GmsCore icon indicating copy to clipboard operation
GmsCore copied to clipboard

Is it possible to pass device integrity?

Open jurek4321 opened this issue 1 year ago • 5 comments

Hello, I updated microg to 0.3.6 and play integrity api is working. I'm able to pass "MEETS_BASIC_INTEGRITY" and I'm able to pass safetynet basic and CTS. "Device integrity" is failing. Here is my json output:

{
    "requestDetails": {
        "requestPackageName": "krypton.tbsafetychecker",
        "timestampMillis": "1735052462824",
        "nonce": "MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK"
    },
    "appIntegrity": {
        "appRecognitionVerdict": "PLAY_RECOGNIZED",
        "packageName": "krypton.tbsafetychecker",
        "certificateSha256Digest": [
            "3MOpHFrljB1TAwIhKpT8OgKDVTo0Rs0DuovQIunAPwo"
        ],
        "versionCode": "27700361"
    },
    "deviceIntegrity": {
        "deviceRecognitionVerdict": [
            "MEETS_BASIC_INTEGRITY"
        ]
    },
    "accountDetails": {
        "appLicensingVerdict": "UNEVALUATED"
    }
}

Adb logcat during integrity test:

12-24 16:01:00.903  8200  8236 I PlayCore: UID: [10105]  PID: [8200] IntegrityService : requestIntegrityToken(IntegrityTokenRequest{nonce=MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK, cloudProjectNumber=null, network=null})
12-24 16:01:00.904  8200  8466 I PlayCore: UID: [10105]  PID: [8200] IntegrityService : Initiate binding to the service.
12-24 16:01:00.905  8200  8200 W DynamiteModule: IDynamite loader version = 2, no high precision latency measurement.
12-24 16:01:00.907  1314  1338 D OomAdjuster: Not killing cached processes
12-24 16:01:00.910  8200  8200 I Ads     : Use RequestConfiguration.Builder().setTestDeviceIds(Arrays.asList("48E3EEDE058FBC2CAA45337D7558928D")) to get test ads on this device.
12-24 16:01:00.917  6427  6427 D IntegrityService: onBind
12-24 16:01:00.919  1314  1338 D CompatibilityChangeReporter: Compat change id reported: 161145287; UID 10105; state: ENABLED
12-24 16:01:00.919  1314  2968 D CompatibilityChangeReporter: Compat change id reported: 161145287; UID 10105; state: ENABLED
12-24 16:01:00.924  8200  8704 W DynamiteModule: IDynamite loader version = 2, no high precision latency measurement.
12-24 16:01:00.929  4608  4608 D AdRequestService: onBind: Intent { act=com.google.android.gms.ads.service.START pkg=com.google.android.gms }
12-24 16:01:00.939  8200  8200 I PlayCore: UID: [10105]  PID: [8200] IntegrityService : ServiceConnectionImpl.onServiceConnected(ComponentInfo{com.android.vending/com.google.android.finsky.integrityservice.IntegrityService})
12-24 16:01:00.940  8200  8466 I PlayCore: UID: [10105]  PID: [8200] IntegrityService : linkToDeath
12-24 16:01:00.940  6427  7408 D IntegrityService: Method (requestIntegrityToken) called
12-24 16:01:00.940  6427  7408 D IntegrityService: requestIntegrityToken(packageName: krypton.tbsafetychecker, nonce: MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK, cloudProjectNumber: 0, playCoreVersion: PlayCoreVersion{major=1, minor=4, patch=0})
12-24 16:01:00.942  6427  6427 W IntegrityExtensions: getAuthToken: No Google account found
12-24 16:01:00.942  6427  6427 W IntegrityService: requestIntegrityToken: Got null auth token for type: oauth2:https://www.googleapis.com/auth/googleplay
12-24 16:01:00.942  6427  6427 D IntegrityService: requestIntegrityToken authToken: 
12-24 16:01:00.942  6427  7914 D IntegrityService: Running DroidGuard (flow: pia_attest_e1, data: {pkg_key=krypton.tbsafetychecker, vc_key=27700361, nonce_sha256_key=ouZRfTihULxofAe_qc_Yi8PghScs42rm2dgBEFi4UCE, tm_s_key=1735052460, binding_key=<REMOVED>})
12-24 16:01:00.943  6427  7914 D GmsClient: connect()
12-24 16:01:00.943  6427  7914 D GmsMultiConKeeper: bind(com.google.android.gms.droidguard.service.START, org.microg.gms.common.GmsClient$GmsServiceConnection@771f22b, false) has=false
12-24 16:01:00.943  6427  7914 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) : bind()
12-24 16:01:00.944  6427  7914 D GmsMultiConKeeper: GMS service found for com.google.android.gms.droidguard.service.START
12-24 16:01:00.945  1314  1338 D ConnectivityService: requestNetwork for uid/pid:10105/8200 activeRequest: null callbackRequest: 177 [NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]] callback flags: 0 order: 2147483647
12-24 16:01:00.946  1314  2137 D ConnectivityService: NetReassign [178 : null → 100] [c 1] [a 0] [i 0]
