Please do not reply to this email- if you want to comment on the bug, go to the URL shown below and enter your comments there.
Changed by [EMAIL PROTECTED] http://bugzilla.ximian.com/show_bug.cgi?id=81685 --- shadow/81685 2007-07-31 12:20:30.000000000 -0400 +++ shadow/81685.tmp.25713 2007-08-01 06:18:04.000000000 -0400 @@ -241,6 +241,9 @@ overflows from happening by doing some stack peeking in the managed->unmanaged wrappers or restoring the soft guard protection when returning from those same wrappers (this would be done only when needed using the already existing mechanism fro thread.abort) 1) is harder to solve but corrently only needed when wanting to run untrusted code in a safe way + +------- Additional Comments From [EMAIL PROTECTED] 2007-08-01 06:18 ------- +*** Bug 47689 has been marked as a duplicate of this bug. *** _______________________________________________ mono-bugs maillist - [email protected] http://lists.ximian.com/mailman/listinfo/mono-bugs
