> Ingo, do you want protection against shell code injection ? Have the > kernel to assign random stack addresses to processes and they won't be > able to guess the stack pointer to place the jump. I use a very simple > trick in my code : stack randomisation is already present in the kernel, in the form of cacheline coloring for HT cpus...