Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758417AbcC2Wzn (ORCPT ); Tue, 29 Mar 2016 18:55:43 -0400 Received: from mail-ig0-f193.google.com ([209.85.213.193]:33981 "EHLO mail-ig0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758397AbcC2Wzl (ORCPT ); Tue, 29 Mar 2016 18:55:41 -0400 MIME-Version: 1.0 In-Reply-To: References: <1459281207-24377-1-git-send-email-sbauer@eng.utah.edu> Date: Tue, 29 Mar 2016 17:55:40 -0500 X-Google-Sender-Auth: XLw_GopYnXAD_Yk7JBXCutrKGI0 Message-ID: Subject: Re: [PATCH v4 0/4] SROP Mitigation: Sigreturn Cookies From: Linus Torvalds To: Scott Bauer Cc: Linux Kernel Mailing List , "kernel-hardening@lists.openwall.com" , "the arch/x86 maintainers" , Andi Kleen , Andy Lutomirski , Ingo Molnar , Thomas Gleixner , wmealing@redhat.com Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 436 Lines: 14 On Tue, Mar 29, 2016 at 5:54 PM, Linus Torvalds wrote: > > So you could do 4 32 > > - the random value > - the low 32 bits of the address of the cookie > - the low 32 bits of the return point stack and instruction pointer Oops, editing mishap. That was supposed to be about the 128-bit md5 chunk, which uses 4 32-bit values, but then I edited things and didn't get back to it. Linus