-
Notifications
You must be signed in to change notification settings - Fork 632
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Question] Is it possible to make EdXposed work without Magisk? #532
Comments
You're mostly correct, first you need to put files normally unpacked into Magisk directories directly into system. |
Thanks for reply. Yes, my final goal is to lock the BL with EdXposed actually installed and working. As far as I can suggest once installed EdXposed will not make any changes to /system directly, only to /data, but data is not processed by verified boot. It seems that I did the first part by putting EdXposed jars and libs and modified libmemtrack.so into /system but it I don't know where to use that zygote_restart binary. As far as I know, previous versions used modified app_process binaries, but it seems not to be the case of EdXposed for android 9+. Also I'm not sure how can I apply sepolicies from installer scripts, since they use Magisk's su_policy feature and I'm not sure how can I apply that without it. (by applying set_metadata?). So yes, I'm stuck at installer scripts on stage 2 and my poor knowledge of android does not let me even estimate is it possible to do all this staff at all? Maybe it uses some magisk features that cannot be performed without it |
Good idea, but two questions |
AFAIK zygote_restart is put into one of the *bin directories and/or symlinked. Search the repo for references. Simply running Riru without Magisk is trivial, put files, run modified scripts, done. As for the sepolicy stuff, the easiest way around, since the guy doesn't care about SN, you could just setenforce 0. |
Thanks for reply. That is exactly the trickiest part, I believe
Sounds like a good idea. I will try to do that. Btw is there a way to make a check to be sure that Riru Core works as intended? Can I check it somehow?
If I get that right there are no tricky se_contexts for Riru Core, just 0 0 0644 for everything. But when it comes to EdXposed there are a dedicated sepolicy.rule file that is applied by Magisk supolicy tool. sepolicy.rule contains this:
I'm not sure how can I apply it manually. Would be very grateful for some hints. Thank you! |
There is a Riru companion app that can verify if Riru is loaded.
If you don't want to disable SELinux, you can use the supolicy tool (shipped with Magisk) to apply the policies at runtime, for example using init.d mechanism or similar. Look at old post-fs-data.sh to see how to use it. |
Thank you. Found and ran that app. Now I have a litmus test for correct Riru Core installation. Going to try it and also try to figure out what to do with SE policies. Great thanks again for your advices and help guys, going to check all this at weekend |
Hey guys, I’ve got a certain advance in what I am trying to achieve, but I have got stuck and I'm looking for your advice again. === I use Riru Core v21.0 because in further versions the binary is renamed in order to hide from security checks and I just want the simpliest possible case for now. So I have made these steps to install Riru Core in /system:
It does basically the same thing as magisk’s post-fs-data.sh After that I run the Riru companion app and it seems to work well. The output is the same when I install RiruCore and EdXposed as magisk modules and everything truly looks fine with this step:
=== Now since EdXposed requires complicated se policies to be applied I have decided to turn SELinux off for the test. For that I have made a script in /system/etc/init.d/08setperm with following content:
It puts SELinux into permissive mode on system boot and I get a notification from LOS "Trust" that "SELinux is not enforcing, your security has been weakened" right after system has launched. getenforce also returns Permissive. So, everything looks fine with this step as well. === Now I take EdXposed-YAHFA-v0.4.6.2.4529.-release, and copy its jars into /system/framework and its libs into /system/lib and /system/lib64 respectively. I also manually added the following values to /system/build.props:
When I run EdXposed Manager it still gives me a yellow warning that tells "EdXposed is installed but not active" and tells me to check logs. I have checked in debugger, the XposedApp.getActiveXposedVersion() method is still not hooked by Xposed and returns default -1 value. === So the final result is still the same: EdXposed does not work (methods are not hooked), modules do not work as well (I tried to run XPrivacyLua), also no edxposed manager logs are saved into /data/user_de/0/org.meowcat.edxposed.manager/log (I think that I need to have magisk installed on the device to make them actually save) === Well. Here is where I have got stuck this time. So I wanted to ask you guys:
Thank you again for your great help! Without you I would stuck at the very beginning :) I will be very grateful for any useful information |
Seems like you didn't register the EdXposed module with Riru. One of the install scripts puts the module information to /data/misc/riru |
Thanks for reply, @XspeedPL ! That is true. For now I used to avoid to use /data/misc/riru directory at all. I’m afraid that problem could be deeper than that. /data/misc/riru contains nothing but small metadata, mostly magisk modules versions and definitions. The only important thing there is zygote_restart but I successfully managed to move it to /system/bin. Riru core itself seems to work fine without /data/mis/riru and I have found no mentions of this directory in EdXposed code. Looks like EdXposed does not care about this directory as well. It just utilises modified libmemtrack and Zygote hook methods. As far as I can get EdXposed does not rely on any files in /data/misc/riru. But what I truly could miss is the fact that Riru Core naturally searches for something in that directory. I haven’t looked carefully at Riru code yet but probably it can contain some mechanisms to restrict usage of modified libmemtrack only to whitelist modules and others get unmodified libmemtrack_real instead. I will check it out. Thank you |
Actually just took a brief look at Riru Core code, especially at redirect_memtrack.cpp and it seems that you are right. The problem is that Riru Core puts libmemtrack inside /data/misc/riru and expects to find it there in runtime. It uses this location when decides whether it should redirect calls to original libmemtrack to modified libmemtrack or not. So in my case there is nothing there and that's why all calls do not route to modified libmemtrack, so EdXposed manager is present in /system/framework but cannot access modified Riru's libmemtrack! I gonna test it out at weekend but it seems that all I need to do is to modify paths in cpp code of Riru core and build modified libmemtrack from source |
@LuigiVampa92 no you cannot avoid that, Riru read /data/misc/riru to load modules |
So I actually made it, guys. I have took Riru core v21.2 code and changed it a little to make it use no configs at all but instead to load required modules manually. Basically just removed anything related to reading configs, removed load_modules() function and added function load_module(const char* module_name, int module_api_level). Also removed the logic of renaming libmemtrack_real.so since I don't hide from SafetyNet. In the end I have built a modified libmemtrack.so that does not rely on configs and loads the only module - edxp. EdXposed now runs well on my device. I have tested a few modules and they all function correctly. There are also no troubles when I wipe data partition in recovery mode. The system recovers well and EdXposed works there again with no trouble. The only downside is that I have to set SELinux permissive on boot with init.d script, otherwise the system will not boot. I guess that if I want to run it with SELinux enforcing I will have to build the ROM myself, because I haven't managed to find tools that would allow to patch se policies without using magisk. Thank you again for your help guys! |
Hello been following this and there is likely many others also interested in this also, can you consider releasing your method as a fork? Thanks |
Hello, @msgpo . Thank you for the interest. I actually plan to publish everything required to build up a TWRP flashable zip that contains Riru Core and EdXposed but for now I haven't managed to find a way to patch se policies and make SELinux stay in enforcing mode. I plan to take a look at magisk's supolicy tool source code and the code that Piotr advised me to see in a message above. I will see if anything can be done with this. Making SELinux enforcing is an important thing and I wouldn't like to publish the final result without it. I will make Riru Core fork soon, but until that problem with se policies for EdXposed will be solved it will be pretty much useless. As it often happens I have unfortunately much less time to work with it than I would like to, but I'm trying to do my best and hope to reach a complete success as soon as I can |
@LuigiVampa92 Thanks for the reply. Also please keep in mind when you publish that not everyone use SELinux enforcing or even at all, using Tomoyo or other alternatives, so maybe you can point that out when released. Is there a way to try what you have succeeded with so far? I think that can be sufficient enough for me to work with, thanks |
Hey guys, I have made a repo that contains this flashable EdXposed build that we have been discussing in this thread. So if someone interested please take a look and try :) https://github.com/LuigiVampa92/System_EdXposed_install To my own surprise I actually managed to achieve enforcing SELinux mode. I have took the source code of Magisk's supolicy tool, made a binary that patches existing sepolicy with only those 6 rules that EdXposed requires for correct work and run this binary on boot. It injects necessary rules before any app process starts and everything works just fine. I also managed to lock the bootloader on my OnePlus 5T with LineageOS 16 and EdXposed installed. @msgpo I have made an option to build a zip with permissive SELinux mode if necessary. You can choose the required mode by setting param on build script. Check it out Unfortunately, I had to apply rules or set permissive mode by init.d script. I haven't managed to make a .rc script that would do the same, and I'm not sure that it is possible without making your own build with your own custom .te file that will contain the rules for SELinux. It means that if a ROM doesn't have init.d support then it's impossible to use this "system" EdXposed on it. It's not that good because I think that most stock ROMs do not have init.d support, but I'm not sure if there is another way. I have tested everything on LineageOS 16 that has init.d support |
So far so good, thanks! |
You may be able to try to permanently patch the precompiled_sepolicy file in your shell script, using the magiskinit binary to do that. Something like (but the rules ofc):
