source: chapter08/gcc.xml@ 0f0844e

12.1-rc1
Last change on this file since 0f0844e was 28614cdd, checked in by Bruce Dubbs <bdubbs@…>, 7 months ago

Update descriptions for some test failures.

  • Property mode set to 100644
File size: 26.5 KB
Line 
1<?xml version="1.0" encoding="UTF-8"?>
2<!DOCTYPE sect1 PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
3 "http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd" [
4 <!ENTITY % general-entities SYSTEM "../general.ent">
5 %general-entities;
6]>
7
8<sect1 id="ch-system-gcc" role="wrap">
9 <?dbhtml filename="gcc.html"?>
10
11 <sect1info condition="script">
12 <productname>gcc</productname>
13 <productnumber>&gcc-version;</productnumber>
14 <address>&gcc-url;</address>
15 </sect1info>
16
17 <title>GCC-&gcc-version;</title>
18
19 <indexterm zone="ch-system-gcc">
20 <primary sortas="a-GCC">GCC</primary>
21 </indexterm>
22
23 <sect2 role="package">
24 <title/>
25
26 <para>The GCC package contains the GNU compiler collection, which includes
27 the C and C++ compilers.</para>
28
29 <segmentedlist>
30 <segtitle>&buildtime;</segtitle>
31 <segtitle>&diskspace;</segtitle>
32
33 <seglistitem>
34 <seg>&gcc-fin-sbu;</seg>
35 <seg>&gcc-fin-du;</seg>
36 </seglistitem>
37 </segmentedlist>
38
39 </sect2>
40
41 <sect2 role="installation">
42 <title>Installation of GCC</title>
43<!--
44 <para>At first, fix an issue breaking
45 <filename class="libraryfile">libasan.a</filename> building this package
46 with Glibc-2.34 or later:</para>
47
48<screen><userinput remap="pre">sed -e '/static.*SIGSTKSZ/d' \
49 -e 's/return kAltStackSize/return SIGSTKSZ * 4/' \
50 -i libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cpp</userinput></screen>
51-->
52<!--
53 <para>First fix a problem with the latest version of glibc:</para>
54
55 <screen><userinput remap="pre">patch -Np1 -i ../&gcc-upstream-fixes-patch;</userinput></screen>
56-->
57 <para>If building on x86_64, change the default directory name for 64-bit
58 libraries to <quote>lib</quote>:</para>
59
60<screen><userinput remap="pre">case $(uname -m) in
61 x86_64)
62 sed -e '/m64=/s/lib64/lib/' \
63 -i.orig gcc/config/i386/t-linux64
64 ;;
65esac</userinput></screen>
66
67 <para>The GCC documentation recommends building GCC in a dedicated build directory:</para>
68
69<screen><userinput remap="pre">mkdir -v build
70cd build</userinput></screen>
71
72 <para>Prepare GCC for compilation:</para>
73
74<screen><userinput remap="configure">../configure --prefix=/usr \
75 LD=ld \
76 --enable-languages=c,c++ \
77 --enable-default-pie \
78 --enable-default-ssp \
79 --disable-multilib \
80 --disable-bootstrap \
81 --disable-fixincludes \
82 --with-system-zlib</userinput></screen>
83
84 <para>GCC supports seven different computer languages, but the
85 prerequisites for most of them have not yet been installed. See the
86 <ulink url="&blfs-book;general/gcc.html">BLFS Book GCC page</ulink>
87 for instructions on how to build all of GCC's supported languages.</para>
88
89 <variablelist>
90 <title>The meaning of the new configure parameters:</title>
91
92 <varlistentry>
93 <term><parameter>LD=ld</parameter></term>
94 <listitem>
95 <para>This parameter makes the configure script use the ld program installed
96 by the Binutils package built earlier in this chapter, rather than
97 the cross-built version which would otherwise be used.</para>
98 </listitem>
99 </varlistentry>
100
101 <varlistentry>
102 <term><parameter>--disable-fixincludes</parameter></term>
103 <listitem>
104 <para>By default, during the installation of GCC some system
105 headers would be <quote>fixed</quote> to be used with GCC. This
106 is not necessary for a modern Linux system, and potentially
107 harmful if a package is reinstalled after installing GCC. This
108 switch prevents GCC from <quote>fixing</quote> the headers.</para>
109 </listitem>
110 </varlistentry>
111
112 <varlistentry>
113 <term><parameter>--with-system-zlib</parameter></term>
114 <listitem>
115 <para>This switch tells GCC to link to the system installed copy of
116 the Zlib library, rather than its own internal copy.</para>
117 </listitem>
118 </varlistentry>
119 </variablelist>
120
121 <note>
122 <anchor id="pie-ssp-info" xreflabel="note on PIE and SSP"/>
123 <para>
124 PIE (position-independent executables) are
125 binary programs that can be loaded anywhere in memory. Without PIE,
126 the security feature named ASLR (Address Space Layout Randomization)
127 can be applied for the shared libraries, but not for the executables
128 themselves. Enabling PIE allows ASLR for the executables in addition to
129 the shared libraries, and mitigates some attacks based on fixed
130 addresses of sensitive code or data in the executables.
