Ik zie ook wat leuke dingen in de release notes:
* MIPS targets now support the -fstack-protector option.
Uit de handleiding:
-fstack-protector
Emit extra code to check for buffer overflows, such as stack smashing
attacks.
This is done by adding a guard variable to functions with vulnerable
Thanks for your understandable summary.
On Tue, Mar 11, 2008 at 2:22 PM, Brian Dessent [EMAIL PROTECTED] wrote:
There was one additional solution discussed: disable libtool's checking
of dlopen() for newlib targets:
http://gcc.gnu.org/ml/gcc-patches/2007-11/msg01560.html I think
everyone
--with-gnu-as --with-gnu-ld --with-newlib
--with-headers=/gcc/newlib-1.16.0/newlib/libc/include --disable-shared
--disable-libssp --enable-languages=c,c++
I searched for this error and found:
http://gcc.gnu.org/ml/gcc/2007-09/msg00421.html
Wasn't this patched? How do I fix this?
Regards,
Hans Kester
-as --with-gnu-ld --with-newlib
--with-headers=/gcc/newlib-1.16.0/newlib/libc/include --disable-shared
--disable-libssp --enable-languages=c,c++
I searched for this error and found:
http://gcc.gnu.org/ml/gcc/2007-09/msg00421.html
Wasn't this patched? How do I fix this?
Regards,
Hans Kester
Is there any reason why this contribution from Mikkel Krautz is still
not in the current sources?
http://gcc.gnu.org/ml/gcc-patches/2005-03/msg01592.html
Hans Kester
===
This email and any files transmitted with it are confidential and intended
solely for the use