Edit. I forgot to mention, this works on an xperia firmware, I'm not sure on others. |
Same here thanks. |
@LuigiVampa92 Could you please share the modified Riru? I'm trying migrate EdXposed into my ROM directly. |
keep going,respect |
@google-mirror hello, thanks for the interest to this topic. In case of normally installing magisk, riru-core and riru-edxposed erasing data partition will erase magisk modules configs and riru modules configs that stored in /data and because of that system will bootloop (seems that magiskinit will not be able to handle the situation). In the approach I used I took riru-core code and deleted everything that is related to parsing configs and initialising modules, added manual initialisation of riru-edxposed straight from the code (I don't use other riru modules anyway). So the result is that after I installed system edxposed and relocked the bootloader, data partition is wiped but that's ok, because it doesn't affect neither system nor installed edxposed. You can also make "factory reset" (or wipe data partition because it is technically the same) as much as you like in future |
Once the bootloader is relocked, dm-verity is enforced. You have to sign boot image with device's oem keys or avb_custom_key, otherwise you will bootloop. Note that user-settable root of trust is not implemented for most of the devices. |
@google-mirror true, but OnePlus devices are (if I get that right) the only ones except Google Pixels that allow to use avb_custom_key embedded inside /boot partition. That is what I do in my case, I embed avb_custom_key, resign boot.img and it works. Not sure it is possible on other vendors. Actually the fact it was possible on OnePlus is the reason I started this thread :) In the end you get a "yellow state" at verified boot. It tells that "device has installed an unknown operating system" but the bootloader is locked |
Personally I really dislike breaking system-less stuffs so I will most probably not working on this, but fell free to open a PR. |
@kotori2 sorry, I'm afraid I misunderstood you. But just in case, the thing I have been discussing in this thread is not something I intended to get merged into EdXposed master, it was made just for myself and it can be useful only for people that would like to make their own system builds with EdXposed embedded. I agree that for general use it is much more simple and convenient to use it systemless-ly, as as a magisk module, just as it works right now |
Hello. I just got a new Android TV box (Minix Neo U22) that has Android 9 and is rooted (but without Magisk or superSu) - just comes with a switch to turn root on/off. I would love to be able to add EdXposed and wonder if the flashable zip mentioned in this thread will work. Thanks for any help/tips. |
@whitedavidp it's not like any of us can test this for you. |
I pretty much thought that. I just wanted to be sure I was understanding the purpose and intent of the reference project. Thanks |
@whitedavidp Hello, thanks for the interest to this. It could be possible in theory, yes, but in case with TV could be tricky. That zip we are talking about for now relies on sysvinit (init.d) scripts, which is its main restriction because not many devices and builds support it. I plan to release a new version of it in a about a week or so. This time it will rely on injection inside boot process and should work well on majority of smartphones (at least I hope so) but I'm not sure about TVs. It suggests that you have certain system libs and certain file system hierarchy, I guess that smartphones and TVs should have the similar FS, but I never worked with TVs, so I can't say for sure. Keep in mind that root is not enough to make edxposed work. You also should find a way patch SELinux policies - that is where init.d/boot patch/permissive policy needed, without it your edxposed could just not work or in worse case your device might just stuck in a bootloop. As @XspeedPL mentioned, the best way to try it - load some custom recovery, take a look at your device FS, check if there is a way to pwn sepolicies, if there is such a way, then carefully backup all important devices (at least /boot and /system), unzip the archive, and copy stuff in /system manually. Unfortunately, I'm not familiar with TVs at all, so I probably won't be able to help you, sorry |
@LuigiVampa92 Latest Riru and EdX don't rely on policy patching anymore, so if you're planning to update your project using latest components then it should become that much easier Also, Riru doesn't use lib memtrack for injection, it's also simplified in that aspect |
Thanks for your response and help. This box is thankfully NOT an Android TV OS box, just plain old Android 9 - at least as far as I can tell. I have had other boxes similar to this and been able to use Xposed there. But the latest Android I have done it is 5. So EdExposed and your methods are the only way I have found because it seems that adding Magisk to this box is a no-go. After TWRP backup, I tried to install the pre-built, ARM permissive (since my getenforce command shows permissive) zip from here. I didn't get very far running into the errors shown in the attached image. I tried both with and without checking the validation box. I am no expert, but I think that init is being used on this device. The other attached image shows the files contained in the systems / folder and I see some init-related stuff there. Thanks so much for the help and effort in putting this all together. I await any comments/tips. Cheers! |
@whitedavidp the zip is not signed. I think you can disable "zip signature checking" somewhere in TWRP settings and retry |
@XspeedPL oh, thanks for the info. I have to see this :) To be honest I returned to this project when I started to tinker with boot partition patching (that's what magisk do to achieve root actually). If EdXposed and Riru require no sepolicy patching then it should be very easy to make system EdXposed now. Actually, I think that Frida framework that also does runtime hooks does not require sepolicy patching and still works great |
Thanks again. I found a sig check setting in TWRP and turned it off (it was on) and tried again. In TWRP when performing an install there is an identical checkbox which I tried both on and off. I suppose that this latter one is for the current install ONLY while the former is the overall setting. I didn't get anywhere really new though. I did check the recovery log file and see the following (all of which is jibberish to me): Installing zip file '/external_sd/zip_system_edxposed_v0462_arm_permissive.zip' I know I saw something about this in above posts. But no idea what it all means. Thanks again. |
Just tried to install it on my device via TWRP/Install and everything worked good. I have searched about error 255 and people on XDA say that it could be a problem with partitions, or badly picked TWRP (wrong arch, I mean 32bit/64bit), outdated TWRP version. Sorry, I can't tell for sure what is the problem in your case |
Well thanks again and sorry for any bother. Thinking that my TWRP is 64 bit, I tried the ARM 64 bit zip with identical results. Must be the TWRP and I will try to see about it. Nothing is easy :-) |
…—mlgmxyysd(ElderDrivers/EdXposed/issues/837) ElderDrivers/EdXposed#1 ElderDrivers/EdXposed#2 ElderDrivers/EdXposed#3 ElderDrivers/EdXposed#4 ElderDrivers/EdXposed#5 ElderDrivers/EdXposed#6 ElderDrivers/EdXposed#7 ElderDrivers/EdXposed#8 ElderDrivers/EdXposed#9 ElderDrivers/EdXposed#10 ElderDrivers/EdXposed#11 ElderDrivers/EdXposed#12 ElderDrivers/EdXposed#13 ElderDrivers/EdXposed#14 ElderDrivers/EdXposed#15 ElderDrivers/EdXposed#16 ElderDrivers/EdXposed#17 ElderDrivers/EdXposed#18 ElderDrivers/EdXposed#19 ElderDrivers/EdXposed#20 ElderDrivers/EdXposed#21 ElderDrivers/EdXposed#22 ElderDrivers/EdXposed#23 ElderDrivers/EdXposed#24 ElderDrivers/EdXposed#25 ElderDrivers/EdXposed#26 ElderDrivers/EdXposed#27 ElderDrivers/EdXposed#28 ElderDrivers/EdXposed#29 ElderDrivers/EdXposed#30 ElderDrivers/EdXposed#31 ElderDrivers/EdXposed#32 ElderDrivers/EdXposed#33 ElderDrivers/EdXposed#34 ElderDrivers/EdXposed#35 ElderDrivers/EdXposed#36 ElderDrivers/EdXposed#37 ElderDrivers/EdXposed#38 ElderDrivers/EdXposed#39 ElderDrivers/EdXposed#40 ElderDrivers/EdXposed#41 ElderDrivers/EdXposed#42 ElderDrivers/EdXposed#43 ElderDrivers/EdXposed#44 ElderDrivers/EdXposed#45 ElderDrivers/EdXposed#46 ElderDrivers/EdXposed#47 ElderDrivers/EdXposed#48 ElderDrivers/EdXposed#49 ElderDrivers/EdXposed#50 ElderDrivers/EdXposed#51 ElderDrivers/EdXposed#52 ElderDrivers/EdXposed#53 ElderDrivers/EdXposed#54 ElderDrivers/EdXposed#55 ElderDrivers/EdXposed#56 ElderDrivers/EdXposed#57 ElderDrivers/EdXposed#58 ElderDrivers/EdXposed#59 ElderDrivers/EdXposed#60 ElderDrivers/EdXposed#61 ElderDrivers/EdXposed#62 ElderDrivers/EdXposed#63 ElderDrivers/EdXposed#64 ElderDrivers/EdXposed#65 ElderDrivers/EdXposed#66 ElderDrivers/EdXposed#67 ElderDrivers/EdXposed#68 ElderDrivers/EdXposed#69 ElderDrivers/EdXposed#70 ElderDrivers/EdXposed#71 ElderDrivers/EdXposed#72 ElderDrivers/EdXposed#73 ElderDrivers/EdXposed#74 ElderDrivers/EdXposed#75 ElderDrivers/EdXposed#76 ElderDrivers/EdXposed#77 ElderDrivers/EdXposed#78 ElderDrivers/EdXposed#79 ElderDrivers/EdXposed#80 ElderDrivers/EdXposed#81 ElderDrivers/EdXposed#82 ElderDrivers/EdXposed#83 ElderDrivers/EdXposed#84 ElderDrivers/EdXposed#85 ElderDrivers/EdXposed#86 ElderDrivers/EdXposed#87 ElderDrivers/EdXposed#88 ElderDrivers/EdXposed#89 ElderDrivers/EdXposed#90 ElderDrivers/EdXposed#91 ElderDrivers/EdXposed#92 ElderDrivers/EdXposed#93 ElderDrivers/EdXposed#94 ElderDrivers/EdXposed#95 ElderDrivers/EdXposed#96 ElderDrivers/EdXposed#97 ElderDrivers/EdXposed#98 ElderDrivers/EdXposed#99 ElderDrivers/EdXposed#100 ElderDrivers/EdXposed#101 ElderDrivers/EdXposed#102 ElderDrivers/EdXposed#103 ElderDrivers/EdXposed#104 ElderDrivers/EdXposed#105 ElderDrivers/EdXposed#106 ElderDrivers/EdXposed#107 ElderDrivers/EdXposed#108 ElderDrivers/EdXposed#109 ElderDrivers/EdXposed#110 ElderDrivers/EdXposed#111 ElderDrivers/EdXposed#112 ElderDrivers/EdXposed#113 ElderDrivers/EdXposed#114 ElderDrivers/EdXposed#115 ElderDrivers/EdXposed#116 ElderDrivers/EdXposed#117 ElderDrivers/EdXposed#118 ElderDrivers/EdXposed#119 ElderDrivers/EdXposed#120 ElderDrivers/EdXposed#121 ElderDrivers/EdXposed#122 ElderDrivers/EdXposed#123 ElderDrivers/EdXposed#124 ElderDrivers/EdXposed#125 ElderDrivers/EdXposed#126 ElderDrivers/EdXposed#127 ElderDrivers/EdXposed#128 ElderDrivers/EdXposed#129 ElderDrivers/EdXposed#130 ElderDrivers/EdXposed#131 ElderDrivers/EdXposed#132 ElderDrivers/EdXposed#133 ElderDrivers/EdXposed#134 ElderDrivers/EdXposed#135 ElderDrivers/EdXposed#136 ElderDrivers/EdXposed#137 ElderDrivers/EdXposed#138 ElderDrivers/EdXposed#139 ElderDrivers/EdXposed#140 ElderDrivers/EdXposed#141 ElderDrivers/EdXposed#142 ElderDrivers/EdXposed#143 ElderDrivers/EdXposed#144 ElderDrivers/EdXposed#145 ElderDrivers/EdXposed#146 ElderDrivers/EdXposed#147 ElderDrivers/EdXposed#148 ElderDrivers/EdXposed#149 ElderDrivers/EdXposed#150 ElderDrivers/EdXposed#151 ElderDrivers/EdXposed#152 ElderDrivers/EdXposed#153 ElderDrivers/EdXposed#154 ElderDrivers/EdXposed#155 ElderDrivers/EdXposed#156 ElderDrivers/EdXposed#157 ElderDrivers/EdXposed#158 ElderDrivers/EdXposed#159 ElderDrivers/EdXposed#160 ElderDrivers/EdXposed#161 ElderDrivers/EdXposed#162 ElderDrivers/EdXposed#163 https://github.com/ElderDrivers/EdXposed/issues/164 https://github.com/ElderDrivers/EdXposed/issues/165 ElderDrivers/EdXposed#166 ElderDrivers/EdXposed#167 ElderDrivers/EdXposed#168 https://github.com/ElderDrivers/EdXposed/issues/169 ElderDrivers/EdXposed#170 ElderDrivers/EdXposed#171 ElderDrivers/EdXposed#172 ElderDrivers/EdXposed#173 ElderDrivers/EdXposed#174 ElderDrivers/EdXposed#175 ElderDrivers/EdXposed#176 ElderDrivers/EdXposed#177 ElderDrivers/EdXposed#178 ElderDrivers/EdXposed#179 ElderDrivers/EdXposed#180 ElderDrivers/EdXposed#181 ElderDrivers/EdXposed#182 ElderDrivers/EdXposed#183 ElderDrivers/EdXposed#184 ElderDrivers/EdXposed#185 ElderDrivers/EdXposed#186 ElderDrivers/EdXposed#187 ElderDrivers/EdXposed#188 ElderDrivers/EdXposed#189 ElderDrivers/EdXposed#190 ElderDrivers/EdXposed#191 ElderDrivers/EdXposed#192 ElderDrivers/EdXposed#193 ElderDrivers/EdXposed#194 ElderDrivers/EdXposed#195 ElderDrivers/EdXposed#196 ElderDrivers/EdXposed#197 ElderDrivers/EdXposed#198 ElderDrivers/EdXposed#199 ElderDrivers/EdXposed#200 ElderDrivers/EdXposed#201 ElderDrivers/EdXposed#202 ElderDrivers/EdXposed#203 ElderDrivers/EdXposed#204 ElderDrivers/EdXposed#205 ElderDrivers/EdXposed#206 ElderDrivers/EdXposed#207 ElderDrivers/EdXposed#208 ElderDrivers/EdXposed#209 ElderDrivers/EdXposed#210 ElderDrivers/EdXposed#211 ElderDrivers/EdXposed#212 ElderDrivers/EdXposed#213 ElderDrivers/EdXposed#214 ElderDrivers/EdXposed#215 ElderDrivers/EdXposed#216 ElderDrivers/EdXposed#217 ElderDrivers/EdXposed#218 ElderDrivers/EdXposed#219 ElderDrivers/EdXposed#220 ElderDrivers/EdXposed#221 ElderDrivers/EdXposed#222 ElderDrivers/EdXposed#223 ElderDrivers/EdXposed#224 ElderDrivers/EdXposed#225 ElderDrivers/EdXposed#226 ElderDrivers/EdXposed#227 ElderDrivers/EdXposed#228 ElderDrivers/EdXposed#229 ElderDrivers/EdXposed#230 ElderDrivers/EdXposed#231 ElderDrivers/EdXposed#232 ElderDrivers/EdXposed#233 ElderDrivers/EdXposed#234 ElderDrivers/EdXposed#235 ElderDrivers/EdXposed#236 ElderDrivers/EdXposed#237 ElderDrivers/EdXposed#238 ElderDrivers/EdXposed#239 ElderDrivers/EdXposed#240 ElderDrivers/EdXposed#241 ElderDrivers/EdXposed#242 ElderDrivers/EdXposed#243 ElderDrivers/EdXposed#244 ElderDrivers/EdXposed#245 ElderDrivers/EdXposed#246 ElderDrivers/EdXposed#247 ElderDrivers/EdXposed#248 ElderDrivers/EdXposed#249 ElderDrivers/EdXposed#250 ElderDrivers/EdXposed#251 ElderDrivers/EdXposed#252 ElderDrivers/EdXposed#253 ElderDrivers/EdXposed#254 ElderDrivers/EdXposed#255 ElderDrivers/EdXposed#256 ElderDrivers/EdXposed#257 ElderDrivers/EdXposed#258 ElderDrivers/EdXposed#259 ElderDrivers/EdXposed#260 ElderDrivers/EdXposed#261 ElderDrivers/EdXposed#262 ElderDrivers/EdXposed#263 ElderDrivers/EdXposed#264 ElderDrivers/EdXposed#265 ElderDrivers/EdXposed#266 ElderDrivers/EdXposed#267 ElderDrivers/EdXposed#268 ElderDrivers/EdXposed#269 ElderDrivers/EdXposed#270 ElderDrivers/EdXposed#271 ElderDrivers/EdXposed#272 ElderDrivers/EdXposed#273 ElderDrivers/EdXposed#274 ElderDrivers/EdXposed#275 ElderDrivers/EdXposed#276 ElderDrivers/EdXposed#277 ElderDrivers/EdXposed#278 ElderDrivers/EdXposed#279 ElderDrivers/EdXposed#280 ElderDrivers/EdXposed#281 ElderDrivers/EdXposed#282 ElderDrivers/EdXposed#283 ElderDrivers/EdXposed#284 ElderDrivers/EdXposed#285 ElderDrivers/EdXposed#286 ElderDrivers/EdXposed#287 ElderDrivers/EdXposed#288 ElderDrivers/EdXposed#289 ElderDrivers/EdXposed#290 ElderDrivers/EdXposed#291 ElderDrivers/EdXposed#292 ElderDrivers/EdXposed#293 ElderDrivers/EdXposed#294 ElderDrivers/EdXposed#295 ElderDrivers/EdXposed#296 ElderDrivers/EdXposed#297 ElderDrivers/EdXposed#298 ElderDrivers/EdXposed#299 ElderDrivers/EdXposed#300 ElderDrivers/EdXposed#301 ElderDrivers/EdXposed#302 ElderDrivers/EdXposed#303 ElderDrivers/EdXposed#304 ElderDrivers/EdXposed#305 https://github.com/ElderDrivers/EdXposed/issues/306 ElderDrivers/EdXposed#307 ElderDrivers/EdXposed#308 ElderDrivers/EdXposed#309 ElderDrivers/EdXposed#310 ElderDrivers/EdXposed#311 ElderDrivers/EdXposed#312 ElderDrivers/EdXposed#313 ElderDrivers/EdXposed#314 ElderDrivers/EdXposed#315 ElderDrivers/EdXposed#316 ElderDrivers/EdXposed#317 ElderDrivers/EdXposed#318 ElderDrivers/EdXposed#319 ElderDrivers/EdXposed#320 ElderDrivers/EdXposed#321 ElderDrivers/EdXposed#322 ElderDrivers/EdXposed#323 ElderDrivers/EdXposed#324 ElderDrivers/EdXposed#325 ElderDrivers/EdXposed#326 ElderDrivers/EdXposed#327 ElderDrivers/EdXposed#328 ElderDrivers/EdXposed#329 ElderDrivers/EdXposed#330 ElderDrivers/EdXposed#331 ElderDrivers/EdXposed#332 ElderDrivers/EdXposed#333 ElderDrivers/EdXposed#334 ElderDrivers/EdXposed#335 ElderDrivers/EdXposed#336 ElderDrivers/EdXposed#337 ElderDrivers/EdXposed#338 ElderDrivers/EdXposed#339 ElderDrivers/EdXposed#340 ElderDrivers/EdXposed#341 ElderDrivers/EdXposed#342 ElderDrivers/EdXposed#343 ElderDrivers/EdXposed#344 ElderDrivers/EdXposed#345 ElderDrivers/EdXposed#346 ElderDrivers/EdXposed#347 ElderDrivers/EdXposed#348 ElderDrivers/EdXposed#349 ElderDrivers/EdXposed#350 ElderDrivers/EdXposed#351 ElderDrivers/EdXposed#352 ElderDrivers/EdXposed#353 ElderDrivers/EdXposed#354 ElderDrivers/EdXposed#355 ElderDrivers/EdXposed#356 ElderDrivers/EdXposed#357 ElderDrivers/EdXposed#358 ElderDrivers/EdXposed#359 ElderDrivers/EdXposed#360 ElderDrivers/EdXposed#361 ElderDrivers/EdXposed#362 ElderDrivers/EdXposed#363 ElderDrivers/EdXposed#364 ElderDrivers/EdXposed#365 ElderDrivers/EdXposed#366 ElderDrivers/EdXposed#367 ElderDrivers/EdXposed#368 ElderDrivers/EdXposed#369 ElderDrivers/EdXposed#370 ElderDrivers/EdXposed#371 ElderDrivers/EdXposed#372 ElderDrivers/EdXposed#373 ElderDrivers/EdXposed#374 ElderDrivers/EdXposed#375 ElderDrivers/EdXposed#376 ElderDrivers/EdXposed#377 ElderDrivers/EdXposed#378 ElderDrivers/EdXposed#379 ElderDrivers/EdXposed#380 ElderDrivers/EdXposed#381 ElderDrivers/EdXposed#382 ElderDrivers/EdXposed#383 ElderDrivers/EdXposed#384 ElderDrivers/EdXposed#385 ElderDrivers/EdXposed#386 ElderDrivers/EdXposed#387 ElderDrivers/EdXposed#388 ElderDrivers/EdXposed#389 ElderDrivers/EdXposed#390 ElderDrivers/EdXposed#391 ElderDrivers/EdXposed#392 ElderDrivers/EdXposed#393 ElderDrivers/EdXposed#394 ElderDrivers/EdXposed#395 ElderDrivers/EdXposed#396 ElderDrivers/EdXposed#397 ElderDrivers/EdXposed#398 ElderDrivers/EdXposed#399 ElderDrivers/EdXposed#400 ElderDrivers/EdXposed#401 ElderDrivers/EdXposed#402 ElderDrivers/EdXposed#403 ElderDrivers/EdXposed#404 ElderDrivers/EdXposed#405 ElderDrivers/EdXposed#406 ElderDrivers/EdXposed#407 ElderDrivers/EdXposed#408 ElderDrivers/EdXposed#409 ElderDrivers/EdXposed#410 ElderDrivers/EdXposed#411 ElderDrivers/EdXposed#412 ElderDrivers/EdXposed#413 ElderDrivers/EdXposed#414 ElderDrivers/EdXposed#415 ElderDrivers/EdXposed#416 ElderDrivers/EdXposed#417 ElderDrivers/EdXposed#418 ElderDrivers/EdXposed#419 ElderDrivers/EdXposed#420 ElderDrivers/EdXposed#421 ElderDrivers/EdXposed#422 ElderDrivers/EdXposed#423 ElderDrivers/EdXposed#424 ElderDrivers/EdXposed#425 ElderDrivers/EdXposed#426 ElderDrivers/EdXposed#427 ElderDrivers/EdXposed#428 ElderDrivers/EdXposed#429 ElderDrivers/EdXposed#430 ElderDrivers/EdXposed#431 ElderDrivers/EdXposed#432 ElderDrivers/EdXposed#433 ElderDrivers/EdXposed#434 ElderDrivers/EdXposed#435 ElderDrivers/EdXposed#436 ElderDrivers/EdXposed#437 ElderDrivers/EdXposed#438 ElderDrivers/EdXposed#439 ElderDrivers/EdXposed#440 ElderDrivers/EdXposed#441 ElderDrivers/EdXposed#442 ElderDrivers/EdXposed#443 ElderDrivers/EdXposed#444 ElderDrivers/EdXposed#445 ElderDrivers/EdXposed#446 ElderDrivers/EdXposed#447 ElderDrivers/EdXposed#448 ElderDrivers/EdXposed#449 ElderDrivers/EdXposed#450 ElderDrivers/EdXposed#451 ElderDrivers/EdXposed#452 ElderDrivers/EdXposed#453 ElderDrivers/EdXposed#454 ElderDrivers/EdXposed#455 ElderDrivers/EdXposed#456 ElderDrivers/EdXposed#457 ElderDrivers/EdXposed#458 ElderDrivers/EdXposed#459 ElderDrivers/EdXposed#460 ElderDrivers/EdXposed#461 ElderDrivers/EdXposed#462 ElderDrivers/EdXposed#463 ElderDrivers/EdXposed#464 ElderDrivers/EdXposed#465 ElderDrivers/EdXposed#466 ElderDrivers/EdXposed#467 ElderDrivers/EdXposed#468 ElderDrivers/EdXposed#469 ElderDrivers/EdXposed#470 ElderDrivers/EdXposed#471 ElderDrivers/EdXposed#472 ElderDrivers/EdXposed#473 ElderDrivers/EdXposed#474 ElderDrivers/EdXposed#475 ElderDrivers/EdXposed#476 ElderDrivers/EdXposed#477 ElderDrivers/EdXposed#478 ElderDrivers/EdXposed#479 ElderDrivers/EdXposed#480 ElderDrivers/EdXposed#481 ElderDrivers/EdXposed#482 ElderDrivers/EdXposed#483 ElderDrivers/EdXposed#484 ElderDrivers/EdXposed#485 ElderDrivers/EdXposed#486 ElderDrivers/EdXposed#487 ElderDrivers/EdXposed#488 ElderDrivers/EdXposed#489 ElderDrivers/EdXposed#490 ElderDrivers/EdXposed#491 ElderDrivers/EdXposed#492 ElderDrivers/EdXposed#493 ElderDrivers/EdXposed#494 ElderDrivers/EdXposed#495 ElderDrivers/EdXposed#496 ElderDrivers/EdXposed#497 ElderDrivers/EdXposed#498 ElderDrivers/EdXposed#499 ElderDrivers/EdXposed#500 ElderDrivers/EdXposed#501 ElderDrivers/EdXposed#502 ElderDrivers/EdXposed#503 ElderDrivers/EdXposed#504 ElderDrivers/EdXposed#505 ElderDrivers/EdXposed#506 ElderDrivers/EdXposed#507 ElderDrivers/EdXposed#508 ElderDrivers/EdXposed#509 ElderDrivers/EdXposed#510 ElderDrivers/EdXposed#511 ElderDrivers/EdXposed#512 ElderDrivers/EdXposed#513 ElderDrivers/EdXposed#514 ElderDrivers/EdXposed#515 ElderDrivers/EdXposed#516 ElderDrivers/EdXposed#517 ElderDrivers/EdXposed#518 ElderDrivers/EdXposed#519 ElderDrivers/EdXposed#520 ElderDrivers/EdXposed#521 ElderDrivers/EdXposed#522 ElderDrivers/EdXposed#523 ElderDrivers/EdXposed#524 ElderDrivers/EdXposed#525 ElderDrivers/EdXposed#526 ElderDrivers/EdXposed#527 ElderDrivers/EdXposed#528 ElderDrivers/EdXposed#529 ElderDrivers/EdXposed#530 ElderDrivers/EdXposed#531 ElderDrivers/EdXposed#532 ElderDrivers/EdXposed#533 ElderDrivers/EdXposed#534 ElderDrivers/EdXposed#535 ElderDrivers/EdXposed#536 ElderDrivers/EdXposed#537 ElderDrivers/EdXposed#538 ElderDrivers/EdXposed#539 ElderDrivers/EdXposed#540 ElderDrivers/EdXposed#541 ElderDrivers/EdXposed#542 ElderDrivers/EdXposed#543 ElderDrivers/EdXposed#544 ElderDrivers/EdXposed#545 ElderDrivers/EdXposed#546 ElderDrivers/EdXposed#547 ElderDrivers/EdXposed#548 ElderDrivers/EdXposed#549 ElderDrivers/EdXposed#550 ElderDrivers/EdXposed#551 ElderDrivers/EdXposed#552 ElderDrivers/EdXposed#553 ElderDrivers/EdXposed#554 ElderDrivers/EdXposed#555 ElderDrivers/EdXposed#556 ElderDrivers/EdXposed#557 ElderDrivers/EdXposed#558 ElderDrivers/EdXposed#559 ElderDrivers/EdXposed#560 ElderDrivers/EdXposed#561 ElderDrivers/EdXposed#562 ElderDrivers/EdXposed#563 ElderDrivers/EdXposed#564 ElderDrivers/EdXposed#565 ElderDrivers/EdXposed#566 ElderDrivers/EdXposed#567 ElderDrivers/EdXposed#568 ElderDrivers/EdXposed#569 ElderDrivers/EdXposed#570 ElderDrivers/EdXposed#571 ElderDrivers/EdXposed#572 ElderDrivers/EdXposed#573 ElderDrivers/EdXposed#574 ElderDrivers/EdXposed#575 ElderDrivers/EdXposed#576 ElderDrivers/EdXposed#577 ElderDrivers/EdXposed#578 ElderDrivers/EdXposed#579 ElderDrivers/EdXposed#580 ElderDrivers/EdXposed#581 ElderDrivers/EdXposed#582 ElderDrivers/EdXposed#583 ElderDrivers/EdXposed#584 ElderDrivers/EdXposed#585 ElderDrivers/EdXposed#586 ElderDrivers/EdXposed#587 ElderDrivers/EdXposed#588 ElderDrivers/EdXposed#589 ElderDrivers/EdXposed#590 ElderDrivers/EdXposed#591 ElderDrivers/EdXposed#592 ElderDrivers/EdXposed#593 ElderDrivers/EdXposed#594 ElderDrivers/EdXposed#595 ElderDrivers/EdXposed#596 ElderDrivers/EdXposed#597 ElderDrivers/EdXposed#598 ElderDrivers/EdXposed#599 ElderDrivers/EdXposed#600 ElderDrivers/EdXposed#601 ElderDrivers/EdXposed#602 ElderDrivers/EdXposed#603 ElderDrivers/EdXposed#604 ElderDrivers/EdXposed#605 ElderDrivers/EdXposed#606 ElderDrivers/EdXposed#607 ElderDrivers/EdXposed#608 ElderDrivers/EdXposed#609 ElderDrivers/EdXposed#610 ElderDrivers/EdXposed#611 ElderDrivers/EdXposed#612 ElderDrivers/EdXposed#613 ElderDrivers/EdXposed#614 ElderDrivers/EdXposed#615 ElderDrivers/EdXposed#616 ElderDrivers/EdXposed#617 ElderDrivers/EdXposed#618 ElderDrivers/EdXposed#619 ElderDrivers/EdXposed#620 ElderDrivers/EdXposed#621 ElderDrivers/EdXposed#622 ElderDrivers/EdXposed#623 ElderDrivers/EdXposed#624 ElderDrivers/EdXposed#625 ElderDrivers/EdXposed#626 ElderDrivers/EdXposed#627 ElderDrivers/EdXposed#628 ElderDrivers/EdXposed#629 ElderDrivers/EdXposed#630 ElderDrivers/EdXposed#631 ElderDrivers/EdXposed#632 ElderDrivers/EdXposed#633 ElderDrivers/EdXposed#634 ElderDrivers/EdXposed#635 ElderDrivers/EdXposed#636 ElderDrivers/EdXposed#637 ElderDrivers/EdXposed#638 ElderDrivers/EdXposed#639 ElderDrivers/EdXposed#640 ElderDrivers/EdXposed#641 ElderDrivers/EdXposed#642 ElderDrivers/EdXposed#643 ElderDrivers/EdXposed#644 ElderDrivers/EdXposed#645 ElderDrivers/EdXposed#646 ElderDrivers/EdXposed#647 ElderDrivers/EdXposed#648 ElderDrivers/EdXposed#649 ElderDrivers/EdXposed#650 ElderDrivers/EdXposed#651 ElderDrivers/EdXposed#652 ElderDrivers/EdXposed#653 ElderDrivers/EdXposed#654 ElderDrivers/EdXposed#655 ElderDrivers/EdXposed#656 ElderDrivers/EdXposed#657 ElderDrivers/EdXposed#658 ElderDrivers/EdXposed#659 ElderDrivers/EdXposed#660 ElderDrivers/EdXposed#661 ElderDrivers/EdXposed#662 ElderDrivers/EdXposed#663 ElderDrivers/EdXposed#664 ElderDrivers/EdXposed#665 ElderDrivers/EdXposed#666 ElderDrivers/EdXposed#667 ElderDrivers/EdXposed#668 ElderDrivers/EdXposed#669 ElderDrivers/EdXposed#670 ElderDrivers/EdXposed#671 ElderDrivers/EdXposed#672 ElderDrivers/EdXposed#673 ElderDrivers/EdXposed#674 ElderDrivers/EdXposed#675 ElderDrivers/EdXposed#676 ElderDrivers/EdXposed#677 ElderDrivers/EdXposed#678 ElderDrivers/EdXposed#679 ElderDrivers/EdXposed#680 ElderDrivers/EdXposed#681 ElderDrivers/EdXposed#682 ElderDrivers/EdXposed#683 ElderDrivers/EdXposed#684 ElderDrivers/EdXposed#685 ElderDrivers/EdXposed#686 ElderDrivers/EdXposed#687 ElderDrivers/EdXposed#688 ElderDrivers/EdXposed#689 ElderDrivers/EdXposed#690 ElderDrivers/EdXposed#691 ElderDrivers/EdXposed#692 ElderDrivers/EdXposed#693 ElderDrivers/EdXposed#694 ElderDrivers/EdXposed#695 ElderDrivers/EdXposed#696 ElderDrivers/EdXposed#697 ElderDrivers/EdXposed#698 ElderDrivers/EdXposed#699 ElderDrivers/EdXposed#700 ElderDrivers/EdXposed#701 ElderDrivers/EdXposed#702 ElderDrivers/EdXposed#703 ElderDrivers/EdXposed#704 ElderDrivers/EdXposed#705 ElderDrivers/EdXposed#706 ElderDrivers/EdXposed#707 ElderDrivers/EdXposed#708 ElderDrivers/EdXposed#709 ElderDrivers/EdXposed#710 ElderDrivers/EdXposed#711 ElderDrivers/EdXposed#712 ElderDrivers/EdXposed#713 ElderDrivers/EdXposed#714 ElderDrivers/EdXposed#715 ElderDrivers/EdXposed#716 ElderDrivers/EdXposed#717 ElderDrivers/EdXposed#718 ElderDrivers/EdXposed#719 ElderDrivers/EdXposed#720 ElderDrivers/EdXposed#721 ElderDrivers/EdXposed#722 ElderDrivers/EdXposed#723 ElderDrivers/EdXposed#724 ElderDrivers/EdXposed#725 ElderDrivers/EdXposed#726 ElderDrivers/EdXposed#727 ElderDrivers/EdXposed#728 ElderDrivers/EdXposed#729 ElderDrivers/EdXposed#730 ElderDrivers/EdXposed#731 ElderDrivers/EdXposed#732 ElderDrivers/EdXposed#733 ElderDrivers/EdXposed#734 ElderDrivers/EdXposed#735 ElderDrivers/EdXposed#736 ElderDrivers/EdXposed#737 ElderDrivers/EdXposed#738 ElderDrivers/EdXposed#739 ElderDrivers/EdXposed#740 ElderDrivers/EdXposed#741 ElderDrivers/EdXposed#742 ElderDrivers/EdXposed#743 ElderDrivers/EdXposed#744 ElderDrivers/EdXposed#745 ElderDrivers/EdXposed#746 ElderDrivers/EdXposed#747 ElderDrivers/EdXposed#748 ElderDrivers/EdXposed#749 ElderDrivers/EdXposed#750 ElderDrivers/EdXposed#751 ElderDrivers/EdXposed#752 ElderDrivers/EdXposed#753 ElderDrivers/EdXposed#754 ElderDrivers/EdXposed#755 ElderDrivers/EdXposed#756 ElderDrivers/EdXposed#757 ElderDrivers/EdXposed#758 ElderDrivers/EdXposed#759 ElderDrivers/EdXposed#760 ElderDrivers/EdXposed#761 ElderDrivers/EdXposed#762 ElderDrivers/EdXposed#763 ElderDrivers/EdXposed#764 ElderDrivers/EdXposed#765 ElderDrivers/EdXposed#766 ElderDrivers/EdXposed#767 ElderDrivers/EdXposed#768 ElderDrivers/EdXposed#769 