From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from gnu.wildebeest.org (wildebeest.demon.nl [212.238.236.112]) by sourceware.org (Postfix) with ESMTPS id 291CB3857817 for ; Wed, 8 Sep 2021 21:59:28 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 291CB3857817 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=klomp.org Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=klomp.org Received: from reform (deer0x11.wildebeest.org [172.31.17.147]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gnu.wildebeest.org (Postfix) with ESMTPSA id E2717301FE93; Wed, 8 Sep 2021 23:59:26 +0200 (CEST) Received: by reform (Postfix, from userid 1000) id A16AE2E811C5; Wed, 8 Sep 2021 23:59:26 +0200 (CEST) Date: Wed, 8 Sep 2021 23:59:26 +0200 From: Mark Wielaard To: "Dmitry V. Levin" Cc: elfutils-devel@sourceware.org Subject: Re: [PATCH] src: add -Wno-error=stack-usage= to AM_LDFLAGS Message-ID: References: <20210906005904.GA6598@altlinux.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210906005904.GA6598@altlinux.org> X-Spam-Status: No, score=-5.1 required=5.0 tests=BAYES_00, KAM_DMARC_STATUS, SPF_HELO_NONE, SPF_PASS, TXREP autolearn=ham autolearn_force=no version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on server2.sourceware.org X-BeenThere: elfutils-devel@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Elfutils-devel mailing list List-Unsubscribe: , List-Archive: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 08 Sep 2021 21:59:30 -0000 Hi Dmitry, On Mon, Sep 06, 2021 at 03:59:05AM +0300, Dmitry V. Levin wrote: > While -Wstack-usage= is already excluded from AM_CFLAGS for various > tools in src using *_no_Wstack_usage variables, this obviously does not > help when LTO is enabled, so add -Wno-error=stack-usage= to AM_LDFLAGS > for linking tools in src. I didn't know it worked to pass warning flags to the compiler during linking for lto. That is really useful in this case. Of course maybe we really should get rid of the unbounded stack allocations in the first place. But till we do, we need this to build with lto enabled. Please apply. Thanks, Mark