Open zoobab opened 7 years ago
When I am patching stuff if I use the incorrect file size I know it's time to reboot. First things always get to the correct file size exactly. If all else fails add headers, add some code that is only called when a variable is 987 but it never gets set.. whatever it takes, make it match the size of your run-as Get your run-as size through adb shell: adb shell ls -la /system/bin/run-as
Ideas and maybe good tips You should be looking at your logcat, specifically: adb logcat | grep -a exploit In addition to that you can also open another adb shell while the root shell is hung and try issuing ps to list the processes. or ps | grep 'whatever_to_filter' Next start adding extra LOGV("TOP of run-as"); You can add variables in your LOGV("values %c",charVal); and just keep poking to see what's not what.
Take notes, be organized and build a process Because you are a lot closer than I am I can't issue run-as in this example my phone is locked down too much. Have you patched sepolicy using a method such as those findable on xda-developers? I have models like my phone with custom roms, I have AT&T, I could use those init and base files. Maybe you can too? Check rooting methods for other devices using dirtycow on github also
good luck
Hi,
I am obtaining a root shell on my Meizu M2, but any command I input is giving nothing back in return:
Any idea why?