Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Question] Is it possible to make EdXposed work without Magisk? #532

Open
LuigiVampa92 opened this issue May 6, 2020 · 42 comments
Open
Labels
enhancement New feature or request help wanted Extra attention is needed

Comments

@LuigiVampa92
Copy link

Hey guys, great thanks for your amazing work. I’m pretty new to EdXposed and I'm sorry to make an issue here but I could not find the answer anywhere else. I am interested - is it possible to make EdXposed work without Magisk?

I know that previous versions of Xposed up to android 8 were flashable and I could just sideload them on device as any other zip file in TWRP. What is the problem to do the same thing with new EdXposed for android 9 and 10?

What I am trying to achieve is to take my OnePlus 5T, flash it with LOS16 and then flash it with EdXposed zip. Currently I can flash the LOS16, flash magisk, and then in Magisk Manager install Riru Core and Riru EdXposed modules (I use RiruCore v21.0 and EdXposed v0.4.6.2 YAHFA). It works perfect. But I would like to try to replace magisk modules with flashable zip files.

I’m not trying to hide the fact of installed EdXposed on device. It’s complitley ok if its files will be persisted and visible in /system. I’m also not worried that I will not be able to pass SafetyNet as well.

I have taken a brief look at the structure of magisk modules. RiruCore module contains modified versions of libmemtrack.so for /system/lib and /system/lib64 and zygote_restart binary. EdXposed module contains a few jars for /system/framework and a few more libs for /system/lib and /system/lib64. I have made a TWRP-flashable zip that replaces libmemtrack.so and puts the necessary files of EdXposed in lib, lib64 and framework. When I load into the system EdXposed Manager shows me a yellow warning saying that "EdXposed is installed but not activated". I have checked the EdXposed Manager app under debugger and XposedApp.getActiveXposedVersion() return -1 (which means that the method call is not hooked by Xposed framework). I have suspicions that it happens because EdXposed tries to locate RIRU_PATH which is /data/misc/riru and because of that it doesn’t work. That RIRU_PATH folder contains only a small pieces of metadata. Nothing seems to be important there except for "zygote_restart" binary. I have tried to create those directories and copy files in /data/misc/riru manually but for some reason my device falls into a bootloop. It happened when I created and copied the files by flashable zip in TWRP and also when I did so by adb shell in normally loaded system.

So, maybe some of you have tried to make the same stuff and succeeded? Or perhaps you know why modifying /data/misc causes the system to bootloop? My final goal is to install EdXposed straight into /system. I will be very grateful for any useful information. Thanks!

@XspeedPL
Copy link
Contributor

XspeedPL commented May 6, 2020

You're mostly correct, first you need to put files normally unpacked into Magisk directories directly into system.
But after that you need to execute installer scripts, which need to be modified to use system paths instead of Magisk.
It is of course doable and EdXposed should work, but it's tedious. I understand you want to keep the BL locked, yes?

@LuigiVampa92
Copy link
Author

You're mostly correct, first you need to put files normally unpacked into Magisk directories directly into system.
But after that you need to execute installer scripts, which need to be modified to use system paths instead of Magisk.
It is of course doable and EdXposed should work, but it's tedious. I understand you want to keep the BL locked, yes?

Thanks for reply. Yes, my final goal is to lock the BL with EdXposed actually installed and working. As far as I can suggest once installed EdXposed will not make any changes to /system directly, only to /data, but data is not processed by verified boot.

It seems that I did the first part by putting EdXposed jars and libs and modified libmemtrack.so into /system but it I don't know where to use that zygote_restart binary. As far as I know, previous versions used modified app_process binaries, but it seems not to be the case of EdXposed for android 9+. Also I'm not sure how can I apply sepolicies from installer scripts, since they use Magisk's su_policy feature and I'm not sure how can I apply that without it. (by applying set_metadata?). So yes, I'm stuck at installer scripts on stage 2 and my poor knowledge of android does not let me even estimate is it possible to do all this staff at all? Maybe it uses some magisk features that cannot be performed without it

@MlgmXyysd
Copy link
Member

Good idea, but two questions
1, Riru Core without Magisk
2, SELinux Policy

@XspeedPL
Copy link
Contributor

XspeedPL commented May 6, 2020

AFAIK zygote_restart is put into one of the *bin directories and/or symlinked. Search the repo for references.

Simply running Riru without Magisk is trivial, put files, run modified scripts, done.

As for the sepolicy stuff, the easiest way around, since the guy doesn't care about SN, you could just setenforce 0.

@LuigiVampa92
Copy link
Author

Good idea, but two questions
1, Riru Core without Magisk
2, SELinux Policy

Thanks for reply. That is exactly the trickiest part, I believe

AFAIK zygote_restart is put into one of the *bin directories and/or symlinked. Search the repo for references.

Sounds like a good idea. I will try to do that. Btw is there a way to make a check to be sure that Riru Core works as intended? Can I check it somehow?

As for the sepolicy stuff, the easiest way around, since the guy doesn't care about SN, you could just setenforce 0.

If I get that right there are no tricky se_contexts for Riru Core, just 0 0 0644 for everything. But when it comes to EdXposed there are a dedicated sepolicy.rule file that is applied by Magisk supolicy tool. sepolicy.rule contains this:

allow system_server system_server process {execmem}
allow system_server system_server memprotect {mmap_zero}
allow coredomain coredomain process {execmem}
allow coredomain app_data_file * *
attradd {system_app platform_app} mlstrustedsubject
allow zygote apk_data_file * *

I'm not sure how can I apply it manually. Would be very grateful for some hints. Thank you!

@XspeedPL
Copy link
Contributor

XspeedPL commented May 6, 2020

Btw is there a way to make a check to be sure that Riru Core works as intended? Can I check it somehow?

There is a Riru companion app that can verify if Riru is loaded.

But when it comes to EdXposed there are a dedicated sepolicy.rule file that is applied by Magisk supolicy tool. sepolicy.rule contains this:
[snip]
I'm not sure how can I apply it manually.

If you don't want to disable SELinux, you can use the supolicy tool (shipped with Magisk) to apply the policies at runtime, for example using init.d mechanism or similar. Look at old post-fs-data.sh to see how to use it.

@LuigiVampa92
Copy link
Author

There is a Riru companion app that can verify if Riru is loaded.

Thank you. Found and ran that app. Now I have a litmus test for correct Riru Core installation. Going to try it and also try to figure out what to do with SE policies.

Great thanks again for your advices and help guys, going to check all this at weekend

@LuigiVampa92
Copy link
Author

Hey guys, I’ve got a certain advance in what I am trying to achieve, but I have got stuck and I'm looking for your advice again.

===

I use Riru Core v21.0 because in further versions the binary is renamed in order to hide from security checks and I just want the simpliest possible case for now.

So I have made these steps to install Riru Core in /system:

  • I have checked the Riru companion app code (https://github.com/RikkaApps/Riru) and I have noticed that in helper.cpp/init() it checks existence of /system/lib64/libmemtrack_real.so in procs. So I took original /system/lib/libmemtrack.so and /system/lib64/libmemtrack.so from system.img and renamed them into /system/lib/libmemtrack_real.so and /system/lib64/libmemtrack_real.so respectively
  • I took Riru’s modified libmemtrack.so libs and placed them into /system/lib and /system/lib64 instead of original ones
  • I have took "zygote_restart_arm64" for my architecture, renamed it into just "zygote_restart", put it into /system/bin, and gave it 0700 permissions
  • Since magisk executes zygote_restart binary on post-fs, I have made an additional script /system/etc/init/riru.rc with following content:
on post-fs-data
    start zygote_restart

service zygote_restart /system/bin/zygote_restart
    user root
    group root
    oneshot
    disabled

It does basically the same thing as magisk’s post-fs-data.sh

After that I run the Riru companion app and it seems to work well. The output is the same when I install RiruCore and EdXposed as magisk modules and everything truly looks fine with this step:

Riru Unknown (version code 33) found.
Native methods of Zygote class replaced.

nativeForkAndSpecialize calls count: 45
nativeForkSystemServer calls count: 1
nativeSpecializeAppProcess calls count: 0

Everything looks fine :D

===

Now since EdXposed requires complicated se policies to be applied I have decided to turn SELinux off for the test. For that I have made a script in /system/etc/init.d/08setperm with following content:

#!/system/bin/sh

setenforce 0

It puts SELinux into permissive mode on system boot and I get a notification from LOS "Trust" that "SELinux is not enforcing, your security has been weakened" right after system has launched. getenforce also returns Permissive. So, everything looks fine with this step as well.

