Open NimdaKey opened 8 years ago
I use device SM-G9200 (LRX22G.G9200ZCU1AOD9) execute run_root_shell . device auto reboot when pingpone exploit . fail root, the log as follows:
Device detected: SM-G9200 (LRX22G.G9200ZCU1AOD9)
Try to find address in memory... Attempt msm_cameraconfig exploit... Detected kernel physical address at 0x40008000 from iomem
Attempt fb_mem exploit... Detected kernel physical address at 0x40008000 from iomem You need to manage to get remap_pfn_range address.
Try copying kernel memory... It will take a long time. Attempt pingpong exploit...
then it's reboot. failed root
I use device SM-G9200 (LRX22G.G9200ZCU1AOD9) execute run_root_shell . device auto reboot when pingpone exploit . fail root, the log as follows:
Device detected: SM-G9200 (LRX22G.G9200ZCU1AOD9)
Try to find address in memory... Attempt msm_cameraconfig exploit... Detected kernel physical address at 0x40008000 from iomem
Attempt fb_mem exploit... Detected kernel physical address at 0x40008000 from iomem You need to manage to get remap_pfn_range address.
Try copying kernel memory... It will take a long time. Attempt pingpong exploit...
then it's reboot. failed root