ElderDrivers/EdXposed#770 ElderDrivers/EdXposed#771 ElderDrivers/EdXposed#772 ElderDrivers/EdXposed#773 ElderDrivers/EdXposed#774 ElderDrivers/EdXposed#775 ElderDrivers/EdXposed#776 ElderDrivers/EdXposed#777 https://github.com/ElderDrivers/EdXposed/issues/778 ElderDrivers/EdXposed#779 ElderDrivers/EdXposed#780 ElderDrivers/EdXposed#781 ElderDrivers/EdXposed#782 ElderDrivers/EdXposed#783 ElderDrivers/EdXposed#784 ElderDrivers/EdXposed#785 ElderDrivers/EdXposed#786 ElderDrivers/EdXposed#787 ElderDrivers/EdXposed#788 ElderDrivers/EdXposed#789 ElderDrivers/EdXposed#790 ElderDrivers/EdXposed#791 ElderDrivers/EdXposed#792 ElderDrivers/EdXposed#793 ElderDrivers/EdXposed#794 ElderDrivers/EdXposed#795 ElderDrivers/EdXposed#796 ElderDrivers/EdXposed#797 ElderDrivers/EdXposed#798 ElderDrivers/EdXposed#799 ElderDrivers/EdXposed#800 ElderDrivers/EdXposed#801 ElderDrivers/EdXposed#802 ElderDrivers/EdXposed#803 ElderDrivers/EdXposed#804 ElderDrivers/EdXposed#805 ElderDrivers/EdXposed#806 ElderDrivers/EdXposed#807 ElderDrivers/EdXposed#808 ElderDrivers/EdXposed#809 ElderDrivers/EdXposed#810 ElderDrivers/EdXposed#811 ElderDrivers/EdXposed#812 ElderDrivers/EdXposed#813 ElderDrivers/EdXposed#814 ElderDrivers/EdXposed#815 ElderDrivers/EdXposed#816 ElderDrivers/EdXposed#817 ElderDrivers/EdXposed#818 ElderDrivers/EdXposed#819 ElderDrivers/EdXposed#820 ElderDrivers/EdXposed#821 https://github.com/ElderDrivers/EdXposed/issues/822 ElderDrivers/EdXposed#823 ElderDrivers/EdXposed#824 ElderDrivers/EdXposed#825 ElderDrivers/EdXposed#826 ElderDrivers/EdXposed#827 ElderDrivers/EdXposed#828 ElderDrivers/EdXposed#829 ElderDrivers/EdXposed#830 ElderDrivers/EdXposed#831 ElderDrivers/EdXposed#832 ElderDrivers/EdXposed#833 ElderDrivers/EdXposed#834 ElderDrivers/EdXposed#835 ElderDrivers/EdXposed#836 ElderDrivers/EdXposed#837 ElderDrivers/EdXposed#838 ElderDrivers/EdXposed#839 ElderDrivers/EdXposed#840 ElderDrivers/EdXposed#841 ElderDrivers/EdXposed#842 ElderDrivers/EdXposed#843 ElderDrivers/EdXposed#844 ElderDrivers/EdXposed#845 ElderDrivers/EdXposed#846 ElderDrivers/EdXposed#847 ElderDrivers/EdXposed#848 ElderDrivers/EdXposed#849 ElderDrivers/EdXposed#850 ElderDrivers/EdXposed#851 ElderDrivers/EdXposed#852 ElderDrivers/EdXposed#853 ElderDrivers/EdXposed#854
Any updates on this ? really interesting... should get rid of riru module anyway |
@whitedavidp Almost a year later but got this working on a Minix U22XJ. Issue is the script mount is incorrect /system_root/system vs /system/system, init.d is not available (but not needed since selinux is already permissive), hence the errors while installing with twrp. @LuigiVampa92 Thank you ...... |
Thanks for the kind words. I'm glad this thing was still useful to you. Sorry I've got all this kinda forsaken tbh |
What about switching from riru to the new Zygisk ? |
Hey guys, great thanks for your amazing work. I’m pretty new to EdXposed and I'm sorry to make an issue here but I could not find the answer anywhere else. I am interested - is it possible to make EdXposed work without Magisk?
I know that previous versions of Xposed up to android 8 were flashable and I could just sideload them on device as any other zip file in TWRP. What is the problem to do the same thing with new EdXposed for android 9 and 10?
What I am trying to achieve is to take my OnePlus 5T, flash it with LOS16 and then flash it with EdXposed zip. Currently I can flash the LOS16, flash magisk, and then in Magisk Manager install Riru Core and Riru EdXposed modules (I use RiruCore v21.0 and EdXposed v0.4.6.2 YAHFA). It works perfect. But I would like to try to replace magisk modules with flashable zip files.
I’m not trying to hide the fact of installed EdXposed on device. It’s complitley ok if its files will be persisted and visible in /system. I’m also not worried that I will not be able to pass SafetyNet as well.
I have taken a brief look at the structure of magisk modules. RiruCore module contains modified versions of libmemtrack.so for /system/lib and /system/lib64 and zygote_restart binary. EdXposed module contains a few jars for /system/framework and a few more libs for /system/lib and /system/lib64. I have made a TWRP-flashable zip that replaces libmemtrack.so and puts the necessary files of EdXposed in lib, lib64 and framework. When I load into the system EdXposed Manager shows me a yellow warning saying that "EdXposed is installed but not activated". I have checked the EdXposed Manager app under debugger and XposedApp.getActiveXposedVersion() return -1 (which means that the method call is not hooked by Xposed framework). I have suspicions that it happens because EdXposed tries to locate RIRU_PATH which is /data/misc/riru and because of that it doesn’t work. That RIRU_PATH folder contains only a small pieces of metadata. Nothing seems to be important there except for "zygote_restart" binary. I have tried to create those directories and copy files in /data/misc/riru manually but for some reason my device falls into a bootloop. It happened when I created and copied the files by flashable zip in TWRP and also when I did so by adb shell in normally loaded system.
So, maybe some of you have tried to make the same stuff and succeeded? Or perhaps you know why modifying /data/misc causes the system to bootloop? My final goal is to install EdXposed straight into /system. I will be very grateful for any useful information. Thanks!
The text was updated successfully, but these errors were encountered: