On Do, 2006-07-06 at 10:14 +0200, Johannes Berg wrote:
> On Thu, 2006-07-06 at 10:07 +0200, Sebastian Dröge wrote:
> 
> > It's an gcc extension that adds protection against several possible
> > stack vulnerabilities: http://www.trl.ibm.com/projects/security/ssp/
> 
> Oh, that spp. But I don't know how it works. Does it also enable marking
> some things as non-executable that would otherwise be?

AFAIK it only pushes a value on the stack before every function and then
checks that this is still there when the function returns.

> > Well, I have some new news... mono now also fails with the old
> > sched_affinity patch :(
> 
> That probably means that SPP is to blame and does indeed mark something
> non-executable that mono later tries to execute.

Ok, it also fails now when SSP is disabled... so it must be something
else than SSP, probably another library that changed.

I'll test some things and then report back later...

Bye

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to