Last active
March 27, 2020 13:16
-
-
Save t3mp-0xCC/5f2d97bbb5e9d4822ee49bb0dd6af572 to your computer and use it in GitHub Desktop.
android_run_root_shell_no_futex patch (https://github.com/android-rooting-tools/android_run_root_shell)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
diff -urN android_run_root_shell/libexploit/exploit.c android_run_root_shell_no_futex/libexploit/exploit.c | |
--- android_run_root_shell/libexploit/exploit.c 2020-03-27 21:55:43.796553728 +0900 | |
+++ android_run_root_shell_no_futex/libexploit/exploit.c 2020-03-27 21:54:32.695169224 +0900 | |
@@ -239,7 +239,7 @@ | |
return false; | |
} | |
-static bool | |
+/*static bool | |
attempt_futex_exploit(unsigned long int address, | |
unsigned long int write_value, | |
unsigned long int restore_value, | |
@@ -252,7 +252,7 @@ | |
} | |
return false; | |
-} | |
+}*/ | |
static bool | |
attempt_fb_mem_exploit(unsigned long int address, | |
@@ -322,13 +322,13 @@ | |
return info.result; | |
} | |
printf("\n"); | |
- | |
+/* | |
printf("Attempt futex exploit...\n"); | |
if (attempt_futex_exploit(address, write_value, restore_value, &info)) { | |
return info.result; | |
} | |
printf("\n"); | |
- | |
+*/ | |
if (fb_mem_exploit_enable) { | |
printf("Attempt fb_mem exploit...\n"); | |
if (attempt_fb_mem_exploit(address, write_value, restore_value, &info)) { | |
@@ -446,7 +446,7 @@ | |
break; | |
} | |
} | |
- | |
+/* | |
if (!result) { | |
result = true; | |
@@ -458,7 +458,7 @@ | |
} | |
} | |
} | |
- | |
+*/ | |
if (!result) { | |
result = true; |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment