> Ah, that's the reason for your bug report WRT JIT/NCI. The question is,
> how can we detect the presence of the exec-shield patch. Your `uname -a`
> doesn't indicate it.

What for? We just always do allocating memory from a JIT dedicated heap with
execute flas set on it, no matter the presence of the exec-shield patch, or
OS is windows XP with service pack 2 installed, or the processor supports
NX.

> 1) a config test/option/whatever (e.g. mallocing some mem, fill in a
> "ret" instruction and call that.

Calling it and BOOM! STATUS_ACCESS_VIOLATION with the following process
termination.

> 2) Some means to allocate executable memory.

Plus, methods to create and free the JIT heap.

0x4C56

Reply via email to