[{"id":3684899,"web_url":"http://patchwork.ozlabs.org/comment/3684899/","msgid":"<21ad7442-5688-47cc-9ce2-9036d00315a0@grenoble.cnrs.fr>","list_archive_url":null,"date":"2026-04-30T18:45:58","subject":"Re: [Buildroot] [PATCH 14/14] package/gcc: drop support for GCC 13.x","submitter":{"id":81297,"url":"http://patchwork.ozlabs.org/api/people/81297/","name":"Edgar Bonet","email":"bonet@grenoble.cnrs.fr"},"content":"Hello everybody!\n\nOn 2026-04-30, Bernd Kuhls wrote:\n> Now that we have added support for GCC 16.x, made GCC 15.x the\n> default, let's drop support for GCC 13.x.\n> \n> Signed-off-by: Bernd Kuhls <bernd@kuhls.net>\n> ---\n>  .checkpackageignore                           |   1 -\n>  Config.in.legacy                              |   7 +\n>  ...le-split-stack-for-non-thread-builds.patch |  26 ----\n>  ...ISC-V-fix-build-issue-with-gcc-4.9.x.patch |  48 ------\n>  ...emove-crypt-and-crypt_r-interceptors.patch | 146 ------------------\n>  ...bsanitizer-Fix-build-with-glibc-2.42.patch |  81 ----------\n>  package/gcc/Config.in.host                    |  13 --\n>  package/gcc/gcc.hash                          |   2 -\n>  8 files changed, 7 insertions(+), 317 deletions(-)\n>  delete mode 100644 package/gcc/13.4.0/0001-disable-split-stack-for-non-thread-builds.patch\n>  delete mode 100644 package/gcc/13.4.0/0002-RISC-V-fix-build-issue-with-gcc-4.9.x.patch\n>  delete mode 100644 package/gcc/13.4.0/0003-Remove-crypt-and-crypt_r-interceptors.patch\n>  delete mode 100644 package/gcc/13.4.0/0004-libsanitizer-Fix-build-with-glibc-2.42.patch\n> \n> diff --git a/.checkpackageignore b/.checkpackageignore\n> index 6b96ff044a..4fc20d2904 100644\n> --- a/.checkpackageignore\n> +++ b/.checkpackageignore\n> @@ -357,7 +357,6 @@ package/ftop/0001-overflow.patch lib_patch.Upstream\n>  package/fwts/0001-build-do-not-use-Werror.patch lib_patch.Upstream\n>  package/fxdiv/0001-CMake-don-t-enable-CXX-unless-building-tests-benchma.patch lib_patch.Upstream\n>  package/fxload/0001-fix-static-build.patch lib_patch.Upstream\n> -package/gcc/13.4.0/0001-disable-split-stack-for-non-thread-builds.patch lib_patch.Upstream\n>  package/gcc/14.3.0/0001-disable-split-stack-for-non-thread-builds.patch lib_patch.Upstream\n>  package/gcc/15.2.0/0001-disable-split-stack-for-non-thread-builds.patch lib_patch.Upstream\n>  package/gcc/16.1.0/0001-disable-split-stack-for-non-thread-builds.patch lib_patch.Upstream\n> diff --git a/Config.in.legacy b/Config.in.legacy\n> index ead9ceaa08..2704ca288c 100644\n> --- a/Config.in.legacy\n> +++ b/Config.in.legacy\n> @@ -146,6 +146,13 @@ endif\n>  \n>  comment \"Legacy options removed in 2026.05\"\n>  \n> +config BR2_GCC_VERSION_13_X\n> +\tbool \"gcc 13.x support removed\"\n> +\tselect BR2_LEGACY\n> +\thelp\n> +\t  Support for building a toolchain based on GCC 13.x has been\n> +\t  removed, chose a newer GCC version instead.\n> +\n>  config BR2_KERNEL_HEADERS_6_19\n>  \tbool \"kernel headers version 6.19.x are no longer supported\"\n>  \tselect BR2_LEGACY\n> diff --git a/package/gcc/13.4.0/0001-disable-split-stack-for-non-thread-builds.patch b/package/gcc/13.4.0/0001-disable-split-stack-for-non-thread-builds.patch\n> deleted file mode 100644\n> index e801085dad..0000000000\n> --- a/package/gcc/13.4.0/0001-disable-split-stack-for-non-thread-builds.patch\n> +++ /dev/null\n> @@ -1,26 +0,0 @@\n> -From 4f67134e0b1404fef4ea72342be8fab4c37ca8c8 Mon Sep 17 00:00:00 2001\n> -From: Waldemar Brodkorb <wbx@openadk.org>\n> -Date: Mon, 25 Jul 2022 00:29:55 +0200\n> -Subject: [PATCH] disable split-stack for non-thread builds\n> -\n> -Signed-off-by: Waldemar Brodkorb <wbx@openadk.org>\n> -[Romain: convert to git format]\n> -Signed-off-by: Romain Naour <romain.naour@smile.fr>\n> ----\n> - libgcc/config/t-stack | 2 ++\n> - 1 file changed, 2 insertions(+)\n> -\n> -diff --git a/libgcc/config/t-stack b/libgcc/config/t-stack\n> -index cc0366b4cd8..f3f97e86d60 100644\n> ---- a/libgcc/config/t-stack\n> -+++ b/libgcc/config/t-stack\n> -@@ -1,4 +1,6 @@\n> - # Makefile fragment to provide generic support for -fsplit-stack.\n> - # This should be used in config.host for any host which supports\n> - # -fsplit-stack.\n> -+ifeq ($(enable_threads),yes)\n> - LIB2ADD_ST += $(srcdir)/generic-morestack.c $(srcdir)/generic-morestack-thread.c\n> -+endif\n> --- \n> -2.34.3\n> -\n> diff --git a/package/gcc/13.4.0/0002-RISC-V-fix-build-issue-with-gcc-4.9.x.patch b/package/gcc/13.4.0/0002-RISC-V-fix-build-issue-with-gcc-4.9.x.patch\n> deleted file mode 100644\n> index 4368f08404..0000000000\n> --- a/package/gcc/13.4.0/0002-RISC-V-fix-build-issue-with-gcc-4.9.x.patch\n> +++ /dev/null\n> @@ -1,48 +0,0 @@\n> -From e5253b777eefef7d66d3bd1c641de6d133d3573d Mon Sep 17 00:00:00 2001\n> -From: Romain Naour <romain.naour@gmail.com>\n> -Date: Tue, 2 May 2023 14:21:55 +0200\n> -Subject: [PATCH] RISC-V: fix build issue with gcc 4.9.x\n> -\n> -GCC should still build with GCC 4.8.3 or newer [1]\n> -using C++03 by default. But a recent change in\n> -RISC-V port introduced a C++11 feature \"std::log2\" [2].\n> -\n> -Use log2 from the C header, without the namespace [3].\n> -\n> -[1] https://gcc.gnu.org/install/prerequisites.html\n> -[2] https://gcc.gnu.org/git/?p=gcc.git;a=patch;h=7caa1ae5e451e780fbc4746a54e3f19d4f4304dc\n> -[3] https://stackoverflow.com/questions/26733413/error-log2-is-not-a-member-of-std\n> -\n> -Fixes:\n> -https://gitlab.com/buildroot.org/toolchains-builder/-/jobs/4202276589\n> -\n> -gcc/ChangeLog:\n> -\t* config/riscv/genrvv-type-indexer.cc: Use log2 from the C header, without\n> -\tthe namespace.\n> -\n> -Signed-off-by: Romain Naour <romain.naour@gmail.com>\n> -Upstream: https://gcc.gnu.org/git/gitweb.cgi?p=gcc.git;h=87c347c2897537a6aa391efbfc5ed00c625434fe\n> -Signed-off-by: Romain Naour <romain.naour@gmail.com>\n> ----\n> - gcc/config/riscv/genrvv-type-indexer.cc | 4 ++--\n> - 1 file changed, 2 insertions(+), 2 deletions(-)\n> -\n> -diff --git a/gcc/config/riscv/genrvv-type-indexer.cc b/gcc/config/riscv/genrvv-type-indexer.cc\n> -index e677b55290c..eebe382d1c3 100644\n> ---- a/gcc/config/riscv/genrvv-type-indexer.cc\n> -+++ b/gcc/config/riscv/genrvv-type-indexer.cc\n> -@@ -115,9 +115,9 @@ same_ratio_eew_type (unsigned sew, int lmul_log2, unsigned eew, bool unsigned_p,\n> -   if (sew == eew)\n> -     elmul_log2 = lmul_log2;\n> -   else if (sew > eew)\n> --    elmul_log2 = lmul_log2 - std::log2 (sew / eew);\n> -+    elmul_log2 = lmul_log2 - log2 (sew / eew);\n> -   else /* sew < eew */\n> --    elmul_log2 = lmul_log2 + std::log2 (eew / sew);\n> -+    elmul_log2 = lmul_log2 + log2 (eew / sew);\n> - \n> -   if (float_p)\n> -     return floattype (eew, elmul_log2);\n> --- \n> -2.34.3\n> -\n> diff --git a/package/gcc/13.4.0/0003-Remove-crypt-and-crypt_r-interceptors.patch b/package/gcc/13.4.0/0003-Remove-crypt-and-crypt_r-interceptors.patch\n> deleted file mode 100644\n> index 98bfed5949..0000000000\n> --- a/package/gcc/13.4.0/0003-Remove-crypt-and-crypt_r-interceptors.patch\n> +++ /dev/null\n> @@ -1,146 +0,0 @@\n> -From 3521d93c552a11640a959ee61d551c225981c448 Mon Sep 17 00:00:00 2001\n> -From: Fangrui Song <i@maskray.me>\n> -Date: Fri, 28 Apr 2023 09:59:17 -0700\n> -Subject: [PATCH] Remove crypt and crypt_r interceptors\n> -\n> -From Florian Weimer's D144073\n> -\n> -> On GNU/Linux (glibc), the crypt and crypt_r functions are not part of the main shared object (libc.so.6), but libcrypt (with multiple possible sonames). The sanitizer libraries do not depend on libcrypt, so it can happen that during sanitizer library initialization, no real implementation will be found because the crypt, crypt_r functions are not present in the process image (yet). If its interceptors are called nevertheless, this results in a call through a null pointer when the sanitizer library attempts to forward the call to the real implementation.\n> ->\n> -> Many distributions have already switched to libxcrypt, a library that is separate from glibc and that can be build with sanitizers directly (avoiding the need for interceptors). This patch disables building the interceptor for glibc targets.\n> -\n> -Let's remove crypt and crypt_r interceptors (D68431) to fix issues with\n> -newer glibc.\n> -\n> -For older glibc, msan will not know that an uninstrumented crypt_r call\n> -initializes `data`, so there is a risk for false positives. However, with some\n> -codebase survey, I think crypt_r uses are very few and the call sites typically\n> -have a `memset(&data, 0, sizeof(data));` anyway.\n> -\n> -Fix https://github.com/google/sanitizers/issues/1365\n> -Related: https://bugzilla.redhat.com/show_bug.cgi?id=2169432\n> -\n> -Reviewed By: #sanitizers, fweimer, thesamesam, vitalybuka\n> -\n> -Differential Revision: https://reviews.llvm.org/D149403\n> -\n> -[Thomas: taken from Crosstool-NG]\n> -Upstream: (llvm) https://github.com/llvm/llvm-project/commit/d7bead833631486e337e541e692d9b4a1ca14edd\n> -Upstream: (gcc)  https://github.com/gcc-mirror/gcc/commit/d96e14ceb9475f9bccbbc0325d5b11419fad9246\n> -Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>\n> ----\n> - .../sanitizer_common_interceptors.inc         | 37 -------------------\n> - .../sanitizer_platform_interceptors.h         |  2 -\n> - .../sanitizer_platform_limits_posix.cpp       |  8 ----\n> - .../sanitizer_platform_limits_posix.h         |  1 -\n> - 4 files changed, 48 deletions(-)\n> -\n> -diff --git a/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc b/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc\n> -index ba4b80081f0..662c4199742 100644\n> ---- a/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc\n> -+++ b/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc\n> -@@ -10187,41 +10187,6 @@ INTERCEPTOR(SSIZE_T, getrandom, void *buf, SIZE_T buflen, unsigned int flags) {\n> - #define INIT_GETRANDOM\n> - #endif\n> - \n> --#if SANITIZER_INTERCEPT_CRYPT\n> --INTERCEPTOR(char *, crypt, char *key, char *salt) {\n> --  void *ctx;\n> --  COMMON_INTERCEPTOR_ENTER(ctx, crypt, key, salt);\n> --  COMMON_INTERCEPTOR_READ_RANGE(ctx, key, internal_strlen(key) + 1);\n> --  COMMON_INTERCEPTOR_READ_RANGE(ctx, salt, internal_strlen(salt) + 1);\n> --  char *res = REAL(crypt)(key, salt);\n> --  if (res != nullptr)\n> --    COMMON_INTERCEPTOR_INITIALIZE_RANGE(res, internal_strlen(res) + 1);\n> --  return res;\n> --}\n> --#define INIT_CRYPT COMMON_INTERCEPT_FUNCTION(crypt);\n> --#else\n> --#define INIT_CRYPT\n> --#endif\n> --\n> --#if SANITIZER_INTERCEPT_CRYPT_R\n> --INTERCEPTOR(char *, crypt_r, char *key, char *salt, void *data) {\n> --  void *ctx;\n> --  COMMON_INTERCEPTOR_ENTER(ctx, crypt_r, key, salt, data);\n> --  COMMON_INTERCEPTOR_READ_RANGE(ctx, key, internal_strlen(key) + 1);\n> --  COMMON_INTERCEPTOR_READ_RANGE(ctx, salt, internal_strlen(salt) + 1);\n> --  char *res = REAL(crypt_r)(key, salt, data);\n> --  if (res != nullptr) {\n> --    COMMON_INTERCEPTOR_WRITE_RANGE(ctx, data,\n> --                                   __sanitizer::struct_crypt_data_sz);\n> --    COMMON_INTERCEPTOR_INITIALIZE_RANGE(res, internal_strlen(res) + 1);\n> --  }\n> --  return res;\n> --}\n> --#define INIT_CRYPT_R COMMON_INTERCEPT_FUNCTION(crypt_r);\n> --#else\n> --#define INIT_CRYPT_R\n> --#endif\n> --\n> - #if SANITIZER_INTERCEPT_GETENTROPY\n> - INTERCEPTOR(int, getentropy, void *buf, SIZE_T buflen) {\n> -   void *ctx;\n> -@@ -10772,8 +10737,6 @@ static void InitializeCommonInterceptors() {\n> -   INIT_GETUSERSHELL;\n> -   INIT_SL_INIT;\n> -   INIT_GETRANDOM;\n> --  INIT_CRYPT;\n> --  INIT_CRYPT_R;\n> -   INIT_GETENTROPY;\n> -   INIT_QSORT;\n> -   INIT_QSORT_R;\n> -diff --git a/libsanitizer/sanitizer_common/sanitizer_platform_interceptors.h b/libsanitizer/sanitizer_common/sanitizer_platform_interceptors.h\n> -index 8307b1ec28b..d50166ee6ce 100644\n> ---- a/libsanitizer/sanitizer_common/sanitizer_platform_interceptors.h\n> -+++ b/libsanitizer/sanitizer_common/sanitizer_platform_interceptors.h\n> -@@ -571,8 +571,6 @@\n> - #define SANITIZER_INTERCEPT_FDEVNAME SI_FREEBSD\n> - #define SANITIZER_INTERCEPT_GETUSERSHELL (SI_POSIX && !SI_ANDROID)\n> - #define SANITIZER_INTERCEPT_SL_INIT (SI_FREEBSD || SI_NETBSD)\n> --#define SANITIZER_INTERCEPT_CRYPT (SI_POSIX && !SI_ANDROID)\n> --#define SANITIZER_INTERCEPT_CRYPT_R (SI_LINUX && !SI_ANDROID)\n> - \n> - #define SANITIZER_INTERCEPT_GETRANDOM \\\n> -   ((SI_LINUX && __GLIBC_PREREQ(2, 25)) || SI_FREEBSD)\n> -diff --git a/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.cpp b/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.cpp\n> -index c85cf1626a7..bcbd143d19d 100644\n> ---- a/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.cpp\n> -+++ b/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.cpp\n> -@@ -176,10 +176,6 @@ typedef struct user_fpregs elf_fpregset_t;\n> - #  include \"sanitizer_platform_interceptors.h\"\n> - #  include \"sanitizer_platform_limits_posix.h\"\n> - \n> --#if SANITIZER_INTERCEPT_CRYPT_R\n> --#include <crypt.h>\n> --#endif\n> --\n> - namespace __sanitizer {\n> -   unsigned struct_utsname_sz = sizeof(struct utsname);\n> -   unsigned struct_stat_sz = sizeof(struct stat);\n> -@@ -283,10 +279,6 @@ namespace __sanitizer {\n> -   unsigned struct_statvfs64_sz = sizeof(struct statvfs64);\n> - #endif // SANITIZER_LINUX && !SANITIZER_ANDROID\n> - \n> --#if SANITIZER_INTERCEPT_CRYPT_R\n> --  unsigned struct_crypt_data_sz = sizeof(struct crypt_data);\n> --#endif\n> --\n> - #if SANITIZER_LINUX && !SANITIZER_ANDROID\n> -   unsigned struct_timex_sz = sizeof(struct timex);\n> -   unsigned struct_msqid_ds_sz = sizeof(struct msqid_ds);\n> -diff --git a/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.h b/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.h\n> -index 44dd3d9e22d..29ebb304a9b 100644\n> ---- a/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.h\n> -+++ b/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.h\n> -@@ -319,7 +319,6 @@ extern unsigned struct_msqid_ds_sz;\n> - extern unsigned struct_mq_attr_sz;\n> - extern unsigned struct_timex_sz;\n> - extern unsigned struct_statvfs_sz;\n> --extern unsigned struct_crypt_data_sz;\n> - #endif  // SANITIZER_LINUX && !SANITIZER_ANDROID\n> - \n> - struct __sanitizer_iovec {\n> --- \n> -2.43.0\n> -\n> diff --git a/package/gcc/13.4.0/0004-libsanitizer-Fix-build-with-glibc-2.42.patch b/package/gcc/13.4.0/0004-libsanitizer-Fix-build-with-glibc-2.42.patch\n> deleted file mode 100644\n> index 13f7f469c4..0000000000\n> --- a/package/gcc/13.4.0/0004-libsanitizer-Fix-build-with-glibc-2.42.patch\n> +++ /dev/null\n> @@ -1,81 +0,0 @@\n> -From d32ece49d32b00448d967e7dbc6900fb25cbc775 Mon Sep 17 00:00:00 2001\n> -From: Florian Weimer <fweimer@redhat.com>\n> -Date: Fri, 2 May 2025 17:41:43 +0200\n> -Subject: [PATCH] libsanitizer: Fix build with glibc 2.42\n> -\n> -The termio structure will be removed from glibc 2.42.  It has\n> -been deprecated since the late 80s/early 90s.\n> -\n> -Cherry-picked from LLVM commit 59978b21ad9c65276ee8e14f26759691b8a65763\n> -(\"[sanitizer_common] Remove interceptors for deprecated struct termio\n> -(#137403)\").\n> -\n> -Co-Authored-By: Tom Stellard <tstellar@redhat.com>\n> -\n> -libsanitizer/\n> -\n> -\t* sanitizer_common/sanitizer_common_interceptors_ioctl.inc: Cherry\n> -\tpicked from LLVM commit 59978b21ad9c65276ee8e14f26759691b8a65763.\n> -\t* sanitizer_common/sanitizer_platform_limits_posix.cpp: Likewise.\n> -\t* sanitizer_common/sanitizer_platform_limits_posix.h: Likewise.\n> -\n> -Upstream: 1789c57dc97ea2f9819ef89e28bf17208b6208e7 (gcc master branch)\n> -Upstream: d32ece49d32b00448d967e7dbc6900fb25cbc775 (gcc 15.x branch)\n> -Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>\n> ----\n> - .../sanitizer_common_interceptors_ioctl.inc               | 8 --------\n> - .../sanitizer_common/sanitizer_platform_limits_posix.cpp  | 3 ---\n> - .../sanitizer_common/sanitizer_platform_limits_posix.h    | 1 -\n> - 3 files changed, 12 deletions(-)\n> -\n> -diff --git a/libsanitizer/sanitizer_common/sanitizer_common_interceptors_ioctl.inc b/libsanitizer/sanitizer_common/sanitizer_common_interceptors_ioctl.inc\n> -index 49ec4097c90..dda11daa77f 100644\n> ---- a/libsanitizer/sanitizer_common/sanitizer_common_interceptors_ioctl.inc\n> -+++ b/libsanitizer/sanitizer_common/sanitizer_common_interceptors_ioctl.inc\n> -@@ -338,17 +338,9 @@ static void ioctl_table_fill() {\n> -   _(SOUND_PCM_WRITE_CHANNELS, WRITE, sizeof(int));\n> -   _(SOUND_PCM_WRITE_FILTER, WRITE, sizeof(int));\n> -   _(TCFLSH, NONE, 0);\n> --#if SANITIZER_GLIBC\n> --  _(TCGETA, WRITE, struct_termio_sz);\n> --#endif\n> -   _(TCGETS, WRITE, struct_termios_sz);\n> -   _(TCSBRK, NONE, 0);\n> -   _(TCSBRKP, NONE, 0);\n> --#if SANITIZER_GLIBC\n> --  _(TCSETA, READ, struct_termio_sz);\n> --  _(TCSETAF, READ, struct_termio_sz);\n> --  _(TCSETAW, READ, struct_termio_sz);\n> --#endif\n> -   _(TCSETS, READ, struct_termios_sz);\n> -   _(TCSETSF, READ, struct_termios_sz);\n> -   _(TCSETSW, READ, struct_termios_sz);\n> -diff --git a/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.cpp b/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.cpp\n> -index c87d5ef42c9..7bbc6f2edac 100644\n> ---- a/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.cpp\n> -+++ b/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.cpp\n> -@@ -485,9 +485,6 @@ unsigned struct_ElfW_Phdr_sz = sizeof(Elf_Phdr);\n> -   unsigned struct_input_id_sz = sizeof(struct input_id);\n> -   unsigned struct_mtpos_sz = sizeof(struct mtpos);\n> -   unsigned struct_rtentry_sz = sizeof(struct rtentry);\n> --#if SANITIZER_GLIBC || SANITIZER_ANDROID\n> --  unsigned struct_termio_sz = sizeof(struct termio);\n> --#endif\n> -   unsigned struct_vt_consize_sz = sizeof(struct vt_consize);\n> -   unsigned struct_vt_sizes_sz = sizeof(struct vt_sizes);\n> -   unsigned struct_vt_stat_sz = sizeof(struct vt_stat);\n> -diff --git a/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.h b/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.h\n> -index c07f7cd0b0d..a80df656826 100644\n> ---- a/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.h\n> -+++ b/libsanitizer/sanitizer_common/sanitizer_platform_limits_posix.h\n> -@@ -1029,7 +1029,6 @@ extern unsigned struct_hd_geometry_sz;\n> - extern unsigned struct_input_absinfo_sz;\n> - extern unsigned struct_input_id_sz;\n> - extern unsigned struct_mtpos_sz;\n> --extern unsigned struct_termio_sz;\n> - extern unsigned struct_vt_consize_sz;\n> - extern unsigned struct_vt_sizes_sz;\n> - extern unsigned struct_vt_stat_sz;\n> --- \n> -2.50.1\n> -\n> diff --git a/package/gcc/Config.in.host b/package/gcc/Config.in.host\n> index e218b13bd2..cbad2aa12a 100644\n> --- a/package/gcc/Config.in.host\n> +++ b/package/gcc/Config.in.host\n> @@ -22,14 +22,6 @@ config BR2_GCC_VERSION_POWERPC_SPE\n>  \tdepends on BR2_POWERPC_CPU_HAS_SPE\n>  \tselect BR2_TOOLCHAIN_GCC_AT_LEAST_8\n>  \n> -config BR2_GCC_VERSION_13_X\n> -\tbool \"gcc 13.x\"\n> -\tdepends on !BR2_ARCH_NEEDS_GCC_AT_LEAST_14\n> -\t# powerpc spe support has been deprecated since gcc 8.x.\n> -\t# https://gcc.gnu.org/ml/gcc/2018-04/msg00102.html\n> -\tdepends on !BR2_POWERPC_CPU_HAS_SPE\n> -\tselect BR2_TOOLCHAIN_GCC_AT_LEAST_13\n> -\n>  config BR2_GCC_VERSION_14_X\n>  \tbool \"gcc 14.x\"\n>  \tdepends on !BR2_ARCH_NEEDS_GCC_AT_LEAST_15\n> @@ -76,8 +68,6 @@ config BR2_GCC_SUPPORTS_DLANG\n>  config BR2_GCC_VERSION\n>  \tstring\n>  \tdefault \"8.4.0\"     if BR2_GCC_VERSION_POWERPC_SPE\n> -\tdefault \"13.4.0\"    if BR2_GCC_VERSION_13_X\n> -\tdefault \"14.3.0\"    if BR2_GCC_VERSION_14_X\n\nIsn't the removal of this line going to interfere with GCC 14?\n\nRegards,\n\nEdgar.\n\n>  \tdefault \"15.2.0\"    if BR2_GCC_VERSION_15_X\n>  \tdefault \"16.1.0\"    if BR2_GCC_VERSION_16_X\n>  \tdefault \"arc-2024.12-release\" if BR2_GCC_VERSION_ARC\n> @@ -107,9 +97,6 @@ config BR2_TOOLCHAIN_BUILDROOT_FORTRAN\n>  \t# on architecture building libquadmath, wchar is required\n>  \tdepends on !BR2_TOOLCHAIN_HAS_LIBQUADMATH || \\\n>  \t\t(BR2_TOOLCHAIN_HAS_LIBQUADMATH && BR2_USE_WCHAR)\n> -\t# internal compiler error: in gen_reg_rtx, at emit-rtl.cc:1167\n> -\t# fixed in gcc 14.x, so disable gcc 13.x\n> -\tdepends on !(BR2_microblaze && BR2_GCC_VERSION_13_X)\n>  \tselect BR2_TOOLCHAIN_HAS_FORTRAN\n>  \thelp\n>  \t  Enable this option if you want your toolchain to support the\n> diff --git a/package/gcc/gcc.hash b/package/gcc/gcc.hash\n> index da6aa6e879..0b17a809c8 100644\n> --- a/package/gcc/gcc.hash\n> +++ b/package/gcc/gcc.hash\n> @@ -1,7 +1,5 @@\n>  # From https://gcc.gnu.org/pub/gcc/releases/gcc-8.4.0/sha512.sum\n>  sha512  6de904f552a02de33b11ef52312bb664396efd7e1ce3bbe37bfad5ef617f133095b3767b4804bc7fe78df335cb53bc83f1ac055baed40979ce4c2c3e46b70280  gcc-8.4.0.tar.xz\n> -# From https://gcc.gnu.org/pub/gcc/releases/gcc-13.4.0/sha512.sum\n> -sha512  9b4b83ecf51ef355b868608b8d257b2fa435c06d2719cb86657a7c2c2a0828ff4ce04e9bac1055bbcad8ed5b4da524cafaef654785e23a50233d95d89201e35f  gcc-13.4.0.tar.xz\n>  # From https://gcc.gnu.org/pub/gcc/releases/gcc-14.3.0/sha512.sum\n>  sha512  cb4e3259640721bbd275c723fe4df53d12f9b1673afb3db274c22c6aa457865dccf2d6ea20b4fd4c591f6152e6d4b87516c402015900f06ce9d43af66d3b7a93  gcc-14.3.0.tar.xz\n>  # From https://gcc.gnu.org/pub/gcc/releases/gcc-15.2.0/sha512.sum","headers":{"Return-Path":"<buildroot-bounces@buildroot.org>","X-Original-To":["incoming-buildroot@patchwork.ozlabs.org","buildroot@buildroot.org"],"Delivered-To":["patchwork-incoming-buildroot@legolas.ozlabs.org","buildroot@buildroot.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=YexgT97Y;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=2605:bc80:3010::136; helo=smtp3.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)"],"Received":["from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g636C0w8kz1yGq\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Fri, 01 May 2026 04:46:11 +1000 (AEST)","from localhost (localhost [127.0.0.1])\n\tby smtp3.osuosl.org (Postfix) with ESMTP id B9CA76F4C6;\n\tThu, 30 Apr 2026 18:46:09 +0000 (UTC)","from smtp3.osuosl.org ([127.0.0.1])\n by localhost (smtp3.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id EaBNpoBOV4sP; Thu, 30 Apr 2026 18:46:08 +0000 (UTC)","from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp3.osuosl.org (Postfix) with ESMTP id 1A6ED6F4C9;\n\tThu, 30 Apr 2026 18:46:08 +0000 (UTC)","from smtp2.osuosl.org (smtp2.osuosl.org [IPv6:2605:bc80:3010::133])\n by lists1.osuosl.org (Postfix) with ESMTP id 08D29127\n for <buildroot@buildroot.org>; Thu, 30 Apr 2026 18:46:06 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp2.osuosl.org (Postfix) with ESMTP id 06B9240C27\n for <buildroot@buildroot.org>; Thu, 30 Apr 2026 18:46:06 +0000 (UTC)","from smtp2.osuosl.org ([127.0.0.1])\n by localhost (smtp2.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id wDcobEgen9Cr for <buildroot@buildroot.org>;\n Thu, 30 Apr 2026 18:46:04 +0000 (UTC)","from mailgw-out1.grenoble.cnrs.fr (mailgw-out1.grenoble.cnrs.fr\n [147.173.1.68])\n by smtp2.osuosl.org (Postfix) with ESMTPS id A5A2340C22\n for <buildroot@buildroot.org>; Thu, 30 Apr 2026 18:46:01 +0000 (UTC)","from [IPV6:2a01:e0a:12:eba0:845d:d7e3:cc59:5c9f] (unknown\n [IPv6:2a01:e0a:12:eba0:845d:d7e3:cc59:5c9f])\n (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by mailgw-out1.grenoble.cnrs.fr (Postfix) with ESMTPSA id A4080C0148;\n Thu, 30 Apr 2026 20:45:58 +0200 (CEST)"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp3.osuosl.org 1A6ED6F4C9","OpenDKIM Filter v2.11.0 smtp2.osuosl.org A5A2340C22"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1777574768;\n\tbh=esjqK/X9ZmRf5yzNjW6pOm3tJH2y4O90Z/cs0E1es9M=;\n\th=Date:To:Cc:References:In-Reply-To:Subject:List-Id:\n\t List-Unsubscribe:List-Archive:List-Post:List-Help:List-Subscribe:\n\t From:Reply-To:From;\n\tb=YexgT97Y+awyuJKI1jOmngLiQmWF4V+NgU8mIKvrZgybg2zmdZROrdmRzCdWqGB+2\n\t f4+tzML86meXO7eWwbQflgEgnwSHUlQA5O9+05jVWMVb2WRccIz3hl5lodKG66QWDb\n\t yENop6WNDR4CVzjoILA9YEpKSptLNmS5TWQXra2kOkyKf0MErM6BkWsp/4GsJayTKU\n\t 33nzLP3Fs/4NzQC9wGPW9KVTJGXKreKV4hrH6eXoQel7TtGaSgDP4uznoqWopEXW0d\n\t vJLGtW+ozRU57tjXFKwqFgOXAwX7Nl/mbalh+udWpVBneyDFRO9JgPN2QoKLOQqQZR\n\t ScFCxq66WwpEA==","Received-SPF":"Pass (mailfrom) identity=mailfrom; client-ip=147.173.1.68;\n helo=mailgw-out1.grenoble.cnrs.fr; envelope-from=bonet@grenoble.cnrs.fr;\n receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp2.osuosl.org A5A2340C22","Message-ID":"<21ad7442-5688-47cc-9ce2-9036d00315a0@grenoble.cnrs.fr>","Date":"Thu, 30 Apr 2026 20:45:58 +0200","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","To":"Bernd Kuhls <bernd@kuhls.net>, buildroot@buildroot.org","Cc":"Zoltan Gyarmati <mr.zoltan.gyarmati@gmail.com>,\n Giulio Benetti <giulio.benetti@benettiengineering.com>,\n Angelo Compagnucci <angelo.compagnucci@gmail.com>,\n Thomas Petazzoni <thomas.petazzoni@bootlin.com>,\n Romain Naour <romain.naour@gmail.com>,\n Olivier Schonken <olivier.schonken@gmail.com>","References":"<20260430162156.3456640-1-bernd@kuhls.net>\n <20260430162156.3456640-14-bernd@kuhls.net>","Content-Language":"en-US, fr","In-Reply-To":"<20260430162156.3456640-14-bernd@kuhls.net>","X-Mailman-Original-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=grenoble.cnrs.fr;\n s=202106-grenoble.cnrs.fr; t=1777574759;\n bh=DTxVq/KqFL6INmKi2MuH+0828Dkio62MdryaN5Q2VNM=;\n h=Date:Subject:To:Cc:References:From:In-Reply-To:From;\n b=PoLJcDfLl3nCAxgCmkLTpX7bRKlvuDearb9298mJUqzFbpcZiIZi9JsU5j9eB8JW+\n w9/v53KfE0T7aevkU/Xb2Y1sispYc4t27w32YxgxV2bHhcZEKMkYfFUHjgJRUb/BG6\n yz598wusMSBG+5sL25119lvZGFhXvuY60q5fL6aNfz1gCMDa22d8FBmg1TAgWYKfEO\n 3lwp7Wiq39oBHUOiGA1IvH5/0Tq5ivSNaS3jJL3bRYWrSZuNCLxruoofVxlelTbl3/\n X91iPusu8izicUbRjQaKYXBPO2urm/1RWqbY9cfc4ZCDXtdPwoL3oL8LOosTUhSk/O\n KRkioq8UFpf1w==","X-Mailman-Original-Authentication-Results":["smtp2.osuosl.org;\n dmarc=pass (p=reject dis=none)\n header.from=grenoble.cnrs.fr","smtp2.osuosl.org;\n dkim=pass (2048-bit key,\n unprotected) header.d=grenoble.cnrs.fr header.i=@grenoble.cnrs.fr\n header.a=rsa-sha256 header.s=202106-grenoble.cnrs.fr header.b=PoLJcDfL"],"Subject":"Re: [Buildroot] [PATCH 14/14] package/gcc: drop support for GCC 13.x","X-BeenThere":"buildroot@buildroot.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Discussion and development of buildroot <buildroot.buildroot.org>","List-Unsubscribe":"<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>","List-Archive":"<http://lists.buildroot.org/pipermail/buildroot/>","List-Post":"<mailto:buildroot@buildroot.org>","List-Help":"<mailto:buildroot-request@buildroot.org?subject=help>","List-Subscribe":"<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>","From":"Edgar Bonet via buildroot <buildroot@buildroot.org>","Reply-To":"Edgar Bonet <bonet@grenoble.cnrs.fr>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Errors-To":"buildroot-bounces@buildroot.org","Sender":"\"buildroot\" <buildroot-bounces@buildroot.org>"}}]