On Jan 30, 2008 6:45 AM, Ingo Molnar <[EMAIL PROTECTED]> wrote:

> - PIE/brk randomization. Not a single regression happened due to this so
>   far (and it's been in x86.git for months) - it seems exec-shield has
>   rooted out stuff years ago - but we'll see. Details in the patch. It's
>   easily revertable in any case.

cc503c1b "x86: PIE executable randomization" doesn't boot on my Ubuntu
Feisty Fawn Intel Core2 system.

I get numerous segfaults before getting a (initramfs) busybox shell. A
similar bug was reported much earlier:

http://lkml.org/lkml/2007/7/20/421

Sadly, reverting this (or all of the PIE patches) results in a lot of
conflicts now with git-revert too failing, mainly in
arch/x86/mm/mmap_64.c.

-- 
Amit Shah
http://www.amitshah.net/
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to