Hello,
I updated microg to 0.3.6 and play integrity api is working.
I'm able to …pass "MEETS_BASIC_INTEGRITY" and I'm able to pass safetynet basic and CTS.
"Device integrity" is failing.
Here is my json output:
```
{
"requestDetails": {
"requestPackageName": "krypton.tbsafetychecker",
"timestampMillis": "1735052462824",
"nonce": "MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK"
},
"appIntegrity": {
"appRecognitionVerdict": "PLAY_RECOGNIZED",
"packageName": "krypton.tbsafetychecker",
"certificateSha256Digest": [
"3MOpHFrljB1TAwIhKpT8OgKDVTo0Rs0DuovQIunAPwo"
],
"versionCode": "27700361"
},
"deviceIntegrity": {
"deviceRecognitionVerdict": [
"MEETS_BASIC_INTEGRITY"
]
},
"accountDetails": {
"appLicensingVerdict": "UNEVALUATED"
}
}
```
Adb logcat during integrity test:
```
12-24 16:01:00.903 8200 8236 I PlayCore: UID: [10105] PID: [8200] IntegrityService : requestIntegrityToken(IntegrityTokenRequest{nonce=MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK, cloudProjectNumber=null, network=null})
12-24 16:01:00.904 8200 8466 I PlayCore: UID: [10105] PID: [8200] IntegrityService : Initiate binding to the service.
12-24 16:01:00.905 8200 8200 W DynamiteModule: IDynamite loader version = 2, no high precision latency measurement.
12-24 16:01:00.907 1314 1338 D OomAdjuster: Not killing cached processes
12-24 16:01:00.910 8200 8200 I Ads : Use RequestConfiguration.Builder().setTestDeviceIds(Arrays.asList("48E3EEDE058FBC2CAA45337D7558928D")) to get test ads on this device.
12-24 16:01:00.917 6427 6427 D IntegrityService: onBind
12-24 16:01:00.919 1314 1338 D CompatibilityChangeReporter: Compat change id reported: 161145287; UID 10105; state: ENABLED
12-24 16:01:00.919 1314 2968 D CompatibilityChangeReporter: Compat change id reported: 161145287; UID 10105; state: ENABLED
12-24 16:01:00.924 8200 8704 W DynamiteModule: IDynamite loader version = 2, no high precision latency measurement.
12-24 16:01:00.929 4608 4608 D AdRequestService: onBind: Intent { act=com.google.android.gms.ads.service.START pkg=com.google.android.gms }
12-24 16:01:00.939 8200 8200 I PlayCore: UID: [10105] PID: [8200] IntegrityService : ServiceConnectionImpl.onServiceConnected(ComponentInfo{com.android.vending/com.google.android.finsky.integrityservice.IntegrityService})
12-24 16:01:00.940 8200 8466 I PlayCore: UID: [10105] PID: [8200] IntegrityService : linkToDeath
12-24 16:01:00.940 6427 7408 D IntegrityService: Method (requestIntegrityToken) called
12-24 16:01:00.940 6427 7408 D IntegrityService: requestIntegrityToken(packageName: krypton.tbsafetychecker, nonce: MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK, cloudProjectNumber: 0, playCoreVersion: PlayCoreVersion{major=1, minor=4, patch=0})
12-24 16:01:00.942 6427 6427 W IntegrityExtensions: getAuthToken: No Google account found
12-24 16:01:00.942 6427 6427 W IntegrityService: requestIntegrityToken: Got null auth token for type: oauth2:https://www.googleapis.com/auth/googleplay
12-24 16:01:00.942 6427 6427 D IntegrityService: requestIntegrityToken authToken:
12-24 16:01:00.942 6427 7914 D IntegrityService: Running DroidGuard (flow: pia_attest_e1, data: {pkg_key=krypton.tbsafetychecker, vc_key=27700361, nonce_sha256_key=ouZRfTihULxofAe_qc_Yi8PghScs42rm2dgBEFi4UCE, tm_s_key=1735052460, binding_key=<REMOVED>})
12-24 16:01:00.943 6427 7914 D GmsClient: connect()
12-24 16:01:00.943 6427 7914 D GmsMultiConKeeper: bind(com.google.android.gms.droidguard.service.START, org.microg.gms.common.GmsClient$GmsServiceConnection@771f22b, false) has=false
12-24 16:01:00.943 6427 7914 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) : bind()
12-24 16:01:00.944 6427 7914 D GmsMultiConKeeper: GMS service found for com.google.android.gms.droidguard.service.START
12-24 16:01:00.945 1314 1338 D ConnectivityService: requestNetwork for uid/pid:10105/8200 activeRequest: null callbackRequest: 177 [NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]] callback flags: 0 order: 2147483647
12-24 16:01:00.946 1314 2137 D ConnectivityService: NetReassign [178 : null → 100] [c 1] [a 0] [i 0]
12-24 16:01:00.946 1314 2121 D WifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946 2633 2633 D PhoneSwitcherNetworkRequstListener: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946 1314 2121 V WifiNetworkFactory: Accepted network request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946 1314 2121 D UntrustedWifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946 1314 2121 D OemPaidWifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946 1314 2121 D MultiInternetWifiNetworkFactory: got request NetworkRequest [ REQUEST id=178, [ Capabilities: INTERNET&NOT_RESTRICTED&TRUSTED&NOT_VCN_MANAGED Uid: 10105 RequestorUid: 10105 RequestorPkg: krypton.tbsafetychecker UnderlyingNetworks: Null] ]
12-24 16:01:00.946 6427 7914 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) : bind() : bindService=true
12-24 16:01:00.947 6427 7914 D GmsMultiConKeeper: bind() : bound=true
12-24 16:01:00.947 1314 2137 D ConnectivityService: NetReassign [no changes] [c 0] [a 0] [i 0]
