[Bug 1955] Linker script to reserve PE load address range required (exec-shield, prelink)

Wine Bugs wine-bugs at winehq.org
Fri Jan 23 10:02:06 CST 2004


http://bugs.winehq.org/show_bug.cgi?id=1955


mike at theoretic.com changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |julliard at winehq.com
             Status|UNCONFIRMED                 |NEW
     Ever Confirmed|                            |1
            Summary|error on application install|Linker script to reserve PE
                   |of AutoCAD 2000 ( R15)      |load address range required
                   |                            |(exec-shield, prelink)




------- Additional Comments From mike at theoretic.com  2004-23-01 10:02 -------
Try switching off exec shield with the following commands (as root)

echo 0 >/proc/sys/kernel/exec-shield
echo 0 >/proc/sys/kernel/exec-shield-randomize


Since AJ switched off the BSS array hack, we are back to square one with
execshield and prelink DSO load address randomization. One potential fix is to
use the MEMORY linker script directive to reserve an address range (but not swap
space).

I've experimented with this, and was able to succesfully link a minimal test
binary, but unfortunately it segfaulted on initialization, apparently inside the
rtld with no backtrace. I've emailed the binutils list, but as yet got no
response. Probably somebody more skilled than me could make this work. I'll try
again soon.

CCing Alexandre.

Please dupe exec-shield and prelink problems to this bug.

-- 
Configure bugmail: http://bugs.winehq.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.



More information about the wine-bugs mailing list