Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
29 commits
Select commit Hold shift + click to select a range
34bb457
upgrading angr as it uses the newer packages with prebuilt arm binaries
Jepson2k Dec 26, 2024
33663ae
newer capstone with more arm pre-built binaries
Jepson2k Dec 26, 2024
ede6428
gcc10 was phased out for gcc12 in bookworm
Jepson2k Dec 26, 2024
fca3fc0
these packages needed newer versions to work with the newer python
Jepson2k Dec 26, 2024
4db5d21
added multi arch versions as they allow x86 binary introspective test…
Jepson2k Jan 3, 2025
9463331
fixing a couple of small bugs and changing some small details to enab…
Jepson2k Jan 3, 2025
a66c9b1
I upgrade this and then they just released a new version
Jepson2k Jan 3, 2025
cd13de2
Almost 100%...if the bcc toolchain had an arm version or build on arm…
Jepson2k Jan 3, 2025
49f7926
Fix missing newline in Dockerstub
alchzh Jan 7, 2025
e74ee56
Update Makefiles with Jacob's suggestion
alchzh Jan 9, 2025
a78622b
Add >= version specifier to angr requirement for different python ver…
alchzh Jan 9, 2025
0b0a23f
remove incorrect "shell" in subshell
alchzh Jan 9, 2025
9951881
Add separate configuration files for amd64 and arm64 docker images
alchzh Jan 17, 2025
35c79b4
Look in /etc/ofrak for toolchain.conf
alchzh Jan 17, 2025
aa70d01
Copy platform specific Docker toolchain.conf to /etc/ofrak/toolchain.…
alchzh Jan 17, 2025
82c7a54
Revert toolchain.conf to master to avoid breaking existing containers
alchzh Jan 17, 2025
00d431b
Merge branch 'master' into feature/arm-platform-support
whyitfor Apr 14, 2025
d0020b9
Revert changes to functional coverage
whyitfor Apr 14, 2025
711b927
Revert M68K changes
whyitfor Apr 15, 2025
4e4bfee
Address MR feedback
whyitfor Apr 15, 2025
cd4ca9d
Remove unneded changes
whyitfor Apr 15, 2025
ca44d33
Support more arm64 toolchains
whyitfor Apr 15, 2025
19ebf4b
Use one toolchain.conf, standard toolchain directory names
whyitfor Apr 15, 2025
3bb7b1a
Revert erroneous change
whyitfor Apr 15, 2025
82a705b
Update changelogs, adjust typo
whyitfor Apr 15, 2025
31ae654
Break toolchain configs back out based on platform, add default
whyitfor Apr 17, 2025
d9bd309
Fix typo, inadvertent change to ofrak_core/Dockerstub
whyitfor Apr 18, 2025
2893f6f
Edit comment
whyitfor Apr 19, 2025
79da6a4
Make toolchain confs explicitly used in Docker; fix typos
whyitfor Apr 21, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion disassemblers/ofrak_angr/CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/)
## [Unreleased](https://github.com/redballoonsecurity/ofrak/tree/master)

### Changed
- Update to latest angr==9.2.77, which also necessitates Python >= 3.8.
- Update to latest angr==9.2.93, which also necessitates Python >= 3.8.
- Refactored AngrDecompilationAnalysis/Analyzer to use generic components in ofrak core. ([#453](https://github.com/redballoonsecurity/ofrak/pull/453))
- Minor update to OFRAK Community License, add OFRAK Pro License ([#478](https://github.com/redballoonsecurity/ofrak/pull/478))

Expand Down
4 changes: 2 additions & 2 deletions disassemblers/ofrak_capstone/CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,13 +3,13 @@ All notable changes to `ofrak-capstone` will be documented in this file.

The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/) and adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).

