It looks like randomize_va_space has been turned on by default in the
recent RHEL 5 kernels as a security feature.

We have a really ancient application that gives strange I/O errors when
that kernel parameter is set, though.  It's easy enough to unset it
(echo 0 > /proc/sys/kernel/randomize_va_space) but before I start doing
that wholesale I wonder if any of you kernel experts out there know
whether there would be any unanticipated adverse effects or interactions
from doing so.  Besides less security of course.

Thanks,
Peter

_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to