On Thu, Apr 30, 2015 at 01:39:50PM +0900, Simon Horman wrote: > Hi Kevin, > > On Tue, Apr 28, 2015 at 08:50:19PM +0800, Kevin Hao wrote: > > If the GCC's stack protection is enabled by default, the purgatory will > > also be built with this option. But it makes no sense to enable this > > for the purgatory code, and would cause error when we are trying to > > relocate the purgatory codes because symbol like __stack_chk_fail is > > unresolved. Instead of disabling this for some archs specifically, > > disable it for all the archs. > > > > Signed-off-by: Kevin Hao <kexin.hao at windriver.com> > > This seems like a reasonable change to me, however, it does > not apply cleanly to the kexec tree on kernel.org which I maintain. > > https://git.kernel.org/pub/scm/utils/kernel/kexec/kexec-tools.git > > Could you rebase and repost? I have now realised that Mike Frysinger has posted a similar, slightly more comprehensive, patch which I have now applied. Could you see if it addresses the problem you are seeing? It is the following commit in the above tree: 4a837c9a19f9 purgatory: force PIC/PIE/SSP off