Does not work when trying to access via Xposed on an app targeting Android 11
See original GitHub issueAs title, the library doesn’t work when the app Xposed is injecting into targets Android 11, due to App Visibility changes.
Logcat shows this error:
E ActivityThread: Failed to find provider info for com.kieronquinn.app.darq.provider.remoteprefs
It works perfectly fine with apps not targeting 11. Examples I can reproduce on are LinkedIn (targets 11) and Snapchat (targets 10)
From research, this can be resolved by adding a <provider>
to the <queries>
tag in the target app’s manifest, but obviously we don’t have access to that so it can’t be done. Might have to be done on boot by injecting into the server.
Issue Analytics
- State:
- Created 2 years ago
- Comments:16 (3 by maintainers)
Top Results From Across the Web
Compatibility framework changes (Android 11)
For admin apps targeting Android 11, throw an error whenever an app sets a password requirement that is not relevant to the currently...
Read more >[APP][Xposed] MinMinGuard v2.2.0 for Android 11+ (Zygisk X ...
Android 11 introduced a new privacy feature preventing apps from seeing each other, which is the main reason you no longer saw the...
Read more >Bypass Android's hidden API restrictions - Stack Overflow
Android's hidden API restrictions only apply to third party apps that aren't signed by the platform signature and aren't manually whitelisted in ...
Read more >Android 11 - Its Impact on Zebra Developers
It does not attempt to cover new device features introduced by Zebra unless there is overlap. ... For apps targeting Android 11 (API...
Read more >Android 11 Changelog — Full List of All 50+ New Features
In Android 11, you can enable a toggle in Developer Options that will allow apps using screen overlays to work even on system...
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
LSposed and EdXposed both implement a self-hook for module apps that redirects the shared prefs to /data/misc/<xposed dir>/<pname>/ which is then set as global readable. It’s working for what I need thankfully, but is I think the only remaining hack that will work on Android 11. Shame this method won’t work any more, but I fully understand your reasoning and support not wanting to mess with system permissions to get around it.
There’s also a proposal of a new “Xposed Service” that might resolve this, where modules could bind to a service.
I don’t understand this issue carefully. Doesn’t this library work on android 11 phones?