#
access physical memory in gdbmonitor px/16g [addr]
#
dump kernel memory mapvmmap
pagewalk
#
dump kallsymsksymaddrs-remote
ksymaddrs-remote-apply
#
page_offset_base#
physmap#
cpu_entry area0xfffffe0000000000
#
ldt regionmodify_ldt
#
KASLR leaks#
qemu -hda
-hda
end at phys addr 0xbfe00000
, scan down at page increments to leak contents#
cross cache#
KALSR#
SMAP#
SMEP#
FGKALSR#
ret2usr#
ret2dir#
modprobe overwrite#
dirty pipe#
dirty cred#
namespace escapes