Download Latest Version toolchain-x86_64-x86_64pc-linux-gnu-bin-1.0.1.tar.xz (73.9 MB)
Email in envelope

Get an email when there's a new version of ebye

Name Modified Size InfoDownloads / Week
Parent folder
older 2024-04-05
toolchain-x86_64-x86_64pc-linux-gnu-bin-1.5.0.1.tar.xz 2023-11-13 130.9 MB
README-x86_64.txt 2023-11-01 3.6 kB
toolchain-x86_64-x86_64pc-linux-gnu-bin-1.6.0.1.tar.xz 2023-10-08 166.7 MB
toolchain-x86_64-x86_64pc-linux-gnu-bin-1.5.1.1.tar.xz 2022-04-08 196.3 MB
Totals: 5 Items   493.9 MB 0
Development host 64bit info
===========================
    (issue.net): Ubuntu 20.04.6 LTS
  (uname -snrv): Linux VMXub2004 5.4.0-165-generic #182-Ubuntu SMP Mon Oct 2 19:43:28 UTC 2023
       (gcc -v): gcc version 9.4.0 (Ubuntu 9.4.0-1ubuntu1~20.04.2)
                 target=x86_64-linux-gnu, multilib-list=m32,m64,mx32

Cross-toolchain 1.6.x info
==========================
- x86_64 host toolchain for i686/x86_64 targets (multilib-list=m32,m64)
- statically linked, position indipendent code host tools
- toolchain wrapper with --autolink, --flags, --version commands available
- default sysroot:x86_64-x86_64pc-linux-gnu
- kernel headers 5.15.45
- binutils 2.40 (1.6.*)
           2.41 (1.6.*)
- glibc 2.37 (1.6.*)
        2.38 (1.6.*.1) + CVE-2023-4527/4806/4911 patches
        2.31 (1.6.0.2) + Debian patches
- gcc 12.3.0 
- gccgo 1.18 (only 1.6.1.x)
- Please build C++ sources with "-Werror=return-type" option!
  (see https://gcc.gnu.org/bugzilla/show_bug.cgi?id=43943 for details)
- See also: https://www.freshports.org/devel


Installation procedure:
=======================
- Expand into an existing folder (tar xJf ...)
- Add <folder>/bin to $PATH
- cd <folder>/bin
- ./toolchain-wrapper.sh --autolink ${MYTARGETNAME}
- Eventually set c++ standard, e.g.:
	sed --in-place=.bak -e "/^DSTCPPFL/s:=.*:=\"-std=c++1z\":" ./toolchain-wrapper.sh
- Use cross-tool with canonical name x86_64-${MYTARGETNAME}-*, e.g.:
	x86_64-inteltgt-linux-gnu-gcc ...
	x86_64-inteltgt-linux-gnu-g++ ...


Toolchain wrapper environment variables:
========================================
 _WRAPARCH                 : can be set to force $_EOSTCH_ARCH1 
                           :   or bypass both (wrapper won't add any flag!)
 SYSROOT                   : if defined, overwrite default (toolchain) sysroot path
 _EOSWRP_SECURITY_LEVEL    : set to 0..4, where '0' is "none" (default)
 _EOSWRP_ADD_SYSROOT_FLAGS : set to "no"  to stop adding sysroot-related opts
 _EOSWRP_ADD_SYSROOT_INCL  : set to "yes" to add sysroot include options, too
 _EOSWRP_ADD_RPATH_FLAGS   : set to "no" to stop adding "rpath" options
 _EOSWRP_ADD_USEROPTS_FIRST: set to "yes" to add user options before others


Warnings and known issues:
==========================
NONE (a.t.m)


Pending CVE and other known problems
====================================
   https://www.cvedetails.com/vulnerability-list/vendor_id-72/product_id-6825/GNU-Binutils.html
   https://www.cvedetails.com/vulnerability-list/vendor_id-72/product_id-960/GNU-GCC.html
   https://www.cvedetails.com/vulnerability-list/vendor_id-72/product_id-767/GNU-Glibc.html




Cross-toolchain 1.5.1.x info
============================
- x86_64 host toolchain for i686/x86_64 targets (multilib-list=m32,m64)
- statically linked, position indipendent code host tools
- toolchain wrapper with --autolink command available
- default sysroot: x86_64-x86_64pc-linux-gnu
- kernel headers 5.15.x
- binutils 2.37
- glibc 2.35
- gcc 10.3.0
- 1.5.1.1: same components as 1.5.1, gcc configured with additional options
            "--enable-default-pie --enable-default-ssp"

Cross-toolchain 1.4.x info
==========================
- x86_64 host toolchain for i686/x86_64 targets (multilib-list=m32,m64)
- statically linked, position indipendent code host tools
- toolchain wrapper with --autolink command available
- default sysroot: x86_64-x86_64pc-linux-gnu
- kernel headers 4.14.x
- binutils 2.34 (1.4.0-1.4.4), 2.35.1 (1.4.5-1.4.8) or 2.36.1 (1.4.11)
- glibc 2.31 (1.4.0-1.4.4), 2.32 (1.4.5-1.4.8) or 2.33 (1.4.11)
- gcc 9.3.0 (1.4.0-1.4.8) or 10.3.0 (1.4.11)

Source: README-x86_64.txt, updated 2023-11-01