Главная
Study mode:
on
1
Intro
2
Translation Lookaside Buffer (TLB)
3
mremap() moving a memory mapping
4
fallocate() (de)allocate space for a file
5
Exploit plan: Basics
6
Buddy allocator
7
Preemption
8
Scheduler control
9
Android kernel exploit (app - zygote)
10
userfaultfd and FUSE
11
komp() for reliable UAF
12
FUSE for exploiting struct file refcount
13
int getpidcon(pid t pid, char **context)
14
Bug 3: race condition in hwservicemanager
15
_mutex on kernel 4.4
16
Priority Inversion
17
Major faults
18
Repeated file mapping faults
Description:
Explore how to exploit race conditions using the scheduler in this 34-minute conference talk by Jann Horn from Google. Delve into two specific bugs with narrow race windows in the Linux kernel and Android userspace code, and learn how they can be exploited on a Google Pixel 2 phone running Linux 4.4. Discover techniques involving unprivileged sched_*() syscalls, Translation Lookaside Buffer (TLB), mremap() for moving memory mappings, and fallocate() for file space allocation. Examine the exploit plan, including the buddy allocator, preemption, and scheduler control. Investigate the Android kernel exploit involving app-zygote interaction, userfaultfd, FUSE, and komp() for reliable UAF. Analyze priority inversion, major faults, and repeated file mapping faults. Gain insights into exploiting struct file refcount and race conditions in hwservicemanager_mutex on kernel 4.4.

Exploiting Race Conditions Using the Scheduler

Linux Foundation
Add to list