## [Unreleased 1.1.0rc0](https://github.com/redballoonsecurity/ofrak/tree/master)
## [Unreleased 1.1.0rc1](https://github.com/redballoonsecurity/ofrak/tree/master)

### Fixed
- Capstone tests fixed to use `run_instruction_unpacker_test_case` ([#503](https://github.com/redballoonsecurity/ofrak/pull/503))

### Changed
- Update to captione==5.0.0.post1.
- Update to captione==5.0.3.
- Minor update to OFRAK Community License, add OFRAK Pro License ([#478](https://github.com/redballoonsecurity/ofrak/pull/478))
- Updated library to support ofrak 3.3.0rc0. ([#539](https://github.com/redballoonsecurity/ofrak/issues/539))

Expand Down
2 changes: 1 addition & 1 deletion disassemblers/ofrak_capstone/requirements.txt
Original file line number Diff line number Diff line change
@@ -1 +1 @@
capstone==5.0.0.post1
capstone==5.0.3
2 changes: 1 addition & 1 deletion disassemblers/ofrak_capstone/setup.py
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ def read_requirements(requirements_path):

setuptools.setup(
name="ofrak_capstone",
version="1.0.0",
version="1.1.0rc1",
packages=setuptools.find_packages(exclude=["ofrak_capstone_test", "ofrak_capstone_test.*"]),
package_data={"ofrak_capstone": ["py.typed"]},
install_requires=["ofrak>=3.3.0rc0"] + read_requirements("requirements.txt"),
Expand Down
5 changes: 3 additions & 2 deletions ofrak_core/CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ All notable changes to `ofrak` will be documented in this file.

The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/) and adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).

## [Unreleased: 3.3.0rc2](https://github.com/redballoonsecurity/ofrak/tree/master)
## [Unreleased: 3.3.0rc3](https://github.com/redballoonsecurity/ofrak/tree/master)
### Added
- Add license check command to prompt users about community or pro licenses. ([#478](https://github.com/redballoonsecurity/ofrak/pull/478))
- Support `application/vnd.android.package-archive` mime type for APKs, which is returned by newer versions of libmagic ([#470](https://github.com/redballoonsecurity/ofrak/pull/470))
Expand Down Expand Up @@ -67,6 +67,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/)
- Add `RawMagicPattern` to efficiently run custom magic byte search logic within `MagicIdenfifier`
- Update registered identifiers to make use of new `MagicIdentifier` for following resource tags: `Apk`, `Bzip2Data`, `CpioFilesystem`, `DeviceTreeBlob`, `Elf`, `Ext2Filesystem`, `Ext3Filesystem`, `Ext4Filesystem`, `GzipData`, `ISO9660Image`, `Jffs2Filesystem`, `LzmaData`, `XzData`, `LzoData`, `OpenWrtTrx`, `Pe`, `RarArchive`, `SevenZFilesystem`, `SquashfsFilesystem`, `TarArchive`, `Ubi`, `Ubifs`, `Uf2File`, `UImage`, `ZipArchive`, `ZlibData`, `ZstdData`
- Update `Instruction.get_assembly` to by synchronous ([#539](https://github.com/redballoonsecurity/ofrak/issues/539))
- Update orjson to ~=3.10.12 ([#562](https://github.com/redballoonsecurity/ofrak/pull/562/files))

### Deprecated
- `Resource.flush_to_disk` deprecated in favor of `Resource.flush_data_to_disk`. ([#373](https://github.com/redballoonsecurity/ofrak/pull/373), [#567](https://github.com/redballoonsecurity/ofrak/pull/568))
Expand All @@ -77,7 +78,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/)
### Security
- Update aiohttp to 3.10.11 ([#522](https://github.com/redballoonsecurity/ofrak/pull/522))
- Update pycryptogrpahy to version 43.0.3. ([#525](https://github.com/redballoonsecurity/ofrak/pull/525))
- Bump `lief` dependency to 0.15.1 to address [vulnerability](https://github.com/redballoonsecurity/ofrak/security/dependabot/31) in lower versions ([#502](https://github.com/redballoonsecurity/ofrak/pull/502))
- Bump `lief` dependency to 0.16.1 to address [vulnerability](https://github.com/redballoonsecurity/ofrak/security/dependabot/31) in lower versions ([#502](https://github.com/redballoonsecurity/ofrak/pull/502), [#562](https://github.com/redballoonsecurity/ofrak/pull/562/files))

