Sorry to be late.

> Richard Stallman <[EMAIL PROTECTED]> writes:
> 
> > What I remember is that Red Hat enables a feature in Linux that (I
> > believe) uses the address space differently.  unexelf.c doesn't handle
> > it right.
> >
> > I don't remember the name of the feature, but I'm sure other people
> > on this list remember the name.
> 
> exec_shield is one such feature, and newer kernels use something like,
> uh, /proc/sys/vm/randomize_... (I don't remember the particular name
> right now and don't have a Fedora active).  The latter loaded
> executables' memory segments into randomized locations to make buffer
> overflow attacks less predictable.
> 
> exec_shield could be gotten around with using
> setarch i386 make
> and configure does that already IIRC.  But the address space
> randomization was prohibiting the dumping even with the setarch
> command.

Could you tell me the kernel version or the OS version?

I'm using Fedora core 1 and Fedora core 3.
I cannot reproduce the problem on the platforms.


_______________________________________________
Emacs-devel mailing list
Emacs-devel@gnu.org
http://lists.gnu.org/mailman/listinfo/emacs-devel

Reply via email to