0.9.4.16:
"I feel safer already".
Add a horrible kludge to work around the new Linux kernel
security features for randomizing memory maps.
* Before setting up the memory maps, check whether we're running
on 2.6 or newer. If so, check where the ADDR_NO_RANDOMIZE
personality flag is set. If not, set the flag and re-execute
the program.
* Follow the /proc/self/exe symlink to find out what binary
we should be executing. (Can't execute /proc/self/exe
directly, since some proc-groveling tools will then show
the name of the process as "exe").
* For more details, see the sbcl-devel threads "Memory randomization
problems coming" and "memory randomization patch" in 2005-08.