Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S964990AbWAXO5W (ORCPT ); Tue, 24 Jan 2006 09:57:22 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S964994AbWAXO5W (ORCPT ); Tue, 24 Jan 2006 09:57:22 -0500 Received: from pentafluge.infradead.org ([213.146.154.40]:14483 "EHLO pentafluge.infradead.org") by vger.kernel.org with ESMTP id S964990AbWAXO5V (ORCPT ); Tue, 24 Jan 2006 09:57:21 -0500 Subject: Re: [PATCH/RFC] Shared page tables From: Arjan van de Ven To: Dave McCracken Cc: Andi Kleen , Ray Bryant , Robin Holt , Hugh Dickins , Linux Kernel , Linux Memory Management In-Reply-To: References: <200601240139.46751.ak@suse.de> <200601231853.54948.raybry@mpdtxmail.amd.com> <200601240210.04337.ak@suse.de> <1138086398.2977.19.camel@laptopd505.fenrus.org> Content-Type: text/plain Date: Tue, 24 Jan 2006 15:56:49 +0100 Message-Id: <1138114609.2977.45.camel@laptopd505.fenrus.org> Mime-Version: 1.0 X-Mailer: Evolution 2.2.3 (2.2.3-2.fc4) Content-Transfer-Encoding: 7bit X-SRS-Rewrite: SMTP reverse-path rewritten from by pentafluge.infradead.org See http://www.infradead.org/rpr.html Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 664 Lines: 18 > I thought the main security benefit for randomization of mapped regions was > for writeable data space anyway. Isn't text space protected by not being > writeable? nope that's not correct. Aside from stack randomization, randomization is to a large degree intended to make the return-to-libc kind of attacks harder, by not giving attackers a fixed address to return to. That's all code, nothing to do with data. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/