Richard Stallman <[EMAIL PROTECTED]> writes:

> What I remember is that Red Hat enables a feature in Linux that (I
> believe) uses the address space differently.  unexelf.c doesn't handle
> it right.
>
> I don't remember the name of the feature, but I'm sure other people
> on this list remember the name.

exec_shield is one such feature, and newer kernels use something like,
uh, /proc/sys/vm/randomize_... (I don't remember the particular name
right now and don't have a Fedora active).  The latter loaded
executables' memory segments into randomized locations to make buffer
overflow attacks less predictable.

exec_shield could be gotten around with using
setarch i386 make
and configure does that already IIRC.  But the address space
randomization was prohibiting the dumping even with the setarch
command.

-- 
David Kastrup, Kriemhildstr. 15, 44793 Bochum


_______________________________________________
Emacs-devel mailing list
Emacs-devel@gnu.org
http://lists.gnu.org/mailman/listinfo/emacs-devel

Reply via email to