On Jan 30, 2008 6:45 AM, Ingo Molnar <[EMAIL PROTECTED]> wrote: > - PIE/brk randomization. Not a single regression happened due to this so > far (and it's been in x86.git for months) - it seems exec-shield has > rooted out stuff years ago - but we'll see. Details in the patch. It's > easily revertable in any case.
cc503c1b "x86: PIE executable randomization" doesn't boot on my Ubuntu Feisty Fawn Intel Core2 system. I get numerous segfaults before getting a (initramfs) busybox shell. A similar bug was reported much earlier: http://lkml.org/lkml/2007/7/20/421 Sadly, reverting this (or all of the PIE patches) results in a lot of conflicts now with git-revert too failing, mainly in arch/x86/mm/mmap_64.c. -- Amit Shah http://www.amitshah.net/ -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/