0x36 / Pixel_GPU_Exploit

Android 14 kernel exploit for Pixel7/8 Pro
441 stars 60 forks source link

Grant full capabilities to root shell. #5

Open m4b4 opened 4 months ago

m4b4 commented 4 months ago

On my Pixel 7 it seems overwriting only uid, gid, .. in the task structure is not sufficient to grant full root access (see here). For instance, after getting the root shell I wasn't able to cd into /data/local/tmp anymore:

panther:/ # whoami
root
panther:/data/local/tmp # ls
ls: .: Permission denied
1|panther:/data/local/tmp # getenforce
Permissive

This PR contains the following changes:

I don't have a chance to test this on a Pro model, but on the Pixel 7 it seems to fix the issue for me:

panther:/data/local/tmp # whoami
root
panther:/data/local/tmp # cd /data/local/tmp
panther:/data/local/tmp # ls
another_boot.img  boot.img  boot_231105_003_p7.img  exp2  exp_new  exp_new2  exploit  exploit2  kernel  kernel_pixel8  magiskboot  mali_kbase.ko  mali_pixel.ko  smaps.txt
panther:/data/local/tmp #
atimofeev86 commented 2 months ago

what is my issue? image