inheriting exec-shield avoidance
Peter Riocreux
par+wine_devel at silistix.com
Thu Apr 8 08:28:51 CDT 2004
Peter Riocreux <par+wine_devel at silistix.com> writes:
> I am intermittently trying to get Wine to play nicely with a big EDA
> tool, and it is doing not too badly today with the 20040309 snapshot
> on Fedora Core 1.
>
> The thing that I think is stopping it working is that whatever is done
> to stack-shield by the prepending "setarch i386" on invocation is not
> inherited by the .exe that the program calls. Net result is that I get
> the "..... security-patched kernel ?" error message from the child
> process instead of the parent. Progress of a sort.
>
> Is there anything, short of turning off exec-shield entirely, that can
> be done about this?
Test shows that the system behaves the same after I issue:
echo 0 > /proc/sys/kernel/exec-shield
echo 0 > /proc/sys/kernel/exec-shield-randomize
cat /proc/sys/kernel/exec-shield
and
cat /proc/sys/kernel/exec-shield-randomize
both give a 0 back.now.
I am a bit mystified by that. Is the "..... security-patched kernel ?"
message that is still there not caused by exec-shield?
Peter
More information about the wine-devel
mailing list