12-24 16:01:00.946  1314  2121 D WifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946  2633  2633 D PhoneSwitcherNetworkRequstListener: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946  1314  2121 V WifiNetworkFactory: Accepted network request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946  1314  2121 D UntrustedWifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946  1314  2121 D OemPaidWifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946  1314  2121 D MultiInternetWifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946  6427  7914 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) :  bind() : bindService=true
12-24 16:01:00.947  6427  7914 D GmsMultiConKeeper: bind() : bound=true
12-24 16:01:00.947  1314  2137 D ConnectivityService: NetReassign [no changes] [c 0] [a 0] [i 0]
12-24 16:01:00.948  6427  6427 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) : ServiceConnection : onServiceConnected(ComponentInfo{com.google.android.gms/org.microg.gms.droidguard.core.DroidGuardService})
12-24 16:01:00.948  6427  6427 D GmsClient: ServiceConnection : onServiceConnected(ComponentInfo{com.google.android.gms/org.microg.gms.droidguard.core.DroidGuardService})
12-24 16:01:00.949  6427  6427 D GmsClient: GmsCallbacks : onPostInitComplete(com.google.android.gms.droidguard.internal.IDroidGuardService$Stub$Proxy@27c4821)
12-24 16:01:00.949  7919  7932 D GmsGuardServiceImpl: getHandle()
12-24 16:01:00.949  7919  7932 D GmsGuardChimera: b[getCallback](com.android.vending)
12-24 16:01:00.949  8200  8207 I tbsafetychecker: Compiler allocated 5561KB to compile void ngapainbang.hq7.<init>(ngapainbang.hp7, ngapainbang.r18, ngapainbang.l9a, ngapainbang.v38, ngapainbang.sx8, ngapainbang.td8, ngapainbang.y48, ngapainbang.oh9, ngapainbang.tj9, ngapainbang.s7a, ngapainbang.r4a, ngapainbang.r3a, ngapainbang.yq7)
12-24 16:01:00.949  7919  7932 D GmsGuardHandleImpl: initWithRequest(pia_attest_e1, DroidGuardResultsRequest[thirdPartyCallerAppPackageName=krypton.tbsafetychecker, openHandles=0, clientVersion=244735000, appArchitecture=aarch64])
12-24 16:01:00.954  4608  4707 D MeasurementService: bound by: GetServiceRequest[MEASUREMENT, packageName="krypton.tbsafetychecker", gmsVersion=12451000, scopes=[], extras=Bundle[{}], defaultFeatures=[], apiFeatures=[], supportsConnectionInfo=true]
12-24 16:01:00.954  4608  4707 D AdRequestService: bound by: GetServiceRequest[ADREQUEST, packageName="krypton.tbsafetychecker", gmsVersion=12451000, scopes=[], extras=Bundle[{}], defaultFeatures=[], apiFeatures=[], supportsConnectionInfo=true]
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 1 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 2 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 3 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 4 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 5 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 6 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 9 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 12 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 13 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D SafeParcel: Unknown field id 14 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957  4608  4707 D AdRequestService: getAdRequest
12-24 16:01:00.963  1314  1336 D GrammaticalInflection: The flag must be enabled to allow calling the API.
12-24 16:01:00.963  1314  1336 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 99001; state: DISABLED
12-24 16:01:00.964  1314  1434 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10105; state: ENABLED
12-24 16:01:00.964  8200  8200 D Ads     : Not supported
12-24 16:01:00.964  7919  7932 D GmsGuardCallback: b[getAndroidId]() = 4272923741383393086
12-24 16:01:00.964  8200  8200 I Ads     : Ad failed to load : 8
12-24 16:01:00.980  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=KeyStore algorithm=AndroidKeyStore
12-24 16:01:00.980  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Init proxy KeyStore SPI
12-24 16:01:00.980  2469  2469 D Zygote  : Forked child process 8713
12-24 16:01:00.981  1314  1434 I ActivityManager: Start proc 8713:com.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:1/u0i1 for  {krypton.tbsafetychecker/org.chromium.content.app.SandboxedProcessService0:1}
12-24 16:01:00.985  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=KeyPairGenerator algorithm=EC
12-24 16:01:00.987  4608  4707 D SafeParcel: Unknown field id 34 in com.google.android.gms.measurement.internal.AppMetadata, skipping.
12-24 16:01:00.987  4608  4707 D SafeParcel: Unknown field id 36 in com.google.android.gms.measurement.internal.AppMetadata, skipping.
12-24 16:01:00.987  4608  4707 D MeasurementService: sendEvent(com.google.android.gms.measurement.internal.EventParcel@4ac5e) for AppMetadata[krypton.tbsafetychecker]
