> Ah, that's the reason for your bug report WRT JIT/NCI. The question is, > how can we detect the presence of the exec-shield patch. Your `uname -a` > doesn't indicate it.
What for? We just always do allocating memory from a JIT dedicated heap with execute flas set on it, no matter the presence of the exec-shield patch, or OS is windows XP with service pack 2 installed, or the processor supports NX. > 1) a config test/option/whatever (e.g. mallocing some mem, fill in a > "ret" instruction and call that. Calling it and BOOM! STATUS_ACCESS_VIOLATION with the following process termination. > 2) Some means to allocate executable memory. Plus, methods to create and free the JIT heap. 0x4C56