this is a sad joke for a 'thesis' i'm afraid. you should have kept true to your word and kept us in the loop about your findings to avoid all these errors.
1
You should also keep true to your word and assume defeat as I've found ways to bypass RAP on the public test patch?
6
3
that said, what do irq stacks have to do with unreadable kstacks? what makes you think the interrupted process stacks remains readable when the kernel switch to the irq stack?
1
"Interrupt handlers are executed when the kernel is in interrupt context, i.e., it is not associated with a task, therefore, the unreadable kernel stack feature (prevents cross-task information leaks and corruption) is insufficient."
1
Maybe, just maybe, irq stacks were left readable. All of this would've been easier to determine if I was testing on the 'real thing', which you didn't let me.
1
Yes. Why wouldn't I think that? "The unreadable kernel stack feature prevents cross-task information leaks and corruption"
1
lifting random words out of context leads to your confusion. it was 'cross-task information leaks...', a task's own kstack is only one source of said leaks.
Sep 29, 2019 · 8:53 PM UTC
1

