> Ingo, do you want protection against shell code injection ? Have the
> kernel to assign random stack addresses to processes and they won't be
> able to guess the stack pointer to place the jump. I use a very simple
> trick in my code :
stack randomisation is already present in the kernel, in the form of
cacheline coloring for HT cpus...
This archive was generated by hypermail 2b29 : Wed May 07 2003 - 22:00:16 EST