Bypass tethering throttle from carriers.
yes.Didn't work for me on Tmobile REVVL 6 Pro.
I was not able to install/run with Magisk, but I was able to run the commands from your script with magiskboot.
I suspect my kernel is different from yours and not taking the patches.
Would you be able to patch my boot.img file if I upload it to you?
Or could you tell me in noob terms how to find the hex values to change and patch it myself?
did you test pinging the same ip from the phone (via adb) and from an attached pc?
I tried pinging Google from material terminal but it stays stuck after first ping. I'm at work right now I'll try when I get home from pc.did you test pinging the same ip from the phone (via adb) and from an attached pc?
try this for example: 108.177.15.127
the TTL should be the same if it worked.
I'm trying to end the ping command cause maybe I'll see results.ping by IP and not by name... otherwise it may ping two different addresses...
Ok I tried it it says 64 ttl I think it works.ping by IP and not by name... otherwise it may ping two different addresses...
What you call "hash pattern" is machine language code.@Zibri How did you get the hashpattern for the kernel file? I'm trying to patch ttl myself for Pixel 6a's boot img, but I don't know how to get the file's hash pattern
Thanks!! I sent the boot.img to you via message!!What you call "hash pattern" is machine language code.
I search for the instruction preceding or around the ones I need to patch to disable the TTL decrease.
To do so, you have to reverse engineer (decompile) the whole kernel, find the function and nullify the decrementation.
Send me the boot.img and I can give it a try.
I got unzip error when trying to install. I tried unpack and repack the zip file, no luck on thatAdded support for pixel6a:
![]()
const int sz2 = sizeof(__be16);
const __be16 old_ttl_proto = *(__be16 *)&ip->ttl;
const __be16 new_ttl_proto = old_ttl_proto - htons(0x0100);
bpf_l3_csum_replace(skb, ETH_IP4_OFFSET(check), old_ttl_proto, new_ttl_proto, sz2);
bpf_skb_store_bytes(skb, ETH_IP4_OFFSET(ttl), &new_ttl_proto, sz2, 0);
const __be16 new_ttl_proto = htons(0x4000) + (old_ttl_proto & 0xff)
const int sz2 = sizeof(__u8);
const __u8 new_ttl_proto = 0x40
bpf_skb_store_bytes(skb, ETH_IP4_OFFSET(ttl), &new_ttl_proto, sz2, BPF_F_RECOMPUTE_CSUM);
static __always_inline int ip_decrease_ttl(struct iphdr *iph) | |
{ | |
u32 check = (__force u32)iph->check; | |
check += (__force u32)htons(0x0100); | |
iph->check = (__force __sum16)(check + (check >= 0xFFFF)); | |
return --iph->ttl; | |
} |
magiskboot unpack -h boot.img
magiskboot hexpatch kernel C9220039C816007968F24039E8002836 1F2003D51F2003D568F24039E8002836 # tested on Redmi Note 10 Pro
magiskboot hexpatch kernel A0160079A022403900040051A0220039 1F2003D5A0224039000400511F2003D5 # tested on Redmi 4X
magiskboot repack boot.img
$ ping google.com
PING google.com (142.250.179.142) 56(84) bytes of data.
64 bytes from ams17s10-in-f14.1e100.net (142.250.179.142): icmp_seq=1 ttl=106 time=115 ms
C:\>ping 142.250.179.142
Pinging 142.250.179.142 with 32 bytes of data:
Reply from 142.250.179.142: bytes=32 time=127ms TTL=106
su -c "curl -s https://raw.githubusercontent.com/Zibri/ttl_fix/master/customize.sh | sh"
su -c "curl -s https://raw.githubusercontent.com/Zibri/ttl_fix/master/remove.sh | sh"
su -c "curl -s https://raw.githubusercontent.com/Zibri/ttl_fix/master/customize.sh | sh"
su -c "curl -s https://raw.githubusercontent.com/Zibri/ttl_fix/master/remove.sh | sh"
$ python3 ttl_patcher.py
Opening file 'kernel' for patching...
ip_send_check signature matched - 0x1054680 - ['1f140079', '08400091', '0a004039', '093040a9']
ip_decrease_ttl signature matched - 0x1052ecc - ['678a4179', 'a0ff9f52', '1601078b', 'c3164079', 'c1224039', '7f00006b', '6094831a', '02040011', '
23040051', 'c2160079', 'c3220039']
678a4179a0ff9f521601078bc3164079c12240397f00006b6094831a0204001123040051c2160079c3220039
678a41791601078b08088052e00316aac8220039e80500941f2003d51f2003d51f2003d51f2003d51f2003d5
File patched! Saved to 'kernel.patched'
here you go...how to run/execute? :
magiskboot unpack -h boot.img
magiskboot hexpatch kernel C9220039C816007968F24039E8002836 1F2003D51F2003D568F24039E8002836
magiskboot repack boot.img
i try via adb but failed.