12-24 16:01:00.987   694  4563 W keystore2: system/security/keystore2/src/remote_provisioning.rs:105 - Error occurred: system/security/keystore2/src/remote_provisioning.rs:138: Trying to get IRPC name.
12-24 16:01:00.987   694  4563 W keystore2: 
12-24 16:01:00.987   694  4563 W keystore2: Caused by:
12-24 16:01:00.987   694  4563 W keystore2:     0: system/security/keystore2/src/globals.rs:440
12-24 16:01:00.987   694  4563 W keystore2:     1: Error::Km(r#HARDWARE_TYPE_UNAVAILABLE)
12-24 16:01:00.990   692   704 D DrmLibTime: got the req here! ret=0
12-24 16:01:00.990   692   704 D DrmLibTime: command id, time_cmd_id = 770
12-24 16:01:00.990   692   704 D DrmLibTime: time_getutcsec starts!
12-24 16:01:00.990   692   704 D DrmLibTime: QSEE Time Listener: time_getutcsec
12-24 16:01:00.990   692   704 D DrmLibTime: QSEE Time Listener: get_utc_seconds
12-24 16:01:00.990   692   704 D DrmLibTime: QSEE Time Listener: time_get_modem_time
12-24 16:01:00.990   692   704 D DrmLibTime: QSEE Time Listener: Checking if ATS_MODEM is set or not.
12-24 16:01:00.990   692   704 D QC-time-services: Lib:time_genoff_operation: pargs->base = 13
12-24 16:01:00.990   692   704 D QC-time-services: Lib:time_genoff_operation: pargs->operation = 2
12-24 16:01:00.990   692   704 D QC-time-services: Lib:time_genoff_operation: pargs->ts_val = 0
12-24 16:01:00.991   692   704 D QC-time-services: Lib:time_genoff_operation: Send to server  passed!!
12-24 16:01:00.991   983   993 D QC-time-services: Daemon: Connection accepted:time_genoff
12-24 16:01:00.991   983  8716 D QC-time-services: Daemon:Received base = 13, unit = 1, operation = 2,value = 0
12-24 16:01:00.991   983  8716 D QC-time-services: Daemon:genoff_opr: Base = 13, val = 0, operation = 2
12-24 16:01:00.991   983  8716 D QC-time-services: offset is: 1 for base: 13
12-24 16:01:00.991   692   704 E QC-time-services: Receive Passed == base = 13, unit = 1, operation = 2, result = 0
12-24 16:01:00.991   692   704 D DrmLibTime: QSEE Time Listener: ATS_MODEM is set. Try to retrieve it.
12-24 16:01:00.992   983   993 E QC-time-services: Daemon: Time-services: Waiting to acceptconnection
12-24 16:01:00.992   983   993 D QC-time-services: Daemon: Connection accepted:time_genoff
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:Received base = 13, unit = 1, operation = 1,value = 0
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:genoff_opr: Base = 13, val = 0, operation = 1
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon: genoff get for 13
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:Value read from QTimer mseconds = 617629
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:Value read from RTC mseconds on boot = 56179596000
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:Value read from QTimer mseconds = 617629
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:Value read from generic offset = 1678872262636
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:Delta read on boot mseconds = 56179581941
12-24 16:01:00.992   983  8717 D QC-time-services: Daemon:Final Time = 1735052462206
12-24 16:01:00.992   692   704 D DrmLibTime: QSEE Time Listener: Time GenOff - seconds: 1735052462
12-24 16:01:00.992   692   704 D DrmLibTime: time_getutcsec returns 0, sec = 1735052462; nsec = 0
12-24 16:01:00.992   692   704 D DrmLibTime: time_getutcsec finished! 
12-24 16:01:00.992   692   704 D DrmLibTime: iotcl_continue_command finished! and return 0 
12-24 16:01:00.992   692   704 D DrmLibTime: before calling ioctl to read the next time_cmd
12-24 16:01:00.992   983   993 E QC-time-services: Daemon: Time-services: Waiting to acceptconnection
12-24 16:01:00.993  8713  8713 I ocessService0:1: Using CollectorTypeCC GC.
12-24 16:01:00.997  2633  2633 W FeatureConnection: getRegistrationTech: ImsRegistration is null
12-24 16:01:01.004  8713  8713 E ocessService0:1: Not starting debugger since process cannot load the jdwp agent.
12-24 16:01:01.009  8713  8713 D nativeloader: Load libframework-connectivity-tiramisu-jni.so using APEX ns com_android_tethering for caller /apex/com.android.tethering/javalib/framework-connectivity-t.jar: ok
12-24 16:01:01.011   662   662 E KeyMasterHalDevice: Attest key send cmd failed
12-24 16:01:01.012   662   662 E KeyMasterHalDevice: ret: 0
12-24 16:01:01.012   662   662 E KeyMasterHalDevice: resp->status: -10003
12-24 16:01:01.009     0     0 I binder  : 8713:8713 ioctl 40046210 ffc7fdfc returned -22
12-24 16:01:01.018  4509  4537 D ForegroundUtils: Foreground UID status:
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 1027 is in foreground: true
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10104 is in foreground: false
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10105 is in foreground: true
