cross-x86_64-unknown-linux-musl/gcc (canutethegreat-overlay)

Search

Package Information

Versions

Version EAPI Keywords Slot
9.5.0 8 ~alpha amd64 arm arm64 ~hppa ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86
8.5.0-r2 8 ~alpha amd64 arm arm64 ~hppa ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86
16.0.9999 8
16.0.1_p20260208-r1 8
16.0.1_p20260201 8
16.0.1_p20260125 8
15.3.9999 8
15.2.1_p20260207 8
15.2.1_p20260131 8
15.2.1_p20260124 8
15.2.1_p20251122 8 ~alpha amd64 arm arm64 ~hppa ~loong ~mips ppc ppc64 ~riscv ~s390 ~sparc x86
15.2.1_p20251115 8
15.2.1_p20251108-r1 8 ~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86
14.4.9999 8
14.3.1_p20260206 8
14.3.1_p20260130 8
14.3.1_p20260123 8
14.3.1_p20251017 8 ~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86
14.3.1_p20250801 8 ~alpha amd64 arm arm64 ~hppa ~loong ~mips ppc ppc64 ~riscv ~s390 ~sparc x86
13.5.9999 8 ~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~m68k ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86
13.4.1_p20260205 8
13.4.1_p20260129 8
13.4.1_p20260122 8
13.4.1_p20251016 8 ~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~m68k ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86
13.4.1_p20250807 8 ~alpha amd64 arm arm64 ~hppa ~loong ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86
13.2.0 8 ~alpha ~amd64 ~arm ~arm64 ~hppa ~loong ~m68k ~mips ~ppc ~ppc64 ~riscv ~s390 ~sparc ~x86
12.5.0 8 ~alpha amd64 arm arm64 ~hppa ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86
11.5.0 8 ~alpha amd64 arm arm64 ~hppa ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86
10.5.0 8 ~alpha amd64 arm arm64 ~hppa ~m68k ~mips ppc ppc64 ~riscv ~s390 ~sparc x86

Metadata

Maintainers

Upstream

Raw Metadata XML
<pkgmetadata>
	<maintainer type="project">
		<email>toolchain@gentoo.org</email>
		<name>Gentoo Toolchain Project</name>
	</maintainer>
	<use>
		<flag name="ada">Build the Ada language (GNAT) frontend</flag>
		<flag name="algol68">Build the Algol 68 frontend</flag>
		<flag name="cet" restrict="&gt;=sys-devel/gcc-10">
			Enable support for control flow hijacking protection.

			On amd64, this provides Intel Control Flow Enforcement Technology (CET).

			On arm64, this provides Branch Target Identification (BTI)
			and Pointer Authentication Code (PAC) support.

			This is only effective on amd64 or arm64.

			Only provides benefits on newer CPUs. For Intel, the CPU
			must be at least as new as Tiger Lake. For AMD, it must be
			at least as new as Zen 3. This is harmless on older CPUs,
			but provides no benefit either.

			For ARM64, PAC was introduced in armv8.3-a, and BTI was
			introduced in armv8.5-a.

			When combined with USE=hardened on amd64, GCC will set -fcf-protection
			by default when building software. The effect is minimal
			on systems which do not support it, other than a possible
			small increase in codesize for the NOPs. The generated
			code is therefore compatible with i686 at the earliest.

			On arm64, GCC will set -mbranch-protection=standard by default
			when building software.
		</flag>
		<flag name="cobol">Enable support for the COBOL programming language</flag>
		<flag name="d">Enable support for the D programming language</flag>
		<flag name="debug">
			Enables GCC's 'checking' (assertions) facility.

			For released GCCs:
			* USE=debug  sets --enable-checking=yes,extra,rtl
			* USE=-debug sets --enable-checking=release

			For unreleased GCCs:
			* USE=debug  sets --enable-checking=yes,extra,rtl
			* USE=-debug sets --enable-checking=yes,extra

			This adds checks to various compiler passes for integrity and input
			validation. This can help catch possible miscompilations early as
			well as latent bugs which could become real problems in future, but
			at the cost of slower compile times when using GCC.

			Unrelated to backtraces.
		</flag>
		<flag name="default-stack-clash-protection">
			Build packages with stack clash protection on by default as
			a hardening measure.

			This enables -fstack-clash-protection by default which protects against
			large memory allocations allowing stack smashing.

			May cause slightly increased codesize, but modern compilers
			have been adapted to optimize well for this case, as
			this mitigation is now quite common.

			See https://developers.redhat.com/blog/2020/05/22/stack-clash-mitigation-in-gcc-part-3
			and https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt.
		</flag>
		<flag name="default-znow">
			Request full relocation on start from ld.so by default.

			This sets the -z,now (BIND_NOW) flag by default on all linker invocations. By
			resolving all dynamic symbols at application startup, parts of the program
			can be made read-only as a hardening measure.

