Peter Riocreux <par+wine_devel(a)silistix.com> writes:
I am intermittently trying to get Wine to play nicely with a big EDA tool, and it is doing not too badly today with the 20040309 snapshot on Fedora Core 1.
The thing that I think is stopping it working is that whatever is done to stack-shield by the prepending "setarch i386" on invocation is not inherited by the .exe that the program calls. Net result is that I get the "..... security-patched kernel ?" error message from the child process instead of the parent. Progress of a sort.
Is there anything, short of turning off exec-shield entirely, that can be done about this?
Test shows that the system behaves the same after I issue: echo 0 > /proc/sys/kernel/exec-shield echo 0 > /proc/sys/kernel/exec-shield-randomize cat /proc/sys/kernel/exec-shield and cat /proc/sys/kernel/exec-shield-randomize both give a 0 back.now. I am a bit mystified by that. Is the "..... security-patched kernel ?" message that is still there not caused by exec-shield? Peter