summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorDongkyun, Son <dongkyun.s@samsung.com>2017-01-11 19:29:59 +0900
committerIvan Baravy <i.baravy@samsung.com>2017-02-16 19:57:20 +0300
commitcadcd442ec268f976de8c84782216e3033cd88d2 (patch)
tree713877ebd9e71c6de2232652e102762440bb267c
parent4d592bd069a552adb7af8f45ec6e5ded706475dd (diff)
downloadlinaro-gcc-cadcd442ec268f976de8c84782216e3033cd88d2.tar.gz
linaro-gcc-cadcd442ec268f976de8c84782216e3033cd88d2.tar.bz2
linaro-gcc-cadcd442ec268f976de8c84782216e3033cd88d2.zip
packaging: add packaging
Change-Id: Icd5159e115d6827eaaff5ff59861d07438c29129 Signed-off-by: Dongkyun, Son <dongkyun.s@samsung.com>
-rw-r--r--packaging/ASAN_OPTIONS1
-rw-r--r--packaging/LSAN_OPTIONS1
-rw-r--r--packaging/UBSAN_OPTIONS1
-rw-r--r--packaging/asan_symbolize.py704
-rw-r--r--packaging/cloog-0.18.4.tar.gzbin0 -> 4796456 bytes
-rw-r--r--packaging/extract-ubsan-logs17
-rw-r--r--packaging/gcc-aarch64.spec1253
-rw-r--r--packaging/gcc-armv7l.spec1253
-rw-r--r--packaging/gcc-force-options70
-rw-r--r--packaging/gcc-unforce-options19
-rw-r--r--packaging/gcc.manifest5
-rw-r--r--packaging/gmp-6.1.1.tar.bz2bin0 -> 2384919 bytes
-rw-r--r--packaging/isl-0.17.1.tar.bz2bin0 -> 1620452 bytes
-rw-r--r--packaging/linaro-gcc.spec1250
-rw-r--r--packaging/lsan.supp1
-rw-r--r--packaging/macros.ubsan39
-rw-r--r--packaging/mpc-1.0.3.tar.gzbin0 -> 669925 bytes
-rw-r--r--packaging/mpfr-3.1.5.tar.bz2bin0 -> 1279489 bytes
-rwxr-xr-xpackaging/pre_checkin.sh14
19 files changed, 4628 insertions, 0 deletions
diff --git a/packaging/ASAN_OPTIONS b/packaging/ASAN_OPTIONS
new file mode 100644
index 00000000000..50d644eb8db
--- /dev/null
+++ b/packaging/ASAN_OPTIONS
@@ -0,0 +1 @@
+halt_on_error=false:start_deactivated=true:print_cmdline=true:quarantine_size_mb=1:detect_leaks=0:full_address_space=true
diff --git a/packaging/LSAN_OPTIONS b/packaging/LSAN_OPTIONS
new file mode 100644
index 00000000000..db30ebc2b99
--- /dev/null
+++ b/packaging/LSAN_OPTIONS
@@ -0,0 +1 @@
+print_cmdline=true:detect_leaks=1:log_path=/tmp/lsan.log:log_exe_name=1:fast_unwind_on_malloc=false:malloc_context_size=5:suppressions=/lsan.supp:print_suppressions=false
diff --git a/packaging/UBSAN_OPTIONS b/packaging/UBSAN_OPTIONS
new file mode 100644
index 00000000000..0fbf7a7e2d5
--- /dev/null
+++ b/packaging/UBSAN_OPTIONS
@@ -0,0 +1 @@
+print_cmdline=true:log_path=/tmp/ubsan.log \ No newline at end of file
diff --git a/packaging/asan_symbolize.py b/packaging/asan_symbolize.py
new file mode 100644
index 00000000000..0ce93b760a2
--- /dev/null
+++ b/packaging/asan_symbolize.py
@@ -0,0 +1,704 @@
+#!/usr/bin/env python
+#===- lib/asan/scripts/asan_symbolize.py -----------------------------------===#
+#
+# The LLVM Compiler Infrastructure
+#
+# This file is distributed under the University of Illinois Open Source
+# License. See https://github.com/llvm-mirror/compiler-rt/blob/master/LICENSE.TXT
+# for details.
+#
+#===------------------------------------------------------------------------===#
+import argparse
+import array
+import binascii
+import bisect
+import os
+import re
+import subprocess
+import sys
+
+symbolizers = {}
+DEBUG = False
+demangle = False
+binutils_prefix = None
+sysroot_path = None
+binary_name_filter = None
+fix_filename_patterns = None
+logfile = sys.stdin
+separate_debug_dir_list = []
+prelink_offset = None
+
+# FIXME: merge the code that calls fix_filename().
+def fix_filename(file_name):
+ if fix_filename_patterns:
+ for path_to_cut in fix_filename_patterns:
+ file_name = re.sub('.*' + path_to_cut, '', file_name)
+ file_name = re.sub('.*asan_[a-z_]*.cc:[0-9]*', '_asan_rtl_', file_name)
+ file_name = re.sub('.*crtstuff.c:0', '???:0', file_name)
+ return file_name
+
+def sysroot_path_filter(binary_name):
+ return sysroot_path + binary_name
+
+def use_binutils_prefix(tool_name):
+ if binutils_prefix:
+ tool_name = binutils_prefix + tool_name
+ return tool_name
+
+def print_error_message(message):
+ print >> sys.stderr, 'Error occured during symbolizisation: ' + message
+
+class DebugInfoHandler(object):
+ def __init__(self, binary_name_filter=None):
+ self.binary_name_filter = binary_name_filter
+ self.global_debug_dir_list = [ self.use_name_filter("/usr/lib/debug") ]
+ if separate_debug_dir_list:
+ self.global_debug_dir_list = separate_debug_dir_list
+
+ def use_name_filter(self, binary_name):
+ if self.binary_name_filter:
+ binary_name = self.binary_name_filter(binary_name)
+ return binary_name
+
+ def calc_crc32(self, filename):
+ buf = open(filename,'rb').read()
+ buf = (binascii.crc32(buf, 0) & 0xFFFFFFFF)
+ return "%08X" % buf
+
+ def readelf_binary(self, options, binary):
+ cmd = [use_binutils_prefix('readelf'), options,'-W', binary]
+ try:
+ process = subprocess.Popen(cmd, stdout=subprocess.PIPE, stderr=open(os.devnull, 'w'))
+ except:
+ print_error_message('the following command failed:\n''"' + ' '.join(cmd) + '"')
+ return
+ (readelf_out, _) = process.communicate()
+ if process.returncode == 0:
+ return readelf_out
+
+ def has_debuginfo(self, binary):
+ readelf_out = self.readelf_binary('-S', binary)
+ return readelf_out and (".debug_" in readelf_out)
+
+ def get_buildid(self, binary):
+ readelf_out = self.readelf_binary('-nw', binary)
+ '''
+ Build ID is 40-length hex value following after "Build ID:".
+ e.g.:
+ Notes at offset 0x00000274 with length 0x00000024:
+ Owner Data size Description
+ GNU 0x00000014 NT_GNU_BUILD_ID (unique build ID bitstring)
+ Build ID: 977b1d1375ba6791d5f6dd38d8d55b95f9fca33a
+ '''
+ if readelf_out:
+ readelf_lines = readelf_out.split("\n");
+ buildid_lines = filter(re.compile('Build ID:').search, readelf_lines)
+ for line in buildid_lines:
+ match = re.search('[a-f0-9]{40}', line)
+ if match:
+ return match.group(0)
+ else:
+ print_error_message('failed to read Build ID value from ' + binary)
+
+ def get_debuglink_name(self, binary):
+ readelf_out = self.readelf_binary('--string-dump=.gnu_debuglink', binary)
+ '''
+ "debug link" is the last word in the first line of dump.
+ e.g.:
+ String dump of section '.gnu_debuglink':
+ [ 0] HeapOutOfBounds.out.debug
+ '''
+ if readelf_out:
+ readelf_lines = filter(None, readelf_out.split("\n"));
+ headline ="String dump of section '.gnu_debuglink':"
+ try:
+ debuglink_line_idx = readelf_lines.index(headline) + 1
+ except ValueError:
+ # There is no gnu_debuglink section in this binary
+ return
+ if len(readelf_lines) > debuglink_line_idx:
+ return readelf_lines[debuglink_line_idx].split()[-1]
+ else:
+ print_error_message('failed to read debuglink value from ' + binary)
+
+ def get_debuglink_crc(self, binary):
+ readelf_out = self.readelf_binary('--hex-dump=.gnu_debuglink', binary)
+ '''
+ crc is the last hex group (before string representation) in the last line of dump.
+ e.g. (crc is f89f21c2) :
+ Hex dump of section '.gnu_debuglink':
+ 0x00000000 48656170 4f75744f 66426f75 6e64732e HeapOutOfBounds.
+ 0x00000010 6f75742e 64656275 67000000 f89f21c2 out.debug.....!.
+ '''
+ if readelf_out:
+ # get last non-empty line
+ crc_line = filter(None, readelf_out.split("\n"))[-1]
+ # remove last 16 characters (string dump) from line
+ crc_line = crc_line[:-16]
+ # crc is last word in string
+ crc = crc_line.split()[-1]
+ match = re.match('[a-f0-9]{8}', crc)
+ if match:
+ if sys.byteorder == 'little':
+ crc = array.array('i', binascii.unhexlify(crc) )
+ crc.byteswap()
+ crc = binascii.hexlify(crc)
+ return crc
+ else:
+ print_error_message('failed to get crc checksum from debuglink in ' + binary)
+
+
+ def is_prelinked(self, binary):
+ readelf_out = self.readelf_binary('-S', binary)
+ return readelf_out and ".gnu.prelink_undo" in readelf_out
+
+ def get_load_address(self, binary):
+ readelf_out = self.readelf_binary('-l', binary)
+ '''
+ Readelf program headers output example:
+ Elf file type is DYN (Shared object file)
+ Entry point 0xb1160668
+ There are 10 program headers, starting at offset 52
+ Program Headers:
+ Type Offset VirtAddr PhysAddr FileSiz MemSiz Flg Align
+ EXIDX 0x124754 0xb126c754 0xb126c754 0x04498 0x04498 R 0x4
+ [...]
+ LOAD 0x000000 0xb1148000 0xb1148000 0x12be9c 0x12be9c R E 0x8000
+
+ '''
+ readelf_lines = readelf_out.split("\n");
+ load_lines = filter(re.compile(
+ '[\s]*LOAD[\s]+0x[0]+[\s]+0x[a-fA-f\d]+').match, readelf_lines)
+ if load_lines:
+ return load_lines[0].split()[2]
+ else:
+ print_error_message('failed to get load address in ' + binary)
+
+ def get_prelink_offset(self, orig, prelinked):
+ if not self.is_prelinked(prelinked):
+ return
+ orig_load_addr = self.get_load_address(orig)
+ prelinked_load_addr = self.get_load_address(prelinked)
+ return int(prelinked_load_addr, 16) - int(orig_load_addr, 16)
+
+ def locate_in_orig_dir(self, debuglink_name, orig_binary_name):
+ debuginfo = os.path.join(os.path.dirname(orig_binary_name), debuglink_name)
+ debuginfo = self.use_name_filter(debuginfo)
+ return [debuginfo]
+
+ def locate_in_debug_subdir(self, debuglink_name, orig_binary_name):
+ debuginfo = os.path.join(os.path.dirname(orig_binary_name), '.debug', debuglink_name)
+ debuginfo = self.use_name_filter(debuginfo)
+ return [debuginfo]
+
+ def locate_in_global_debug_dir(self, debuglink_name, orig_binary_name):
+ debuginfo_list = []
+ for global_debug_dir in self.global_debug_dir_list:
+ debuginfo = global_debug_dir + os.path.join(os.path.dirname(orig_binary_name), debuglink_name)
+ debuginfo_list.append(debuginfo)
+ return debuginfo_list
+
+ def locate_in_buildid_dir(self, debuglink_name, orig_binary_name):
+ dir_name = debuglink_name[0:2]
+ file_name = debuglink_name[2:] + ".debug"
+ debuginfo_list = []
+ for global_debug_dir in self.global_debug_dir_list:
+ debuginfo = os.path.join(global_debug_dir, ".build-id", dir_name, file_name)
+ debuginfo_list.append(debuginfo)
+ return debuginfo_list
+
+ def get_debuginfo(self,binary_name):
+ global prelink_offset
+ prelink_offset = None
+ orig_binary_name = binary_name
+ # First apply sysroot path if defined to get real binary
+ real_binary = self.use_name_filter(binary_name)
+ if self.has_debuginfo(real_binary):
+ return real_binary
+ # Look for debuginfo file according to GDB rules
+ # 1) "build-id" method
+ buildid_name = self.get_buildid(real_binary)
+ debugfile_list = []
+ if buildid_name:
+ debugfile_list = self.locate_in_buildid_dir(buildid_name, orig_binary_name)
+ for debugfile in debugfile_list:
+ if os.path.isfile(debugfile):
+ prelink_offset = self.get_prelink_offset(debugfile, real_binary)
+ return debugfile
+ # 2) "debug link" method
+ debuglink_name = self.get_debuglink_name(real_binary)
+ debuglink_crc = self.get_debuglink_crc(real_binary)
+ debugfile_list = []
+ if debuglink_name and debuglink_crc:
+ debuglink_locate_list = [
+ self.locate_in_orig_dir,
+ self.locate_in_debug_subdir,
+ self.locate_in_global_debug_dir ]
+ for debuglink_locate_function in debuglink_locate_list:
+ debugfile_list = debuglink_locate_function(debuglink_name, orig_binary_name)
+ for debugfile in debugfile_list:
+ if os.path.isfile(debugfile):
+ debugfile_crc = self.calc_crc32(debugfile)
+ if int(debuglink_crc,16) == int(debugfile_crc, 16):
+ prelink_offset = self.get_prelink_offset(debugfile, real_binary)
+ return debugfile
+ return real_binary
+
+def guess_arch(addr):
+ # Guess which arch we're running. 10 = len('0x') + 8 hex digits.
+ if len(addr) > 10:
+ return 'x86_64'
+ else:
+ return 'i386'
+
+class Symbolizer(object):
+ def __init__(self):
+ pass
+
+ def symbolize(self, addr, binary, offset):
+ """Symbolize the given address (pair of binary and offset).
+
+ Overriden in subclasses.
+ Args:
+ addr: virtual address of an instruction.
+ binary: path to executable/shared object containing this instruction.
+ offset: instruction offset in the @binary.
+ Returns:
+ list of strings (one string for each inlined frame) describing
+ the code locations for this instruction (that is, function name, file
+ name, line and column numbers).
+ """
+ return None
+
+
+class LLVMSymbolizer(Symbolizer):
+ def __init__(self, symbolizer_path, default_arch, system, dsym_hints=[]):
+ super(LLVMSymbolizer, self).__init__()
+ self.symbolizer_path = symbolizer_path
+ self.default_arch = default_arch
+ self.system = system
+ self.dsym_hints = dsym_hints
+ self.pipe = self.open_llvm_symbolizer()
+
+ def open_llvm_symbolizer(self):
+ cmd = [self.symbolizer_path,
+ '--use-symbol-table=true',
+ '--demangle=%s' % demangle,
+ '--functions=short',
+ '--inlining=true',
+ '--default-arch=%s' % self.default_arch]
+ if self.system == 'Darwin':
+ for hint in self.dsym_hints:
+ cmd.append('--dsym-hint=%s' % hint)
+ if DEBUG:
+ print ' '.join(cmd)
+ try:
+ result = subprocess.Popen(cmd, stdin=subprocess.PIPE,
+ stdout=subprocess.PIPE)
+ except OSError:
+ result = None
+ return result
+
+ def symbolize(self, addr, binary, offset):
+ """Overrides Symbolizer.symbolize."""
+ if not self.pipe:
+ return None
+ result = []
+ try:
+ symbolizer_input = '"%s" %s' % (binary, offset)
+ if DEBUG:
+ print symbolizer_input
+ print >> self.pipe.stdin, symbolizer_input
+ while True:
+ function_name = self.pipe.stdout.readline().rstrip()
+ if not function_name:
+ break
+ file_name = self.pipe.stdout.readline().rstrip()
+ file_name = fix_filename(file_name)
+ if (not function_name.startswith('??') or
+ not file_name.startswith('??')):
+ # Append only non-trivial frames.
+ result.append('%s in %s %s' % (addr, function_name,
+ file_name))
+ except Exception:
+ result = []
+ if not result:
+ result = None
+ return result
+
+
+def LLVMSymbolizerFactory(system, default_arch, dsym_hints=[]):
+ symbolizer_path = os.getenv('LLVM_SYMBOLIZER_PATH')
+ if not symbolizer_path:
+ symbolizer_path = os.getenv('ASAN_SYMBOLIZER_PATH')
+ if not symbolizer_path:
+ # Assume llvm-symbolizer is in PATH.
+ symbolizer_path = 'llvm-symbolizer'
+ return LLVMSymbolizer(symbolizer_path, default_arch, system, dsym_hints)
+
+
+class Addr2LineSymbolizer(Symbolizer):
+ def __init__(self, binary):
+ super(Addr2LineSymbolizer, self).__init__()
+ self.binary = binary
+
+ def symbolize(self, addr, binary, offset):
+ """Overrides Symbolizer.symbolize."""
+ cmd = [use_binutils_prefix('addr2line'), '-fi']
+ if demangle:
+ cmd += ['--demangle']
+ cmd += ['-e', self.binary, offset]
+ if DEBUG:
+ print ' '.join(cmd)
+ self.pipe = subprocess.Popen(cmd, stdout=subprocess.PIPE)
+ result = []
+ if self.binary != binary:
+ return None
+ try:
+ lines = self.pipe.stdout.readlines()
+ except Exception:
+ lines = []
+ if not lines:
+ lines.append('??')
+ lines.append('??:?')
+ for i in range(0, len(lines), 2):
+ function_name = lines[i].rstrip()
+ file_name = fix_filename(lines[i+1].rstrip())
+ result.append('%s in %s %s' % (addr, function_name, file_name))
+ return result
+
+
+class UnbufferedLineConverter(object):
+ """
+ Wrap a child process that responds to each line of input with one line of
+ output. Uses pty to trick the child into providing unbuffered output.
+ """
+ def __init__(self, args, close_stderr=False):
+ # Local imports so that the script can start on Windows.
+ import pty
+ import termios
+ pid, fd = pty.fork()
+ if pid == 0:
+ # We're the child. Transfer control to command.
+ if close_stderr:
+ dev_null = os.open('/dev/null', 0)
+ os.dup2(dev_null, 2)
+ os.execvp(args[0], args)
+ else:
+ # Disable echoing.
+ attr = termios.tcgetattr(fd)
+ attr[3] = attr[3] & ~termios.ECHO
+ termios.tcsetattr(fd, termios.TCSANOW, attr)
+ # Set up a file()-like interface to the child process
+ self.r = os.fdopen(fd, "r", 1)
+ self.w = os.fdopen(os.dup(fd), "w", 1)
+
+ def convert(self, line):
+ self.w.write(line + "\n")
+ return self.readline()
+
+ def readline(self):
+ return self.r.readline().rstrip()
+
+
+class DarwinSymbolizer(Symbolizer):
+ def __init__(self, addr, binary):
+ super(DarwinSymbolizer, self).__init__()
+ self.binary = binary
+ self.arch = guess_arch(addr)
+ self.open_atos()
+
+ def open_atos(self):
+ if DEBUG:
+ print 'atos -o %s -arch %s' % (self.binary, self.arch)
+ cmdline = ['atos', '-o', self.binary, '-arch', self.arch]
+ self.atos = UnbufferedLineConverter(cmdline, close_stderr=True)
+
+ def symbolize(self, addr, binary, offset):
+ """Overrides Symbolizer.symbolize."""
+ if self.binary != binary:
+ return None
+ atos_line = self.atos.convert('0x%x' % int(offset, 16))
+ while "got symbolicator for" in atos_line:
+ atos_line = self.atos.readline()
+ # A well-formed atos response looks like this:
+ # foo(type1, type2) (in object.name) (filename.cc:80)
+ match = re.match('^(.*) \(in (.*)\) \((.*:\d*)\)$', atos_line)
+ if DEBUG:
+ print 'atos_line: ', atos_line
+ if match:
+ function_name = match.group(1)
+ function_name = re.sub('\(.*?\)', '', function_name)
+ file_name = fix_filename(match.group(3))
+ return ['%s in %s %s' % (addr, function_name, file_name)]
+ else:
+ return ['%s in %s' % (addr, atos_line)]
+
+
+# Chain several symbolizers so that if one symbolizer fails, we fall back
+# to the next symbolizer in chain.
