http://gcc.gnu.org/bugzilla/show_bug.cgi?id=45394
--- Comment #8 from Eric Botcazou ebotcazou at gcc dot gnu.org 2010-10-06
14:25:11 UTC ---
Author: ebotcazou
Date: Wed Oct 6 14:25:04 2010
New Revision: 165030
URL: http://gcc.gnu.org/viewcvs?root=gccview=revrev=165030
Log:
PR
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=45394
Eric Botcazou ebotcazou at gcc dot gnu.org changed:
What|Removed |Added
Status|ASSIGNED|RESOLVED
IMHO this is a bit silly you are denying users of debian security
features found elsewhere (at least found elsewhere in their
packages...). The point is to make the compiler hardened by default
not only packages compiled and packaged for debian.
Please see http://wiki.debian.org/Hardening and
LAST_UPDATED: Obtained from SVN: tags/gcc_4_4_5_release revision 164871
Target: mips-linux-gnu
gcc version 4.4.5 (Debian 4.4.5-2)
Native configuration is mips-unknown-linux-gnu
=== g++ tests ===
Running target unix
FAIL: g++.dg/ipa/iinline-1.C scan-ipa-dump inline
LAST_UPDATED: Obtained from SVN: tags/gcc_4_4_5_release revision 164871
Target: mipsel-linux-gnu
gcc version 4.4.5 (Debian 4.4.5-2)
Native configuration is mipsel-unknown-linux-gnu
=== g++ tests ===
Running target unix
FAIL: g++.dg/ipa/iinline-1.C scan-ipa-dump inline
LAST_UPDATED: Obtained from SVN: tags/gcc_4_4_5_release revision 164871
Target: s390-linux-gnu
gcc version 4.4.5 (Debian 4.4.5-2)
Native configuration is s390-ibm-linux-gnu
=== g++ tests ===
Running target unix
FAIL: tmpdir-g++.dg-struct-layout-1/t024 cp_compat_y_tst.o compile
6 matches
Mail list logo