 2022
ZXing ("Zebra Crossing") barcode scanning library for Java, Android
ZXing (

Project in Maintenance Mode Only The project is in maintenance mode, meaning, changes are driven by contributed patches. Only bug fixes and minor enha

Nov 25, 2022
Experimental telegram client based on official Android sources
Experimental telegram client based on official Android sources

Catogram Experimental telegram client based on official Android sources Catogram features: Message translator TGX Style of context menu VKUI Icons and

Nov 22, 2022
🗺️ OMAPS.APP — Offline OpenStreetMap maps for iOS and Android. A community-driven fork of MAPS.ME.
🗺️ OMAPS.APP — Offline OpenStreetMap maps for iOS and Android. A community-driven fork of MAPS.ME.

OMaps is an open source cross-platform offline maps application, built on top of crowd-sourced OpenStreetMap data. It was publicly released for iOS and Android.

Nov 27, 2022
A cross-platform (Android/iOS/Windows/macOS) cronet plugin for Flutter via `dart:ffi`

cronet_flutter A cross-platform (Android/iOS/Windows/macOS) cronet plugin for Flutter via dart:ffi

Nov 9, 2022
A light-weight Flutter Engine Embedder based on HADK ,which for Android devices that runs without any java code

flutter-hadk A light-weight Flutter Engine Embedder based on HADK ,which for Android devices that runs without any java code 1.Build by android-ndk-to

Jun 15, 2022
An attempt to run fcitx5 on Android

fcitx5-android-poc An attempt to run fcitx5 on Android. Project status It can build, run, and print to stdout. Build Dependencies Android SDK Platform

Nov 27, 2022
🎉 A framework for improving android 32bit app stability. (Alleviate crashes caused by insufficient virtual memory)

Patrons ?? A framework for improving android 32bit app stability. (Alleviate crashes caused by insufficient virtual memory) 一行代码解决 Android 32位应用因虚拟内存不

Nov 8, 2022
Telegram messenger for Android

Telegram is a messaging app with a focus on speed and security. It’s superfast, simple and free. This repo contains the official source code for Telegram App for Android.

Nov 22, 2022
Android Bindings for QuickJS, A fine little javascript engine.

quickjs-android quickjs-android 是 QuickJS JavaScript 引擎的 Android 接口框架,整体基于面向对象设计,提供了自动GC功能,使用简单。armeabi-v7a 的大小仅 350KB,是 Google V8 不错的替代品,启动速度比 V8 快,内

Nov 14, 2022
Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emulation
Sloth 🦥 is a coverage guided fuzzing framework for fuzzing Android Native libraries that makes use of libFuzzer and QEMU user-mode emulation

Sloth ?? Sloth is a fuzzing setup that makes use of libFuzzer and QEMU’s user-mode emulation (qemu/linux-user) on x86_64/aarch64 host to emulate aarch

Nov 3, 2022
This is a library that can bypass the hidden api restriction on Android 9-12.

BypassHiddenApiRestriction This is a library that can bypass the restrictions on non-SDK interfaces on Android 9-12.

Nov 14, 2022