]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/log
thirdparty/openembedded/openembedded-core.git
5 weeks agooe-selftest: devtool: add ide-sdk test for kernel modules
Adrian Freihofer [Mon, 23 Feb 2026 21:06:40 +0000 (22:06 +0100)] 
oe-selftest: devtool: add ide-sdk test for kernel modules

Add a new selftest that validates `devtool ide-sdk --ide=code` output for
a kernel module recipe.

The test verifies:
- generated makefile build/clean configurations
- read-only kernel source mapping
- exported cross-build terminal environment variables
- kernel-specific file exclude patterns
- extension recommendations for makefile/cpptools
- `gnu11` and kernel include paths in c_cpp_properties.json

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agometa-selftest: add test kernel module recipe
Adrian Freihofer [Mon, 23 Feb 2026 21:06:39 +0000 (22:06 +0100)] 
meta-selftest: add test kernel module recipe

Add a minimal out-of-tree kernel module and corresponding recipe under
meta-selftest for devtool ide-sdk test coverage.

This provides a simple module source and Makefile that can be built via
the module class in selftest scenarios.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agodevtool: ide-sdk: support kernel module development
Adrian Freihofer [Mon, 23 Feb 2026 21:06:38 +0000 (22:06 +0100)] 
devtool: ide-sdk: support kernel module development

This add very basic support for kernel module development with devtool
ide-sdk. It exports the kernel build environment and sets up
tasks for building and cleaning the module. But it does not yet support
install, deploy, and debug tasks. It looks like possible to offer the
same level of support as for CMake and Meson based projects, but that
requires more work.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agomodule.bbclass: move environment setup to kernel_module.py
Adrian Freihofer [Mon, 23 Feb 2026 21:06:37 +0000 (22:06 +0100)] 
module.bbclass: move environment setup to kernel_module.py

Refactor: move kernel module environment setup from do_devshell to
kernel_module.py

Extract the kernel module environment variable setup from do_devshell
into oe.kernel_module.kernel_module_os_env(). This enables code reuse
for future features such as devtool ide-sdk.

Note: it would also be possible to e.g. bb.utils.py. But when every such
a widely used utility function gets changed, bitbake needs to recompile
a lot of code. Therefore it's probably better to put it into a
separate file. It also is a very specific function, so oe.kernel_module
seems to be a good place.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agodevtool: ide-sdk gate gdbserver warnings on recipe need
Adrian Freihofer [Mon, 23 Feb 2026 21:06:36 +0000 (22:06 +0100)] 
devtool: ide-sdk gate gdbserver warnings on recipe need

Add a `wants_gdbserver` attribute to modified recipes and evaluate it
across the selected set. Only emit warnings about missing `gdbserver`
and missing `image-combined-dbg` when at least one recipe actually
requires remote debugging support.

This avoids noisy, irrelevant warnings in setups that do not use
gdbserver.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agooe-selftest: devtool: improve test_devtool_ide_sdk_shared_sysroots
Adrian Freihofer [Mon, 23 Feb 2026 21:06:35 +0000 (22:06 +0100)] 
oe-selftest: devtool: improve test_devtool_ide_sdk_shared_sysroots

In shared-sysroot IDE SDK mode, the C++ CMake example test ran CMake
commands but did not assert that configure/build completed successfully.
This could hide failures and produce false positives.

Capture command output from both steps and assert expected messages:
- configure: "Build files have been written to: <builddir>"
- build: "Built target"

This makes the test explicitly fail when CMake configure or build does not
complete as expected.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agooe-selftest: devtool: add compile step in ide-sdk tests
Adrian Freihofer [Mon, 23 Feb 2026 21:06:34 +0000 (22:06 +0100)] 
oe-selftest: devtool: add compile step in ide-sdk tests

Add explicit compile step to the ide-sdk test workflow. The current
implementation relies on calling bitbake -c install to perform the
install step, which also triggers a build. But this will change when
bitbake will support task execution without handling dependencies.
To make the tests future-proof, add an explicit compile step after
modifying the source code.

This also improves the test coverage for meson based recipes, as the
compile step is now explicitly tested.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agotemplates: site.conf.sample: remove CVS proxy instructions
Antonin Godard [Tue, 3 Mar 2026 11:02:27 +0000 (12:02 +0100)] 
templates: site.conf.sample: remove CVS proxy instructions

The CVS fetcher was disabled with 5427500e4f23 ("fetch: Drop CVS fetcher
module") in BitBake. Remove the CVS instructions from this file.

Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agolibadwaita: upgrade 1.8.2 -> 1.8.4
Liu Yiding [Tue, 3 Mar 2026 10:01:27 +0000 (18:01 +0800)] 
libadwaita: upgrade 1.8.2 -> 1.8.4

=============
Version 1.8.4
=============
  - AdwDialog
    - Fix initial focus in bottom sheet mode
  - AdwWrapBox
    - Fix ADW_JUSTIFY_SPREAD
  - Translation updates
    - Indonesian
    - Kazakh
    - Romanian

Signed-off-by: Liu Yiding <liuyd.fnst@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agogtk4: upgrade 4.20.2 -> 4.20.3
Liu Yiding [Tue, 3 Mar 2026 10:00:51 +0000 (10:00 +0000)] 
gtk4: upgrade 4.20.2 -> 4.20.3

Changelog
  https://gitlab.gnome.org/GNOME/gtk/-/blob/4.20.3/NEWS?ref_type=tags

Signed-off-by: Liu Yiding <liuyd.fnst@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agosystemd: add nologin shell to polkitd user
sven.kalmbach [Tue, 3 Mar 2026 07:43:15 +0000 (08:43 +0100)] 
systemd: add nologin shell to polkitd user

Signed-off-by: sven.kalmbach <sven.kalmbach@loewensteinmedical.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agolibcomps: upgrade 0.1.23 -> 0.1.24
Moritz Haase [Tue, 3 Mar 2026 05:15:13 +0000 (06:15 +0100)] 
libcomps: upgrade 0.1.23 -> 0.1.24

The project did not publish release notes, but the list of changes is available
at [0].

[0]: https://github.com/rpm-software-management/libcomps/compare/0.1.23...0.1.24

Signed-off-by: Moritz Haase <Moritz.Haase@bmw.de>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agoimprove_kernel_cve_report: validate that cve details field exists
Daniel Turull [Wed, 4 Feb 2026 13:42:35 +0000 (14:42 +0100)] 
improve_kernel_cve_report: validate that cve details field exists

Check if the cve information has the details field to avoid crashing

Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agoimprove_kernel_cve_report: update data if CVE exists
Daniel Turull [Wed, 4 Feb 2026 13:42:34 +0000 (14:42 +0100)] 
improve_kernel_cve_report: update data if CVE exists

This allow to include additional information if one of the
sources is more complete. Updating description with more
up to date information and including summary.

For example:

Before while using cve_check:

       {
          "id": "CVE-2025-68167",
          "status": "Patched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2025-68167",
          "detail": "fixed-version",
          "description": "Fixed from version 6.18"
        },

After:
        {
          "id": "CVE-2025-68167",
          "status": "Patched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2025-68167",
          "detail": "fixed-version",
          "description": "Fixed from version 6.18",
          "summary": "In the Linux kernel, the following (...)"
        },

Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agoimprove_kernel_cve_report: correct description for fixed-version
Daniel Turull [Wed, 4 Feb 2026 13:42:33 +0000 (14:42 +0100)] 
improve_kernel_cve_report: correct description for fixed-version

Remove duplication in the description when fixed-version, to be
consistent with the other status description.

Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agoimprove_kernel_cve_report: sort kernel_compiled_files
Daniel Turull [Wed, 4 Feb 2026 13:42:32 +0000 (14:42 +0100)] 
improve_kernel_cve_report: sort kernel_compiled_files

Sorting the set so the that output is predictable

Signed-off-by: Andrew Fenner <andrew.fenner@est.tech>
Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agolinux-yocto/6.18: update CVE exclusions (6.18.13)
Bruce Ashfield [Mon, 2 Mar 2026 04:55:33 +0000 (23:55 -0500)] 
linux-yocto/6.18: update CVE exclusions (6.18.13)

Data pulled from: https://github.com/CVEProject/cvelistV5

    1/1 [
        Author: cvelistV5 Github Action
        Email: github_action@example.com
        Subject: 2 changes (2 new | 0 updated): - 2 new CVEs: CVE-2026-2969, CVE-2026-2970 - 0 updated CVEs:
        Date: Mon, 23 Feb 2026 04:14:58 +0000

    ]

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agolinux-yocto/6.18: update to v6.18.13
Bruce Ashfield [Mon, 2 Mar 2026 04:55:32 +0000 (23:55 -0500)] 
linux-yocto/6.18: update to v6.18.13

Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:

    25e0b1c206e3d Linux 6.18.13
    df337ba02ca53 f2fs: fix incomplete block usage in compact SSA summaries
    855c54f1803e3 f2fs: fix to do sanity check on node footer in {read,write}_end_io
    cd2fec912a0f0 f2fs: fix to do sanity check on node footer in __write_node_folio()
    715a7a72e4736 USB: serial: option: add Telit FN920C04 RNDIS compositions
    f611dafe0ffd3 iommu/arm-smmu-qcom: do not register driver in probe()
    0415ae51a40e3 f2fs: optimize f2fs_overwrite_io() for f2fs_iomap_begin
    fee27b69dde1a f2fs: fix to avoid mapping wrong physical block for swapfile
    97e4f479939e5 f2fs: support non-4KB block size without packed_ssa feature
    995030be4ce63 f2fs: fix to avoid UAF in f2fs_write_end_io()
    d4a594dd952df f2fs: fix out-of-bounds access in sysfs attribute read/write
    bd66b4c487d50 f2fs: fix IS_CHECKPOINTED flag inconsistency issue caused by concurrent atomic commit and checkpoint writes
    70cf1e96bde07 f2fs: fix to check sysfs filename w/ gc_pin_file_thresh correctly
    fb9f7e52273db f2fs: fix to add gc count stat in f2fs_gc_range
    1c008ad0f0d1c fbdev: smscufx: properly copy ioctl memory to kernelspace
    3e4cbd1d46c24 fbdev: rivafb: fix divide error in nv3_arb()
    98d91080517d4 cpuset: Fix missing adaptation for cpuset_is_populated
    eaa9fcf57934c LoongArch: Rework KASAN initialization for PTW-enabled systems
    9b671f6f432be mm/hugetlb: fix excessive IPI broadcasts when unsharing PMD tables using mmu_gather
    0c74d37343b93 arm64: dts: mediatek: mt8183: Add missing endpoint IDs to display graph
    6d66464d1a059 gpiolib: acpi: Fix gpio count with string references
    fa4938e0d0d64 io_uring/fdinfo: be a bit nicer when looping a lot of SQEs/CQEs
    cab928242853a ASoC: fsl_xcvr: fix missing lock in fsl_xcvr_mode_put()
    00c57e2369386 drm/amd/display: remove assert around dpp_base replacement
    8e6f503961709 drm/amd/display: extend delta clamping logic to CM3 LUT helper
    f2584f791a103 tracing/dma: Cap dma_map_sg tracepoint arrays to prevent buffer overflow
    7bc40c6f36575 ASoC: cs42l43: Correct handling of 3-pole jack load detection
    a8ed5b974a244 platform/x86: panasonic-laptop: Fix sysfs group leak in error path
    2ca80dd4bb0e2 ASoC: sof_sdw: Add a quirk for Lenovo laptop using sidecar amps with cs42l43
    bb6ff25035da5 platform/x86/amd/pmc: Add quirk for MECHREVO Wujie 15X Pro
    a9584e9e46448 ALSA: hda/realtek: Enable headset mic for Acer Nitro 5
    78783e8d588cf ASoC: amd: yc: Add quirk for HP 200 G2a 16
    c3b2e922924bf ASoC: Intel: sof_es8336: Add DMI quirk for Huawei BOD-WXX9
    97528b1622b8f platform/x86: classmate-laptop: Add missing NULL pointer checks
    efdb9c8ca3cfb drm/tegra: hdmi: sor: Fix error: variable ‘j’ set but not used
    4b71ad7676564 romfs: check sb_set_blocksize() return value
    d2e01e0c5e947 ALSA: hda/realtek - fixed speaker no sound
    20bc7062c352f ASoC: cs35l45: Corrects ASP_TX5 DAPM widget channel
    1bdbcf326474c ALSA: hda/realtek: Add quirk for Inspur S14-G1
    b0b2cb84b64a9 gpio: sprd: Change sprd_gpio lock to raw_spin_lock
    652667ac1369e ASoC: amd: yc: Add ASUS ExpertBook PM1503CDA to quirks list
    464a50c6b23aa rust: driver: fix broken intra-doc links to example driver types
    7d82e965fe0e3 rust: dma: fix broken intra-doc links
    68dd6c5ebe799 rust: device: fix broken intra-doc links
    31f33b856d232 scsi: qla2xxx: Fix bsg_done() causing double free
    2784b1b43af37 Linux 6.18.12
    53a76425e0764 Revert "driver core: enforce device_lock for driver_match_device()"

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agolinux-yocto/6.18: genericarm64: feature splits and enablement
Bruce Ashfield [Mon, 2 Mar 2026 04:55:31 +0000 (23:55 -0500)] 
linux-yocto/6.18: genericarm64: feature splits and enablement

Integrating the following commit(s) to linux-yocto/.:

    98a36302 cfgs/nfc: create an intel-nfc-vendor specific feature
    6350b56a netfilter.cfg: enable NF_CONNTRACK_SNMP
    a425fdd0 pmem.cfg: enable DEV_DAX and DEV_DAX_HMEM
    70eeaeff genericarm64.scc: enable TRANSPARENT_HUGEPAGE support
    d62a1267 security-arm64.cfg: rename CFI_CLANG to CFI
    b925ef94 security-arm64.cfg: correctly enable KASAN
    1fdb98a4 security-arm64.cfg: add comment for ARM64_BTI_KERNEL
    6d8bf6f0 security.cfg: move RANDOMIZE_MEMORY to x86_64
    18fcb6dc arm.scc: move ARM_CPUIDLE to arm only
    7e1d9b2b numa_x86_64.scc: move x86_64 config from numa.cfg to numa_x86_64.cfg
    e93e999e sound.cfg: split SND_SOC_WM8731 to I2C and SPI variants
    5a567776 sound_x86.scc: take over x86 configs from sound.scc
    1ae7ce94 genericarm64.cfg: enable MTD NAND ECC support
    15d48f71 genericarm64.cfg: enable TI MTD NAND support
    40a67254 genericarm64-serial.cfg: set SERIAL_8250_CONSOLE to y
    5ee6148e qemu-kvm.cfg: remove extra space
    9f780417 firmware.cfg: whitespace fixes
    bc221187 genericarm64.cfg: fix CONFIG_PM_DEVFREQ_EVENT
    aef69bf3 Revert "genericarm64.scc: enable OP-TEE support"
    6f597e1a genericarm64.cfg: enable SCSI support for HiSilicon etc
    f1f313cf genericarm64.scc: enable RPMB support
    a4565911 genericarm64.scc: enable GNSS support
    391566e2 gnss.scc: add feature
    d40a455d genericarm64.cfg: enable more bus drivers
    20e41104 genericarm64.cfg: enable PCI_PASID support
    0b2967f5 genericarm64.scc: enable NFC support
    2643b37e nfc-vendor.scc: move Intel configs to nfc-vendor-intel.cfg
    b1d00b01 genericarm64.scc: enable RFKILL LED, INPUT and GPIO
    92610953 rfkill-extra.scc: add fragment for RFKILL LEDs, input and GPIO support
    fc7d5f45 bluetooth.cfg: enable BT_LEDS support
    f18ec272 genericarm64.scc: enable HSR
    79fa2c17 hsr.scc: add feature for High-availability Seamless Redundancy (HSR & PRP)
    1313923a genericarm64.scc: enable Time Sensitive Networking
    e190eeff intel-x86.scc: enable hibernation with feature
    c941f4ee genericarm64.scc: enable hibernation support
    ce5c6d9d hibernation.scc: add feature
    83620a7d bluetooth-usb.cfg: enable MediaTek and RealTek support
    cf6e1261 bluetooth-hw.cfg: enable BT_MTK
    ffdd0769 genericarm64.cfg: enable Microchip PHY support

Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agolinux-yocto/6.18: update CVE exclusions (6.18.11)
Bruce Ashfield [Mon, 2 Mar 2026 04:55:30 +0000 (23:55 -0500)] 
linux-yocto/6.18: update CVE exclusions (6.18.11)

Data pulled from: https://github.com/CVEProject/cvelistV5

    1/1 [
        Author: cvelistV5 Github Action
        Email: github_action@example.com
        Subject: 1416 changes (1 new | 1415 updated): - 1 new CVEs: CVE-2026-2563 - 1415 updated CVEs: CVE-2001-0143, CVE-2001-0144, CVE-2001-0145, CVE-2001-0146, CVE-2001-0147, CVE-2001-0148, CVE-2001-0149, CVE-2001-0150, CVE-2001-0151, CVE-2001-0152, CVE-2001-0153, CVE-2001-0154, CVE-2001-0155, CVE-2001-0156, CVE-2001-0157, CVE-2001-0160, CVE-2001-0161, CVE-2001-0162, CVE-2001-0163, CVE-2001-0164, CVE-2001-0165, CVE-2001-0166, CVE-2001-0167, CVE-2001-0168, CVE-2001-0169, CVE-2001-0170, CVE-2001-0171, CVE-2001-0172, CVE-2001-0173, CVE-2001-0174, CVE-2001-0175, CVE-2001-0176, CVE-2001-0177, CVE-2001-0178, CVE-2001-0179, CVE-2001-0180, CVE-2001-0181, CVE-2001-0182, CVE-2001-0183, CVE-2001-0184, CVE-2001-0185, CVE-2001-0186, CVE-2001-0187, CVE-2001-0188, CVE-2001-0189, CVE-2001-0190, CVE-2001-0191, CVE-2001-0192, CVE-2001-0193, CVE-2001-0194, CVE-2001-0195, CVE-2001-0196, CVE-2001-0197, CVE-2001-0198, CVE-2001-0199, CVE-2001-0200, CVE-2001-0201, CVE-2001-0202, CVE-2001-0203, CVE-2001-0204, CVE-2001-0205, CVE-2001-0206, CVE-2001-0207, CVE-2001-0208, CVE-2001-0209, CVE-2001-0210, CVE-2001-0211, CVE-2001-0212, CVE-2001-0213, CVE-2001-0214, CVE-2001-0215, CVE-2001-0216, CVE-2001-0217, CVE-2001-0218, CVE-2001-0219, CVE-2001-0220, CVE-2001-0221, CVE-2001-0222, CVE-2001-0223, CVE-2001-0224, CVE-2001-0225, CVE-2001-0226, CVE-2001-0227, CVE-2001-0228, CVE-2001-0229, CVE-2001-0230, CVE-2001-0231, CVE-2001-0232, CVE-2001-0233, CVE-2001-0234, CVE-2001-0235, CVE-2001-0236, CVE-2001-0237, CVE-2001-0238, CVE-2001-0239, CVE-2001-0240, CVE-2001-0241, CVE-2001-0242, CVE-2001-0243, CVE-2001-0244, CVE-2001-0245, CVE-2001-0246, CVE-2001-0247, CVE-2001-0248, CVE-2001-0249, CVE-2001-0250, CVE-2001-0251, CVE-2001-0252, CVE-2001-0253, CVE-2001-0254, CVE-2001-0255, CVE-2001-0256, CVE-2001-0257, CVE-2001-0258, CVE-2001-0259, CVE-2001-0260, CVE-2001-0261, CVE-2001-0262, CVE-2001-0263, CVE-2001-0264, CVE-2001-0265, CVE-2001-0266, CVE-2001-0267, CVE-2001-0268, CVE-2001-0269, CVE-2001-0270, CVE-2001-0271, CVE-2001-0272, CVE-2001-0273, CVE-2001-0274, CVE-2001-0275, CVE-2001-0276, CVE-2001-0277, CVE-2001-0278, CVE-2001-0279, CVE-2001-0280, CVE-2001-0281, CVE-2001-0282, CVE-2001-0283, CVE-2001-0284, CVE-2001-0285, CVE-2001-0286, CVE-2001-0287, CVE-2001-0288, CVE-2001-0289, CVE-2001-0290, CVE-2001-0291, CVE-2001-0292, CVE-2001-0293, CVE-2001-0294, CVE-2001-0295, CVE-2001-0296, CVE-2001-0297, CVE-2001-0298, CVE-2001-0299, CVE-2001-0300, CVE-2001-0301, CVE-2001-0302, CVE-2001-0303, CVE-2001-0304, CVE-2001-0305, CVE-2001-0306, CVE-2001-0307, CVE-2001-0308, CVE-2001-0309, CVE-2001-0310, CVE-2001-0311, CVE-2001-0312, CVE-2001-0313, CVE-2001-0314, CVE-2001-0315, CVE-2001-0316, CVE-2001-0317, CVE-2001-0318, CVE-2001-0319, CVE-2001-0320, CVE-2001-0321, CVE-2001-0322, CVE-2001-0323, CVE-2001-0324, CVE-2001-0325, CVE-2001-0326, CVE-2001-0327, CVE-2001-0328, CVE-2001-0329, CVE-2001-0330, CVE-2001-0331, CVE-2001-0332, CVE-2001-0333, CVE-2001-0334, CVE-2001-0335, CVE-2001-0336, CVE-2001-0337, CVE-2001-0338, CVE-2001-0339, CVE-2001-0340, CVE-2001-0341, CVE-2001-0344, CVE-2001-0345, CVE-2001-0346, CVE-2001-0347, CVE-2001-0348, CVE-2001-0349, CVE-2001-0350, CVE-2001-0351, CVE-2001-0352, CVE-2001-0353, CVE-2001-0354, CVE-2001-0355, CVE-2001-0357, CVE-2001-0358, CVE-2001-0359, CVE-2001-0360, CVE-2001-0361, CVE-2001-0364, CVE-2001-0365, CVE-2001-0366, CVE-2001-0367, CVE-2001-0368, CVE-2001-0369, CVE-2001-0370, CVE-2001-0371, CVE-2001-0372, CVE-2001-0373, CVE-2001-0374, CVE-2001-0375, CVE-2001-0376, CVE-2001-0377, CVE-2001-0378, CVE-2001-0379, CVE-2001-0380, CVE-2001-0381, CVE-2001-0382, CVE-2001-0383, CVE-2001-0384, CVE-2001-0385, CVE-2001-0386, CVE-2001-0387, CVE-2001-0388, CVE-2001-0389, CVE-2001-0390, CVE-2001-0391, CVE-2001-0392, CVE-2001-0393, CVE-2001-0394, CVE-2001-0395, CVE-2001-0396, CVE-2001-0397, CVE-2001-0398, CVE-2001-0399, CVE-2001-0400, CVE-2001-0401, CVE-2001-0402, CVE-2001-0403, CVE-2001-0404, CVE-2001-0405, CVE-2001-0406, CVE-2001-0407, CVE-2001-0408, CVE-2001-0409, CVE-2001-0410, CVE-2001-0411, CVE-2001-0412, CVE-2001-0413, CVE-2001-0414, CVE-2001-0415, CVE-2001-0416, CVE-2001-0417, CVE-2001-0418, CVE-2001-0419, CVE-2001-0420, CVE-2001-0421, CVE-2001-0422, CVE-2001-0423, CVE-2001-0424, CVE-2001-0425, CVE-2001-0426, CVE-2001-0427, CVE-2001-0428, CVE-2001-0429, CVE-2001-0430, CVE-2001-0431, CVE-2001-0432, CVE-2001-0433, CVE-2001-0434, CVE-2001-0435, CVE-2001-0436, CVE-2001-0437, CVE-2001-0438, CVE-2001-0439, CVE-2001-0440, CVE-2001-0441, CVE-2001-0442, CVE-2001-0443, CVE-2001-0444, CVE-2001-0446, CVE-2001-0447, CVE-2001-0448, CVE-2001-0449, CVE-2001-0450, CVE-2001-0451, CVE-2001-0452, CVE-2001-0453, CVE-2001-0454, CVE-2001-0455, CVE-2001-0456, CVE-2001-0457, CVE-2001-0458, CVE-2001-0459, CVE-2001-0460, CVE-2001-0461, CVE-2001-0462, CVE-2001-0463, CVE-2001-0464, CVE-2001-0465, CVE-2001-0466, CVE-2001-0467, CVE-2001-0468, CVE-2001-0469, CVE-2001-0470, CVE-2001-0471, CVE-2001-0472, CVE-2001-0473, CVE-2001-0474, CVE-2001-0475, CVE-2001-0476, CVE-2001-0477, CVE-2001-0478, CVE-2001-0479, CVE-2001-0480, CVE-2001-0481, CVE-2001-0482, CVE-2001-0483, CVE-2001-0484, CVE-2001-0485, CVE-2001-0486, CVE-2001-0487, CVE-2001-0488, CVE-2001-0489, CVE-2001-0490, CVE-2001-0491, CVE-2001-0492, CVE-2001-0493, CVE-2001-0494, CVE-2001-0495, CVE-2001-0496, CVE-2001-0497, CVE-2001-0498, CVE-2001-0499, CVE-2001-0500, CVE-2001-0501, CVE-2001-0502, CVE-2001-0503, CVE-2001-0504, CVE-2001-0505, CVE-2001-0506, CVE-2001-0507, CVE-2001-0508, CVE-2001-0509, CVE-2001-0513, CVE-2001-0514, CVE-2001-0515, CVE-2001-0516, CVE-2001-0517, CVE-2001-0518, CVE-2001-0519, CVE-2001-0520, CVE-2001-0521, CVE-2001-0522, CVE-2001-0523, CVE-2001-0524, CVE-2001-0525, CVE-2001-0526, CVE-2001-0527, CVE-2001-0528, CVE-2001-0529, CVE-2001-0530, CVE-2001-0533, CVE-2001-0534, CVE-2001-0535, CVE-2001-0537, CVE-2001-0538, CVE-2001-0540, CVE-2001-0541, CVE-2001-0542, CVE-2001-0543, CVE-2001-0544, CVE-2001-0545, CVE-2001-0546, CVE-2001-0547, CVE-2001-0548, CVE-2001-0549, CVE-2001-0550, CVE-2001-0551, CVE-2001-0552, CVE-2001-0553, CVE-2001-0554, CVE-2001-0555, CVE-2001-0556, CVE-2001-0557, CVE-2001-0558, CVE-2001-0559, CVE-2001-0560, CVE-2001-0561, CVE-2001-0562, CVE-2001-0563, CVE-2001-0564, CVE-2001-0565, CVE-2001-0566, CVE-2001-0567, CVE-2001-0568, CVE-2001-0569, CVE-2001-0570, CVE-2001-0571, CVE-2001-0572, CVE-2001-0573, CVE-2001-0574, CVE-2001-0575, CVE-2001-0576, CVE-2001-0577, CVE-2001-0578, CVE-2001-0579, CVE-2001-0580, CVE-2001-0581, CVE-2001-0582, CVE-2001-0583, CVE-2001-0584, CVE-2001-0585, CVE-2001-0586, CVE-2001-0587, CVE-2001-0588, CVE-2001-0589, CVE-2001-0590, CVE-2001-0591, CVE-2001-0592, CVE-2001-0593, CVE-2001-0594, CVE-2001-0595, CVE-2001-0596, CVE-2001-0597, CVE-2001-0598, CVE-2001-0599, CVE-2001-0600, CVE-2001-0601, CVE-2001-0602, CVE-2001-0603, CVE-2001-0604, CVE-2001-0605, CVE-2001-0606, CVE-2001-0607, CVE-2001-0608, CVE-2001-0609, CVE-2001-0610, CVE-2001-0611, CVE-2001-0612, CVE-2001-0613, CVE-2001-0614, CVE-2001-0615, CVE-2001-0616, CVE-2001-0617, CVE-2001-0618, CVE-2001-0619, CVE-2001-0620, CVE-2001-0621, CVE-2001-0622, CVE-2001-0623, CVE-2001-0624, CVE-2001-0625, CVE-2001-0626, CVE-2001-0627, CVE-2001-0628, CVE-2001-0629, CVE-2001-0630, CVE-2001-0631, CVE-2001-0632, CVE-2001-0633, CVE-2001-0634, CVE-2001-0635, CVE-2001-0636, CVE-2001-0641, CVE-2001-0642, CVE-2001-0643, CVE-2001-0644, CVE-2001-0645, CVE-2001-0646, CVE-2001-0647, CVE-2001-0648, CVE-2001-0649, CVE-2001-0650, CVE-2001-0652, CVE-2001-0653, CVE-2001-0654, CVE-2001-0655, CVE-2001-0656, CVE-2001-0657, CVE-2001-0658, CVE-2001-0659, CVE-2001-0660, CVE-2001-0662, CVE-2001-0663, CVE-2001-0664, CVE-2001-0665, CVE-2001-0666, CVE-2001-0667, CVE-2001-0668, CVE-2001-0669, CVE-2001-0670, CVE-2001-0671, CVE-2001-0674, CVE-2001-0675, CVE-2001-0676, CVE-2001-0677, CVE-2001-0678, CVE-2001-0679, CVE-2001-0680, CVE-2001-0681, CVE-2001-0682, CVE-2001-0683, CVE-2001-0684, CVE-2001-0685, CVE-2001-0686, CVE-2001-0687, CVE-2001-0688, CVE-2001-0689, CVE-2001-0690, CVE-2001-0691, CVE-2001-0692, CVE-2001-0693, CVE-2001-0694, CVE-2001-0695, CVE-2001-0696, CVE-2001-0697, CVE-2001-0698, CVE-2001-0699, CVE-2001-0700, CVE-2001-0701, CVE-2001-0702, CVE-2001-0703, CVE-2001-0704, CVE-2001-0705, CVE-2001-0706, CVE-2001-0707, CVE-2001-0708, CVE-2001-0709, CVE-2001-0710, CVE-2001-0711, CVE-2001-0712, CVE-2001-0713, CVE-2001-0714, CVE-2001-0715, CVE-2001-0716, CVE-2001-0717, CVE-2001-0718, CVE-2001-0719, CVE-2001-0720, CVE-2001-0721, CVE-2001-0722, CVE-2001-0723, CVE-2001-0724, CVE-2001-0726, CVE-2001-0727, CVE-2001-0728, CVE-2001-0729, CVE-2001-0730, CVE-2001-0731, CVE-2001-0733, CVE-2001-0734, CVE-2001-0735, CVE-2001-0736, CVE-2001-0737, CVE-2001-0738, CVE-2001-0739, CVE-2001-0740, CVE-2001-0741, CVE-2001-0742, CVE-2001-0743, CVE-2001-0744, CVE-2001-0745, CVE-2001-0746, CVE-2001-0747, CVE-2001-0748, CVE-2001-0749, CVE-2001-0750, CVE-2001-0751, CVE-2001-0752, CVE-2001-0753, CVE-2001-0754, CVE-2001-0755, CVE-2001-0756, CVE-2001-0757, CVE-2001-0758, CVE-2001-0759, CVE-2001-0760, CVE-2001-0761, CVE-2001-0762, CVE-2001-0763, CVE-2001-0764, CVE-2001-0765, CVE-2001-0766, CVE-2001-0767, CVE-2001-0768, CVE-2001-0769, CVE-2001-0770, CVE-2001-0771, CVE-2001-0772, CVE-2001-0773, CVE-2001-0774, CVE-2001-0775, CVE-2001-0776, CVE-2001-0777, CVE-2001-0778, CVE-2001-0779, CVE-2001-0780, CVE-2001-0781, CVE-2001-0782, CVE-2001-0783, CVE-2001-0784, CVE-2001-0785, CVE-2001-0786, CVE-2001-0787, CVE-2001-0788, CVE-2001-0789, CVE-2001-0790, CVE-2001-0791, CVE-2001-0792, CVE-2001-0794, CVE-2001-0795, CVE-2001-0796, CVE-2001-0797, CVE-2001-0798, CVE-2001-0799, CVE-2001-0800, CVE-2001-0801, CVE-2001-0802, CVE-2001-0803, CVE-2001-0804, CVE-2001-0805, CVE-2001-0806, CVE-2001-0807, CVE-2001-0808, CVE-2001-0809, CVE-2001-0810, CVE-2001-0811, CVE-2001-0812, CVE-2001-0813, CVE-2001-0814, CVE-2001-0815, CVE-2001-0816, CVE-2001-0817, CVE-2001-0818, CVE-2001-0819, CVE-2001-0820, CVE-2001-0821, CVE-2001-0822, CVE-2001-0823, CVE-2001-0824, CVE-2001-0825, CVE-2001-0826, CVE-2001-0828, CVE-2001-0829, CVE-2001-0830, CVE-2001-0831, CVE-2001-0832, CVE-2001-0833, CVE-2001-0834, CVE-2001-0835, CVE-2001-0836, CVE-2001-0837, CVE-2001-0838, CVE-2001-0839, CVE-2001-0840, CVE-2001-0841, CVE-2001-0842, CVE-2001-0843, CVE-2001-0844, CVE-2001-0845, CVE-2001-0846, CVE-2001-0847, CVE-2001-0848, CVE-2001-0849, CVE-2001-0850, CVE-2001-0851, CVE-2001-0852, CVE-2001-0853, CVE-2001-0854, CVE-2001-0855, CVE-2001-0856, CVE-2001-0857, CVE-2001-0858, CVE-2001-0859, CVE-2001-0860, CVE-2001-0861, CVE-2001-0862, CVE-