131 </para>
132 <para>
133 SSP (Stack Smashing Protection) is a technique to ensure
134 that the parameter stack is not corrupted. Stack corruption can,
135 for example, alter the return address of a subroutine,
136 thus transferring control to some dangerous code
137 (existing in the program or shared libraries, or injected by the
138 attacker somehow).
139 </para>
140 </note>
141
142 <para>Compile the package:</para>
143
144<screen><userinput remap="make">make</userinput></screen>
145
146 <important>
147 <para>In this section, the test suite for GCC is considered
148 important, but it takes a long time. First-time builders are
149 encouraged to run the test suite. The time to run the tests can be
150 reduced significantly by adding -jx to the <command>make -k check</command> command below,
151 where x is the number of CPU cores on your system.</para>
152 </important>
153
154 <para>One set of tests in the GCC test suite is known to exhaust the default
155 stack, so increase the stack size prior to running the tests:</para>
156
157<screen><userinput remap="test">ulimit -s 32768</userinput></screen>
158
159 <para>Test the results as a non-privileged user, but do not stop at errors:</para>
160
161<screen><userinput remap="test">chown -R tester .
162su tester -c "PATH=$PATH make -k check"</userinput></screen>
163
164 <para>To extract a summary of the test suite results, run:</para>
165
166<screen><userinput remap="test">../contrib/test_summary</userinput></screen>
167
168 <para>To filter out only the summaries, pipe the output through
169 <userinput>grep -A7 Summ</userinput>.</para>
170
171 <para>Results can be compared with those located at <ulink
172 url="&test-results;"/> and
173 <ulink url="https://gcc.gnu.org/ml/gcc-testresults/"/>.</para>
174
175 <para><!--Two tests named <filename>pr104610.c</filename> and
176 <filename>pr69482-1.c</filename> are known to fail because the test
177 files does not account for the
178 <parameter>- -enable-default-ssp</parameter> option.-->
179 <!-- https://gcc.gnu.org/PR106375 and https://gcc.gnu.org/PR109353 -->
180 Eight gcc tests (out of over 185,000), data-model-4.c, pr56837.c,
181 and six "analyzer" tests are known to fail.
182
183 One libstdc++ test (out of over 15000), copy.cc, is known to fail.
184
185 For g++, 21 tests (out of approximately 250,000), 14 "AddressSanitizer*"
186 tests and 7 interception-malloc-test-1.C tests, are known to fail.
187
188 Additionally, several tests in the
189 <filename class='directory'>vect</filename> directory are known to fail
190 if the hardware does not support AVX.</para>
191 <!--
192 <para>
193 With Glibc-2.39, the gcc analyzer tests named
194 <filename>data-model-4.c</filename> and
195 <filename>conftest-1.c</filename>
196 are known to fail.
197 In the asan tests, several tests in <filename>asan_test.C</filename>
198 are known to fail.
199 The test named <filename>interception-malloc-test-1.C</filename>
200 is known to fail.
201 </para>
202-->
203 <para>A few unexpected failures cannot always be avoided. The GCC developers
204 are usually aware of these issues, but have not resolved them yet.
