How to get through otg_whitelist check without kernel rebuilding?
Hi!
I have a Linux device (an Android MID, specifically) which seems have USB otg_whitelist enabled. As the title said I want to disable/pass by it without kernel re-building, since it's impossible for me to get a copy of the kernel source from the manufacturer. Any idea? |
I got an idea but don't known whether it will work. I noticed that the otg_whitelist.c from a standard kernel source code tree defined a test device with hard-coded vender id & product id which is allowed to pass the white list check. So in case that my device maker keeps it, it could be hopefull to substitute the testing vid & pid with those of my USB device, say, with a hex editor. I can pull down and push back the kernel binary I think.
|
All times are GMT -5. The time now is 01:56 PM. |