12-24 16:01:00.948 6427 6427 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) : ServiceConnection : onServiceConnected(ComponentInfo{com.google.android.gms/org.microg.gms.droidguard.core.DroidGuardService})
12-24 16:01:00.948 6427 6427 D GmsClient: ServiceConnection : onServiceConnected(ComponentInfo{com.google.android.gms/org.microg.gms.droidguard.core.DroidGuardService})
12-24 16:01:00.949 6427 6427 D GmsClient: GmsCallbacks : onPostInitComplete(com.google.android.gms.droidguard.internal.IDroidGuardService$Stub$Proxy@27c4821)
12-24 16:01:00.949 7919 7932 D GmsGuardServiceImpl: getHandle()
12-24 16:01:00.949 7919 7932 D GmsGuardChimera: b[getCallback](com.android.vending)
12-24 16:01:00.949 8200 8207 I tbsafetychecker: Compiler allocated 5561KB to compile void ngapainbang.hq7.<init>(ngapainbang.hp7, ngapainbang.r18, ngapainbang.l9a, ngapainbang.v38, ngapainbang.sx8, ngapainbang.td8, ngapainbang.y48, ngapainbang.oh9, ngapainbang.tj9, ngapainbang.s7a, ngapainbang.r4a, ngapainbang.r3a, ngapainbang.yq7)
12-24 16:01:00.949 7919 7932 D GmsGuardHandleImpl: initWithRequest(pia_attest_e1, DroidGuardResultsRequest[thirdPartyCallerAppPackageName=krypton.tbsafetychecker, openHandles=0, clientVersion=244735000, appArchitecture=aarch64])
12-24 16:01:00.954 4608 4707 D MeasurementService: bound by: GetServiceRequest[MEASUREMENT, packageName="krypton.tbsafetychecker", gmsVersion=12451000, scopes=[], extras=Bundle[{}], defaultFeatures=[], apiFeatures=[], supportsConnectionInfo=true]
12-24 16:01:00.954 4608 4707 D AdRequestService: bound by: GetServiceRequest[ADREQUEST, packageName="krypton.tbsafetychecker", gmsVersion=12451000, scopes=[], extras=Bundle[{}], defaultFeatures=[], apiFeatures=[], supportsConnectionInfo=true]
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 1 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 2 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 3 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 4 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 5 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 6 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 9 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 12 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 13 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D SafeParcel: Unknown field id 14 in com.google.android.gms.ads.internal.NonagonRequestParcel, skipping.
12-24 16:01:00.957 4608 4707 D AdRequestService: getAdRequest
12-24 16:01:00.963 1314 1336 D GrammaticalInflection: The flag must be enabled to allow calling the API.
12-24 16:01:00.963 1314 1336 D CompatibilityChangeReporter: Compat change id reported: 135634846; UID 99001; state: DISABLED
12-24 16:01:00.964 1314 1434 D CompatibilityChangeReporter: Compat change id reported: 143937733; UID 10105; state: ENABLED
12-24 16:01:00.964 8200 8200 D Ads : Not supported
12-24 16:01:00.964 7919 7932 D GmsGuardCallback: b[getAndroidId]() = 4272923741383393086
12-24 16:01:00.964 8200 8200 I Ads : Ad failed to load : 8
12-24 16:01:00.980 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=KeyStore algorithm=AndroidKeyStore
12-24 16:01:00.980 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Init proxy KeyStore SPI
12-24 16:01:00.980 2469 2469 D Zygote : Forked child process 8713
12-24 16:01:00.981 1314 1434 I ActivityManager: Start proc 8713:com.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:1/u0i1 for {krypton.tbsafetychecker/org.chromium.content.app.SandboxedProcessService0:1}
12-24 16:01:00.985 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=KeyPairGenerator algorithm=EC
12-24 16:01:00.987 4608 4707 D SafeParcel: Unknown field id 34 in com.google.android.gms.measurement.internal.AppMetadata, skipping.
12-24 16:01:00.987 4608 4707 D SafeParcel: Unknown field id 36 in com.google.android.gms.measurement.internal.AppMetadata, skipping.
12-24 16:01:00.987 4608 4707 D MeasurementService: sendEvent(com.google.android.gms.measurement.internal.EventParcel@4ac5e) for AppMetadata[krypton.tbsafetychecker]
12-24 16:01:00.987 694 4563 W keystore2: system/security/keystore2/src/remote_provisioning.rs:105 - Error occurred: system/security/keystore2/src/remote_provisioning.rs:138: Trying to get IRPC name.
12-24 16:01:00.987 694 4563 W keystore2:
12-24 16:01:00.987 694 4563 W keystore2: Caused by:
12-24 16:01:00.987 694 4563 W keystore2: 0: system/security/keystore2/src/globals.rs:440
12-24 16:01:00.987 694 4563 W keystore2: 1: Error::Km(r#HARDWARE_TYPE_UNAVAILABLE)
12-24 16:01:00.990 692 704 D DrmLibTime: got the req here! ret=0
12-24 16:01:00.990 692 704 D DrmLibTime: command id, time_cmd_id = 770
12-24 16:01:00.990 692 704 D DrmLibTime: time_getutcsec starts!
12-24 16:01:00.990 692 704 D DrmLibTime: QSEE Time Listener: time_getutcsec
12-24 16:01:00.990 692 704 D DrmLibTime: QSEE Time Listener: get_utc_seconds
12-24 16:01:00.990 692 704 D DrmLibTime: QSEE Time Listener: time_get_modem_time
12-24 16:01:00.990 692 704 D DrmLibTime: QSEE Time Listener: Checking if ATS_MODEM is set or not.