+class ChainSymbolizer(Symbolizer):
+ def __init__(self, symbolizer_list):
+ super(ChainSymbolizer, self).__init__()
+ self.symbolizer_list = symbolizer_list
+
+ def symbolize(self, addr, binary, offset):
+ """Overrides Symbolizer.symbolize."""
+ for symbolizer in self.symbolizer_list:
+ if symbolizer:
+ result = symbolizer.symbolize(addr, binary, offset)
+ if result:
+ return result
+ return None
+
+ def append_symbolizer(self, symbolizer):
+ self.symbolizer_list.append(symbolizer)
+
+
+def BreakpadSymbolizerFactory(binary):
+ suffix = os.getenv('BREAKPAD_SUFFIX')
+ if suffix:
+ filename = binary + suffix
+ if os.access(filename, os.F_OK):
+ return BreakpadSymbolizer(filename)
+ return None
+
+
+def SystemSymbolizerFactory(system, addr, binary):
+ if system == 'Darwin':
+ return DarwinSymbolizer(addr, binary)
+ elif system == 'Linux':
+ return Addr2LineSymbolizer(binary)
+
+
+class BreakpadSymbolizer(Symbolizer):
+ def __init__(self, filename):
+ super(BreakpadSymbolizer, self).__init__()
+ self.filename = filename
+ lines = file(filename).readlines()
+ self.files = []
+ self.symbols = {}
+ self.address_list = []
+ self.addresses = {}
+ # MODULE mac x86_64 A7001116478B33F18FF9BEDE9F615F190 t
+ fragments = lines[0].rstrip().split()
+ self.arch = fragments[2]
+ self.debug_id = fragments[3]
+ self.binary = ' '.join(fragments[4:])
+ self.parse_lines(lines[1:])
+
+ def parse_lines(self, lines):
+ cur_function_addr = ''
+ for line in lines:
+ fragments = line.split()
+ if fragments[0] == 'FILE':
+ assert int(fragments[1]) == len(self.files)
+ self.files.append(' '.join(fragments[2:]))
+ elif fragments[0] == 'PUBLIC':
+ self.symbols[int(fragments[1], 16)] = ' '.join(fragments[3:])
+ elif fragments[0] in ['CFI', 'STACK']:
+ pass
+ elif fragments[0] == 'FUNC':
+ cur_function_addr = int(fragments[1], 16)
+ if not cur_function_addr in self.symbols.keys():
+ self.symbols[cur_function_addr] = ' '.join(fragments[4:])
+ else:
+ # Line starting with an address.
+ addr = int(fragments[0], 16)
+ self.address_list.append(addr)
+ # Tuple of symbol address, size, line, file number.
+ self.addresses[addr] = (cur_function_addr,
+ int(fragments[1], 16),
+ int(fragments[2]),
+ int(fragments[3]))
+ self.address_list.sort()
+
+ def get_sym_file_line(self, addr):
+ key = None
+ if addr in self.addresses.keys():
+ key = addr
+ else:
+ index = bisect.bisect_left(self.address_list, addr)
+ if index == 0:
+ return None
+ else:
+ key = self.address_list[index - 1]
+ sym_id, size, line_no, file_no = self.addresses[key]
+ symbol = self.symbols[sym_id]
+ filename = self.files[file_no]
+ if addr < key + size:
+ return symbol, filename, line_no
+ else:
+ return None
+
+ def symbolize(self, addr, binary, offset):
+ if self.binary != binary:
+ return None
+ res = self.get_sym_file_line(int(offset, 16))
+ if res:
+ function_name, file_name, line_no = res
+ result = ['%s in %s %s:%d' % (
+ addr, function_name, file_name, line_no)]
+ print result
+ return result
+ else:
+ return None
+
+
+class SymbolizationLoop(object):
+ def __init__(self, binary_name_filter=None, dsym_hint_producer=None):
+ if sys.platform == 'win32':
+ # ASan on Windows uses dbghelp.dll to symbolize in-process, which works
+ # even in sandboxed processes. Nothing needs to be done here.
+ self.process_line = self.process_line_echo
+ else:
+ # Used by clients who may want to supply a different binary name.
+ # E.g. in Chrome several binaries may share a single .dSYM.
+ self.binary_name_filter = binary_name_filter
+ self.dsym_hint_producer = dsym_hint_producer
+ self.system = os.uname()[0]
+ if self.system not in ['Linux', 'Darwin', 'FreeBSD']:
+ raise Exception('Unknown system')
+ self.llvm_symbolizers = {}
+ self.last_llvm_symbolizer = None
+ self.dsym_hints = set([])
+ self.frame_no = 0
+ self.process_line = self.process_line_posix
+
+ def symbolize_address(self, addr, binary, offset):
+ # On non-Darwin (i.e. on platforms without .dSYM debug info) always use
+ # a single symbolizer binary.
+ # On Darwin, if the dsym hint producer is present:
+ # 1. check whether we've seen this binary already; if so,
+ # use |llvm_symbolizers[binary]|, which has already loaded the debug
+ # info for this binary (might not be the case for
+ # |last_llvm_symbolizer|);
+ # 2. otherwise check if we've seen all the hints for this binary already;
+ # if so, reuse |last_llvm_symbolizer| which has the full set of hints;
+ # 3. otherwise create a new symbolizer and pass all currently known
+ # .dSYM hints to it.
+ if not binary in self.llvm_symbolizers:
+ use_new_symbolizer = True
+ if self.system == 'Darwin' and self.dsym_hint_producer:
+ dsym_hints_for_binary = set(self.dsym_hint_producer(binary))
+ use_new_symbolizer = bool(dsym_hints_for_binary - self.dsym_hints)
+ self.dsym_hints |= dsym_hints_for_binary
+ if self.last_llvm_symbolizer and not use_new_symbolizer:
+ self.llvm_symbolizers[binary] = self.last_llvm_symbolizer
+ else:
+ self.last_llvm_symbolizer = LLVMSymbolizerFactory(
+ self.system, guess_arch(addr), self.dsym_hints)
+ self.llvm_symbolizers[binary] = self.last_llvm_symbolizer
+ # Use the chain of symbolizers:
+ # Breakpad symbolizer -> LLVM symbolizer -> addr2line/atos
+ # (fall back to next symbolizer if the previous one fails).
+ if not binary in symbolizers:
+ symbolizers[binary] = ChainSymbolizer(
+ [BreakpadSymbolizerFactory(binary), self.llvm_symbolizers[binary]])
+ result = symbolizers[binary].symbolize(addr, binary, offset)
+ if result is None:
+ # Initialize system symbolizer only if other symbolizers failed.
+ symbolizers[binary].append_symbolizer(
+ SystemSymbolizerFactory(self.system, addr, binary))
+ result = symbolizers[binary].symbolize(addr, binary, offset)
+ # The system symbolizer must produce some result.
+ assert result
+ return result
+
+ def get_symbolized_lines(self, symbolized_lines):
+ if not symbolized_lines:
+ return [self.current_line]
+ else:
+ result = []
+ for symbolized_frame in symbolized_lines:
+ if '?' in symbolized_frame:
+ symbolized_frame += " " + re.search('\(.*?\)',self.current_line).group(0)
+ result.append(' #%s %s' % (str(self.frame_no), symbolized_frame.rstrip()))
+ self.frame_no += 1
+ return result
+
+ def process_logfile(self):
+ self.frame_no = 0
+ for line in logfile:
+ processed = self.process_line(line)
+ print '\n'.join(processed)
+
+ def process_line_echo(self, line):
+ return [line.rstrip()]
+
+ def process_line_posix(self, line):
+ self.current_line = line.rstrip()
+ #0 0x7f6e35cf2e45 (/blah/foo.so+0x11fe45)
+ stack_trace_line_format = (
+ '^( *#([0-9]+) *)(0x[0-9a-f]+)( *in [^ ]+)? *\((.*)\+(0x[0-9a-f]+)\)')
+ match = re.match(stack_trace_line_format, line)
+ if not match:
+ return [self.current_line]
+ if DEBUG:
+ print line
+ _, frameno_str, addr, func, binary, offset = match.groups()
+ if frameno_str == '0':
+ # Assume that frame #0 is the first frame of new stack trace.
+ self.frame_no = 0
+ original_binary = binary
+ if self.binary_name_filter:
+ binary = self.binary_name_filter(binary)
+ # Correct offset from backtrace if the binary was prelinked
+ # and printed address considers the prelink offset:
+ if prelink_offset:
+ real_offset = int(offset,16)
+ if real_offset > prelink_offset:
+ #FIXME: Need to check that offset fits section size
+ offset = hex(real_offset - prelink_offset)
+ if DEBUG:
+ print 'real address: ' + offset
+ symbolized_line = self.symbolize_address(addr, binary, offset)
+ if not symbolized_line:
+ if original_binary != binary:
+ symbolized_line = self.symbolize_address(addr, binary, offset)
+ return self.get_symbolized_lines(symbolized_line)
+
+
+if __name__ == '__main__':
+ parser = argparse.ArgumentParser(
+ formatter_class=argparse.RawDescriptionHelpFormatter,
+ description='ASan symbolization script',
+ epilog='Example of use:\n'
+ 'asan_symbolize.py -c "$HOME/opt/cross/bin/armv7l-tizen-linux-gnueabi-" '
+ '-s "$HOME/SymbolFiles" < asan.log')
+ parser.add_argument('path_to_cut', nargs='*',
+ help='pattern to be cut from the result file path ')
+ parser.add_argument('-d','--demangle', action='store_true',
+ help='demangle function names')
+ parser.add_argument('-s', metavar='SYSROOT',
+ help='set path to sysroot for sanitized binaries')
+ parser.add_argument('-c', metavar='CROSS_COMPILE',
+ help='set prefix for binutils')
+ parser.add_argument('-l','--logfile', default=sys.stdin,
+ type=argparse.FileType('r'),
+ help='set log file name to parse, default is stdin')
+ parser.add_argument('-y', '--debug-file-directory', metavar='DEBUGDIR',
+ help='The directories for separate debug information \
+ files. Multiple path components can be set concatenating \
+ them by a path separator.')
+ args = parser.parse_args()
+ if args.path_to_cut:
+ fix_filename_patterns = args.path_to_cut
+ if args.demangle:
+ demangle = True
+ if args.s:
+ binary_name_filter = sysroot_path_filter
+ sysroot_path = args.s
+ if args.c:
+ binutils_prefix = args.c
+ if args.logfile:
+ logfile = args.logfile
+ else:
+ logfile = sys.stdin
+ if args.debug_file_directory:
+ separate_debug_dir_list = args.debug_file_directory.split(":")
+ if os.uname()[0] == 'Linux':
+ debug_info_handler = DebugInfoHandler(binary_name_filter)
+ binary_name_filter = debug_info_handler.get_debuginfo
+ loop = SymbolizationLoop(binary_name_filter)
+ loop.process_logfile()
diff --git a/packaging/cloog-0.18.4.tar.gz b/packaging/cloog-0.18.4.tar.gz
new file mode 100644
index 00000000000..cf53b8180a5
--- /dev/null
+++ b/packaging/cloog-0.18.4.tar.gz
Binary files differ
diff --git a/packaging/extract-ubsan-logs b/packaging/extract-ubsan-logs
new file mode 100644
index 00000000000..d7a8ddf2a99
--- /dev/null
+++ b/packaging/extract-ubsan-logs
@@ -0,0 +1,17 @@
+#!/bin/sh
+
+# /usr/lib/rpm/tizen/extract-ubsan-logs
+
+# If using normal root, avoid changing anything.
+if [ -z "$RPM_BUILD_ROOT" -o "$RPM_BUILD_ROOT" = "/" ]; then
+ exit 0
+fi
+
+mkdir -p "$RPM_BUILD_ROOT/usr/share/ubsan"
+find "/tmp/" -name 'ubsan.log*' | xargs -I {} cp {} "$RPM_BUILD_ROOT/usr/share/ubsan/"
+find "$RPM_BUILD_ROOT/usr/share/ubsan/" -name 'ubsan.log*' | xargs -I {} sed -e "s#/.*rpmbuild/##" -i {}
+find "$RPM_BUILD_ROOT/usr/share/ubsan/" -name 'ubsan.log*' -exec rename ubsan ${RPM_PACKAGE_NAME}-ubsan {} \;
+
+# Avoid empty resulting RPMs: create a placeholder if there's no logs in directory.
+(find "$RPM_BUILD_ROOT/usr/share/ubsan/" -mindepth 1 -print -quit | grep -q .) || \
+ touch "$RPM_BUILD_ROOT/usr/share/ubsan/ubsan.log.empty"
diff --git a/packaging/gcc-aarch64.spec b/packaging/gcc-aarch64.spec
new file mode 100644
index 00000000000..82233dda2c5
--- /dev/null
+++ b/packaging/gcc-aarch64.spec
@@ -0,0 +1,1253 @@
+%define cross aarch64
+%define aarch64 1
+
+#
+# spec file for package gcc6
+#
+# Copyright (c) 2009 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2015 Tizen
+#
+# All modifications and additions to the file contributed by third parties
+# remain the property of their copyright owners, unless otherwise agreed
+# upon. The license for this file, and modifications and additions to the
+# file, is the same license as for the pristine package itself (unless the
+# license for the pristine package is not an Open Source License, in which
+# case the license is the MIT License). An "Open Source License" is a
+# license that conforms to the Open Source Definition (Version 1.9)
+# published by the Open Source Initiative.
+
+# Please submit bugfixes or comments via http://bugs.tizen.org/
+#
+# we use %%{?macro: ... } as it is more compact
+%if 0%{?run_tests}
+%define gcc_run_tests 1
+%endif
+
+%define tsan_arch x86_64 aarch64
+%define asan_arch x86_64 %ix86 ppc ppc64 %sparc %arm aarch64
+%define itm_arch x86_64 %ix86 %arm ppc ppc64 ppc64le s390 s390x %sparc aarch64
+%define atomic_arch x86_64 %ix86 %arm aarch64 ppc ppc64 ppc64le s390 s390x %sparc m68k
+%define lsan_arch x86_64 aarch64 %arm %ix86
+%define ubsan_arch x86_64 %ix86 ppc ppc64 %arm aarch64
+%define cilkrts_arch x86_64 %ix86
+
+%ifarch armv7l
+%define ARCH armv7l
+%define ABI eabi
+%endif
+%ifarch %ix86
+%define ARCH i586
+%endif
+%ifarch x86_64
+%define ARCH x86_64
+%endif
+%ifarch aarch64
+%define ARCH aarch64
+%endif
+%define host_arch %{ARCH}-tizen-linux-gnu%{?ABI}
+
+%define target_cpu %{?cross}%{!?cross:%{ARCH}}
+%define target_abi %{?cross:%{?armv7l:eabi}}%{!?cross:%{?ABI}}
+
+%define target_arch %{target_cpu}-tizen-linux-gnu%{?target_abi}
+%define libdir %{!?cross:%{_libdir}}%{?cross:%{_prefix}/lib%{?aarch64:64}}
+%define libsubdir %{libdir}/gcc/%{target_arch}/%{version}
+
+Name: gcc%{?cross:-%{cross}}
+# With generated files in src we could drop the following
+BuildRequires: bison
+BuildRequires: flex
+BuildRequires: gettext-devel
+BuildRequires: makeinfo
+## until here, but at least renaming and patching info files breaks this
+BuildRequires: gcc-c++
+BuildRequires: zlib-devel
+%ifarch x86_64
+BuildRequires: glibc-devel-32bit
+%endif
+BuildRequires: perl
+%{?cross:BuildRequires: binutils-%{cross}}
+# here we use %%if because OBS spec parser cannot expand
+# %%{?macro:...} correctly
+%if 0%{?gcc_run_tests}
+BuildRequires: dejagnu
+BuildRequires: expect
+BuildRequires: gdb
+%endif
+URL: http://gcc.gnu.org/
+Version: 6.2.1
+Release: 0
+Source: gcc-%{version}.tar.bz2
+Source10: gmp-6.1.1.tar.bz2
+Source11: mpfr-3.1.5.tar.bz2
+Source12: mpc-1.0.3.tar.gz
+Source13: isl-0.17.1.tar.bz2
+Source14: cloog-0.18.4.tar.gz
+Source15: gcc-force-options
+Source16: gcc-unforce-options
+Source17: ASAN_OPTIONS
+Source18: asan_symbolize.py
+Source19: LSAN_OPTIONS
+Source20: gcc.manifest
+Source21: UBSAN_OPTIONS
+Source22: macros.ubsan
+Source23: extract-ubsan-logs
+Source24: lsan.supp
+Group: Development/Building
+Summary: The GNU C Compiler and Support Files
+License: GPL-3.0+
+%{?cross:ExcludeArch: %{cross}}
+%description
+Core package for the GNU Compiler Collection, including the C language
+frontend.
+
+%package c++
+Summary: The GNU C++ Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description c++
+This package contains the GNU compiler for C++.
+
+%package -n libstdc++
+Summary: The standard C++ shared library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libstdc++
+The standard C++ library, needed for dynamically linked C++ programs.
+%post -n libstdc++ -p /sbin/ldconfig
+%postun -n libstdc++ -p /sbin/ldconfig
+
+%package -n libstdc++-devel
+Summary: Include Files and Libraries mandatory for Development
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libstdc++-devel
+This package contains all the headers and libraries of the standard C++
+library. It is needed for compiling C++ code.
+
+%package -n libgcc
+Summary: C compiler runtime library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libgcc
+Libgcc is needed for dynamically linked C programs.
+%post -n libgcc -p /sbin/ldconfig
+%postun -n libgcc -p /sbin/ldconfig
+
+%package -n libgomp
+Summary: The GNU compiler collection OpenMP runtime library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libgomp
+This is the OpenMP runtime library needed by OpenMP enabled programs
+that were built with the -fopenmp compiler option and by programs that
+were auto-parallelized via the -ftree-parallelize-loops compiler
+option.
+%post -n libgomp -p /sbin/ldconfig
+%postun -n libgomp -p /sbin/ldconfig
+
+%package objc
+Summary: GNU Objective C Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description objc
+This package contains the GNU Objective C compiler. Objective C is an
+object oriented language, created by Next Inc. and used in their
+Nextstep OS. The source code is available in the gcc package.
+
+%package -n libobjc
+Summary: Library for the GNU Objective C Compiler
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libobjc
+The library for the GNU Objective C compiler.
+%post -n libobjc -p /sbin/ldconfig
+%postun -n libobjc -p /sbin/ldconfig
+
+%package obj-c++
+Summary: GNU Objective C++ Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description obj-c++
+This package contains the GNU Objective C++ compiler. Objective C++ is an
+object oriented language, created by Next Inc. and used in their
+Nextstep OS. The source code is available in the gcc package.
+
+%package -n cpp
+Summary: The GCC Preprocessor
+License: GPL-3.0+
+Group: Development/Languages
+%description -n cpp
+This Package contains just the preprocessor that is used by the X11
+packages.
+
+%package ada
+Summary: GNU Ada95 Compiler Based on GCC (GNAT)
+License: GPL-3.0+
+Group: Development/Languages
+%description ada
+This package contains an Ada95 compiler and associated development
+tools based on the GNU GCC technology. Ada95 is the object oriented
+successor of the Ada83 language. To build this package from source you
+must have installed a binary version to bootstrap the compiler.
+
+%package -n libada
+Summary: GNU Ada Runtime Libraries
+License: GPL-3.0-with-GCC-exception
+Group: Development/Languages
+%description -n libada
+This package contains the shared libraries required to run programs
+compiled with the GNU Ada compiler (GNAT) if they are compiled to use
+shared libraries. It also contains the shared libraries for the
+Implementation of the Ada Semantic Interface Specification (ASIS), the
+implementation of Distributed Systems Programming (GLADE) and the Posix
+1003.5 Binding (Florist).
+%post -n libada -p /sbin/ldconfig
+%postun -n libada -p /sbin/ldconfig
+
+%package -n libquadmath
+Summary: The GNU Fortran Compiler Quadmath Runtime Library
+License: LGPL-2.1
+Group: Development/Languages
+%description -n libquadmath
+The runtime library needed to run programs compiled with the Fortran compiler
+of the GNU Compiler Collection (GCC) and quadruple precision floating point
+operations.
+%post -n libquadmath -p /sbin/ldconfig
+%postun -n libquadmath -p /sbin/ldconfig
+
+%package -n libitm
+Summary: The GNU Compiler Transactional Memory Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libitm
+The runtime library needed to run programs compiled with the
+-fgnu-tm option of the GNU Compiler Collection (GCC).
+%post -n libitm -p /sbin/ldconfig
+%postun -n libitm -p /sbin/ldconfig
+
+%package -n libasan
+Summary: The GNU Compiler Address Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libasan
+The runtime library needed to run programs compiled with the
+-fsanitize=address option of the GNU Compiler Collection (GCC).
+%post -n libasan -p /sbin/ldconfig
+%postun -n libasan -p /sbin/ldconfig
+
+%package -n libtsan
+Summary: The GNU Compiler Thread Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libtsan
+The runtime library needed to run programs compiled with the
+-fsanitize=thread option of the GNU Compiler Collection (GCC).
