Kernel update breaks Chez Scheme

Michel Salim michel.salim at gmail.com
Tue Apr 4 04:03:04 UTC 2006


On 4/3/06, John Reiser <jreiser at bitwagon.com> wrote:
> It's possible that changes introduced with kernel 2080_FC5 to deal
> with bugzilla #162797 may be interacting with the application.
> [What is the address of the attempted bad access, and what is
> the memory map there?]
>
> First, try the application under the values 1, 3, 0, 11, and 9 of
> /proc/sys/kernel/exec-shield, when running 2080_FC5.   That is:
>         # echo 1  > /proc/sys/kernel/exec-shield    ## note: as root
>         $ run-the-application  ## note: as ordinary user
> then
>         # echo 3  > /proc/sys/kernel/exec-shield
>         $ run-the-application
> then use 0, 11, and 9.  [The default behavior of kernel 2054_FC5
> is very close to the behavior of 2080_FC5 when exec-shield is 1.]
>
> If the problem persists under both 11 and 9, but not under
> any of 1, 3, and 0, then there may be a kernel bug, or the application
> might be making an assumption about virtual address space that is
> no longer true in kernel 2080_FC5.

OK. The application works under 0, 1 and 9, but not under 3 or 11. Is
there documentation for what these new modes do?

Will do the strace for 3 and 11 and report it to Bugzilla.

--
Michel Salim
http://www.cs.indiana.edu/~msalim
http://the-dubois-papers.blogspot.com/




More information about the test mailing list