https://sourceware.org/bugzilla/show_bug.cgi?id=29494

--- Comment #2 from Nick Clifton <nickc at redhat dot com> ---
Created attachment 14287
  --> https://sourceware.org/bugzilla/attachment.cgi?id=14287&action=edit
Proposed Patch

Hi Angus,

  Would you mind trying out the uploaded patch ?

  I think that I have found a way to suppress the check at the end of an
executable section, which should be safe since there will not be any following
code.  (And when the linker combines input executable sections it will make
sure that they start on an suitable alignment boundary, so padding will be
inserted automatically if needed).

Cheers
  Nick

-- 
You are receiving this mail because:
You are on the CC list for the bug.

Reply via email to