+%post -n libtsan -p /sbin/ldconfig
+%postun -n libtsan -p /sbin/ldconfig
+
+%package -n libatomic
+Summary: The GNU Compiler Atomic Operations Runtime Library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Languages
+%description -n libatomic
+The runtime library for atomic operations of the GNU Compiler Collection (GCC).
+%post -n libatomic -p /sbin/ldconfig
+%postun -n libatomic -p /sbin/ldconfig
+
+%package -n libcilkrts
+Summary: The GNU Compiler Cilk+ Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libcilkrts
+The runtime library needed to run programs compiled with the
+-fcilkplus option of the GNU Compiler Collection (GCC).
+%post -n libcilkrts -p /sbin/ldconfig
+%postun -n libcilkrts -p /sbin/ldconfig
+
+%package -n liblsan
+Summary: The GNU Compiler Leak Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n liblsan
+The runtime library needed to run programs compiled with the
+-fsanitize=leak option of the GNU Compiler Collection (GCC).
+%post -n liblsan -p /sbin/ldconfig
+%postun -n liblsan -p /sbin/ldconfig
+
+%package -n libubsan
+Summary: The GNU Compiler Undefined Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libubsan
+The runtime library needed to run programs compiled with the
+-fsanitize=undefined option of the GNU Compiler Collection (GCC).
+%post -n libubsan -p /sbin/ldconfig
+%postun -n libubsan -p /sbin/ldconfig
+
+%package -n libvtv
+Summary: The GNU Compiler Vtable Verifier Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libvtv
+The runtime library needed to run programs compiled with the
+-fvtable-verify option of the GNU Compiler Collection (GCC).
+%post -n libvtv -p /sbin/ldconfig
+%postun -n libvtv -p /sbin/ldconfig
+
+%package -n libgcj
+Summary: Java Runtime Library for gcc
+License: GPL-2.0-with-classpath-exception
+Group: Development/Building
+%description -n libgcj
+This library is needed if you want to use the GNU Java compiler, gcj.
+Source code for this package is in gcc.
+%post -n libgcj -p /sbin/ldconfig
+%postun -n libgcj -p /sbin/ldconfig
+
+%package java
+Summary: The GNU Java Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description java
+The Java compiler from the GCC-tools-suite.
+
+%package -n libgcj_bc
+Summary: Fake library for BC-ABI compatibility.
+License: GPL-2.0-with-classpath-exception
+Group: Development/Languages
+%description -n libgcj_bc
+A fake library that is used at link time only. It ensures that
+binaries built with the BC-ABI link against a constant SONAME.
+This way, BC-ABI binaries continue to work if the SONAME underlying
+libgcj.so changes.
+
+%package -n libgcj-jar
+Summary: Java runtime library (jar files).
+License: GPL-2.0-with-classpath-exception
+Group: Development/Languages
+%description -n libgcj-jar
+These are the jar files that go along with the gcj front end to gcc.
+
+%package -n libgcj-devel
+Summary: Include Files and Libraries mandatory for Development.
+License: GPL-2.0-with-classpath-exception
+Group: Development/Languages
+%description -n libgcj-devel
+This package contains all necessary include files and libraries needed
+to develop applications that require these.
+
+%package -n gcc-gij
+Summary: Java Bytecode Interpreter for gcc
+License: GPL-2.0-with-classpath-exception
+Group: Development/Languages
+%description -n gcc-gij
+This package contains the java bytecode interpreter gij and related tools.
+
+%package -n libffi
+Summary: Foreign Function Interface library
+License: BSD-3-Clause
+Group: Development/Building
+%description -n libffi
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+%post -n libffi -p /sbin/ldconfig
+%postun -n libffi -p /sbin/ldconfig
+
+%package -n libffi-devel
+Summary: Foreign Function Interface library development files
+License: BSD 3-Clause
+Group: Development/Building
+%description -n libffi-devel
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+
+%package go
+Summary: GNU Go Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description go
+This package contains a Go compiler and associated development
+files based on the GNU GCC technology.
+
+%package -n libgo
+Summary: GNU Go compiler runtime library
+License: BSD-3-Clause
+Group: Development/Languages
+%description -n libgo
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+%post -n libgo -p /sbin/ldconfig
+%postun -n libgo -p /sbin/ldconfig
+
+%package testresults
+Summary: Testsuite results
+License: SUSE-Public-Domain
+Group: Development/Languages
+%description testresults
+Results from running the gcc and target library testsuites.
+
+%package -n gcc-32bit
+Summary: The GNU C Compiler 32bit support
+Group: Development/Building
+%description -n gcc-32bit
+This package contains 32bit support for the GNU Compiler Collection.
+
+%package -n libstdc++-devel-32bit
+Summary: Include Files and Libraries mandatory for Development
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libstdc++-devel-32bit
+This package contains all the headers and libraries of the standard C++
+library. It is needed for compiling C++ code.
+
+%package -n libgcc-32bit
+Summary: C compiler runtime library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libgcc-32bit
+Libgcc is needed for dynamically linked C programs.
+%post -n libgcc-32bit -p /sbin/ldconfig
+%postun -n libgcc-32bit -p /sbin/ldconfig
+
+%package -n libgomp-32bit
+Summary: The GNU compiler collection OpenMP runtime library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libgomp-32bit
+This is the OpenMP runtime library needed by OpenMP enabled programs
+that were built with the -fopenmp compiler option and by programs that
+were auto-parallelized via the -ftree-parallelize-loops compiler
+option.
+%post -n libgomp-32bit -p /sbin/ldconfig
+%postun -n libgomp-32bit -p /sbin/ldconfig
+
+%package -n libstdc++-32bit
+Summary: The standard C++ shared library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libstdc++-32bit
+The standard C++ library, needed for dynamically linked C++ programs.
+%post -n libstdc++-32bit -p /sbin/ldconfig
+%postun -n libstdc++-32bit -p /sbin/ldconfig
+
+%package objc-32bit
+Summary: GNU Objective C Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description objc-32bit
+This package contains the GNU Objective C compiler. Objective C is an
+object oriented language, created by Next Inc. and used in their
+Nextstep OS. The source code is available in the gcc package.
+
+%package -n libobjc-32bit
+Summary: Library for the GNU Objective C Compiler
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libobjc-32bit
+The library for the GNU Objective C compiler.
+%post -n libobjc-32bit -p /sbin/ldconfig
+%postun -n libobjc-32bit -p /sbin/ldconfig
+
+%package ada-32bit
+Summary: GNU Ada95 Compiler Based on GCC (GNAT)
+License: GPL-3.0+
+Group: Development/Languages
+%description ada-32bit
+This package contains an Ada95 compiler and associated development
+tools based on the GNU GCC technology. Ada95 is the object oriented
+successor of the Ada83 language. To build this package from source you
+must have installed a binary version to bootstrap the compiler.
+
+%package -n libada-32bit
+Summary: GNU Ada Runtime Libraries
+License: GPL-3.0-with-GCC-exception
+Group: Development/Languages
+%description -n libada-32bit
+This package contains the shared libraries required to run programs
+compiled with the GNU Ada compiler (GNAT) if they are compiled to use
+shared libraries. It also contains the shared libraries for the
+Implementation of the Ada Semantic Interface Specification (ASIS), the
+implementation of Distributed Systems Programming (GLADE) and the Posix
+1003.5 Binding (Florist).
+%post -n libada-32bit -p /sbin/ldconfig
+%postun -n libada-32bit -p /sbin/ldconfig
+
+%package -n libquadmath-32bit
+Summary: The GNU Fortran Compiler Quadmath Runtime Library
+License: LGPL-2.1
+Group: Development/Languages
+%description -n libquadmath-32bit
+The runtime library needed to run programs compiled with the Fortran compiler
+of the GNU Compiler Collection (GCC) and quadruple precision floating point
+operations.
+%post -n libquadmath-32bit -p /sbin/ldconfig
+%postun -n libquadmath-32bit -p /sbin/ldconfig
+
+%package -n libitm-32bit
+Summary: The GNU Compiler Transactional Memory Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libitm-32bit
+The runtime library needed to run programs compiled with the
+-fgnu-tm option of the GNU Compiler Collection (GCC).
+%post -n libitm-32bit -p /sbin/ldconfig
+%postun -n libitm-32bit -p /sbin/ldconfig
+
+%package -n libasan-32bit
+Summary: The GNU Compiler Address Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libasan-32bit
+The runtime library needed to run programs compiled with the
+-fsanitize=address option of the GNU Compiler Collection (GCC).
+%post -n libasan-32bit -p /sbin/ldconfig
+%postun -n libasan-32bit -p /sbin/ldconfig
+
+%package -n libtsan-32bit
+Summary: The GNU Compiler Thread Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libtsan-32bit
+The runtime library needed to run programs compiled with the
+-fsanitize=thread option of the GNU Compiler Collection (GCC).
+%post -n libtsan-32bit -p /sbin/ldconfig
+%postun -n libtsan-32bit -p /sbin/ldconfig
+
+%package -n libatomic-32bit
+Summary: The GNU Compiler Atomic Operations Runtime Library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Languages
+%description -n libatomic-32bit
+The runtime library for atomic operations of the GNU Compiler Collection (GCC).
+%post -n libatomic-32bit -p /sbin/ldconfig
+%postun -n libatomic-32bit -p /sbin/ldconfig
+
+%package -n libcilkrts-32bit
+Summary: The GNU Compiler Cilk+ Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libcilkrts-32bit
+The runtime library needed to run programs compiled with the
+-fcilkplus option of the GNU Compiler Collection (GCC).
+%post -n libcilkrts-32bit -p /sbin/ldconfig
+%postun -n libcilkrts-32bit -p /sbin/ldconfig
+
+%package -n liblsan-32bit
+Summary: The GNU Compiler Leak Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n liblsan-32bit
+The runtime library needed to run programs compiled with the
+-fsanitize=leak option of the GNU Compiler Collection (GCC).
+%post -n liblsan-32bit -p /sbin/ldconfig
+%postun -n liblsan-32bit -p /sbin/ldconfig
+
+%package -n libubsan-32bit
+Summary: The GNU Compiler Undefined Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libubsan-32bit
+The runtime library needed to run programs compiled with the
+-fsanitize=undefined option of the GNU Compiler Collection (GCC).
+%post -n libubsan-32bit -p /sbin/ldconfig
+%postun -n libubsan-32bit -p /sbin/ldconfig
+
+%package -n libvtv-32bit
+Summary: The GNU Compiler Vtable Verifier Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libvtv-32bit
+The runtime library needed to run programs compiled with the
+-fvtable-verify option of the GNU Compiler Collection (GCC).
+%post -n libvtv-32bit -p /sbin/ldconfig
+%postun -n libvtv-32bit -p /sbin/ldconfig
+
+%package -n libffi-32bit
+Summary: Foreign Function Interface library
+License: BSD-3-Clause
+Group: Development/Building
+%description -n libffi-32bit
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+%post -n libffi-32bit -p /sbin/ldconfig
+%postun -n libffi-32bit -p /sbin/ldconfig
+
+%package -n libffi-devel-32bit
+Summary: Foreign Function Interface library development files
+License: BSD 3-Clause
+Group: Development/Building
+%description -n libffi-devel-32bit
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+
+%package go-32bit
+Summary: GNU Go Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description go-32bit
+This package contains a Go compiler and associated development
+files based on the GNU GCC technology.
+
+%package -n libgo-32bit
+Summary: GNU Go compiler runtime library
+License: BSD-3-Clause
+Group: Development/Languages
+%description -n libgo-32bit
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+%post -n libgo-32bit -p /sbin/ldconfig
+%postun -n libgo-32bit -p /sbin/ldconfig
+
+%package -n asan-force-options
+Summary: Scripts to enable automatic package sanitization
+Group: System Environment
+Requires: gcc rpm
+Requires: libasan
+
+%description -n asan-force-options
+Scripts for ASan instrumentation
+
+%post -n asan-force-options
+# Change mode to allow all users to run gcc-force/unforce-options
+chmod a+w /usr/bin
+[ -d /emul/ ] && chmod a+w /emul/usr/bin/ && chmod a+w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-force-options -fsanitize-recover=address -fsanitize=address -fno-common -fno-omit-frame-pointer -U_FORTIFY_SOURCE
+# Add restore_fcommon macro
+cat >> /usr/lib/rpm/tizen_macros << EOF
+
+%restore_fcommon \\
+ /usr/bin/gcc-unforce-options \\
+ /usr/bin/gcc-force-options -fsanitize-recover=address -fsanitize=address -fcommon -fno-omit-frame-pointer -U_FORTIFY_SOURCE
+
+EOF
+
+%preun -n asan-force-options
+# Restore read-only mode
+chmod a-w /usr/bin
+[ -d /emul/ ] && chmod a-w /emul/usr/bin/ && chmod a-w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-unforce-options
+
+%package -n ubsan-force-options
+Summary: Scripts to enable automatic package sanitization
+Group: System Environment
+Requires: gcc
+Requires: libubsan
+
+%description -n ubsan-force-options
+Scripts for UBSan instrumentation
+
+%post -n ubsan-force-options
+# Change mode to allow all users to run gcc-force/unforce-options
+chmod a+w /usr/bin
+[ -d /emul/ ] && chmod a+w /emul/usr/bin/ && chmod a+w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-force-options -fsanitize=undefined,bounds-strict,float-divide-by-zero,float-cast-overflow
+
+%preun -n ubsan-force-options
+# Restore read-only mode
+chmod a-w /usr/bin
+[ -d /emul/ ] && chmod a-w /emul/usr/bin/ && chmod a-w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-unforce-options
+
+%package -n ubsan-build-env
+Summary: UBSan build environment
+Group: System Environment
+Requires: gcc
+Requires: libubsan rpm
+
+%description -n ubsan-build-env
+UBSan build environment support files and scripts
+
+%post -n ubsan-build-env
+cat %{_rpmconfigdir}/macros.ubsan >> %{_rpmconfigdir}/tizen_macros
+
+%package -n lsan-force-options
+Summary: Scripts to enable automatic package sanitization
+Group: System Environment
+Requires: gcc
+Requires: liblsan
+
+%description -n lsan-force-options
+Scripts for LSan instrumentation
+
+%post -n lsan-force-options
+# Change mode to allow all users to run gcc-force/unforce-options
+chmod a+w /usr/bin
+[ -d /emul/ ] && chmod a+w /emul/usr/bin/ && chmod a+w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-force-options -fsanitize=leak -fno-omit-frame-pointer -U_FORTIFY_SOURCE
+
+%preun -n lsan-force-options
+# Restore read-only mode
+chmod a-w /usr/bin
+[ -d /emul/ ] && chmod a-w /emul/usr/bin/ && chmod a-w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-unforce-options
+[ -d /emul/ ] && chmod a-w /emul/usr/bin/
+
+%package -n asan-build-env
+Summary: Asan build environment
+Group: Development/Libraries
+Requires: libasan
+
+%description -n asan-build-env
+Asan build environment
+
+%post -n asan-build-env
+# Add /usr/lib/libasan.so to /etc/ld.so.preload
+[ -f /etc/ld.so.preload ] && mv -v /etc/ld.so.preload /etc/ld.so.preload.orig
+echo "libasan.so" > /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && cat /etc/ld.so.preload.orig >> /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && rm -f /etc/ld.so.preload.orig
+
+%preun -n asan-build-env
+# Restore /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && mv -v /etc/ld.so.preload.orig /etc/ld.so.preload
+
+%package -n lsan-runtime-env
+Summary: LSan runtime environment
+Group: Development/Libraries
+Requires: liblsan
+Requires(post): smack
+
+%description -n lsan-runtime-env
+LSan runtime environment
+
+%post -n lsan-runtime-env
+# Add /usr/lib64/liblsan.so to /etc/ld.so.preload
+[ -f /etc/ld.so.preload ] && mv -v /etc/ld.so.preload /etc/ld.so.preload.orig
+echo "%{libdir}/liblsan.so" > /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && cat /etc/ld.so.preload.orig >> /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && rm -f /etc/ld.so.preload.orig
+chsmack -a "_" /etc/ld.so.preload /LSAN_OPTIONS /lsan.supp
+
+%preun -n lsan-runtime-env
+# Restore /etc/ld.so.preload
+mv -v /etc/ld.so.preload.orig /etc/ld.so.preload
+
+%package -n sanitizer-devel
+Summary: Sanitizer platform-independent tools
+License: MIT
+Group: Development/Tools
+BuildArch: noarch
+Requires: binutils python
+Requires(post): smack
+
+%description -n sanitizer-devel
+The package contatins platform-independent tools for sanitization:
+- asan_symbolize.py: script for offline symbolization of asan logs
+
+%package -n asan-runtime-env
+Summary: Asan runtime environment for target device
+Group: Development/Libraries
+
+%description -n asan-runtime-env
+Asan runtime environment
+
+%post -n asan-runtime-env
+# Add /usr/lib/libasan.so to /etc/ld.so.preload
+[ -f /etc/ld.so.preload ] && mv -v /etc/ld.so.preload /etc/ld.so.preload.orig
+echo "%{libdir}/libasan.so" > /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && cat /etc/ld.so.preload.orig >> /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && rm -f /etc/ld.so.preload.orig
+echo "halt_on_error=false:start_deactivated=true:print_cmdline=true:quarantine_size_mb=1:detect_leaks=0:log_path=/tmp/asan.log:log_exe_path=1" > /ASAN_OPTIONS
+chsmack -a "_" /etc/ld.so.preload /ASAN_OPTIONS
+
+%preun -n asan-runtime-env
+# Restore /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && mv -v /etc/ld.so.preload.orig /etc/ld.so.preload
+
+%package -n ubsan-runtime-env
+Summary: UBSan runtime environment for target device
+Group: Development/Libraries
+Requires: libubsan
+
+%description -n ubsan-runtime-env
+UBSan runtime environment
+
+%post -n ubsan-runtime-env
+echo "print_cmdline=true:log_path=/tmp/ubsan.log" > /UBSAN_OPTIONS
+
+%package plugin-devel
+Summary: GNU GCC Plugin development files
+License: GPL-3.0+
+Group: Development/Languages
+%description plugin-devel
+This package contains GCC Plugin development files needed for compiler
+plugins build.
+
+%package -n sanitizer-sources
+Summary: Sanitizer family tools sources
+License: MIT
+Group: Development/Tools
+BuildArch: noarch
+
+%description -n sanitizer-sources
+Sanitizer family tools sources for external tools.
+
+%prep
+
+%setup -q -n gcc-%{version}
+cp %{SOURCE20} .
+
+tar xf %{SOURCE10}
+ln -sf gmp-6.1.1 gmp
+tar xf %{SOURCE11}
+ln -sf mpfr-3.1.5 mpfr
+tar xf %{SOURCE12}
+ln -sf mpc-1.0.3 mpc
+tar xf %{SOURCE13}
+ln -sf isl-0.17.1 isl
+tar xf %{SOURCE14}
+ln -sf cloog-0.18.4 cloog
+
+echo "" > gcc/DEV-PHASE
+
+%global gcc_release `sed -e 's/^.*-//g' %{_builddir}/gcc-%{version}/gcc/LINARO-VERSION`
+
+%build
+rm -rf obj
+mkdir obj
+cd obj
+
+RPM_OPT_FLAGS=`echo $RPM_OPT_FLAGS|sed -e 's/-fno-rtti//g' -e 's/-fno-exceptions//g' -e 's/-Wmissing-format-attribute//g' -e 's/-fstack-protector//g' -e 's/-ffortify=.//g' -e 's/-Wall//g' -e 's/-m32//g' -e 's/-m64//g' -e 's/-fexceptions//' -e 's/\([[:space:]]\+.*-D_FORTIFY_SOURCE=\)[[:alnum:]]\+/\10/g'
+RPM_OPT_FLAGS="$RPM_OPT_FLAGS -D__USE_FORTIFY_LEVEL=0"`
+%{?cross:
+RPM_OPT_FLAGS=`echo $RPM_OPT_FLAGS|sed -e 's/-m\(arch\|tune\|cpu\)=[^ ]*//g'`
+RPM_OPT_FLAGS=`echo $RPM_OPT_FLAGS|sed -e 's/-m\(sse\|fpmath\)[^ ]*//g'`
+}
+RPM_OPT_FLAGS=`echo $RPM_OPT_FLAGS|sed -e 's/ */ /g'`
+
+
+
+CFLAGS="$RPM_OPT_FLAGS" CXXFLAGS="$RPM_OPT_FLAGS" XCFLAGS="$RPM_OPT_FLAGS" \
+TCFLAGS="$RPM_OPT_FLAGS" GCJFLAGS="$RPM_OPT_FLAGS" \
+../configure \
+ --prefix=%{_prefix} \
+ --infodir=%{_infodir} \
+ --mandir=%{_mandir} \
+ --libdir=%{libdir} \
+ --libexecdir=%{libdir} \
+ --enable-languages=c,c++ \
+ --enable-checking=release \
+ --disable-libssp \
+ --disable-bootstrap \
+ --disable-libvtv \
+ --disable-plugin \
+ --disable-libgcj \
+ --with-slibdir=%{libdir} \
+ --with-system-zlib \
+ --with-sysroot=/ \
+ --enable-__cxa_atexit \
+ --enable-libstdcxx-allocator=new \
+ --enable-version-specific-runtime-libs \
+ --enable-linker-build-id \
+ --without-system-libunwind \
+ --enable-threads=posix \
+ --disable-multilib \
+ --disable-libquadmath \
+ --enable-lto \
+%{!?cross: \
+%ifarch armv7l
+ --with-arch=armv7-a \
+ --with-tune=cortex-a8 \
+ --disable-sjlj-exceptions \
+%endif
+%ifarch aarch64
+ --with-arch=armv8-a \
+ --disable-sjlj-exceptions \
+%endif
+%ifarch %ix86
+ --with-arch-32=i586 \
+ --with-tune=generic \
+ --disable-libmpx \
+%endif
+%ifarch x86_64
+ --with-arch-32=i586 \
+ --with-tune=generic \
+ --enable-multilib \
+ --disable-libmpx \
+%endif
+} \
+%{?cross: \
+%{?armv7l: \
+ --with-arch=armv7-a \
+ --with-tune=cortex-a8 \
+ --disable-sjlj-exceptions \
+} \
+%{?aarch64: \
+ --with-arch=armv8-a \
+ --disable-sjlj-exceptions \
+} \
+ --disable-libgcc \
+ --disable-libgomp \
+ --disable-libatomic \
+ --disable-libstdc++-v3 \
+ --disable-libsanitizer \
+ --disable-libitm \
+} \
+ --with-bugurl="http://bugs.tizen.org/" \
+ --with-pkgversion="Tizen/Linaro GCC %{version} %{gcc_release}" \
+ --target=%{target_arch} \
+ --host=%{host_arch} \
+ --build=%{host_arch}
+
+
+
+make BOOT_CFLAGS="$RPM_OPT_FLAGS" %{?_smp_mflags}
+%{?gcc_run_tests:
+ echo "Run testsuite"
+ # asan needs a whole shadow address space
+ ulimit -v unlimited || true
+ make -k check %{?_smp_mflags} || true
+ mkdir ../testresults
+ ../contrib/test_summary | tee ../testresults/test_summary.txt
+}
+
+%install
+cd obj
+
+make install DESTDIR=$RPM_BUILD_ROOT
+
+%{?gcc_run_tests:
+ cp `find . -name "*.sum"` ../testresults/
+ cp `find . -name "*.log" \! -name "config.log" | grep -v 'acats.\?/tests' ` ../testresults/
+ chmod 644 ../testresults/*
+}
+
+%{remove_docs}
+rm -rf %{buildroot}/%{_datadir}/locale
+
+#remove everything we don't need
+rm -rf %{buildroot}/%{libsubdir}/install-tools
+find %{buildroot}/%{libsubdir} -name "*.la" -exec rm -rf {} +
+
+%{!?cross:
+ln -s gcc %{buildroot}%{_bindir}/cc
+mv %{buildroot}%{libsubdir}/libstdc++.so*-gdb.py %{buildroot}%{_datadir}/gcc-%{version}/python/libstdcxx/
+
+# expose plugins for ar (required for lto builds)
+mkdir -p %{buildroot}%{_prefix}/lib/bfd-plugins
+ln -sf %{libsubdir}/liblto_plugin.so %{buildroot}%{_prefix}/lib/bfd-plugins/liblto_plugin.so
+
+# legacy preprocessor
+mkdir -p %{buildroot}/lib
+ln -s %{_bindir}/cpp %{buildroot}/lib/cpp
+
+# 32-bit libgcc in multilib configuration
+%ifarch x86_64
+mv %{buildroot}%{_prefix}/lib/libgcc_s.so* %{buildroot}%{libsubdir}/32/
+%endif
+
+# move libraries to libdir
+for lib in asan atomic cilkrts gfortran gomp itm lsan quadmath stdc++ supc++ tsan ubsan
+do
+ [ -e %{buildroot}%{libsubdir}/lib$lib.a ] && mv %{buildroot}%{libsubdir}/lib$lib.a %{buildroot}%{libdir}/
+ [ -e %{buildroot}%{libsubdir}/lib$lib.so ] && mv %{buildroot}%{libsubdir}/lib$lib.so* %{buildroot}%{libdir}/
+done
+}
+
+%{?cross:
+rm -rf %{buildroot}/%{libsubdir}/include-fixed
+rm -rf %{buildroot}/%{libsubdir}/include
+}
+
+%{!?cross:
+cp %{SOURCE15} %{SOURCE16} %{SOURCE18} %{buildroot}%{_prefix}/bin
+chmod a+x %{buildroot}%{_prefix}/bin/gcc-force-options
+chmod a+x %{buildroot}%{_prefix}/bin/gcc-unforce-options
+chmod a+x %{buildroot}%{_prefix}/bin/asan_symbolize.py
+
+cp %{SOURCE17} %{buildroot}
+chmod 644 %{buildroot}/ASAN_OPTIONS
+
+%ifarch %lsan_arch
+cp %{SOURCE19} %{SOURCE24} %{buildroot}
+chmod 644 %{buildroot}/LSAN_OPTIONS
+chmod 644 %{buildroot}/lsan.supp
+%endif
+
+cd ../
+tar -czf libsanitizer.tar.bz libsanitizer
+mkdir -p %{buildroot}/src
+mv -v libsanitizer.tar.bz %{buildroot}/src
+
+mkdir -p %{buildroot}/%{_rpmconfigdir}/tizen/
+install -m 0644 %{SOURCE21} %{buildroot}/
+install -m 0644 %{SOURCE22} %{buildroot}/%{_rpmconfigdir}/
+install -m 0755 %{SOURCE23} %{buildroot}/%{_rpmconfigdir}/tizen/
+}
+
+%files
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{?cross:
+%{_bindir}/*
+%{libsubdir}/*
+}
+%{!?cross:
+%{_bindir}/gcc
+%{_bindir}/cc
+%{_bindir}/gcov
+%{_bindir}/gcov-tool
+%{_bindir}/gcc-ar
+%{_bindir}/gcc-nm
+%{_bindir}/gcc-ranlib
+%{_bindir}/%{target_arch}-gcc
+%{_bindir}/%{target_arch}-gcc-%{version}
+%{_bindir}/%{target_arch}-gcc-ar
+%{_bindir}/%{target_arch}-gcc-nm
+%{_bindir}/%{target_arch}-gcc-ranlib
+%{libsubdir}/collect2
+%{libsubdir}/lto1
+%{libsubdir}/lto-wrapper
+%{libsubdir}/liblto_plugin.so*
+%{_prefix}/lib/bfd-plugins/liblto_plugin.so
+%{libsubdir}/include-fixed/*
+%{libsubdir}/include/*.h
+%{libsubdir}/*.a
+%{libsubdir}/*.so
+%{libsubdir}/*.o
+%{libsubdir}/*.spec
+%{libdir}/*.so
+%{libdir}/*.a
+%ifarch %cilkrts_arch
+%{libsubdir}/include/cilk/*
+%endif
+%{libsubdir}/include/sanitizer/*
+%ifarch %asan_arch
+%exclude %{libdir}/libasan.so
+%endif
+%ifarch %lsan_arch
+%exclude %{libdir}/liblsan.so
+%endif
+%ifarch %tsan_arch
+%exclude %{libdir}/libtsan.so
+%endif
+
+%files c++
+%defattr(-,root,root)
+%{libsubdir}/cc1plus
+%{_bindir}/g++
+%{_bindir}/c++
+%{_bindir}/%{target_arch}-g++
+%{_bindir}/%{target_arch}-c++
+
+%files -n libstdc++
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libstdc++.so.*
+
+%files -n libstdc++-devel
+%defattr(-,root,root)
+%{libdir}/libstdc++.so
+%{libdir}/libstdc++.a
+%{libdir}/libsupc++.a
+%{libsubdir}/include/c++/*
+%{_datadir}/gcc-%{version}/python/libstdcxx/*
+
+%files -n libgcc
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libgcc_s.so.*
+
+%files -n libgomp
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libgomp.so.*
+
+%ifarch %asan_arch
+%files -n libasan
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libasan.so*
+%endif
+
+%ifarch %lsan_arch
+%files -n liblsan
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/liblsan.so*
+%endif
+
+%ifarch %tsan_arch
+%files -n libtsan
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libtsan.so*
+%endif
+
+%ifarch %atomic_arch
+%files -n libatomic
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libatomic.so.*
+%endif
+
+%ifarch %itm_arch
+%files -n libitm
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libitm.so.*
+%endif
+
+%ifarch %cilkrts_arch
+%files -n libcilkrts
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libcilkrts.so.*
+%endif
+
+%ifarch %ubsan_arch
+%files -n libubsan
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libubsan.so.*
+%endif
+
+%ifarch %quadmath_arch
+%files -n libquadmath
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libquadmath.so.*
+%endif
+
+%files -n cpp
+%defattr(-,root,root)
+%{_bindir}/cpp
+%{libsubdir}/cc1
+/lib/cpp
+
+%files plugin-devel
+%defattr(-,root,root)
+%{libsubdir}/plugin/*
+
+%{?gcc_run_tests:
+%files testresults
+%defattr(-,root,root)
+%doc testresults/test_summary.txt
+%doc testresults/*.sum
+%doc testresults/*.log
+}
+%ifarch x86_64
+%files -n gcc-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/crt*
+%{libsubdir}/32/*.a
+%{libsubdir}/32/*.so
+%{libsubdir}/32/*.o
+%{libsubdir}/32/*.spec
+
+%ifarch %asan_arch
+%files -n libasan-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libasan.so.*
+%endif
+
+%ifarch %lsan_arch
+%files -n liblsan-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/liblsan.so.*
+%endif
+
+%ifarch %atomic_arch
+%files -n libatomic-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libatomic.so.*
+%endif
+
+%ifarch %cilkrts_arch
+%files -n libcilkrts-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/libcilkrts.so.*
+%endif
+
+%files -n libgcc-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libgcc_s.so.*
+
+%files -n libgomp-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libgomp.so.*
+
+%ifarch %itm_arch
+%files -n libitm-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/libitm.so.*
+%endif
+
+%ifarch %quadmath_arch
+%files -n libquadmath-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/libquadmath.so.*
+%endif
+
+%ifarch %ubsan_arch
+%files -n libubsan-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libubsan.so.*
+%endif
+
+%files -n libstdc++-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libstdc++.so.*
+%exclude %{libsubdir}/32/libstdc++.so.*-gdb.py
+
+%files -n libstdc++-devel-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/libstdc++.so.*-gdb.py
+%endif
+
+%files -n asan-force-options
+%defattr(-,root,root,-)
+%{_prefix}/bin/gcc-force-options
+%{_prefix}/bin/gcc-unforce-options
+
+%files -n ubsan-force-options
+%defattr(-,root,root,-)
+%{_prefix}/bin/gcc-force-options
+%{_prefix}/bin/gcc-unforce-options
+
+%ifarch %lsan_arch
+%files -n lsan-force-options
+%manifest gcc.manifest
+%defattr(-,root,root,-)
+%{_prefix}/bin/gcc-force-options
+%{_prefix}/bin/gcc-unforce-options
+%endif
+
+%files -n asan-build-env
+%defattr(-,root,root,-)
+/ASAN_OPTIONS
+
+%files -n asan-runtime-env
+%defattr(-,root,root,-)
+
+%ifarch %lsan_arch
+%files -n lsan-runtime-env
+%defattr(-,root,root,-)
+/LSAN_OPTIONS
+/lsan.supp
+%endif
+
+%ifarch %ubsan_arch
+%files -n ubsan-build-env
+%defattr(-,root,root,-)
+/UBSAN_OPTIONS
+%{_rpmconfigdir}/macros.ubsan
+%{_rpmconfigdir}/tizen/extract-ubsan-logs
+
+%files -n ubsan-runtime-env
+%defattr(-,root,root,-)
+%endif
+
+%files -n sanitizer-devel
+%defattr(-,root,root,-)
+%{_prefix}/bin/asan_symbolize.py
+
+%files -n sanitizer-sources
+%defattr(-,root,root,-)
+/src/libsanitizer.tar.bz
+
+}
+
+%changelog
diff --git a/packaging/gcc-armv7l.spec b/packaging/gcc-armv7l.spec
new file mode 100644
index 00000000000..67a33adb0e1
--- /dev/null
+++ b/packaging/gcc-armv7l.spec
@@ -0,0 +1,1253 @@
+%define cross armv7l
+%define armv7l 1
+
+#
+# spec file for package gcc6
+#
+# Copyright (c) 2009 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2015 Tizen
+#
+# All modifications and additions to the file contributed by third parties
+# remain the property of their copyright owners, unless otherwise agreed
+# upon. The license for this file, and modifications and additions to the
+# file, is the same license as for the pristine package itself (unless the
+# license for the pristine package is not an Open Source License, in which
+# case the license is the MIT License). An "Open Source License" is a
+# license that conforms to the Open Source Definition (Version 1.9)
+# published by the Open Source Initiative.
+
+# Please submit bugfixes or comments via http://bugs.tizen.org/
+#
+# we use %%{?macro: ... } as it is more compact
+%if 0%{?run_tests}
+%define gcc_run_tests 1
+%endif
+
+%define tsan_arch x86_64 aarch64
+%define asan_arch x86_64 %ix86 ppc ppc64 %sparc %arm aarch64
+%define itm_arch x86_64 %ix86 %arm ppc ppc64 ppc64le s390 s390x %sparc aarch64
+%define atomic_arch x86_64 %ix86 %arm aarch64 ppc ppc64 ppc64le s390 s390x %sparc m68k
+%define lsan_arch x86_64 aarch64 %arm %ix86
+%define ubsan_arch x86_64 %ix86 ppc ppc64 %arm aarch64
+%define cilkrts_arch x86_64 %ix86
+
+%ifarch armv7l
+%define ARCH armv7l
+%define ABI eabi
+%endif
+%ifarch %ix86
+%define ARCH i586
+%endif
+%ifarch x86_64
+%define ARCH x86_64
+%endif
+%ifarch aarch64
+%define ARCH aarch64
+%endif
+%define host_arch %{ARCH}-tizen-linux-gnu%{?ABI}
+
+%define target_cpu %{?cross}%{!?cross:%{ARCH}}
+%define target_abi %{?cross:%{?armv7l:eabi}}%{!?cross:%{?ABI}}
+
+%define target_arch %{target_cpu}-tizen-linux-gnu%{?target_abi}
+%define libdir %{!?cross:%{_libdir}}%{?cross:%{_prefix}/lib%{?aarch64:64}}
+%define libsubdir %{libdir}/gcc/%{target_arch}/%{version}
+
+Name: gcc%{?cross:-%{cross}}
+# With generated files in src we could drop the following
+BuildRequires: bison
+BuildRequires: flex
+BuildRequires: gettext-devel
+BuildRequires: makeinfo
+## until here, but at least renaming and patching info files breaks this
+BuildRequires: gcc-c++
+BuildRequires: zlib-devel
+%ifarch x86_64
+BuildRequires: glibc-devel-32bit
+%endif
+BuildRequires: perl
+%{?cross:BuildRequires: binutils-%{cross}}
+# here we use %%if because OBS spec parser cannot expand
+# %%{?macro:...} correctly
+%if 0%{?gcc_run_tests}
+BuildRequires: dejagnu
+BuildRequires: expect
+BuildRequires: gdb
+%endif
+URL: http://gcc.gnu.org/
+Version: 6.2.1
+Release: 0
+Source: gcc-%{version}.tar.bz2
+Source10: gmp-6.1.1.tar.bz2
+Source11: mpfr-3.1.5.tar.bz2
+Source12: mpc-1.0.3.tar.gz
+Source13: isl-0.17.1.tar.bz2
+Source14: cloog-0.18.4.tar.gz
+Source15: gcc-force-options
+Source16: gcc-unforce-options
+Source17: ASAN_OPTIONS
+Source18: asan_symbolize.py
+Source19: LSAN_OPTIONS
+Source20: gcc.manifest
+Source21: UBSAN_OPTIONS
+Source22: macros.ubsan
+Source23: extract-ubsan-logs
+Source24: lsan.supp
+Group: Development/Building
+Summary: The GNU C Compiler and Support Files
+License: GPL-3.0+
+%{?cross:ExcludeArch: %{cross}}
+%description
+Core package for the GNU Compiler Collection, including the C language
+frontend.
+
+%package c++
+Summary: The GNU C++ Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description c++
+This package contains the GNU compiler for C++.
+
+%package -n libstdc++
+Summary: The standard C++ shared library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libstdc++
+The standard C++ library, needed for dynamically linked C++ programs.
+%post -n libstdc++ -p /sbin/ldconfig
+%postun -n libstdc++ -p /sbin/ldconfig
+
+%package -n libstdc++-devel
+Summary: Include Files and Libraries mandatory for Development
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libstdc++-devel
+This package contains all the headers and libraries of the standard C++
+library. It is needed for compiling C++ code.
+
+%package -n libgcc
+Summary: C compiler runtime library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libgcc
+Libgcc is needed for dynamically linked C programs.
+%post -n libgcc -p /sbin/ldconfig
+%postun -n libgcc -p /sbin/ldconfig
+
+%package -n libgomp
+Summary: The GNU compiler collection OpenMP runtime library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libgomp
+This is the OpenMP runtime library needed by OpenMP enabled programs
+that were built with the -fopenmp compiler option and by programs that
+were auto-parallelized via the -ftree-parallelize-loops compiler
+option.
+%post -n libgomp -p /sbin/ldconfig
+%postun -n libgomp -p /sbin/ldconfig
+
+%package objc
+Summary: GNU Objective C Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description objc
+This package contains the GNU Objective C compiler. Objective C is an
+object oriented language, created by Next Inc. and used in their
+Nextstep OS. The source code is available in the gcc package.
+
+%package -n libobjc
+Summary: Library for the GNU Objective C Compiler
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libobjc
+The library for the GNU Objective C compiler.
+%post -n libobjc -p /sbin/ldconfig
+%postun -n libobjc -p /sbin/ldconfig
+
+%package obj-c++
+Summary: GNU Objective C++ Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description obj-c++
+This package contains the GNU Objective C++ compiler. Objective C++ is an
+object oriented language, created by Next Inc. and used in their
+Nextstep OS. The source code is available in the gcc package.
+
+%package -n cpp
+Summary: The GCC Preprocessor
+License: GPL-3.0+
+Group: Development/Languages
+%description -n cpp
+This Package contains just the preprocessor that is used by the X11
+packages.
+
+%package ada
+Summary: GNU Ada95 Compiler Based on GCC (GNAT)
+License: GPL-3.0+
+Group: Development/Languages
+%description ada
+This package contains an Ada95 compiler and associated development
+tools based on the GNU GCC technology. Ada95 is the object oriented
+successor of the Ada83 language. To build this package from source you
+must have installed a binary version to bootstrap the compiler.
+
+%package -n libada
+Summary: GNU Ada Runtime Libraries
+License: GPL-3.0-with-GCC-exception
+Group: Development/Languages
+%description -n libada
+This package contains the shared libraries required to run programs
+compiled with the GNU Ada compiler (GNAT) if they are compiled to use
+shared libraries. It also contains the shared libraries for the
+Implementation of the Ada Semantic Interface Specification (ASIS), the
+implementation of Distributed Systems Programming (GLADE) and the Posix
+1003.5 Binding (Florist).
+%post -n libada -p /sbin/ldconfig
+%postun -n libada -p /sbin/ldconfig
+
+%package -n libquadmath
+Summary: The GNU Fortran Compiler Quadmath Runtime Library
+License: LGPL-2.1
+Group: Development/Languages
+%description -n libquadmath
+The runtime library needed to run programs compiled with the Fortran compiler
+of the GNU Compiler Collection (GCC) and quadruple precision floating point
+operations.
+%post -n libquadmath -p /sbin/ldconfig
+%postun -n libquadmath -p /sbin/ldconfig
+
+%package -n libitm
+Summary: The GNU Compiler Transactional Memory Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libitm
+The runtime library needed to run programs compiled with the
+-fgnu-tm option of the GNU Compiler Collection (GCC).
+%post -n libitm -p /sbin/ldconfig
+%postun -n libitm -p /sbin/ldconfig
+
+%package -n libasan
+Summary: The GNU Compiler Address Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libasan
+The runtime library needed to run programs compiled with the
+-fsanitize=address option of the GNU Compiler Collection (GCC).
