On Tue, 8 Jul 2008, Kay Diederichs wrote:

> Peter Ruprecht schrieb:
> > It looks like randomize_va_space has been turned on by default in the
> > recent RHEL 5 kernels as a security feature.
> >
> > We have a really ancient application that gives strange I/O errors when
> > that kernel parameter is set, though.  It's easy enough to unset it
> > (echo 0 > /proc/sys/kernel/randomize_va_space) but before I start doing
> > that wholesale I wonder if any of you kernel experts out there know
> > whether there would be any unanticipated adverse effects or interactions
> > from doing so.  Besides less security of course.
> >
>
> have the user start a new shell with
> setarch -R i386 tcsh
> or some such. The new shell has then a personality where
> randomize_va_space is 0.
>

Thanks - that's a great solution.  (Note that the syntax is actually
"setarch i386 -R app".)

Peter

_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list

Reply via email to