This is the mail archive of the
gcc@gcc.gnu.org
mailing list for the GCC project.
Headsup - New PCH Failures on 3.4.x under Linux-2.6.12
- From: Greg Schafer <gschafer at zip dot com dot au>
- To: gcc at gcc dot gnu dot org
- Date: Wed, 20 Jul 2005 12:26:00 +1000
- Subject: Headsup - New PCH Failures on 3.4.x under Linux-2.6.12
Hi
This is just a headsup for any folks running 3.4.x testsuite under Linux
2.6.12 kernels (stock Linus).
I started seeing new PCH failures after upgrading to this kernel:
http://gcc.gnu.org/ml/gcc-testresults/2005-07/msg01069.html
The cause is due to inclusion of the address space randomization patches
into 2.6.12 ie: probably the same thing that RH previously called
"exec-shield-randomize". The PCH support in GCC-3.4.x is apparently
incompatible with address space randomization. This PR is relevant:
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=14206
and probably this one too:
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=14400
It's possible to disable address space randomization via sysctl or simply:
echo 0 > /proc/sys/kernel/randomize_va_space
GCC-4.x appears unaffected.
Regards
Greg
--
http://www.diy-linux.org/