| Version | EAPI | Keywords | Slot |
|---|---|---|---|
| 9.5.0 | 8 | ~alpha amd64 arm arm64 ~hppa ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86 | |
| 8.5.0-r2 | 8 | ~alpha amd64 arm arm64 ~hppa ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86 | |
| 16.0.9999 | 8 | ||
| 16.0.1_p20260208-r1 | 8 | ||
| 16.0.1_p20260201 | 8 | ||
| 16.0.1_p20260125 | 8 | ||
| 15.3.9999 | 8 | ||
| 15.2.1_p20260207 | 8 | ||
| 15.2.1_p20260131 | 8 | ||
| 15.2.1_p20260124 | 8 | ||
| 15.2.1_p20251122 | 8 | ~alpha amd64 arm arm64 ~hppa ~loong ~mips ppc ppc64 ~riscv ~s390 ~sparc x86 | |
| 15.2.1_p20251115 | 8 | ||
| 15.2.1_p20251108-r1 | 8 | ~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86 | |
| 14.4.9999 | 8 | ||
| 14.3.1_p20260206 | 8 | ||
| 14.3.1_p20260130 | 8 | ||
| 14.3.1_p20260123 | 8 | ||
| 14.3.1_p20251017 | 8 | ~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86 | |
| 14.3.1_p20250801 | 8 | ~alpha amd64 arm arm64 ~hppa ~loong ~mips ppc ppc64 ~riscv ~s390 ~sparc x86 | |
| 13.5.9999 | 8 | ~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~m68k ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86 | |
| 13.4.1_p20260205 | 8 | ||
| 13.4.1_p20260129 | 8 | ||
| 13.4.1_p20260122 | 8 | ||
| 13.4.1_p20251016 | 8 | ~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~m68k ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86 | |
| 13.4.1_p20250807 | 8 | ~alpha amd64 arm arm64 ~hppa ~loong ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86 | |
| 13.2.0 | 8 | ~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~m68k ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86 | |
| 12.5.0 | 8 | ~alpha amd64 arm arm64 ~hppa ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86 | |
| 11.5.0 | 8 | ~alpha amd64 arm arm64 ~hppa ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86 | |
| 10.5.0 | 8 | ~alpha amd64 arm arm64 ~hppa ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86 |
<pkgmetadata> <maintainer type="project"> <email>toolchain@gentoo.org</email> <name>Gentoo Toolchain Project</name> </maintainer> <use> <flag name="ada">Build the Ada language (GNAT) frontend</flag> <flag name="algol68">Build the Algol 68 frontend</flag> <flag name="cet" restrict=">=sys-devel/gcc-10"> Enable support for control flow hijacking protection. On amd64, this provides Intel Control Flow Enforcement Technology (CET). On arm64, this provides Branch Target Identification (BTI) and Pointer Authentication Code (PAC) support. This is only effective on amd64 or arm64. Only provides benefits on newer CPUs. For Intel, the CPU must be at least as new as Tiger Lake. For AMD, it must be at least as new as Zen 3. This is harmless on older CPUs, but provides no benefit either. For ARM64, PAC was introduced in armv8.3-a, and BTI was introduced in armv8.5-a. When combined with USE=hardened on amd64, GCC will set -fcf-protection by default when building software. The effect is minimal on systems which do not support it, other than a possible small increase in codesize for the NOPs. The generated code is therefore compatible with i686 at the earliest. On arm64, GCC will set -mbranch-protection=standard by default when building software. </flag> <flag name="cobol">Enable support for the COBOL programming language</flag> <flag name="d">Enable support for the D programming language</flag> <flag name="debug"> Enables GCC's 'checking' (assertions) facility. For released GCCs: * USE=debug sets --enable-checking=yes,extra,rtl * USE=-debug sets --enable-checking=release For unreleased GCCs: * USE=debug sets --enable-checking=yes,extra,rtl * USE=-debug sets --enable-checking=yes,extra This adds checks to various compiler passes for integrity and input validation. This can help catch possible miscompilations early as well as latent bugs which could become real problems in future, but at the cost of slower compile times when using GCC. Unrelated to backtraces. </flag> <flag name="default-stack-clash-protection"> Build packages with stack clash protection on by default as a hardening measure. This enables -fstack-clash-protection