205 Unless the test results are vastly different from those at the above URL,
206 it is safe to continue.</para>
207
208 <!--note><para>
209 On some combinations of kernel configuration and AMD processors
210 there may be more than 1100 failures in the gcc.target/i386/mpx
211 tests (which are designed to test the MPX option on recent
212 Intel processors). These can safely be ignored on AMD
213 processors. These tests will also fail on Intel processors if MPX support
214 is not enabled in the kernel even though it is present on the CPU.
215 </para></note-->
216
217 <para>Install the package:</para>
218
219<screen><userinput remap="install">make install</userinput></screen>
220
221 <para>The GCC build directory is owned by <systemitem class="username">
222 tester</systemitem> now, and the ownership of the installed header
223 directory (and its content) is incorrect. Change the ownership to the
224 <systemitem class="username">root</systemitem> user and group:</para>
225
226<screen><userinput remap="install">chown -v -R root:root \
227 /usr/lib/gcc/$(gcc -dumpmachine)/&gcc-version;/include{,-fixed}</userinput></screen>
228
229 <para>Create a symlink required by the <ulink
230 url="https://refspecs.linuxfoundation.org/FHS_3.0/fhs/ch03s09.html">FHS</ulink>
231 for "historical" reasons.</para>
232
233<screen><userinput remap="install">ln -svr /usr/bin/cpp /usr/lib</userinput></screen>
234
235 <para>Many packages use the name <command>cc</command> to call the C
236 compiler. We've already created <command>cc</command> as a symlink in
237 <xref linkend='ch-tools-gcc-pass2'/>, create its man page as a symlink
238 as well:</para>
239
240<screen><userinput remap="install">ln -sv gcc.1 /usr/share/man/man1/cc.1</userinput></screen>
241
242 <para>Add a compatibility symlink to enable building programs with
243 Link Time Optimization (LTO):</para>
244
245<screen><userinput remap="install">ln -sfv ../../libexec/gcc/$(gcc -dumpmachine)/&gcc-version;/liblto_plugin.so \
246 /usr/lib/bfd-plugins/</userinput></screen>
247
248 <para>Now that our final toolchain is in place, it is important to again ensure
249 that compiling and linking will work as expected. We do this by performing
250 some sanity checks:</para>
251
252<screen><userinput>echo 'int main(){}' &gt; dummy.c
253cc dummy.c -v -Wl,--verbose &amp;&gt; dummy.log
254readelf -l a.out | grep ': /lib'</userinput></screen>
255
256 <para>There should be no errors,
257 and the output of the last command will be (allowing for
258 platform-specific differences in the dynamic linker name):</para>
259
260<screen><computeroutput>[Requesting program interpreter: /lib64/ld-linux-x86-64.so.2]</computeroutput></screen>
261
262 <para>Now make sure that we're set up to use the correct start files:</para>
263
264<screen><userinput>grep -E -o '/usr/lib.*/S?crt[1in].*succeeded' dummy.log</userinput></screen>
265
266 <para>The output of the last command should be:</para>
267
268<screen><computeroutput>/usr/lib/gcc/x86_64-pc-linux-gnu/&gcc-version;/../../../../lib/Scrt1.o succeeded
269/usr/lib/gcc/x86_64-pc-linux-gnu/&gcc-version;/../../../../lib/crti.o succeeded
270/usr/lib/gcc/x86_64-pc-linux-gnu/&gcc-version;/../../../../lib/crtn.o succeeded</computeroutput></screen>
271
272 <para>Depending on your machine architecture, the above may differ slightly.
