Debugging ARM kernels using fast interrupts
Debugging ARM kernels using fast interrupts
Posted Jun 1, 2014 16:00 UTC (Sun) by ballombe (subscriber, #9523)Parent article: Debugging ARM kernels using fast interrupts
I wonder why they did not make the UART listen to the touchscreen instead.
Just swipe with the right fingerprint and you are set.
Posted Jun 1, 2014 17:40 UTC (Sun)
by dlang (guest, #313)
[Link]
Posted Jun 4, 2014 9:05 UTC (Wed)
by danielthompson (subscriber, #97243)
[Link]
Not really.
fiq_debugger deliberately does not implement commands that could be used to hijack the phone and, within kgdb/kdb, the purpose of the reduced capability patchset is to achieve the same thing by disabling commands that could be to hijack the phone.
For example, arbitrary memory reads can be banned to prevent fishing for cryptographic keys. Similarly breakpoints and single stepping can also be banned, which is an interesting case. Breakpointing might initially appear to be "passive observation" it can, in fact, be used to single step decryption routines such that the control flow might reveal the key.
> I wonder why they did not make the UART listen to the touchscreen
Managing the touchscreen requires too much of the phone to be working correctly. The purpose of both fiq_debugger and kgdb/kdb+FIQ is to provide debug mechanisms that still function when significant portions of the kernel are not working correctly. For this reason they need to use very simple hardware.
Debugging ARM kernels using fast interrupts
Risk of hijack
> that hijack the phone they are plugged in ?
> instead. Just swipe with the right fingerprint and you are set.
