Umm
x86-64 Playground – An online assembly editor and GDB-like debugger
https://x64.halb.it/
#ycombinator #Gdb #x86_64 #x64 #CTF #assembly #debugger #Fasm #Binutils #webassembly #wasm_binutils #wasm_assembler
Today's `binutils-gdb` bug in `ld.bfd` is https://sourceware.org/PR33530.
There `ld.bfd` spends a ton of RAM and CPU time on inputs with huge section counts. In the example in initial comment `ld.gold` spends 50ms where `ld.bfd` spends 5s.
On real examples produced by haskell compiler with `-fsplit-section -optl-Wl,--gc-sections` it translates to extra minutes of link time on larger binaries.
I think it's an `ld` garbage collection bug.
One Open-source Project Daily
Simple makefile-based build for musl cross compiler
https://github.com/richfelker/musl-cross-make
#1ospd #opensource #binutils #crosscompiler #gcc #musl #muslcross #targetmusl #toolchain
#Binutils 2.45 has been released (#GNU / #GNUBinaryUtilities / #BinaryUtilities) https://gnu.org/software/binutils
The next GNU Tools Cauldron, taking place in Porto, Portugal, on September 26-28, 2025.
https://inbox.sourceware.org/gcc/87o6ubhn4j.fsf@oracle.com/
https://gcc.gnu.org/wiki/cauldron2025
https://gnu-tools-cauldron.org/
Some #Sourceware Project Leadership Committee members and @conservancy staff should also be there.
#GCC #GDB #binutils #CGEN #DejaGnu #newlib #glibc #poke #libabigail #elfutils
All I want is just a collection of #binutils, #GCC, #llvm+#clang, #glibc and #musl that are "free standing" / relocatable, which I can pack into a #squashfs image to carry around to my various development machines.
You'd think that for something as fundamental as compiler infrastructure with over 60 years of knowledge, the whole bootstrapping and bringup process would have been super streamlined, or at least mostly pain free by now.
Yeah, about that. IYKYK
Linux 6.16 will need GCC 8 and Binutils 2.30 to build.
#Linux #Kernel #LinuxKernel #Computers #Laptops #TechNews #TechUpdates #GCC #Clang #LLVM #Binutils
https://officialaptivi.wordpress.com/2025/06/01/linux-6-16-needs-gcc-8-and-binutils-2-30/
Linux 6.16 needs GCC 8 and Binutils 2.30
The upcoming version of Linux now needs at least GCC 8 and GNU Binutils 2.30 to be able to successfully build, because this was needed to remove all legacy code that provided workarounds for build systems prior to GCC 8, which became a maintenance burden. Previously, GCC 5 and Binutils 2.25 were required to build Linux, and the latest version, 6.15, had this requirement before 6.16 increased it.
GCC 8 and Binutils 2.30 brought new features that Linux 6.16 needed, while LLVM Clang 13 was the minimum requirement for Linux in case you’ll need to use LLVM instead of the legacy GCC.
You can see the merge request below.
See merge requestThe reasoning for this minimum version requirement bump is here:
x86 already uses gcc-8 as the minimum version, this changes all other architectures to the same version. gcc-8 is used is Debian 10 and Red Hat Enterprise Linux 8, both of which are still supported, and binutils 2.30 is the oldest corresponding version on those.
Ubuntu Pro 18.04 and SUSE Linux Enterprise Server 15 both use gcc-7 as the system compiler but additionally include toolchains that remain supported.
With the new minimum toolchain versions, a number of workarounds for older versions can be dropped, in particular on x86_64 and arm64. Importantly, the updated compiler version allows removing two of the five remaining gcc plugins, as support for sancov and structeak features is already included in modern compiler versions.
I tried collecting the known changes that are possible based on the new toolchain version, but expect that more cleanups will be possible.
Since this touches multiple architectures, I merged the patches through the asm-generic tree.”
#Binutils #GCC #Linux #LinuxKernel #news #Tech #Technology #update
#BSI WID-SEC-2025-1157: [NEU] [mittel] #binutils: Mehrere Schwachstellen ermöglichen Codeausführung
Ein lokaler Angreifer kann mehrere Schwachstellen in binutils ausnutzen, um beliebigen Programmcode auszuführen.
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1157
Sourceware Survey 2025 Results
In the end we got 103 (!) responses with a nice mix of developers, users and maintainers from various hosted projects.
https://sourceware.org/survey-2025
#binutils #cygwin #dwarfstd #elfutils #gcc #gdb #glibc #libabigail #newlib #systemTap #valgrind #bzip2 #libffi #dwz #debugedit #gnupoke #bunsen #lvm2 #annobin #gnu-gabi #cgen #kawa #insight #pacme
Anyone here familiar with SPARC binutils internals? I'm having a rather odd case where the same instruction (and same binary sequence) gets interpreted differently depending on who compiles it :cirnothinking:
Say, I have this `decode.s` file containing the following line:
decode: addxccc %g0, %g0, %g0
One VIS3 instruction, very simple. Then assemble it with both gcc and clang:
gcc -mcpu=niagara4 -c decode.s -o decode-gcc.o
clang -mcpu=niagara4 -c decode.s -o decode-clang.o
And now, if I run objdump on the files, the results are different:
decode-clang.o: file format elf64-sparc
Disassembly of section .text:
0000000000000000 <decode>:
0: 81 b0 02 60 unknown
Compare with GCC's:
decode-gcc.o: file format elf64-sparc
Disassembly of section .text:
0000000000000000 <decode>:
0: 81 b0 02 60 addxccc %g0, %g0, %g0
In both cases the binary stream is the same, but why does objdump decodes it as "unknown" with the clang-built file?
Edit: found it, seems like GCC sets something in the attribute section:
Attribute Section: gnu
File Attributes
Tag_GNU_Sparc_HWCAPS: vis3
Though as far as I can tell other than odd objump output it doesn't seem to affect binary execution, etc.
Introduction to GNU Binutils: A Beginner's Guide #Binutils #Linux #Assembler #Linker #Debugger #ELF #ObjectFiles #ExecutableFiles #AssemblyLanguage #Opensource #Linuxhowto #Linuxbasics #Commandline
https://ostechnix.com/introduction-to-gnu-binutils/
#BSI WID-SEC-2025-0304: [NEU] [mittel] #binutils: Mehrere Schwachstellen
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in binutils ausnutzen, um einen Denial of Service-Zustand zu erzeugen oder nicht spezifizierte Auswirkungen zu verursachen.
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0304
#BSI WID-SEC-2025-0304: [NEU] [mittel] #binutils: Mehrere Schwachstellen
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in binutils ausnutzen, um einen Denial of Service-Zustand zu erzeugen oder nicht spezifizierte Auswirkungen zu verursachen.
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0304
#BSI WID-SEC-2025-0304: [NEU] [mittel] #binutils: Mehrere Schwachstellen
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in binutils ausnutzen, um einen Denial of Service-Zustand zu erzeugen oder nicht spezifizierte Auswirkungen zu verursachen.
https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0304
#Binutils 2.44 has been released (#GNU) https://gnu.org/software/binutils
GNU #Binutils 2.44 is out:
https://lists.gnu.org/archive/html/info-gnu/2025-02/msg00001.html
Some highlights:
* Assembler:
- Support for new architecture extensions for AArch64, Risc-V and x86.
* Linker:
- This now supports mixed LTO and non-LTO object files in relocatable output.
- The ELF forms of the linker support a --image-base=<ADDR> option for compatibility with LLD.
[…] does not contain the sources for the gold linker […] now deprecated and will eventually be removed unless volunteers step forward […]