## [3.2.0](https://github.com/redballoonsecurity/ofrak/compare/ofrak-v3.1.0...ofrak-v3.2.0)
### Added
Expand Down
1 change: 0 additions & 1 deletion ofrak_core/pytest_ofrak/elf/assets/Makefile
Comment thread
rbs-jacob marked this conversation as resolved.
Original file line number Diff line number Diff line change
@@ -1,4 +1,3 @@

CC=gcc

default: program
Expand Down
121 changes: 0 additions & 121 deletions ofrak_core/pytest_ofrak/elf/fixtures.py
Original file line number Diff line number Diff line change
@@ -1,133 +1,12 @@
import os

# import subprocess

import pytest


# MAKEFILE_CONTENTS = """
# CC=gcc

# default: program

# program.o: program.c $(HEADERS)
# $(CC) -c program.c -fno-asynchronous-unwind-tables -o program.o

# program: program.o
# $(CC) program.o -o program

# program_no_reloc: program.o
# $(CC) program.o -no-pie -o program_no_reloc

# program_relocated: program_relocated.o
# $(CC) program_relocated.o -o program_relocated

# large_elf.o: large_elf.c $(HEADERS)
# $(CC) -c large_elf.c -o large_elf.o

# large_elf: large_elf.o
# $(CC) large_elf.o -no-pie -o large_elf
# """

# C_SOURCE_CONTENTS = """
# #include <stdio.h>

# int foo();
# int bar();

# int main() {
# printf("Hello, World!\\n");
# return foo();
# }

# int foo() {
# return 12;
# }

# int bar() {
# return 24;
# }


# """

# LARGE_SOURCE_CONTENTS_HEADER = """
# int foo();
# int bar();

# int main() {
# return bar();
# }

# """

# LARGE_SOURCE_CONTENTS_FOOTER = """

# int foo() {
# return 12;
# }

# int bar() {
# return 24;
# }


# """

# PATCH_CONTENTS = """
# int noop0();

# int baz()
# {
# noop0();
# return 36;
# }
# """


# def create_noops():
# noops = []

# i = 0

# for i in range(8000):
# instruction = f"int noop{i}(){{}}"
# noops.append(instruction)

# return noops


@pytest.fixture(scope="session")
def elf_test_directory():
return os.path.join(os.path.dirname(__file__), "assets")

# makefile_path = os.path.join(tmpdir, "Makefile")
# c_source_path = os.path.join(tmpdir, "program.c")
# large_source_path = os.path.join(tmpdir, "large_elf.c")

# patch_dir = os.path.join(tmpdir, "source_dir")
# if not os.path.exists(patch_dir):
# os.mkdir(patch_dir)
# patch_path = os.path.join(patch_dir, "patch.c")

# noops = create_noops()

# LARGE_SOURCE_CONTENTS = LARGE_SOURCE_CONTENTS_HEADER
# for noop in noops:
# LARGE_SOURCE_CONTENTS += noop
# LARGE_SOURCE_CONTENTS += LARGE_SOURCE_CONTENTS_FOOTER

# with open(makefile_path, "w") as f:
# f.write(MAKEFILE_CONTENTS)
# with open(c_source_path, "w") as f:
# f.write(C_SOURCE_CONTENTS)
# with open(large_source_path, "w") as f:
# f.write(LARGE_SOURCE_CONTENTS)
# with open(patch_path, "w") as f:
# f.write(PATCH_CONTENTS)

