GNU Arm Embedded Toolchain 10.3-2021.10

Written for GNU Arm Embedded Toolchain by Vasee Vinayagamoorthy on 2021-10-21

We are pleased to announce the availability of the GNU Arm Embedded Toolchain 10.3-2021.10 release.
The tools can be downloaded from any one of the following link:

* https://developer.arm.com/open-source/gnu-toolchain/gnu-rm/downloads

Notable changes in 10.3-2021.10 release:

* Added mitigation for the VLLDM instruction security vulnerability
  described in:
  https://developer.arm.com/support/arm-security-updates/vlldm-instruction-security-vulnerability

Known issues:
* Doing IPA on CMSE generates a linker error:
The linker will error out when resulting object file contains a symbol for
the clone function with the __acle_se prefix that has a non-local binding.
  Issue occurs when compiling binaries for M-profile Secure Extensions where
the compiler may decide to clone a function with the cmse_nonsecure_entry
attribute.
  Although cloning nonsecure entry functions is legal, as long as the clone
is only used inside the secure application, the clone function itself should
not be seen as a secure entry point and so it should not have the __acle_se
prefix.
  A possible workaround for this is to add a 'noclone' attribute to
functions with the 'cmse_nonsecure_entry'. This will prevent GCC from cloning
such functions.

* GCC can hang or crash if the input source code uses MVE Intrinsics
polymorphic variants in a nested form. The depth of nesting that
triggers this issue might vary depending on the host machine.
This behaviour is observed when nesting 7 times or more on a high-end
workstation. On less powerful machines, this behaviour might be
observed with fewer levels of nesting. This issue is reported in
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=91937

Updated . Read more

Read all announcements