Hi there.
According to "Red Book", xcheck operator tests whether the operand has the executable or literal attribute. But, it seems to me xcheck operator has an influence on ps stack. I have following example:
where operand is dynamically builded executable object.
In some cases, operand execution causes to stack crashing, but if I will use xcheck before exec, means
operand execution will finish good.
My question is:
Do you know something about xcheck influence, or similiar behavior is my particular case?
Thank you,
Michael
According to "Red Book", xcheck operator tests whether the operand has the executable or literal attribute. But, it seems to me xcheck operator has an influence on ps stack. I have following example:
Code:
operand exec
where operand is dynamically builded executable object.
In some cases, operand execution causes to stack crashing, but if I will use xcheck before exec, means
Code:
operand xcheck pop exec
operand execution will finish good.
My question is:
Do you know something about xcheck influence, or similiar behavior is my particular case?
Thank you,
Michael