https://sourceware.org/bugzilla/show_bug.cgi?id=29494
--- Comment #2 from Nick Clifton <nickc at redhat dot com> --- Created attachment 14287 --> https://sourceware.org/bugzilla/attachment.cgi?id=14287&action=edit Proposed Patch Hi Angus, Would you mind trying out the uploaded patch ? I think that I have found a way to suppress the check at the end of an executable section, which should be safe since there will not be any following code. (And when the linker combines input executable sections it will make sure that they start on an suitable alignment boundary, so padding will be inserted automatically if needed). Cheers Nick -- You are receiving this mail because: You are on the CC list for the bug.