+%post -n libasan -p /sbin/ldconfig
+%postun -n libasan -p /sbin/ldconfig
+
+%package -n libtsan
+Summary: The GNU Compiler Thread Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libtsan
+The runtime library needed to run programs compiled with the
+-fsanitize=thread option of the GNU Compiler Collection (GCC).
+%post -n libtsan -p /sbin/ldconfig
+%postun -n libtsan -p /sbin/ldconfig
+
+%package -n libatomic
+Summary: The GNU Compiler Atomic Operations Runtime Library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Languages
+%description -n libatomic
+The runtime library for atomic operations of the GNU Compiler Collection (GCC).
+%post -n libatomic -p /sbin/ldconfig
+%postun -n libatomic -p /sbin/ldconfig
+
+%package -n libcilkrts
+Summary: The GNU Compiler Cilk+ Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libcilkrts
+The runtime library needed to run programs compiled with the
+-fcilkplus option of the GNU Compiler Collection (GCC).
+%post -n libcilkrts -p /sbin/ldconfig
+%postun -n libcilkrts -p /sbin/ldconfig
+
+%package -n liblsan
+Summary: The GNU Compiler Leak Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n liblsan
+The runtime library needed to run programs compiled with the
+-fsanitize=leak option of the GNU Compiler Collection (GCC).
+%post -n liblsan -p /sbin/ldconfig
+%postun -n liblsan -p /sbin/ldconfig
+
+%package -n libubsan
+Summary: The GNU Compiler Undefined Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libubsan
+The runtime library needed to run programs compiled with the
+-fsanitize=undefined option of the GNU Compiler Collection (GCC).
+%post -n libubsan -p /sbin/ldconfig
+%postun -n libubsan -p /sbin/ldconfig
+
+%package -n libvtv
+Summary: The GNU Compiler Vtable Verifier Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libvtv
+The runtime library needed to run programs compiled with the
+-fvtable-verify option of the GNU Compiler Collection (GCC).
+%post -n libvtv -p /sbin/ldconfig
+%postun -n libvtv -p /sbin/ldconfig
+
+%package -n libgcj
+Summary: Java Runtime Library for gcc
+License: GPL-2.0-with-classpath-exception
+Group: Development/Building
+%description -n libgcj
+This library is needed if you want to use the GNU Java compiler, gcj.
+Source code for this package is in gcc.
+%post -n libgcj -p /sbin/ldconfig
+%postun -n libgcj -p /sbin/ldconfig
+
+%package java
+Summary: The GNU Java Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description java
+The Java compiler from the GCC-tools-suite.
+
+%package -n libgcj_bc
+Summary: Fake library for BC-ABI compatibility.
+License: GPL-2.0-with-classpath-exception
+Group: Development/Languages
+%description -n libgcj_bc
+A fake library that is used at link time only. It ensures that
+binaries built with the BC-ABI link against a constant SONAME.
+This way, BC-ABI binaries continue to work if the SONAME underlying
+libgcj.so changes.
+
+%package -n libgcj-jar
+Summary: Java runtime library (jar files).
+License: GPL-2.0-with-classpath-exception
+Group: Development/Languages
+%description -n libgcj-jar
+These are the jar files that go along with the gcj front end to gcc.
+
+%package -n libgcj-devel
+Summary: Include Files and Libraries mandatory for Development.
+License: GPL-2.0-with-classpath-exception
+Group: Development/Languages
+%description -n libgcj-devel
+This package contains all necessary include files and libraries needed
+to develop applications that require these.
+
+%package -n gcc-gij
+Summary: Java Bytecode Interpreter for gcc
+License: GPL-2.0-with-classpath-exception
+Group: Development/Languages
+%description -n gcc-gij
+This package contains the java bytecode interpreter gij and related tools.
+
+%package -n libffi
+Summary: Foreign Function Interface library
+License: BSD-3-Clause
+Group: Development/Building
+%description -n libffi
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+%post -n libffi -p /sbin/ldconfig
+%postun -n libffi -p /sbin/ldconfig
+
+%package -n libffi-devel
+Summary: Foreign Function Interface library development files
+License: BSD 3-Clause
+Group: Development/Building
+%description -n libffi-devel
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+
+%package go
+Summary: GNU Go Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description go
+This package contains a Go compiler and associated development
+files based on the GNU GCC technology.
+
+%package -n libgo
+Summary: GNU Go compiler runtime library
+License: BSD-3-Clause
+Group: Development/Languages
+%description -n libgo
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+%post -n libgo -p /sbin/ldconfig
+%postun -n libgo -p /sbin/ldconfig
+
+%package testresults
+Summary: Testsuite results
+License: SUSE-Public-Domain
+Group: Development/Languages
+%description testresults
+Results from running the gcc and target library testsuites.
+
+%package -n gcc-32bit
+Summary: The GNU C Compiler 32bit support
+Group: Development/Building
+%description -n gcc-32bit
+This package contains 32bit support for the GNU Compiler Collection.
+
+%package -n libstdc++-devel-32bit
+Summary: Include Files and Libraries mandatory for Development
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libstdc++-devel-32bit
+This package contains all the headers and libraries of the standard C++
+library. It is needed for compiling C++ code.
+
+%package -n libgcc-32bit
+Summary: C compiler runtime library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libgcc-32bit
+Libgcc is needed for dynamically linked C programs.
+%post -n libgcc-32bit -p /sbin/ldconfig
+%postun -n libgcc-32bit -p /sbin/ldconfig
+
+%package -n libgomp-32bit
+Summary: The GNU compiler collection OpenMP runtime library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libgomp-32bit
+This is the OpenMP runtime library needed by OpenMP enabled programs
+that were built with the -fopenmp compiler option and by programs that
+were auto-parallelized via the -ftree-parallelize-loops compiler
+option.
+%post -n libgomp-32bit -p /sbin/ldconfig
+%postun -n libgomp-32bit -p /sbin/ldconfig
+
+%package -n libstdc++-32bit
+Summary: The standard C++ shared library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libstdc++-32bit
+The standard C++ library, needed for dynamically linked C++ programs.
+%post -n libstdc++-32bit -p /sbin/ldconfig
+%postun -n libstdc++-32bit -p /sbin/ldconfig
+
+%package objc-32bit
+Summary: GNU Objective C Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description objc-32bit
+This package contains the GNU Objective C compiler. Objective C is an
+object oriented language, created by Next Inc. and used in their
+Nextstep OS. The source code is available in the gcc package.
+
+%package -n libobjc-32bit
+Summary: Library for the GNU Objective C Compiler
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libobjc-32bit
+The library for the GNU Objective C compiler.
+%post -n libobjc-32bit -p /sbin/ldconfig
+%postun -n libobjc-32bit -p /sbin/ldconfig
+
+%package ada-32bit
+Summary: GNU Ada95 Compiler Based on GCC (GNAT)
+License: GPL-3.0+
+Group: Development/Languages
+%description ada-32bit
+This package contains an Ada95 compiler and associated development
+tools based on the GNU GCC technology. Ada95 is the object oriented
+successor of the Ada83 language. To build this package from source you
+must have installed a binary version to bootstrap the compiler.
+
+%package -n libada-32bit
+Summary: GNU Ada Runtime Libraries
+License: GPL-3.0-with-GCC-exception
+Group: Development/Languages
+%description -n libada-32bit
+This package contains the shared libraries required to run programs
+compiled with the GNU Ada compiler (GNAT) if they are compiled to use
+shared libraries. It also contains the shared libraries for the
+Implementation of the Ada Semantic Interface Specification (ASIS), the
+implementation of Distributed Systems Programming (GLADE) and the Posix
+1003.5 Binding (Florist).
+%post -n libada-32bit -p /sbin/ldconfig
+%postun -n libada-32bit -p /sbin/ldconfig
+
+%package -n libquadmath-32bit
+Summary: The GNU Fortran Compiler Quadmath Runtime Library
+License: LGPL-2.1
+Group: Development/Languages
+%description -n libquadmath-32bit
+The runtime library needed to run programs compiled with the Fortran compiler
+of the GNU Compiler Collection (GCC) and quadruple precision floating point
+operations.
+%post -n libquadmath-32bit -p /sbin/ldconfig
+%postun -n libquadmath-32bit -p /sbin/ldconfig
+
+%package -n libitm-32bit
+Summary: The GNU Compiler Transactional Memory Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libitm-32bit
+The runtime library needed to run programs compiled with the
+-fgnu-tm option of the GNU Compiler Collection (GCC).
+%post -n libitm-32bit -p /sbin/ldconfig
+%postun -n libitm-32bit -p /sbin/ldconfig
+
+%package -n libasan-32bit
+Summary: The GNU Compiler Address Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libasan-32bit
+The runtime library needed to run programs compiled with the
+-fsanitize=address option of the GNU Compiler Collection (GCC).
+%post -n libasan-32bit -p /sbin/ldconfig
+%postun -n libasan-32bit -p /sbin/ldconfig
+
+%package -n libtsan-32bit
+Summary: The GNU Compiler Thread Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libtsan-32bit
+The runtime library needed to run programs compiled with the
+-fsanitize=thread option of the GNU Compiler Collection (GCC).
+%post -n libtsan-32bit -p /sbin/ldconfig
+%postun -n libtsan-32bit -p /sbin/ldconfig
+
+%package -n libatomic-32bit
+Summary: The GNU Compiler Atomic Operations Runtime Library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Languages
+%description -n libatomic-32bit
+The runtime library for atomic operations of the GNU Compiler Collection (GCC).
+%post -n libatomic-32bit -p /sbin/ldconfig
+%postun -n libatomic-32bit -p /sbin/ldconfig
+
+%package -n libcilkrts-32bit
+Summary: The GNU Compiler Cilk+ Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libcilkrts-32bit
+The runtime library needed to run programs compiled with the
+-fcilkplus option of the GNU Compiler Collection (GCC).
+%post -n libcilkrts-32bit -p /sbin/ldconfig
+%postun -n libcilkrts-32bit -p /sbin/ldconfig
+
+%package -n liblsan-32bit
+Summary: The GNU Compiler Leak Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n liblsan-32bit
+The runtime library needed to run programs compiled with the
+-fsanitize=leak option of the GNU Compiler Collection (GCC).
+%post -n liblsan-32bit -p /sbin/ldconfig
+%postun -n liblsan-32bit -p /sbin/ldconfig
+
+%package -n libubsan-32bit
+Summary: The GNU Compiler Undefined Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libubsan-32bit
+The runtime library needed to run programs compiled with the
+-fsanitize=undefined option of the GNU Compiler Collection (GCC).
+%post -n libubsan-32bit -p /sbin/ldconfig
+%postun -n libubsan-32bit -p /sbin/ldconfig
+
+%package -n libvtv-32bit
+Summary: The GNU Compiler Vtable Verifier Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libvtv-32bit
+The runtime library needed to run programs compiled with the
+-fvtable-verify option of the GNU Compiler Collection (GCC).
+%post -n libvtv-32bit -p /sbin/ldconfig
+%postun -n libvtv-32bit -p /sbin/ldconfig
+
+%package -n libffi-32bit
+Summary: Foreign Function Interface library
+License: BSD-3-Clause
+Group: Development/Building
+%description -n libffi-32bit
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+%post -n libffi-32bit -p /sbin/ldconfig
+%postun -n libffi-32bit -p /sbin/ldconfig
+
+%package -n libffi-devel-32bit
+Summary: Foreign Function Interface library development files
+License: BSD 3-Clause
+Group: Development/Building
+%description -n libffi-devel-32bit
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+
+%package go-32bit
+Summary: GNU Go Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description go-32bit
+This package contains a Go compiler and associated development
+files based on the GNU GCC technology.
+
+%package -n libgo-32bit
+Summary: GNU Go compiler runtime library
+License: BSD-3-Clause
+Group: Development/Languages
+%description -n libgo-32bit
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+%post -n libgo-32bit -p /sbin/ldconfig
+%postun -n libgo-32bit -p /sbin/ldconfig
+
+%package -n asan-force-options
+Summary: Scripts to enable automatic package sanitization
+Group: System Environment
+Requires: gcc rpm
+Requires: libasan
+
+%description -n asan-force-options
+Scripts for ASan instrumentation
+
+%post -n asan-force-options
+# Change mode to allow all users to run gcc-force/unforce-options
+chmod a+w /usr/bin
+[ -d /emul/ ] && chmod a+w /emul/usr/bin/ && chmod a+w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-force-options -fsanitize-recover=address -fsanitize=address -fno-common -fno-omit-frame-pointer -U_FORTIFY_SOURCE
+# Add restore_fcommon macro
+cat >> /usr/lib/rpm/tizen_macros << EOF
+
+%restore_fcommon \\
+ /usr/bin/gcc-unforce-options \\
+ /usr/bin/gcc-force-options -fsanitize-recover=address -fsanitize=address -fcommon -fno-omit-frame-pointer -U_FORTIFY_SOURCE
+
+EOF
+
+%preun -n asan-force-options
+# Restore read-only mode
+chmod a-w /usr/bin
+[ -d /emul/ ] && chmod a-w /emul/usr/bin/ && chmod a-w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-unforce-options
+
+%package -n ubsan-force-options
+Summary: Scripts to enable automatic package sanitization
+Group: System Environment
+Requires: gcc
+Requires: libubsan
+
+%description -n ubsan-force-options
+Scripts for UBSan instrumentation
+
+%post -n ubsan-force-options
+# Change mode to allow all users to run gcc-force/unforce-options
+chmod a+w /usr/bin
+[ -d /emul/ ] && chmod a+w /emul/usr/bin/ && chmod a+w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-force-options -fsanitize=undefined,bounds-strict,float-divide-by-zero,float-cast-overflow
+
+%preun -n ubsan-force-options
+# Restore read-only mode
+chmod a-w /usr/bin
+[ -d /emul/ ] && chmod a-w /emul/usr/bin/ && chmod a-w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-unforce-options
+
+%package -n ubsan-build-env
+Summary: UBSan build environment
+Group: System Environment
+Requires: gcc
+Requires: libubsan rpm
+
+%description -n ubsan-build-env
+UBSan build environment support files and scripts
+
+%post -n ubsan-build-env
+cat %{_rpmconfigdir}/macros.ubsan >> %{_rpmconfigdir}/tizen_macros
+
+%package -n lsan-force-options
+Summary: Scripts to enable automatic package sanitization
+Group: System Environment
+Requires: gcc
+Requires: liblsan
+
+%description -n lsan-force-options
+Scripts for LSan instrumentation
+
+%post -n lsan-force-options
+# Change mode to allow all users to run gcc-force/unforce-options
+chmod a+w /usr/bin
+[ -d /emul/ ] && chmod a+w /emul/usr/bin/ && chmod a+w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-force-options -fsanitize=leak -fno-omit-frame-pointer -U_FORTIFY_SOURCE
+
+%preun -n lsan-force-options
+# Restore read-only mode
+chmod a-w /usr/bin
+[ -d /emul/ ] && chmod a-w /emul/usr/bin/ && chmod a-w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-unforce-options
+[ -d /emul/ ] && chmod a-w /emul/usr/bin/
+
+%package -n asan-build-env
+Summary: Asan build environment
+Group: Development/Libraries
+Requires: libasan
+
+%description -n asan-build-env
+Asan build environment
+
+%post -n asan-build-env
+# Add /usr/lib/libasan.so to /etc/ld.so.preload
+[ -f /etc/ld.so.preload ] && mv -v /etc/ld.so.preload /etc/ld.so.preload.orig
+echo "libasan.so" > /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && cat /etc/ld.so.preload.orig >> /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && rm -f /etc/ld.so.preload.orig
+
+%preun -n asan-build-env
+# Restore /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && mv -v /etc/ld.so.preload.orig /etc/ld.so.preload
+
+%package -n lsan-runtime-env
+Summary: LSan runtime environment
+Group: Development/Libraries
+Requires: liblsan
+Requires(post): smack
+
+%description -n lsan-runtime-env
+LSan runtime environment
+
+%post -n lsan-runtime-env
+# Add /usr/lib64/liblsan.so to /etc/ld.so.preload
+[ -f /etc/ld.so.preload ] && mv -v /etc/ld.so.preload /etc/ld.so.preload.orig
+echo "%{libdir}/liblsan.so" > /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && cat /etc/ld.so.preload.orig >> /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && rm -f /etc/ld.so.preload.orig
+chsmack -a "_" /etc/ld.so.preload /LSAN_OPTIONS /lsan.supp
+
+%preun -n lsan-runtime-env
+# Restore /etc/ld.so.preload
+mv -v /etc/ld.so.preload.orig /etc/ld.so.preload
+
+%package -n sanitizer-devel
+Summary: Sanitizer platform-independent tools
+License: MIT
+Group: Development/Tools
+BuildArch: noarch
+Requires: binutils python
+Requires(post): smack
+
+%description -n sanitizer-devel
+The package contatins platform-independent tools for sanitization:
+- asan_symbolize.py: script for offline symbolization of asan logs
+
+%package -n asan-runtime-env
+Summary: Asan runtime environment for target device
+Group: Development/Libraries
+
+%description -n asan-runtime-env
+Asan runtime environment
+
+%post -n asan-runtime-env
+# Add /usr/lib/libasan.so to /etc/ld.so.preload
+[ -f /etc/ld.so.preload ] && mv -v /etc/ld.so.preload /etc/ld.so.preload.orig
+echo "%{libdir}/libasan.so" > /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && cat /etc/ld.so.preload.orig >> /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && rm -f /etc/ld.so.preload.orig
+echo "halt_on_error=false:start_deactivated=true:print_cmdline=true:quarantine_size_mb=1:detect_leaks=0:log_path=/tmp/asan.log:log_exe_path=1" > /ASAN_OPTIONS
+chsmack -a "_" /etc/ld.so.preload /ASAN_OPTIONS
+
+%preun -n asan-runtime-env
+# Restore /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && mv -v /etc/ld.so.preload.orig /etc/ld.so.preload
+
+%package -n ubsan-runtime-env
+Summary: UBSan runtime environment for target device
+Group: Development/Libraries
+Requires: libubsan
+
+%description -n ubsan-runtime-env
+UBSan runtime environment
+
+%post -n ubsan-runtime-env
+echo "print_cmdline=true:log_path=/tmp/ubsan.log" > /UBSAN_OPTIONS
+
+%package plugin-devel
+Summary: GNU GCC Plugin development files
+License: GPL-3.0+
+Group: Development/Languages
+%description plugin-devel
+This package contains GCC Plugin development files needed for compiler
+plugins build.
+
+%package -n sanitizer-sources
+Summary: Sanitizer family tools sources
+License: MIT
+Group: Development/Tools
+BuildArch: noarch
+
+%description -n sanitizer-sources
+Sanitizer family tools sources for external tools.
+
+%prep
+
+%setup -q -n gcc-%{version}
+cp %{SOURCE20} .
