Message-id: <e1qt2rj-00000000pnx-3...@drop.zugschlus.de>
In-reply-to: <529d4728-d26f-43ff-a957-54b29652d...@neoquasar.org>
References: <529d4728-d26f-43ff-a957-54b29652d...@neoquasar.org>

Hello,
I encountered a similar sudo issue with Bookworm installed on a Vortex86DX3 CPU 
based embedded computer. 
Vortex86 series chips are less known x86 CPUs, that are manufactured and are 
available on-the-market still today. Their type detection in Linux Kernel was 
implemented in 2021. They are 32-bit only and they are stated not to be fully 
i686 compatible CPUs. 
See for example: https://www.icop.com.tw/news/858#! 

I was able to make sudo (and visudo) executable working on this CPU, by 
recompiling the sudo-1.9.15p5 source code package on the target with manually 
removed "-fcf_protection" hardening option.

I did not yet met any other program in Bookworm's i386 release having similar 
"illegal instruction" issue. So, by using a recompiled sudo, Bookworm seems to 
work on Vortex86DX3.

Regards,
Laszlo



Reply via email to