I don't know enough about grsecurity patch to tell you exactly how to do this, but if it has an option of supporting trampoline code which i assume it does but maybe is disabled by default, enable it and recompile the kernel. This should solve the problem.
It does have an option to enable trampoline code, but it just tires to detect when that is the case. Maybe it fails in this case.
One thing it does have an option to do is to mark a given binary as "not for stack protection". Stack protection will not be performed on that binary.
RTFM for more details, I'm afraid.
Hope this helps, Gilad
-- Shachar Shemesh Open Source integration consultant Home page & resume - http://www.shemesh.biz/
================================================================= To unsubscribe, send mail to [EMAIL PROTECTED] with the word "unsubscribe" in the message body, e.g., run the command echo unsubscribe | mail [EMAIL PROTECTED]