Masatake YAMATO <[EMAIL PROTECTED]> writes:

> Sorry to be late.
>
>> exec_shield is one such feature, and newer kernels use something
>> like, uh, /proc/sys/vm/randomize_... (I don't remember the
>> particular name right now and don't have a Fedora active).  The
>> latter loaded executables' memory segments into randomized
>> locations to make buffer overflow attacks less predictable.
>> 
>> exec_shield could be gotten around with using
>> setarch i386 make
>> and configure does that already IIRC.  But the address space
>> randomization was prohibiting the dumping even with the setarch
>> command.
>
> Could you tell me the kernel version or the OS version?
>
> I'm using Fedora core 1 and Fedora core 3.
> I cannot reproduce the problem on the platforms.

It was introduced some time after Fedora core 3 in their development
sources.  I switched to Ubuntu a short time after that.  It is
possible that the feature did not make it switched on by default into
the final FC4 release, but I can't tell since I stopped updating it
after that.

-- 
David Kastrup, Kriemhildstr. 15, 44793 Bochum


_______________________________________________
Emacs-devel mailing list
Emacs-devel@gnu.org
http://lists.gnu.org/mailman/listinfo/emacs-devel

Reply via email to