Date: Tue, 29 Mar 2016 17:55:40 -0500 From: Linus Torvalds <torvalds@...ux-foundation.org> To: Scott Bauer <sbauer@....utah.edu> Cc: Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, "kernel-hardening@...ts.openwall.com" <kernel-hardening@...ts.openwall.com>, "the arch/x86 maintainers" <x86@...nel.org>, Andi Kleen <ak@...ux.intel.com>, Andy Lutomirski <luto@...capital.net>, Ingo Molnar <mingo@...hat.com>, Thomas Gleixner <tglx@...utronix.de>, wmealing@...hat.com Subject: Re: [PATCH v4 0/4] SROP Mitigation: Sigreturn Cookies On Tue, Mar 29, 2016 at 5:54 PM, Linus Torvalds <torvalds@...ux-foundation.org> wrote: > > So you could do 4 32 > > - the random value > - the low 32 bits of the address of the cookie > - the low 32 bits of the return point stack and instruction pointer Oops, editing mishap. That was supposed to be about the 128-bit md5 chunk, which uses 4 32-bit values, but then I edited things and didn't get back to it. Linus
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.