Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262730AbTKRN4p (ORCPT ); Tue, 18 Nov 2003 08:56:45 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262770AbTKRNm2 (ORCPT ); Tue, 18 Nov 2003 08:42:28 -0500 Received: from ns.suse.de ([195.135.220.2]:60113 "EHLO Cantor.suse.de") by vger.kernel.org with ESMTP id S262683AbTKRNmR (ORCPT ); Tue, 18 Nov 2003 08:42:17 -0500 To: Joseph Pingenot Cc: linux-kernel@vger.kernel.org Subject: Re: IA64/x86-64 and execution protection support? References: <20031103144932.GC31953@digitasaru.net.suse.lists.linux.kernel> From: Andi Kleen Date: 03 Nov 2003 21:20:24 +0100 In-Reply-To: <20031103144932.GC31953@digitasaru.net.suse.lists.linux.kernel> Message-ID: User-Agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.2 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 841 Lines: 14 Joseph Pingenot writes: > Does the Linux kernel have support for preventing execution of certain > memory regions on those architectures? > Also, I know that some implementations of x86 stack protection are out there; > I've not seen them in the vanilla kernels; is there any plan to implement > them? The x86-64 port supports no-execution for stack and heap and other memory areas, but it is not enabled by default because it breaks some software. You can enable it with the noexec= boot parameter. See Documentation/x86_64/boot-options.txt for details. -Andi - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/