http://bugs.winehq.org/show_bug.cgi?id=1955
mike@theoretic.com changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |julliard@winehq.com Status|UNCONFIRMED |NEW Ever Confirmed| |1 Summary|error on application install|Linker script to reserve PE |of AutoCAD 2000 ( R15) |load address range required | |(exec-shield, prelink)
------- Additional Comments From mike@theoretic.com 2004-23-01 10:02 ------- Try switching off exec shield with the following commands (as root)
echo 0 >/proc/sys/kernel/exec-shield echo 0 >/proc/sys/kernel/exec-shield-randomize
Since AJ switched off the BSS array hack, we are back to square one with execshield and prelink DSO load address randomization. One potential fix is to use the MEMORY linker script directive to reserve an address range (but not swap space).
I've experimented with this, and was able to succesfully link a minimal test binary, but unfortunately it segfaulted on initialization, apparently inside the rtld with no backtrace. I've emailed the binutils list, but as yet got no response. Probably somebody more skilled than me could make this work. I'll try again soon.
CCing Alexandre.
Please dupe exec-shield and prelink problems to this bug.