Message-id: <e1qt2rj-00000000pnx-3...@drop.zugschlus.de> In-reply-to: <529d4728-d26f-43ff-a957-54b29652d...@neoquasar.org> References: <529d4728-d26f-43ff-a957-54b29652d...@neoquasar.org>
Hello, I encountered a similar sudo issue with Bookworm installed on a Vortex86DX3 CPU based embedded computer. Vortex86 series chips are less known x86 CPUs, that are manufactured and are available on-the-market still today. Their type detection in Linux Kernel was implemented in 2021. They are 32-bit only and they are stated not to be fully i686 compatible CPUs. See for example: https://www.icop.com.tw/news/858#! I was able to make sudo (and visudo) executable working on this CPU, by recompiling the sudo-1.9.15p5 source code package on the target with manually removed "-fcf_protection" hardening option. I did not yet met any other program in Bookworm's i386 release having similar "illegal instruction" issue. So, by using a recompiled sudo, Bookworm seems to work on Vortex86DX3. Regards, Laszlo