> > Richard Stallman <[EMAIL PROTECTED]> writes: > > > > > What I remember is that Red Hat enables a feature in Linux that (I > > > believe) uses the address space differently. unexelf.c doesn't handle > > > it right. > > > > > > I don't remember the name of the feature, but I'm sure other people > > > on this list remember the name. > > > > exec_shield is one such feature, and newer kernels use something like, > > uh, /proc/sys/vm/randomize_... (I don't remember the particular name > > right now and don't have a Fedora active). The latter loaded > > executables' memory segments into randomized locations to make buffer > > overflow attacks less predictable. > > > > exec_shield could be gotten around with using > > setarch i386 make > > and configure does that already IIRC. But the address space > > randomization was prohibiting the dumping even with the setarch > > command. > > Could you tell me the kernel version or the OS version?
What I'd like to say is I cannot reproduce the problem. Emacs can be built fine on my computers. _______________________________________________ Emacs-devel mailing list Emacs-devel@gnu.org http://lists.gnu.org/mailman/listinfo/emacs-devel