Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752807AbcCIIcO (ORCPT ); Wed, 9 Mar 2016 03:32:14 -0500 Received: from mail-wm0-f66.google.com ([74.125.82.66]:36424 "EHLO mail-wm0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751742AbcCIIcK (ORCPT ); Wed, 9 Mar 2016 03:32:10 -0500 Date: Wed, 9 Mar 2016 09:32:05 +0100 From: Ingo Molnar To: Scott Bauer Cc: linux-kernel@vger.kernel.org, kernel-hardening@lists.openwall.com, x86@kernel.org, wmealing@redhat.com, ak@linux.intel.com, luto@amacapital.net, Abhiram Balasubramanian , Linus Torvalds Subject: Re: [PATCH v3 1/3] SROP Mitigation: Architecture independent code for signal cookies Message-ID: <20160309083204.GA30365@gmail.com> References: <1457470075-4586-1-git-send-email-sbauer@eng.utah.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1457470075-4586-1-git-send-email-sbauer@eng.utah.edu> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 962 Lines: 30 * Scott Bauer wrote: > This patch adds a per-process secret to the task struct which > will be used during signal delivery and during a sigreturn. > Also, logic is added in signal.c to generate, place, extract, > clear and verify the signal cookie. > /* > + * Canary value for signal frames placed on user stack. > + * This helps mitigate "Signal Return oriented program" > + * exploits in userland. > + */ > + unsigned long sig_cookie; Could you please add a high level description in Documentation that explains the attack and the way how this mitigation code prevents that kind of attack? Also, the first changelogs should contain more high level description as well. For example, what does the 'verification' of the signal cookie mean, and how does it prevent an SROP attempt? All of these patches seem to assume that people reading this code know what SROP is and how we defend against it - that is not so. Thanks, Ingo