emacs-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Needed for the release


From: Masatake YAMATO
Subject: Re: Needed for the release
Date: Thu, 16 Jun 2005 13:44:37 +0900 (JST)

> > Richard Stallman <address@hidden> writes:
> > 
> > > What I remember is that Red Hat enables a feature in Linux that (I
> > > believe) uses the address space differently.  unexelf.c doesn't handle
> > > it right.
> > >
> > > I don't remember the name of the feature, but I'm sure other people
> > > on this list remember the name.
> > 
> > exec_shield is one such feature, and newer kernels use something like,
> > uh, /proc/sys/vm/randomize_... (I don't remember the particular name
> > right now and don't have a Fedora active).  The latter loaded
> > executables' memory segments into randomized locations to make buffer
> > overflow attacks less predictable.
> > 
> > exec_shield could be gotten around with using
> > setarch i386 make
> > and configure does that already IIRC.  But the address space
> > randomization was prohibiting the dumping even with the setarch
> > command.
> 
> Could you tell me the kernel version or the OS version?

What I'd like to say is I cannot reproduce the problem.
Emacs can be built fine on my computers.





reply via email to

[Prev in Thread] Current Thread [Next in Thread]