JIT breaks on feather3

chromatic chromatic at wgz.org
Wed Dec 3 08:31:13 UTC 2008


On Tuesday 02 December 2008 22:27:15 Mark Glines wrote:

> Kevin mentioned that parrot is using mprotect() to explicitly ask glibc
> to make this memory executable.  Since it isn't, that possibly makes
> this a glibc bug.  Either way, this seems like the sort of issue which
> would keep cropping up in weird ways, unless we could detect/prevent it
> somehow.
>
> So, List, does anyone happen to know why processes under screen have
> non-executable stacks?  Or possibly a bash shopt or ulimit or dropped
> privilege or somesuch?

SELinux or GCC stack protection might also do this (though I'm not *sure* of 
the latter).

-- c


More information about the parrot-dev mailing list