> > Richard Stallman <[EMAIL PROTECTED]> writes:
> > 
> > > What I remember is that Red Hat enables a feature in Linux that (I
> > > believe) uses the address space differently.  unexelf.c doesn't handle
> > > it right.
> > >
> > > I don't remember the name of the feature, but I'm sure other people
> > > on this list remember the name.
> > 
> > exec_shield is one such feature, and newer kernels use something like,
> > uh, /proc/sys/vm/randomize_... (I don't remember the particular name
> > right now and don't have a Fedora active).  The latter loaded
> > executables' memory segments into randomized locations to make buffer
> > overflow attacks less predictable.
> > 
> > exec_shield could be gotten around with using
> > setarch i386 make
> > and configure does that already IIRC.  But the address space
> > randomization was prohibiting the dumping even with the setarch
> > command.
> 
> Could you tell me the kernel version or the OS version?

What I'd like to say is I cannot reproduce the problem.
Emacs can be built fine on my computers.



_______________________________________________
Emacs-devel mailing list
Emacs-devel@gnu.org
http://lists.gnu.org/mailman/listinfo/emacs-devel

Reply via email to