public inbox for gentoo-amd64@lists.gentoo.org
 help / color / mirror / Atom feed
* [gentoo-amd64] gcc 4.1.1 access violation
@ 2006-10-27 23:20 Harry Holt
  2006-10-28  5:02 ` [gentoo-amd64] " Duncan
  0 siblings, 1 reply; 13+ messages in thread
From: Harry Holt @ 2006-10-27 23:20 UTC (permalink / raw
  To: gentoo-amd64

[-- Attachment #1: Type: text/plain, Size: 1260 bytes --]

Arrgh!  It did it again!  I have no idea how to fix this.  GCC will not
compile.  Well... I think it compiles, but then dies at the end.  I tried
running through the install/postinst/qmerge steps in ebuild, but that
doesn't seem to work (everything is still broken).  revdep-rebuild wants to
emerge GCC first - there are several things broken, including libfbdirect.

gzipping man page: std::wstring.3
gzipping man page: _var_tmp_portage_gcc-4.1.1_work_gcc-4.1.1_.3
>>> Completed installing gcc-4.1.1 into /var/tmp/portage/gcc-4.1.1/image/

--------------------------- ACCESS VIOLATION SUMMARY
---------------------------
LOG FILE = "/var/log/sandbox/sandbox-sys-devel_-_gcc-4.1.1-30225.log"

unlink:    /usr/lib64/crt1.o
open_wr:   /usr/lib64/crt1.o
unlink:    /usr/lib64/crt1.o
--------------------------------------------------------------------------------

maybe my use flags?

# emerge -pv gcc

These are the packages that would be merged, in order:

Calculating dependencies... done!
[ebuild   R   ] sys-devel/gcc-4.1.1  USE="doc fortran gcj gtk nls objc
(-altivec) -bootstrap -build (-hardened) -ip28 -ip32r10k -mudflap
(-multilib) -multislot (-n32) (-n64) -nocxx -objc++ -objc-gc -test -vanilla"
0 kB

How do I troubleshoot this?

-- 
Harry Holt, PMP

[-- Attachment #2: Type: text/html, Size: 1485 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

* [gentoo-amd64]  Re: gcc 4.1.1 access violation
  2006-10-27 23:20 [gentoo-amd64] gcc 4.1.1 access violation Harry Holt
@ 2006-10-28  5:02 ` Duncan
  2006-10-28  9:08   ` Hemmann, Volker Armin
  0 siblings, 1 reply; 13+ messages in thread
From: Duncan @ 2006-10-28  5:02 UTC (permalink / raw
  To: gentoo-amd64

"Harry Holt" <harryholt@gmail.com> posted
7c8072a00610271620o15838e70of02ad445af47849d@mail.gmail.com, excerpted
below, on  Fri, 27 Oct 2006 19:20:39 -0400:

> Arrgh!  It did it again!  I have no idea how to fix this.  GCC will not
> compile.  Well... I think it compiles, but then dies at the end.  I tried
> running through the install/postinst/qmerge steps in ebuild, but that
> doesn't seem to work (everything is still broken).  revdep-rebuild wants
> to emerge GCC first - there are several things broken, including
> libfbdirect.
> 
> gzipping man page: std::wstring.3
> gzipping man page: _var_tmp_portage_gcc-4.1.1_work_gcc-4.1.1_.3
>>>> Completed installing gcc-4.1.1 into /var/tmp/portage/gcc-4.1.1/image/

OK, yes, it finishes the "fakeinstall" step here, which is after the
compile step, so it's done with that.

> 
> --------------------------- ACCESS VIOLATION SUMMARY
> ---------------------------
> LOG FILE = "/var/log/sandbox/sandbox-sys-devel_-_gcc-4.1.1-30225.log"
> 
> unlink:    /usr/lib64/crt1.o
> open_wr:   /usr/lib64/crt1.o
> unlink:    /usr/lib64/crt1.o
> --------------------------------------------------------------------------------

Sandbox violation.  Sandbox is a protection mechanism that is supposed to
keep the ebuild from overwriting anything on the main system during the
compile and install steps, which should be done to temporary locations,
prior to the qmerge to the main system.

$equery b crt1.o
[ Searching for file(s) crt1.o in *... ]
sys-libs/glibc-2.5 (/usr/lib32/crt1.o)
sys-libs/glibc-2.5 (/usr/lib64/crt1.o)

OK, so that file belongs to glibc, not gcc.  Why is gcc trying to unlink
it, then write to it, then unlink it again?  That's strange.

You /could/ try turning sandbox off (in FEATURES).  That's a bit dangerous
by itself, but if you turn userpriv on at the same time, it should be
fairly safe.  YOu can try it but I'm guessing it'll still fail, as the
portage user won't (for good reason!) have privs to delete the file either.

If userpriv doesn't work, you can try without either sandbox or userpriv,
just to be sure.  HOWEVER, I'd be very sure I had a backup of that file
and preferably my system first, just in case.  Additionally, messing with
glibc stuff is asking to see your system crash, so I'd not recommend
running anything else critical during this test.  Actually, I'd not
recommend running it at all, without first checking bugzilla and filing a
bug on it if necessary.  If a toolchain/gcc dev tells you to try it without
sandbox and userpriv, /then/ I'd feel a bit safer with it.  I might
personally try it here anyway, but I wouldn't feel right recommending that
others try it.

In any case, even if FEATURES="-sandbox userpriv" works, it's still worth
checking to see if a bug has been filed and filing one yourself if not. 
If it's OK to do, the devs might simply disable sandbox checking for that
file.  However, that doesn't look to me like something it should be
touching, in which case they need to figure out why it's happening and fix
the problem, so others don't run into it.

-- 
Duncan - List replies preferred.   No HTML msgs.
"Every nonfree program has a lord, a master --
and if you use the program, he is your master."  Richard Stallman

-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [gentoo-amd64]  Re: gcc 4.1.1 access violation
  2006-10-28  5:02 ` [gentoo-amd64] " Duncan
@ 2006-10-28  9:08   ` Hemmann, Volker Armin
  2006-10-28 19:15     ` Duncan
                       ` (2 more replies)
  0 siblings, 3 replies; 13+ messages in thread
From: Hemmann, Volker Armin @ 2006-10-28  9:08 UTC (permalink / raw
  To: gentoo-amd64

On Saturday 28 October 2006 07:02, Duncan wrote:

> You /could/ try turning sandbox off (in FEATURES).  That's a bit dangerous
> by itself, but if you turn userpriv on at the same time, it should be
> fairly safe.  

NO!

Just no!

Never ever turn of sandbox. Without sandbox, files can end everywhere in your 
installation, destroying stuff, make apps segfault randomly - and the worst, 
portage does not know about them.

Never ever turn of sandbox. And never tell others to do so.
btw
*  sys-devel/gcc
      Latest version available: 4.1.1-r1
      Latest version installed: 4.1.1-r1

and I have sandbox enabled. So it is not a sandbox problem. Something else is 
broken on his system.
-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 13+ messages in thread

* [gentoo-amd64]  Re: gcc 4.1.1 access violation
  2006-10-28  9:08   ` Hemmann, Volker Armin
@ 2006-10-28 19:15     ` Duncan
  2006-10-28 22:54     ` Harry Holt
  2006-10-30 18:57     ` Francesco Talamona
  2 siblings, 0 replies; 13+ messages in thread
From: Duncan @ 2006-10-28 19:15 UTC (permalink / raw
  To: gentoo-amd64

"Hemmann, Volker Armin" <volker.armin.hemmann@tu-clausthal.de> posted
200610281108.21396.volker.armin.hemmann@tu-clausthal.de, excerpted below,
on  Sat, 28 Oct 2006 11:08:21 +0200:

> On Saturday 28 October 2006 07:02, Duncan wrote:
> 
>> You /could/ try turning sandbox off (in FEATURES).  That's a bit
>> dangerous by itself, but if you turn userpriv on at the same time, it
>> should be fairly safe.
> 
> NO!
> 
> Just no!
> 
> Never ever turn of sandbox. Without sandbox, files can end everywhere in
> your installation, destroying stuff, make apps segfault randomly - and the
> worst, portage does not know about them.
> 
> Never ever turn of sandbox. And never tell others to do so. btw

Wow, and I thought /I/ was a bit strict on that!  FWIW, you are right, to
a point.  Sandbox is there as a protection measure and turning it off can
be dangerous, as I said.  However, it's /not/ the end of the world! 
Ebuilds can and routinely do turn it off or tell it to ignore specific
parts of the filesystem when it gets in the way of what the build needs to
do.  Sandbox is just there to keep the unexpected from happening.

Anyway, userpriv works quite well too, as it should, because it uses the
same user and group file protection Unix systems have historically used. 
If the ebuild in userpriv mode can delete system files or otherwise screw
up the system, something's wrong and the system is in pretty bad shape
security-wise already, because regular users SHOULDN'T be able to mess
with the system, or with other user's files, unless the other user set it
up specifically to allow that.

The real danger therefore is turning BOTH userpriv and sandbox off, which
is why I said I couldn't recommend it, and stressed making sure things
were backed up if one tried.  Even then, it's something devs routinely say
to do, hopefully after they've taken a look at the sandbox violation log
and verified it's not going to do anything stupid.

I also said it shouldn't be a sandbox problem (everybody has it enabled
unless they've turned it off deliberately, as it's on by default, and the
fact that others have gcc installed and it's not a widely known issue
means it's not a normal sandbox problem), but that IS the obvious direct
issue in this case, or there'd not be that violation log.  I ALSO said
it's risky to turn off, particularly as the file it's trying to access
doesn't belong to the package in question (gcc) but rather to a different
vital system package, glibc.  However, as long as userpriv is on, it's not
an undue risk, and if damage occurs, there are bigger problems to worry
about.

So anyway, calm down.  userpriv is exactly the same level of system
protection normally in place, so as long as it's on, there shouldn't be
any real risk.  Only when BOTH userpriv and sandbox are off, is there a
serious risk, and I specifically said I did NOT recommend that, at least
until a dev takes a look at it and says go ahead.

-- 
Duncan - List replies preferred.   No HTML msgs.
"Every nonfree program has a lord, a master --
and if you use the program, he is your master."  Richard Stallman

-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [gentoo-amd64] Re: gcc 4.1.1 access violation
  2006-10-28  9:08   ` Hemmann, Volker Armin
  2006-10-28 19:15     ` Duncan
@ 2006-10-28 22:54     ` Harry Holt
  2006-10-29  3:41       ` Harry Holt
  2006-10-30 18:57     ` Francesco Talamona
  2 siblings, 1 reply; 13+ messages in thread
From: Harry Holt @ 2006-10-28 22:54 UTC (permalink / raw
  To: gentoo-amd64

[-- Attachment #1: Type: text/plain, Size: 1223 bytes --]

Well, I'm trying with gcc 4.1.1, not 4.1.1-r1 (it's masked), but if I can't
get this to work I'll try that one.  The problem is the 3-hour compile until
the error shows up.  I'm still unclear why the ebuild postinst / qmerge does
not work - it doesn't seem to put everything in place like it should (still
have broken libs, etc.).

... HH

On 10/28/06, Hemmann, Volker Armin <volker.armin.hemmann@tu-clausthal.de>
wrote:
>
> On Saturday 28 October 2006 07:02, Duncan wrote:
>
> > You /could/ try turning sandbox off (in FEATURES).  That's a bit
> dangerous
> > by itself, but if you turn userpriv on at the same time, it should be
> > fairly safe.
>
> NO!
>
> Just no!
>
> Never ever turn of sandbox. Without sandbox, files can end everywhere in
> your
> installation, destroying stuff, make apps segfault randomly - and the
> worst,
> portage does not know about them.
>
> Never ever turn of sandbox. And never tell others to do so.
> btw
> *  sys-devel/gcc
>       Latest version available: 4.1.1-r1
>       Latest version installed: 4.1.1-r1
>
> and I have sandbox enabled. So it is not a sandbox problem. Something else
> is
> broken on his system.
> --
> gentoo-amd64@gentoo.org mailing list
>
>


-- 
Harry Holt, PMP

[-- Attachment #2: Type: text/html, Size: 1711 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [gentoo-amd64] Re: gcc 4.1.1 access violation
  2006-10-28 22:54     ` Harry Holt
@ 2006-10-29  3:41       ` Harry Holt
  2006-10-29  3:51         ` Hemmann, Volker Armin
  0 siblings, 1 reply; 13+ messages in thread
From: Harry Holt @ 2006-10-29  3:41 UTC (permalink / raw
  To: gentoo-amd64

[-- Attachment #1: Type: text/plain, Size: 1533 bytes --]

Hmmm... Same error with 4.1.1-r1, so... sandbox issue?  Why would the
install try to mess with crt1.o?  It's  not on the list of files for GCC.


On 10/28/06, Harry Holt <harryholt@gmail.com> wrote:
>
> Well, I'm trying with gcc 4.1.1, not 4.1.1-r1 (it's masked), but if I
> can't get this to work I'll try that one.  The problem is the 3-hour compile
> until the error shows up.  I'm still unclear why the ebuild postinst /
> qmerge does not work - it doesn't seem to put everything in place like it
> should (still have broken libs, etc.).
>
> ... HH
>
> On 10/28/06, Hemmann, Volker Armin <volker.armin.hemmann@tu-clausthal.de>
> wrote:
> >
> > On Saturday 28 October 2006 07:02, Duncan wrote:
> >
> > > You /could/ try turning sandbox off (in FEATURES).  That's a bit
> > dangerous
> > > by itself, but if you turn userpriv on at the same time, it should be
> > > fairly safe.
> >
> > NO!
> >
> > Just no!
> >
> > Never ever turn of sandbox. Without sandbox, files can end everywhere in
> > your
> > installation, destroying stuff, make apps segfault randomly - and the
> > worst,
> > portage does not know about them.
> >
> > Never ever turn of sandbox. And never tell others to do so.
> > btw
> > *  sys-devel/gcc
> >       Latest version available: 4.1.1-r1
> >       Latest version installed: 4.1.1-r1
> >
> > and I have sandbox enabled. So it is not a sandbox problem. Something
> > else is
> > broken on his system.
> > --
> > gentoo-amd64@gentoo.org mailing list
> >
> >
>
>
> --
> Harry Holt, PMP




-- 
Harry Holt, PMP

[-- Attachment #2: Type: text/html, Size: 2477 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [gentoo-amd64] Re: gcc 4.1.1 access violation
  2006-10-29  3:41       ` Harry Holt
@ 2006-10-29  3:51         ` Hemmann, Volker Armin
  2006-10-29  4:01           ` Harry Holt
  0 siblings, 1 reply; 13+ messages in thread
From: Hemmann, Volker Armin @ 2006-10-29  3:51 UTC (permalink / raw
  To: gentoo-amd64

On Sunday 29 October 2006 04:41, Harry Holt wrote:
> Hmmm... Same error with 4.1.1-r1, so... sandbox issue?  Why would the
> install try to mess with crt1.o?  It's  not on the list of files for GCC.

I don't think so. How about opening a bug?
-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [gentoo-amd64] Re: gcc 4.1.1 access violation
  2006-10-29  3:51         ` Hemmann, Volker Armin
@ 2006-10-29  4:01           ` Harry Holt
  0 siblings, 0 replies; 13+ messages in thread
From: Harry Holt @ 2006-10-29  4:01 UTC (permalink / raw
  To: gentoo-amd64

[-- Attachment #1: Type: text/plain, Size: 450 bytes --]

Bug 153228 has been added to the database

On 10/28/06, Hemmann, Volker Armin <volker.armin.hemmann@tu-clausthal.de>
wrote:
>
> On Sunday 29 October 2006 04:41, Harry Holt wrote:
> > Hmmm... Same error with 4.1.1-r1, so... sandbox issue?  Why would the
> > install try to mess with crt1.o?  It's  not on the list of files for
> GCC.
>
> I don't think so. How about opening a bug?
> --
> gentoo-amd64@gentoo.org mailing list
>
>


-- 
Harry Holt, PMP

[-- Attachment #2: Type: text/html, Size: 859 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

* [gentoo-amd64] Re: gcc 4.1.1 access violation
  2006-10-28  9:08   ` Hemmann, Volker Armin
  2006-10-28 19:15     ` Duncan
  2006-10-28 22:54     ` Harry Holt
@ 2006-10-30 18:57     ` Francesco Talamona
  2006-10-30 19:19       ` Hemmann, Volker Armin
  2 siblings, 1 reply; 13+ messages in thread
From: Francesco Talamona @ 2006-10-30 18:57 UTC (permalink / raw
  To: gentoo-amd64

On Saturday 28 October 2006 11:08, Hemmann, Volker Armin wrote:
> On Saturday 28 October 2006 07:02, Duncan wrote:
> > You /could/ try turning sandbox off (in FEATURES).  That's a bit
> > dangerous by itself, but if you turn userpriv on at the same time,
> > it should be fairly safe.
>
> NO!
>
> Just no!
>
> Never ever turn of sandbox. Without sandbox, files can end everywhere
> in your installation, destroying stuff, make apps segfault randomly -
> and the worst, portage does not know about them.
>
> Never ever turn of sandbox. And never tell others to do so.
> btw
> *  sys-devel/gcc
>       Latest version available: 4.1.1-r1
>       Latest version installed: 4.1.1-r1
>
> and I have sandbox enabled. So it is not a sandbox problem. Something
> else is broken on his system.

I'm running -sandbox since 09-June-2005, am I in such a danger?
Shouldn't I have experienced destructive issues in the meantime?
FEATURES="candy ccache buildpkg fixpackages -sandbox"

I can't even remember why I put -sandbox feature, it was to compile 
something I can't reckon...

ciao
	Francesco
-- 
Linux Version 2.6.18-gentoo-r1, Compiled #1 PREEMPT Wed Oct 18 22:52:55 
CEST 2006
One 1GHz AMD Athlon 64 Processor, 2GB RAM, 2003.96 Bogomips Total
aemaeth
-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [gentoo-amd64] Re: gcc 4.1.1 access violation
  2006-10-30 18:57     ` Francesco Talamona
@ 2006-10-30 19:19       ` Hemmann, Volker Armin
  2006-10-30 19:37         ` Vladimir G. Ivanovic
  2006-10-30 19:52         ` Francesco Talamona
  0 siblings, 2 replies; 13+ messages in thread
From: Hemmann, Volker Armin @ 2006-10-30 19:19 UTC (permalink / raw
  To: gentoo-amd64

On Monday 30 October 2006 19:57, Francesco Talamona wrote:
> On Saturday 28 October 2006 11:08, Hemmann, Volker Armin wrote:
> > On Saturday 28 October 2006 07:02, Duncan wrote:
> > > You /could/ try turning sandbox off (in FEATURES).  That's a bit
> > > dangerous by itself, but if you turn userpriv on at the same time,
> > > it should be fairly safe.
> >
> > NO!
> >
> > Just no!
> >
> > Never ever turn of sandbox. Without sandbox, files can end everywhere
> > in your installation, destroying stuff, make apps segfault randomly -
> > and the worst, portage does not know about them.
> >
> > Never ever turn of sandbox. And never tell others to do so.
> > btw
> > *  sys-devel/gcc
> >       Latest version available: 4.1.1-r1
> >       Latest version installed: 4.1.1-r1
> >
> > and I have sandbox enabled. So it is not a sandbox problem. Something
> > else is broken on his system.
>
> I'm running -sandbox since 09-June-2005, am I in such a danger?
> Shouldn't I have experienced destructive issues in the meantime?
> FEATURES="candy ccache buildpkg fixpackages -sandbox"
>

you have experienced it. You just don't see it. Somewhere in your filesystem 
are files, that should not be there. Files, that portage does not know about 
and that won't be removed, when the package gets uninstalled.

If a package does not build with sandbox, it is broken. Open a bug.
-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [gentoo-amd64] Re: gcc 4.1.1 access violation
  2006-10-30 19:19       ` Hemmann, Volker Armin
@ 2006-10-30 19:37         ` Vladimir G. Ivanovic
  2006-10-30 19:52         ` Francesco Talamona
  1 sibling, 0 replies; 13+ messages in thread
From: Vladimir G. Ivanovic @ 2006-10-30 19:37 UTC (permalink / raw
  To: gentoo-amd64

On Mon, 2006-10-30 at 20:19 +0100, Hemmann, Volker Armin wrote:
> Somewhere in your filesystem 
> are files, that should not be there. Files, that portage does not know about 
> and that won't be removed, when the package gets uninstalled.

He can use "findcruft" to locate those files.

        http://forums.gentoo.org/viewtopic-t-254197.html

--- Vladimir

Vladimir G. Ivanovic <vgivanovic@comcast.net>

-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 13+ messages in thread

* [gentoo-amd64] Re: gcc 4.1.1 access violation
  2006-10-30 19:19       ` Hemmann, Volker Armin
  2006-10-30 19:37         ` Vladimir G. Ivanovic
@ 2006-10-30 19:52         ` Francesco Talamona
  2007-02-09 21:06           ` Harry Holt
  1 sibling, 1 reply; 13+ messages in thread
From: Francesco Talamona @ 2006-10-30 19:52 UTC (permalink / raw
  To: gentoo-amd64

On Monday 30 October 2006 20:19, Hemmann, Volker Armin wrote:
> you have experienced it. You just don't see it. Somewhere in your
> filesystem are files, that should not be there. Files, that portage
> does not know about and that won't be removed, when the package gets
> uninstalled.
I ran findcruft some months ago, and it found some cruft around, but 
nothing really dangerous. Of course was impossible to track back every 
mud spot...

> If a package does not build with sandbox, it is broken. Open a bug.
Anyway, I just followed your advice and unset "-sandbox" fom my 
FEATURES. I really don't need it (anymore).

If anything tries to escape its sandbox should be considered potentially 
dangerous, lesson learned. 

Thanks
	Francesco
-- 
Linux Version 2.6.18-gentoo-r1, Compiled #1 PREEMPT Wed Oct 18 22:52:55 
CEST 2006
One 1.8GHz AMD Athlon 64 Processor, 2GB RAM, 3607.13 Bogomips Total
aemaeth
-- 
gentoo-amd64@gentoo.org mailing list



^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [gentoo-amd64] Re: gcc 4.1.1 access violation
  2006-10-30 19:52         ` Francesco Talamona
@ 2007-02-09 21:06           ` Harry Holt
  0 siblings, 0 replies; 13+ messages in thread
From: Harry Holt @ 2007-02-09 21:06 UTC (permalink / raw
  To: gentoo-amd64

[-- Attachment #1: Type: text/plain, Size: 1550 bytes --]

Yikes!  This is still happening with gcc-4.1.1-r3.  Everything else works
fine.  I haven't had any problems with installing and updating.  Today I did
a emerge --update --deep --newuse system.  I noticed GCC at the bottom of
the list, but figured maybe it was an anomaly before.  Still no go.

I'm going to continue to just manually install the files from the sandbox
image, which oddly enough works just fine.  I seem to be the only person
having this problem!

... HH

On 10/30/06, Francesco Talamona <ti.liame@email.it> wrote:
>
> On Monday 30 October 2006 20:19, Hemmann, Volker Armin wrote:
> > you have experienced it. You just don't see it. Somewhere in your
> > filesystem are files, that should not be there. Files, that portage
> > does not know about and that won't be removed, when the package gets
> > uninstalled.
> I ran findcruft some months ago, and it found some cruft around, but
> nothing really dangerous. Of course was impossible to track back every
> mud spot...
>
> > If a package does not build with sandbox, it is broken. Open a bug.
> Anyway, I just followed your advice and unset "-sandbox" fom my
> FEATURES. I really don't need it (anymore).
>
> If anything tries to escape its sandbox should be considered potentially
> dangerous, lesson learned.
>
> Thanks
>         Francesco
> --
> Linux Version 2.6.18-gentoo-r1, Compiled #1 PREEMPT Wed Oct 18 22:52:55
> CEST 2006
> One 1.8GHz AMD Athlon 64 Processor, 2GB RAM, 3607.13 Bogomips Total
> aemaeth
> --
> gentoo-amd64@gentoo.org mailing list
>
>


-- 
Harry Holt, PMP

[-- Attachment #2: Type: text/html, Size: 2053 bytes --]

^ permalink raw reply	[flat|nested] 13+ messages in thread

end of thread, other threads:[~2007-02-09 21:09 UTC | newest]

Thread overview: 13+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2006-10-27 23:20 [gentoo-amd64] gcc 4.1.1 access violation Harry Holt
2006-10-28  5:02 ` [gentoo-amd64] " Duncan
2006-10-28  9:08   ` Hemmann, Volker Armin
2006-10-28 19:15     ` Duncan
2006-10-28 22:54     ` Harry Holt
2006-10-29  3:41       ` Harry Holt
2006-10-29  3:51         ` Hemmann, Volker Armin
2006-10-29  4:01           ` Harry Holt
2006-10-30 18:57     ` Francesco Talamona
2006-10-30 19:19       ` Hemmann, Volker Armin
2006-10-30 19:37         ` Vladimir G. Ivanovic
2006-10-30 19:52         ` Francesco Talamona
2007-02-09 21:06           ` Harry Holt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox