Masatake YAMATO <[EMAIL PROTECTED]> writes: > Sorry to be late. > >> exec_shield is one such feature, and newer kernels use something >> like, uh, /proc/sys/vm/randomize_... (I don't remember the >> particular name right now and don't have a Fedora active). The >> latter loaded executables' memory segments into randomized >> locations to make buffer overflow attacks less predictable. >> >> exec_shield could be gotten around with using >> setarch i386 make >> and configure does that already IIRC. But the address space >> randomization was prohibiting the dumping even with the setarch >> command. > > Could you tell me the kernel version or the OS version? > > I'm using Fedora core 1 and Fedora core 3. > I cannot reproduce the problem on the platforms.
It was introduced some time after Fedora core 3 in their development sources. I switched to Ubuntu a short time after that. It is possible that the feature did not make it switched on by default into the final FC4 release, but I can't tell since I stopped updating it after that. -- David Kastrup, Kriemhildstr. 15, 44793 Bochum _______________________________________________ Emacs-devel mailing list Emacs-devel@gnu.org http://lists.gnu.org/mailman/listinfo/emacs-devel