2001-0863, CVE-2001-0864, CVE-2001-0865, CVE-2001-0866, CVE-2001-0867, CVE-2001-0868, CVE-2001-0869, CVE-2001-0870, CVE-2001-0871, CVE-2001-0872, CVE-2001-0873, CVE-2001-0874, CVE-2001-0875, CVE-2001-0876, CVE-2001-0877, CVE-2001-0879, CVE-2001-0884, CVE-2001-0886, CVE-2001-0887, CVE-2001-0888, CVE-2001-0889, CVE-2001-0890, CVE-2001-0891, CVE-2001-0892, CVE-2001-0893, CVE-2001-0894, CVE-2001-0895, CVE-2001-0896, CVE-2001-0897, CVE-2001-0898, CVE-2001-0899, CVE-2001-0900, CVE-2001-0901, CVE-2001-0902, CVE-2001-0903, CVE-2001-0904, CVE-2001-0905, CVE-2001-0906, CVE-2001-0907, CVE-2001-0908, CVE-2001-0909, CVE-2001-0910, CVE-2001-0911, CVE-2001-0912, CVE-2001-0913, CVE-2001-0914, CVE-2001-0915, CVE-2001-0916, CVE-2001-0917, CVE-2001-0918, CVE-2001-0919, CVE-2001-0920, CVE-2001-0921, CVE-2001-0922, CVE-2001-0923, CVE-2001-0924, CVE-2001-0925, CVE-2001-0926, CVE-2001-0927, CVE-2001-0928, CVE-2001-0929, CVE-2001-0930, CVE-2001-0931, CVE-2001-0932, CVE-2001-0933, CVE-2001-0934, CVE-2001-0935, CVE-2001-0936, CVE-2001-0937, CVE-2001-0938, CVE-2001-0939, CVE-2001-0940, CVE-2001-0941, CVE-2001-0942, CVE-2001-0943, CVE-2001-0944, CVE-2001-0945, CVE-2001-0946, CVE-2001-0947, CVE-2001-0948, CVE-2001-0949, CVE-2001-0950, CVE-2001-0951, CVE-2001-0952, CVE-2001-0953, CVE-2001-0954, CVE-2001-0955, CVE-2001-0956, CVE-2001-0958, CVE-2001-0959, CVE-2001-0960, CVE-2001-0961, CVE-2001-0962, CVE-2001-0963, CVE-2001-0964, CVE-2001-0965, CVE-2001-0966, CVE-2001-0967, CVE-2001-0968, CVE-2001-0969, CVE-2001-0970, CVE-2001-0971, CVE-2001-0972, CVE-2001-0973, CVE-2001-0974, CVE-2001-0975, CVE-2001-0976, CVE-2001-0977, CVE-2001-0978, CVE-2001-0979, CVE-2001-0980, CVE-2001-0981, CVE-2001-0982, CVE-2001-0983, CVE-2001-0984, CVE-2001-0985, CVE-2001-0986, CVE-2001-0987, CVE-2001-0988, CVE-2001-0989, CVE-2001-0990, CVE-2001-0991, CVE-2001-0992, CVE-2001-0993, CVE-2001-0994, CVE-2001-0995, CVE-2001-0996, CVE-2001-0997, CVE-2001-0998, CVE-2001-0999, CVE-2001-1000, CVE-2001-1002, CVE-2001-1003, CVE-2001-1004, CVE-2001-1005, CVE-2001-1006, CVE-2001-1007, CVE-2001-1008, CVE-2001-1009, CVE-2001-1010, CVE-2001-1011, CVE-2001-1012, CVE-2001-1013, CVE-2001-1014, CVE-2001-1015, CVE-2001-1016, CVE-2001-1017, CVE-2001-1018, CVE-2001-1019, CVE-2001-1020, CVE-2001-1021, CVE-2001-1022, CVE-2001-1023, CVE-2001-1024, CVE-2001-1025, CVE-2001-1026, CVE-2001-1027, CVE-2001-1028, CVE-2001-1029, CVE-2001-1030, CVE-2001-1031, CVE-2001-1032, CVE-2001-1033, CVE-2001-1034, CVE-2001-1035, CVE-2001-1036, CVE-2001-1037, CVE-2001-1038, CVE-2001-1039, CVE-2001-1040, CVE-2001-1041, CVE-2001-1042, CVE-2001-1043, CVE-2001-1044, CVE-2001-1045, CVE-2001-1046, CVE-2001-1047, CVE-2001-1048, CVE-2001-1049, CVE-2001-1050, CVE-2001-1051, CVE-2001-1052, CVE-2001-1053, CVE-2001-1054, CVE-2001-1055, CVE-2001-1056, CVE-2001-1057, CVE-2001-1058, CVE-2001-1059, CVE-2001-1060, CVE-2001-1061, CVE-2001-1062, CVE-2001-1063, CVE-2001-1064, CVE-2001-1065, CVE-2001-1066, CVE-2001-1067, CVE-2001-1068, CVE-2001-1069, CVE-2001-1070, CVE-2001-1071, CVE-2001-1072, CVE-2001-1073, CVE-2001-1074, CVE-2001-1075, CVE-2001-1076, CVE-2001-1077, CVE-2001-1078, CVE-2001-1079, CVE-2001-1080, CVE-2001-1081, CVE-2001-1082, CVE-2001-1083, CVE-2001-1084, CVE-2001-1085, CVE-2001-1086, CVE-2001-1087, CVE-2001-1088, CVE-2001-1089, CVE-2001-1090, CVE-2001-1091, CVE-2001-1092, CVE-2001-1093, CVE-2001-1094, CVE-2001-1095, CVE-2001-1096, CVE-2001-1097, CVE-2001-1098, CVE-2001-1099, CVE-2001-1100, CVE-2001-1101, CVE-2001-1102, CVE-2001-1103, CVE-2001-1104, CVE-2001-1105, CVE-2001-1106, CVE-2001-1107, CVE-2001-1108, CVE-2001-1109, CVE-2001-1110, CVE-2001-1111, CVE-2001-1112, CVE-2001-1113, CVE-2001-1114, CVE-2001-1115, CVE-2001-1116, CVE-2001-1117, CVE-2001-1118, CVE-2001-1119, CVE-2001-1120, CVE-2001-1121, CVE-2001-1122, CVE-2001-1123, CVE-2001-1124, CVE-2001-1125, CVE-2001-1126, CVE-2001-1127, CVE-2001-1128, CVE-2001-1129, CVE-2001-1130, CVE-2001-1131, CVE-2001-1132, CVE-2001-1133, CVE-2001-1134, CVE-2001-1135, CVE-2001-1136, CVE-2001-1137, CVE-2001-1138, CVE-2001-1139, CVE-2001-1140, CVE-2001-1141, CVE-2001-1142, CVE-2001-1143, CVE-2001-1144, CVE-2001-1145, CVE-2001-1146, CVE-2001-1147, CVE-2001-1148, CVE-2001-1149, CVE-2001-1150, CVE-2001-1151, CVE-2001-1152, CVE-2001-1153, CVE-2001-1154, CVE-2001-1155, CVE-2001-1156, CVE-2001-1157, CVE-2001-1158, CVE-2001-1159, CVE-2001-1160, CVE-2001-1161, CVE-2001-1162, CVE-2001-1163, CVE-2001-1164, CVE-2001-1165, CVE-2001-1166, CVE-2001-1167, CVE-2001-1168, CVE-2001-1169, CVE-2001-1170, CVE-2001-1171, CVE-2001-1172, CVE-2001-1173, CVE-2001-1174, CVE-2001-1175, CVE-2001-1176, CVE-2001-1177, CVE-2001-1178, CVE-2001-1179, CVE-2001-1180, CVE-2001-1181, CVE-2001-1182, CVE-2001-1183, CVE-2001-1184, CVE-2001-1185, CVE-2001-1186, CVE-2001-1187, CVE-2001-1188, CVE-2001-1189, CVE-2001-1190, CVE-2001-1191, CVE-2001-1192, CVE-2001-1193, CVE-2001-1194, CVE-2001-1195, CVE-2001-1196, CVE-2001-1197, CVE-2001-1198, CVE-2001-1199, CVE-2001-1200, CVE-2001-1201, CVE-2001-1202, CVE-2001-1203, CVE-2001-1204, CVE-2001-1205, CVE-2001-1206, CVE-2001-1207, CVE-2001-1208, CVE-2001-1209, CVE-2001-1210, CVE-2001-1211, CVE-2001-1212, CVE-2001-1213, CVE-2001-1214, CVE-2001-1215, CVE-2001-1216, CVE-2001-1217, CVE-2001-1218, CVE-2001-1219, CVE-2001-1220, CVE-2001-1221, CVE-2001-1222, CVE-2001-1223, CVE-2001-1224, CVE-2001-1225, CVE-2001-1226, CVE-2001-1227, CVE-2001-1228, CVE-2001-1229, CVE-2001-1230, CVE-2001-1231, CVE-2001-1232, CVE-2001-1233, CVE-2001-1234, CVE-2001-1235, CVE-2001-1236, CVE-2001-1237, CVE-2001-1238, CVE-2001-1239, CVE-2001-1240, CVE-2001-1241, CVE-2001-1242, CVE-2001-1243, CVE-2001-1244, CVE-2001-1245, CVE-2001-1246, CVE-2001-1247, CVE-2001-1248, CVE-2001-1249, CVE-2001-1250, CVE-2001-1251, CVE-2001-1252, CVE-2001-1253, CVE-2001-1254, CVE-2001-1255, CVE-2001-1256, CVE-2001-1257, CVE-2001-1258, CVE-2001-1259, CVE-2001-1260, CVE-2001-1261, CVE-2001-1262, CVE-2001-1263, CVE-2001-1264, CVE-2001-1265, CVE-2001-1266, CVE-2001-1267, CVE-2001-1268, CVE-2001-1269, CVE-2001-1270, CVE-2001-1271, CVE-2001-1272, CVE-2001-1273, CVE-2001-1274, CVE-2001-1275, CVE-2001-1276, CVE-2001-1277, CVE-2001-1278, CVE-2001-1279, CVE-2001-1280, CVE-2001-1281, CVE-2001-1282, CVE-2001-1283, CVE-2001-1284, CVE-2001-1285, CVE-2001-1286, CVE-2001-1287, CVE-2001-1288, CVE-2001-1289, CVE-2001-1290, CVE-2001-1291, CVE-2001-1292, CVE-2001-1293, CVE-2001-1294, CVE-2001-1295, CVE-2001-1296, CVE-2001-1297, CVE-2001-1298, CVE-2001-1299, CVE-2001-1300, CVE-2001-1301, CVE-2001-1302, CVE-2001-1303, CVE-2001-1304, CVE-2001-1305, CVE-2001-1306, CVE-2001-1307, CVE-2001-1308, CVE-2001-1309, CVE-2001-1310, CVE-2001-1311, CVE-2001-1312, CVE-2001-1313, CVE-2001-1314, CVE-2001-1315, CVE-2001-1316, CVE-2001-1317, CVE-2001-1318, CVE-2001-1319, CVE-2001-1320, CVE-2001-1321, CVE-2001-1322, CVE-2001-1323, CVE-2001-1324, CVE-2001-1325, CVE-2001-1326, CVE-2001-1327, CVE-2001-1328, CVE-2001-1329, CVE-2001-1330, CVE-2001-1331, CVE-2001-1332, CVE-2001-1333, CVE-2001-1334, CVE-2001-1335, CVE-2001-1336, CVE-2001-1337, CVE-2001-1338, CVE-2001-1339, CVE-2001-1340, CVE-2001-1341, CVE-2001-1342, CVE-2001-1343, CVE-2001-1344, CVE-2001-1345, CVE-2001-1346, CVE-2001-1347, CVE-2001-1348, CVE-2001-1349, CVE-2001-1350, CVE-2001-1351, CVE-2001-1352, CVE-2001-1353, CVE-2001-1354, CVE-2001-1355, CVE-2001-1356, CVE-2001-1357, CVE-2001-1358, CVE-2001-1359, CVE-2001-1360, CVE-2001-1361, CVE-2001-1362, CVE-2001-1363, CVE-2001-1364, CVE-2001-1365, CVE-2001-1366, CVE-2001-1367, CVE-2001-1368, CVE-2001-1369, CVE-2001-1370, CVE-2001-1371, CVE-2001-1372, CVE-2001-1373, CVE-2001-1374, CVE-2001-1375, CVE-2001-1376, CVE-2001-1377, CVE-2001-1378, CVE-2001-1379, CVE-2001-1380, CVE-2001-1382, CVE-2001-1383, CVE-2001-1384, CVE-2001-1385, CVE-2001-1386, CVE-2001-1387, CVE-2001-1388, CVE-2001-1389, CVE-2001-1390, CVE-2001-1391, CVE-2001-1392, CVE-2001-1393, CVE-2001-1394, CVE-2001-1395, CVE-2001-1396, CVE-2001-1397, CVE-2001-1398, CVE-2001-1399, CVE-2001-1400, CVE-2001-1401, CVE-2001-1402, CVE-2001-1403, CVE-2001-1404, CVE-2001-1405, CVE-2001-1406, CVE-2001-1407, CVE-2001-1408, CVE-2001-1409, CVE-2001-1410, CVE-2001-1411, CVE-2001-1412, CVE-2001-1413, CVE-2001-1414, CVE-2001-1415, CVE-2001-1416, CVE-2001-1417, CVE-2001-1418, CVE-2001-1419, CVE-2001-1420, CVE-2001-1421, CVE-2001-1422, CVE-2001-1423, CVE-2001-1424, CVE-2001-1425, CVE-2001-1426, CVE-2001-1427, CVE-2001-1428, CVE-2001-1429, CVE-2001-1430, CVE-2001-1431, CVE-2001-1432, CVE-2001-1433, CVE-2001-1434, CVE-2001-1435, CVE-2001-1436, CVE-2001-1437, CVE-2001-1438, CVE-2001-1439, CVE-2001-1440, CVE-2001-1441, CVE-2001-1442, CVE-2001-1443, CVE-2001-1444, CVE-2001-1445, CVE-2001-1446, CVE-2001-1447, CVE-2001-1448, CVE-2001-1449, CVE-2001-1450, CVE-2001-1451, CVE-2001-1452, CVE-2001-1453, CVE-2001-1454, CVE-2001-1455, CVE-2001-1456, CVE-2001-1457, CVE-2001-1458, CVE-2001-1459, CVE-2001-1460, CVE-2001-1461, CVE-2001-1462, CVE-2001-1463, CVE-2001-1464, CVE-2001-1465, CVE-2001-1466, CVE-2001-1467, CVE-2001-1468, CVE-2001-1469, CVE-2001-1470, CVE-2001-1471, CVE-2001-1472, CVE-2001-1473, CVE-2001-1474, CVE-2001-1475, CVE-2001-1476, CVE-2001-1477, CVE-2001-1478, CVE-2001-1479, CVE-2001-1480, CVE-2001-1481, CVE-2001-1482, CVE-2001-1483, CVE-2001-1484, CVE-2001-1487, CVE-2001-1488, CVE-2001-1489, CVE-2001-1490, CVE-2001-1491, CVE-2001-1492, CVE-2001-1494, CVE-2001-1495, CVE-2001-1496, CVE-2001-1497, CVE-2001-1498, CVE-2001-1499, CVE-2001-1500, CVE-2001-1501, CVE-2001-1502, CVE-2001-1503, CVE-2001-1504, CVE-2001-1505, CVE-2001-1506, CVE-2001-1507, CVE-2001-1508, CVE-2001-1509, CVE-2001-1510, CVE-2001-1511, CVE-2001-1512, CVE-2001-1513, CVE-2001-1514, CVE-2001-1515, CVE-2001-1516, CVE-2001-1517, CVE-2001-1518, CVE-2001-1519, CVE-2001-1520, CVE-2001-1521, CVE-2001-1522, CVE-2001-1523, CVE-2001-1524, CVE-2001-1525, CVE-2001-1526, CVE-2001-1527, CVE-2001-1528, CVE-2001-1529, CVE-2001-1530, CVE-2001-1531, CVE-2001-1532, CVE-2001-1533, CVE-2001-1534, CVE-2001-1535, CVE-2001-1536, CVE-2001-1537, CVE-2001-1538, CVE-2001-1539, CVE-2001-1540, CVE-2001-1541, CVE-2001-1542, CVE-2001-1543, CVE-2001-1544, CVE-2001-1545, CVE-2001-1546, CVE-2001-1547, CVE-2001-1548, CVE-2001-1549, CVE-2001-1550, CVE-2001-1551, CVE-2001-1552, CVE-2001-1553, CVE-2001-1554, CVE-2001-1555, CVE-2001-1556, CVE-2001-1557, CVE-2001-1558, CVE-2001-1559, CVE-2001-1560, CVE-2001-1561, CVE-2001-1562, CVE-2001-1563, CVE-2001-1564, CVE-2001-1565, CVE-2001-1566, CVE-2001-1567, CVE-2001-1568, CVE-2001-1569, CVE-2001-1570, CVE-2001-1571, CVE-2001-1572, CVE-2001-1573, CVE-2001-1574, CVE-2001-1575, CVE-2001-1576, CVE-2001-1577, CVE-2001-1578, CVE-2001-1579, CVE-2001-1580, CVE-2001-1581, CVE-2001-1582, CVE-2001-1583, CVE-2001-1584, CVE-2001-1585, CVE-2001-1586, CVE-2001-1587, CVE-2001-1588, CVE-2001-1589, CVE-2001-1590, CVE-2001-1591, CVE-2001-1592, CVE-2001-1593, CVE-2001-1594, CVE-2024-8419, CVE-2025-7195
        Date: Mon, 16 Feb 2026 15:50:20 +0000

    ]

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agolinux-yocto/6.18: update to v6.18.11
Bruce Ashfield [Mon, 2 Mar 2026 04:55:29 +0000 (23:55 -0500)] 
linux-yocto/6.18: update to v6.18.11

Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:

    ee4fb138af107 Linux 6.18.11
    32f08c3ddd6dd gpio: omap: do not register driver in probe()
    116f7bd8160c6 wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add
    24a253c3aa6d9 PCI: endpoint: Avoid creating sub-groups asynchronously
    60b75407c172e drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free
    ed82e7949f5ca xfs: fix UAF in xchk_btree_check_block_owner
    d741534302f71 erofs: fix UAF issue for file-backed mounts w/ directio option
    1d6bd6183e723 bus: fsl-mc: fix use-after-free in driver_override_show()
    d14e991279831 scsi: qla2xxx: Query FW again before proceeding with login
    f04840512438a scsi: qla2xxx: Free sp in error path to fix system crash
    c068ebbaf5282 scsi: qla2xxx: Delay module unload while fabric scan in progress
    ae49d33bfc08b scsi: qla2xxx: Allow recovery for tape devices
    1a9585e4c58d1 scsi: qla2xxx: Validate sp before freeing associated memory
    1339455044155 wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()
    46c1d56ad321f hfs: ensure sb->s_fs_info is always cleaned up
    4aa45f841413c nilfs2: Fix potential block overflow that cause system hang
    52505d7f713bf crypto: virtio - Remove duplicated virtqueue_kick in virtio_crypto_skcipher_crypt_req
    e69a7b0a71b65 crypto: virtio - Add spinlock protection with virtqueue notification
    2ed27b5a11743 crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly
    62c89e1992c86 crypto: octeontx - Fix length check to avoid truncation in ucode_load_store
    d75207465eed2 crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode
    65a0016016e8b ALSA: hda/conexant: Add quirk for HP ZBook Studio G4
    be7a9bcee0ca6 Bluetooth: btusb: Add USB ID 7392:e611 for Edimax EW-7611UXB
    8d76b2488eb3c driver core: enforce device_lock for driver_match_device()
    16c8be3d55441 smb: client: let send_done handle a completion without IB_SEND_SIGNALED
    6bf260ace7301 smb: client: let smbd_post_send_negotiate_req() use smbd_post_send()
    69ce4ae2ab65c smb: client: fix last send credit problem causing disconnects
    cca0526ef2344 smb: client: make use of smbdirect_socket.send_io.bcredits
    9eff83600edf6 smb: client: use smbdirect_send_batch processing
    d059e5fc49755 smb: client: introduce and use smbd_{alloc, free}_send_io()
    1f3e8e2c67cbc smb: client: split out smbd_ib_post_send()
    8786127068d51 smb: client: port and use the wait_for_credits logic used by server
    1fe0f989beb8b smb: client: remove pointless sc->send_io.pending handling in smbd_post_send_iter()
    2b08ca3ab6cc5 smb: client: remove pointless sc->recv_io.credits.count rollback
    b9ec75aba3c8f smb: client: let smbd_post_send() make use of request->wr
    5b69ba9978dd0 smb: client: let recv_done() queue a refill when the peer is low on credits
    f664e6e8a8110 smb: client: make use of smbdirect_socket.recv_io.credits.available
    24082642654f3 smb: server: let send_done handle a completion without IB_SEND_SIGNALED
    85bf0a73831cc smb: server: fix last send credit problem causing disconnects
    5ef18a2e66f2f smb: server: make use of smbdirect_socket.send_io.bcredits
    cea7afb097b00 smb: server: let recv_done() queue a refill when the peer is low on credits
    66c082e3d4651 smb: server: make use of smbdirect_socket.recv_io.credits.available
    88cf40f7b5fb4 smb: smbdirect: introduce smbdirect_socket.send_io.bcredits.*
    e811e60e1cc79 smb: smbdirect: introduce smbdirect_socket.recv_io.credits.available
    cd25e0d809531 smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()
    e4a8a96a93d08 ksmbd: add chann_lock to protect ksmbd_chann_list xarray
    71b5e7c528315 ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths
    c4b9edd559873 smb: client: split cached_fid bitfields to avoid shared-byte RMW races
    1658b66fed206 io_uring: allow io-wq workers to exit when unused
    f02693a40e407 io_uring/io-wq: add exit-on-idle state
    41cec610f6906 Linux 6.18.10
    31b593fbece63 riscv: Add intermediate cast to 'unsigned long' in __get_user_asm
    ecd164120c248 ALSA: usb-audio: Use the right limit for PCM OOB check
    24ad4cfac0b8e ALSA: hda/realtek: Really fix headset mic for TongFang X6AR55xU.
    57bac08056787 spi: tegra114: Preserve SPI mode bits in def_command1_reg
    b8eec12aa666c spi: tegra: Fix a memory leak in tegra_slink_probe()
    2ac3a105e5149 spi: tegra210-quad: Protect curr_xfer check in IRQ handler
    d51554dc05695 spi: tegra210-quad: Protect curr_xfer clearing in tegra_qspi_non_combined_seq_xfer
    3bc293d5b5650 spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer
    2d3c0122e9611 spi: tegra210-quad: Protect curr_xfer assignment in tegra_qspi_setup_transfer_one
    51013068438ac spi: tegra210-quad: Move curr_xfer read inside spinlock
    e1777c400b7a9 spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed transfer
    b767cf2d4efc8 regulator: spacemit-p1: Fix n_voltages for BUCK and LDO regulators
    3f9b508b3eecc i2c: imx: preserve error state in block data length handler
    e71e3fa90a151 gpio: loongson-64bit: Fix incorrect NULL check after devm_kcalloc()
    279cb9180510f ASoC: amd: fix memory leak in acp3x pdm dma ops
    8434b351cd4ea ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update()
    01d2fb15f15c1 firmware: cs_dsp: rate-limit log messages in KUnit builds
    abd66845227c5 firmware: cs_dsp: Factor out common debugfs string read
    b8ad2d53f706a ipv6: Fix ECMP sibling count mismatch when clearing RTF_ADDRCONF
    f3ed399e9aa6f nvme-pci: handle changing device dma map requirements
    3c58f6121863c drm/xe/guc: Fix CFI violation in debugfs access.
    8b68a45f9722f netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()
    32ddd09d1103e hwmon: (occ) Mark occ_init_attribute() as __printf
    8abb71d4a1dce drm/xe/pm: Disable D3Cold for BMG only on specific platforms
    7c5db0957a230 drm/xe/query: Fix topology query pointer advance
    184a84f03b5e6 drm/mgag200: fix mgag200_bmc_stop_scanout()
    2e5edb69e5d0e net: gro: fix outer network offset
    589a530ae44d0 net: add proper RCU protection to /proc/net/ptype
    9f42cb8fafd6d net: ethernet: adi: adin1110: Check return value of devm_gpiod_get_optional() in adin1110_check_spi()
    100f3bf914612 drm/amd/display: fix wrong color value mapping on MCM shaper LUT
    0031f8829c7fb wifi: iwlwifi: mvm: pause TCM on fast resume
    9b9f52f052f49 wifi: iwlwifi: mld: cancel mlo_scan_start_wk
    5a2b4b0e9c003 net: enetc: Convert 16-bit register reads to 32-bit for ENETC v4
    566ea5769ec27 net: enetc: Convert 16-bit register writes to 32-bit for ENETC v4
    f346253e5fd95 net: enetc: Remove CBDR cacheability AXI settings for ENETC v4
    d98745c68023f net: enetc: Remove SI/BDR cacheability AXI settings for ENETC v4
    c175b1eaf729e tipc: use kfree_sensitive() for session key material
    f3931416cbdd0 net: rss: fix reporting RXH_XFRM_NO_CHANGE as input_xfrm for contexts
    2718ae6af7445 linkwatch: use __dev_put() in callers to prevent UAF
    64cf3016234ce io_uring/zcrx: fix page array leak
    fad7334082cd1 net: don't touch dev->stats in BPF redirect paths
    8860ddf0e07be hwmon: (acpi_power_meter) Fix deadlocks related to acpi_power_meter_notify()
    1b2efc593dca9 net: usb: r8152: fix resume reset deadlock
    cdedcd5aa3f3c macvlan: fix error recovery in macvlan_common_newlink()
    c9e4daf62ca07 net: sfp: Fix quirk for Ubiquiti U-Fiber Instant SFP module
    8553bf2e09828 i40e: drop udp_tunnel_get_rx_info() call from i40e_open()
    07bb882485f89 ice: drop udp_tunnel_get_rx_info() call from ndo_open()
    7565d4df66b66 ice: Fix PTP NULL pointer dereference during VSI rebuild
    ef72678c9df0e ice: PTP: fix missing timestamps on E825 hardware
    6801ef140fc33 ice: fix missing TX timestamps interrupts on E825 devices
    1b381a638e185 dpaa2-switch: add bounds check for if_id in IRQ handler
    4640fa5ad5e1a net: liquidio: Fix off-by-one error in VF setup_nic_devices() cleanup
    293eaad0d6d6b net: liquidio: Fix off-by-one error in PF setup_nic_devices() cleanup
    d028147ae0640 net: liquidio: Initialize netdev pointer before queue setup
    155eb99aff292 dpaa2-switch: prevent ZERO_SIZE_PTR dereference when num_ifs is zero
    8a672f177ebe1 net/sched: cls_u32: use skb_header_pointer_careful()
    9b186feb75267 net: add skb_header_pointer_careful() helper
    f8611a7981cd0 hwmon: (dell-smm) Add Dell G15 5510 to fan control whitelist
    9ee608a64e37c smb/client: fix memory leak in smb2_open_file()
    faff38ebbfe63 platform/x86/intel/tpmi/plr: Make the file domain<n>/status writeable
    9029ccfab2ca9 platform/x86: hp-bioscfg: Skip empty attribute names
    6c45a5a7e1e3b platform/x86: intel_telemetry: Fix PSS event register mask
    f93ae43780b75 platform/x86: toshiba_haps: Fix memory leaks in add/remove routines
    245ff08e261ce Revert "drm/amd/display: pause the workload setting in dm"
    98bf5bc8cb8cb tracing: Avoid possible signed 64-bit truncation
    6dd87f6afe9e9 ALSA: hda/realtek: ALC269 fixup for Lenovo Yoga Book 9i 13IRU8 audio
    3228b2eceb6c3 btrfs: reject new transactions if the fs is fully read-only
    b4b065a880997 wifi: mac80211: don't increment crypto_tx_tailroom_needed_cnt twice
    ccb3c75d57039 btrfs: sync read disk super and set block size
    7a1bec39c014e wifi: mac80211: correctly check if CSA is active
    990e40fb1d111 btrfs: fix Wmaybe-uninitialized warning in replay_one_buffer()
    3835e49e146a4 scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()
    108cbf2b7d295 ALSA: hda/realtek: Fix headset mic for TongFang X6AR55xU
    1d5f2329ab4df io_uring/rw: free potentially allocated iovec on cache put failure
    c65a1a72a41e4 riscv: Use 64-bit variable for output in __get_user_asm
    4530f4e4d0e6a scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()
    8a7ef96e6af91 wifi: cfg80211: Fix bitrate calculation overflow for HE rates
    36e88bd40a8c0 spi: intel-pci: Add support for Nova Lake SPI serial flash
    7178b36de1850 ALSA: usb-audio: Add delay quirk for MOONDROP Moonriver2 Ti
    f08f2d2907675 regmap: maple: free entry on mas_store_gfp() failure
    7d4c9c448c2b3 spi: hisi-kunpeng: Fixed the wrong debugfs node name in hisi_spi debugfs initialization
    66b73d3f2cfc7 ALSA: hda/tas2781: Add newly-released HP laptop
    e6ce61e01c9a2 ASoC: tlv320adcx140: Propagate error codes during probe
    3ba3d959c17aa ASoC: amd: yc: Fix microphone on ASUS M6500RE
    1c90f930e7b41 nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()
    62932d9ed639a ALSA: usb-audio: Prevent excessive number of frames
    e810b290922c5 nvme-fc: release admin tagset if init fails
    a883080063f97 ASoC: simple-card-utils: Check device node before overwrite direction
    61fa85497c7b7 ASoC: davinci-evm: Fix reference leak in davinci_evm_probe
    9f665b3c3d9a1 dmaengine: mmp_pdma: Fix race condition in mmp_pdma_residue()
    921903d73967f ASoC: Intel: sof_sdw: Add new quirks for PTL on Dell with CS42L43
    74309a4b0ffc7 wifi: mac80211: collect station statistics earlier when disconnect
    da1880c7b6b83 HID: Elecom: Add support for ELECOM M-XT3DRBK (018C)
    71434e45bf124 HID: logitech: add HID++ support for Logitech MX Anywhere 3S
    b1f8285bc8e35 riscv: trace: fix snapshot deadlock with sbi ecall
    151589d15ee87 ring-buffer: Avoid softlockup in ring_buffer_resize() during memory free
    cd7ff7fd3e4b7 drm/amd/pm: Disable MMIO access during SMU Mode 1 reset
    ecb8653a8fe9d HID: Apply quirk HID_QUIRK_ALWAYS_POLL to Edifier QR30 (2d99:a101)
    1e84a807c98a7 HID: Intel-thc-hid: Intel-thc: Add safety check for reading DMA buffer
    2124279f1f8c3 HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()
    6e2108daed94e HID: quirks: Add another Chicony HP 5MP Cameras to hid_ignore_list
    645671377158f drm/amd/display: Reduce number of arguments of dcn30's CalculatePrefetchSchedule()
    eb5d6dedadd66 netfilter: replace -EEXIST with -EBUSY
    ddab2d0f93200 PCI: qcom: Remove ASPM L0s support for MSM8996 SoC
    3210077ed2648 ALSA: hda/realtek: add HP Laptop 15s-eq1xxx mute LED quirk
    5b9bbe3d7bb90 x86/sev: Disable GCOV on noinstr object
    75f1f512b1567 ALSA: hda/realtek: Add quirk for Acer Nitro AN517-55
    747b9a7d4c712 HID: playstation: Center initial joystick axes to prevent spurious events
    7ae5b35148119 HID: intel-ish-hid: Reset enum_devices_done before enumeration
    8b44e75379510 riscv: Sanitize syscall table indexing under speculation
    28768bd3abf99 btrfs: fix reservation leak in some error paths when inserting inline extent
    a206870513cda HID: multitouch: add MT_QUIRK_STICKY_FINGERS to MT_CLS_VTL
    ea5ef771f3c26 HID: intel-ish-hid: Update ishtp bus match to support device ID table
    6de3a371a8b9f btrfs: do not free data reservation in fallback from inline due to -ENOSPC
    70dd3513ed6ac smb/server: fix refcount leak in parse_durable_handle_context()
    c2ed4f71e9288 LoongArch: Enable exception fixup for specific ADE subcode
    2bb9c8a77df50 io_uring: use GFP_NOWAIT for overflow CQEs on legacy rings
    4665e52bde3b1 smb/server: fix refcount leak in smb2_open()
    0107b18cd8ac1 md: suspend array while updating raid_disks via sysfs
    9531210f348aa LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED
    fdda836fcee6f smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe()
    f309b2c7df659 block,bfq: fix aux stat accumulation destination
    86acdc1791944 platform/x86: dell-lis3lv02d: Add Latitude 5400
    ff6892ea544c4 wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP
    6b7c60feab3c6 net: usb: sr9700: support devices with virtual driver CD
    10d3ff7e5812c wifi: mac80211: don't WARN for connections on invalid channels
    689a7980e4788 wifi: wlcore: ensure skb headroom before skb_push
    e0bd226804f8e wifi: mac80211: ocb: skip rx_no_sta when interface is not joined
    abd219fd48b11 tracing: Fix ftrace event field alignments
    116ffca92dc4d binderfs: fix ida_alloc_max() upper bound
    e9bcfe865188a binder: fix BR_FROZEN_REPLY error log
    a6050dedb6f1c binder: fix UAF in binder_netlink_report()
    287221c5e0707 rust_binderfs: fix ida_alloc_max() upper bound
    685bb05d307ac rust_binder: add additional alignment checks
    598fe3ff32e43 rust_binder: correctly handle FDA objects of length zero
    13de38aa3ea7a sched/fair: Have SD_SERIALIZE affect newidle balancing
    de7cb4282dafc sched/fair: Skip sched_balance_running cmpxchg when balance is not due
    3a15c519d2b0f bus: mhi: host: pci_generic: Add Telit FE990B40 modem support
    fa2274bb17a4a treewide: Drop pci_save_state() after pci_restore_state()
    71c50e60421bb PCI/ERR: Ensure error recoverability at all times
    1a893bd719121 hwmon: (gpio-fan) Allow to stop FANs when CONFIG_PM is disabled
    37751b6d0b6b5 hwmon: (gpio-fan) Fix set_rpm() return value
    4385b2f284354 KVM: Don't clobber irqfd routing type when deassigning irqfd
    7a245ef476ffb KVM: selftests: Add -U_FORTIFY_SOURCE to avoid some unpredictable test failures
    a82647e1a9499 net: spacemit: k1-emac: fix jumbo frame support
    d5b3a66986697 net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue
    488009aa62bb1 net: cpsw: Execute ndo_set_rx_mode callback in a work queue
    ef763b480a3de nouveau/gsp: fix suspend/resume regression on r570 firmware
    a20887d5239a3 nouveau/gsp: use rpc sequence numbers properly.
    9cc8caba82c2b nouveau: add a third state to the fini handler.
    5f645222eb30c Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem"
    7b6a0f121d502 mm, shmem: prevent infinite loop on truncate race
    41a7b9ab855c8 gve: Correct ethtool rx_dropped calculation
    11f8311f69e4c gve: Fix stats report corruption on queue count change
    e9cdd54797dc2 drm/amd: Set minimum version for set_hw_resource_1 on gfx11 to 0x52
    d3081353acaa6 cgroup/dmem: avoid pool UAF
    5c38604abbfa5 cgroup/dmem: avoid rcu warning when unregister region
    c13816e8fa23d cgroup/dmem: fix NULL pointer dereference when setting max
    e258ed369c9e0 ceph: fix oops due to invalid pointer for kfree() in parse_longname()
    35e6fd0d5bc30 ARM: 9468/1: fix memset64() on big-endian
    46dfdb6f7a79d rbd: check for EOD after exclusive lock is ensured to be held
    57b36ffc8881d ceph: fix NULL pointer dereference in ceph_mds_auth_match()
    e8af57e090790 mm/slab: Add alloc_tagging_slab_free_hook for memcg_alloc_abort_single
    cbc03ce3e6ce7 procfs: avoid fetching build ID while holding VMA lock
    eb54ce033b344 pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc->domains
    11ca03ce17d7d pmdomain: imx8mp-blk-ctrl: Keep usb phy power domain on for system wakeup
    5171a3dddf427 pmdomain: imx: gpcv2: Fix the imx8mm gpu hang due to wrong adb400 reset
    72129d55be9ce pmdomain: imx8mp-blk-ctrl: Keep gpc power domain on for system wakeup
    d72563e402bab pmdomain: qcom: rpmpd: fix off-by-one error in clamping to the highest state
    5727ccf9d19ca ALSA: aloop: Fix racy access at PCM trigger
    21816bbc8492f platform/x86: intel_telemetry: Fix swapped arrays in PSS output
    b5a02290ee3a4 KVM: x86: Explicitly configure supported XSS from {svm,vmx}_set_cpu_caps()
    a94b956bb7272 x86/kfence: fix booting on 32bit non-PAE systems
    feb603a69f830 x86/vmware: Fix hypercall clobbers
    ab200d71553bd nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agolinux-yocto/6.18: update CVE exclusions (6.18.9)
Bruce Ashfield [Mon, 2 Mar 2026 04:55:28 +0000 (23:55 -0500)] 
linux-yocto/6.18: update CVE exclusions (6.18.9)

Data pulled from: https://github.com/CVEProject/cvelistV5

    1/1 [
        Author: cvelistV5 Github Action
        Email: github_action@example.com
        Subject: 4 changes (4 new | 0 updated): - 4 new CVEs: CVE-2026-25931, CVE-2026-25934, CVE-2026-25938, CVE-2026-25939 - 0 updated CVEs:
        Date: Mon, 9 Feb 2026 22:23:00 +0000

    ]

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agolinux-yocto/6.18: update to v6.18.9
Bruce Ashfield [Mon, 2 Mar 2026 04:55:27 +0000 (23:55 -0500)] 
linux-yocto/6.18: update to v6.18.9

Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:

    adb851edb7078 Linux 6.18.9
    0d26aa84ff0b7 mptcp: avoid dup SUB_CLOSED events after disconnect
    01b0831d71b6d sched_ext: Fix SCX_KICK_WAIT to work reliably
    664e78f2d4ec3 sched_ext: Don't kick CPUs running higher classes
    edb9fab1b78c6 net/sched: act_ife: convert comma to semicolon
    5b22c6cbabc78 Revert "drm/nouveau/disp: Set drm_mode_config_funcs.atomic_(check|commit)"
    ab21cf885fb2a libbpf: Fix -Wdiscarded-qualifiers under C23
    f749b366b8e79 gpiolib: acpi: Fix potential out-of-boundary left shift
    84df65fcfbff1 iommu/tegra241-cmdqv: Reset VCMDQ in tegra241_vcmdq_hw_init_user()
    078377b07f8e8 drm/amdgpu: Fix cond_exec handling in amdgpu_ib_schedule()
    ac251d17d8af5 drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove
    2d9bff2af0adb drm/amdgpu/gfx12: adjust KGQ reset sequence
    d9790cf8bbe80 drm/amdgpu/gfx12: fix wptr reset in KGQ init
    4867b512bb7f5 drm/amdgpu/gfx11: adjust KGQ reset sequence
    018892bd9a0c0 drm/amdgpu/gfx11: fix wptr reset in KGQ init
    75ebd42441702 drm/amdgpu/gfx10: fix wptr reset in KGQ init
    9a6d87fbe3f51 drm/amdgpu/soc21: fix xclk for APUs
    5f841c308c453 drm/amd/pm: fix smu v14 soft clock frequency setting issue
    191e22e5d742e drm/amd/pm: fix smu v13 soft clock frequency setting issue
    ca68745e820ec drm/imx/tve: fix probe device leak
    31203f5680c3d drm/msm/a6xx: fix bogus hwcg register updates
    a4ea228271cd4 drm/tyr: depend on `COMMON_CLK` to fix build error
    3e845c46dfe5a drm/xe/xelp: Fix Wa_18022495364
    ae8831ee0fb2f drm: Do not allow userspace to trigger kernel warnings in drm_gem_change_handle_ioctl()
    dd222df5b356e scripts: generate_rust_analyzer: Add compiler_builtins -> core dep
    8afa6c4d7abfb scripts: generate_rust_analyzer: fix resolution of #[pin_data] macros
    2426867644cc7 scripts: generate_rust_analyzer: compile sysroot with correct edition
    ce798a0fe6b79 scripts: generate_rust_analyzer: remove sysroot assertion
    595718c74f85b scripts: generate_rust_analyzer: Add pin_init_internal deps
    5bfa32ff75b50 scripts: generate_rust_analyzer: Add pin_init -> compiler_builtins dep
    e82f822ed1472 rust: sync: refcount: always inline functions using build_assert with arguments
    4bb727f4b0614 rust: sync: atomic: Provide stub for `rusttest` 32-bit hosts
    625605ac8be50 rust: bits: always inline functions using build_assert with arguments
    3d48d59235c49 net: fix segmentation of forwarding fraglist GRO
    b23bee8cdb7aa mm/shmem, swap: fix race of truncate and swap entry split
    40aed8b856580 mm/memory-failure: teach kill_accessing_process to accept hugetlb tail page pfn
    b0020cbd26380 mm, swap: restore swap_space attr aviod kernel panic
    4f57516293fda mm/memory-failure: fix missing ->mf_stats count in hugetlb poison
    c71fae335dfe7 mm/kfence: randomize the freelist on initialization
    629666d20c7dc btrfs: do not strictly require dirty metadata threshold for metadata writepages
    b91a84299d72a flex_proportions: make fprop_new_period() hardirq safe
    131af3df59b24 selftests: mptcp: join: fix local endp not being tracked
    e73aab3337833 selftests: mptcp: check subflow errors in close events
    8d4ccc10a77f0 selftests: mptcp: check no dup close events after error
    35bb480000cd2 mptcp: only reset subflow errors when propagated
    33f971476ffc1 mm/kasan: fix KASAN poisoning in vrealloc()
    0ac0e2e64b068 gpio: rockchip: Stop calling pinctrl for set_direction
    f69cae1bf44ca ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine
    68207ceefd71c nvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference
    e4e15a0a4403c efivarfs: fix error propagation in efivar_entry_get()
    14ca9fa020829 scsi: qla2xxx: edif: Fix dma_free_coherent() size
    5ba425a7bab31 kbuild: rust: clean libpin_init_internal in mrproper
    e4c0a92146ddf gpio: pca953x: mask interrupts in irq shutdown
    cb69b0a0c0aaf ASoC: amd: yc: Add DMI quirk for Acer TravelMate P216-41-TCO
    98e0bc206a321 scsi: be2iscsi: Fix a memory leak in beiscsi_boot_get_sinfo()
    91539cf522ed0 ASoC: fsl: imx-card: Do not force slot width to sample width
    8b581837295fc rust: kbuild: give `--config-path` to `rustfmt` in `.rsi` target
    50c66cb08070c rust: rbtree: fix documentation typo in CursorMut peek_next method
    fe9a1a825b4ae riscv: compat: fix COMPAT_UTS_MACHINE definition
    b038874e31fc3 firewire: core: fix race condition against transaction list
    a28fce0365e1c perf: sched: Fix perf crash with new is_user_task() helper
    112d497809970 pinctrl: qcom: sm8350-lpass-lpi: Merge with SC7280 to fix I2S2 and SWR TX pins
    e81d1bc4ea791 pinctrl: meson: mark the GPIO controller as sleeping
    e0468c4527a22 pinctrl: lpass-lpi: implement .get_direction() for the GPIO driver
    b1f41c1f0bbbe writeback: fix 100% CPU usage when dirtytime_expire_interval is 0
    36370892e3111 sched/deadline: Fix 'stuck' dl_server
    0bbcb7586bc81 sched/deadline: Document dl_server
    32887d8e4bc06 drm/xe/nvm: Fix double-free on aux add failure
    02dc6cf6409e5 drm/xe/nvm: Manage nvm aux cleanup with devres
    2859fa957a936 drm/xe/configfs: Fix is_bound() pci_dev lifetime
    64364ccf491c7 dma/pool: distinguish between missing and exhausted atomic pools
    d36c4149ea224 bcache: fix I/O accounting leak in detached_dev_do_request
    7b72d76a58e6b bcache: use bio cloning for detached device requests
    db6e287bd6e80 bcache: fix improper use of bi_end_io
    23f9f9c46edd9 of: reserved_mem: Allow reserved_mem framework detect "cma=" kernel param
    14e32032c42fe of/reserved_mem: Simplify the logic of fdt_scan_reserved_mem_reg_nodes()
    8d9c5ceff4b53 kbuild: Fix permissions of modules.builtin.modinfo
    32d8f998bb8d4 kbuild: rpm-pkg: Generate debuginfo package manually
    d4dbada7ac6f3 gpio: brcmstb: correct hwirq to bank map
    546e62c3fb29a drm/amd/pm: fix race in power state check before mutex lock
    7bec90f605cfb gpio: virtuser: fix UAF in configfs release path
    c0ce86d92565b gpiolib: acpi: use BIT_ULL() for u64 mask in address space handler
    ecb638fb9a5cc ASoC: Intel: sof_es8336: fix headphone GPIO logic inversion
    e67828aeb58d9 drm/xe: Skip address copy for sync-only execs
    4d7b7abb525b4 ASoC: soc-acpi-intel-ptl-match: fix name_prefix of rt1320-2
    a42bdbcada187 scsi: firewire: sbp-target: Fix overflow in sbp_make_tpg()
    aabc36857bd39 wifi: mac80211: correctly decode TTLM with default link map
    a4f9a19a266e6 wifi: mac80211: apply advertised TTLM from association response
    b8d890f8c3223 wifi: mac80211: parse all TTLM entries
    cc3f137d36fda net/mlx5e: Skip ESN replay window setup for IPsec crypto offload
    19bb3c68e18cf net/mlx5: Fix vhca_id access call trace use before alloc
    fc3da1466af5f net/mlx5: Initialize events outside devlink lock
    2614734c4bc67 net/mlx5: fs, Fix inverted cap check in tx flow table root disconnect
    335031cacd7e8 net: phy: micrel: fix clk warning when removing the driver
    92db64d3546f9 net/mlx5e: don't assume psp tx skbs are ipv6 csum handling
    f4bb58e14f042 net: bridge: fix static key check
    c3369fc5e6120 nfc: nci: Fix race between rfkill and nci_unregister_device().
    92e0483402afc net/mlx5e: Account for netdev stats in ndo_get_stats64
    fdf8437016f57 net/mlx5e: TC, delete flows only for existing peers
    2df2aad9cf2f4 ice: stop counting UDP csum mismatch as rx_errors
    36126ddbe9247 ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues
    214aed313f7a5 ixgbe: don't initialize aci lock in ixgbe_recovery_probe()
    c721ea2ff5672 ixgbe: fix memory leaks in the ixgbe_recovery_probe() path
    bd25b092a06a3 bonding: fix use-after-free due to enslave fail after slave array update
    61858cbce6ca4 nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame().
    fdb99161cbef2 net: spacemit: Check for netif_carrier_ok() in emac_stats_update()
    1f1b9523527df mptcp: fix race in mptcp_pm_nl_flush_addrs_doit()
    dce375f4afc34 rocker: fix memory leak in rocker_world_port_post_fini()
    cdc4deb9e7be2 net/mlx5: Fix return type mismatch in mlx5_esw_vport_vhca_id()
    2c0fb0f60bc15 net: wwan: t7xx: fix potential skb->frags overflow in RX path
    500c1237c9a13 ipv6: use the right ifindex when replying to icmpv6 from localhost
    0b74c6e132737 net: mvpp2: cls: Fix memory leak in mvpp2_ethtool_cls_rule_ins()
    590c8179ffb01 sfc: fix deadlock in RSS config read
    bd98324e327e4 bonding: annotate data-races around slave->last_rx
    d753f3c3f9d7a octeon_ep: Fix memory leak in octep_device_setup()
    f14d881f0a5aa net: bcmasp: fix early exit leak with fixed phy
    713ba826ae114 can: gs_usb: gs_usb_receive_bulk_callback(): fix error message
    23f40dbda938e net/mlx5: Fix memory leak in esw_acl_ingress_lgcy_setup()
    3b63185053788 Bluetooth: MGMT: Fix memory leak in set_ssp_complete
    03e8c90c62233 Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work
    4081d53864dae can: at91_can: Fix memory leak in at91_can_probe()
    e80617a5e1c24 btrfs: zlib: fix the folio leak on S390 hardware acceleration
    474f851ec5e2e readdir: require opt-in for d_type flags

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agotestimage.bbclass: enable PTEST_RUNNER_TIMEOUT variable
Tim Orling [Fri, 27 Feb 2026 19:39:30 +0000 (11:39 -0800)] 
testimage.bbclass: enable PTEST_RUNNER_TIMEOUT variable

QB_MEM works in recipe scope because testimage.bbclass reads it from the
current recipe datastore (d) at test time via the qemuboot.conf mechanism.
PTEST_RUNNER_TIMEOUT was only available through testdata.json (written
during image build via export2json). The testimage task reads td from the
potentially stale testdata.json, and PTEST_RUNNER_TIMEOUT was never
refreshed from the live recipe context.

[YOCTO #16163]

Signed-off-by: Tim Orling <tim.orling@konsulko.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agocore-image-ptest: add PTEST_RUNNER_TIMEOUT
Tim Orling [Fri, 27 Feb 2026 19:39:29 +0000 (11:39 -0800)] 
core-image-ptest: add PTEST_RUNNER_TIMEOUT

In lib/oeqa/runtime/cases/ptest.py, the timeout used to be hardcoded to 450 seconds.
Now that it is a variable, make that a bit more obvious by setting a default value.

Set PTEST_RUNNER_TIMEOUT for python3-cffi to 600 seconds as it is known to come close
to and surpass the 450 second limit under heavy load.

Fixes: [YOCTO #16163]
Signed-off-by: Tim Orling <tim.orling@konsulko.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agooeqa/runtime/ptest: Make ptest-runner timeout configurable
Tim Orling [Fri, 27 Feb 2026 19:39:28 +0000 (11:39 -0800)] 
oeqa/runtime/ptest: Make ptest-runner timeout configurable

Replace the hardcoded 450 second timeout with a configurable
PTEST_RUNNER_TIMEOUT variable, defaulting to 450 seconds.

[YOCTO #16163]

Signed-off-by: Tim Orling <tim.orling@konsulko.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agokernel-fit-image: support arbitrary loadables
Francesco Valla [Sun, 1 Mar 2026 21:17:03 +0000 (22:17 +0100)] 
kernel-fit-image: support arbitrary loadables

Allow a user to insert additional, arbitrary loadables in a FIT image.
The loadables can be specified through the FIT_LOADABLES variable as
a list, with parameters defined by flags on dedicated FIT_LOADABLE_*
variables; they will be included in all configurations.

Sensible defaults will be used for some parameters (type, compression,
description, arch, os) if the corresponding flag is not set, while
others (load address and entry point) will be omitted in the final FIT
image.

As an example, the following configuration can be specified to add as
loadables a TF-A BL31 firmware and a (compressed) TEE firmware, to be
loaded respectively at 0x204E0000 and 0x96000000:

  FIT_LOADABLES = "atf tee"

  FIT_LOADABLE_FILENAME[atf] = "bl31.bin"
  FIT_LOADABLE_TYPE[atf] = "tfa-bl31"
  FIT_LOADABLE_ARCH[atf] = "arm64"
  FIT_LOADABLE_OS[atf] = "arm-trusted-firmware"
  FIT_LOADABLE_LOADADDRESS[atf] = "0x204E0000"

  FIT_LOADABLE_FILENAME[tee] = "tee.bin.gz"
  FIT_LOADABLE_COMPRESSSION[tee] = "gzip"
  FIT_LOADABLE_TYPE[tee] = "tee"
  FIT_LOADABLE_OS[tee] = "tee"
  FIT_LOADABLE_LOADADDRESS[tee] = "0x21000000"

Signed-off-by: Francesco Valla <francesco@valla.it>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agoffmpeg: set status for CVE-2025-12343
Peter Marko [Sat, 28 Feb 2026 21:45:01 +0000 (22:45 +0100)] 
ffmpeg: set status for CVE-2025-12343

Per [1] is patch for this CVE [2].
This is equivalent of [3] which is included in n8.0.

[1] https://security-tracker.debian.org/tracker/CVE-2025-12343
[2] https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/b8d5f65b9e89d893f27cf00799dbc15fc0ca2f8e
[3] https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/263e819aa45cd3c48bf6887be02b4ec504c02048

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agobusybox: Fixes CVE-2025-60876
Livin Sunny [Fri, 27 Feb 2026 22:38:02 +0000 (16:38 -0600)] 
busybox: Fixes CVE-2025-60876

This addresses CVE-2025-60876[1], which allows malicious URLs to inject
HTTP headers. It has been accepted by Debian[2] and is tracked here [4].
The upstream fix has been submitted [3] and is pending merge.

[1] https://nvd.nist.gov/vuln/detail/CVE-2025-60876
[2] https://bugs.debian.org/1120795
[3] https://lists.busybox.net/pipermail/busybox/2025-November/091840.html
[4] https://security-tracker.debian.org/tracker/CVE-2025-60876

Upstream-Status: Submitted [https://lists.busybox.net/pipermail/busybox/2025-November/0918
40.html]

Signed-off-by: Livin Sunny <livinsunny519@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agotoolchain-scripts-base.bbclass: remove timestamp
Changqing Li [Sat, 28 Feb 2026 09:27:52 +0000 (17:27 +0800)] 
toolchain-scripts-base.bbclass: remove timestamp

This timestamp makes the package meta-environment-qemux86-64 not
reproducible, and it is the time when the package is built, mabybe not
that important, the key info is the meta revision.

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agotcl8: skip more timing-sensitive tests
Ross Burton [Fri, 27 Feb 2026 14:08:45 +0000 (14:08 +0000)] 
tcl8: skip more timing-sensitive tests

Skip more tests, as we already do for the tcl9 recipe.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agooeqa/selftest/sdk: add test_sdk_runqemu
Chen Qi [Fri, 27 Feb 2026 02:24:21 +0000 (02:24 +0000)] 
oeqa/selftest/sdk: add test_sdk_runqemu

Add test case to ensure runqemu works in SDK.

Using runqemu from SDK has been supported for many years. Add a
test case to ensure we have no regression.

Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agorunqemu: restore support to run inside SDK
Chen Qi [Fri, 27 Feb 2026 02:24:20 +0000 (02:24 +0000)] 
runqemu: restore support to run inside SDK

Using runqemu from SDK has been supported for a long time[1].

Below are example steps for using runqemu inside SDK.
1. mkdir destdir
2. cp -r /path/to/build/tmp/deploy/image/qemux86-64 destdir
3. Install SDK to destdir
4. Source SDK
5. runqemu qemux86-64 nographic slirp

Recently the related code path was deleted by accident during
an effort to make codes cleaner and more consistent.

We need to restore support for it.

What actually matters is the STAGING_BINDIR_NATIVE, which we
use to locate the qemu binary. So in case of SDK, we set it
from OECORE_NATIVE_SYSROOT. The STAGING_DIR_NATIVE checking
and setting are meaningless, thus deleting it.

[1] https://git.openembedded.org/openembedded-core/commit/?id=93649edc034f2540ff55dc9b41638797209cfb9c

Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agogawk: upgrade from 5.3.2 -> 5.4.0
Randy MacLeod [Fri, 27 Feb 2026 00:09:58 +0000 (19:09 -0500)] 
gawk: upgrade from 5.3.2 -> 5.4.0

Changes:
  https://lists.gnu.org/archive/html/info-gnu/2026-02/msg00011.html

A notable change is:
   1. This release now uses Mike Haertel's MinRX regular expression matcher
      as the default regexp engine. The old regex and dfa engines are still
      available.
The former regex matcher is selectable at run-time by setting the environemnt
variable:
   GAWK_GNU_MATCHERS
More details are available here:
   https://cgit.git.savannah.gnu.org/cgit/gawk.git/tree/README_d/README.matchers?h=gawk-5.4-stable
Switch the tarball from .gz to .xz to reduce size by ~3MB.

No ptests errors for x86-64 for glibc/musl.

Signed-off-by: Randy MacLeod <Randy.MacLeod@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agoopenssl: Package /etc/ssl/openssl.conf.d in openssl-conf
Peter Kjellerstedt [Thu, 26 Feb 2026 21:08:08 +0000 (22:08 +0100)] 
openssl: Package /etc/ssl/openssl.conf.d in openssl-conf

Since the /etc/ssl/openssl.conf file is packaged in openssl-conf, it
makes sense to also add the new /etc/ssl/openssl.conf.d directory to the
same package.

Signed-off-by: Peter Kjellerstedt <peter.kjellerstedt@axis.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agooe-init-build-env: Drop VSCode setup
Adrian Freihofer [Thu, 26 Feb 2026 20:19:50 +0000 (21:19 +0100)] 
oe-init-build-env: Drop VSCode setup

Remove the VSCode setup from oe-init-build-env.

Since poky as a combo-layer repository is no longer available, using the
oe-init-build-env script from openembedded-core is no longer
straightforward. There are too many ways to set up a build environment,
with different directory structures, with containers involved or not,
etc. Each of these setups may have its own way to provide IDE support.
A simple shell script like oe-init-vscode cannot address all these use
cases. Rather than trying to make oe-init-build-env smart enough to
cover all these cases, it is better to delegate the responsibility to
whatever tool or repository is used to set up the build environment.

If no tool such as bitbake-setup is used, it is still possible to use
a variant of the oe-setup-vscode script from a custom layer. One way
which works well is to create a custom oe-init-build-env script in the
custom layer repository which calls the custom oe-setup-vscode script
from the custom layer repository. Example directory structure:

  my-project/
  ├── .vscode     # generated by oe-setup-vscode
  |               # when oe-init-build-env is called
  ├── layers/
  │   └── openembedded-core/
  |   └── bitbake/
  ├── scripts/
  │   └── oe-setup-vscode
  ├── build/
  │   └── conf
  └── oe-init-build-env

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agoperl: upgrade from 5.40.2 to 5.42.0
Changqing Li [Thu, 26 Feb 2026 11:24:38 +0000 (19:24 +0800)] 
perl: upgrade from 5.40.2 to 5.42.0

License-Update: Update copies of GPL to match recent FSF changes

Changes: https://perldoc.perl.org/5.42.0/perldelta

Update RDEPENDS for perl-module-extutils-parsexs, refer [1], this should
fix libmodule-build-perl ptest failure:
Failed to load or import from ExtUtils::ParseXS (version 3.57). Please
check that ExtUtils::ParseXS is installed correctly and that the newest
version will be found in your @INC path: Can't locate
ExtUtils/ParseXS/Node.pm in @INC

[1] https://github.com/Perl/perl5/commit/36118f523541d3e74ab495202ca8efbd9c9611b5

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agobinutils: Upgrade to 2.46 release
Hemanth Kumar M D [Wed, 25 Feb 2026 11:43:38 +0000 (03:43 -0800)] 
binutils: Upgrade to 2.46 release

New Features:
Support for new instructions added to AMD, ARM and RISC-V architectures.
Support for version 3 of the SFrame standard.
The readelf program can now display the contents of Global Offset Tables.
Improved linker tagging support.

Detailed release notes are here [1]

[1] https://lists.gnu.org/archive/html/info-gnu/2026-02/msg00006.html

Dropped patches:
0001-aarch64-constify-BTI-and-GCS-report-functions.patch
Since the fix is already included in binutils 2.46.

CVE patches: CVE-2025-11081,CVE-2025-11082,CVE-2025-11083,
CVE-2025-11839,CVE-2025-11840,CVE-2025-11412,CVE-2025-11413,
CVE-2025-11414,CVE-2025-11494,CVE-2025-11495.
These were dropped because they are already addressed in binutils 2.46.

Drop CVE_STATUS:
binutils 2.46 has needed fixes for CVE-2025-7545 and CVE-2025-7546.

Rebased existing patches with binutils 2.46.

Fixed elfutils-ptest regression for arm64.

Testing Results:
+----------------------+--------+--------+------+
| Result               | 2.45.1 |  2.46  | Diff |
+----------------------+--------+--------+------+
| Expected Passes      | 318    |  331   | +13  |
| Untested Testcases   | 5      |  5     |  0   |
| Unsupported Tests    | 8      |  6     | -2   |
+----------------------+--------+--------+------+

Testcases changes:
-------------------------------------------------------------------------------
Testcase-name                                             2.45.1        2.46
-------------------------------------------------------------------------------
nm --ifunc-chars=-- (global ifunc)                          -           PASS
nm --ifunc-chars=-- (local ifunc)                           -           PASS
copy with unknown section flag                              -           PASS
objcopy tek2bin                                             -           PASS
binary symbol (implicit)                                    -           PASS
binary symbol (explicit)                                    -           PASS
readelf SFrame V2 (x86-64/test-v2-ET_EXEC.sframe)           -           PASS
objdump SFrame V2 (x86-64/test-v2-ET_EXEC.sframe)           -           PASS
readelf SFrame V2 (x86-64/test-v2-ET_REL.sframe)            -           PASS
objdump SFrame V2 (x86-64/test-v2-ET_REL.sframe)            -           PASS
run objcopy of executable                                UNSUPPORTED    PASS
run stripped executable                                  UNSUPPORTED    PASS
run stripped executable with saving a symbol             UNSUPPORTED    PASS
Copy object attributes v2 data from an object to another    -        UNSUPPORTED

Signed-off-by: Hemanth Kumar M D <Hemanth.KumarMD@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agopython3-rdflib: upgrade 7.5.0 -> 7.6.0
Wang Mingyu [Thu, 26 Feb 2026 03:39:23 +0000 (11:39 +0800)] 
python3-rdflib: upgrade 7.5.0 -> 7.6.0

License-Update: Copyright year updated to 7.6.0

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agowireless-regdb: upgrade 2025.10.07 -> 2026.02.04
Ankur Tyagi [Wed, 25 Feb 2026 19:08:39 +0000 (08:08 +1300)] 
wireless-regdb: upgrade 2025.10.07 -> 2026.02.04

Signed-off-by: Ankur Tyagi <ankur.tyagi85@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agosanity: reject TMPDIR containing redundant slashes
Sam Povilus [Wed, 25 Feb 2026 17:13:24 +0000 (17:13 +0000)] 
sanity: reject TMPDIR containing redundant slashes

A trailing slash or consecutive slashes anywhere in TMPDIR cause
BitBake variable expansion to embed those redundant slashes into
derived variables such as STAGING_DIR and WORKDIR.  The sstate
machinery in sstate_add() normalises its directory arguments via
os.path.normpath(), so manifest entries always contain clean paths.
Functions in staging.bbclass that read the same variables directly
via d.getVar() without normalising then fail to match manifest
entries, silently staging files to wrong locations and causing
do_populate_sysroot to abort.

Although POSIX permits paths with redundant slashes, they break the
string-matching assumptions embedded in the staging machinery, so
treat any TMPDIR that differs from its normalised form as an error.

Signed-off-by: Sam Povilus <sam.povilus@amd.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agou-boot: Copy U-Boot script to B when suffix is not scr
Ricardo Simoes [Wed, 25 Feb 2026 16:27:47 +0000 (17:27 +0100)] 
u-boot: Copy U-Boot script to B when suffix is not scr

With the introduction of the UNPACKDIR variable, commit [1] changed the
expected location of UBOOT_ENV_BINARY to B. This works fine when
UBOOT_ENV_SUFFIX is "scr" but it does not copy the script when it is
not. As documented in [2], it is expected that with any other value of
UBOOT_ENV_SUFFIX the script gets installed verbatim.

This commit fixes that by copying UNPACKDIR/UBOOT_ENV_SRC to
B/UBOOT_ENV_BINARY when UBOOT_ENV_SUFFIX is not "scr", as documented.

[1] https://git.openembedded.org/openembedded-core/commit/?id=62ff94ff40e823065178318133d54e44a3d8a46d

[2] https://docs.yoctoproject.org/ref-manual/variables.html#term-UBOOT_ENV

Signed-off-by: Ricardo Simoes <ricardo.simoes@pt.bosch.com>
Signed-off-by: Mark Jonas <mark.jonas@de.bosch.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agolibseccomp: add diffutils to ptest RDEPENDS
Nikhil R [Wed, 25 Feb 2026 09:16:11 +0000 (14:46 +0530)] 
libseccomp: add diffutils to ptest RDEPENDS

libseccomp ptest needs diff during test execution,
Add diffutils to the runtime ptest dependency.

Signed-off-by: Nikhil R <nikhil.r@bmwtechworks.in>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agopython3-certifi: Upgrade 2026.1.4 -> 2026.2.25
Leon Anavi [Wed, 25 Feb 2026 09:04:20 +0000 (11:04 +0200)] 
python3-certifi: Upgrade 2026.1.4 -> 2026.2.25

Upgrade to release 2026.2.25:

- Updated dependencies

Signed-off-by: Leon Anavi <leon.anavi@konsulko.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agopython3-maturin: Upgrade 1.11.5 -> 1.12.4
Leon Anavi [Wed, 25 Feb 2026 08:50:09 +0000 (10:50 +0200)] 
python3-maturin: Upgrade 1.11.5 -> 1.12.4

Upgrade to release 1.12.4:

- Upgrade memmap2 version
- fix: platform tag detection for Android targets
- fix: only ignore maturin-generated native libraries on all platforms
- fix: ignore develop artifacts for all binding types during build
- feat: support conditional cargo features based on Python version

Signed-off-by: Leon Anavi <leon.anavi@konsulko.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agopython3-hatchling: Upgrade 1.28.0 -> 1.29.0
Leon Anavi [Wed, 25 Feb 2026 08:16:01 +0000 (10:16 +0200)] 
python3-hatchling: Upgrade 1.28.0 -> 1.29.0

Upgrade to release 1.29.0:

- Source Date Epoch no longer fails when set to date before 1980.

Signed-off-by: Leon Anavi <leon.anavi@konsulko.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agopython3-wcwidth: Upgrade 0.5.3 -> 0.6.0
Leon Anavi [Wed, 25 Feb 2026 08:02:28 +0000 (10:02 +0200)] 
python3-wcwidth: Upgrade 0.5.3 -> 0.6.0

Upgrade to release 0.6.0:

- Complete textwrap.wrap() with 6 missing params

Signed-off-by: Leon Anavi <leon.anavi@konsulko.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agodevtool: standard: Add new patches in correct order when finishing
Peter Kjellerstedt [Tue, 24 Feb 2026 23:22:36 +0000 (00:22 +0100)] 
devtool: standard: Add new patches in correct order when finishing

Make sure that new patches that are added as a result of using devtool
finish are added to the SRC_URI in the same order they were committed.

Previously, the order was a result of the arbitrary order the patch
files were returned by os.walk(), which typically resulted in them being
added to the SRC_URI in the reverse order they were committed.

Signed-off-by: Peter Kjellerstedt <peter.kjellerstedt@axis.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agolib/oe/patch: Make GitApplyTree.extractPatches() return the patches
Peter Kjellerstedt [Tue, 24 Feb 2026 23:22:35 +0000 (00:22 +0100)] 
lib/oe/patch: Make GitApplyTree.extractPatches() return the patches

The list of patches will be used by _export_patches() in devtool to add
new patches in the correct order.

Signed-off-by: Peter Kjellerstedt <peter.kjellerstedt@axis.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agosocat: upgrade 1.8.1.0 -> 1.8.1.1
Randy MacLeod [Tue, 24 Feb 2026 21:42:59 +0000 (16:42 -0500)] 
socat: upgrade 1.8.1.0 -> 1.8.1.1

Drop patch:
   0001-fix-compile-failed-with-musl.patch
which is merged upstream:
   a235f59 Avoid compilation issue in xio-netlink.c with Musl libc

commit log:

4ce8786 Version 1.8.1.1
f13b27d A few minor corrections
d5a2c46 Fixed a few buffer read overruns
b314687 Fixed issue with POSIXMQ in unidirectional context
a235f59 Avoid compilation issue in xio-netlink.c with Musl libc
a7058c9 Fixed strchr with const for new glibc
35d5da1 Fixed timestamps of -v and -x (really)

Signed-off-by: Randy MacLeod <Randy.MacLeod@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agosocat: Remove -fcommon from compiler flags
Khem Raj [Tue, 24 Feb 2026 21:42:58 +0000 (16:42 -0500)] 
socat: Remove -fcommon from compiler flags

This is no longer needed with gcc or clang

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agonfs-utils: upgrade 2.8.4 -> 2.8.5
Randy MacLeod [Tue, 24 Feb 2026 21:42:57 +0000 (16:42 -0500)] 
nfs-utils: upgrade 2.8.4 -> 2.8.5

Commits (aside from typo fixes):

4e9b31fe Release: 2.8.5
00e2e62b nfsdctl: add support for min-threads parameter
4c275442 systemd: drop Wants=network-online.target for rpc-statd-notify
03b9c540 nfsiostat: normalize the mountpoints passed in from the command line
59e85671 Rename CONFIG_NFSV41 to CONFIG_BLKMAPD and disable by default
3b7de50f nfsdctl: ignore ipv6 listener creation error
0e71be58 locktest: use correct build flags
077b70fe sm-notify: Do not drop privileges if running as non-root user
8600bbb7 gssd: protect kerberos ticket cache access

CONFIG_NFSV41 was renamed to CONFIG_BLKMAPD so update the associated PACKAGEONFIG option.

Drop: 0001-locktest-Makefile.am-Do-not-use-build-flags.patch which as merged in:
   0e71be58 locktest: use correct build flags

Signed-off-by: Randy MacLeod <Randy.MacLeod@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agovim: upgrade 9.1.2144 -> 9.2.0
Peter Marko [Tue, 24 Feb 2026 16:27:15 +0000 (17:27 +0100)] 
vim: upgrade 9.1.2144 -> 9.2.0

Solves 9.1.2148 (in 9.1.2148), see [1].
Drop patch merged upstream.

Release notes for 9.2, see [2].
Note that almost all changes were already present in our 9.1 updates.

[1] https://github.com/vim/vim/security/advisories/GHSA-9w5c-hwr9-hc68
[2] https://www.vim.org/vim-9.2-released.php

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
5 weeks agometa: fix generation of kernel CONFIG_ in SPDX3
Benjamin Robin [Tue, 24 Feb 2026 09:17:19 +0000 (10:17 +0100)] 
meta: fix generation of kernel CONFIG_ in SPDX3

With the current solution, using a separate task
(do_create_kernel_config_spdx) there is a dependency issue. Sometimes
the final rootfs SBOM does not contain the CONFIG_ values.

do_create_kernel_config_spdx is executed after do_create_spdx which
deploys the SPDX file. do_create_kernel_config_spdx calls
oe.sbom30.find_root_obj_in_jsonld to read from the deploy directory,
which is OK, but the do_create_kernel_config_spdx ends up writing to
this deployed file (updating it).

do_create_rootfs_spdx has an explicit dependency to all do_create_spdx
tasks, but there is nothing that prevents executing
do_create_kernel_config_spdx after do_create_rootfs_spdx.

To fix it, instead, now read from the workdir, and write to the
workdir, and do the processing from the do_create_spdx task:
we append to the do_create_spdx task.
Furthermore, update oeqa selftest to execute do_create_spdx instead
of removed function.

Also only execute this task if create-spdx-3.0 was inherited,
previously this code could be executed if create-spdx-2.2 is
inherited.

Fixes: 228a968e7c47 ("kernel.bbclass: Add task to export kernel configuration to SPDX")
Signed-off-by: Benjamin Robin (Schneider Electric) <benjamin.robin@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agobuild-appliance-image: Update to master head revisions yocto-6.0_M2
Richard Purdie [Fri, 27 Feb 2026 09:05:02 +0000 (09:05 +0000)] 
build-appliance-image: Update to master head revisions

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agobitbake.conf: Set BB_HASHSERVE alongside BB_SIGNATURE_HANDLER
Richard Purdie [Fri, 27 Feb 2026 09:04:08 +0000 (09:04 +0000)] 
bitbake.conf: Set BB_HASHSERVE alongside BB_SIGNATURE_HANDLER

We need to set this alongside the change in the previous commit for
it to work correctly and default to a local only cache.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agobuild-appliance-image: Update to master head revisions
Richard Purdie [Fri, 27 Feb 2026 08:50:14 +0000 (08:50 +0000)] 
build-appliance-image: Update to master head revisions

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agobitbake.conf: Switch BB_SIGNATURE_HANDLER to OEEquivHash by default
Richard Purdie [Thu, 26 Feb 2026 11:31:27 +0000 (11:31 +0000)] 
bitbake.conf: Switch BB_SIGNATURE_HANDLER to OEEquivHash by default

Hash Equivalence is an extremely powerful feature for reducing build time.
In simple terms, if something is rebuilt and the output is the same as a
previous build, all sstate build artefacts beyond that point can be reused
instead of being rebuilt.

This can be done with a local hash equivalence database/server which is the
default and even local builds with a local sstate can benefit hugely from it.

There is an assumption that builds are reproducible in order for this to work
optimally.

The downside is that when enabled to pull from a shared sstate cache, you need
to use a common hash equivalence server to match it for things to work well.

OE-Core wasn't enabling hash equivalence by default but this changes it to do
so. This has been extensively tested as the deafault in Poky for a long time.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agolinux-firmware: upgrade 20260110 -> 20260221
Dmitry Baryshkov [Mon, 23 Feb 2026 18:42:47 +0000 (20:42 +0200)] 
linux-firmware: upgrade 20260110 -> 20260221

Upgrade the firmware package to latest release. Add firmware for TI
TAS2783, Qualcomm Adreno A801, Qualcomm Glymur, Radxa Dragon Q6A CDSP
and several Intel Sensors Hub firmware versions. Also pick up several
ADSP topologies for Qualcomm X Elite and Qualcomm SM8450 based devices.

License-Update: copyright years, new firmware
Co-developed-by: Sairamreddy Bojja <sbojja@qti.qualcomm.com>
Signed-off-by: Sairamreddy Bojja <sbojja@qti.qualcomm.com>
Cc: Vivek Puar <vpuar@qti.qualcomm.com>
Signed-off-by: Dmitry Baryshkov <dmitry.baryshkov@oss.qualcomm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agosystemd: drop sysvinit PACKAGECONFIG
Jose Quaresma [Mon, 23 Feb 2026 16:28:07 +0000 (16:28 +0000)] 
systemd: drop sysvinit PACKAGECONFIG

Systemd sysvinit was removed d9ec9e20 but the packageconfig knob was still here.

Remove the sysvinit knob and fix:

| ERROR: Nothing RPROVIDES 'systemd-compat-units' (but /lmp/build/conf/../../layers/openembedded-core/meta/recipes-core/systemd/systemd_258.1.bb RDEPENDS on or otherwise requires it)
| NOTE: Runtime target 'systemd-compat-units' is unbuildable, removing...
| Missing or unbuildable dependency chain was: ['systemd-compat-units']

Signed-off-by: Jose Quaresma <jose.quaresma@foundries.io>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agoperlcross: upgrade from 1.6.2 to 1.6.4
Changqing Li [Tue, 24 Feb 2026 02:46:59 +0000 (10:46 +0800)] 
perlcross: upgrade from 1.6.2 to 1.6.4

https://github.com/arsv/perl-cross/releases/tag/1.6.4

Include support for perl 5.40.3, perl 5.42.0

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agogdk-pixbuf: upgrade from 2.44.4 to 2.44.5
Changqing Li [Tue, 24 Feb 2026 02:46:16 +0000 (10:46 +0800)] 
gdk-pixbuf: upgrade from 2.44.4 to 2.44.5

NEWS:
2.44.5
===

- Make the testsuite work with glycin
- glycin: Add support for xpm and xbm
- TRanslation updates

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agoruby: upgrade from 3.4.7 to 4.0.1
Changqing Li [Tue, 24 Feb 2026 01:51:17 +0000 (09:51 +0800)] 
ruby: upgrade from 3.4.7 to 4.0.1

License-Update: Add license BSL-1.0 and Apache-2.0

COPYING - Add Cross-links between Japanese and English pages
LEGAL - Update LEGAL for JSON vendored sources

Refer:
[1] https://github.com/ruby/ruby/commit/e652af18816ffe0b85109b8de0827349bf03f16d
[2] https://github.com/ruby/ruby/commit/d5fbff50c7ff880ae71b8a8ae9aad976c69bea73

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agoprocps: upgrade from 4.0.5 to 4.0.6
Changqing Li [Tue, 24 Feb 2026 01:47:47 +0000 (09:47 +0800)] 
procps: upgrade from 4.0.5 to 4.0.6

Remove patch top_large_pid_fix.patch, already in 4.0.6

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agocve-exclusions: set status for 5 CVEs
Peter Marko [Mon, 23 Feb 2026 22:18:31 +0000 (23:18 +0100)] 
cve-exclusions: set status for 5 CVEs

Reuse work of Debian researchers and set status for fixed CVEs
accordingly.
These are not tracked by kernel itself, so generated exclusions won't
help here.

* https://security-tracker.debian.org/tracker/CVE-2022-38096
* https://security-tracker.debian.org/tracker/CVE-2023-39176
* https://security-tracker.debian.org/tracker/CVE-2023-39179
* https://security-tracker.debian.org/tracker/CVE-2023-39180
* https://security-tracker.debian.org/tracker/CVE-2023-6535

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agolinux-yocto: apply cve-exclusions also to rt and tiny recipe variants
Peter Marko [Mon, 23 Feb 2026 22:18:30 +0000 (23:18 +0100)] 
linux-yocto: apply cve-exclusions also to rt and tiny recipe variants

Version is the same as base kernel, only configuration differs.
There is no reason to not apply the exclusions to all variants.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agorpm/rootfs.py: ensure exit 1 has a word boundary
Adam Duskett [Mon, 23 Feb 2026 15:39:22 +0000 (16:39 +0100)] 
rpm/rootfs.py: ensure exit 1 has a word boundary

Currently, If a package installed by dnf has the word "exit" followed by
"100%" in the log file, the rpm/rootfs.py regex matches a failure thanks to
the "exit 1"00%, such as the following:

[682/932] perl-module-test2-plugin-exit 100% |   0.0   B/s |   8.5 KiB |  00m00s

Add a `\b` to ensure there's a word boundary to prevent the error from happening.

Signed-off-by: Adam Duskett <adam.duskett@amarulasolutions.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agolz4: Remove a reference to the rejected CVE-2025-62813
Benjamin Robin (Schneider Electric) [Mon, 23 Feb 2026 08:11:09 +0000 (09:11 +0100)] 
lz4: Remove a reference to the rejected CVE-2025-62813

The CVE-2025-62813 is rejected so do not reference it anymore.
So keep the patch but without referencing the CVE identifier.

The CVE database indicates the following reason:
  This candidate was withdrawn by its CNA. Further investigation
  showed that it was not a security issue.

Signed-off-by: Benjamin Robin (Schneider Electric) <benjamin.robin@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agoavahi: Remove a reference to the rejected CVE-2021-36217
Benjamin Robin (Schneider Electric) [Mon, 23 Feb 2026 08:11:08 +0000 (09:11 +0100)] 
avahi: Remove a reference to the rejected CVE-2021-36217

CVE-2021-36217 is rejected, and should no longer be referenced.
CVE-2021-36217 is a duplicate of CVE-2021-3502 which is already
referenced in the local-ping.patch.

The CVE database indicates the following reason:
  ConsultIDs: CVE-2021-3502. Reason: This candidate is a duplicate of
  CVE-2021-3502. Notes: All CVE users should reference CVE-2021-3502
  instead of this candidate. All references and descriptions in this
  candidate have been removed to prevent accidental usage.

Signed-off-by: Benjamin Robin (Schneider Electric) <benjamin.robin@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agokernel.bbclass: remove dependency on initramfs when not bundled
Adrian Freihofer [Sun, 22 Feb 2026 12:07:36 +0000 (13:07 +0100)] 
kernel.bbclass: remove dependency on initramfs when not bundled

Previously, the kernel recipe depended on the initramfs image even when
INITRAMFS_IMAGE_BUNDLE was not enabled. This caused the kernel to be
rebuilt whenever the initramfs image changed, regardless of whether the
kernel actually included the initramfs.

The problematic chain was:
  linux:do_deploy ->
  linux:do_bundle_initramfs ->
  image-initramfs:do_image_complete

The original intent (acc. to the comment) was to ensure the initramfs
image was available for tools like wic. However, apart from bundling the
initramfs in the kernel, there is probably no reason why the kernel
should depend on the initramfs. And it is therefore simply wrong if it
does so anyway. Thus, use cases that may be broken by these change are
based on a bug, not a feature. This needs to be fixed by adding a
dependency on the initramfs in the right place, not in the kernel where
this destroys the kernel's sstate-caching.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agoimage_types_wic.bbclass: add depend on initramfs
Adrian Freihofer [Sun, 22 Feb 2026 12:07:35 +0000 (13:07 +0100)] 
image_types_wic.bbclass: add depend on initramfs

When the wic image creation requires an initramfs image that is not bundled
with the kernel (INITRAMFS_IMAGE_BUNDLE != "1"), ensure that the initramfs
image is built before attempting to create the wic image by adding an
explicit dependency on do_image_complete.

Previously, this dependency was incorrectly handled by kernel.bbclass.
This change moves the responsibility to image_types_wic.bbclass where
it belongs.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agobitbake.conf: Enable opengl ptest multiarch wayland vulkan in DISTRO_FEATURES by...
Richard Purdie [Sat, 21 Feb 2026 08:42:26 +0000 (08:42 +0000)] 
bitbake.conf: Enable opengl ptest multiarch wayland vulkan in DISTRO_FEATURES by default

This change enables the modern graphics stack defaults of opengl, wayland and
vulkan, it enables mutliarch which allows gcc, binutils and gdb to target
multiple file formats and it also enables ptests by default

This means that:

* nodistro builds will match the Yocto Project sstate CDN objects
* we have modern graphics defaults
* users will see ptest issues more clearly and be more likely to test
  before sending patches

These DISTRO_FEATURES have been tested and used as defaults in poky for a
long time, this brings them into sync.

Backfill is used so those with their own distro can set the
DISTRO_FEATURES_BACKFILL_CONSIDERED variable to stop the backfill happening
for speccific values.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agoreproducible: fix git SOURCE_DATE_EPOCH randomness
Randolph Sapp [Fri, 20 Feb 2026 01:54:16 +0000 (19:54 -0600)] 
reproducible: fix git SOURCE_DATE_EPOCH randomness

Anything that defines multiple git sources should have the largest value
taken when calculating the SOURCE_DATE_EPOCH for a package.

The previous iteration actually introduced some degree of randomness, as
it would stop on the first git repository reported by os.walk, which
does not assure any specific ordering by default.

Signed-off-by: Randolph Sapp <rs@ti.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agocoreutils: upgrade 9.9 -> 9.10
Randy MacLeod [Thu, 19 Feb 2026 19:12:20 +0000 (14:12 -0500)] 
coreutils: upgrade 9.9 -> 9.10

From https://lists.gnu.org/archive/html/coreutils-announce/2026-02/msg00000.html

Notable changes include:
- Options in man pages link directly into the full web docs
- timeout(1) now kills the command for all terminating signals
- paste(1) is now multi-byte character aware
- cp(1) fixes an unlikely infinite loop introduced in v9.9
- The multi-call binary is 3.2% smaller

Drop the 2 backported patches which are now part of 9.10.

License-Update: copyright years refreshed

For ptests, also install coreutils.texi which is used for a new test that ensures
there is an anchor for each --help option for all of coreutils' programs. See:
   https://cgit.git.savannah.gnu.org/cgit/coreutils.git/commit/?h=v9.10&id=77e6b5d8f8d1ebc3125d6585a266a912a1123791

+---------+--------+-------+------+------+
| Version | Libc   | TOTAL | PASS | SKIP |
+---------+--------+-------+------+------+
| 9.10    | glibc  |  705  |  543 |  162 |
| 9.9     | glibc  |  683  |  527 |  156 |
+---------+--------+-------+------+------+
| diff    | glibc  |   22  |   16 |    6 |
+---------+--------+-------+------+------+
| 9.10    | musl   |  703  |  544 |  159 |
| 9.10    | musl   |  681  |  529 |  152 |
+---------+--------+-------+------+------+
| diff    | musl   |   22  |   15 |    7 |
+---------+--------+-------+------+------+

Most of the skipped tests are due to being "very expensive" according to the coreutils developers.
The other skipped tests need strace, gdb, etc or locale dependencies which has not yet been added.

Signed-off-by: Randy MacLeod <Randy.MacLeod@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agocoreutils: kill and uptime are no longer installed
Randy MacLeod [Thu, 19 Feb 2026 19:12:19 +0000 (14:12 -0500)] 
coreutils: kill and uptime are no longer installed

In coreutils-9.10, as explained in:
   6b399ad35 build: kill(1), uptime(1): don't install by default

    * build-aux/gen-lists-of-programs.sh: kill and uptime are not installed
    by arch, debian, fedora, suse at least, so add to disabled list.
    Fixes https://github.com/coreutils/coreutils/issues/132

Note that in oe-core:
   kill is provided by busybox, procps and util-linux
   uptime is provided by busybox and procps
and in other layers there may be other providers of these commands.

Signed-off-by: Randy MacLeod <Randy.MacLeod@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agopopulate_sdk_base: Make SDK_ZSTD_COMPRESSION_LEVEL overridable
Philip Lorenz [Thu, 19 Feb 2026 15:12:08 +0000 (16:12 +0100)] 
populate_sdk_base: Make SDK_ZSTD_COMPRESSION_LEVEL overridable

Like the other SDK_*_COMPRESSION_LEVELS users may want to override the
final compression level.

Signed-off-by: Philip Lorenz <philip.lorenz@bmw.de>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agodevtool: upgrade: do not add dummy git notes
Alexander Kanavin [Thu, 19 Feb 2026 12:05:20 +0000 (13:05 +0100)] 
devtool: upgrade: do not add dummy git notes

This has been causing a significant performance regression,
to the point where AUH wasn't able to complete upgrades with
particularly large number of git commits between releases [1].

After discussing with Peter [2], running 'oe-selftest -r devtool' with this change (100% pass),
and also doing an AUH run with it, and reviewing the output I think this is fine to remove:
the case is either very niche or non-existent, and if it appears again, we
should come up with a better fix.

[1] https://autobuilder.yoctoproject.org/valkyrie/#/builders/38/builds/54/steps/15/logs/stdio
[2] https://lists.openembedded.org/g/openembedded-core/message/231281

Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agoexternalsrc: fix duplicate entries in .git/info/exclude
Aditya Kurdunkar [Wed, 18 Feb 2026 22:55:44 +0000 (04:25 +0530)] 
externalsrc: fix duplicate entries in .git/info/exclude

`readlines()` preserves trailing newlines, so the duplicate check
against the stripped link name never matched. Strip lines before
comparing to prevent repeated entries on each devtool modify run.

Signed-off-by: Aditya Kurdunkar <adityakurdunkar2@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agoopenssl: add support for config snippet includes
Jan Luebbe [Mon, 16 Feb 2026 15:02:01 +0000 (16:02 +0100)] 
openssl: add support for config snippet includes

This allows configuration (such as enabling providers) to be done by
adding snippet files to /etc/ssl/openssl.cnf.d instead of modifying a
copy of the full configuration file. As new snippets can be added from
separate recipes, targeted changes can be done in multiple layers.

For example, the pkcs11-provider can be enabled by adding a pkcs11.cnf
containing something like:
  [default_sect]
  activate = 1

  [provider_sect]
  pkcs11 = pkcs11_sect

  [pkcs11_sect]
  pkcs11-module-path = /usr/lib/libckteec.so.0
  pkcs11-module-quirks = no-operation-state no-deinit
  pkcs11-module-encode-provider-uri-to-pem = true
  activate = 1

Signed-off-by: Jan Luebbe <jlu@pengutronix.de>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agopython3-poetry-core: upgrade 2.2.1 -> 2.3.1
Wang Mingyu [Sun, 1 Feb 2026 23:49:16 +0000 (07:49 +0800)] 
python3-poetry-core: upgrade 2.2.1 -> 2.3.1

License-Update: file format changed to "ASCII text" from
                "ASCII text, with CRLF line terminators" in the lark license

Changelog:
============
- Update list of supported licenses
- Fix an issue where platform_release could not be parsed on Windows Server

[RP: merged commits, tweak whitespace and fix commit message]
Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agoalsa-lib: patch CVE-2026-25068
Peter Marko [Fri, 20 Feb 2026 20:53:15 +0000 (21:53 +0100)] 
alsa-lib: patch CVE-2026-25068

Pick patch mentioned in NVD report.
It also includes CVE ID in commit message.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agoglib-2.0: upgrade 2.86.3 -> 2.86.4
Peter Marko [Wed, 18 Feb 2026 22:53:25 +0000 (23:53 +0100)] 
glib-2.0: upgrade 2.86.3 -> 2.86.4

Fixes CVE-2026-1484, CVE-2026-1485 and CVE-2026-1489.

Release notes [1]:

Overview of changes in GLib 2.86.4, 2026-02-13
* Fix several security vulnerabilities of varying severity (see below
  for details)
* Bugs fixed:
  * #3858 (closed) glib-compile-resources: Incorrect compiler detection
    on Windows when building GTK causes a DoS (L. E. Segovia)
  * #3863 (closed) Iterating over a short (preallocated) GVariant
    bytestring invalidly refs a NULL GBytes (Christian Hergert)
  * #3870 (closed) (CVE-2026-1484) (YWH-PGM9867-168) Integer Overflow ->
    Buffer Underflow on Glib through glib/gbase64.c via
    g_base64_encode_close() leads to OOB Write (Marco Trevisan)
  * #3871 (closed) (CVE-2026-1485) (#YWH-PGM9867-169) Buffer underflow
    on Glib through gio/gcontenttype-fdo.c via parse_header() lead to
    OOB Read/Write (Marco Trevisan)
  * #3872 (closed) (CVE-2026-1489) (#YWH-PGM9867-171) Integer Overflow
    on Glib through glib/guniprop.c via output_marks() lead to OOB Write
    in glib/gutf8.c:g_unichar_to_utf8() (Marco Trevisan (Treviño))
  * !4946 (merged) Update Romanian translation glib-2-86
  * !4955 (merged) