Peter Riocreux par+wine_devel@silistix.com writes:
I am intermittently trying to get Wine to play nicely with a big EDA tool, and it is doing not too badly today with the 20040309 snapshot on Fedora Core 1.
The thing that I think is stopping it working is that whatever is done to stack-shield by the prepending "setarch i386" on invocation is not inherited by the .exe that the program calls. Net result is that I get the "..... security-patched kernel ?" error message from the child process instead of the parent. Progress of a sort.
Is there anything, short of turning off exec-shield entirely, that can be done about this?
Test shows that the system behaves the same after I issue:
echo 0 > /proc/sys/kernel/exec-shield echo 0 > /proc/sys/kernel/exec-shield-randomize
cat /proc/sys/kernel/exec-shield
and
cat /proc/sys/kernel/exec-shield-randomize
both give a 0 back.now.
I am a bit mystified by that. Is the "..... security-patched kernel ?" message that is still there not caused by exec-shield?
Peter