Re: IA64/x86-64 and execution protection support?
From: David Mosberger
Date: Mon Nov 03 2003 - 11:49:51 EST
>>>>> On Mon, 3 Nov 2003 08:49:33 -0600, Joseph Pingenot <trelane@xxxxxxxxxxxxxx> said:
Joseph> Hello. I was reading El Reg this morning when they
Joseph> discussed "execution protection" on the new Intel (IA64) and
Joseph> AMD (K8 and above) chips. Does the Linux kernel have
Joseph> support for preventing execution of certain memory regions
Joseph> on those architectures?
Yes, on ia64, data and stack do not get mapped executable by default.
Also, return addresses (under the discretion of the compiler) are
virtually always stored on a separate register stack, making it more
difficult to use memory stack overflows to overwrite return addresses.
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/