===

Now I take EdXposed-YAHFA-v0.4.6.2.4529.-release, and copy its jars into /system/framework and its libs into /system/lib and /system/lib64 respectively. I also manually added the following values to /system/build.props:

dalvik.vm.dex2oat-filter=quicken
dalvik.vm.dex2oat-flags=--inline-max-code-units=0

When I run EdXposed Manager it still gives me a yellow warning that tells "EdXposed is installed but not active" and tells me to check logs. I have checked in debugger, the XposedApp.getActiveXposedVersion() method is still not hooked by Xposed and returns default -1 value.

===

So the final result is still the same: EdXposed does not work (methods are not hooked), modules do not work as well (I tried to run XPrivacyLua), also no edxposed manager logs are saved into /data/user_de/0/org.meowcat.edxposed.manager/log (I think that I need to have magisk installed on the device to make them actually save)

===

Well. Here is where I have got stuck this time. So I wanted to ask you guys:

  1. What could go wrong?
  2. Is there a way I can get more debug info from Riru Core and EdXposed? Maybe I can build these libs and jars from source with some flags or modifications that will allow me to see more info about what is happening inside?

Thank you again for your great help! Without you I would stuck at the very beginning :) I will be very grateful for any useful information

@XspeedPL
Copy link
Contributor

Seems like you didn't register the EdXposed module with Riru. One of the install scripts puts the module information to /data/misc/riru

@LuigiVampa92
Copy link
Author

Thanks for reply, @XspeedPL !

That is true. For now I used to avoid to use /data/misc/riru directory at all. I’m afraid that problem could be deeper than that. /data/misc/riru contains nothing but small metadata, mostly magisk modules versions and definitions. The only important thing there is zygote_restart but I successfully managed to move it to /system/bin. Riru core itself seems to work fine without /data/mis/riru and I have found no mentions of this directory in EdXposed code. Looks like EdXposed does not care about this directory as well. It just utilises modified libmemtrack and Zygote hook methods. As far as I can get EdXposed does not rely on any files in /data/misc/riru.

But what I truly could miss is the fact that Riru Core naturally searches for something in that directory. I haven’t looked carefully at Riru code yet but probably it can contain some mechanisms to restrict usage of modified libmemtrack only to whitelist modules and others get unmodified libmemtrack_real instead.

I will check it out. Thank you

@LuigiVampa92
Copy link
Author

Actually just took a brief look at Riru Core code, especially at redirect_memtrack.cpp and it seems that you are right. The problem is that Riru Core puts libmemtrack inside /data/misc/riru and expects to find it there in runtime. It uses this location when decides whether it should redirect calls to original libmemtrack to modified libmemtrack or not. So in my case there is nothing there and that's why all calls do not route to modified libmemtrack, so EdXposed manager is present in /system/framework but cannot access modified Riru's libmemtrack!

I gonna test it out at weekend but it seems that all I need to do is to modify paths in cpp code of Riru core and build modified libmemtrack from source

@MlgmXyysd
Copy link
Member

@LuigiVampa92 no you cannot avoid that, Riru read /data/misc/riru to load modules

@LuigiVampa92
Copy link
Author

So I actually made it, guys.

I have took Riru core v21.2 code and changed it a little to make it use no configs at all but instead to load required modules manually. Basically just removed anything related to reading configs, removed load_modules() function and added function load_module(const char* module_name, int module_api_level). Also removed the logic of renaming libmemtrack_real.so since I don't hide from SafetyNet. In the end I have built a modified libmemtrack.so that does not rely on configs and loads the only module - edxp.

EdXposed now runs well on my device. I have tested a few modules and they all function correctly. There are also no troubles when I wipe data partition in recovery mode. The system recovers well and EdXposed works there again with no trouble.

The only downside is that I have to set SELinux permissive on boot with init.d script, otherwise the system will not boot. I guess that if I want to run it with SELinux enforcing I will have to build the ROM myself, because I haven't managed to find tools that would allow to patch se policies without using magisk.

Thank you again for your help guys!

@msgpo
Copy link

msgpo commented May 20, 2020

So I actually made it, guys.

I have took Riru core v21.2 code and changed it a little to make it use no configs at all but instead to load required modules manually. Basically just removed anything related to reading configs, removed load_modules() function and added function load_module(const char* module_name, int module_api_level). Also removed the logic of renaming libmemtrack_real.so since I don't hide from SafetyNet. In the end I have built a modified libmemtrack.so that does not rely on configs and loads the only module - edxp.

EdXposed now runs well on my device. I have tested a few modules and they all function correctly. There are also no troubles when I wipe data partition in recovery mode. The system recovers well and EdXposed works there again with no trouble.

The only downside is that I have to set SELinux permissive on boot with init.d script, otherwise the system will not boot. I guess that if I want to run it with SELinux enforcing I will have to build the ROM myself, because I haven't managed to find tools that would allow to patch se policies without using magisk.

Thank you again for your help guys!

Hello been following this and there is likely many others also interested in this also, can you consider releasing your method as a fork? Thanks

@LuigiVampa92
Copy link
Author

Hello, @msgpo . Thank you for the interest. I actually plan to publish everything required to build up a TWRP flashable zip that contains Riru Core and EdXposed but for now I haven't managed to find a way to patch se policies and make SELinux stay in enforcing mode. I plan to take a look at magisk's supolicy tool source code and the code that Piotr advised me to see in a message above. I will see if anything can be done with this. Making SELinux enforcing is an important thing and I wouldn't like to publish the final result without it. I will make Riru Core fork soon, but until that problem with se policies for EdXposed will be solved it will be pretty much useless. As it often happens I have unfortunately much less time to work with it than I would like to, but I'm trying to do my best and hope to reach a complete success as soon as I can

@msgpo
Copy link

msgpo commented May 21, 2020

@LuigiVampa92 Thanks for the reply. Also please keep in mind when you publish that not everyone use SELinux enforcing or even at all, using Tomoyo or other alternatives, so maybe you can point that out when released. Is there a way to try what you have succeeded with so far? I think that can be sufficient enough for me to work with, thanks

@LuigiVampa92
Copy link
Author

Hey guys, I have made a repo that contains this flashable EdXposed build that we have been discussing in this thread. So if someone interested please take a look and try :)

https://github.com/LuigiVampa92/System_EdXposed_install

To my own surprise I actually managed to achieve enforcing SELinux mode. I have took the source code of Magisk's supolicy tool, made a binary that patches existing sepolicy with only those 6 rules that EdXposed requires for correct work and run this binary on boot. It injects necessary rules before any app process starts and everything works just fine.

I also managed to lock the bootloader on my OnePlus 5T with LineageOS 16 and EdXposed installed.

