当前位置:网站首页>Arm cross compiler naming rules
Arm cross compiler naming rules
2022-07-19 02:46:00 【chip1234】
ARM Cross compiler naming rules
Cross compiler naming generally follows “ processor - System -gcc” Such rules , Generally, you can know the function of cross compiler by name .
Naming rules for cross compilers :arch [-vendor] [-os] [-(gnu)eabi] [-gcc]
- arch - Architecture , Such as ARM,X86 etc.
- vendor - Tool chain provider , No, vendor when , use none replace
- os - Target operating system , No, os when , use none replace . At the same time, there is no vendor & os Use one none replace .
- eabi - Embedded application binary interface (Embedded Application binary Interface)
for example :
- arm-none-eabi-gcc, Indicates that the target processor is ARM, Do not run the operating system , Used to compile ARM Bare metal system of Architecture
- armcc Be similar to arm-none-eabi
- arm-none-uclinuxeabi-gcc / arm-uclinuxeabi-gcc, Indicates that the target processor is ARM, be used for uclinux System
- arm-none-symbianelf-gcc, Indicates that the target processor is ARM, be used for symbian System
- arm-none-linux-gnueabi-gcc, Indicates that the target processor is ARM, be used for Linux operating system ;
- mips-linux-gnu-gcc, Indicates that the target processor is MIPS, be used for Linux operating system ;
- arm-eabi-gcc, Android ARM compiler
Conduct ARM Linux Development , Usually choose arm-linux-gcc Cross compiler .
边栏推荐
- ctfhub--ssrf
- The jstat command checks the GC status of the JVM
- 让我们了解awk~
- Getting to know Alibaba cloud environment construction for the first time: unable to connect remotely, and having been in the pit: the server Ping fails, FTP is built, the server builds the database,
- Zabbix6.0监控vCenter7.0
- 登录功能的测试点大全
- 安装.NET提示“无法建立到信任根颁发机构的证书链”(方法简单有下载地址)
- Sword finger offer 53 - I. find the number I in the sorted array
- Longest ascending subsequence - Optimization
- 【瑞吉外卖⑩】Linux 粗略学习 & Redis 粗略学习
猜你喜欢
regular expression
Shell programming specifications and variables
Getting to know Alibaba cloud environment construction for the first time: unable to connect remotely, and having been in the pit: the server Ping fails, FTP is built, the server builds the database,
Use of sqlmap
Full link voltage measurement
PXE automated installation
Reprint: SQL injection common bypass
After unity imports the FBX model, the rotation and position of the object will change automatically at runtime
全链路压测
How to use nmon
随机推荐
WINRAR命令拷贝指定文件夹为压缩文件,调用计划任务进行备份。
Understand HTTP cache in 30 minutes
How to do a good job of test case review
Response assertion of JMeter interface test
Convert string to integer
[Ruiji takeout ⑩] rough learning of Linux & rough learning of redis
Dirty reading, unreal reading, non repeatable reading
DNS domain name resolution
For solopi app performance test
How to add software shortcuts to the right mouse button list
Firewalld 防火墙
Leetcode buckle classic topic - 82 Maximum rectangle in column chart
MySQL差删改查用户登录修改密码
How to use nmon
数组、冒泡的认识
通过Xshell7使用rz,sz命令上传下载文件
Understanding of array and bubbling
让我们了解awk~
Reprint: SQL injection common bypass
正则表达式