6cf94a9
No longer seems required to prevent randomization from breaking by forcing exhausting the address space and then targeting a known address based on the lower bound. More testing / research required. I don't have time to spare for x86_64 though. I think it's fairly likely that stack gap changes are responsible for making it no longer required. It would be good to figure out what's happening via /proc/self/maps.