@msgpo I have made an option to build a zip with permissive SELinux mode if necessary. You can choose the required mode by setting param on build script. Check it out

Unfortunately, I had to apply rules or set permissive mode by init.d script. I haven't managed to make a .rc script that would do the same, and I'm not sure that it is possible without making your own build with your own custom .te file that will contain the rules for SELinux. It means that if a ROM doesn't have init.d support then it's impossible to use this "system" EdXposed on it. It's not that good because I think that most stock ROMs do not have init.d support, but I'm not sure if there is another way. I have tested everything on LineageOS 16 that has init.d support

@msgpo
Copy link

msgpo commented May 28, 2020

So far so good, thanks!

@serajr
Copy link

serajr commented Jun 30, 2020

Unfortunately, I had to apply rules or set permissive mode by init.d script.

You may be able to try to permanently patch the precompiled_sepolicy file in your shell script, using the magiskinit binary to do that. Something like (but the rules ofc):

mount -orw,remount /vendor
magiskpolicy --load /vendor/etc/selinux/precompiled_sepolicy --save /vendor/etc/selinux/precompiled_sepolicy "allow init domain process { noatsecure }" "allow init secd process { noatsecure }"
mount -oro,remount /vendor

Edit. I forgot to mention, this works on an xperia firmware, I'm not sure on others.

@msgpo
Copy link

msgpo commented Jul 6, 2020

Unfortunately, I had to apply rules or set permissive mode by init.d script.

You may be able to try to permanently patch the precompiled_sepolicy file in your shell script, using the magiskinit binary to do that. Something like (but the rules ofc):

mount -orw,remount /vendor
magiskpolicy --load /vendor/etc/selinux/precompiled_sepolicy --save /vendor/etc/selinux/precompiled_sepolicy "allow init domain process { noatsecure }" "allow init secd process { noatsecure }"
mount -oro,remount /vendor

Edit. I forgot to mention, this works on an xperia firmware, I'm not sure on others.

Same here thanks.

@imReker
Copy link

imReker commented Sep 18, 2020

@LuigiVampa92 Could you please share the modified Riru? I'm trying migrate EdXposed into my ROM directly.

@saymyname77
Copy link

keep going,respect

@kotori2 kotori2 added the enhancement New feature or request label Nov 25, 2020
@LuigiVampa92
Copy link
Author

@google-mirror hello, thanks for the interest to this topic. In case of normally installing magisk, riru-core and riru-edxposed erasing data partition will erase magisk modules configs and riru modules configs that stored in /data and because of that system will bootloop (seems that magiskinit will not be able to handle the situation). In the approach I used I took riru-core code and deleted everything that is related to parsing configs and initialising modules, added manual initialisation of riru-edxposed straight from the code (I don't use other riru modules anyway). So the result is that after I installed system edxposed and relocked the bootloader, data partition is wiped but that's ok, because it doesn't affect neither system nor installed edxposed. You can also make "factory reset" (or wipe data partition because it is technically the same) as much as you like in future

@google-mirror
Copy link

google-mirror commented Dec 16, 2020

Once the bootloader is relocked, dm-verity is enforced. You have to sign boot image with device's oem keys or avb_custom_key, otherwise you will bootloop. Note that user-settable root of trust is not implemented for most of the devices.

@LuigiVampa92
Copy link
Author

LuigiVampa92 commented Dec 16, 2020

@google-mirror true, but OnePlus devices are (if I get that right) the only ones except Google Pixels that allow to use avb_custom_key embedded inside /boot partition. That is what I do in my case, I embed avb_custom_key, resign boot.img and it works. Not sure it is possible on other vendors. Actually the fact it was possible on OnePlus is the reason I started this thread :)

In the end you get a "yellow state" at verified boot. It tells that "device has installed an unknown operating system" but the bootloader is locked

@kotori2
Copy link
Contributor

kotori2 commented Dec 17, 2020

Personally I really dislike breaking system-less stuffs so I will most probably not working on this, but fell free to open a PR.

@LuigiVampa92
Copy link
Author

@kotori2 sorry, I'm afraid I misunderstood you. But just in case, the thing I have been discussing in this thread is not something I intended to get merged into EdXposed master, it was made just for myself and it can be useful only for people that would like to make their own system builds with EdXposed embedded. I agree that for general use it is much more simple and convenient to use it systemless-ly, as as a magisk module, just as it works right now

@whitedavidp
Copy link

Hello. I just got a new Android TV box (Minix Neo U22) that has Android 9 and is rooted (but without Magisk or superSu) - just comes with a switch to turn root on/off. I would love to be able to add EdXposed and wonder if the flashable zip mentioned in this thread will work. Thanks for any help/tips.

@XspeedPL
Copy link
Contributor

@whitedavidp it's not like any of us can test this for you.
Make a nandroid backup, and try flashing it. If it goes wrong restore the backup. What else do you expect lol

@whitedavidp
Copy link

I pretty much thought that. I just wanted to be sure I was understanding the purpose and intent of the reference project. Thanks

@LuigiVampa92
Copy link
Author

@whitedavidp Hello, thanks for the interest to this. It could be possible in theory, yes, but in case with TV could be tricky. That zip we are talking about for now relies on sysvinit (init.d) scripts, which is its main restriction because not many devices and builds support it. I plan to release a new version of it in a about a week or so. This time it will rely on injection inside boot process and should work well on majority of smartphones (at least I hope so) but I'm not sure about TVs. It suggests that you have certain system libs and certain file system hierarchy, I guess that smartphones and TVs should have the similar FS, but I never worked with TVs, so I can't say for sure.

Keep in mind that root is not enough to make edxposed work. You also should find a way patch SELinux policies - that is where init.d/boot patch/permissive policy needed, without it your edxposed could just not work or in worse case your device might just stuck in a bootloop.

As @XspeedPL mentioned, the best way to try it - load some custom recovery, take a look at your device FS, check if there is a way to pwn sepolicies, if there is such a way, then carefully backup all important devices (at least /boot and /system), unzip the archive, and copy stuff in /system manually. Unfortunately, I'm not familiar with TVs at all, so I probably won't be able to help you, sorry

@XspeedPL
Copy link
Contributor

XspeedPL commented Jan 18, 2021

@LuigiVampa92 Latest Riru and EdX don't rely on policy patching anymore, so if you're planning to update your project using latest components then it should become that much easier

Also, Riru doesn't use lib memtrack for injection, it's also simplified in that aspect

@whitedavidp
Copy link

@whitedavidp Hello, thanks for the interest to this. It could be possible in theory, yes, but in case with TV could be tricky. That zip we are talking about for now relies on sysvinit (init.d) scripts, which is its main restriction because not many devices and builds support it. I plan to release a new version of it in a about a week or so. This time it will rely on injection inside boot process and should work well on majority of smartphones (at least I hope so) but I'm not sure about TVs. It suggests that you have certain system libs and certain file system hierarchy, I guess that smartphones and TVs should have the similar FS, but I never worked with TVs, so I can't say for sure.

Keep in mind that root is not enough to make edxposed work. You also should find a way patch SELinux policies - that is where init.d/boot patch/permissive policy needed, without it your edxposed could just not work or in worse case your device might just stuck in a bootloop.

As @XspeedPL mentioned, the best way to try it - load some custom recovery, take a look at your device FS, check if there is a way to pwn sepolicies, if there is such a way, then carefully backup all important devices (at least /boot and /system), unzip the archive, and copy stuff in /system manually. Unfortunately, I'm not familiar with TVs at all, so I probably won't be able to help you, sorry

Thanks for your response and help. This box is thankfully NOT an Android TV OS box, just plain old Android 9 - at least as far as I can tell. I have had other boxes similar to this and been able to use Xposed there. But the latest Android I have done it is 5. So EdExposed and your methods are the only way I have found because it seems that adding Magisk to this box is a no-go.

After TWRP backup, I tried to install the pre-built, ARM permissive (since my getenforce command shows permissive) zip from here.

