Exec-shield and memory randomization

Arjan van de Ven arjanv at redhat.com
Sat Jul 30 12:35:25 UTC 2005


setarch has an -R option to start the binary without randomisation.


> Finally, is there a way to disable randomization on a per-binary basis
> (with an ELF flag or lack thereof)? I seem have a binary (sbcl) that
> doesn't like memory randomization. Rather than turn it off globally, I'd
> rather just mark the binary as incompatible with it.

I wonder why the app breaks; randomisation doesn't do anything weird at
all, in fact even before this stuff got in there was some extend of
randomisation already.


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <http://listman.redhat.com/archives/fedora-devel-list/attachments/20050730/09b590b7/attachment.sig>


More information about the fedora-devel-list mailing list