Touch but Don't Look - Running the Kernel in Execute Only Memory

Touch but Don't Look - Running the Kernel in Execute Only Memory

Linux Plumbers Conference via YouTube Direct link

Intro

1 of 23

1 of 23

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Touch but Don't Look - Running the Kernel in Execute Only Memory

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why use execute-only memory
  3. 3 Control flow attacks
  4. 4 JIT-ROP
  5. 5 Discovering text - XO is not a lock box
  6. 6 Mitigations: Cost vs Benefit
  7. 7 XO memory CPU support
  8. 8 Trick for XO memory for VMS (2)
  9. 9 Qemu/KVM implementation
  10. 10 Userspace XO support
  11. 11 X86 Kernel Text Permission Lifecycle
  12. 12 XB6 patching methods
  13. 13 So what broke?
  14. 14 Text patching features
  15. 15 Toolchain Mixing Data and Code
  16. 16 Performance
  17. 17 Making this reliable
  18. 18 XO faults
  19. 19 Implementing non-strict mode
  20. 20 Fixing guest page tables
  21. 21 Future - Not reading text as a new rule in the kernel?
  22. 22 Plans
  23. 23 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.