[said Tucker]
>
> Our Ada 95 compiler for the SPARC does not require the stack to be
> executable.  That implies that the one from Green Hills and the one
> from Aonix do not either.  In fact, I suspect that GNAT is
> one of the few Ada 95 compilers that does put executable code on
> the stack.  I believe it does this because GCC uses "trampolines"
> to support pointers to nested procedures.
>
> -Tucker Taft   [log in to unmask]
>
We (GWU) and a few other educational sites have had this problem.
Our sysadmins have insisted on disabling stack execution. ACT has
provided a patch for earlier GNAT versions that would enable you
to rebuild the compiler from sources such that no trampolining/
stack execution is done. This makes both the compiler and the code
it generates compliant with the security fix.

As I recall, ACT actually sent me a patched Solaris binary, so I
didn't have to rebuild it myself.

ACT has told me they were preparing a "better" solution for 3.13,
but I have not seen it to date. You might want to ask ACT if you can
get a copy of the patched 3.12p, and tell them you are interested in
the forthcoming solution for 3.13.

Actually, you might want to re-post your question to [log in to unmask]
to open the issue again, and maybe even send it as a bug report
to [log in to unmask]

Mike Feldman