+
+tar xf %{SOURCE10}
+ln -sf gmp-6.1.1 gmp
+tar xf %{SOURCE11}
+ln -sf mpfr-3.1.5 mpfr
+tar xf %{SOURCE12}
+ln -sf mpc-1.0.3 mpc
+tar xf %{SOURCE13}
+ln -sf isl-0.17.1 isl
+tar xf %{SOURCE14}
+ln -sf cloog-0.18.4 cloog
+
+echo "" > gcc/DEV-PHASE
+
+%global gcc_release `sed -e 's/^.*-//g' %{_builddir}/gcc-%{version}/gcc/LINARO-VERSION`
+
+%build
+rm -rf obj
+mkdir obj
+cd obj
+
+RPM_OPT_FLAGS=`echo $RPM_OPT_FLAGS|sed -e 's/-fno-rtti//g' -e 's/-fno-exceptions//g' -e 's/-Wmissing-format-attribute//g' -e 's/-fstack-protector//g' -e 's/-ffortify=.//g' -e 's/-Wall//g' -e 's/-m32//g' -e 's/-m64//g' -e 's/-fexceptions//' -e 's/\([[:space:]]\+.*-D_FORTIFY_SOURCE=\)[[:alnum:]]\+/\10/g'
+RPM_OPT_FLAGS="$RPM_OPT_FLAGS -D__USE_FORTIFY_LEVEL=0"`
+%{?cross:
+RPM_OPT_FLAGS=`echo $RPM_OPT_FLAGS|sed -e 's/-m\(arch\|tune\|cpu\)=[^ ]*//g'`
+RPM_OPT_FLAGS=`echo $RPM_OPT_FLAGS|sed -e 's/-m\(sse\|fpmath\)[^ ]*//g'`
+}
+RPM_OPT_FLAGS=`echo $RPM_OPT_FLAGS|sed -e 's/ */ /g'`
+
+
+
+CFLAGS="$RPM_OPT_FLAGS" CXXFLAGS="$RPM_OPT_FLAGS" XCFLAGS="$RPM_OPT_FLAGS" \
+TCFLAGS="$RPM_OPT_FLAGS" GCJFLAGS="$RPM_OPT_FLAGS" \
+../configure \
+ --prefix=%{_prefix} \
+ --infodir=%{_infodir} \
+ --mandir=%{_mandir} \
+ --libdir=%{libdir} \
+ --libexecdir=%{libdir} \
+ --enable-languages=c,c++ \
+ --enable-checking=release \
+ --disable-libssp \
+ --disable-bootstrap \
+ --disable-libvtv \
+ --disable-plugin \
+ --disable-libgcj \
+ --with-slibdir=%{libdir} \
+ --with-system-zlib \
+ --with-sysroot=/ \
+ --enable-__cxa_atexit \
+ --enable-libstdcxx-allocator=new \
+ --enable-version-specific-runtime-libs \
+ --enable-linker-build-id \
+ --without-system-libunwind \
+ --enable-threads=posix \
+ --disable-multilib \
+ --disable-libquadmath \
+ --enable-lto \
+%{!?cross: \
+%ifarch armv7l
+ --with-arch=armv7-a \
+ --with-tune=cortex-a8 \
+ --disable-sjlj-exceptions \
+%endif
+%ifarch aarch64
+ --with-arch=armv8-a \
+ --disable-sjlj-exceptions \
+%endif
+%ifarch %ix86
+ --with-arch-32=i586 \
+ --with-tune=generic \
+ --disable-libmpx \
+%endif
+%ifarch x86_64
+ --with-arch-32=i586 \
+ --with-tune=generic \
+ --enable-multilib \
+ --disable-libmpx \
+%endif
+} \
+%{?cross: \
+%{?armv7l: \
+ --with-arch=armv7-a \
+ --with-tune=cortex-a8 \
+ --disable-sjlj-exceptions \
+} \
+%{?aarch64: \
+ --with-arch=armv8-a \
+ --disable-sjlj-exceptions \
+} \
+ --disable-libgcc \
+ --disable-libgomp \
+ --disable-libatomic \
+ --disable-libstdc++-v3 \
+ --disable-libsanitizer \
+ --disable-libitm \
+} \
+ --with-bugurl="http://bugs.tizen.org/" \
+ --with-pkgversion="Tizen/Linaro GCC %{version} %{gcc_release}" \
+ --target=%{target_arch} \
+ --host=%{host_arch} \
+ --build=%{host_arch}
+
+
+
+make BOOT_CFLAGS="$RPM_OPT_FLAGS" %{?_smp_mflags}
+%{?gcc_run_tests:
+ echo "Run testsuite"
+ # asan needs a whole shadow address space
+ ulimit -v unlimited || true
+ make -k check %{?_smp_mflags} || true
+ mkdir ../testresults
+ ../contrib/test_summary | tee ../testresults/test_summary.txt
+}
+
+%install
+cd obj
+
+make install DESTDIR=$RPM_BUILD_ROOT
+
+%{?gcc_run_tests:
+ cp `find . -name "*.sum"` ../testresults/
+ cp `find . -name "*.log" \! -name "config.log" | grep -v 'acats.\?/tests' ` ../testresults/
+ chmod 644 ../testresults/*
+}
+
+%{remove_docs}
+rm -rf %{buildroot}/%{_datadir}/locale
+
+#remove everything we don't need
+rm -rf %{buildroot}/%{libsubdir}/install-tools
+find %{buildroot}/%{libsubdir} -name "*.la" -exec rm -rf {} +
+
+%{!?cross:
+ln -s gcc %{buildroot}%{_bindir}/cc
+mv %{buildroot}%{libsubdir}/libstdc++.so*-gdb.py %{buildroot}%{_datadir}/gcc-%{version}/python/libstdcxx/
+
+# expose plugins for ar (required for lto builds)
+mkdir -p %{buildroot}%{_prefix}/lib/bfd-plugins
+ln -sf %{libsubdir}/liblto_plugin.so %{buildroot}%{_prefix}/lib/bfd-plugins/liblto_plugin.so
+
+# legacy preprocessor
+mkdir -p %{buildroot}/lib
+ln -s %{_bindir}/cpp %{buildroot}/lib/cpp
+
+# 32-bit libgcc in multilib configuration
+%ifarch x86_64
+mv %{buildroot}%{_prefix}/lib/libgcc_s.so* %{buildroot}%{libsubdir}/32/
+%endif
+
+# move libraries to libdir
+for lib in asan atomic cilkrts gfortran gomp itm lsan quadmath stdc++ supc++ tsan ubsan
+do
+ [ -e %{buildroot}%{libsubdir}/lib$lib.a ] && mv %{buildroot}%{libsubdir}/lib$lib.a %{buildroot}%{libdir}/
+ [ -e %{buildroot}%{libsubdir}/lib$lib.so ] && mv %{buildroot}%{libsubdir}/lib$lib.so* %{buildroot}%{libdir}/
+done
+}
+
+%{?cross:
+rm -rf %{buildroot}/%{libsubdir}/include-fixed
+rm -rf %{buildroot}/%{libsubdir}/include
+}
+
+%{!?cross:
+cp %{SOURCE15} %{SOURCE16} %{SOURCE18} %{buildroot}%{_prefix}/bin
+chmod a+x %{buildroot}%{_prefix}/bin/gcc-force-options
+chmod a+x %{buildroot}%{_prefix}/bin/gcc-unforce-options
+chmod a+x %{buildroot}%{_prefix}/bin/asan_symbolize.py
+
+cp %{SOURCE17} %{buildroot}
+chmod 644 %{buildroot}/ASAN_OPTIONS
+
+%ifarch %lsan_arch
+cp %{SOURCE19} %{SOURCE24} %{buildroot}
+chmod 644 %{buildroot}/LSAN_OPTIONS
+chmod 644 %{buildroot}/lsan.supp
+%endif
+
+cd ../
+tar -czf libsanitizer.tar.bz libsanitizer
+mkdir -p %{buildroot}/src
+mv -v libsanitizer.tar.bz %{buildroot}/src
+
+mkdir -p %{buildroot}/%{_rpmconfigdir}/tizen/
+install -m 0644 %{SOURCE21} %{buildroot}/
+install -m 0644 %{SOURCE22} %{buildroot}/%{_rpmconfigdir}/
+install -m 0755 %{SOURCE23} %{buildroot}/%{_rpmconfigdir}/tizen/
+}
+
+%files
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{?cross:
+%{_bindir}/*
+%{libsubdir}/*
+}
+%{!?cross:
+%{_bindir}/gcc
+%{_bindir}/cc
+%{_bindir}/gcov
+%{_bindir}/gcov-tool
+%{_bindir}/gcc-ar
+%{_bindir}/gcc-nm
+%{_bindir}/gcc-ranlib
+%{_bindir}/%{target_arch}-gcc
+%{_bindir}/%{target_arch}-gcc-%{version}
+%{_bindir}/%{target_arch}-gcc-ar
+%{_bindir}/%{target_arch}-gcc-nm
+%{_bindir}/%{target_arch}-gcc-ranlib
+%{libsubdir}/collect2
+%{libsubdir}/lto1
+%{libsubdir}/lto-wrapper
+%{libsubdir}/liblto_plugin.so*
+%{_prefix}/lib/bfd-plugins/liblto_plugin.so
+%{libsubdir}/include-fixed/*
+%{libsubdir}/include/*.h
+%{libsubdir}/*.a
+%{libsubdir}/*.so
+%{libsubdir}/*.o
+%{libsubdir}/*.spec
+%{libdir}/*.so
+%{libdir}/*.a
+%ifarch %cilkrts_arch
+%{libsubdir}/include/cilk/*
+%endif
+%{libsubdir}/include/sanitizer/*
+%ifarch %asan_arch
+%exclude %{libdir}/libasan.so
+%endif
+%ifarch %lsan_arch
+%exclude %{libdir}/liblsan.so
+%endif
+%ifarch %tsan_arch
+%exclude %{libdir}/libtsan.so
+%endif
+
+%files c++
+%defattr(-,root,root)
+%{libsubdir}/cc1plus
+%{_bindir}/g++
+%{_bindir}/c++
+%{_bindir}/%{target_arch}-g++
+%{_bindir}/%{target_arch}-c++
+
+%files -n libstdc++
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libstdc++.so.*
+
+%files -n libstdc++-devel
+%defattr(-,root,root)
+%{libdir}/libstdc++.so
+%{libdir}/libstdc++.a
+%{libdir}/libsupc++.a
+%{libsubdir}/include/c++/*
+%{_datadir}/gcc-%{version}/python/libstdcxx/*
+
+%files -n libgcc
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libgcc_s.so.*
+
+%files -n libgomp
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libgomp.so.*
+
+%ifarch %asan_arch
+%files -n libasan
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libasan.so*
+%endif
+
+%ifarch %lsan_arch
+%files -n liblsan
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/liblsan.so*
+%endif
+
+%ifarch %tsan_arch
+%files -n libtsan
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libtsan.so*
+%endif
+
+%ifarch %atomic_arch
+%files -n libatomic
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libatomic.so.*
+%endif
+
+%ifarch %itm_arch
+%files -n libitm
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libitm.so.*
+%endif
+
+%ifarch %cilkrts_arch
+%files -n libcilkrts
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libcilkrts.so.*
+%endif
+
+%ifarch %ubsan_arch
+%files -n libubsan
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libubsan.so.*
+%endif
+
+%ifarch %quadmath_arch
+%files -n libquadmath
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libquadmath.so.*
+%endif
+
+%files -n cpp
+%defattr(-,root,root)
+%{_bindir}/cpp
+%{libsubdir}/cc1
+/lib/cpp
+
+%files plugin-devel
+%defattr(-,root,root)
+%{libsubdir}/plugin/*
+
+%{?gcc_run_tests:
+%files testresults
+%defattr(-,root,root)
+%doc testresults/test_summary.txt
+%doc testresults/*.sum
+%doc testresults/*.log
+}
+%ifarch x86_64
+%files -n gcc-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/crt*
+%{libsubdir}/32/*.a
+%{libsubdir}/32/*.so
+%{libsubdir}/32/*.o
+%{libsubdir}/32/*.spec
+
+%ifarch %asan_arch
+%files -n libasan-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libasan.so.*
+%endif
+
+%ifarch %lsan_arch
+%files -n liblsan-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/liblsan.so.*
+%endif
+
+%ifarch %atomic_arch
+%files -n libatomic-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libatomic.so.*
+%endif
+
+%ifarch %cilkrts_arch
+%files -n libcilkrts-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/libcilkrts.so.*
+%endif
+
+%files -n libgcc-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libgcc_s.so.*
+
+%files -n libgomp-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libgomp.so.*
+
+%ifarch %itm_arch
+%files -n libitm-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/libitm.so.*
+%endif
+
+%ifarch %quadmath_arch
+%files -n libquadmath-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/libquadmath.so.*
+%endif
+
+%ifarch %ubsan_arch
+%files -n libubsan-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libubsan.so.*
+%endif
+
+%files -n libstdc++-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libstdc++.so.*
+%exclude %{libsubdir}/32/libstdc++.so.*-gdb.py
+
+%files -n libstdc++-devel-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/libstdc++.so.*-gdb.py
+%endif
+
+%files -n asan-force-options
+%defattr(-,root,root,-)
+%{_prefix}/bin/gcc-force-options
+%{_prefix}/bin/gcc-unforce-options
+
+%files -n ubsan-force-options
+%defattr(-,root,root,-)
+%{_prefix}/bin/gcc-force-options
+%{_prefix}/bin/gcc-unforce-options
+
+%ifarch %lsan_arch
+%files -n lsan-force-options
+%manifest gcc.manifest
+%defattr(-,root,root,-)
+%{_prefix}/bin/gcc-force-options
+%{_prefix}/bin/gcc-unforce-options
+%endif
+
+%files -n asan-build-env
+%defattr(-,root,root,-)
+/ASAN_OPTIONS
+
+%files -n asan-runtime-env
+%defattr(-,root,root,-)
+
+%ifarch %lsan_arch
+%files -n lsan-runtime-env
+%defattr(-,root,root,-)
+/LSAN_OPTIONS
+/lsan.supp
+%endif
+
+%ifarch %ubsan_arch
+%files -n ubsan-build-env
+%defattr(-,root,root,-)
+/UBSAN_OPTIONS
+%{_rpmconfigdir}/macros.ubsan
+%{_rpmconfigdir}/tizen/extract-ubsan-logs
+
+%files -n ubsan-runtime-env
+%defattr(-,root,root,-)
+%endif
+
+%files -n sanitizer-devel
+%defattr(-,root,root,-)
+%{_prefix}/bin/asan_symbolize.py
+
+%files -n sanitizer-sources
+%defattr(-,root,root,-)
+/src/libsanitizer.tar.bz
+
+}
+
+%changelog
diff --git a/packaging/gcc-force-options b/packaging/gcc-force-options
new file mode 100644
index 00000000000..34f49455f2b
--- /dev/null
+++ b/packaging/gcc-force-options
@@ -0,0 +1,70 @@
+#!/bin/sh
+
+set -e
+
+if [ $# -eq 0 ]; then
+ cat << EOF
+Syntax:
+ $(basename $0) OPT1 [OPT2...]"
+
+Example:
+ $(basename $0) [prepend|append] -fsanitize=address -fno-common -U_FORTIFY_SOURCE
+ By default flags are appending.
+EOF
+ exit 1
+fi
+
+FLAGS="$@"
+
+if [ $(find $(dirname $0) -name \*-real | wc -l) -gt 0 ]; then
+ echo >&2 "$(basename $0): directory was already processed, aborting"
+ exit 1
+fi
+
+case "$1" in
+prepend)
+ shift
+ PREFLAGS="$@"
+ POSTFLAGS=
+ ;;
+append)
+ shift
+ PREFLAGS=
+ POSTFLAGS="$@"
+ ;;
+*)
+ PREFLAGS=
+ POSTFLAGS="$@"
+ ;;
+esac
+
+TMP=$(pwd)/tmp.$$
+cat > $TMP << EOF
+#!/bin/sh
+if echo "$PREFLAGS "\$@" $POSTFLAGS" | grep -q -- "-fsanitize=undefined" && echo "\$@" | grep -q "\.gch\>"; then
+ # UBSan doesn't support precompiled headers. See https://gcc.gnu.org/bugzilla/show_bug.cgi?id=66343
+ echo "Precompiled headers currently not supported by UBSan" >&2
+ # Don't instrument kernel modules
+ # Don't instrument with "-nostdlib" linking
+elif ! echo "\$@" | grep -q -e __KERNEL__ -e \-nostdlib; then
+ # Use readlink in order to follow symlinks if any
+ \$(readlink -f \$0)-real $PREFLAGS "\$@" $POSTFLAGS
+else
+ \$(readlink -f \$0)-real "\$@"
+fi
+EOF
+chmod +x $TMP
+
+find -L $(dirname $0) -type f -a -perm -a=x | grep -E '(gcc|g\+\+|c\+\+)$' | while read tool; do
+ mv $tool $tool-real
+ cp $TMP $tool
+done
+
+if [ -d /emul ]; then
+ find -L /emul -type f -a -perm -a=x | grep -E '(gcc|g\+\+|c\+\+)$' | while read tool; do
+ ln -sf $(basename $tool) $tool-real
+ done
+fi
+
+rm $TMP
+
diff --git a/packaging/gcc-unforce-options b/packaging/gcc-unforce-options
new file mode 100644
index 00000000000..cf36d042a07
--- /dev/null
+++ b/packaging/gcc-unforce-options
@@ -0,0 +1,19 @@
+#!/bin/sh
+
+set -e
+
+if [ $# -gt 0 ]; then
+ echo >&2 "$(basename $0): unexpected arguments"
+ exit 1
+fi
+
+find $(dirname $0) -name \*-real | while read tool_real; do
+ tool=$(echo "$tool_real" | sed -e 's/-real$//')
+ mv $tool_real $tool
+done
+if [ -d /emul ]; then
+ find /emul -name \*-real | while read tool_real; do
+ rm $tool_real
+ done
+fi
+
diff --git a/packaging/gcc.manifest b/packaging/gcc.manifest
new file mode 100644
index 00000000000..017d22d3aff
--- /dev/null
+++ b/packaging/gcc.manifest
@@ -0,0 +1,5 @@
+<manifest>
+ <request>
+ <domain name="_"/>
+ </request>
+</manifest>
diff --git a/packaging/gmp-6.1.1.tar.bz2 b/packaging/gmp-6.1.1.tar.bz2
new file mode 100644
index 00000000000..912b137ba6d
--- /dev/null
+++ b/packaging/gmp-6.1.1.tar.bz2
Binary files differ
diff --git a/packaging/isl-0.17.1.tar.bz2 b/packaging/isl-0.17.1.tar.bz2
new file mode 100644
index 00000000000..1d3132f99c1
--- /dev/null
+++ b/packaging/isl-0.17.1.tar.bz2
Binary files differ
diff --git a/packaging/linaro-gcc.spec b/packaging/linaro-gcc.spec
new file mode 100644
index 00000000000..5488c6af45a
--- /dev/null
+++ b/packaging/linaro-gcc.spec
@@ -0,0 +1,1250 @@
+#
+# spec file for package gcc6
+#
+# Copyright (c) 2009 SUSE LINUX Products GmbH, Nuernberg, Germany.
+# Copyright (c) 2015 Tizen
+#
+# All modifications and additions to the file contributed by third parties
+# remain the property of their copyright owners, unless otherwise agreed
+# upon. The license for this file, and modifications and additions to the
+# file, is the same license as for the pristine package itself (unless the
+# license for the pristine package is not an Open Source License, in which
+# case the license is the MIT License). An "Open Source License" is a
+# license that conforms to the Open Source Definition (Version 1.9)
+# published by the Open Source Initiative.
+
+# Please submit bugfixes or comments via http://bugs.tizen.org/
+#
+# we use %%{?macro: ... } as it is more compact
+%if 0%{?run_tests}
+%define gcc_run_tests 1
+%endif
+
+%define tsan_arch x86_64 aarch64
+%define asan_arch x86_64 %ix86 ppc ppc64 %sparc %arm aarch64
+%define itm_arch x86_64 %ix86 %arm ppc ppc64 ppc64le s390 s390x %sparc aarch64
+%define atomic_arch x86_64 %ix86 %arm aarch64 ppc ppc64 ppc64le s390 s390x %sparc m68k
+%define lsan_arch x86_64 aarch64 %arm %ix86
+%define ubsan_arch x86_64 %ix86 ppc ppc64 %arm aarch64
+%define cilkrts_arch x86_64 %ix86
+
+%ifarch armv7l
+%define ARCH armv7l
+%define ABI eabi
+%endif
+%ifarch %ix86
+%define ARCH i586
+%endif
+%ifarch x86_64
+%define ARCH x86_64
+%endif
+%ifarch aarch64
+%define ARCH aarch64
+%endif
+%define host_arch %{ARCH}-tizen-linux-gnu%{?ABI}
+
+%define target_cpu %{?cross}%{!?cross:%{ARCH}}
+%define target_abi %{?cross:%{?armv7l:eabi}}%{!?cross:%{?ABI}}
+
+%define target_arch %{target_cpu}-tizen-linux-gnu%{?target_abi}
+%define libdir %{!?cross:%{_libdir}}%{?cross:%{_prefix}/lib%{?aarch64:64}}
+%define libsubdir %{libdir}/gcc/%{target_arch}/%{version}
+
+Name: gcc%{?cross:-%{cross}}
+# With generated files in src we could drop the following
+BuildRequires: bison
+BuildRequires: flex
+BuildRequires: gettext-devel
+BuildRequires: makeinfo
+## until here, but at least renaming and patching info files breaks this
+BuildRequires: gcc-c++
+BuildRequires: zlib-devel
+%ifarch x86_64
+BuildRequires: glibc-devel-32bit
+%endif
+BuildRequires: perl
+%{?cross:BuildRequires: binutils-%{cross}}
+# here we use %%if because OBS spec parser cannot expand
+# %%{?macro:...} correctly
+%if 0%{?gcc_run_tests}
+BuildRequires: dejagnu
+BuildRequires: expect
+BuildRequires: gdb
+%endif
+URL: http://gcc.gnu.org/
+Version: 6.2.1
+Release: 0
+Source: gcc-%{version}.tar.bz2
+Source10: gmp-6.1.1.tar.bz2
+Source11: mpfr-3.1.5.tar.bz2
+Source12: mpc-1.0.3.tar.gz
+Source13: isl-0.17.1.tar.bz2
+Source14: cloog-0.18.4.tar.gz
+Source15: gcc-force-options
+Source16: gcc-unforce-options
+Source17: ASAN_OPTIONS
+Source18: asan_symbolize.py
+Source19: LSAN_OPTIONS
+Source20: gcc.manifest
+Source21: UBSAN_OPTIONS
+Source22: macros.ubsan
+Source23: extract-ubsan-logs
+Source24: lsan.supp
+Group: Development/Building
+Summary: The GNU C Compiler and Support Files
+License: GPL-3.0+
+%{?cross:ExcludeArch: %{cross}}
+%description
+Core package for the GNU Compiler Collection, including the C language
+frontend.
+
+%package c++
+Summary: The GNU C++ Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description c++
+This package contains the GNU compiler for C++.
+
+%package -n libstdc++
+Summary: The standard C++ shared library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libstdc++
+The standard C++ library, needed for dynamically linked C++ programs.
+%post -n libstdc++ -p /sbin/ldconfig
+%postun -n libstdc++ -p /sbin/ldconfig
+
+%package -n libstdc++-devel
+Summary: Include Files and Libraries mandatory for Development
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libstdc++-devel
+This package contains all the headers and libraries of the standard C++
+library. It is needed for compiling C++ code.
+
+%package -n libgcc
+Summary: C compiler runtime library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libgcc
+Libgcc is needed for dynamically linked C programs.
+%post -n libgcc -p /sbin/ldconfig
+%postun -n libgcc -p /sbin/ldconfig
+
+%package -n libgomp
+Summary: The GNU compiler collection OpenMP runtime library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libgomp
+This is the OpenMP runtime library needed by OpenMP enabled programs
+that were built with the -fopenmp compiler option and by programs that
+were auto-parallelized via the -ftree-parallelize-loops compiler
+option.
+%post -n libgomp -p /sbin/ldconfig
+%postun -n libgomp -p /sbin/ldconfig
+
+%package objc
+Summary: GNU Objective C Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description objc
+This package contains the GNU Objective C compiler. Objective C is an
+object oriented language, created by Next Inc. and used in their
+Nextstep OS. The source code is available in the gcc package.
+
+%package -n libobjc
+Summary: Library for the GNU Objective C Compiler
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libobjc
+The library for the GNU Objective C compiler.
+%post -n libobjc -p /sbin/ldconfig
+%postun -n libobjc -p /sbin/ldconfig
+
+%package obj-c++
+Summary: GNU Objective C++ Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description obj-c++
+This package contains the GNU Objective C++ compiler. Objective C++ is an
+object oriented language, created by Next Inc. and used in their
+Nextstep OS. The source code is available in the gcc package.
+
+%package -n cpp
+Summary: The GCC Preprocessor
+License: GPL-3.0+
+Group: Development/Languages
+%description -n cpp
+This Package contains just the preprocessor that is used by the X11
+packages.
+
+%package ada
+Summary: GNU Ada95 Compiler Based on GCC (GNAT)
+License: GPL-3.0+
+Group: Development/Languages
+%description ada
+This package contains an Ada95 compiler and associated development
+tools based on the GNU GCC technology. Ada95 is the object oriented
+successor of the Ada83 language. To build this package from source you
+must have installed a binary version to bootstrap the compiler.
+
+%package -n libada
+Summary: GNU Ada Runtime Libraries
+License: GPL-3.0-with-GCC-exception
+Group: Development/Languages
+%description -n libada
+This package contains the shared libraries required to run programs
+compiled with the GNU Ada compiler (GNAT) if they are compiled to use
+shared libraries. It also contains the shared libraries for the
+Implementation of the Ada Semantic Interface Specification (ASIS), the
+implementation of Distributed Systems Programming (GLADE) and the Posix
+1003.5 Binding (Florist).
+%post -n libada -p /sbin/ldconfig
+%postun -n libada -p /sbin/ldconfig
+
+%package -n libquadmath
+Summary: The GNU Fortran Compiler Quadmath Runtime Library
+License: LGPL-2.1
+Group: Development/Languages
+%description -n libquadmath
+The runtime library needed to run programs compiled with the Fortran compiler
+of the GNU Compiler Collection (GCC) and quadruple precision floating point
+operations.
+%post -n libquadmath -p /sbin/ldconfig
+%postun -n libquadmath -p /sbin/ldconfig
+
+%package -n libitm
+Summary: The GNU Compiler Transactional Memory Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libitm
+The runtime library needed to run programs compiled with the
+-fgnu-tm option of the GNU Compiler Collection (GCC).
+%post -n libitm -p /sbin/ldconfig
+%postun -n libitm -p /sbin/ldconfig
+
+%package -n libasan
+Summary: The GNU Compiler Address Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libasan
+The runtime library needed to run programs compiled with the
+-fsanitize=address option of the GNU Compiler Collection (GCC).
+%post -n libasan -p /sbin/ldconfig
+%postun -n libasan -p /sbin/ldconfig
+
+%package -n libtsan
+Summary: The GNU Compiler Thread Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libtsan
+The runtime library needed to run programs compiled with the
+-fsanitize=thread option of the GNU Compiler Collection (GCC).
+%post -n libtsan -p /sbin/ldconfig
+%postun -n libtsan -p /sbin/ldconfig
+
+%package -n libatomic
+Summary: The GNU Compiler Atomic Operations Runtime Library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Languages
+%description -n libatomic
+The runtime library for atomic operations of the GNU Compiler Collection (GCC).
+%post -n libatomic -p /sbin/ldconfig
+%postun -n libatomic -p /sbin/ldconfig
+
+%package -n libcilkrts
+Summary: The GNU Compiler Cilk+ Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libcilkrts
+The runtime library needed to run programs compiled with the
+-fcilkplus option of the GNU Compiler Collection (GCC).
+%post -n libcilkrts -p /sbin/ldconfig
+%postun -n libcilkrts -p /sbin/ldconfig
+
+%package -n liblsan
+Summary: The GNU Compiler Leak Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n liblsan
+The runtime library needed to run programs compiled with the
+-fsanitize=leak option of the GNU Compiler Collection (GCC).
+%post -n liblsan -p /sbin/ldconfig
+%postun -n liblsan -p /sbin/ldconfig
+
+%package -n libubsan
+Summary: The GNU Compiler Undefined Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libubsan
+The runtime library needed to run programs compiled with the
+-fsanitize=undefined option of the GNU Compiler Collection (GCC).
+%post -n libubsan -p /sbin/ldconfig
+%postun -n libubsan -p /sbin/ldconfig
+
+%package -n libvtv
+Summary: The GNU Compiler Vtable Verifier Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libvtv
+The runtime library needed to run programs compiled with the
+-fvtable-verify option of the GNU Compiler Collection (GCC).
+%post -n libvtv -p /sbin/ldconfig
+%postun -n libvtv -p /sbin/ldconfig
+
+%package -n libgcj
+Summary: Java Runtime Library for gcc
+License: GPL-2.0-with-classpath-exception
+Group: Development/Building
+%description -n libgcj
+This library is needed if you want to use the GNU Java compiler, gcj.
+Source code for this package is in gcc.
+%post -n libgcj -p /sbin/ldconfig
+%postun -n libgcj -p /sbin/ldconfig
+
+%package java
+Summary: The GNU Java Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description java
+The Java compiler from the GCC-tools-suite.
+
+%package -n libgcj_bc
+Summary: Fake library for BC-ABI compatibility.
+License: GPL-2.0-with-classpath-exception
+Group: Development/Languages
+%description -n libgcj_bc
+A fake library that is used at link time only. It ensures that
+binaries built with the BC-ABI link against a constant SONAME.
+This way, BC-ABI binaries continue to work if the SONAME underlying
+libgcj.so changes.
+
+%package -n libgcj-jar
+Summary: Java runtime library (jar files).
+License: GPL-2.0-with-classpath-exception
+Group: Development/Languages
+%description -n libgcj-jar
+These are the jar files that go along with the gcj front end to gcc.
+
+%package -n libgcj-devel
+Summary: Include Files and Libraries mandatory for Development.
+License: GPL-2.0-with-classpath-exception
+Group: Development/Languages
+%description -n libgcj-devel
+This package contains all necessary include files and libraries needed
+to develop applications that require these.
+
+%package -n gcc-gij
+Summary: Java Bytecode Interpreter for gcc
+License: GPL-2.0-with-classpath-exception
+Group: Development/Languages
+%description -n gcc-gij
+This package contains the java bytecode interpreter gij and related tools.
+
+%package -n libffi
+Summary: Foreign Function Interface library
+License: BSD-3-Clause
+Group: Development/Building
+%description -n libffi
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+%post -n libffi -p /sbin/ldconfig
+%postun -n libffi -p /sbin/ldconfig
+
+%package -n libffi-devel
+Summary: Foreign Function Interface library development files
+License: BSD 3-Clause
+Group: Development/Building
+%description -n libffi-devel
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+
+%package go
+Summary: GNU Go Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description go
+This package contains a Go compiler and associated development
+files based on the GNU GCC technology.
+
+%package -n libgo
+Summary: GNU Go compiler runtime library
+License: BSD-3-Clause
+Group: Development/Languages
+%description -n libgo
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+%post -n libgo -p /sbin/ldconfig
+%postun -n libgo -p /sbin/ldconfig
+
+%package testresults
+Summary: Testsuite results
+License: SUSE-Public-Domain
+Group: Development/Languages
+%description testresults
+Results from running the gcc and target library testsuites.
+
+%package -n gcc-32bit
+Summary: The GNU C Compiler 32bit support
+Group: Development/Building
+%description -n gcc-32bit
+This package contains 32bit support for the GNU Compiler Collection.
+
+%package -n libstdc++-devel-32bit
+Summary: Include Files and Libraries mandatory for Development
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libstdc++-devel-32bit
+This package contains all the headers and libraries of the standard C++
+library. It is needed for compiling C++ code.
+
+%package -n libgcc-32bit
+Summary: C compiler runtime library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libgcc-32bit
+Libgcc is needed for dynamically linked C programs.
+%post -n libgcc-32bit -p /sbin/ldconfig
+%postun -n libgcc-32bit -p /sbin/ldconfig
+
+%package -n libgomp-32bit
+Summary: The GNU compiler collection OpenMP runtime library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libgomp-32bit
+This is the OpenMP runtime library needed by OpenMP enabled programs
+that were built with the -fopenmp compiler option and by programs that
+were auto-parallelized via the -ftree-parallelize-loops compiler
+option.
+%post -n libgomp-32bit -p /sbin/ldconfig
+%postun -n libgomp-32bit -p /sbin/ldconfig
+
+%package -n libstdc++-32bit
+Summary: The standard C++ shared library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libstdc++-32bit
+The standard C++ library, needed for dynamically linked C++ programs.
+%post -n libstdc++-32bit -p /sbin/ldconfig
+%postun -n libstdc++-32bit -p /sbin/ldconfig
+
+%package objc-32bit
+Summary: GNU Objective C Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description objc-32bit
+This package contains the GNU Objective C compiler. Objective C is an
+object oriented language, created by Next Inc. and used in their
+Nextstep OS. The source code is available in the gcc package.
+
+%package -n libobjc-32bit
+Summary: Library for the GNU Objective C Compiler
+License: GPL-3.0-with-GCC-exception
+Group: Development/Building
+%description -n libobjc-32bit
+The library for the GNU Objective C compiler.
+%post -n libobjc-32bit -p /sbin/ldconfig
+%postun -n libobjc-32bit -p /sbin/ldconfig
+
+%package ada-32bit
+Summary: GNU Ada95 Compiler Based on GCC (GNAT)
+License: GPL-3.0+
+Group: Development/Languages
+%description ada-32bit
+This package contains an Ada95 compiler and associated development
+tools based on the GNU GCC technology. Ada95 is the object oriented
+successor of the Ada83 language. To build this package from source you
+must have installed a binary version to bootstrap the compiler.
+
+%package -n libada-32bit
+Summary: GNU Ada Runtime Libraries
+License: GPL-3.0-with-GCC-exception
+Group: Development/Languages
+%description -n libada-32bit
+This package contains the shared libraries required to run programs
+compiled with the GNU Ada compiler (GNAT) if they are compiled to use
+shared libraries. It also contains the shared libraries for the
+Implementation of the Ada Semantic Interface Specification (ASIS), the
+implementation of Distributed Systems Programming (GLADE) and the Posix
+1003.5 Binding (Florist).
+%post -n libada-32bit -p /sbin/ldconfig
+%postun -n libada-32bit -p /sbin/ldconfig
+
+%package -n libquadmath-32bit
+Summary: The GNU Fortran Compiler Quadmath Runtime Library
+License: LGPL-2.1
+Group: Development/Languages
+%description -n libquadmath-32bit
+The runtime library needed to run programs compiled with the Fortran compiler
+of the GNU Compiler Collection (GCC) and quadruple precision floating point
+operations.
+%post -n libquadmath-32bit -p /sbin/ldconfig
+%postun -n libquadmath-32bit -p /sbin/ldconfig
+
+%package -n libitm-32bit
+Summary: The GNU Compiler Transactional Memory Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libitm-32bit
+The runtime library needed to run programs compiled with the
+-fgnu-tm option of the GNU Compiler Collection (GCC).
+%post -n libitm-32bit -p /sbin/ldconfig
+%postun -n libitm-32bit -p /sbin/ldconfig
+
+%package -n libasan-32bit
+Summary: The GNU Compiler Address Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libasan-32bit
+The runtime library needed to run programs compiled with the
+-fsanitize=address option of the GNU Compiler Collection (GCC).
+%post -n libasan-32bit -p /sbin/ldconfig
+%postun -n libasan-32bit -p /sbin/ldconfig
+
+%package -n libtsan-32bit
+Summary: The GNU Compiler Thread Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libtsan-32bit
+The runtime library needed to run programs compiled with the
+-fsanitize=thread option of the GNU Compiler Collection (GCC).
+%post -n libtsan-32bit -p /sbin/ldconfig
+%postun -n libtsan-32bit -p /sbin/ldconfig
+
+%package -n libatomic-32bit
+Summary: The GNU Compiler Atomic Operations Runtime Library
+License: GPL-3.0-with-GCC-exception
+Group: Development/Languages
+%description -n libatomic-32bit
+The runtime library for atomic operations of the GNU Compiler Collection (GCC).
+%post -n libatomic-32bit -p /sbin/ldconfig
+%postun -n libatomic-32bit -p /sbin/ldconfig
+
+%package -n libcilkrts-32bit
+Summary: The GNU Compiler Cilk+ Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libcilkrts-32bit
+The runtime library needed to run programs compiled with the
+-fcilkplus option of the GNU Compiler Collection (GCC).
+%post -n libcilkrts-32bit -p /sbin/ldconfig
+%postun -n libcilkrts-32bit -p /sbin/ldconfig
+
+%package -n liblsan-32bit
+Summary: The GNU Compiler Leak Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n liblsan-32bit
+The runtime library needed to run programs compiled with the
+-fsanitize=leak option of the GNU Compiler Collection (GCC).
+%post -n liblsan-32bit -p /sbin/ldconfig
+%postun -n liblsan-32bit -p /sbin/ldconfig
+
+%package -n libubsan-32bit
+Summary: The GNU Compiler Undefined Sanitizer Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libubsan-32bit
+The runtime library needed to run programs compiled with the
+-fsanitize=undefined option of the GNU Compiler Collection (GCC).
+%post -n libubsan-32bit -p /sbin/ldconfig
+%postun -n libubsan-32bit -p /sbin/ldconfig
+
+%package -n libvtv-32bit
+Summary: The GNU Compiler Vtable Verifier Runtime Library
+License: MIT
+Group: Development/Languages
+%description -n libvtv-32bit
+The runtime library needed to run programs compiled with the
+-fvtable-verify option of the GNU Compiler Collection (GCC).
+%post -n libvtv-32bit -p /sbin/ldconfig
+%postun -n libvtv-32bit -p /sbin/ldconfig
+
+%package -n libffi-32bit
+Summary: Foreign Function Interface library
+License: BSD-3-Clause
+Group: Development/Building
+%description -n libffi-32bit
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+%post -n libffi-32bit -p /sbin/ldconfig
+%postun -n libffi-32bit -p /sbin/ldconfig
+
+%package -n libffi-devel-32bit
+Summary: Foreign Function Interface library development files
+License: BSD 3-Clause
+Group: Development/Building
+%description -n libffi-devel-32bit
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+
+%package go-32bit
+Summary: GNU Go Compiler
+License: GPL-3.0+
+Group: Development/Languages
+%description go-32bit
+This package contains a Go compiler and associated development
+files based on the GNU GCC technology.
+
+%package -n libgo-32bit
+Summary: GNU Go compiler runtime library
+License: BSD-3-Clause
+Group: Development/Languages
+%description -n libgo-32bit
+A foreign function interface is the popular name for the interface that allows code written in one language to call code written in another language.
+%post -n libgo-32bit -p /sbin/ldconfig
+%postun -n libgo-32bit -p /sbin/ldconfig
+
+%package -n asan-force-options
+Summary: Scripts to enable automatic package sanitization
+Group: System Environment
+Requires: gcc rpm
+Requires: libasan
+
+%description -n asan-force-options
+Scripts for ASan instrumentation
+
+%post -n asan-force-options
+# Change mode to allow all users to run gcc-force/unforce-options
+chmod a+w /usr/bin
+[ -d /emul/ ] && chmod a+w /emul/usr/bin/ && chmod a+w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-force-options -fsanitize-recover=address -fsanitize=address -fno-common -fno-omit-frame-pointer -U_FORTIFY_SOURCE
+# Add restore_fcommon macro
+cat >> /usr/lib/rpm/tizen_macros << EOF
+
+%restore_fcommon \\
+ /usr/bin/gcc-unforce-options \\
+ /usr/bin/gcc-force-options -fsanitize-recover=address -fsanitize=address -fcommon -fno-omit-frame-pointer -U_FORTIFY_SOURCE
+
+EOF
+
+%preun -n asan-force-options
+# Restore read-only mode
+chmod a-w /usr/bin
+[ -d /emul/ ] && chmod a-w /emul/usr/bin/ && chmod a-w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-unforce-options
+
+%package -n ubsan-force-options
+Summary: Scripts to enable automatic package sanitization
+Group: System Environment
+Requires: gcc
+Requires: libubsan
+
+%description -n ubsan-force-options
+Scripts for UBSan instrumentation
+
+%post -n ubsan-force-options
+# Change mode to allow all users to run gcc-force/unforce-options
+chmod a+w /usr/bin
+[ -d /emul/ ] && chmod a+w /emul/usr/bin/ && chmod a+w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-force-options -fsanitize=undefined,bounds-strict,float-divide-by-zero,float-cast-overflow
+
+%preun -n ubsan-force-options
+# Restore read-only mode
+chmod a-w /usr/bin
+[ -d /emul/ ] && chmod a-w /emul/usr/bin/ && chmod a-w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-unforce-options
+
+%package -n ubsan-build-env
+Summary: UBSan build environment
+Group: System Environment
+Requires: gcc
+Requires: libubsan rpm
+
+%description -n ubsan-build-env
+UBSan build environment support files and scripts
+
+%post -n ubsan-build-env
+cat %{_rpmconfigdir}/macros.ubsan >> %{_rpmconfigdir}/tizen_macros
+
+%package -n lsan-force-options
+Summary: Scripts to enable automatic package sanitization
+Group: System Environment
+Requires: gcc
+Requires: liblsan
+
+%description -n lsan-force-options
+Scripts for LSan instrumentation
+
+%post -n lsan-force-options
+# Change mode to allow all users to run gcc-force/unforce-options
+chmod a+w /usr/bin
+[ -d /emul/ ] && chmod a+w /emul/usr/bin/ && chmod a+w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-force-options -fsanitize=leak -fno-omit-frame-pointer -U_FORTIFY_SOURCE
+
+%preun -n lsan-force-options
+# Restore read-only mode
+chmod a-w /usr/bin
+[ -d /emul/ ] && chmod a-w /emul/usr/bin/ && chmod a-w /emul/home/abuild/rpmbuild/BUILD/gcc-%{version}/obj/gcc/
+/usr/bin/gcc-unforce-options
+[ -d /emul/ ] && chmod a-w /emul/usr/bin/
+
+%package -n asan-build-env
+Summary: Asan build environment
+Group: Development/Libraries
+Requires: libasan
+
+%description -n asan-build-env
+Asan build environment
+
+%post -n asan-build-env
+# Add /usr/lib/libasan.so to /etc/ld.so.preload
+[ -f /etc/ld.so.preload ] && mv -v /etc/ld.so.preload /etc/ld.so.preload.orig
+echo "libasan.so" > /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && cat /etc/ld.so.preload.orig >> /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && rm -f /etc/ld.so.preload.orig
+
+%preun -n asan-build-env
+# Restore /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && mv -v /etc/ld.so.preload.orig /etc/ld.so.preload
+
+%package -n lsan-runtime-env
+Summary: LSan runtime environment
+Group: Development/Libraries
+Requires: liblsan
+Requires(post): smack
+
+%description -n lsan-runtime-env
+LSan runtime environment
+
+%post -n lsan-runtime-env
+# Add /usr/lib64/liblsan.so to /etc/ld.so.preload
+[ -f /etc/ld.so.preload ] && mv -v /etc/ld.so.preload /etc/ld.so.preload.orig
+echo "%{libdir}/liblsan.so" > /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && cat /etc/ld.so.preload.orig >> /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && rm -f /etc/ld.so.preload.orig
+chsmack -a "_" /etc/ld.so.preload /LSAN_OPTIONS /lsan.supp
+
+%preun -n lsan-runtime-env
+# Restore /etc/ld.so.preload
+mv -v /etc/ld.so.preload.orig /etc/ld.so.preload
+
+%package -n sanitizer-devel
+Summary: Sanitizer platform-independent tools
+License: MIT
+Group: Development/Tools
+BuildArch: noarch
+Requires: binutils python
+Requires(post): smack
+
+%description -n sanitizer-devel
+The package contatins platform-independent tools for sanitization:
+- asan_symbolize.py: script for offline symbolization of asan logs
+
+%package -n asan-runtime-env
+Summary: Asan runtime environment for target device
+Group: Development/Libraries
+
+%description -n asan-runtime-env
+Asan runtime environment
+
+%post -n asan-runtime-env
+# Add /usr/lib/libasan.so to /etc/ld.so.preload
+[ -f /etc/ld.so.preload ] && mv -v /etc/ld.so.preload /etc/ld.so.preload.orig
+echo "%{libdir}/libasan.so" > /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && cat /etc/ld.so.preload.orig >> /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && rm -f /etc/ld.so.preload.orig
+echo "halt_on_error=false:start_deactivated=true:print_cmdline=true:quarantine_size_mb=1:detect_leaks=0:log_path=/tmp/asan.log:log_exe_path=1" > /ASAN_OPTIONS
+chsmack -a "_" /etc/ld.so.preload /ASAN_OPTIONS
+
+%preun -n asan-runtime-env
+# Restore /etc/ld.so.preload
+[ -f /etc/ld.so.preload.orig ] && mv -v /etc/ld.so.preload.orig /etc/ld.so.preload
+
+%package -n ubsan-runtime-env
+Summary: UBSan runtime environment for target device
+Group: Development/Libraries
+Requires: libubsan
+
+%description -n ubsan-runtime-env
+UBSan runtime environment
+
+%post -n ubsan-runtime-env
+echo "print_cmdline=true:log_path=/tmp/ubsan.log" > /UBSAN_OPTIONS
+
+%package plugin-devel
+Summary: GNU GCC Plugin development files
+License: GPL-3.0+
+Group: Development/Languages
+%description plugin-devel
+This package contains GCC Plugin development files needed for compiler
+plugins build.
+
+%package -n sanitizer-sources
+Summary: Sanitizer family tools sources
+License: MIT
+Group: Development/Tools
+BuildArch: noarch
+
+%description -n sanitizer-sources
+Sanitizer family tools sources for external tools.
+
+%prep
+
+%setup -q -n gcc-%{version}
+cp %{SOURCE20} .
+
+tar xf %{SOURCE10}
+ln -sf gmp-6.1.1 gmp
+tar xf %{SOURCE11}
+ln -sf mpfr-3.1.5 mpfr
+tar xf %{SOURCE12}
+ln -sf mpc-1.0.3 mpc
+tar xf %{SOURCE13}
+ln -sf isl-0.17.1 isl
+tar xf %{SOURCE14}
+ln -sf cloog-0.18.4 cloog
+
+echo "" > gcc/DEV-PHASE
+
+%global gcc_release `sed -e 's/^.*-//g' %{_builddir}/gcc-%{version}/gcc/LINARO-VERSION`
+
+%build
+rm -rf obj
+mkdir obj
+cd obj
+
+RPM_OPT_FLAGS=`echo $RPM_OPT_FLAGS|sed -e 's/-fno-rtti//g' -e 's/-fno-exceptions//g' -e 's/-Wmissing-format-attribute//g' -e 's/-fstack-protector//g' -e 's/-ffortify=.//g' -e 's/-Wall//g' -e 's/-m32//g' -e 's/-m64//g' -e 's/-fexceptions//' -e 's/\([[:space:]]\+.*-D_FORTIFY_SOURCE=\)[[:alnum:]]\+/\10/g'
+RPM_OPT_FLAGS="$RPM_OPT_FLAGS -D__USE_FORTIFY_LEVEL=0"`
+%{?cross:
+RPM_OPT_FLAGS=`echo $RPM_OPT_FLAGS|sed -e 's/-m\(arch\|tune\|cpu\)=[^ ]*//g'`
+RPM_OPT_FLAGS=`echo $RPM_OPT_FLAGS|sed -e 's/-m\(sse\|fpmath\)[^ ]*//g'`
+}
+RPM_OPT_FLAGS=`echo $RPM_OPT_FLAGS|sed -e 's/ */ /g'`
+
+
+
+CFLAGS="$RPM_OPT_FLAGS" CXXFLAGS="$RPM_OPT_FLAGS" XCFLAGS="$RPM_OPT_FLAGS" \
+TCFLAGS="$RPM_OPT_FLAGS" GCJFLAGS="$RPM_OPT_FLAGS" \
+../configure \
+ --prefix=%{_prefix} \
+ --infodir=%{_infodir} \
+ --mandir=%{_mandir} \
+ --libdir=%{libdir} \
+ --libexecdir=%{libdir} \
+ --enable-languages=c,c++ \
+ --enable-checking=release \
+ --disable-libssp \
+ --disable-bootstrap \
+ --disable-libvtv \
+ --disable-plugin \
+ --disable-libgcj \
+ --with-slibdir=%{libdir} \
+ --with-system-zlib \
+ --with-sysroot=/ \
+ --enable-__cxa_atexit \
+ --enable-libstdcxx-allocator=new \
+ --enable-version-specific-runtime-libs \
+ --enable-linker-build-id \
+ --without-system-libunwind \
+ --enable-threads=posix \
+ --disable-multilib \
+ --disable-libquadmath \
+ --enable-lto \
+%{!?cross: \
+%ifarch armv7l
+ --with-arch=armv7-a \
+ --with-tune=cortex-a8 \
+ --disable-sjlj-exceptions \
+%endif
+%ifarch aarch64
+ --with-arch=armv8-a \
+ --disable-sjlj-exceptions \
+%endif
+%ifarch %ix86
+ --with-arch-32=i586 \
+ --with-tune=generic \
+ --disable-libmpx \
+%endif
+%ifarch x86_64
+ --with-arch-32=i586 \
+ --with-tune=generic \
+ --enable-multilib \
+ --disable-libmpx \
+%endif
+} \
+%{?cross: \
+%{?armv7l: \
+ --with-arch=armv7-a \
+ --with-tune=cortex-a8 \
+ --disable-sjlj-exceptions \
+} \
+%{?aarch64: \
+ --with-arch=armv8-a \
+ --disable-sjlj-exceptions \
+} \
+ --disable-libgcc \
+ --disable-libgomp \
+ --disable-libatomic \
+ --disable-libstdc++-v3 \
+ --disable-libsanitizer \
+ --disable-libitm \
+} \
+ --with-bugurl="http://bugs.tizen.org/" \
+ --with-pkgversion="Tizen/Linaro GCC %{version} %{gcc_release}" \
+ --target=%{target_arch} \
+ --host=%{host_arch} \
+ --build=%{host_arch}
+
+
+
+make BOOT_CFLAGS="$RPM_OPT_FLAGS" %{?_smp_mflags}
+%{?gcc_run_tests:
+ echo "Run testsuite"
+ # asan needs a whole shadow address space
+ ulimit -v unlimited || true
+ make -k check %{?_smp_mflags} || true
+ mkdir ../testresults
+ ../contrib/test_summary | tee ../testresults/test_summary.txt
+}
+
+%install
+cd obj
+
+make install DESTDIR=$RPM_BUILD_ROOT
+
+%{?gcc_run_tests:
+ cp `find . -name "*.sum"` ../testresults/
+ cp `find . -name "*.log" \! -name "config.log" | grep -v 'acats.\?/tests' ` ../testresults/
+ chmod 644 ../testresults/*
+}
+
+%{remove_docs}
+rm -rf %{buildroot}/%{_datadir}/locale
+
+#remove everything we don't need
+rm -rf %{buildroot}/%{libsubdir}/install-tools
+find %{buildroot}/%{libsubdir} -name "*.la" -exec rm -rf {} +
+
+%{!?cross:
+ln -s gcc %{buildroot}%{_bindir}/cc
+mv %{buildroot}%{libsubdir}/libstdc++.so*-gdb.py %{buildroot}%{_datadir}/gcc-%{version}/python/libstdcxx/
+
+# expose plugins for ar (required for lto builds)
+mkdir -p %{buildroot}%{_prefix}/lib/bfd-plugins
+ln -sf %{libsubdir}/liblto_plugin.so %{buildroot}%{_prefix}/lib/bfd-plugins/liblto_plugin.so
+
+# legacy preprocessor
+mkdir -p %{buildroot}/lib
+ln -s %{_bindir}/cpp %{buildroot}/lib/cpp
+
+# 32-bit libgcc in multilib configuration
+%ifarch x86_64
+mv %{buildroot}%{_prefix}/lib/libgcc_s.so* %{buildroot}%{libsubdir}/32/
+%endif
+
+# move libraries to libdir
+for lib in asan atomic cilkrts gfortran gomp itm lsan quadmath stdc++ supc++ tsan ubsan
+do
+ [ -e %{buildroot}%{libsubdir}/lib$lib.a ] && mv %{buildroot}%{libsubdir}/lib$lib.a %{buildroot}%{libdir}/
+ [ -e %{buildroot}%{libsubdir}/lib$lib.so ] && mv %{buildroot}%{libsubdir}/lib$lib.so* %{buildroot}%{libdir}/
+done
+}
+
+%{?cross:
+rm -rf %{buildroot}/%{libsubdir}/include-fixed
+rm -rf %{buildroot}/%{libsubdir}/include
+}
+
+%{!?cross:
+cp %{SOURCE15} %{SOURCE16} %{SOURCE18} %{buildroot}%{_prefix}/bin
+chmod a+x %{buildroot}%{_prefix}/bin/gcc-force-options
+chmod a+x %{buildroot}%{_prefix}/bin/gcc-unforce-options
+chmod a+x %{buildroot}%{_prefix}/bin/asan_symbolize.py
+
+cp %{SOURCE17} %{buildroot}
+chmod 644 %{buildroot}/ASAN_OPTIONS
+
+%ifarch %lsan_arch
+cp %{SOURCE19} %{SOURCE24} %{buildroot}
+chmod 644 %{buildroot}/LSAN_OPTIONS
+chmod 644 %{buildroot}/lsan.supp
+%endif
+
+cd ../
+tar -czf libsanitizer.tar.bz libsanitizer
+mkdir -p %{buildroot}/src
+mv -v libsanitizer.tar.bz %{buildroot}/src
+
+mkdir -p %{buildroot}/%{_rpmconfigdir}/tizen/
+install -m 0644 %{SOURCE21} %{buildroot}/
+install -m 0644 %{SOURCE22} %{buildroot}/%{_rpmconfigdir}/
+install -m 0755 %{SOURCE23} %{buildroot}/%{_rpmconfigdir}/tizen/
+}
+
+%files
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{?cross:
+%{_bindir}/*
+%{libsubdir}/*
+}
+%{!?cross:
+%{_bindir}/gcc
+%{_bindir}/cc
+%{_bindir}/gcov
+%{_bindir}/gcov-tool
+%{_bindir}/gcc-ar
+%{_bindir}/gcc-nm
+%{_bindir}/gcc-ranlib
+%{_bindir}/%{target_arch}-gcc
+%{_bindir}/%{target_arch}-gcc-%{version}
+%{_bindir}/%{target_arch}-gcc-ar
+%{_bindir}/%{target_arch}-gcc-nm
+%{_bindir}/%{target_arch}-gcc-ranlib
+%{libsubdir}/collect2
+%{libsubdir}/lto1
+%{libsubdir}/lto-wrapper
+%{libsubdir}/liblto_plugin.so*
+%{_prefix}/lib/bfd-plugins/liblto_plugin.so
+%{libsubdir}/include-fixed/*
+%{libsubdir}/include/*.h
+%{libsubdir}/*.a
+%{libsubdir}/*.so
+%{libsubdir}/*.o
+%{libsubdir}/*.spec
+%{libdir}/*.so
+%{libdir}/*.a
+%ifarch %cilkrts_arch
+%{libsubdir}/include/cilk/*
+%endif
+%{libsubdir}/include/sanitizer/*
+%ifarch %asan_arch
+%exclude %{libdir}/libasan.so
+%endif
+%ifarch %lsan_arch
+%exclude %{libdir}/liblsan.so
+%endif
+%ifarch %tsan_arch
+%exclude %{libdir}/libtsan.so
+%endif
+
+%files c++
+%defattr(-,root,root)
+%{libsubdir}/cc1plus
+%{_bindir}/g++
+%{_bindir}/c++
+%{_bindir}/%{target_arch}-g++
+%{_bindir}/%{target_arch}-c++
+
+%files -n libstdc++
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libstdc++.so.*
+
+%files -n libstdc++-devel
+%defattr(-,root,root)
+%{libdir}/libstdc++.so
+%{libdir}/libstdc++.a
+%{libdir}/libsupc++.a
+%{libsubdir}/include/c++/*
+%{_datadir}/gcc-%{version}/python/libstdcxx/*
+
+%files -n libgcc
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libgcc_s.so.*
+
+%files -n libgomp
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libgomp.so.*
+
+%ifarch %asan_arch
+%files -n libasan
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libasan.so*
+%endif
+
+%ifarch %lsan_arch
+%files -n liblsan
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/liblsan.so*
+%endif
+
+%ifarch %tsan_arch
+%files -n libtsan
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libtsan.so*
+%endif
+
+%ifarch %atomic_arch
+%files -n libatomic
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libatomic.so.*
+%endif
+
+%ifarch %itm_arch
+%files -n libitm
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libitm.so.*
+%endif
+
+%ifarch %cilkrts_arch
+%files -n libcilkrts
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libcilkrts.so.*
+%endif
+
+%ifarch %ubsan_arch
+%files -n libubsan
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libubsan.so.*
+%endif
+
+%ifarch %quadmath_arch
+%files -n libquadmath
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libdir}/libquadmath.so.*
+%endif
+
+%files -n cpp
+%defattr(-,root,root)
+%{_bindir}/cpp
+%{libsubdir}/cc1
+/lib/cpp
+
+%files plugin-devel
+%defattr(-,root,root)
+%{libsubdir}/plugin/*
+
+%{?gcc_run_tests:
+%files testresults
+%defattr(-,root,root)
+%doc testresults/test_summary.txt
+%doc testresults/*.sum
+%doc testresults/*.log
+}
+%ifarch x86_64
+%files -n gcc-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/crt*
+%{libsubdir}/32/*.a
+%{libsubdir}/32/*.so
+%{libsubdir}/32/*.o
+%{libsubdir}/32/*.spec
+
+%ifarch %asan_arch
+%files -n libasan-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libasan.so.*
+%endif
+
+%ifarch %lsan_arch
+%files -n liblsan-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/liblsan.so.*
+%endif
+
+%ifarch %atomic_arch
+%files -n libatomic-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libatomic.so.*
+%endif
+
+%ifarch %cilkrts_arch
+%files -n libcilkrts-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/libcilkrts.so.*
+%endif
+
+%files -n libgcc-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libgcc_s.so.*
+
+%files -n libgomp-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libgomp.so.*
+
+%ifarch %itm_arch
+%files -n libitm-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/libitm.so.*
+%endif
+
+%ifarch %quadmath_arch
+%files -n libquadmath-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/libquadmath.so.*
+%endif
+
+%ifarch %ubsan_arch
+%files -n libubsan-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libubsan.so.*
+%endif
+
+%files -n libstdc++-32bit
+%manifest gcc.manifest
+%defattr(-,root,root)
+%{libsubdir}/32/libstdc++.so.*
+%exclude %{libsubdir}/32/libstdc++.so.*-gdb.py
+
+%files -n libstdc++-devel-32bit
+%defattr(-,root,root)
+%{libsubdir}/32/libstdc++.so.*-gdb.py
+%endif
+
+%files -n asan-force-options
+%defattr(-,root,root,-)
+%{_prefix}/bin/gcc-force-options
+%{_prefix}/bin/gcc-unforce-options
+
+%files -n ubsan-force-options
+%defattr(-,root,root,-)
+%{_prefix}/bin/gcc-force-options
+%{_prefix}/bin/gcc-unforce-options
+
+%ifarch %lsan_arch
+%files -n lsan-force-options
+%manifest gcc.manifest
+%defattr(-,root,root,-)
+%{_prefix}/bin/gcc-force-options
+%{_prefix}/bin/gcc-unforce-options
+%endif
+
+%files -n asan-build-env
+%defattr(-,root,root,-)
+/ASAN_OPTIONS
+
+%files -n asan-runtime-env
+%defattr(-,root,root,-)
+
+%ifarch %lsan_arch
+%files -n lsan-runtime-env
+%defattr(-,root,root,-)
+/LSAN_OPTIONS
+/lsan.supp
+%endif
+
+%ifarch %ubsan_arch
+%files -n ubsan-build-env
+%defattr(-,root,root,-)
+/UBSAN_OPTIONS
+%{_rpmconfigdir}/macros.ubsan
+%{_rpmconfigdir}/tizen/extract-ubsan-logs
+
+%files -n ubsan-runtime-env
+%defattr(-,root,root,-)
+%endif
+
+%files -n sanitizer-devel
+%defattr(-,root,root,-)
+%{_prefix}/bin/asan_symbolize.py
+
+%files -n sanitizer-sources
+%defattr(-,root,root,-)
+/src/libsanitizer.tar.bz
+
+}
+
+%changelog
diff --git a/packaging/lsan.supp b/packaging/lsan.supp
new file mode 100644
index 00000000000..71894062e27
--- /dev/null
+++ b/packaging/lsan.supp
@@ -0,0 +1 @@
+leak:g_hash_table_new_full
diff --git a/packaging/macros.ubsan b/packaging/macros.ubsan
new file mode 100644
index 00000000000..f1f0fecf64a
--- /dev/null
+++ b/packaging/macros.ubsan
@@ -0,0 +1,39 @@
+# /etc/rpm/macros.ubsan
+
+%_enable_ubsan_packages 1
+
+%__ubsan_install_post /usr/lib/rpm/tizen/extract-ubsan-logs
+
+# See original macro (before expansion) and correct lines after the first one.
+# Mine is from Fedora RPM macros, YMMV.
+%__spec_install_post\
+ %{?__ubsan_package:%{__ubsan_install_post}}\
+ %{?__debug_package:%{__debug_install_post}}\
+ %{__arch_install_post}\
+ %{__os_install_post}\
+%{nil}
+
+# Same goes here, see your original macro.
+%install %{?_enable_ubsan_packages:%{ubsan_package}}\
+%{?_enable_debug_packages:%{debug_package}}\
+%%install\
+LANG=C\
+export LANG\
+unset DISPLAY\
+rm -rf %{?buildroot:%{buildroot}} \
+mkdir -p %{?buildroot:%{buildroot}} \
+%{nil}
+
+# Template for ubsan logs sub-package.
+%ubsan_package \
+%global __ubsan_package 1\
+%package ubsan-logs\
+Summary: UBSan logs for package %{name}\
+Group: Development/UBSan\
+AutoReqProv: 0\
+%description ubsan-logs\
+This package provides UBSan log files for package %{name}.\
+%files ubsan-logs\
+%defattr(-,root,root)\
+/usr/share/ubsan/*ubsan.log*\
+%{nil}
diff --git a/packaging/mpc-1.0.3.tar.gz b/packaging/mpc-1.0.3.tar.gz
new file mode 100644
index 00000000000..3da140d4fd6
--- /dev/null
+++ b/packaging/mpc-1.0.3.tar.gz
Binary files differ
diff --git a/packaging/mpfr-3.1.5.tar.bz2 b/packaging/mpfr-3.1.5.tar.bz2
new file mode 100644
index 00000000000..7dc9d646fb4
--- /dev/null
+++ b/packaging/mpfr-3.1.5.tar.bz2
Binary files differ
diff --git a/packaging/pre_checkin.sh b/packaging/pre_checkin.sh
new file mode 100755
index 00000000000..84422942d11
--- /dev/null
+++ b/packaging/pre_checkin.sh
@@ -0,0 +1,14 @@
+#!/bin/bash
+
+# the script takes linaro-gcc.spec and creates the gcc-* packages
+for arch in armv7l aarch64; do
+
+ echo -n "Building package for $arch --> gcc-$arch ..."
+
+ echo "%define cross $arch" > gcc-${arch}.spec
+ echo "%define $arch 1" >> gcc-${arch}.spec
+ echo "" >> gcc-${arch}.spec
+ cat linaro-gcc.spec >> gcc-${arch}.spec
+ echo " done."
+done
+