On Thu, 2006-07-06 at 10:07 +0200, Sebastian Dröge wrote:

> It's an gcc extension that adds protection against several possible
> stack vulnerabilities: http://www.trl.ibm.com/projects/security/ssp/

Oh, that spp. But I don't know how it works. Does it also enable marking
some things as non-executable that would otherwise be?

> This is enabled by default on Ubuntu now and disabled by default on
> Debian, can be disabled by -fno-stack-protector and enabled by
> -f-stack-protector.

right

> The only weird thing with this is, that mono worked fine with SSP on my
> single CPU PPC32.

Well, the thing is that the g4 doesn't implement marking memory as
non-executable, so readable implies executable, which is the root cause
of these issues.

> Well, I have some new news... mono now also fails with the old
> sched_affinity patch :(

That probably means that SPP is to blame and does indeed mark something
non-executable that mono later tries to execute.

johannes

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to