wine/dlls/ntdll virtual.c

Alexandre Julliard julliard at
Wed Feb 11 14:38:42 CST 2004

Mike Hearn <mike at> writes:

> According to the exec-shield paper, its effects can include revealing
> "bugs in applications that assume PROT_READ implies PROT_EXEC" due to the
> funky things it does with relocations into the ASCII-armour. Not sure but
> it might be worth ensuring mprotect is called afterwards....

mprotect is always called, and anyway the area is allocated with
PROT_EXEC already so it shouldn't make any difference.

Alexandre Julliard
julliard at

More information about the wine-devel mailing list