			This is closely related to RELRO which is also separately
			enabled by default.

			In some applications with many unresolved symbols (heavily plugin based,
			for example), startup time may be impacted.
		</flag>
		<flag name="fixed-point">Enable fixed-point arithmetic support for MIPS targets in gcc (Warning: significantly increases compile time!)</flag>
		<flag name="go">Build the GCC Go language frontend.</flag>
		<flag name="graphite">Add support for the framework for loop optimizations based on a polyhedral intermediate representation</flag>
		<flag name="ieee-long-double">Use accelerated 128-bit IEEE long double ABI (ppc64le only)</flag>
		<flag name="jit">Enable libgccjit so other applications can embed gcc for Just-In-Time compilation.</flag>
		<flag name="libgdiagnostics">Provide libgdiagnostics (https://gcc.gnu.org/wiki/libgdiagnostics). This also installs the 'sarif-replay' tool.</flag>
		<flag name="libssp">Build SSP support into a dedicated library rather than use the code in the C library (DO NOT ENABLE THIS IF YOU DON'T KNOW WHAT IT DOES)</flag>
		<flag name="lto">
			Build using Link Time Optimizations (LTO).

			Note that GCC is always built with support for building
			other programs with LTO. This USE flag is for whether
			GCC itself is built and optimized with LTO.
		</flag>
		<flag name="modula2">Build the GCC Modula-2 language frontend.</flag>
		<flag name="objc">Build support for the Objective C code language</flag>
		<flag name="objc++">Build support for the Objective C++ language</flag>
		<flag name="objc-gc">Build support for the Objective C code language Garbage Collector</flag>
		<flag name="pgo">
			Build GCC using Profile Guided Optimization (PGO).

			GCC will build itself and then analyze the just-built
			binary and then rebuild itself using the data obtained
			from analysis of codepaths taken.

			It does not affect whether GCC itself supports PGO
			when building other software.

			This substantially increases the build time needed for
			building GCC itself.
		</flag>
		<flag name="rust">Build support for the Rust language, installs gccrs.</flag>
		<flag name="sanitize">
			Build support for various sanitizer functions (ASAN/TSAN/etc...)
			to find runtime problems in applications.
		</flag>
		<flag name="ssp">Build packages with stack smashing protection on by default</flag>
		<flag name="systemtap">
			Enable enhanced debugging hooks/interface via SystemTap static probe points
			in libgcc and libstdc++.

			Note that this isn't exclusive to SystemTap, despite the name. This provides
			an interface which <pkg>dev-debug/gdb</pkg> optionally uses, see
			https://sourceware.org/gdb/wiki/LinkerInterface and
			https://sourceware.org/gdb/wiki/DistroAdvice#sys.2Fsdt.h_probes.
		</flag>
		<flag name="vtv">
			Build support for virtual table verification (a C++ hardening feature).

			This does not control whether GCC defaults to using VTV>

			Note that actually using VTV breaks ABI and hence the whole
			system must be built with -fvtable-verify.
		</flag>
	</use>
	<upstream>
		<remote-id type="cpe">cpe:/a:gnu:gcc</remote-id>
	</upstream>
</pkgmetadata>