12-24 16:01:00.990 692 704 D QC-time-services: Lib:time_genoff_operation: pargs->base = 13
12-24 16:01:00.990 692 704 D QC-time-services: Lib:time_genoff_operation: pargs->operation = 2
12-24 16:01:00.990 692 704 D QC-time-services: Lib:time_genoff_operation: pargs->ts_val = 0
12-24 16:01:00.991 692 704 D QC-time-services: Lib:time_genoff_operation: Send to server passed!!
12-24 16:01:00.991 983 993 D QC-time-services: Daemon: Connection accepted:time_genoff
12-24 16:01:00.991 983 8716 D QC-time-services: Daemon:Received base = 13, unit = 1, operation = 2,value = 0
12-24 16:01:00.991 983 8716 D QC-time-services: Daemon:genoff_opr: Base = 13, val = 0, operation = 2
12-24 16:01:00.991 983 8716 D QC-time-services: offset is: 1 for base: 13
12-24 16:01:00.991 692 704 E QC-time-services: Receive Passed == base = 13, unit = 1, operation = 2, result = 0
12-24 16:01:00.991 692 704 D DrmLibTime: QSEE Time Listener: ATS_MODEM is set. Try to retrieve it.
12-24 16:01:00.992 983 993 E QC-time-services: Daemon: Time-services: Waiting to acceptconnection
12-24 16:01:00.992 983 993 D QC-time-services: Daemon: Connection accepted:time_genoff
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:Received base = 13, unit = 1, operation = 1,value = 0
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:genoff_opr: Base = 13, val = 0, operation = 1
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon: genoff get for 13
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:Value read from QTimer mseconds = 617629
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:Value read from RTC mseconds on boot = 56179596000
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:Value read from QTimer mseconds = 617629
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:Value read from generic offset = 1678872262636
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:Delta read on boot mseconds = 56179581941
12-24 16:01:00.992 983 8717 D QC-time-services: Daemon:Final Time = 1735052462206
12-24 16:01:00.992 692 704 D DrmLibTime: QSEE Time Listener: Time GenOff - seconds: 1735052462
12-24 16:01:00.992 692 704 D DrmLibTime: time_getutcsec returns 0, sec = 1735052462; nsec = 0
12-24 16:01:00.992 692 704 D DrmLibTime: time_getutcsec finished!
12-24 16:01:00.992 692 704 D DrmLibTime: iotcl_continue_command finished! and return 0
12-24 16:01:00.992 692 704 D DrmLibTime: before calling ioctl to read the next time_cmd
12-24 16:01:00.992 983 993 E QC-time-services: Daemon: Time-services: Waiting to acceptconnection
12-24 16:01:00.993 8713 8713 I ocessService0:1: Using CollectorTypeCC GC.
12-24 16:01:00.997 2633 2633 W FeatureConnection: getRegistrationTech: ImsRegistration is null
12-24 16:01:01.004 8713 8713 E ocessService0:1: Not starting debugger since process cannot load the jdwp agent.
12-24 16:01:01.009 8713 8713 D nativeloader: Load libframework-connectivity-tiramisu-jni.so using APEX ns com_android_tethering for caller /apex/com.android.tethering/javalib/framework-connectivity-t.jar: ok
12-24 16:01:01.011 662 662 E KeyMasterHalDevice: Attest key send cmd failed
12-24 16:01:01.012 662 662 E KeyMasterHalDevice: ret: 0
12-24 16:01:01.012 662 662 E KeyMasterHalDevice: resp->status: -10003
12-24 16:01:01.009 0 0 I binder : 8713:8713 ioctl 40046210 ffc7fdfc returned -22
12-24 16:01:01.018 4509 4537 D ForegroundUtils: Foreground UID status:
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 1027 is in foreground: true
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10104 is in foreground: false
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10105 is in foreground: true
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10159 is in foreground: false
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10173 is in foreground: false
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10227 is in foreground: false
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10235 is in foreground: true
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10241 is in foreground: true
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10242 is in foreground: false
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10249 is in foreground: false
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 10258 is in foreground: false
12-24 16:01:01.018 4509 4537 D ForegroundUtils: UID: 1010241 is in foreground: true
12-24 16:01:01.020 694 4563 E keystore2: system/security/keystore2/src/error.rs:200 - system/security/keystore2/src/security_level.rs:623
12-24 16:01:01.020 694 4563 E keystore2:
12-24 16:01:01.020 694 4563 E keystore2: Caused by:
12-24 16:01:01.020 694 4563 E keystore2: 0: system/security/keystore2/src/security_level.rs:621: While generating Key without explicit attestation key.
12-24 16:01:01.020 694 4563 E keystore2: 1: Error::Km(-10003)
12-24 16:01:01.022 8713 8713 D CompatibilityChangeReporter: Compat change id reported: 171979766; UID 99001; state: ENABLED
12-24 16:01:01.022 8713 8713 D CompatibilityChangeReporter: Compat change id reported: 242716250; UID 99001; state: ENABLED
12-24 16:01:01.024 7919 7932 W id.gms.unstable: Accessing hidden method Landroid/security/KeyStoreException;->getErrorCode()I (blocked,test-api, JNI, denied)
12-24 16:01:01.024 7919 7932 W id.gms.unstable: If this is a platform test consider enabling VMRuntime.ALLOW_TEST_API_ACCESS change id for this package.
12-24 16:01:01.025 7919 7932 D GmsGuardCallback: c[getPackageName]() = com.android.vending
12-24 16:01:01.032 0 0 W servicemanager: Isolated app with UID 99001 requested 'network_management', but the service is not allowed for isolated apps.
12-24 16:01:01.041 8713 8713 I cr_WebViewApkApp: version=131.0.6778.81 (677808101) minSdkVersion=26 isBundle=false processName=com.android.webview:sandboxed_process0:org.chromium.content.app.SandboxedProcessService0:1
12-24 16:01:01.044 8713 8713 I cr_ChildProcessService: Creating new ChildProcessService pid=8713
12-24 16:01:01.038 0 0 W servicemanager: Isolated app with UID 99001 requested 'connectivity', but the service is not allowed for isolated apps.
12-24 16:01:01.043 0 0 E SELinux : avc: denied { find } for pid=8713 uid=99001 name=content_capture scontext=u:r:isolated_app:s0:c512,c768 tcontext=u:object_r:content_capture_service:s0 tclass=service_manager permissive=0
12-24 16:01:01.056 8713 8732 I cr_LibraryLoader: Successfully loaded native library
12-24 16:01:01.057 8713 8732 I cr_CachingUmaRecorder: Flushed 2 samples from 2 histograms, 0 samples were dropped.
12-24 16:01:01.066 8713 8732 W SystemServiceRegistry: No service published for: uimode
12-24 16:01:01.062 0 0 W servicemanager: Isolated app with UID 99001 requested 'uimode', but the service is not allowed for isolated apps.
12-24 16:01:01.076 8713 8732 W chromium: [WARNING:runtime_features.cc(598)] Fenced frames cannot be enabled in this configuration. Use --enable-features=FencedFrames instead.
12-24 16:01:01.076 8713 8732 W chromium: [WARNING:runtime_features.cc(623)] Topics cannot be enabled in this configuration. Use --enable-features=BrowsingTopics in addition.
12-24 16:01:01.076 8713 8732 W chromium: [WARNING:runtime_features.cc(643)] SharedStorage cannot be enabled in this configuration. Use --enable-features=SharedStorageAPI in addition.
12-24 16:01:01.077 8713 8732 W chromium: [WARNING:runtime_features.cc(653)] SharedStorage for M118+ cannot be enabled in this configuration. Use --enable-features=SharedStorageAPI,SharedStorageAPIM118 in addition.
12-24 16:01:01.077 8713 8732 W chromium: [WARNING:runtime_features.cc(675)] AttributionReporting cannot be enabled in this configuration. Use --enable-features=ConversionMeasurement in addition.
12-24 16:01:01.081 1314 1336 D FileUtils: Rounded bytes from 8012386304 to 8000000000
12-24 16:01:01.112 8200 8297 E chromium: [ERROR:ssl_client_socket_impl.cc(878)] handshake failed; returned -1, SSL error code 1, net_error -202
12-24 16:01:01.175 7919 7932 D GmsGuardCallback: b[getAndroidId]() = 4272923741383393086
12-24 16:01:01.363 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=KeyStore algorithm=AndroidKeyStore
12-24 16:01:01.363 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Init proxy KeyStore SPI
12-24 16:01:01.367 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=CertificateFactory algorithm=X.509
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=AlgorithmParameters algorithm=EC
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Proxy key store: get certificate chain
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: dalvik.system.VMStack.getThreadStackTrace(Native Method)
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: java.lang.Thread.getStackTrace(Thread.java:1841)
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: b.a.engineGetCertificateChain(SourceFile:1)
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: java.security.KeyStoreSpi.engineGetEntry(KeyStoreSpi.java:513)
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: java.security.KeyStore.getEntry(KeyStore.java:1581)
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Stack trace element: com.google.ccc.abuse.droidguard.DroidGuard.initNative(Native Method)
12-24 16:01:01.368 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Blocking call
12-24 16:01:01.517 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: QUALCOMM build : 8e5405b, I57aaec3440