# return tmpdir


@pytest.fixture(scope="session")
def elf_object_file(elf_test_directory):
Expand Down
4 changes: 2 additions & 2 deletions ofrak_core/requirements.txt
Original file line number Diff line number Diff line change
Expand Up @@ -10,8 +10,8 @@ importlib-metadata>=4.13
intervaltree==3.1.0
keystone-engine==0.9.2
jefferson==0.4.5;python_version>="3.8"
lief==0.15.1
orjson~=3.9.15
lief==0.16.1
orjson~=3.10.12
pefile==2023.2.7
pycdlib==1.12.0
python-magic;platform_system!="Windows"
Expand Down
4 changes: 2 additions & 2 deletions ofrak_core/setup.py
Original file line number Diff line number Diff line change
Expand Up @@ -69,7 +69,7 @@ def read_requirements(requirements_path):

setuptools.setup(
name="ofrak",
version="3.3.0rc2",
version="3.3.0rc3",
description="A binary analysis and modification platform",
packages=setuptools.find_packages(exclude=["test_ofrak", "test_ofrak.*"]),
package_data={
Expand All @@ -78,7 +78,7 @@ def read_requirements(requirements_path):
install_requires=[
"ofrak_io>=1.0,==1.*",
"ofrak_type>=2.2.0rc0,==2.*",
"ofrak_patch_maker>=4.0.2rc0,==4.*",
"ofrak_patch_maker>=4.1.0rc0,==4.*",
]
+ read_requirements("requirements.txt"),
extras_require={
Expand Down
6 changes: 3 additions & 3 deletions ofrak_patch_maker/CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,10 @@ All notable changes to `ofrak-patch-maker` will be documented in this file.

The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/) and adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0.html).

## [Unreleased](https://github.com/redballoonsecurity/ofrak/tree/master)
## [Unreleased: 4.1.0rc0](https://github.com/redballoonsecurity/ofrak/tree/master)
### Added
- GNU 32-bit x86 toolchain. ([#405](https://github.com/redballoonsecurity/ofrak/pull/405))
- SPARC BCC tolchain. ([#462](https://github.com/redballoonsecurity/ofrak/pull/462))
- SPARC BCC toolchain (x86_64 platforms only) ([#462](https://github.com/redballoonsecurity/ofrak/pull/462), [#405](https://github.com/redballoonsecurity/ofrak/pull/405))

### Removed
- Switch from binutils version of linker, bin_parser, assembler for X86_64 to default Debian versions. ([#405](https://github.com/redballoonsecurity/ofrak/pull/405))
Expand All @@ -18,7 +18,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/)
### Changed
- Removed `SUBALIGN(0)` for `.bss` sections
- Minor update to OFRAK Community License, add OFRAK Pro License ([#478](https://github.com/redballoonsecurity/ofrak/pull/478))
- Install toolchains from source or tarball instead of relying on the Debian package manager ([#502](https://github.com/redballoonsecurity/ofrak/pull/502), [#541](https://github.com/redballoonsecurity/ofrak/pull/541))
- Install toolchains (x86_64, aarch64 platforms) from source or tarball instead of relying on the Debian package manager ([#405](https://github.com/redballoonsecurity/ofrak/pull/405), [#502](https://github.com/redballoonsecurity/ofrak/pull/502), [#541](https://github.com/redballoonsecurity/ofrak/pull/541), [#562](https://github.com/redballoonsecurity/ofrak/pull/562/files))
- Deprecate reserving `.bss` space at the FEM linking step with `create_unsafe_bss_segment` method and `unsafe_bss_segment` argument. ([#505](https://github.com/redballoonsecurity/ofrak/pull/505))
- Determine the correct allocation behavior of sections from ELF flags rather than section names. ([#505](https://github.com/redballoonsecurity/ofrak/pull/505))

Expand Down
65 changes: 49 additions & 16 deletions ofrak_patch_maker/Dockerstub
Original file line number Diff line number Diff line change
@@ -1,34 +1,53 @@
ARG TARGETARCH

