Re: Virtual addresses below 0x8048000

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi all..

On Tue, May 20, 2008 at 8:03 PM, srinivasa ds <srinivasa.ds@xxxxxxxxx> wrote:
> If you use  -pie(position independent executable) option of gcc, load
> address will be randomly picked. Hence doesn't remain 0x8048000.

thanks for reminding me about PIE...i forgot that term...grrrr

> Address space randomization is also known as exec-shield in linux, And this
> is responsible for mapping userspace stack and heap at different address for
> each execution of same executable.

nope, exec shield, to the best I know, did the thing like making stack
non executable or effectively applying NX bit if it's supported by
your processor. Address space randomization is something separate from
exec-shield...

> You can even randomize the loading address of the executable using -pie flag
> in GCC.

AFAIK, true. However, the loader must also regards this feature...if
not, you'll be ended in same start address. So it's a collaboration of
compiler, linker and loader ...CMIIW people

regards,

Mulyadi.

--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx
Please read the FAQ at http://kernelnewbies.org/FAQ


[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux