Peter Ruprecht schrieb:
It looks like randomize_va_space has been turned on by default in the
recent RHEL 5 kernels as a security feature.
We have a really ancient application that gives strange I/O errors when
that kernel parameter is set, though. It's easy enough to unset it
(echo 0 > /proc/sys/kernel/randomize_va_space) but before I start doing
that wholesale I wonder if any of you kernel experts out there know
whether there would be any unanticipated adverse effects or interactions
from doing so. Besides less security of course.
have the user start a new shell with
setarch -R i386 tcsh
or some such. The new shell has then a personality where
randomize_va_space is 0.
Works for me.
HTH,
Kay
Thanks,
Peter
_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list