Is there any error in the last lines? Execute disable bit?

-- Logs begin at Sat 2020-10-17 11:01:09 IST, end at Sat 2020-10-17 16:30:16 IST. --
Oct 17 11:01:09 King kernel: microcode: microcode updated early to revision 0x21, date = 2019-02-13
Oct 17 11:01:09 King kernel: Linux version 5.8.14-arch1-1 (linux@archlinux) (gcc (GCC) 10.2.0, GNU ld (GNU Binutils) 2.35) #1 SMP PREEMPT Wed, 07 Oct 2020 23:59:46 +0000
Oct 17 11:01:09 King kernel: Command line: BOOT_IMAGE=/boot/vmlinuz-linux root=UUID=ad5b9c3c-724c-446d-882b-f21a22dc73c5 rw loglevel=3 quiet
Oct 17 11:01:09 King kernel: KERNEL supported cpus:
Oct 17 11:01:09 King kernel:   Intel GenuineIntel
Oct 17 11:01:09 King kernel:   AMD AuthenticAMD
Oct 17 11:01:09 King kernel:   Hygon HygonGenuine
Oct 17 11:01:09 King kernel:   Centaur CentaurHauls
Oct 17 11:01:09 King kernel:   zhaoxin   Shanghai  
Oct 17 11:01:09 King kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
Oct 17 11:01:09 King kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
Oct 17 11:01:09 King kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
Oct 17 11:01:09 King kernel: x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
Oct 17 11:01:09 King kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format.
Oct 17 11:01:09 King kernel: BIOS-provided physical RAM map:
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009dfff] usable
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x000000000009e000-0x000000000009ffff] reserved
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000de2adfff] usable
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x00000000de2ae000-0x00000000de755fff] reserved
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x00000000de756000-0x00000000de765fff] ACPI data
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x00000000de766000-0x00000000de874fff] ACPI NVS
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x00000000de875000-0x00000000dee48fff] reserved
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x00000000dee49000-0x00000000deee9fff] type 20
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x00000000deeea000-0x00000000deeeafff] usable
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x00000000deeeb000-0x00000000def2dfff] ACPI NVS
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x00000000def2e000-0x00000000df7fffff] usable
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x00000000f8000000-0x00000000fbffffff] reserved
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x00000000fed00000-0x00000000fed03fff] reserved
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
Oct 17 11:01:09 King kernel: BIOS-e820: [mem 0x0000000100000000-0x000000041effffff] usable
Oct 17 11:01:09 King kernel: NX (Execute Disable) protection: active
Oct 17 11:01:09 King kernel: efi: EFI v2.31 by American Megatrends
Oct 17 11:01:09 King kernel: efi: ACPI=0xde75a000 ACPI 2.0=0xde75a000 SMBIOS=0xdee47518 
Oct 17 11:01:09 King kernel: SMBIOS 2.7 present.
Oct 17 11:01:09 King kernel: DMI:  /DH61HO, BIOS HOH6110H.86A.0816.2018.1031.1524 10/31/2018
Oct 17 11:01:09 King kernel: tsc: Fast TSC calibration using PIT
Oct 17 11:01:09 King kernel: tsc: Detected 3092.831 MHz processor
Oct 17 11:01:09 King kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
Oct 17 11:01:09 King kernel: e820: remove [mem 0x000a0000-0x000fffff] usable
Oct 17 11:01:09 King kernel: last_pfn = 0x41f000 max_arch_pfn = 0x400000000
Oct 17 11:01:09 King kernel: MTRR default type: uncachable
Oct 17 11:01:09 King kernel: MTRR fixed ranges enabled:
Oct 17 11:01:09 King kernel:   00000-9FFFF write-back

You definitely want the NX bit active. It prevents a lot of malware attack vectors by marking data-only addresses as non-executable.

1 Like

Thank you… :smiley:

1 Like