Can I know kernel address layout and memory mapped IO layout from the user privilege in linux kernel?

My current understanding is that the user does not have any way of knowing the kernel address space layout due to the protection mechanisms such as Kernel Address Space Layout Randomization (KASLR).
However, I see that if I use cat /proc/i… Continue reading Can I know kernel address layout and memory mapped IO layout from the user privilege in linux kernel?

This Week in Security: Secure Boot Bypass, Attack on Titan M, KASLR Weakness

It’s debatable just how useful Secure Boot is for end users, but now there’s yet another issue with Secure Boot, or more specifically, a trio of signed bootloaders. Researchers at …read more Continue reading This Week in Security: Secure Boot Bypass, Attack on Titan M, KASLR Weakness

how did the meltdown attack break KASLR in 128 steps for a target machine with 8GB RAM with 40bit randomization on a 64bit machine?

In the meltdown official paper released the authors broke the KASLR with 128 steps at worse. Unable to understand how did they come down to that number

Paper for reference

Continue reading how did the meltdown attack break KASLR in 128 steps for a target machine with 8GB RAM with 40bit randomization on a 64bit machine?