by default which protects against large memory allocations allowing stack smashing. May cause slightly increased codesize, but modern compilers have been adapted to optimize well for this case, as this mitigation is now quite common. See https://developers.redhat.com/blog/2020/05/22/stack-clash-mitigation-in-gcc-part-3 and https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt. </flag> <flag name="default-znow"> Request full relocation on start from ld.so by default. This sets the -z,now (BIND_NOW) flag by default on all linker invocations. By resolving all dynamic symbols at application startup, parts of the program can be made read-only as a hardening measure. This is closely related to RELRO which is also separately enabled by default. In some applications with many unresolved symbols (heavily plugin based, for example), startup time may be impacted. </flag> <flag name="fixed-point">Enable fixed-point arithmetic support for MIPS targets in gcc (Warning: significantly increases compile time!)</flag> <flag name="go">Build the GCC Go language frontend.</flag> <flag name="graphite">Add support for the framework for loop optimizations based on a polyhedral intermediate representation</flag> <flag name="ieee-long-double">Use accelerated 128-bit IEEE long double ABI (ppc64le only)</flag> <flag name="jit">Enable libgccjit so other applications can embed gcc for Just-In-Time compilation.</flag> <flag name="libgdiagnostics">Provide libgdiagnostics (https://gcc.gnu.org/wiki/libgdiagnostics). This also installs the 'sarif-replay' tool.</flag> <flag name="libssp">Build SSP support into a dedicated library rather than use the code in the C library (DO NOT ENABLE THIS IF YOU DON'T KNOW WHAT IT DOES)</flag> <flag name="lto"> Build using Link Time Optimizations (LTO). Note that GCC is always built with support for building other programs with LTO. This USE flag is for whether GCC itself is built and optimized with LTO. </flag> <flag name="modula2">Build the GCC Modula-2 language frontend.</flag> <flag name="objc">Build support for the Objective C code language</flag> <flag name="objc++">Build support for the Objective C++ language</flag> <flag name="objc-gc">Build support for the Objective C code language Garbage Collector</flag> <flag name="pgo"> Build GCC using Profile Guided Optimization (PGO). GCC will build itself and then analyze the just-built binary and then rebuild itself using the data obtained from analysis of codepaths taken. It does not affect whether GCC itself supports PGO when building other software. This substantially increases the build time needed for building GCC itself. </flag> <flag name="rust">Build support for the Rust language, installs gccrs.</flag> <flag name="sanitize"> Build support for various sanitizer functions (ASAN/TSAN/etc...) to find runtime problems in applications. </flag> <flag name="ssp">Build packages with stack smashing protection on by default</flag> <flag name="systemtap"> Enable enhanced debugging hooks/interface via SystemTap static probe points in libgcc and libstdc++. Note that this isn't exclusive to SystemTap, despite the name. This provides an interface which <pkg>dev-debug/gdb</pkg> optionally uses, see https://sourceware.org/gdb/wiki/LinkerInterface and https://sourceware.org/gdb/wiki/DistroAdvice#sys.2Fsdt.h_probes. </flag> <flag name="vtv"> Build support for virtual table verification (a C++ hardening feature). This does not control whether GCC defaults to using VTV> Note that actually using VTV breaks ABI and hence the whole system must be built with -fvtable-verify. </flag> </use> <upstream> <remote-id type="cpe">cpe:/a:gnu:gcc</remote-id> </upstream> </pkgmetadata>
| Type | File | Size | Versions |
|---|
| Type | File | Size |
|---|---|---|
| AUX | 0001-tree-optimization-124034-remove-early-break-special-.patch | 2528 bytes |
| AUX | gcc-13-fix-cross-fixincludes.patch | 883 bytes |
| DIST | gcc-10.5.0-musl-patches-2.tar.xz | 3452 bytes |
| DIST | gcc-10.5.0-patches-7.tar.xz | 19600 bytes |
| DIST | gcc-10.5.0.tar.xz | 77846412 bytes |
| DIST | gcc-11.5.0-musl-patches-4.tar.xz | 5280 bytes |
| DIST | gcc-11.5.0-patches-2.tar.xz | 14372 bytes |
| DIST | gcc-11.5.0.tar.xz | 82399864 bytes |
| DIST | gcc-12.4.0-musl-patches-4.tar.xz | 4524 bytes |
| DIST | gcc-12.4.0-patches-4.tar.xz | 15648 bytes |
| DIST | gcc-12.5.0.tar.xz | 85897368 bytes |
| DIST | gcc-13-20250807.tar.xz | 84575936 bytes |
| DIST | gcc-13-20251016.tar.xz | 84569872 bytes |
| DIST | gcc-13-20260122.tar.xz | 84569448 bytes |
| DIST | gcc-13-20260129.tar.xz | 84576100 bytes |
| DIST | gcc-13-20260205.tar.xz | 84578824 bytes |
| DIST | gcc-13.2.0-musl-patches-2.tar.xz | 5292 bytes |
| DIST | gcc-13.2.0-patches-3.tar.xz | 30956 bytes |
| DIST | gcc-13.2.0.tar.xz | 87858592 bytes |
| DIST | gcc-13.3.0-musl-patches-3.tar.xz | 8556 bytes |
| DIST | gcc-13.3.0-patches-8.tar.xz | 57472 bytes |
| DIST | gcc-13.3.0-patches-9.tar.xz | 69080 bytes |
| DIST | gcc-14-20250801.tar.xz | 88323948 bytes |
| DIST | gcc-14-20251017.tar.xz | 88341316 bytes |
| DIST | gcc-14-20260123.tar.xz | 88332388 bytes |
| DIST | gcc-14-20260130.tar.xz | 88361580 bytes |
| DIST | gcc-14-20260206.tar.xz | 88365888 bytes |
| DIST | gcc-14.3.0-musl-patches-2.tar.xz | 6888 bytes |
| DIST | gcc-14.3.0-patches-4.tar.xz | 28116 bytes |
| DIST | gcc-14.3.0-patches-5.tar.xz | 53952 bytes |
| DIST | gcc-15-20251108.tar.xz | 92349104 bytes |
| DIST | gcc-15-20251115.tar.xz | 92358784 bytes |
| DIST | gcc-15-20251122.tar.xz | 92364288 bytes |
| DIST | gcc-15-20260124.tar.xz | 92362060 bytes |
| DIST | gcc-15-20260131.tar.xz | 92355456 bytes |
| DIST | gcc-15-20260207.tar.xz | 92363192 bytes |
| DIST | gcc-15.2.0-musl-patches-1.tar.xz | 7168 bytes |
| DIST | gcc-15.2.0-patches-2.tar.xz | 18708 bytes |
| DIST | gcc-15.2.0-patches-3.tar.xz | 17436 bytes |
| DIST | gcc-15.2.0-patches-4.tar.xz | 19912 bytes |
| DIST | gcc-15.2.0-patches-5.tar.xz | 17460 bytes |
| DIST | gcc-16-20260125.tar.xz | 98189184 bytes |
| DIST | gcc-16-20260201.tar.xz | 98286008 bytes |
| DIST | gcc-16-20260208.tar.xz | 98344104 bytes |
| DIST | gcc-16.0.0-musl-patches-1.tar.xz | 3040 bytes |
| DIST | gcc-16.0.0-patches-34.tar.xz | 27964 bytes |
| DIST | gcc-16.0.0-patches-35.tar.xz | 25940 bytes |
| DIST | gcc-16.0.0-patches-36.tar.xz | 26860 bytes |
| DIST | gcc-8.5.0-patches-5.tar.xz | 20188 bytes |
| DIST | gcc-8.5.0.tar.xz | 63841008 bytes |
| DIST | gcc-9.5.0-patches-3.tar.xz | 17888 bytes |
| DIST | gcc-9.5.0.tar.xz | 72462752 bytes |
| DIST | gcc-validate-failures-a447cd6dee206facb66720bdacf0c765a8b09f33.py | 27537 bytes |
| EBUILD | gcc-10.5.0.ebuild | 1585 bytes |
| EBUILD | gcc-11.5.0.ebuild | 1744 bytes |
| EBUILD | gcc-12.5.0.ebuild | 1751 bytes |
| EBUILD | gcc-13.2.0.ebuild | 1816 bytes |
| EBUILD | gcc-13.4.1_p20250807.ebuild | 1810 bytes |
| EBUILD | gcc-13.4.1_p20251016.ebuild | 1816 bytes |
| EBUILD | gcc-13.4.1_p20260122.ebuild | 1817 bytes |
| EBUILD | gcc-13.4.1_p20260129.ebuild | 1817 bytes |
| EBUILD | gcc-13.4.1_p20260205.ebuild | 1817 bytes |
| EBUILD | gcc-13.5.9999.ebuild | 1785 bytes |
| EBUILD | gcc-14.3.1_p20250801.ebuild | 1567 bytes |
| EBUILD | gcc-14.3.1_p20251017.ebuild | 1573 bytes |
| EBUILD | gcc-14.3.1_p20260123.ebuild | 1574 bytes |
| EBUILD | gcc-14.3.1_p20260130.ebuild | 1574 bytes |
| EBUILD | gcc-14.3.1_p20260206.ebuild | 1574 bytes |
| EBUILD | gcc-14.4.9999.ebuild | 1547 bytes |
| EBUILD | gcc-15.2.1_p20251108-r1.ebuild | 1544 bytes |
| EBUILD | gcc-15.2.1_p20251115.ebuild | 1545 bytes |
| EBUILD | gcc-15.2.1_p20251122.ebuild | 1538 bytes |
| EBUILD | gcc-15.2.1_p20260124.ebuild | 1539 bytes |
| EBUILD | gcc-15.2.1_p20260131.ebuild | 1539 bytes |
| EBUILD | gcc-15.2.1_p20260207.ebuild | 1539 bytes |
| EBUILD | gcc-15.3.9999.ebuild | 1537 bytes |
| EBUILD | gcc-16.0.1_p20260125.ebuild | 1552 bytes |
| EBUILD | gcc-16.0.1_p20260201.ebuild | 1552 bytes |
| EBUILD | gcc-16.0.1_p20260208-r1.ebuild | 1638 bytes |
| EBUILD | gcc-16.0.9999.ebuild | 1524 bytes |
| EBUILD | gcc-8.5.0-r2.ebuild | 685 bytes |
| EBUILD | gcc-9.5.0.ebuild | 1393 bytes |
| MISC | metadata.xml | 6267 bytes |