You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
- No separate KASLR leak needed if the target is in/reachable via the direct map (e.g., page tables, kernel objects on physical pages you can influence/observe).
343
339
- Simplifies reliable arbitrary R/W and targeting of kernel data on arm64 Android.
344
340
345
-
Reproduction summary
341
+
**Reproduction summary**
346
342
1)`grep memstart /proc/kallsyms` -> address of `memstart_addr`
347
343
2) Kernel read -> decode 8 bytes LE -> `PHYS_OFFSET`
348
344
3) Use `virt = ((phys - PHYS_OFFSET) | PAGE_OFFSET)` with `PAGE_OFFSET=0xffffff8000000000`
349
345
350
346
> [!NOTE]
351
347
> Access to tracing-BPF helpers requires sufficient privileges; any kernel read primitive or info leak suffices to obtain `PHYS_OFFSET`.
348
+
349
+
**How it’s fixed**
350
+
- Limited kernel VA space plus CONFIG_MEMORY_HOTPLUG reserves VA for future hotplug, pushing the linear map to the lowest VA (fixed base).
0 commit comments