|
Address space modification protection
PaX: Page-based implementation of non-executable pages for i386, sparc, sparc64, alpha, and parisc
PaX: Segmentation-based implementation of non-executable pages for i386 with negligible performance hit
PaX: Mprotect restrictions prevent new code from entering a task
PaX: Randomization of stack and mmap base for i386, sparc, sparc64, alpha, and parisc
PaX: Randomization of executable base for i386, sparc, sparc64, alpha, and parisc
PaX: Randomization of kernel stack
PaX: Automatically emulate sigreturn trampolines (for libc5, glibc 2.0, uClibc, Modula-3 compatibility)
PaX: No ELF .text relocations
PaX: Trampoline emulation (GCC and linux sigreturn)
PaX: PLT emulation for non-i386 archs
No kernel modification via /dev/mem, /dev/kmem, or /dev/port
Option to disable use of raw I/O
Removal of addresses from /proc/<pid>/maps
| |