From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from gnu.wildebeest.org (gnu.wildebeest.org [45.83.234.184]) by sourceware.org (Postfix) with ESMTPS id C3B753858425 for ; Thu, 8 Sep 2022 14:15:40 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org C3B753858425 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=klomp.org Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=klomp.org Received: from tarox.wildebeest.org (83-87-18-245.cable.dynamic.v4.ziggo.nl [83.87.18.245]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by gnu.wildebeest.org (Postfix) with ESMTPSA id A0E5E30067AB; Thu, 8 Sep 2022 16:15:39 +0200 (CEST) Received: by tarox.wildebeest.org (Postfix, from userid 1000) id 2FCF84024143; Thu, 8 Sep 2022 16:15:39 +0200 (CEST) From: Mark Wielaard To: dwz@sourceware.org, =?UTF-8?q?Martin=20Li=C5=A1ka?= Cc: Mark Wielaard Subject: Re: [PATCH] Fix executable stack warning from linker Date: Thu, 8 Sep 2022 16:15:20 +0200 Message-Id: <166264633949.5923.13218526193502674531.b4-ty@klomp.org> X-Mailer: git-send-email 2.18.4 In-Reply-To: <3456793b-7b76-6825-0d14-0b4cfee42535@suse.cz> References: <3456793b-7b76-6825-0d14-0b4cfee42535@suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-5.3 required=5.0 tests=BAYES_00,JMQ_SPF_NEUTRAL,KAM_DMARC_STATUS,SPF_HELO_NONE,SPF_PASS,TXREP,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: On Wed, 7 Sep 2022 21:57:26 +0200, Martin Liška wrote: > Fixes: > missing .note.GNU-stack section implies executable stack > Applied, thanks! [1/1] Fix executable stack warning from linker commit: 2684202c05bccb3702a6bafdf8b80f69f278bb9c Best regards, -- Mark Wielaard