The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for Open Source Summit Europe 2023 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.
This schedule is automatically displayed in Central European Summer Time (UTC/GMT +2). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date."
IMPORTANT NOTE: Timing of sessions and room locations are subject to change.
Code reuse attacks reuse existing code snippets to bypass existing memory protections. However, the X86_64 Linux kernel image is located in the top 2G of the address space, and even with KASLR, it can only be relocated within the top 2G. This makes it easy for an attacker to guess the virtual address. By building the kernel as Position Independent Executables (PIE), it can be placed in any virtual address, thereby increasing the number of possible locations and making it harder for an attacker to guess the virtual address. This also provides flexibility to the kernel image's virtual address, allowing it to be placed in the low half of the address space. This presentation will demonstrate the implementation of the X86 kernel relocation and explain how to build the X86_64 Linux kernel as PIE and relocate it below the top 2G.
I am a newcomer to the Linux community and have been involved in KVM community development since 2021, focusing on virtualization development on the security container side.