Description of problem: kernel ignores setting of /proc/sys/kernel/exec-shield-randomize There is no apparent way to run without address space randomization leaving us with non-deterministic results in some programs. Version-Release number of selected component (if applicable): 2.4.21-32.ELsmp I read the release notes for the -37 release and it made no mention of a fix for this. How reproducible: always Steps to Reproduce: 1. Write a little test: #include <stdio.h> int main(){ int x; printf("addr of x is %x\n", &x); return 0; } 2. become root and do: # echo 0 > /proc/sys/kernel/exec-shield # echo 0 > /proc/sys/kernel/exec-shield-randomize 3. run test program several times Actual results: # ./a.out addr of x is bfff9f74 # ./a.out addr of x is bfffaa24 # ./a.out addr of x is bfffde74 Expected results: # ./a.out addr of x is bfff9f74 # ./a.out addr of x is bfff9f74 # ./a.out addr of x is bfff9f74 (or some other non-changing address) Additional info: FYI: The exec-shield-randomize appears to have been replaced by randomize_va_space in Fedora Core 4. There, when I do echo 0 > /proc/sys/kernel/randomize_va_space I get expected results.
Which arch are you reporting this against (x86 or x86_64)?
x86 aka ia32
This bug is filed against RHEL 3, which is in maintenance phase. During the maintenance phase, only security errata and select mission critical bug fixes will be released for enterprise products. Since this bug does not meet that criteria, it is now being closed. For more information of the RHEL errata support policy, please visit: http://www.redhat.com/security/updates/errata/ If you feel this bug is indeed mission critical, please contact your support representative. You may be asked to provide detailed information on how this bug is affecting you.