inheriting exec-shield avoidance

Peter Riocreux par+wine_devel at silistix.com
Thu Apr 8 08:28:51 CDT 2004


Peter Riocreux <par+wine_devel at silistix.com> writes:

> I am intermittently trying to get Wine to play nicely with a big EDA
> tool, and it is doing not too badly today with the 20040309 snapshot
> on Fedora Core 1.
>
> The thing that I think is stopping it working is that whatever is done
> to stack-shield by the prepending "setarch i386" on invocation is not
> inherited by the .exe that the program calls. Net result is that I get
> the "..... security-patched kernel ?" error message from the child
> process instead of the parent. Progress of a sort.
>
> Is there anything, short of turning off exec-shield entirely, that can
> be done about this?

Test shows that the system behaves the same after I issue:

echo 0 > /proc/sys/kernel/exec-shield
echo 0 > /proc/sys/kernel/exec-shield-randomize

cat /proc/sys/kernel/exec-shield

and 

cat /proc/sys/kernel/exec-shield-randomize

both give a 0 back.now.

I am a bit mystified by that. Is the "..... security-patched kernel ?" 
message that is still there not caused by exec-shield?


Peter



More information about the wine-devel mailing list