Lint Warnings

Files

Manifest

Type File Size Versions
Unmatched Entries
Type File Size
AUX 0001-tree-optimization-124034-remove-early-break-special-.patch 2528 bytes
AUX gcc-13-fix-cross-fixincludes.patch 883 bytes
DIST gcc-10.5.0-musl-patches-2.tar.xz 3452 bytes
DIST gcc-10.5.0-patches-7.tar.xz 19600 bytes
DIST gcc-10.5.0.tar.xz 77846412 bytes
DIST gcc-11.5.0-musl-patches-4.tar.xz 5280 bytes
DIST gcc-11.5.0-patches-2.tar.xz 14372 bytes
DIST gcc-11.5.0.tar.xz 82399864 bytes
DIST gcc-12.4.0-musl-patches-4.tar.xz 4524 bytes
DIST gcc-12.4.0-patches-4.tar.xz 15648 bytes
DIST gcc-12.5.0.tar.xz 85897368 bytes
DIST gcc-13-20250807.tar.xz 84575936 bytes
DIST gcc-13-20251016.tar.xz 84569872 bytes
DIST gcc-13-20260122.tar.xz 84569448 bytes
DIST gcc-13-20260129.tar.xz 84576100 bytes
DIST gcc-13-20260205.tar.xz 84578824 bytes
DIST gcc-13.2.0-musl-patches-2.tar.xz 5292 bytes
DIST gcc-13.2.0-patches-3.tar.xz 30956 bytes
DIST gcc-13.2.0.tar.xz 87858592 bytes
DIST gcc-13.3.0-musl-patches-3.tar.xz 8556 bytes
DIST gcc-13.3.0-patches-8.tar.xz 57472 bytes
DIST gcc-13.3.0-patches-9.tar.xz 69080 bytes
DIST gcc-14-20250801.tar.xz 88323948 bytes
DIST gcc-14-20251017.tar.xz 88341316 bytes
DIST gcc-14-20260123.tar.xz 88332388 bytes
DIST gcc-14-20260130.tar.xz 88361580 bytes
DIST gcc-14-20260206.tar.xz 88365888 bytes
DIST gcc-14.3.0-musl-patches-2.tar.xz 6888 bytes
DIST gcc-14.3.0-patches-4.tar.xz 28116 bytes
DIST gcc-14.3.0-patches-5.tar.xz 53952 bytes
DIST gcc-15-20251108.tar.xz 92349104 bytes
DIST gcc-15-20251115.tar.xz 92358784 bytes
DIST gcc-15-20251122.tar.xz 92364288 bytes
DIST gcc-15-20260124.tar.xz 92362060 bytes
DIST gcc-15-20260131.tar.xz 92355456 bytes
DIST gcc-15-20260207.tar.xz 92363192 bytes
DIST gcc-15.2.0-musl-patches-1.tar.xz 7168 bytes
DIST gcc-15.2.0-patches-2.tar.xz 18708 bytes
DIST gcc-15.2.0-patches-3.tar.xz 17436 bytes
DIST gcc-15.2.0-patches-4.tar.xz 19912 bytes
DIST gcc-15.2.0-patches-5.tar.xz 17460 bytes
DIST gcc-16-20260125.tar.xz 98189184 bytes
DIST gcc-16-20260201.tar.xz 98286008 bytes
DIST gcc-16-20260208.tar.xz 98344104 bytes
DIST gcc-16.0.0-musl-patches-1.tar.xz 3040 bytes
DIST gcc-16.0.0-patches-34.tar.xz 27964 bytes
DIST gcc-16.0.0-patches-35.tar.xz 25940 bytes
DIST gcc-16.0.0-patches-36.tar.xz 26860 bytes
DIST gcc-8.5.0-patches-5.tar.xz 20188 bytes
DIST gcc-8.5.0.tar.xz 63841008 bytes
DIST gcc-9.5.0-patches-3.tar.xz 17888 bytes
DIST gcc-9.5.0.tar.xz 72462752 bytes
DIST gcc-validate-failures-a447cd6dee206facb66720bdacf0c765a8b09f33.py 27537 bytes
EBUILD gcc-10.5.0.ebuild 1585 bytes
EBUILD gcc-11.5.0.ebuild 1744 bytes
EBUILD gcc-12.5.0.ebuild 1751 bytes
EBUILD gcc-13.2.0.ebuild 1816 bytes
EBUILD gcc-13.4.1_p20250807.ebuild 1810 bytes
EBUILD gcc-13.4.1_p20251016.ebuild 1816 bytes
EBUILD gcc-13.4.1_p20260122.ebuild 1817 bytes
EBUILD gcc-13.4.1_p20260129.ebuild 1817 bytes
EBUILD gcc-13.4.1_p20260205.ebuild 1817 bytes
EBUILD gcc-13.5.9999.ebuild 1785 bytes
EBUILD gcc-14.3.1_p20250801.ebuild 1567 bytes
EBUILD gcc-14.3.1_p20251017.ebuild 1573 bytes
EBUILD gcc-14.3.1_p20260123.ebuild 1574 bytes
EBUILD gcc-14.3.1_p20260130.ebuild 1574 bytes
EBUILD gcc-14.3.1_p20260206.ebuild 1574 bytes
EBUILD gcc-14.4.9999.ebuild 1547 bytes
EBUILD gcc-15.2.1_p20251108-r1.ebuild 1544 bytes
EBUILD gcc-15.2.1_p20251115.ebuild 1545 bytes
EBUILD gcc-15.2.1_p20251122.ebuild 1538 bytes
EBUILD gcc-15.2.1_p20260124.ebuild 1539 bytes
EBUILD gcc-15.2.1_p20260131.ebuild 1539 bytes
EBUILD gcc-15.2.1_p20260207.ebuild 1539 bytes
EBUILD gcc-15.3.9999.ebuild 1537 bytes
EBUILD gcc-16.0.1_p20260125.ebuild 1552 bytes
EBUILD gcc-16.0.1_p20260201.ebuild 1552 bytes
EBUILD gcc-16.0.1_p20260208-r1.ebuild 1638 bytes
EBUILD gcc-16.0.9999.ebuild 1524 bytes
EBUILD gcc-8.5.0-r2.ebuild 685 bytes
EBUILD gcc-9.5.0.ebuild 1393 bytes
MISC metadata.xml 6267 bytes