Gilad Ben-Yossef wrote:

I don't know enough about grsecurity patch to tell you exactly how to do this, but if it has an option of supporting trampoline code which i assume it does but maybe is disabled by default, enable it and recompile the kernel. This should solve the problem.

It does have an option to enable trampoline code, but it just tires to detect when that is the case. Maybe it fails in this case.


One thing it does have an option to do is to mark a given binary as "not for stack protection". Stack protection will not be performed on that binary.

RTFM for more details, I'm afraid.


Hope this helps, Gilad



--
Shachar Shemesh
Open Source integration consultant
Home page & resume - http://www.shemesh.biz/



=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]



Reply via email to