Peter Riocreux <[EMAIL PROTECTED]> writes: > I am intermittently trying to get Wine to play nicely with a big EDA > tool, and it is doing not too badly today with the 20040309 snapshot > on Fedora Core 1. > > The thing that I think is stopping it working is that whatever is done > to stack-shield by the prepending "setarch i386" on invocation is not > inherited by the .exe that the program calls. Net result is that I get > the "..... security-patched kernel ?" error message from the child > process instead of the parent. Progress of a sort. > > Is there anything, short of turning off exec-shield entirely, that can > be done about this?
Test shows that the system behaves the same after I issue: echo 0 > /proc/sys/kernel/exec-shield echo 0 > /proc/sys/kernel/exec-shield-randomize cat /proc/sys/kernel/exec-shield and cat /proc/sys/kernel/exec-shield-randomize both give a 0 back.now. I am a bit mystified by that. Is the "..... security-patched kernel ?" message that is still there not caused by exec-shield? Peter