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10159 is in foreground: false
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10173 is in foreground: false
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10227 is in foreground: false
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10235 is in foreground: true
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10241 is in foreground: true
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10242 is in foreground: false
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10249 is in foreground: false
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 10258 is in foreground: false
12-24 16:01:01.018  4509  4537 D ForegroundUtils: UID: 1010241 is in foreground: true
12-24 16:01:01.020   694  4563 E keystore2: system/security/keystore2/src/error.rs:200 - system/security/keystore2/src/security_level.rs:623
12-24 16:01:01.020   694  4563 E keystore2: 
12-24 16:01:01.020   694  4563 E keystore2: Caused by:
12-24 16:01:01.020   694  4563 E keystore2:     0: system/security/keystore2/src/security_level.rs:621: While generating Key without explicit attestation key.
12-24 16:01:01.020   694  4563 E keystore2:     1: Error::Km(-10003)
12-24 16:01:01.022  8713  8713 D CompatibilityChangeReporter: Compat change id reported: 171979766; UID 99001; state: ENABLED
12-24 16:01:01.022  8713  8713 D CompatibilityChangeReporter: Compat change id reported: 242716250; UID 99001; state: ENABLED
12-24 16:01:01.024  7919  7932 W id.gms.unstable: Accessing hidden method Landroid/security/KeyStoreException;->getErrorCode()I (blocked,test-api, JNI, denied)
12-24 16:01:01.024  7919  7932 W id.gms.unstable: If this is a platform test consider enabling VMRuntime.ALLOW_TEST_API_ACCESS change id for this package.
12-24 16:01:01.025  7919  7932 D GmsGuardCallback: c[getPackageName]() = com.android.vending
12-24 16:01:01.032     0     0 W servicemanager: Isolated app with UID 99001 requested 'network_management', but the service is not allowed for isolated apps.
12-24 16:01:01.041  8713  8713 I cr_WebViewApkApp: version=131.0.6778.81 (677808101) minSdkVersion=26 isBundle=false processName=com.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:1
12-24 16:01:01.044  8713  8713 I cr_ChildProcessService: Creating new ChildProcessService pid=8713
12-24 16:01:01.038     0     0 W servicemanager: Isolated app with UID 99001 requested 'connectivity', but the service is not allowed for isolated apps.
12-24 16:01:01.043     0     0 E SELinux : avc:  denied  { find } for pid=8713 uid=99001 name=content_capture scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=0
12-24 16:01:01.056  8713  8732 I cr_LibraryLoader: Successfully loaded native library
12-24 16:01:01.057  8713  8732 I cr_CachingUmaRecorder: Flushed 2 samples from 2 histograms, 0 samples were dropped.
12-24 16:01:01.066  8713  8732 W SystemServiceRegistry: No service published for: uimode
12-24 16:01:01.062     0     0 W servicemanager: Isolated app with UID 99001 requested 'uimode', but the service is not allowed for isolated apps.
12-24 16:01:01.076  8713  8732 W chromium: [WARNING:runtime_features.cc(598)] Fenced frames cannot be enabled in this configuration. Use --enable-features=FencedFrames instead.
12-24 16:01:01.076  8713  8732 W chromium: [WARNING:runtime_features.cc(623)] Topics cannot be enabled in this configuration. Use --enable-features=BrowsingTopics in addition.
12-24 16:01:01.076  8713  8732 W chromium: [WARNING:runtime_features.cc(643)] SharedStorage cannot be enabled in this configuration. Use --enable-features=SharedStorageAPI in addition.
12-24 16:01:01.077  8713  8732 W chromium: [WARNING:runtime_features.cc(653)] SharedStorage for M118+ cannot be enabled in this configuration. Use --enable-features=SharedStorageAPI,SharedStorageAPIM118 in addition.
12-24 16:01:01.077  8713  8732 W chromium: [WARNING:runtime_features.cc(675)] AttributionReporting cannot be enabled in this configuration. Use --enable-features=ConversionMeasurement in addition.
12-24 16:01:01.081  1314  1336 D FileUtils: Rounded bytes from 8012386304 to 8000000000
12-24 16:01:01.112  8200  8297 E chromium: [ERROR:ssl_client_socket_impl.cc(878)] handshake failed; returned -1, SSL error code 1, net_error -202
12-24 16:01:01.175  7919  7932 D GmsGuardCallback: b[getAndroidId]() = 4272923741383393086
12-24 16:01:01.363  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=KeyStore algorithm=AndroidKeyStore
12-24 16:01:01.363  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Init proxy KeyStore SPI
12-24 16:01:01.367  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=CertificateFactory algorithm=X.509
