Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump binutils to version 2.39 #201

Closed
dileks opened this issue Aug 15, 2022 · 0 comments · Fixed by #202
Closed

Bump binutils to version 2.39 #201

dileks opened this issue Aug 15, 2022 · 0 comments · Fixed by #202

Comments

@dileks
Copy link
Contributor

dileks commented Aug 15, 2022

From the release-notes:

This release contains numerous bug fixes, and also the following new
features:

  * The ELF linker will now generate a warning message if the stack is made
    executable.  Similarly it will warn if the output binary contains a
    segment with all three of the read, write and execute permission
    bits set.  These warnings are intended to help developers identify
    programs which might be vulnerable to attack via these executable
    memory regions.

    The warnings are enabled by default but can be disabled via a command
    line option.  It is also possible to build a linker with the warnings
    disabled, should that be necessary.
    
  * The ELF linker now supports a --package-metadata option that allows
    embedding a JSON payload in accordance to the Package Metadata
    specification. 

  * In linker scripts it is now possible to use TYPE=<type> in an output
    section description to set the section type value.

  * The objdump program now supports coloured/colored syntax
    highlighting of its disassembler output for some architectures.
    (Currently: AVR, RiscV, s390, x86, x86_64).

  * The nm program now supports a --no-weak/-W option to make it ignore
    weak symbols.

  * The readelf and objdump programs now support a -wE option to prevent
    them from attempting to access debuginfod servers when following
    links.

  * The objcopy program's --weaken, --weaken-symbol, and
    --weaken-symbols options now works with unique symbols as well.

sha256 checksums (only tar-xz listed):

    645c25f563b8adc0a81dbd6a41cffbf4d37083a382e02d5d3df4f65c09516d00  binutils-2.39.tar.xz
    1b63c8b51f3e7762bdcd51985deff1e66249b5cda0e849ef960ce1495320c932  binutils-2.39.tar.xz.sig

[1] https://sourceware.org/pipermail/binutils/2022-August/122246.html

nathanchance added a commit to nathanchance/tc-build that referenced this issue Aug 15, 2022
Qualified with:

  $ ./build-binutils.py

Closes: ClangBuiltLinux#201
Signed-off-by: Nathan Chancellor <nathan@kernel.org>
Disconnnected0 pushed a commit to a3-Prjkt/a3-llvmbuild that referenced this issue Aug 17, 2022
Qualified with:

  $ ./build-binutils.py

Closes: ClangBuiltLinux/tc-build#201
Signed-off-by: Nathan Chancellor <nathan@kernel.org>
XSans0 pushed a commit to XSans0/clang-build that referenced this issue Aug 24, 2022
Qualified with:

  $ ./build-binutils.py

Closes: ClangBuiltLinux/tc-build#201
Signed-off-by: Nathan Chancellor <nathan@kernel.org>
Diaz1401 pushed a commit to mengkernel/clang-build that referenced this issue Aug 27, 2022
Qualified with:

  $ ./build-binutils.py

Closes: ClangBuiltLinux#201
Signed-off-by: Nathan Chancellor <nathan@kernel.org>
Signed-off-by: Diaz1401 <reagor8161@outlook.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant