Skip to content

Commit 4e8239a

Browse files
authored
Fix Readme
1 parent f2b7c65 commit 4e8239a

1 file changed

Lines changed: 6 additions & 6 deletions

File tree

README.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Linux kernel DANGER
22

3-
This project aims to hack the Linux kernel that make Usermode running in Ring0!
3+
This project modified the Linux kernel that make Usermode running in Ring0!
44

55
![Logo](./linux_danger.png)
66

@@ -86,13 +86,13 @@ qemu-system-x86_64 -kernel vmlinuz -initrd initrd.img -append "root=/dev/ram0 co
8686

8787
# x64 Hacking Status
8888

89-
~~- [ ] CR0 Write Protection Disable~~
89+
- ~~Disable CR0 Write Protection~~ (You can do this in your ELF!)
90+
- ~~Disable PTI~~
91+
- ~~Disable SMEP/SMAP~~ (Removed _USR in Page Table!)
92+
- ~~Disable Alternatives~~
9093
- [x] Hack the user GDT to Ring 0
91-
~~- [x] Disable PTI~~
92-
~~- [x] Disable SMEP/SMAP~~
9394
- [x] Hack User Segment Descriptors to Ring 0
9495
- [x] Hack User Page Table Templates to Ring 0
95-
~~- [x] Disable Alternatives~~
9696
- [x] Adjust IST to FORCE Interrupt Stack always available (Most interrupts/exceptions will use #DF stack, then Manually carry stack back if from Kernel-Mode)
9797
- [x] Replace `sysretq` with `iretq`
9898
- [x] `/mini_shell` successfully run in Ring 0
@@ -102,4 +102,4 @@ qemu-system-x86_64 -kernel vmlinuz -initrd initrd.img -append "root=/dev/ram0 co
102102

103103
- [x] [QEMU_Danger_x86](https://github.com/UEFI-code/QEMU_Danger_x86), `qemu-system-x86_64 -kernel vmlinuz -initrd initrd.img -append "root=/dev/ram0 console=ttyS0" -m 512M -serial stdio`, `/mini_shell` is a usermode ELF running in Ring0
104104
- [x] Physical PC, Intel Core 2 Duo
105-
- [ ] Hyper-V, Not Working...Maybe Hyper-V ignored IST at non-#DF conditions?
105+
- [ ] Hyper-V, Not Working...Maybe Hyper-V ignored IST at non-#DF conditions?

0 commit comments

Comments
 (0)