Masatake YAMATO <address@hidden> writes:
Sorry to be late.
exec_shield is one such feature, and newer kernels use something
like, uh, /proc/sys/vm/randomize_... (I don't remember the
particular name right now and don't have a Fedora active). The
latter loaded executables' memory segments into randomized
locations to make buffer overflow attacks less predictable.
exec_shield could be gotten around with using
setarch i386 make
and configure does that already IIRC. But the address space
randomization was prohibiting the dumping even with the setarch
command.
Could you tell me the kernel version or the OS version?
I'm using Fedora core 1 and Fedora core 3.
I cannot reproduce the problem on the platforms.
It was introduced some time after Fedora core 3 in their development
sources. I switched to Ubuntu a short time after that. It is
possible that the feature did not make it switched on by default into
the final FC4 release, but I can't tell since I stopped updating it
after that.