On Thu, 2006-07-06 at 10:07 +0200, Sebastian Dröge wrote: > It's an gcc extension that adds protection against several possible > stack vulnerabilities: http://www.trl.ibm.com/projects/security/ssp/
Oh, that spp. But I don't know how it works. Does it also enable marking some things as non-executable that would otherwise be? > This is enabled by default on Ubuntu now and disabled by default on > Debian, can be disabled by -fno-stack-protector and enabled by > -f-stack-protector. right > The only weird thing with this is, that mono worked fine with SSP on my > single CPU PPC32. Well, the thing is that the g4 doesn't implement marking memory as non-executable, so readable implies executable, which is the root cause of these issues. > Well, I have some new news... mono now also fails with the old > sched_affinity patch :( That probably means that SPP is to blame and does indeed mark something non-executable that mono later tries to execute. johannes
signature.asc
Description: This is a digitally signed message part