I didn't get very far running into the errors shown in the attached image. I tried both with and without checking the validation box.

20210118_134355

I am no expert, but I think that init is being used on this device. The other attached image shows the files contained in the systems / folder and I see some init-related stuff there.

20210118_134643

Thanks so much for the help and effort in putting this all together. I await any comments/tips. Cheers!

@LuigiVampa92
Copy link
Author

@whitedavidp the zip is not signed. I think you can disable "zip signature checking" somewhere in TWRP settings and retry

@LuigiVampa92
Copy link
Author

@XspeedPL oh, thanks for the info. I have to see this :)

To be honest I returned to this project when I started to tinker with boot partition patching (that's what magisk do to achieve root actually). If EdXposed and Riru require no sepolicy patching then it should be very easy to make system EdXposed now. Actually, I think that Frida framework that also does runtime hooks does not require sepolicy patching and still works great

@whitedavidp
Copy link

@whitedavidp the zip is not signed. I think you can disable "zip signature checking" somewhere in TWRP settings and retry

Thanks again. I found a sig check setting in TWRP and turned it off (it was on) and tried again. In TWRP when performing an install there is an identical checkbox which I tried both on and off. I suppose that this latter one is for the current install ONLY while the former is the overall setting. I didn't get anywhere really new though.
20210118_144716

I did check the recovery log file and see the following (all of which is jibberish to me):

Installing zip file '/external_sd/zip_system_edxposed_v0462_arm_permissive.zip'
Checking for Digest file...
Skipping Digest check: no Digest file found
I:Update binary zip
Verifying package compatibility...
Package doesn't contain compatibility.zip entry
I:Zip does not contain SELinux file_contexts file in its root.
I:Legacy property environment not used in updater.
E:Can't execute '/tmp/updater': Exec format error
Updater process ended with ERROR: 255
I:Install took 0 second(s).
Error installing zip file '/external_sd/zip_system_edxposed_v0462_arm_permissive.zip'

I know I saw something about this in above posts. But no idea what it all means.

Thanks again.

@LuigiVampa92
Copy link
Author

Just tried to install it on my device via TWRP/Install and everything worked good. I have searched about error 255 and people on XDA say that it could be a problem with partitions, or badly picked TWRP (wrong arch, I mean 32bit/64bit), outdated TWRP version. Sorry, I can't tell for sure what is the problem in your case

@whitedavidp
Copy link

Just tried to install it on my device via TWRP/Install and everything worked good. I have searched about error 255 and people on XDA say that it could be a problem with partitions, or badly picked TWRP (wrong arch, I mean 32bit/64bit), outdated TWRP version. Sorry, I can't tell for sure what is the problem in your case

Well thanks again and sorry for any bother. Thinking that my TWRP is 64 bit, I tried the ARM 64 bit zip with identical results. Must be the TWRP and I will try to see about it.

Nothing is easy :-)

SekiBetu added a commit to SekiBetu/SekiBetu that referenced this issue Apr 2, 2021
…—mlgmxyysd(ElderDrivers/EdXposed/issues/837)

ElderDrivers/EdXposed#1
ElderDrivers/EdXposed#2
ElderDrivers/EdXposed#3
ElderDrivers/EdXposed#4
ElderDrivers/EdXposed#5
ElderDrivers/EdXposed#6
ElderDrivers/EdXposed#7
ElderDrivers/EdXposed#8
ElderDrivers/EdXposed#9
ElderDrivers/EdXposed#10
ElderDrivers/EdXposed#11
ElderDrivers/EdXposed#12
ElderDrivers/EdXposed#13
ElderDrivers/EdXposed#14
ElderDrivers/EdXposed#15
ElderDrivers/EdXposed#16
ElderDrivers/EdXposed#17
ElderDrivers/EdXposed#18
ElderDrivers/EdXposed#19
ElderDrivers/EdXposed#20
ElderDrivers/EdXposed#21
ElderDrivers/EdXposed#22
ElderDrivers/EdXposed#23
ElderDrivers/EdXposed#24
ElderDrivers/EdXposed#25
ElderDrivers/EdXposed#26
ElderDrivers/EdXposed#27
ElderDrivers/EdXposed#28
ElderDrivers/EdXposed#29
ElderDrivers/EdXposed#30
ElderDrivers/EdXposed#31
ElderDrivers/EdXposed#32
ElderDrivers/EdXposed#33
ElderDrivers/EdXposed#34
ElderDrivers/EdXposed#35
ElderDrivers/EdXposed#36
ElderDrivers/EdXposed#37
ElderDrivers/EdXposed#38
ElderDrivers/EdXposed#39
ElderDrivers/EdXposed#40
ElderDrivers/EdXposed#41
ElderDrivers/EdXposed#42
ElderDrivers/EdXposed#43
ElderDrivers/EdXposed#44
ElderDrivers/EdXposed#45
ElderDrivers/EdXposed#46
ElderDrivers/EdXposed#47
ElderDrivers/EdXposed#48
ElderDrivers/EdXposed#49
ElderDrivers/EdXposed#50
ElderDrivers/EdXposed#51
ElderDrivers/EdXposed#52
ElderDrivers/EdXposed#53
ElderDrivers/EdXposed#54
ElderDrivers/EdXposed#55
ElderDrivers/EdXposed#56
ElderDrivers/EdXposed#57
ElderDrivers/EdXposed#58
ElderDrivers/EdXposed#59
ElderDrivers/EdXposed#60
ElderDrivers/EdXposed#61
ElderDrivers/EdXposed#62
ElderDrivers/EdXposed#63
ElderDrivers/EdXposed#64
ElderDrivers/EdXposed#65
ElderDrivers/EdXposed#66
ElderDrivers/EdXposed#67
ElderDrivers/EdXposed#68
ElderDrivers/EdXposed#69
ElderDrivers/EdXposed#70
ElderDrivers/EdXposed#71
ElderDrivers/EdXposed#72
ElderDrivers/EdXposed#73
ElderDrivers/EdXposed#74
ElderDrivers/EdXposed#75
ElderDrivers/EdXposed#76
ElderDrivers/EdXposed#77
ElderDrivers/EdXposed#78
ElderDrivers/EdXposed#79
ElderDrivers/EdXposed#80
ElderDrivers/EdXposed#81
ElderDrivers/EdXposed#82
ElderDrivers/EdXposed#83
ElderDrivers/EdXposed#84
ElderDrivers/EdXposed#85
ElderDrivers/EdXposed#86
ElderDrivers/EdXposed#87
ElderDrivers/EdXposed#88
ElderDrivers/EdXposed#89
ElderDrivers/EdXposed#90
ElderDrivers/EdXposed#91
ElderDrivers/EdXposed#92
ElderDrivers/EdXposed#93
ElderDrivers/EdXposed#94
ElderDrivers/EdXposed#95
ElderDrivers/EdXposed#96
ElderDrivers/EdXposed#97
ElderDrivers/EdXposed#98
ElderDrivers/EdXposed#99
ElderDrivers/EdXposed#100
ElderDrivers/EdXposed#101
ElderDrivers/EdXposed#102
ElderDrivers/EdXposed#103
ElderDrivers/EdXposed#104
ElderDrivers/EdXposed#105
ElderDrivers/EdXposed#106
ElderDrivers/EdXposed#107
ElderDrivers/EdXposed#108
ElderDrivers/EdXposed#109
ElderDrivers/EdXposed#110
ElderDrivers/EdXposed#111
ElderDrivers/EdXposed#112
ElderDrivers/EdXposed#113
ElderDrivers/EdXposed#114
ElderDrivers/EdXposed#115
ElderDrivers/EdXposed#116
ElderDrivers/EdXposed#117
ElderDrivers/EdXposed#118
ElderDrivers/EdXposed#119
ElderDrivers/EdXposed#120
ElderDrivers/EdXposed#121
ElderDrivers/EdXposed#122
ElderDrivers/EdXposed#123
ElderDrivers/EdXposed#124
ElderDrivers/EdXposed#125
ElderDrivers/EdXposed#126
ElderDrivers/EdXposed#127
ElderDrivers/EdXposed#128
ElderDrivers/EdXposed#129
ElderDrivers/EdXposed#130
ElderDrivers/EdXposed#131
ElderDrivers/EdXposed#132
ElderDrivers/EdXposed#133
ElderDrivers/EdXposed#134
ElderDrivers/EdXposed#135
ElderDrivers/EdXposed#136
ElderDrivers/EdXposed#137
ElderDrivers/EdXposed#138
ElderDrivers/EdXposed#139
ElderDrivers/EdXposed#140
ElderDrivers/EdXposed#141
ElderDrivers/EdXposed#142
ElderDrivers/EdXposed#143
ElderDrivers/EdXposed#144
ElderDrivers/EdXposed#145
ElderDrivers/EdXposed#146
ElderDrivers/EdXposed#147
ElderDrivers/EdXposed#148
ElderDrivers/EdXposed#149
ElderDrivers/EdXposed#150
ElderDrivers/EdXposed#151
ElderDrivers/EdXposed#152
ElderDrivers/EdXposed#153
ElderDrivers/EdXposed#154
ElderDrivers/EdXposed#155
ElderDrivers/EdXposed#156
ElderDrivers/EdXposed#157
ElderDrivers/EdXposed#158
ElderDrivers/EdXposed#159
ElderDrivers/EdXposed#160
ElderDrivers/EdXposed#161
ElderDrivers/EdXposed#162
ElderDrivers/EdXposed#163
https://github.com/ElderDrivers/EdXposed/issues/164
https://github.com/ElderDrivers/EdXposed/issues/165
ElderDrivers/EdXposed#166
ElderDrivers/EdXposed#167
ElderDrivers/EdXposed#168
https://github.com/ElderDrivers/EdXposed/issues/169
ElderDrivers/EdXposed#170
ElderDrivers/EdXposed#171
ElderDrivers/EdXposed#172
ElderDrivers/EdXposed#173
ElderDrivers/EdXposed#174
ElderDrivers/EdXposed#175
ElderDrivers/EdXposed#176
ElderDrivers/EdXposed#177
ElderDrivers/EdXposed#178
ElderDrivers/EdXposed#179
ElderDrivers/EdXposed#180
ElderDrivers/EdXposed#181
ElderDrivers/EdXposed#182
ElderDrivers/EdXposed#183
ElderDrivers/EdXposed#184
ElderDrivers/EdXposed#185
ElderDrivers/EdXposed#186
ElderDrivers/EdXposed#187
ElderDrivers/EdXposed#188
ElderDrivers/EdXposed#189
ElderDrivers/EdXposed#190
ElderDrivers/EdXposed#191
ElderDrivers/EdXposed#192
ElderDrivers/EdXposed#193
ElderDrivers/EdXposed#194
ElderDrivers/EdXposed#195
ElderDrivers/EdXposed#196
ElderDrivers/EdXposed#197
ElderDrivers/EdXposed#198
ElderDrivers/EdXposed#199
ElderDrivers/EdXposed#200
ElderDrivers/EdXposed#201
ElderDrivers/EdXposed#202
ElderDrivers/EdXposed#203
ElderDrivers/EdXposed#204
ElderDrivers/EdXposed#205
ElderDrivers/EdXposed#206
ElderDrivers/EdXposed#207
ElderDrivers/EdXposed#208
ElderDrivers/EdXposed#209
ElderDrivers/EdXposed#210
ElderDrivers/EdXposed#211
ElderDrivers/EdXposed#212
ElderDrivers/EdXposed#213
ElderDrivers/EdXposed#214
ElderDrivers/EdXposed#215
ElderDrivers/EdXposed#216
ElderDrivers/EdXposed#217
ElderDrivers/EdXposed#218
ElderDrivers/EdXposed#219
ElderDrivers/EdXposed#220
ElderDrivers/EdXposed#221
ElderDrivers/EdXposed#222
ElderDrivers/EdXposed#223
ElderDrivers/EdXposed#224
ElderDrivers/EdXposed#225
ElderDrivers/EdXposed#226
ElderDrivers/EdXposed#227
ElderDrivers/EdXposed#228
ElderDrivers/EdXposed#229
ElderDrivers/EdXposed#230
ElderDrivers/EdXposed#231
ElderDrivers/EdXposed#232
ElderDrivers/EdXposed#233
ElderDrivers/EdXposed#234
ElderDrivers/EdXposed#235
ElderDrivers/EdXposed#236
ElderDrivers/EdXposed#237
ElderDrivers/EdXposed#238
ElderDrivers/EdXposed#239
ElderDrivers/EdXposed#240
ElderDrivers/EdXposed#241
ElderDrivers/EdXposed#242
ElderDrivers/EdXposed#243
ElderDrivers/EdXposed#244
ElderDrivers/EdXposed#245
ElderDrivers/EdXposed#246
ElderDrivers/EdXposed#247
ElderDrivers/EdXposed#248
ElderDrivers/EdXposed#249
ElderDrivers/EdXposed#250
ElderDrivers/EdXposed#251
ElderDrivers/EdXposed#252
ElderDrivers/EdXposed#253
ElderDrivers/EdXposed#254
ElderDrivers/EdXposed#255
ElderDrivers/EdXposed#256
ElderDrivers/EdXposed#257
ElderDrivers/EdXposed#258
ElderDrivers/EdXposed#259
ElderDrivers/EdXposed#260
ElderDrivers/EdXposed#261
ElderDrivers/EdXposed#262
ElderDrivers/EdXposed#263
ElderDrivers/EdXposed#264
ElderDrivers/EdXposed#265
ElderDrivers/EdXposed#266
ElderDrivers/EdXposed#267
ElderDrivers/EdXposed#268
ElderDrivers/EdXposed#269
ElderDrivers/EdXposed#270
ElderDrivers/EdXposed#271
ElderDrivers/EdXposed#272
ElderDrivers/EdXposed#273
ElderDrivers/EdXposed#274
ElderDrivers/EdXposed#275
ElderDrivers/EdXposed#276
ElderDrivers/EdXposed#277
ElderDrivers/EdXposed#278
ElderDrivers/EdXposed#279
ElderDrivers/EdXposed#280
ElderDrivers/EdXposed#281
ElderDrivers/EdXposed#282
ElderDrivers/EdXposed#283
ElderDrivers/EdXposed#284
ElderDrivers/EdXposed#285
ElderDrivers/EdXposed#286
ElderDrivers/EdXposed#287
ElderDrivers/EdXposed#288
ElderDrivers/EdXposed#289
ElderDrivers/EdXposed#290
ElderDrivers/EdXposed#291
ElderDrivers/EdXposed#292
ElderDrivers/EdXposed#293
ElderDrivers/EdXposed#294
ElderDrivers/EdXposed#295
ElderDrivers/EdXposed#296
ElderDrivers/EdXposed#297
ElderDrivers/EdXposed#298
ElderDrivers/EdXposed#299
ElderDrivers/EdXposed#300
ElderDrivers/EdXposed#301
ElderDrivers/EdXposed#302
ElderDrivers/EdXposed#303
ElderDrivers/EdXposed#304
ElderDrivers/EdXposed#305
https://github.com/ElderDrivers/EdXposed/issues/306
ElderDrivers/EdXposed#307
ElderDrivers/EdXposed#308
ElderDrivers/EdXposed#309
ElderDrivers/EdXposed#310
ElderDrivers/EdXposed#311
ElderDrivers/EdXposed#312
ElderDrivers/EdXposed#313
ElderDrivers/EdXposed#314
ElderDrivers/EdXposed#315
ElderDrivers/EdXposed#316
ElderDrivers/EdXposed#317
ElderDrivers/EdXposed#318
ElderDrivers/EdXposed#319
ElderDrivers/EdXposed#320
ElderDrivers/EdXposed#321
ElderDrivers/EdXposed#322
ElderDrivers/EdXposed#323
ElderDrivers/EdXposed#324
ElderDrivers/EdXposed#325
ElderDrivers/EdXposed#326
ElderDrivers/EdXposed#327
ElderDrivers/EdXposed#328
ElderDrivers/EdXposed#329
ElderDrivers/EdXposed#330
ElderDrivers/EdXposed#331
ElderDrivers/EdXposed#332
ElderDrivers/EdXposed#333
ElderDrivers/EdXposed#334
ElderDrivers/EdXposed#335
ElderDrivers/EdXposed#336
ElderDrivers/EdXposed#337
ElderDrivers/EdXposed#338
ElderDrivers/EdXposed#339
ElderDrivers/EdXposed#340
ElderDrivers/EdXposed#341
ElderDrivers/EdXposed#342
ElderDrivers/EdXposed#343
ElderDrivers/EdXposed#344
ElderDrivers/EdXposed#345
ElderDrivers/EdXposed#346
ElderDrivers/EdXposed#347
ElderDrivers/EdXposed#348
ElderDrivers/EdXposed#349
ElderDrivers/EdXposed#350
ElderDrivers/EdXposed#351
ElderDrivers/EdXposed#352
ElderDrivers/EdXposed#353
ElderDrivers/EdXposed#354
ElderDrivers/EdXposed#355
ElderDrivers/EdXposed#356
ElderDrivers/EdXposed#357
ElderDrivers/EdXposed#358
ElderDrivers/EdXposed#359
ElderDrivers/EdXposed#360
ElderDrivers/EdXposed#361
ElderDrivers/EdXposed#362
ElderDrivers/EdXposed#363
ElderDrivers/EdXposed#364
ElderDrivers/EdXposed#365
ElderDrivers/EdXposed#366
ElderDrivers/EdXposed#367
ElderDrivers/EdXposed#368
ElderDrivers/EdXposed#369
ElderDrivers/EdXposed#370
ElderDrivers/EdXposed#371
ElderDrivers/EdXposed#372
ElderDrivers/EdXposed#373
ElderDrivers/EdXposed#374
ElderDrivers/EdXposed#375
ElderDrivers/EdXposed#376
ElderDrivers/EdXposed#377
ElderDrivers/EdXposed#378
ElderDrivers/EdXposed#379
ElderDrivers/EdXposed#380
ElderDrivers/EdXposed#381
ElderDrivers/EdXposed#382
ElderDrivers/EdXposed#383
ElderDrivers/EdXposed#384
ElderDrivers/EdXposed#385
ElderDrivers/EdXposed#386
ElderDrivers/EdXposed#387
ElderDrivers/EdXposed#388
ElderDrivers/EdXposed#389
ElderDrivers/EdXposed#390
ElderDrivers/EdXposed#391
ElderDrivers/EdXposed#392
ElderDrivers/EdXposed#393
ElderDrivers/EdXposed#394
ElderDrivers/EdXposed#395
ElderDrivers/EdXposed#396
ElderDrivers/EdXposed#397
ElderDrivers/EdXposed#398
ElderDrivers/EdXposed#399
ElderDrivers/EdXposed#400
ElderDrivers/EdXposed#401
ElderDrivers/EdXposed#402
ElderDrivers/EdXposed#403
ElderDrivers/EdXposed#404
ElderDrivers/EdXposed#405
ElderDrivers/EdXposed#406
ElderDrivers/EdXposed#407
ElderDrivers/EdXposed#408
ElderDrivers/EdXposed#409
ElderDrivers/EdXposed#410
ElderDrivers/EdXposed#411
ElderDrivers/EdXposed#412
ElderDrivers/EdXposed#413
ElderDrivers/EdXposed#414
ElderDrivers/EdXposed#415
ElderDrivers/EdXposed#416
ElderDrivers/EdXposed#417
ElderDrivers/EdXposed#418
ElderDrivers/EdXposed#419
ElderDrivers/EdXposed#420
ElderDrivers/EdXposed#421
ElderDrivers/EdXposed#422
ElderDrivers/EdXposed#423
ElderDrivers/EdXposed#424
ElderDrivers/EdXposed#425
ElderDrivers/EdXposed#426
ElderDrivers/EdXposed#427
ElderDrivers/EdXposed#428
ElderDrivers/EdXposed#429
ElderDrivers/EdXposed#430
ElderDrivers/EdXposed#431
ElderDrivers/EdXposed#432
ElderDrivers/EdXposed#433
ElderDrivers/EdXposed#434
ElderDrivers/EdXposed#435
ElderDrivers/EdXposed#436
ElderDrivers/EdXposed#437
ElderDrivers/EdXposed#438
ElderDrivers/EdXposed#439
ElderDrivers/EdXposed#440
ElderDrivers/EdXposed#441
ElderDrivers/EdXposed#442
ElderDrivers/EdXposed#443
ElderDrivers/EdXposed#444
ElderDrivers/EdXposed#445
ElderDrivers/EdXposed#446
ElderDrivers/EdXposed#447
ElderDrivers/EdXposed#448
ElderDrivers/EdXposed#449
ElderDrivers/EdXposed#450
ElderDrivers/EdXposed#451
ElderDrivers/EdXposed#452
ElderDrivers/EdXposed#453
ElderDrivers/EdXposed#454
ElderDrivers/EdXposed#455
ElderDrivers/EdXposed#456
ElderDrivers/EdXposed#457
ElderDrivers/EdXposed#458
