It looks like randomize_va_space has been turned on by default in the recent RHEL 5 kernels as a security feature.
We have a really ancient application that gives strange I/O errors when that kernel parameter is set, though. It's easy enough to unset it (echo 0 > /proc/sys/kernel/randomize_va_space) but before I start doing that wholesale I wonder if any of you kernel experts out there know whether there would be any unanticipated adverse effects or interactions from doing so. Besides less security of course. Thanks, Peter _______________________________________________ rhelv5-list mailing list [email protected] https://www.redhat.com/mailman/listinfo/rhelv5-list