RUN mkdir -p /opt/rbs/toolchain

COPY ${PACKAGE_PATH}/ofrak_patch_maker/config/docker/${TARGETARCH}_platform_toolchain.conf /etc/ofrak/toolchain.conf

# LLVM
RUN mkdir -p /opt/rbs/toolchain && \
RUN if [ "$TARGETARCH" = "amd64" ]; then \
cd /tmp && \
wget https://github.com/llvm/llvm-project/releases/download/llvmorg-12.0.1/clang+llvm-12.0.1-x86_64-linux-gnu-ubuntu-16.04.tar.xz --show-progress --progress=bar:force:noscroll && \
tar xf clang+llvm-12.0.1-x86_64-linux-gnu-ubuntu-16.04.tar.xz -C /opt/rbs/toolchain && \
rm -rf clang+llvm-12.0.1-x86_64-linux-gnu-ubuntu-16.04.tar.xz && \
mv /opt/rbs/toolchain/clang+llvm-12.0.1-x86_64-linux-gnu-ubuntu- /opt/rbs/toolchain/llvm_12.0.1
mv /opt/rbs/toolchain/clang+llvm-12.0.1-x86_64-linux-gnu-ubuntu- /opt/rbs/toolchain/llvm_12.0.1; \
elif [ "$TARGETARCH" = "arm64" ]; then \
apt-get update && apt-get install -y libtinfo5 && \
cd /tmp/ && \
wget https://github.com/llvm/llvm-project/releases/download/llvmorg-12.0.1/clang+llvm-12.0.1-aarch64-linux-gnu.tar.xz --show-progress --progress=bar:force:noscroll && \
tar xf clang+llvm-12.0.1-aarch64-linux-gnu.tar.xz -C /opt/rbs/toolchain && \
rm -rf clang+llvm-12.0.1-aarch64-linux-gnu.tar.xz && \
mv /opt/rbs/toolchain/clang+llvm-12.0.1-aarch64-linux-gnu /opt/rbs/toolchain/llvm_12.0.1; \
fi;

# ARM GNU NONE EABI
RUN cd /tmp && \
RUN if [ "$TARGETARCH" = "amd64" ]; then \
cd /tmp && \
wget https://developer.arm.com/-/media/Files/downloads/gnu-rm/10-2020q4/gcc-arm-none-eabi-10-2020-q4-major-x86_64-linux.tar.bz2 --show-progress --progress=bar:force:noscroll && \
tar xf gcc-arm-none-eabi-10-2020-q4-major-x86_64-linux.tar.bz2 -C /opt/rbs/toolchain && \
rm -rf gcc-arm-none-eabi-10-2020-q4-major-x86_64-linux.tar.bz2
rm -rf gcc-arm-none-eabi-10-2020-q4-major-x86_64-linux.tar.bz2; \
elif [ "$TARGETARCH" = "arm64" ]; then \
cd /tmp && \
wget https://developer.arm.com/-/media/Files/downloads/gnu-rm/10-2020q4/gcc-arm-none-eabi-10-2020-q4-major-aarch64-linux.tar.bz2 --show-progress --progress=bar:force:noscroll && \
tar xf gcc-arm-none-eabi-10-2020-q4-major-aarch64-linux.tar.bz2 -C /opt/rbs/toolchain && \
rm -rf gcc-arm-none-eabi-10-2020-q4-major-aarch64-linux.tar.bz2; \
fi;

# LINUX GNU + BINUTILS
RUN cd /tmp && \
RUN if [ "$TARGETARCH" = "amd64" ]; then \
cd /tmp && \
wget https://download.01.org/0day-ci/cross-package/gcc-10.3.0-nolibc/x86_64-gcc-10.3.0-nolibc_x86_64-linux.tar.xz --show-progress --progress=bar:force:noscroll && \
tar xf x86_64-gcc-10.3.0-nolibc_x86_64-linux.tar.xz -C /opt/rbs/toolchain && \
rm -rf x86_64-gcc-10.3.0-nolibc_x86_64-linux.tar.xz

