On Wed, 31 May 2006 07:26:37 +0200, Pavel Troller wrote:
The machines are running very similar kernels. Both are hardened with exec-shield, but even disabling it on a 64bit by 'echo 0 >/proc/sys/kernel/exec-shield' doesn't help. The 32bit works even with exec-shield enabled (and doesn't print the no-exec message).
As a hack you can change the code so every range of memory that is mapped is mapped executable.
thanks -mike