Markus Gutschke wrote (in a message from Monday 9)
 > [EMAIL PROTECTED] wrote:
 > > Sep  9 18:36:13 [kernel] PAX: terminating task:
 > > /usr/X11R6/bin/XFree86(XFree86):23363, uid/euid: 0/0, EIP: 08247BB8, ESP:
 > > BFF31D0C
 > > o
 > > 
 > > So it IS the kernel's fault. Google says PAX controls security. I have
 > > someplace to start now, but feel free to shout out the quick fix if you see
 > > one.
 > 
 > This is what is says in the PAX patch file:
 > 
 > +  Enabling this feature will enforce the non-executable flag on
 > +  memory pages thereby making it harder to execute 'foreign' code
 > +  in a program.  This will also break programs that rely on the
 > +  old behaviour and expect that dynamically allocated memory via
 > +  the malloc() family of functions is executable (which it is not).
 > +  Notable examples are the XFree86 4.x server, the java runtime
 > +  and wine.
 > +

Do the PAX patches allow mprotect() calls to make the allocated pages
executable ? 

The XFree86 ELF loader currently miss a few mprotect() calls, but I've
a patch that adds the missing calls and make the loader happy again on
OpenBSD architectures that have non-executable heap now. It should
work too with PAX if it implements mprotect(). 

                                        Matthieu
_______________________________________________
Xpert mailing list
[EMAIL PROTECTED]
http://XFree86.Org/mailman/listinfo/xpert

Reply via email to