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: Build Date : 05/21/21
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: OpenGL ES Shader Compiler Version: EV031.32.02.10
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: Local Branch : mybranchebba1dbe-451b-f160-ac81-1458d0b52ae8
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: Remote Branch : quic/gfx-adreno.lnx.1.0.r135-rel
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: Remote Branch : NONE
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: Reconstruct Branch : NOTHING
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: Build Config : S P 10.0.7 AArch64
12-24 16:01:01.517 7919 7932 I AdrenoGLES-0: Driver Path : /vendor/lib64/egl/libGLESv2_adreno.so
12-24 16:01:01.520 7919 7932 I AdrenoGLES-0: PFP: 0x016ee190, ME: 0x00000000
12-24 16:01:01.532 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.532 7919 7932 D SNFix/Java: [com.google.android.gms.unstable] Provider: get service - type=MessageDigest algorithm=SHA-1
12-24 16:01:01.538 6427 6427 W DroidGuardApiClient: DroidGuardInitReply suggests additional actions in main thread
12-24 16:01:01.538 6427 6427 D DroidGuardApiClient: reply.object[a] = 1
12-24 16:01:01.538 6427 6427 D DroidGuardApiClient: reply.object[b] = [B@31b8607
12-24 16:01:01.538 6427 6427 D DroidGuardApiClient: reply.object[c] = [B@5f86334
12-24 16:01:01.538 6427 6427 D DroidGuardApiClient: reply.object[d] = pia_attest_e1
12-24 16:01:01.538 6427 6427 D DroidGuardApiClient: reply.object[e] = {ParcelFileDescriptor: java.io.FileDescriptor@1520ed2}
12-24 16:01:01.538 6427 6427 D DroidGuardApiClient: reply.object[h] = EA77286092255610BD653E1A63B845FDE2310FA1
12-24 16:01:01.542 7919 7948 D GmsGuardHandleImpl: snapshot({tm_s_key=1735052460, binding_key=<REMOVED>, pkg_key=krypton.tbsafetychecker, vc_key=27700361, nonce_sha256_key=ouZRfTihULxofAe_qc_Yi8PghScs42rm2dgBEFi4UCE})
12-24 16:01:01.792 1314 2121 D WifiClientModeImpl[18186:wlan0]: updateLinkLayerStatsRssiSpeedFrequencyCapabilities rssi=-46 TxLinkspeed=400 freq=5560 RxLinkSpeed=300
12-24 16:01:01.794 1314 2121 D WifiDataStall: tx tput in kbps: 357734
12-24 16:01:01.794 1314 2121 D WifiDataStall: rx tput in kbps: 282421
12-24 16:01:01.861 7919 7948 D GmsGuardHandleImpl: close()
12-24 16:01:01.861 6427 7917 D GmsClient: disconnect()
12-24 16:01:01.861 6427 7917 D GmsMultiConKeeper: unbind(com.google.android.gms.droidguard.service.START, org.microg.gms.common.GmsClient$GmsServiceConnection@771f22b)
12-24 16:01:01.861 6427 7917 D GmsMultiConKeeper: Connection(com.google.android.gms.droidguard.service.START) : unbind()
12-24 16:01:01.863 6427 7914 D IntegrityService: Running DroidGuard (flow: pia_attest_e1, droidGuardToken: Cga6oYXM6DbSEFsAAMxJhDkwDjBmAA06E8eGgWWQAJIi0yqypVtzAY08MoPbcsJ2AK7bfnr1zzr6Ac_GdwK746QdAKnHnak7Za2DBV6CVhb6qO81ARvB-909K8_2ARVWM3GYTFYQ2gfpBwDroQgStAnliuwUxKkGJZza22AQ8R4kTpjh0dlw7wWDKRLAkwp7UosW0xNjwciSYZG4Pb5aTILOTduszaHbHgRIVToB_80yrlYqniPerX1o-7KYkWSXs39XtUSyAWdls-xPHqHFNldwtbEBywuBuGN624fLek3eR-U8YIN_v3ikNPA5MokB-7-63fC2wuwqhmW-dnB1JVVyfvzeon0qUml7XKmSI2OrgOioeB98hwQNmPmtkIrsjDSpt3OjTQqaBvNSN3fVY0ZfpPV42w35Lu7IB4dtzvOBH0PfUTmoyvHGDp5ufj_pv_JTb5C4X8gxMEXpa-f2IWjRZjM68EfyxNwyMQ2hhOTS3H4qHcP6hGioCjPHLS1EBOim1XfdkR5pVaSWnKjrFRUeeGqIdVNRNvBZtKs3QUTBPv_1OuACUcT3MnxdZPVKammQi9mLDmcKRtWWy0qanT9Fi1tvDNUE6DlHy0D3FH4Fg0nraAk-SASxL9XuHBJr-hH9DbVIkQ4SHTAbimNEZ1r9Kddd87BDLJBS2L_WRbvf8YEoqep3-KJtv8wCf5pLrgxUsraHfbxJjE8Y5yuH7q_BWSxyp8g9NGiObysN19_qWMlz7Oit_WxhqnDaMw7Dibkeyno0jvUTERWxVFw8R3GfgIPJB4ajvs1DFHnZmPNp3RBrOttbo3-1cLddNd9AoBn-rGekp_Pr29An5RI6Hkob-26p6z4Vy4huSo3k8OOsuOKwkBLiZiqYm5cXN0w1vKK7sse8OqfSI0dPB04hvpL3LO6CXU6rnvrVowrtHEPfzdNAbD0NeadrKWHk_FsqnJZxcDHqeejDWXAmGDq0ytIn-G_x-oSQO4neVu5HkvUn7esitGWaJUVZI0PoztnSxSfTsWzZFikwC7C4VvuUz0Afz-rqV566Q2msjSp1Bzf434X843GhpaGKOJEudmalL2QdYW2GpClUkxL1ZfD6XwRPWXpAxecpTZN3eRPcclKDDnqYktgro5msExq-ihtx0JK5WIRNSg1iQBrQe3vUsDOgd5s8lW-fxAyz2WL4TyHS-QdjgiD0n_dHYmv-USaIbbWCpJPCbe-lY8WTrw2qq5xi361qhy-z4P4uHjKEn0FIwUEZarFVBIcqqPhEUZxBQMUbQJKnDbELBHV1Ob8lMegjsbMtv6nP7OIoX8PhvnxRk7Vd2nMn4U-2BUdNLQOG3xMEIhz-kpnNwiRYYoypkmM6I9Q_UM8BFY-_l5PaOtGF8yckhnM8IGQ0NImIy6ZmOTQCs-5PPrGDeQdfHZPXkpZvlF5lL9Ihm63o4nQhqjR4dABwX50TJU_AosKY2Obq684YOGHQD8Khpvj82a3pIDhrOEuYEqqr-ZXp4dSnMtoNgAHQD4vG1c_Ru6rY9AEST2uM-w4tcX5wCUikCLCZKLlXHHT4jK00MwrKfHQ5Qeg1uVC38ActZCU2Qm2ArJjnZJ4Dn9Qbs8m6ahLRSPBeXxW_sFSirr7wNY_MfCWwK5-qECCXDRqOCwEFci5DlihRtV4bMGCr8kduWoTbK9EO69haIZgSp4nD3v7d8OuoAeIN2iUKBrqhhczoNtIQWwAAzEmEOTAOMGYADToTx4aBZZAAkiLTKrKlW3MBjTwyg9tywnYArtt-evXPOvoBz8Z3ArvjpB0AqcedqTtlrYMFXoJWFvqo7zUBG8H73T0rz_YBFVYzcZhMVhDQD9KigJXqoZPQ7AESwiQ6aalkfar9lXSQqSemNVwQDNw0keQcoWdsE4TNzaOBFAS2LscpIl-FgVqnzr5-Qp7LR0SD80rEdU4rGPFE7GtqZ0ck3exW2-HKtRPq61Z1X6sLEE0_9Zfl6cQTXXDhOR38_DdnY0LYQ7lkzjNr-KIpmNSabU9PKcMkHZziWpLCtQZ7gJUYlW19KkKYUSudLoJ6u8kxZddUxuVvHKe4GMEqRvbYtRG_Y2QIWYtnjNpP3GzGWMk33bsKhV4oEkiVO1HuoceQW55dORgUZH77DL5X6o7HldXHcME1uHczOy_UqgdPn7Jjm3tu32NaazyKPlSSmo8prkRHBtTdtairiOBLmNqD3zF8N1BNR_iGwPyCIUh-XEB3-ochqbznVOnEgIavLdwqrzo8B20hshig6_bfbF_rSiBJq6RBUAIQTgtZxvF4_S_zJxbLCsjrpuCNGkZU3pUC-bWLIsMFp8km5qRkOU1AzcevltqISn7DqQxitVCvCkvGe1AontBspR3D1m8_DvTTTfIEQC3cEElJib8bjdiQNwHptsasYkoaOgu8pyZng0r16XvSnixiVHWlYnmSIWL1i7ETinM1r_7xqtTgq2b1uD5GnPxDsuOfoQwXQu3JUBicaFQDTWWXXe1TyPL5SIaXHF5EMHh50rG3HDCwwzQ1d6tbWIzgeSD6HLA6s4PYk5e8mbMW-m8Wj3M7nOdzdgMOD5ehhGhLf4Q6UQ-TPXwoKlb3vyRBRW9whcgulFz4dV2ciExK-M0Vr_2S2XYBKEVNkFG9FK9tmJ8NyryXfXcX2c6pA67oMd_cj9kA8-FAh5eCWC5ejDcnMM6vv8BVLme2pwbxO3aAQwpG_IVTOfV5tGl-CZm5ceCqnKHA9snC2NF7-DrjndySPTj6CTTc115WmV2b055AzL8Zseguq-NxCmQyyDl_mXbLjcVStkNQRdgYeGHrHvsqrqwQ4PnKgwZVdN1_GUvRPhe4iXB_fogUHuCPxahmNFyvHhltAZqib264gEJ6Qq3d_d4SSneCnw21Uc7hrlmRf1WFNkfZf13K-Yh5gyI7Vz4f45P2RHUtvqQFLMxfTRdcdpNo_FRKr65EyWHFOKmrX7z9schJ_O2ZwaNnWWQaN07YlWLKI9j8e87oT9382EerqRPR2xEOBSvrSQsBdxJmpNmWanc-zEzrZqkqy4WEb0RepfD9Z4Bee6FP9iLnwqxlOnEHePcX4Fmoq56qohCda1ziSLCm3nI3evlzkJ_gbfJK9GmajeQYzu7pEOJeCaMc7WVrs5vHT-Ma6y8laZXX9fErcGwEJ3Hgn9nC68vCrXIV8MYbejZlRCaNG6-8TyxyhlR1KwWkFijFyBBkjs5TKh6c98izQcpO-VyOnvBs0eP9qDT__Bx9X3689sKKSxdY8oNWJPi-6pbo-JHYr5-ECgQ4y-ulvlBY47XKqQRK0Mrmt61CL7jxzEKEmoichbo1U-6Kh3wEmJ6FPv0XYIgQmYMf-1jYT37b3bICc06wxcHZ1ehzkdKYqvop8g5l6HKOVa-P2zZ8gu7IKnB5u99iC7CLtCnxXQIfSWyW7jE12tcGDSf3qcpe5AmNZnwcbPmPNWhLvTBsEVxCULVJQVvpA6g78gQu9_-tECV7kTFfd81EsxSRr1rygpxu21NLEJN5JXjzMCIjilgifxLxmKqvZEe1fkU2ru_5_6T6391-CC3rjSIxHJkU584mf5hEsZ7C-DJf77c8y96MiqLpdiNuXi214r5Tn2UYbOpk6OAZidrH15114EZQCM0fAoiOhEKkSpxo_bOMbppwdcFTB8YKAxUcuEp2SIvMhgYU5S_LeKd5uezT494aXaSop_7FVdDDNRi3hb7qIpOznxpwBmx1BB7HWeVmKdBMQkAoIlUp2z3aA9WQHStl8333XUOXhf28mS-TMQKyMBWRvMkKfYrOGhv71ycv_7yOmF-PAzjHnnv9futl4o-mf48Trap51E06EYZKJvLov7AWoKP-WjYUkoLU4RtsR0odnO_2seu8-AC3maLFlL_hFm1hHb7FDQJATs7-MRPma5Zp2LkHCBUmgynf7sfOTZlNM5i5uNpqBF8tegLcGA_KhGxlBomXRQ_hCpsANKQfmYZNpCEQ0tU
12-24 16:01:01.869 6427 6427 D IntegrityService: requestIntegrityToken integrityRequest: IntegrityRequest{droidGuardTokenRaw=[size=23606 hex=0a06baa185cce836d2105b0000cc498439300e3066000d3a13c786816590009222d32ab2a55b73018d3c3283db72c27600aedb7e7af5cf3afa01cfc67702bbe3…], params=IntegrityParams{packageName=PackageNameWrapper{value_=krypton.tbsafetychecker}, versionCode=VersionCodeWrapper{value_=27700361}, nonce=MjA4ZTFiMmYtZGM5OS00ZTZiLTg0ODgtNTA4MDMwNmFkYTE4CjIwMjQtMTItMjRUMTY6MDE6MDAuODk5KzAxOjAwCk9uZVBsdXMvT25lUGx1czZUL09uZVBsdXM2VDoxNC9BUDJBLjI0MDkwNS4wMDMvZW5nLnJvb3QuMjAyNDEyMTAuMDkzNzU0OnVzZXIvcmVsZWFzZS1rZXlzCjM0CjIwMjQtMTItMDEK, certificateSha256Digests=[3MOpHFrljB1TAwIhKpT8OgKDVTo0Rs0DuovQIunAPwo], timestampAtRequest=Timestamp{seconds=1735052460, nanos=941000000}}, flowName=pia_attest_e1, playCoreVersion=PlayCoreVersion{major=1, minor=4, patch=0}, playProtectDetails=PlayProtectDetails{state=PLAY_PROTECT_STATE_NO_PROBLEMS}, appAccessRiskDetailsResponse=AppAccessRiskDetailsResponse{installedAppsSignalDataWrapper=InstalledAppsSignalDataWrapper{installedAppsSignalData=.}, screenCaptureSignalDataWrapper=ScreenCaptureSignalDataWrapper{screenCaptureSignalData=.}, screenOverlaySignalDataWrapper=ScreenOverlaySignalDataWrapper{screenOverlaySignalData=.}, accessibilityAbuseSignalDataWrapper=AccessibilityAbuseSignalDataWrapper{}, displayListenerMetadataWrapper=DisplayListenerMetadataWrapper{lastDisplayAddedTimeDelta=Timestamp{seconds=613549617, nanos=160000000}}}}
12-24 16:01:01.877 6427 6427 V VendingRequestHeaders: X-PS-RH: H4sIAAAAAAAA_3WOv07bUBTG7Yii1BIqytRmAlSkqpLt-8fXsYMYTrADbnIdOwSBs0S2uSqYQBSblJiX4A06dOjAxBNUfY6-QueuFUFEqjrwSUfnO2f4fp_yRbk-MAoPlhoxXrK5R_jAo0UWln6Wzv1udOPnEfJzuHFx97ObAfJvI8ydo5IPeog76S13IDRm7ahHA5xkcevsUtB25iXlycE8jfe9CZ84sHd8osKn4ROnX1VWFakm1aXhrrLjghvBuQfhGXSg5fG9DhlOG8W-y53p2PScwxf-xwBJpfoql77Jm8q76lbtDQQENGIgGzENIVqvYGNDqlUS6a18L_-Ulde9KxGMZ4U5qK1M08llfa3nu0H36HADTITpFmmfXxUXpU4bGlvkqMTeJmibtRbjPLug_2yZyYxGgyHj4_8R6MffP7_vHr5-32mGS5i-3NZg5Lrw72piqvc7IdYIXsheFMZ6XxOnVkrSER6R5qwQuZ6LsYgLoV6Isvglf1DeW3b8BDLV2EqwatgWVROR2ipliKWGEJZlWuuVR24UGA_aAQAA
12-24 16:01:01.877 6427 6427 V VendingRequestHeaders: User-Agent: Finsky/37.5.24-29%20%5B0%5D%20%5BPR%5D%20565477504 (api=3,versionCode=244735012,sdk=34,device=OnePlus6T,hardware=qcom,product=OnePlus6T,platformVersionRelease=14,model=ONEPLUS%20A6013,buildId=AP2A.240905.003,isWideScreen=0,supportedAbis=arm64-v8a;armeabi-v7a;armeabi)
12-24 16:01:02.292 6427 6427 D IntegrityService: requestIntegrityToken integrityResponse: IntegrityResponse{contentWrapper=IntegrityContentWrapper{content=IntegrityContent{token=eyJhbGciOiJBMjU2S1ciLCJlbmMiOiJBMjU2R0NNIn0.JdlS-loZ4Vr4s1LSy-S6pNzbHJaG_F1wYASuNPEA9BWaw2syjVmVMQ.s4jeI2AQJLCD0nnm.HyF-FLHBTOTaJ-v4PuRHyziAh59MKklp5a0BlMp-X5IG6zoxJIT4PBXzVQ0J4wHBqBCHr7GjBJySrTzta56hY6AqxbFsHmTKtOyo0ofbKb_P-2GepZH7vofZeG0lGu62nCJD04w-CySvJ9MFiBZExAleSKbkvJr468cIk00JjdyURvdeQFUhWmJCFD44vZ5sBvltyaf0cIa7cNkE1PAPLaAxU70QySVxrH7niqNS3jBmmdj6MYBlDiSCWy2ACSt2yUk9cvmNAbCcCSOyczB7bSAEBhcKomQWBjHNxq_PqoAQ9PtxhlG8fY_c-e35RcAFOjHZWVuOvjvaUJ3S5lc2cyrvxSXvGQ72NXLS-BocR97L3wu6JfKleEJyBxuJEIdwZqP7VFeCprBYA-V3MZaWsjLADtygyROdpAsuwC7WOWZeWfb4_w6B2PDxpHeAZ0DfUsYZYuZhA81hLhRf_VkFU2wxHML0nqq8m8sGqxii40uxyPHMR-yvsKkqlWN_SqWW0S7ssWejl5-uiKCCp_DAYfYPoM_g8VLULe7sahBpjRqvcJav6i-UhA3KvKay4CsGRPWGlVuc8eTj895zwYkkzjqCh9uG-YUva-TbBeCT1wm83mCxeDXNdSSwO2r-6GolXj_tQ5KyBjbu7DXWQ7GNR9WOHOaZl8mHVw_bx1KUdT42Om-1AIyO8HxAgeZSSTHskZcI6eVkxRPj-X67m3pAqlBQSgqYfBTXpY7A9hCKI_0gc7bp-LrNNqk57FW7qLIkHLIZocNrg-F-pluoIX9_TtIaSZ1kXfCsnaSIlF_6mDW6wQSMaIbIph-8OabvtEHSmTojJobKu8NPWEMz5j4Oq6hPc7fraCwpcpqXp49vTla1erWhtr3nsl-zktMX85g0Q7SInLQsoP38UKTx0Ble49N5sa5upbjLB12ZSOAh5-lQ7wBNPw_DXUUDTSkkIjeVvCwHXaC--4wCe2m9GYyrIuq8rFmkFSiFIry9gZ_qI57gyXhMym14KVSuUMNlEIsnD7tWySSBa_-MkUidZSwBuK4JNHJRYwpDpHAo3xE-O7nk2qymJnR-nUmL3C3kkqY15NL3ckm_jJdXjjjkPueVEExJK9PUfWrzdZJswyAPZQBNKdLd_QoJr-5oQTR2-MRUhNs5bqDky4jqUP5N42C3QeQ9JGsOwGiHJ47yXCiirlabtxMi5PyHlC5JV8iR1bJQCTwAw-wNS7R8yVsKLG-yiNJXKUwps-LGSDhiVENZVjc2JXidGCZfOy-boIn95yGxfH6uzkW4Y31my2gsI8wcGVkZ2Qckk56q_gefy5Zk-7Bym9O6TAtlw0V6sd9RgvehbuuWXZOFK6OBLJb-UHdQ7iuQ4KyFgdBN63x1ueCE2bdIr9b4XTpHLFzfN9LuGeVZKTS01oQajK4OO4utzrcOVid56JIRRzUVeFSKnwmyRncyJMoNinCSPMACxKdz_rjyCIit.EhKA04w4liug2mnrGUFCLw}}}
12-24 16:01:02.292 6427 6427 D IntegrityService: requestIntegrityToken integrityToken: eyJhbGciOiJBMjU2S1ciLCJlbmMiOiJBMjU2R0NNIn0.JdlS-loZ4Vr4s1LSy-S6pNzbHJaG_F1wYASuNPEA9BWaw2syjVmVMQ.s4jeI2AQJLCD0nnm.HyF-FLHBTOTaJ-v4PuRHyziAh59MKklp5a0BlMp-X5IG6zoxJIT4PBXzVQ0J4wHBqBCHr7GjBJySrTzta56hY6AqxbFsHmTKtOyo0ofbKb_P-2GepZH7vofZeG0lGu62nCJD04w-CySvJ9MFiBZExAleSKbkvJr468cIk00JjdyURvdeQFUhWmJCFD44vZ5sBvltyaf0cIa7cNkE1PAPLaAxU70QySVxrH7niqNS3jBmmdj6MYBlDiSCWy2ACSt2yUk9cvmNAbCcCSOyczB7bSAEBhcKomQWBjHNxq_PqoAQ9PtxhlG8fY_c-e35RcAFOjHZWVuOvjvaUJ3S5lc2cyrvxSXvGQ72NXLS-BocR97L3wu6JfKleEJyBxuJEIdwZqP7VFeCprBYA-V3MZaWsjLADtygyROdpAsuwC7WOWZeWfb4_w6B2PDxpHeAZ0DfUsYZYuZhA81hLhRf_VkFU2wxHML0nqq8m8sGqxii40uxyPHMR-yvsKkqlWN_SqWW0S7ssWejl5-uiKCCp_DAYfYPoM_g8VLULe7sahBpjRqvcJav6i-UhA3KvKay4CsGRPWGlVuc8eTj895zwYkkzjqCh9uG-YUva-TbBeCT1wm83mCxeDXNdSSwO2r-6GolXj_tQ5KyBjbu7DXWQ7GNR9WOHOaZl8mHVw_bx1KUdT42Om-1AIyO8HxAgeZSSTHskZcI6eVkxRPj-X67m3pAqlBQSgqYfBTXpY7A9hCKI_0gc7bp-LrNNqk57FW7qLIkHLIZocNrg-F-pluoIX9_TtIaSZ1kXfCsnaSIlF_6mDW6wQSMaIbIph-8OabvtEHSmTojJobKu8NPWEMz5j4Oq6hPc7fraCwpcpqXp49vTla1erWhtr3nsl-zktMX85g0Q7SInLQsoP38UKTx0Ble49N5sa5upbjLB12ZSOAh5-lQ7wBNPw_DXUUDTSkkIjeVvCwHXaC--4wCe2m9GYyrIuq8rFmkFSiFIry9gZ_qI57gyXhMym14KVSuUMNlEIsnD7tWySSBa_-MkUidZSwBuK4JNHJRYwpDpHAo3xE-O7nk2qymJnR-nUmL3C3kkqY15NL3ckm_jJdXjjjkPueVEExJK9PUfWrzdZJswyAPZQBNKdLd_QoJr-5oQTR2-MRUhNs5bqDky4jqUP5N42C3QeQ9JGsOwGiHJ47yXCiirlabtxMi5PyHlC5JV8iR1bJQCTwAw-wNS7R8yVsKLG-yiNJXKUwps-LGSDhiVENZVjc2JXidGCZfOy-boIn95yGxfH6uzkW4Y31my2gsI8wcGVkZ2Qckk56q_gefy5Zk-7Bym9O6TAtlw0V6sd9RgvehbuuWXZOFK6OBLJb-UHdQ7iuQ4KyFgdBN63x1ueCE2bdIr9b4XTpHLFzfN9LuGeVZKTS01oQajK4OO4utzrcOVid56JIRRzUVeFSKnwmyRncyJMoNinCSPMACxKdz_rjyCIit.EhKA04w4liug2mnrGUFCLw
12-24 16:01:02.294 8200 8213 I PlayCore: UID: [10105] PID: [8200] OnRequestIntegrityTokenCallback : onRequestIntegrityToken
12-24 16:01:02.295 6427 6427 D IntegrityService: requestIntegrityToken() success for krypton.tbsafetychecker)
12-24 16:01:02.300 8200 8466 I PlayCore: UID: [10105] PID: [8200] IntegrityService : Unbind from service.
12-24 16:01:02.302 6427 6427 D IntegrityService: onUnbind
```
I use following magisk modules:
MagiskHide Props Config
Systemless Hosts
Universal SafetyNet Fix (safetynet-fix-v2.4.0-MOD_1.3-microG)
Is it possible to pass device integrity with microG? What magisk modules are required for this?