Overview
Explore the journey of implementing STACKLEAK, a Linux kernel security feature, in this 34-minute conference talk by Alexander Popov from Positive Technologies. Dive into the inner workings of STACKLEAK and its importance in mitigating various attacks on the Linux kernel, including information leaks, uninitialized stack variable exploits, and Stack Clash attacks. Follow the timeline of Popov's efforts to introduce STACKLEAK into the Linux kernel mainline, and gain insights into the challenges faced during the process. Learn about the feature's functionality, limitations, and configuration options, as well as the changes made from the original Grsecurity/PaX version. Discover valuable lessons and insights from Popov's experience as a Linux kernel developer and security researcher.
Syllabus
Introduction
History
Positive Technologies
What did I do
What does it provide
Linux Kernel Security Area
StayClick
Bugs
How it looks
Erase function
Uninitialized kernel stack
Three system calls
Mitigation
Limitation
Config Options
How does it work
What does it do
Synthetic test
Conclusion
Timeline
Changes from original version
New functionality
Dropping functionality
Strong language
Closing thoughts
STACKLEAK in C
Helper Stack
Conclusions
Taught by
Linux Foundation