ElderDrivers/EdXposed#459
ElderDrivers/EdXposed#460
ElderDrivers/EdXposed#461
ElderDrivers/EdXposed#462
ElderDrivers/EdXposed#463
ElderDrivers/EdXposed#464
ElderDrivers/EdXposed#465
ElderDrivers/EdXposed#466
ElderDrivers/EdXposed#467
ElderDrivers/EdXposed#468
ElderDrivers/EdXposed#469
ElderDrivers/EdXposed#470
ElderDrivers/EdXposed#471
ElderDrivers/EdXposed#472
ElderDrivers/EdXposed#473
ElderDrivers/EdXposed#474
ElderDrivers/EdXposed#475
ElderDrivers/EdXposed#476
ElderDrivers/EdXposed#477
ElderDrivers/EdXposed#478
ElderDrivers/EdXposed#479
ElderDrivers/EdXposed#480
ElderDrivers/EdXposed#481
ElderDrivers/EdXposed#482
ElderDrivers/EdXposed#483
ElderDrivers/EdXposed#484
ElderDrivers/EdXposed#485
ElderDrivers/EdXposed#486
ElderDrivers/EdXposed#487
ElderDrivers/EdXposed#488
ElderDrivers/EdXposed#489
ElderDrivers/EdXposed#490
ElderDrivers/EdXposed#491
ElderDrivers/EdXposed#492
ElderDrivers/EdXposed#493
ElderDrivers/EdXposed#494
ElderDrivers/EdXposed#495
ElderDrivers/EdXposed#496
ElderDrivers/EdXposed#497
ElderDrivers/EdXposed#498
ElderDrivers/EdXposed#499
ElderDrivers/EdXposed#500
ElderDrivers/EdXposed#501
ElderDrivers/EdXposed#502
ElderDrivers/EdXposed#503
ElderDrivers/EdXposed#504
ElderDrivers/EdXposed#505
ElderDrivers/EdXposed#506
ElderDrivers/EdXposed#507
ElderDrivers/EdXposed#508
ElderDrivers/EdXposed#509
ElderDrivers/EdXposed#510
ElderDrivers/EdXposed#511
ElderDrivers/EdXposed#512
ElderDrivers/EdXposed#513
ElderDrivers/EdXposed#514
ElderDrivers/EdXposed#515
ElderDrivers/EdXposed#516
ElderDrivers/EdXposed#517
ElderDrivers/EdXposed#518
ElderDrivers/EdXposed#519
ElderDrivers/EdXposed#520
ElderDrivers/EdXposed#521
ElderDrivers/EdXposed#522
ElderDrivers/EdXposed#523
ElderDrivers/EdXposed#524
ElderDrivers/EdXposed#525
ElderDrivers/EdXposed#526
ElderDrivers/EdXposed#527
ElderDrivers/EdXposed#528
ElderDrivers/EdXposed#529
ElderDrivers/EdXposed#530
ElderDrivers/EdXposed#531
ElderDrivers/EdXposed#532
ElderDrivers/EdXposed#533
ElderDrivers/EdXposed#534
ElderDrivers/EdXposed#535
ElderDrivers/EdXposed#536
ElderDrivers/EdXposed#537
ElderDrivers/EdXposed#538
ElderDrivers/EdXposed#539
ElderDrivers/EdXposed#540
ElderDrivers/EdXposed#541
ElderDrivers/EdXposed#542
ElderDrivers/EdXposed#543
ElderDrivers/EdXposed#544
ElderDrivers/EdXposed#545
ElderDrivers/EdXposed#546
ElderDrivers/EdXposed#547
ElderDrivers/EdXposed#548
ElderDrivers/EdXposed#549
ElderDrivers/EdXposed#550
ElderDrivers/EdXposed#551
ElderDrivers/EdXposed#552
ElderDrivers/EdXposed#553
ElderDrivers/EdXposed#554
ElderDrivers/EdXposed#555
ElderDrivers/EdXposed#556
ElderDrivers/EdXposed#557
ElderDrivers/EdXposed#558
ElderDrivers/EdXposed#559
ElderDrivers/EdXposed#560
ElderDrivers/EdXposed#561
ElderDrivers/EdXposed#562
ElderDrivers/EdXposed#563
ElderDrivers/EdXposed#564
ElderDrivers/EdXposed#565
ElderDrivers/EdXposed#566
ElderDrivers/EdXposed#567
ElderDrivers/EdXposed#568
ElderDrivers/EdXposed#569
ElderDrivers/EdXposed#570
ElderDrivers/EdXposed#571
ElderDrivers/EdXposed#572
ElderDrivers/EdXposed#573
ElderDrivers/EdXposed#574
ElderDrivers/EdXposed#575
ElderDrivers/EdXposed#576
ElderDrivers/EdXposed#577
ElderDrivers/EdXposed#578
ElderDrivers/EdXposed#579
ElderDrivers/EdXposed#580
ElderDrivers/EdXposed#581
ElderDrivers/EdXposed#582
ElderDrivers/EdXposed#583
ElderDrivers/EdXposed#584
ElderDrivers/EdXposed#585
ElderDrivers/EdXposed#586
ElderDrivers/EdXposed#587
ElderDrivers/EdXposed#588
ElderDrivers/EdXposed#589
ElderDrivers/EdXposed#590
ElderDrivers/EdXposed#591
ElderDrivers/EdXposed#592
ElderDrivers/EdXposed#593
ElderDrivers/EdXposed#594
ElderDrivers/EdXposed#595
ElderDrivers/EdXposed#596
ElderDrivers/EdXposed#597
ElderDrivers/EdXposed#598
ElderDrivers/EdXposed#599
ElderDrivers/EdXposed#600
ElderDrivers/EdXposed#601
ElderDrivers/EdXposed#602
ElderDrivers/EdXposed#603
ElderDrivers/EdXposed#604
ElderDrivers/EdXposed#605
ElderDrivers/EdXposed#606
ElderDrivers/EdXposed#607
ElderDrivers/EdXposed#608
ElderDrivers/EdXposed#609
ElderDrivers/EdXposed#610
ElderDrivers/EdXposed#611
ElderDrivers/EdXposed#612
ElderDrivers/EdXposed#613
ElderDrivers/EdXposed#614
ElderDrivers/EdXposed#615
ElderDrivers/EdXposed#616
ElderDrivers/EdXposed#617
ElderDrivers/EdXposed#618
ElderDrivers/EdXposed#619
ElderDrivers/EdXposed#620
ElderDrivers/EdXposed#621
ElderDrivers/EdXposed#622
ElderDrivers/EdXposed#623
ElderDrivers/EdXposed#624
ElderDrivers/EdXposed#625
ElderDrivers/EdXposed#626
ElderDrivers/EdXposed#627
ElderDrivers/EdXposed#628
ElderDrivers/EdXposed#629
ElderDrivers/EdXposed#630
ElderDrivers/EdXposed#631
ElderDrivers/EdXposed#632
ElderDrivers/EdXposed#633
ElderDrivers/EdXposed#634
ElderDrivers/EdXposed#635
ElderDrivers/EdXposed#636
ElderDrivers/EdXposed#637
ElderDrivers/EdXposed#638
ElderDrivers/EdXposed#639
ElderDrivers/EdXposed#640
ElderDrivers/EdXposed#641
ElderDrivers/EdXposed#642
ElderDrivers/EdXposed#643
ElderDrivers/EdXposed#644
ElderDrivers/EdXposed#645
ElderDrivers/EdXposed#646
ElderDrivers/EdXposed#647
ElderDrivers/EdXposed#648
ElderDrivers/EdXposed#649
ElderDrivers/EdXposed#650
ElderDrivers/EdXposed#651
ElderDrivers/EdXposed#652
ElderDrivers/EdXposed#653
ElderDrivers/EdXposed#654
ElderDrivers/EdXposed#655
ElderDrivers/EdXposed#656
ElderDrivers/EdXposed#657
ElderDrivers/EdXposed#658
ElderDrivers/EdXposed#659
ElderDrivers/EdXposed#660
ElderDrivers/EdXposed#661
ElderDrivers/EdXposed#662
ElderDrivers/EdXposed#663
ElderDrivers/EdXposed#664
ElderDrivers/EdXposed#665
ElderDrivers/EdXposed#666
ElderDrivers/EdXposed#667
ElderDrivers/EdXposed#668
ElderDrivers/EdXposed#669
ElderDrivers/EdXposed#670
ElderDrivers/EdXposed#671
ElderDrivers/EdXposed#672
ElderDrivers/EdXposed#673
ElderDrivers/EdXposed#674
ElderDrivers/EdXposed#675
ElderDrivers/EdXposed#676
ElderDrivers/EdXposed#677
ElderDrivers/EdXposed#678
ElderDrivers/EdXposed#679
ElderDrivers/EdXposed#680
ElderDrivers/EdXposed#681
ElderDrivers/EdXposed#682
ElderDrivers/EdXposed#683
ElderDrivers/EdXposed#684
ElderDrivers/EdXposed#685
ElderDrivers/EdXposed#686
ElderDrivers/EdXposed#687
ElderDrivers/EdXposed#688