#X64-64 toolchain for arm64 Docker images
RUN if [ "$TARGETARCH" = "arm64" ]; then \
apt-get update && apt-get install -y gcc-10-x86-64-linux-gnu; \
rm -rf x86_64-gcc-10.3.0-nolibc_x86_64-linux.tar.xz; \
elif [ "$TARGETARCH" = "arm64" ]; then \
cd /tmp && \
wget https://www.kernel.org/pub/tools/crosstool/files/bin/arm64/10.3.0/arm64-gcc-10.3.0-nolibc-x86_64-linux.tar.xz --show-progress --progress=bar:force:noscroll && \
tar xvf arm64-gcc-10.3.0-nolibc-x86_64-linux.tar.xz -C /opt/rbs/toolchain && \
rm -rf arm64-gcc-10.3.0-nolibc-x86_64-linux.tar.xz; \
fi;

#M68k GNU 10 Linux
#Only exists for x86
RUN if [ "$TARGETARCH" = "amd64" ]; then \
cd /tmp && \
RUN cd /tmp && \
apt-get update && apt-get install -y gcc g++ gperf bison flex texinfo help2man make libncurses5-dev python3-dev autoconf automake libtool libtool-bin gawk wget bzip2 xz-utils unzip patch libstdc++6 rsync && \
git clone https://github.com/crosstool-ng/crosstool-ng.git && \
cd crosstool-ng/ && \
Expand Down Expand Up @@ -82,8 +101,7 @@ RUN if [ "$TARGETARCH" = "amd64" ]; then \
>> .config && \
./ct-ng build CT_JOBS=`nproc` \
| sed 's/.*\r//g' && \
cd /tmp && rm -rf crosstool-ng; \
fi;
cd /tmp && rm -rf crosstool-ng

#M68k VBCC
RUN cd /tmp && \
Expand All @@ -100,7 +118,7 @@ RUN cd /tmp && \
CPU=m68k SYNTAX=mot make && \
cp ./vasmm68k_mot /opt/rbs/toolchain/vbcc_0_9/bin/ && \
cp ./vobjdump /opt/rbs/toolchain/vbcc_0_9/bin/ && \
cd /tmp &&\
cd /tmp && \
rm -rf vasm* vbcc*

#AARCH64 GNU 10 Linux
Expand All @@ -109,6 +127,11 @@ RUN if [ "$TARGETARCH" = "amd64" ]; then \
wget https://armkeil.blob.core.windows.net/developer/Files/downloads/gnu-a/10.3-2021.07/binrel/gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu.tar.xz --show-progress --progress=bar:force:noscroll && \
tar xf gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu.tar.xz -C /opt/rbs/toolchain && \
rm -rf gcc-arm-10.3-2021.07-x86_64-aarch64-none-linux-gnu.tar.xz; \
elif [ "$TARGETARCH" = "arm64" ]; then \
cd /tmp && \
wget https://developer.arm.com/-/media/Files/downloads/gnu-a/10.3-2021.07/binrel/gcc-arm-10.3-2021.07-aarch64-aarch64-none-elf.tar.xz --show-progress --progress=bar:force:noscroll && \
tar xf gcc-arm-10.3-2021.07-aarch64-aarch64-none-elf.tar.xz -C /opt/rbs/toolchain && \
rm -rf gcc-arm-10.3-2021.07-aarch64-aarch64-none-elf.tar.xz; \
fi;

#AVR GCC
Expand All @@ -117,6 +140,11 @@ RUN if [ "$TARGETARCH" = "amd64" ]; then \
wget https://ww1.microchip.com/downloads/aemDocuments/documents/OTH/ProductDocuments/SoftwareLibraries/Firmware/avr8-gnu-toolchain-3.6.2.1778-linux.any.x86_64.tar.gz --show-progress --progress=bar:force:noscroll && \
tar xzf avr8-gnu-toolchain-3.6.2.1778-linux.any.x86_64.tar.gz -C /opt/rbs/toolchain && \
rm -rf avr8-gnu-toolchain-3.6.2.1778-linux.any.x86_64.tar.gz; \
elif [ "$TARGETARCH" = "arm64" ]; then \
cd /tmp && \
wget http://downloads.arduino.cc/tools/avr-gcc-7.3.0-atmel3.6.1-arduino7-aarch64-pc-linux-gnu.tar.bz2 --show-progress --progress=bar:force:noscroll && \
tar xf avr-gcc-7.3.0-atmel3.6.1-arduino7-aarch64-pc-linux-gnu.tar.bz2 -C /opt/rbs/toolchain && \
rm -rf avr-gcc-7.3.0-atmel3.6.1-arduino7-aarch64-pc-linux-gnu.tar.bz2; \
fi;

#PPC GNU 10 Linux
Expand All @@ -125,6 +153,11 @@ RUN if [ "$TARGETARCH" = "amd64" ]; then \
wget https://download.01.org/0day-ci/cross-package/gcc-10.3.0-nolibc/x86_64-gcc-10.3.0-nolibc_powerpc-linux.tar.xz --show-progress --progress=bar:force:noscroll && \
tar xf x86_64-gcc-10.3.0-nolibc_powerpc-linux.tar.xz -C /opt/rbs/toolchain && \
rm -rf x86_64-gcc-10.3.0-nolibc_powerpc-linux.tar.xz; \
elif [ "$TARGETARCH" = "arm64" ]; then \
cd /tmp && \
wget https://www.kernel.org/pub/tools/crosstool/files/bin/arm64/10.3.0/arm64-gcc-10.3.0-nolibc-powerpc-linux.tar.xz --show-progress --progress=bar:force:noscroll && \
tar xf arm64-gcc-10.3.0-nolibc-powerpc-linux.tar.xz -C /opt/rbs/toolchain && \
rm -rf arm64-gcc-10.3.0-nolibc-powerpc-linux.tar.xz; \
fi;

#BCC (GCC) SPARC v8
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -26,15 +26,13 @@ LINKER = /opt/rbs/toolchain/m68k-unknown-linux-gnu/bin/m68k-unknown-linux-gnu-ld
BIN_PARSER = /opt/rbs/toolchain/m68k-unknown-linux-gnu/bin/m68k-unknown-linux-gnu-objdump

[GNU_X86_64_LINUX_EABI_10_3_0]
# Expecting the user host is 64-bit GNU/Linux, we're replacing the system compiler
PREPROCESSOR = /opt/rbs/toolchain/gcc-10.3.0-nolibc/x86_64-linux/bin/x86_64-linux-gcc
COMPILER = /opt/rbs/toolchain/gcc-10.3.0-nolibc/x86_64-linux/bin/x86_64-linux-gcc
LINKER = /opt/rbs/toolchain/gcc-10.3.0-nolibc/x86_64-linux/bin/x86_64-linux-ld
BIN_PARSER = /opt/rbs/toolchain/gcc-10.3.0-nolibc/x86_64-linux/bin/x86_64-linux-objdump
LIB = /opt/rbs/toolchain/gcc-10.3.0-nolibc/x86_64-linux/lib

[GNU_X86_32_LINUX_EABI_10_3_0]
# Expecting the user host is 64-bit GNU/Linux, we're replacing the system compiler
PREPROCESSOR = /opt/rbs/toolchain/gcc-10.3.0-nolibc/x86_64-linux/bin/x86_64-linux-gcc
COMPILER = /opt/rbs/toolchain/gcc-10.3.0-nolibc/x86_64-linux/bin/x86_64-linux-gcc
LINKER = /opt/rbs/toolchain/gcc-10.3.0-nolibc/x86_64-linux/bin/x86_64-linux-ld
Expand Down
Loading
Loading