273 The difference will be the name of the directory
274 after <filename class="directory">/usr/lib/gcc</filename>. The important
275 thing to look for here is that <command>gcc</command> has found all three
276 <filename>crt*.o</filename> files under the
277 <filename class="directory">/usr/lib</filename> directory.</para>
278
279 <para>Verify that the compiler is searching for the correct header
280 files:</para>
281
282<screen><userinput>grep -B4 '^ /usr/include' dummy.log</userinput></screen>
283
284 <para>This command should return the following output:</para>
285
286<screen><computeroutput>#include &lt;...&gt; search starts here:
287 /usr/lib/gcc/x86_64-pc-linux-gnu/&gcc-version;/include
288 /usr/local/include
289 /usr/lib/gcc/x86_64-pc-linux-gnu/&gcc-version;/include-fixed
290 /usr/include</computeroutput></screen>
291
292 <para>Again, the directory named after your target triplet may be
293 different than the above, depending on your system architecture.</para>
294
295 <para>Next, verify that the new linker is being used with the correct search paths:</para>
296
297<screen><userinput>grep 'SEARCH.*/usr/lib' dummy.log |sed 's|; |\n|g'</userinput></screen>
298
299 <para>References to paths that have components with '-linux-gnu' should
300 be ignored, but otherwise the output of the last command should be:</para>
301
302<screen><computeroutput>SEARCH_DIR("/usr/x86_64-pc-linux-gnu/lib64")
303SEARCH_DIR("/usr/local/lib64")
304SEARCH_DIR("/lib64")
305SEARCH_DIR("/usr/lib64")
306SEARCH_DIR("/usr/x86_64-pc-linux-gnu/lib")
307SEARCH_DIR("/usr/local/lib")
308SEARCH_DIR("/lib")
309SEARCH_DIR("/usr/lib");</computeroutput></screen>
310
311 <para>A 32-bit system may use a few other directories. For example, here
312 is the output from an i686 machine:</para>
313
314<screen><computeroutput>SEARCH_DIR("/usr/i686-pc-linux-gnu/lib32")
315SEARCH_DIR("/usr/local/lib32")
316SEARCH_DIR("/lib32")
317SEARCH_DIR("/usr/lib32")
318SEARCH_DIR("/usr/i686-pc-linux-gnu/lib")
319SEARCH_DIR("/usr/local/lib")
320SEARCH_DIR("/lib")
321SEARCH_DIR("/usr/lib");</computeroutput></screen>
322
323 <para>Next make sure that we're using the correct libc:</para>
324
325<screen><userinput>grep "/lib.*/libc.so.6 " dummy.log</userinput></screen>
326
327 <para>The output of the last command should be:</para>
328
329<screen><computeroutput>attempt to open /usr/lib/libc.so.6 succeeded</computeroutput></screen>
330
331 <para>Make sure GCC is using the correct dynamic linker:</para>
332
333<screen><userinput>grep found dummy.log</userinput></screen>
334
335 <para>The output of the last command should be (allowing for
336 platform-specific differences in dynamic linker name):</para>
337
338<screen><computeroutput>found ld-linux-x86-64.so.2 at /usr/lib/ld-linux-x86-64.so.2</computeroutput></screen>
339
340 <para>If the output does not appear as shown above or is not received
341 at all, then something is seriously wrong. Investigate and retrace the
342 steps to find out where the problem is and correct it. <!--The most likely
343 reason is that something went wrong with the specs file adjustment.--> Any
344 issues should be resolved before continuing with the process.</para>
345
346 <para>Once everything is working correctly, clean up the test files:</para>
347
348<screen><userinput>rm -v dummy.c a.out dummy.log</userinput></screen>
349
350 <para>Finally, move a misplaced file:</para>
351
352<screen><userinput remap="install">mkdir -pv /usr/share/gdb/auto-load/usr/lib
353mv -v /usr/lib/*gdb.py /usr/share/gdb/auto-load/usr/lib</userinput></screen>
354
355 </sect2>
356
357 <sect2 id="contents-gcc" role="content">
358 <title>Contents of GCC</title>
359
360 <segmentedlist>
361 <segtitle>Installed programs</segtitle>
362 <segtitle>Installed libraries</segtitle>
363 <segtitle>Installed directories</segtitle>
364
365 <seglistitem>
366 <seg>c++, cc (link to gcc), cpp, g++, gcc,
367 gcc-ar, gcc-nm, gcc-ranlib, gcov, gcov-dump, gcov-tool,
368 and lto-dump</seg>
369
370 <seg>libasan.{a,so}, libatomic.{a,so}, libcc1.so, libgcc.a, libgcc_eh.a,
371 libgcc_s.so, libgcov.a, libgomp.{a,so}, libhwasan.{a,so}, libitm.{a,so},
372 liblsan.{a,so}, liblto_plugin.so,
373 libquadmath.{a,so}, libssp.{a,so}, libssp_nonshared.a,
374 libstdc++.{a,so}, libstdc++exp.a, libstdc++fs.a, libsupc++.a, libtsan.{a,so},
375 and libubsan.{a,so}</seg>
376
377 <seg>/usr/include/c++, /usr/lib/gcc, /usr/libexec/gcc, and
378 /usr/share/gcc-&gcc-version;</seg>
379 </seglistitem>
380 </segmentedlist>
381
382 <variablelist>
383 <bridgehead renderas="sect3">Short Descriptions</bridgehead>
384 <?dbfo list-presentation="list"?>
385 <?dbhtml list-presentation="table"?>
386
387 <varlistentry id="c">
388 <term><command>c++</command></term>
389 <listitem>
390 <para>The C++ compiler</para>
391 <indexterm zone="ch-system-gcc c">
392 <primary sortas="b-c++">c++</primary>
393 </indexterm>
394 </listitem>
395 </varlistentry>
396
397 <varlistentry id="cc">
398 <term><command>cc</command></term>
399 <listitem>
400 <para>The C compiler</para>
401 <indexterm zone="ch-system-gcc cc">
402 <primary sortas="b-cc">cc</primary>
403 </indexterm>
404 </listitem>
405 </varlistentry>
406
407 <varlistentry id="cpp">
408 <term><command>cpp</command></term>
409 <listitem>
410 <para>The C preprocessor; it is used by the compiler to expand the
411 #include, #define, and similar directives in the source files</para>
412 <indexterm zone="ch-system-gcc cpp">
413 <primary sortas="b-cpp">cpp</primary>
414 </indexterm>
415 </listitem>
416 </varlistentry>
417
418 <varlistentry id="g">
419 <term><command>g++</command></term>
420 <listitem>
421 <para>The C++ compiler</para>
422 <indexterm zone="ch-system-gcc g">
423 <primary sortas="b-g++">g++</primary>
424 </indexterm>
425 </listitem>
426 </varlistentry>
427
428 <varlistentry id="gcc">
429 <term><command>gcc</command></term>
430 <listitem>
431 <para>The C compiler</para>
432 <indexterm zone="ch-system-gcc gcc">
433 <primary sortas="b-gcc">gcc</primary>
434 </indexterm>
435 </listitem>
436 </varlistentry>
437
438 <varlistentry id="gcc-ar">
439 <term><command>gcc-ar</command></term>
440 <listitem>
441 <para>A wrapper around <command>ar</command> that adds a
442 plugin to the command line. This program is only used
443 to add "link time optimization" and is not useful with the
444 default build options.</para>
445 <indexterm zone="ch-system-gcc gcc-ar">
446 <primary sortas="b-gcc-ar">gc-ar</primary>
447 </indexterm>
448 </listitem>
449 </varlistentry>
450
451 <varlistentry id="gcc-nm">
452 <term><command>gcc-nm</command></term>
453 <listitem>
454 <para>A wrapper around <command>nm</command> that adds a
455 plugin to the command line. This program is only used
456 to add "link time optimization" and is not useful with the
457 default build options.</para>
458 <indexterm zone="ch-system-gcc gcc-nm">
459 <primary sortas="b-gcc-nm">gc-nm</primary>
460 </indexterm>
461 </listitem>
462 </varlistentry>
463
464 <varlistentry id="gcc-ranlib">
465 <term><command>gcc-ranlib</command></term>
466 <listitem>
467 <para>A wrapper around <command>ranlib</command> that adds a
468 plugin to the command line. This program is only used
469 to add "link time optimization" and is not useful with the
470 default build options.</para>
471 <indexterm zone="ch-system-gcc gcc-ranlib">
472 <primary sortas="b-gcc-ranlib">gc-ranlib</primary>
473 </indexterm>
474 </listitem>
475 </varlistentry>
476
477 <varlistentry id="gcov">
478 <term><command>gcov</command></term>
479 <listitem>