ElderDrivers/EdXposed#689
ElderDrivers/EdXposed#690
ElderDrivers/EdXposed#691
ElderDrivers/EdXposed#692
ElderDrivers/EdXposed#693
ElderDrivers/EdXposed#694
ElderDrivers/EdXposed#695
ElderDrivers/EdXposed#696
ElderDrivers/EdXposed#697
ElderDrivers/EdXposed#698
ElderDrivers/EdXposed#699
ElderDrivers/EdXposed#700
ElderDrivers/EdXposed#701
ElderDrivers/EdXposed#702
ElderDrivers/EdXposed#703
ElderDrivers/EdXposed#704
ElderDrivers/EdXposed#705
ElderDrivers/EdXposed#706
ElderDrivers/EdXposed#707
ElderDrivers/EdXposed#708
ElderDrivers/EdXposed#709
ElderDrivers/EdXposed#710
ElderDrivers/EdXposed#711
ElderDrivers/EdXposed#712
ElderDrivers/EdXposed#713
ElderDrivers/EdXposed#714
ElderDrivers/EdXposed#715
ElderDrivers/EdXposed#716
ElderDrivers/EdXposed#717
ElderDrivers/EdXposed#718
ElderDrivers/EdXposed#719
ElderDrivers/EdXposed#720
ElderDrivers/EdXposed#721
ElderDrivers/EdXposed#722
ElderDrivers/EdXposed#723
ElderDrivers/EdXposed#724
ElderDrivers/EdXposed#725
ElderDrivers/EdXposed#726
ElderDrivers/EdXposed#727
ElderDrivers/EdXposed#728
ElderDrivers/EdXposed#729
ElderDrivers/EdXposed#730
ElderDrivers/EdXposed#731
ElderDrivers/EdXposed#732
ElderDrivers/EdXposed#733
ElderDrivers/EdXposed#734
ElderDrivers/EdXposed#735
ElderDrivers/EdXposed#736
ElderDrivers/EdXposed#737
ElderDrivers/EdXposed#738
ElderDrivers/EdXposed#739
ElderDrivers/EdXposed#740
ElderDrivers/EdXposed#741
ElderDrivers/EdXposed#742
ElderDrivers/EdXposed#743
ElderDrivers/EdXposed#744
ElderDrivers/EdXposed#745
ElderDrivers/EdXposed#746
ElderDrivers/EdXposed#747
ElderDrivers/EdXposed#748
ElderDrivers/EdXposed#749
ElderDrivers/EdXposed#750
ElderDrivers/EdXposed#751
ElderDrivers/EdXposed#752
ElderDrivers/EdXposed#753
ElderDrivers/EdXposed#754
ElderDrivers/EdXposed#755
ElderDrivers/EdXposed#756
ElderDrivers/EdXposed#757
ElderDrivers/EdXposed#758
ElderDrivers/EdXposed#759
ElderDrivers/EdXposed#760
ElderDrivers/EdXposed#761
ElderDrivers/EdXposed#762
ElderDrivers/EdXposed#763
ElderDrivers/EdXposed#764
ElderDrivers/EdXposed#765
ElderDrivers/EdXposed#766
ElderDrivers/EdXposed#767
ElderDrivers/EdXposed#768
ElderDrivers/EdXposed#769
ElderDrivers/EdXposed#770
ElderDrivers/EdXposed#771
ElderDrivers/EdXposed#772
ElderDrivers/EdXposed#773
ElderDrivers/EdXposed#774
ElderDrivers/EdXposed#775
ElderDrivers/EdXposed#776
ElderDrivers/EdXposed#777
https://github.com/ElderDrivers/EdXposed/issues/778
ElderDrivers/EdXposed#779
ElderDrivers/EdXposed#780
ElderDrivers/EdXposed#781
ElderDrivers/EdXposed#782
ElderDrivers/EdXposed#783
ElderDrivers/EdXposed#784
ElderDrivers/EdXposed#785
ElderDrivers/EdXposed#786
ElderDrivers/EdXposed#787
ElderDrivers/EdXposed#788
ElderDrivers/EdXposed#789
ElderDrivers/EdXposed#790
ElderDrivers/EdXposed#791
ElderDrivers/EdXposed#792
ElderDrivers/EdXposed#793
ElderDrivers/EdXposed#794
ElderDrivers/EdXposed#795
ElderDrivers/EdXposed#796
ElderDrivers/EdXposed#797
ElderDrivers/EdXposed#798
ElderDrivers/EdXposed#799
ElderDrivers/EdXposed#800
ElderDrivers/EdXposed#801
ElderDrivers/EdXposed#802
ElderDrivers/EdXposed#803
ElderDrivers/EdXposed#804
ElderDrivers/EdXposed#805
ElderDrivers/EdXposed#806
ElderDrivers/EdXposed#807
ElderDrivers/EdXposed#808
ElderDrivers/EdXposed#809
ElderDrivers/EdXposed#810
ElderDrivers/EdXposed#811
ElderDrivers/EdXposed#812
ElderDrivers/EdXposed#813
ElderDrivers/EdXposed#814
ElderDrivers/EdXposed#815
ElderDrivers/EdXposed#816
ElderDrivers/EdXposed#817
ElderDrivers/EdXposed#818
ElderDrivers/EdXposed#819
ElderDrivers/EdXposed#820
ElderDrivers/EdXposed#821
https://github.com/ElderDrivers/EdXposed/issues/822
ElderDrivers/EdXposed#823
ElderDrivers/EdXposed#824
ElderDrivers/EdXposed#825
ElderDrivers/EdXposed#826
ElderDrivers/EdXposed#827
ElderDrivers/EdXposed#828
ElderDrivers/EdXposed#829
ElderDrivers/EdXposed#830
ElderDrivers/EdXposed#831
ElderDrivers/EdXposed#832
ElderDrivers/EdXposed#833
ElderDrivers/EdXposed#834
ElderDrivers/EdXposed#835
ElderDrivers/EdXposed#836
ElderDrivers/EdXposed#837
ElderDrivers/EdXposed#838
ElderDrivers/EdXposed#839
ElderDrivers/EdXposed#840
ElderDrivers/EdXposed#841
ElderDrivers/EdXposed#842
ElderDrivers/EdXposed#843
ElderDrivers/EdXposed#844
ElderDrivers/EdXposed#845
ElderDrivers/EdXposed#846
ElderDrivers/EdXposed#847
ElderDrivers/EdXposed#848
ElderDrivers/EdXposed#849
ElderDrivers/EdXposed#850
ElderDrivers/EdXposed#851
ElderDrivers/EdXposed#852
ElderDrivers/EdXposed#853
ElderDrivers/EdXposed#854
@MlgmXyysd MlgmXyysd pinned this issue Jul 28, 2021
@MlgmXyysd MlgmXyysd unpinned this issue Aug 6, 2021
@intika
Copy link

intika commented Oct 7, 2021

Any updates on this ? really interesting... should get rid of riru module anyway

@kababoom
Copy link

@whitedavidp Almost a year later but got this working on a Minix U22XJ. Issue is the script mount is incorrect /system_root/system vs /system/system, init.d is not available (but not needed since selinux is already permissive), hence the errors while installing with twrp.
I performed all copy and permission actions manually from twrp terminal and all is working (at least the two modules I need). Additional note, make sure to use an EdXposed manager compatible with 4.6.2..

@LuigiVampa92 Thank you ......

@LuigiVampa92
Copy link
Author

@whitedavidp Almost a year later but got this working on a Minix U22XJ. Issue is the script mount is incorrect /system_root/system vs /system/system, init.d is not available (but not needed since selinux is already permissive), hence the errors while installing with twrp.

I performed all copy and permission actions manually from twrp terminal and all is working (at least the two modules I need). Additional note, make sure to use an EdXposed manager compatible with 4.6.2..

@LuigiVampa92 Thank you ......

Thanks for the kind words. I'm glad this thing was still useful to you. Sorry I've got all this kinda forsaken tbh

@intika
Copy link

intika commented Feb 2, 2022

What about switching from riru to the new Zygisk ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests