Exec-shield and memory randomization
Arjan van de Ven
arjanv at redhat.com
Sat Jul 30 12:35:25 UTC 2005
setarch has an -R option to start the binary without randomisation.
> Finally, is there a way to disable randomization on a per-binary basis
> (with an ELF flag or lack thereof)? I seem have a binary (sbcl) that
> doesn't like memory randomization. Rather than turn it off globally, I'd
> rather just mark the binary as incompatible with it.
I wonder why the app breaks; randomisation doesn't do anything weird at
all, in fact even before this stuff got in there was some extend of
randomisation already.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
Url : http://lists.fedoraproject.org/pipermail/devel/attachments/20050730/09b590b7/attachment-0002.bin
More information about the devel
mailing list