480 <para>A coverage testing tool; it is used to analyze programs to
481 determine where optimizations will have the greatest effect</para>
482 <indexterm zone="ch-system-gcc gcov">
483 <primary sortas="b-gcov">gcov</primary>
484 </indexterm>
485 </listitem>
486 </varlistentry>
487
488 <varlistentry id="gcov-dump">
489 <term><command>gcov-dump</command></term>
490 <listitem>
491 <para>Offline gcda and gcno profile dump tool</para>
492 <indexterm zone="ch-system-gcc gcov-dump">
493 <primary sortas="b-gcov-dump">gcov-dump</primary>
494 </indexterm>
495 </listitem>
496 </varlistentry>
497
498 <varlistentry id="gcov-tool">
499 <term><command>gcov-tool</command></term>
500 <listitem>
501 <para>Offline gcda profile processing tool</para>
502 <indexterm zone="ch-system-gcc gcov-tool">
503 <primary sortas="b-gcov-tool">gcov-tool</primary>
504 </indexterm>
505 </listitem>
506 </varlistentry>
507
508 <varlistentry id="lto-dump">
509 <term><command>lto-dump</command></term>
510 <listitem>
511 <para>Tool for dumping object files produced by GCC with LTO
512 enabled</para>
513 <indexterm zone="ch-system-gcc lto-dump">
514 <primary sortas="b-lto-dump">lto-dump</primary>
515 </indexterm>
516 </listitem>
517 </varlistentry>
518
519 <varlistentry id="libasan">
520 <term><filename class="libraryfile">libasan</filename></term>
521 <listitem>
522 <para>The Address Sanitizer runtime library</para>
523 <indexterm zone="ch-system-gcc libasan">
524 <primary sortas="b-libasan">libasan</primary>
525 </indexterm>
526 </listitem>
527 </varlistentry>
528
529 <varlistentry id="libatomic">
530 <term><filename class="libraryfile">libatomic</filename></term>
531 <listitem>
532 <para>GCC atomic built-in runtime library</para>
533 <indexterm zone="ch-system-gcc libatomic">
534 <primary sortas="b-libatomic">libatomic</primary>
535 </indexterm>
536 </listitem>
537 </varlistentry>
538
539 <varlistentry id="libcc1">
540 <term><filename class="libraryfile">libcc1</filename></term>
541 <listitem>
542 <para>A library that allows GDB to make use of GCC</para>
543 <indexterm zone="ch-system-gcc libcc1">
544 <primary sortas="b-libcc1">libcc1</primary>
545 </indexterm>
546 </listitem>
547 </varlistentry>
548
549 <varlistentry id="libgcc">
550 <term><filename class="libraryfile">libgcc</filename></term>
551 <listitem>
552 <para>Contains run-time support for <command>gcc</command></para>
553 <indexterm zone="ch-system-gcc libgcc">
554 <primary sortas="c-libgcc">libgcc</primary>
555 </indexterm>
556 </listitem>
557 </varlistentry>
558
559 <varlistentry id="libgcov">
560 <term><filename class="libraryfile">libgcov</filename></term>
561 <listitem>
562 <para>This library is linked into a program when GCC is instructed
563 to enable profiling</para>
564 <indexterm zone="ch-system-gcc libgcov">
565 <primary sortas="c-libgcov">libgcov</primary>
566 </indexterm>
567 </listitem>
568 </varlistentry>
569
570 <varlistentry id="libgomp">
571 <term><filename class="libraryfile">libgomp</filename></term>
572 <listitem>
573 <para>GNU implementation of the OpenMP API for multi-platform
574 shared-memory parallel programming in C/C++ and Fortran</para>
575 <indexterm zone="ch-system-gcc libgomp">
576 <primary sortas="c-libgomp">libgomp</primary>
577 </indexterm>
578 </listitem>
579 </varlistentry>
580
581 <varlistentry id="libhwasan">
582 <term><filename class="libraryfile">libhwasan</filename></term>
583 <listitem>
584 <para>The Hardware-assisted Address Sanitizer runtime library</para>
585 <indexterm zone="ch-system-gcc libhwasan">
586 <primary sortas="c-libhwasan">libhwasan</primary>
587 </indexterm>
588 </listitem>
589 </varlistentry>
590
591 <varlistentry id="libitm">
592 <term><filename class="libraryfile">libitm</filename></term>
593 <listitem>
594 <para>The GNU transactional memory library</para>
