From: Juho Snellman Date: Wed, 31 Aug 2005 13:12:17 +0000 (+0000) Subject: 0.9.4.16: X-Git-Url: http://repo.macrolet.net/gitweb/?a=commitdiff_plain;h=2c6105acde389717317e725854d7dd3b3d6ece5c;hp=2c6105acde389717317e725854d7dd3b3d6ece5c;p=sbcl.git 0.9.4.16: "I feel safer already". Add a horrible kludge to work around the new Linux kernel security features for randomizing memory maps. * Before setting up the memory maps, check whether we're running on 2.6 or newer. If so, check where the ADDR_NO_RANDOMIZE personality flag is set. If not, set the flag and re-execute the program. * Follow the /proc/self/exe symlink to find out what binary we should be executing. (Can't execute /proc/self/exe directly, since some proc-groveling tools will then show the name of the process as "exe"). * For more details, see the sbcl-devel threads "Memory randomization problems coming" and "memory randomization patch" in 2005-08. ---