Name | Modified | Size | Downloads / Week |
---|---|---|---|
Parent folder | |||
older | 2024-04-05 | ||
toolchain-x86_64-x86_64pc-linux-gnu-bin-1.5.0.1.tar.xz | 2023-11-13 | 130.9 MB | |
README-x86_64.txt | 2023-11-01 | 3.6 kB | |
toolchain-x86_64-x86_64pc-linux-gnu-bin-1.6.0.1.tar.xz | 2023-10-08 | 166.7 MB | |
toolchain-x86_64-x86_64pc-linux-gnu-bin-1.5.1.1.tar.xz | 2022-04-08 | 196.3 MB | |
Totals: 5 Items | 493.9 MB | 0 |
Development host 64bit info =========================== (issue.net): Ubuntu 20.04.6 LTS (uname -snrv): Linux VMXub2004 5.4.0-165-generic #182-Ubuntu SMP Mon Oct 2 19:43:28 UTC 2023 (gcc -v): gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2) target=x86_64-linux-gnu, multilib-list=m32,m64,mx32 Cross-toolchain 1.6.x info ========================== - x86_64 host toolchain for i686/x86_64 targets (multilib-list=m32,m64) - statically linked, position indipendent code host tools - toolchain wrapper with --autolink, --flags, --version commands available - default sysroot:x86_64-x86_64pc-linux-gnu - kernel headers 5.15.45 - binutils 2.40 (1.6.*) 2.41 (1.6.*) - glibc 2.37 (1.6.*) 2.38 (1.6.*.1) + CVE-2023-4527/4806/4911 patches 2.31 (1.6.0.2) + Debian patches - gcc 12.3.0 - gccgo 1.18 (only 1.6.1.x) - Please build C++ sources with "-Werror=return-type" option! (see https://gcc.gnu.org/bugzilla/show_bug.cgi?id=43943 for details) - See also: https://www.freshports.org/devel Installation procedure: ======================= - Expand into an existing folder (tar xJf ...) - Add <folder>/bin to $PATH - cd <folder>/bin - ./toolchain-wrapper.sh --autolink ${MYTARGETNAME} - Eventually set c++ standard, e.g.: sed --in-place=.bak -e "/^DSTCPPFL/s:=.*:=\"-std=c++1z\":" ./toolchain-wrapper.sh - Use cross-tool with canonical name x86_64-${MYTARGETNAME}-*, e.g.: x86_64-inteltgt-linux-gnu-gcc ... x86_64-inteltgt-linux-gnu-g++ ... Toolchain wrapper environment variables: ======================================== _WRAPARCH : can be set to force $_EOSTCH_ARCH1 : or bypass both (wrapper won't add any flag!) SYSROOT : if defined, overwrite default (toolchain) sysroot path _EOSWRP_SECURITY_LEVEL : set to 0..4, where '0' is "none" (default) _EOSWRP_ADD_SYSROOT_FLAGS : set to "no" to stop adding sysroot-related opts _EOSWRP_ADD_SYSROOT_INCL : set to "yes" to add sysroot include options, too _EOSWRP_ADD_RPATH_FLAGS : set to "no" to stop adding "rpath" options _EOSWRP_ADD_USEROPTS_FIRST: set to "yes" to add user options before others Warnings and known issues: ========================== NONE (a.t.m) Pending CVE and other known problems ==================================== https://www.cvedetails.com/vulnerability-list/vendor_id-72/product_id-6825/GNU-Binutils.html https://www.cvedetails.com/vulnerability-list/vendor_id-72/product_id-960/GNU-GCC.html https://www.cvedetails.com/vulnerability-list/vendor_id-72/product_id-767/GNU-Glibc.html Cross-toolchain 1.5.1.x info ============================ - x86_64 host toolchain for i686/x86_64 targets (multilib-list=m32,m64) - statically linked, position indipendent code host tools - toolchain wrapper with --autolink command available - default sysroot: x86_64-x86_64pc-linux-gnu - kernel headers 5.15.x - binutils 2.37 - glibc 2.35 - gcc 10.3.0 - 1.5.1.1: same components as 1.5.1, gcc configured with additional options "--enable-default-pie --enable-default-ssp" Cross-toolchain 1.4.x info ========================== - x86_64 host toolchain for i686/x86_64 targets (multilib-list=m32,m64) - statically linked, position indipendent code host tools - toolchain wrapper with --autolink command available - default sysroot: x86_64-x86_64pc-linux-gnu - kernel headers 4.14.x - binutils 2.34 (1.4.0-1.4.4), 2.35.1 (1.4.5-1.4.8) or 2.36.1 (1.4.11) - glibc 2.31 (1.4.0-1.4.4), 2.32 (1.4.5-1.4.8) or 2.33 (1.4.11) - gcc 9.3.0 (1.4.0-1.4.8) or 10.3.0 (1.4.11)