595 <indexterm zone="ch-system-gcc libitm">
596 <primary sortas="c-libitm">libitm</primary>
597 </indexterm>
598 </listitem>
599 </varlistentry>
600
601 <varlistentry id="liblsan">
602 <term><filename class="libraryfile">liblsan</filename></term>
603 <listitem>
604 <para>The Leak Sanitizer runtime library</para>
605 <indexterm zone="ch-system-gcc liblsan">
606 <primary sortas="c-liblsan">liblsan</primary>
607 </indexterm>
608 </listitem>
609 </varlistentry>
610
611 <varlistentry id="liblto_plugin">
612 <term><filename class="libraryfile">liblto_plugin</filename></term>
613 <listitem>
614 <para>GCC's LTO plugin allows Binutils to process object files
615 produced by GCC with LTO enabled</para>
616 <indexterm zone="ch-system-gcc liblto_plugin">
617 <primary sortas="c-liblto_plugin">liblto_plugin</primary>
618 </indexterm>
619 </listitem>
620 </varlistentry>
621
622 <varlistentry id="libquadmath">
623 <term><filename class="libraryfile">libquadmath</filename></term>
624 <listitem>
625 <para>GCC Quad Precision Math Library API</para>
626 <indexterm zone="ch-system-gcc libquadmath">
627 <primary sortas="c-libquadmath">libquadmath</primary>
628 </indexterm>
629 </listitem>
630 </varlistentry>
631
632 <varlistentry id="libssp">
633 <term><filename class="libraryfile">libssp</filename></term>
634 <listitem>
635 <para>Contains routines supporting GCC's stack-smashing protection
636 functionality. Normally it is not used, because Glibc also provides
637 those routines.</para>
638 <indexterm zone="ch-system-gcc libssp">
639 <primary sortas="c-libssp">libssp</primary>
640 </indexterm>
641 </listitem>
642 </varlistentry>
643
644 <varlistentry id="libstdc">
645 <term><filename class="libraryfile">libstdc++</filename></term>
646 <listitem>
647 <para>The standard C++ library</para>
648 <indexterm zone="ch-system-gcc libstdc">
649 <primary sortas="c-libstdc++">libstdc++</primary>
650 </indexterm>
651 </listitem>
652 </varlistentry>
653
654 <varlistentry id="libstdcexp">
655 <term><filename class="libraryfile">libstdc++exp</filename></term>
656 <listitem>
657 <para>Experimental C++ Contracts library</para>
658 <indexterm zone="ch-system-gcc libstdcexp">
659 <primary sortas="c-libstdc++exp">libstdc++exp</primary>
660 </indexterm>
661 </listitem>
662 </varlistentry>
663
664 <varlistentry id="libstdcfs">
665 <term><filename class="libraryfile">libstdc++fs</filename></term>
666 <listitem>
667 <para>ISO/IEC TS 18822:2015 Filesystem library</para>
668 <indexterm zone="ch-system-gcc libstdcfs">
669 <primary sortas="c-libstdc++fs">libstdc++fs</primary>
670 </indexterm>
671 </listitem>
672 </varlistentry>
673
674 <varlistentry id="libsupc">
675 <term><filename class="libraryfile">libsupc++</filename></term>
676 <listitem>
677 <para>Provides supporting routines for the C++ programming
678 language</para>
679 <indexterm zone="ch-system-gcc libsupc">
680 <primary sortas="c-libsupc++">libsupc++</primary>
681 </indexterm>
682 </listitem>
683 </varlistentry>
684
685 <varlistentry id="libtsan">
686 <term><filename class="libraryfile">libtsan</filename></term>
687 <listitem>
688 <para>The Thread Sanitizer runtime library</para>
689 <indexterm zone="ch-system-gcc libtsan">
690 <primary sortas="c-libtsan">libtsan</primary>
691 </indexterm>
692 </listitem>
693 </varlistentry>
694
695 <varlistentry id="libubsan">
696 <term><filename class="libraryfile">libubsan</filename></term>
697 <listitem>
698 <para>The Undefined Behavior Sanitizer runtime library</para>
699 <indexterm zone="ch-system-gcc libubsan">
700 <primary sortas="c-libubsan">libubsan</primary>
701 </indexterm>
702 </listitem>
703 </varlistentry>
704
705 </variablelist>
706
707 </sect2>
708
709</sect1>
Note: See TracBrowser for help on using the repository browser.