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=AlgorithmParameters algorithm=EC
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Proxy key store: get certificate chain
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: dalvik.system.VMStack.getThreadStackTrace(Native Method)
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: java.lang.Thread.getStackTrace(Thread.java:1841)
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: b.a.engineGetCertificateChain(SourceFile:1)
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: java.security.KeyStoreSpi.engineGetEntry(KeyStoreSpi.java:513)
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: java.security.KeyStore.getEntry(KeyStore.java:1581)
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: com.google.ccc.abuse.droidguard.DroidGuard.initNative(Native Method)
12-24 16:01:01.368  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Blocking call
12-24 16:01:01.517  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: QUALCOMM build                   : 8e5405b, I57aaec3440
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: Build Date                       : 05/21/21
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: OpenGL ES Shader Compiler Version: EV031.32.02.10
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: Local Branch                     : mybranchebba1dbe-451b-f160-ac81-1458d0b52ae8
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: Remote Branch                    : quic/gfx-adreno.lnx.1.0.r135-rel
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: Remote Branch                    : NONE
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: Reconstruct Branch               : NOTHING
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: Build Config                     : S P 10.0.7 AArch64
12-24 16:01:01.517  7919  7932 I AdrenoGLES-0: Driver Path                      : /vendor/lib64/egl/libGLESv2_adreno.so
12-24 16:01:01.520  7919  7932 I AdrenoGLES-0: PFP: 0x016ee190, ME: 0x00000000
12-24 16:01:01.532  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532  7919  7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.538  6427  6427 W DroidGuardApiClient: DroidGuardInitReply suggests additional actions in main thread
12-24 16:01:01.538  6427  6427 D DroidGuardApiClient: reply.object[a] = 1
12-24 16:01:01.538  6427  6427 D DroidGuardApiClient: reply.object[b] = [B@31b8607
12-24 16:01:01.538  6427  6427 D DroidGuardApiClient: reply.object[c] = [B@5f86334
12-24 16:01:01.538  6427  6427 D DroidGuardApiClient: reply.object[d] = pia_attest_e1
12-24 16:01:01.538  6427  6427 D DroidGuardApiClient: reply.object[e] = {ParcelFileDescriptor: java.io.FileDescriptor@1520ed2}
12-24 16:01:01.538  6427  6427 D DroidGuardApiClient: reply.object[h] = EA77286092255610BD653E1A63B845FDE2310FA1
12-24 16:01:01.542  7919  7948 D GmsGuardHandleImpl: snapshot({tm_s_key=1735052460, binding_key=<REMOVED>, pkg_key=krypton.tbsafetychecker, vc_key=27700361, nonce_sha256_key=ouZRfTihULxofAe_qc_Yi8PghScs42rm2dgBEFi4UCE})
12-24 16:01:01.792  1314  2121 D WifiClientModeImpl[18186:wlan0]: updateLinkLayerStatsRssiSpeedFrequencyCapabilities rssi=-46 TxLinkspeed=400 freq=5560 RxLinkSpeed=300
12-24 16:01:01.794  1314  2121 D WifiDataStall: tx tput in kbps: 357734
12-24 16:01:01.794  1314  2121 D WifiDataStall: rx tput in kbps: 282421
12-24 16:01:01.861  7919  7948 D GmsGuardHandleImpl: close()
12-24 16:01:01.861  6427  7917 D GmsClient: disconnect()
12-24 16:01:01.861  6427  7917 D GmsMultiConKeeper: unbind(com.google.android.gms.droidguard.service.START, org.microg.gms.common.GmsClient$GmsServiceConnection@771f22b)
12-24 16:01:01.861  6427  7917 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) : unbind()
12-24 16:01:01.863  6427  7914 D IntegrityService: Running DroidGuard (flow: pia_attest_e1, droidGuardToken: Cga6oYXM6DbSEFsAAMxJhDkwDjBmAA06E8eGgWWQAJIi0yqypVtzAY08MoPbcsJ2AK7bfnr1zzr6Ac_GdwK746QdAKnHnak7Za2DBV6CVhb6qO81ARvB-909K8_2ARVWM3GYTFYQ2gfpBwDroQgStAnliuwUxKkGJZza22AQ8R4kTpjh0dlw7wWDKRLAkwp7UosW0xNjwciSYZG4Pb5aTILOTduszaHbHgRIVToB_80yrlYqniPerX1o-7KYkWSXs39XtUSyAWdls-xPHqHFNldwtbEBywuBuGN624fLek3eR-U8YIN_v3ikNPA5MokB-7-63fC2wuwqhmW-dnB1JVVyfvzeon0qUml7XKmSI2OrgOioeB98hwQNmPmtkIrsjDSpt3OjTQqaBvNSN3fVY0ZfpPV42w35Lu7IB4dtzvOBH0PfUTmoyvHGDp5ufj_pv_JTb5C4X8gxMEXpa-f2IWjRZjM68EfyxNwyMQ2hhOTS3H4qHcP6hGioCjPHLS1EBOim1XfdkR5pVaSWnKjrFRUeeGqIdVNRNvBZtKs3QUTBPv_1OuACUcT3MnxdZPVKammQi9mLDmcKRtWWy0qanT9Fi1tvDNUE6DlHy0D3FH4Fg0nraAk-SASxL9XuHBJr-hH9DbVIkQ4SHTAbimNEZ1r9Kddd87BDLJBS2L_WRbvf8YEoqep3-KJtv8wCf5pLrgxUsraHfbxJjE8Y5yuH7q_BWSxyp8g9NGiObysN19_qWMlz7Oit_WxhqnDaMw7Dibkeyno0jvUTERWxVFw8R3GfgIPJB4ajvs1DFHnZmPNp3RBrOttbo3-1cLddNd9AoBn-rGekp_Pr29An5RI6Hkob-26p6z4Vy4huSo3k8OOsuOKwkBLiZiqYm5cXN0w1vKK7sse8OqfSI0dPB04hvpL3LO6CXU6rnvrVowrtHEPfzdNAbD0NeadrKWHk_FsqnJZxcDHqeejDWXAmGDq0ytIn-G_x-oSQO4neVu5HkvUn7esitGWaJUVZI0PoztnSxSfTsWzZFikwC7C4VvuUz0Afz-rqV566Q2msjSp1Bzf434X843GhpaGKOJEudmalL2QdYW2GpClUkxL1ZfD6XwRPWXpAxecpTZN3eRPcclKDDnqYktgro5msExq-ihtx0JK5WIRNSg1iQBrQe3vUsDOgd5s8lW-fxAyz2WL4TyHS-QdjgiD0n_dHYmv-USaIbbWCpJPCbe-lY8WTrw2qq5xi361qhy-z4P4uHjKEn0FIwUEZarFVBIcqqPhEUZxBQMUbQJKnDbELBHV1Ob8lMegjsbMtv6nP7OIoX8PhvnxRk7Vd2nMn4U-2BUdNLQOG3xMEIhz-kpnNwiRYYoypkmM6I9Q_UM8BFY-_l5PaOtGF8yckhnM8IGQ0NImIy6ZmOTQCs-5PPrGDeQdfHZPXkpZvlF5lL9Ihm63o4nQhqjR4dABwX50TJU_AosKY2Obq684YOGHQD8Khpvj82a3pIDhrOEuYEqqr-ZXp4dSnMtoNgAHQD4vG1c_Ru6rY9AEST2uM-w4tcX5wCUikCLCZKLlXHHT4jK00MwrKfHQ5Qeg1uVC38ActZCU2Qm2ArJjnZJ4Dn9Qbs8m6ahLRSPBeXxW_sFSirr7wNY_MfCWwK5-qECCXDRqOCwEFci5DlihRtV4bMGCr8kduWoTbK9EO69haIZgSp4nD3v7d8OuoAeIN2iUKBrqhhczoNtIQWwAAzEmEOTAOMGYADToTx4aBZZAAkiLTKrKlW3MBjTwyg9tywnYArtt-evXPOvoBz8Z3ArvjpB0AqcedqTtlrYMFXoJWFvqo7zUBG8H73T0rz_YBFVYzcZhMVhDQD9KigJXqoZPQ7AESwiQ6aalkfar9lXSQqSemNVwQDNw0keQcoWdsE4TNzaOBFAS2LscpIl-FgVqnzr5-Qp7LR0SD80rEdU4rGPFE7GtqZ0ck3exW2-HKtRPq61Z1X6sLEE0_9Zfl6cQTXXDhOR38_DdnY0LYQ7lkzjNr-KIpmNSabU9PKcMkHZziWpLCtQZ7gJUYlW19KkKYUSudLoJ6u8kxZddUxuVvHKe4GMEqRvbYtRG_Y2QIWYtnjNpP3GzGWMk33bsKhV4oEkiVO1HuoceQW55dORgUZH77DL5X6o7HldXHcME1uHczOy_UqgdPn7Jjm3tu32NaazyKPlSSmo8prkRHBtTdtairiOBLmNqD3zF8N1BNR_iGwPyCIUh-XEB3-ochqbznVOnEgIavLdwqrzo8B20hshig6_bfbF_rSiBJq6RBUAIQTgtZxvF4_S_zJxbLCsjrpuCNGkZU3pUC-bWLIsMFp8km5qRkOU1AzcevltqISn7DqQxitVCvCkvGe1AontBspR3D1m8_DvTTTfIEQC3cEElJib8bjdiQNwHptsasYkoaOgu8pyZng0r16XvSnixiVHWlYnmSIWL1i7ETinM1r_7xqtTgq2b1uD5GnPxDsuOfoQwXQu3JUBicaFQDTWWXXe1TyPL5SIaXHF5EMHh50rG3HDCwwzQ1d6tbWIzgeSD6HLA6s4PYk5e8mbMW-m8Wj3M7nOdzdgMOD5ehhGhLf4Q6UQ-TPXwoKlb3vyRBRW9whcgulFz4dV2ciExK-M0Vr_2S2XYBKEVNkFG9FK9tmJ8NyryXfXcX2c6pA67oMd_cj9kA8-FAh5eCWC5ejDcnMM6vv8BVLme2pwbxO3aAQwpG_IVTOfV5tGl-CZm5ceCqnKHA9snC2NF7-DrjndySPTj6CTTc115WmV2b055AzL8Zseguq-NxCmQyyDl_mXbLjcVStkNQRdgYeGHrHvsqrqwQ4PnKgwZVdN1_GUvRPhe4iXB_fogUHuCPxahmNFyvHhltAZqib264gEJ6Qq3d_d4SSneCnw21Uc7hrlmRf1WFNkfZf13K-Yh5gyI7Vz4f45P2RHUtvqQFLMxfTRdcdpNo_FRKr65EyWHFOKmrX7z9schJ_O2ZwaNnWWQaN07YlWLKI9j8e87oT9382EerqRPR2xEOBSvrSQsBdxJmpNmWanc-zEzrZqkqy4WEb0RepfD9Z4Bee6FP9iLnwqxlOnEHePcX4Fmoq56qohCda1ziSLCm3nI3evlzkJ_gbfJK9GmajeQYzu7pEOJeCaMc7WVrs5vHT-Ma6y8laZXX9fErcGwEJ3Hgn9nC68vCrXIV8MYbejZlRCaNG6-8TyxyhlR1KwWkFijFyBBkjs5TKh6c98izQcpO-VyOnvBs0eP9qDT__Bx9X3689sKKSxdY8oNWJPi-6pbo-JHYr5-ECgQ4y-ulvlBY47XKqQRK0Mrmt61CL7jxzEKEmoichbo1U-6Kh3wEmJ6FPv0XYIgQmYMf-1jYT37b3bICc06wxcHZ1ehzkdKYqvop8g5l6HKOVa-P2zZ8gu7IKnB5u99iC7CLtCnxXQIfSWyW7jE12tcGDSf3qcpe5AmNZnwcbPmPNWhLvTBsEVxCULVJQVvpA6g78gQu9_-tECV7kTFfd81EsxSRr1rygpxu21NLEJN5JXjzMCIjilgifxLxmKqvZEe1fkU2ru_5_6T6391-CC3rjSIxHJkU584mf5hEsZ7C-DJf77c8y96MiqLpdiNuXi214r5Tn2UYbOpk6OAZidrH15114EZQCM0fAoiOhEKkSpxo_bOMbppwdcFTB8YKAxUcuEp2SIvMhgYU5S_LeKd5uezT494aXaSop_7FVdDDNRi3hb7qIpOznxpwBmx1BB7HWeVmKdBMQkAoIlUp2z3aA9WQHStl8333XUOXhf28mS-TMQKyMBWRvMkKfYrOGhv71ycv_7yOmF-PAzjHnnv9futl4o-mf48Trap51E06EYZKJvLov7AWoKP-WjYUkoLU4RtsR0odnO_2seu8-AC3maLFlL_hFm1hHb7FDQJATs7-MRPma5Zp2LkHCBUmgynf7sfOTZlNM5i5uNpqBF8tegLcGA_KhGxlBomXRQ_hCpsANKQfmYZNpCEQ0tU
12-24 16:01:01.869  6427  6427 D IntegrityService: requestIntegrityToken integrityRequest: IntegrityRequest{droidGuardTokenRaw=[size=23606 hex=0a06baa185cce836d2105b0000cc498439300e3066000d3a13c786816590009222d32ab2a55b73018d3c3283db72c27600aedb7e7af5cf3afa01cfc67702bbe3…], params=IntegrityParams{packageName=PackageNameWrapper{value_=krypton.tbsafetychecker}, versionCode=VersionCodeWrapper{value_=27700361}, nonce=MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK, certificateSha256Digests=[3MOpHFrljB1TAwIhKpT8OgKDVTo0Rs0DuovQIunAPwo], timestampAtRequest=Timestamp{seconds=1735052460, nanos=941000000}}, flowName=pia_attest_e1, playCoreVersion=PlayCoreVersion{major=1, minor=4, patch=0}, playProtectDetails=PlayProtectDetails{state=PLAY_PROTECT_STATE_NO_PROBLEMS}, appAccessRiskDetailsResponse=AppAccessRiskDetailsResponse{installedAppsSignalDataWrapper=InstalledAppsSignalDataWrapper{installedAppsSignalData=.}, screenCaptureSignalDataWrapper=ScreenCaptureSignalDataWrapper{screenCaptureSignalData=.}, screenOverlaySignalDataWrapper=ScreenOverlaySignalDataWrapper{screenOverlaySignalData=.}, accessibilityAbuseSignalDataWrapper=AccessibilityAbuseSignalDataWrapper{}, displayListenerMetadataWrapper=DisplayListenerMetadataWrapper{lastDisplayAddedTimeDelta=Timestamp{seconds=613549617, nanos=160000000}}}}
12-24 16:01:01.877  6427  6427 V VendingRequestHeaders: X-PS-RH: H4sIAAAAAAAA_3WOv07bUBTG7Yii1BIqytRmAlSkqpLt-8fXsYMYTrADbnIdOwSBs0S2uSqYQBSblJiX4A06dOjAxBNUfY6-QueuFUFEqjrwSUfnO2f4fp_yRbk-MAoPlhoxXrK5R_jAo0UWln6Wzv1udOPnEfJzuHFx97ObAfJvI8ydo5IPeog76S13IDRm7ahHA5xkcevsUtB25iXlycE8jfe9CZ84sHd8osKn4ROnX1VWFakm1aXhrrLjghvBuQfhGXSg5fG9DhlOG8W-y53p2PScwxf-xwBJpfoql77Jm8q76lbtDQQENGIgGzENIVqvYGNDqlUS6a18L_-Ulde9KxGMZ4U5qK1M08llfa3nu0H36HADTITpFmmfXxUXpU4bGlvkqMTeJmibtRbjPLug_2yZyYxGgyHj4_8R6MffP7_vHr5-32mGS5i-3NZg5Lrw72piqvc7IdYIXsheFMZ6XxOnVkrSER6R5qwQuZ6LsYgLoV6Isvglf1DeW3b8BDLV2EqwatgWVROR2ipliKWGEJZlWuuVR24UGA_aAQAA
12-24 16:01:01.877  6427  6427 V VendingRequestHeaders: User-Agent: Finsky/37.5.24-29%20%5B0%5D%20%5BPR%5D%20565477504 (api=3,versionCode=244735012,sdk=34,device=OnePlus6T,hardware=qcom,product=OnePlus6T,platformVersionRelease=14,model=ONEPLUS%20A6013,buildId=AP2A.240905.003,isWideScreen=0,supportedAbis=arm64-v8a;armeabi-v7a;armeabi)
12-24 16:01:02.292  6427  6427 D IntegrityService: requestIntegrityToken integrityResponse: IntegrityResponse{contentWrapper=IntegrityContentWrapper{content=IntegrityContent{token=eyJhbGciOiJBMjU2S1ciLCJlbmMiOiJBMjU2R0NNIn0.JdlS-loZ4Vr4s1LSy-S6pNzbHJaG_F1wYASuNPEA9BWaw2syjVmVMQ.s4jeI2AQJLCD0nnm.HyF-FLHBTOTaJ-v4PuRHyziAh59MKklp5a0BlMp-X5IG6zoxJIT4PBXzVQ0J4wHBqBCHr7GjBJySrTzta56hY6AqxbFsHmTKtOyo0ofbKb_P-2GepZH7vofZeG0lGu62nCJD04w-CySvJ9MFiBZExAleSKbkvJr468cIk00JjdyURvdeQFUhWmJCFD44vZ5sBvltyaf0cIa7cNkE1PAPLaAxU70QySVxrH7niqNS3jBmmdj6MYBlDiSCWy2ACSt2yUk9cvmNAbCcCSOyczB7bSAEBhcKomQWBjHNxq_PqoAQ9PtxhlG8fY_c-e35RcAFOjHZWVuOvjvaUJ3S5lc2cyrvxSXvGQ72NXLS-BocR97L3wu6JfKleEJyBxuJEIdwZqP7VFeCprBYA-V3MZaWsjLADtygyROdpAsuwC7WOWZeWfb4_w6B2PDxpHeAZ0DfUsYZYuZhA81hLhRf_VkFU2wxHML0nqq8m8sGqxii40uxyPHMR-yvsKkqlWN_SqWW0S7ssWejl5-uiKCCp_DAYfYPoM_g8VLULe7sahBpjRqvcJav6i-UhA3KvKay4CsGRPWGlVuc8eTj895zwYkkzjqCh9uG-YUva-TbBeCT1wm83mCxeDXNdSSwO2r-6GolXj_tQ5KyBjbu7DXWQ7GNR9WOHOaZl8mHVw_bx1KUdT42Om-1AIyO8HxAgeZSSTHskZcI6eVkxRPj-X67m3pAqlBQSgqYfBTXpY7A9hCKI_0gc7bp-LrNNqk57FW7qLIkHLIZocNrg-F-pluoIX9_TtIaSZ1kXfCsnaSIlF_6mDW6wQSMaIbIph-8OabvtEHSmTojJobKu8NPWEMz5j4Oq6hPc7fraCwpcpqXp49vTla1erWhtr3nsl-zktMX85g0Q7SInLQsoP38UKTx0Ble49N5sa5upbjLB12ZSOAh5-lQ7wBNPw_DXUUDTSkkIjeVvCwHXaC--4wCe2m9GYyrIuq8rFmkFSiFIry9gZ_qI57gyXhMym14KVSuUMNlEIsnD7tWySSBa_-MkUidZSwBuK4JNHJRYwpDpHAo3xE-O7nk2qymJnR-nUmL3C3kkqY15NL3ckm_jJdXjjjkPueVEExJK9PUfWrzdZJswyAPZQBNKdLd_QoJr-5oQTR2-MRUhNs5bqDky4jqUP5N42C3QeQ9JGsOwGiHJ47yXCiirlabtxMi5PyHlC5JV8iR1bJQCTwAw-wNS7R8yVsKLG-yiNJXKUwps-LGSDhiVENZVjc2JXidGCZfOy-boIn95yGxfH6uzkW4Y31my2gsI8wcGVkZ2Qckk56q_gefy5Zk-7Bym9O6TAtlw0V6sd9RgvehbuuWXZOFK6OBLJb-UHdQ7iuQ4KyFgdBN63x1ueCE2bdIr9b4XTpHLFzfN9LuGeVZKTS01oQajK4OO4utzrcOVid56JIRRzUVeFSKnwmyRncyJMoNinCSPMACxKdz_rjyCIit.EhKA04w4liug2mnrGUFCLw}}}
12-24 16:01:02.292  6427  6427 D IntegrityService: requestIntegrityToken integrityToken: eyJhbGciOiJBMjU2S1ciLCJlbmMiOiJBMjU2R0NNIn0.JdlS-loZ4Vr4s1LSy-S6pNzbHJaG_F1wYASuNPEA9BWaw2syjVmVMQ.s4jeI2AQJLCD0nnm.HyF-FLHBTOTaJ-v4PuRHyziAh59MKklp5a0BlMp-X5IG6zoxJIT4PBXzVQ0J4wHBqBCHr7GjBJySrTzta56hY6AqxbFsHmTKtOyo0ofbKb_P-2GepZH7vofZeG0lGu62nCJD04w-CySvJ9MFiBZExAleSKbkvJr468cIk00JjdyURvdeQFUhWmJCFD44vZ5sBvltyaf0cIa7cNkE1PAPLaAxU70QySVxrH7niqNS3jBmmdj6MYBlDiSCWy2ACSt2yUk9cvmNAbCcCSOyczB7bSAEBhcKomQWBjHNxq_PqoAQ9PtxhlG8fY_c-e35RcAFOjHZWVuOvjvaUJ3S5lc2cyrvxSXvGQ72NXLS-BocR97L3wu6JfKleEJyBxuJEIdwZqP7VFeCprBYA-V3MZaWsjLADtygyROdpAsuwC7WOWZeWfb4_w6B2PDxpHeAZ0DfUsYZYuZhA81hLhRf_VkFU2wxHML0nqq8m8sGqxii40uxyPHMR-yvsKkqlWN_SqWW0S7ssWejl5-uiKCCp_DAYfYPoM_g8VLULe7sahBpjRqvcJav6i-UhA3KvKay4CsGRPWGlVuc8eTj895zwYkkzjqCh9uG-YUva-TbBeCT1wm83mCxeDXNdSSwO2r-6GolXj_tQ5KyBjbu7DXWQ7GNR9WOHOaZl8mHVw_bx1KUdT42Om-1AIyO8HxAgeZSSTHskZcI6eVkxRPj-X67m3pAqlBQSgqYfBTXpY7A9hCKI_0gc7bp-LrNNqk57FW7qLIkHLIZocNrg-F-pluoIX9_TtIaSZ1kXfCsnaSIlF_6mDW6wQSMaIbIph-8OabvtEHSmTojJobKu8NPWEMz5j4Oq6hPc7fraCwpcpqXp49vTla1erWhtr3nsl-zktMX85g0Q7SInLQsoP38UKTx0Ble49N5sa5upbjLB12ZSOAh5-lQ7wBNPw_DXUUDTSkkIjeVvCwHXaC--4wCe2m9GYyrIuq8rFmkFSiFIry9gZ_qI57gyXhMym14KVSuUMNlEIsnD7tWySSBa_-MkUidZSwBuK4JNHJRYwpDpHAo3xE-O7nk2qymJnR-nUmL3C3kkqY15NL3ckm_jJdXjjjkPueVEExJK9PUfWrzdZJswyAPZQBNKdLd_QoJr-5oQTR2-MRUhNs5bqDky4jqUP5N42C3QeQ9JGsOwGiHJ47yXCiirlabtxMi5PyHlC5JV8iR1bJQCTwAw-wNS7R8yVsKLG-yiNJXKUwps-LGSDhiVENZVjc2JXidGCZfOy-boIn95yGxfH6uzkW4Y31my2gsI8wcGVkZ2Qckk56q_gefy5Zk-7Bym9O6TAtlw0V6sd9RgvehbuuWXZOFK6OBLJb-UHdQ7iuQ4KyFgdBN63x1ueCE2bdIr9b4XTpHLFzfN9LuGeVZKTS01oQajK4OO4utzrcOVid56JIRRzUVeFSKnwmyRncyJMoNinCSPMACxKdz_rjyCIit.EhKA04w4liug2mnrGUFCLw
12-24 16:01:02.294  8200  8213 I PlayCore: UID: [10105]  PID: [8200] OnRequestIntegrityTokenCallback : onRequestIntegrityToken
12-24 16:01:02.295  6427  6427 D IntegrityService: requestIntegrityToken() success for krypton.tbsafetychecker)
12-24 16:01:02.300  8200  8466 I PlayCore: UID: [10105]  PID: [8200] IntegrityService : Unbind from service.
12-24 16:01:02.302  6427  6427 D IntegrityService: onUnbind

I use following magisk modules: MagiskHide Props Config Systemless Hosts Universal SafetyNet Fix (safetynet-fix-v2.4.0-MOD_1.3-microG)

Is it possible to pass device integrity with microG? What magisk modules are required for this?

jurek4321 avatar Dec 24 '24 15:12 jurek4321

https://github.com/daboynb/playcurlNEXT?tab=readme-ov-file#recommended-setups

Kranzes avatar Dec 24 '24 15:12 Kranzes

Thanks, It worked.

jurek4321 avatar Dec 24 '24 16:12 jurek4321

Thanks, It worked.

You mean you passed "Strong integrity" ?

freechelmi avatar Dec 26 '24 18:12 freechelmi

Device, not strong. For strong you need a valid keybox to spoof the device hardware attestation.

Kranzes avatar Dec 26 '24 18:12 Kranzes

Hey, will all the modules listed here, putting Microg on the deny list enforced, and getting trickystore, I still can't pass more than basic. Any help?

A-Australian avatar Dec 27 '24 11:12 A-Australian

@A-Australian To pass device integrity you only need magisk and these two magisk modules: https://github.com/osm0sis/PlayIntegrityFork https://github.com/daboynb/playcurlNEXT

trickystore is not needed to pass device integrity.

jurek4321 avatar Dec 28 '24 19:12 jurek4321

@jurek4321 I have tried those 2 modules, I still only pass basic, any idea why?

alarmingly avatar Dec 28 '24 23:12 alarmingly

Can someone close this issue as you can get device integrity with 0.3.7?

FSaurenbach avatar Jun 24 '25 18:06 FSaurenbach

Play Integrity now works for most people, if someone has additional problems please open a more specific ticket.

ale5000-git avatar Jun 24 '25 21:06 ale5000-git