|From:||Marcus G. Daniels|
|Subject:||Re: [swarm-hackers] MacOS X Intel nested functions|
|Date:||Tue, 29 May 2007 08:38:38 -0600|
|User-agent:||Thunderbird 126.96.36.199 (Windows/20070326)|
Perhaps during startup the stack can be manually vm_protect'ed or mprotect'ed to be executable?It is not acceptable as an option linking a dynamic library, because that uses Apple's libtool, which spits the dummy. Even if libtool did not barf, the option is meaningless in a library. The allow_stack_execute can only be set by the OS as part of launching a new process.
|[Prev in Thread]||Current Thread||[Next in Thread]|