Talk:Hardened/PaX Quickstart

Kernel configuration in Kernel configuration for PT_PAX includes these settings:

Non-executable page -> [*] Enforce non-executable pages [*]  Paging based non-executable pages [*]  Segmentation based non-executable pages               <--- Not available on amd64. [*] Emulate trampolines                                    <--- CRITICAL for python [*] Restrict mprotect [ ]  Use legacy/compat protection demoting (read help) [ ]  Allow ELF text relocations (read help) [*] Enforce non-executable kernel pages Return Address Instrumentation Method (or) --->        <--- Not available on x86. (4) Minimum amount of memory reserved for module code  <--- Not available on amd64. Address Space Layout Randomization -> [*] Address Space Layout Randomization [*] Randomize kernel stack base [*] Randomize user stack base [*] Randomize mmap base Miscellaneous hardening features ---> [*] Sanitize all freed memory [*] Sanitize kernel stack [*] Prevent invalid userland pointer dereference [*] Prevent various kernel object reference counter overflows [*] Harden heap object copies between kernel and userland [*] Prevent various integer overflows in function size parameters [*] Generate some entropy during boot

I guess these are not just for PT_PAX but for XATTR_PAX also. Could you please separate these blocks?