On Tue, 8 Jul 2008, Kay Diederichs wrote: > Peter Ruprecht schrieb: > > It looks like randomize_va_space has been turned on by default in the > > recent RHEL 5 kernels as a security feature. > > > > We have a really ancient application that gives strange I/O errors when > > that kernel parameter is set, though. It's easy enough to unset it > > (echo 0 > /proc/sys/kernel/randomize_va_space) but before I start doing > > that wholesale I wonder if any of you kernel experts out there know > > whether there would be any unanticipated adverse effects or interactions > > from doing so. Besides less security of course. > > > > have the user start a new shell with > setarch -R i386 tcsh > or some such. The new shell has then a personality where > randomize_va_space is 0. >
Thanks - that's a great solution. (Note that the syntax is actually "setarch i386 -R app".) Peter _______________________________________________ rhelv5-list mailing list [email protected] https://www.redhat.com/mailman/listinfo/rhelv5-list
