platform
Android 7.1 + RK3288 + XPOSE
achieve
Method 1: Use XposedInstaller.apk + ROOT
This method is relatively simple, only needs:
- Open ROOT
- Download the APK and install
- Go online and open
- Click Install, the corresponding version will be automatically downloaded and installed, and it will restart after installation (the installation process was interrupted several times due to network reasons)
- carry out
Method 2: Directly implant XPOSED files
- Download xposed*.zip from the official website and unzip it locally. The file list is as follows:
-rw-rw-rw- 1 61 2月 29 2008 xposed/xposed.prop
xposed/bin:
-rwxrwxr-x 1 100092 2月 29 2008 app_process32_xposed*
-rwxrwxr-x 1 140880 2月 29 2008 dex2oat*
-rwxrwxr-x 1 157344 2月 29 2008 oatdump*
-rwxrwxr-x 1 71252 2月 29 2008 patchoat*
xposed/framework:
-rw-rw-rw- 1 106301 2月 29 2008 XposedBridge.jar
xposed/lib:
-rwxrwxr-x 1 2778892 2月 29 2008 libart-compiler.so*
-rwxrwxr-x 1 108128 2月 29 2008 libart-disassembler.so*
-rwxrwxr-x 1 5904828 2月 29 2008 libart.so*
-rwxrwxr-x 1 13912 2月 29 2008 libsigchain.so*
-rwxrwxr-x 1 62464 2月 29 2008 libxposed_art.so*
- Execute the script (the content of the script is organized from: META-INF/com/google/android/flash-script.sh ):
#install xposed
adb root
sleep 3
adb remount
adb push xposed /system/
adb install XposedInstaller_3.1.5.apk
adb shell chcon 'u:object_r:zygote_exec:s0' /system/bin/app_process32_xposed
adb shell mv /system/bin/app_process32 /system/bin/app_process32_ori
adb shell ln -sf /system/bin/app_process32_xposed /system/bin/app_process32
adb shell chcon -h 'u:object_r:zygote_exec:s0' /system/bin/app_process32
- Reboot.
At the beginning of the episode , directly PUSH the file to the motherboard, change app_process32_xposed directly to app_process32 , and replace the original file.
After restarting, it is stuck in the startup animation because of incorrect permissions. The reason is found in the downloaded xposed*.zip , and the
change is missing. SELINUX Permission: chcon -h'u:object_r:zygote_exec:s0' /system/bin/app_process32
The specific replacement process can refer to the decompressed file META-INF/com/google/android/flash-script.sh
Not completed/verified
- How to use XPOSED in a ROOT-free environment.
- After the built-in is successful, module functions like WeChat red envelopes have not been tested yet
- Unable to determine the source of libart.so after installation.