Exec-shield and memory randomization
Arjan van de Ven
arjanv at redhat.com
Sat Jul 30 12:35:25 UTC 2005
setarch has an -R option to start the binary without randomisation.
> Finally, is there a way to disable randomization on a per-binary basis
> (with an ELF flag or lack thereof)? I seem have a binary (sbcl) that
> doesn't like memory randomization. Rather than turn it off globally, I'd
> rather just mark the binary as incompatible with it.
I wonder why the app breaks; randomisation doesn't do anything weird at
all, in fact even before this stuff got in there was some extend of
randomisation already.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <http://listman.redhat.com/archives/fedora-devel-list/attachments/20050730/09b590b7/attachment.sig>
More information about the fedora-devel-list
mailing list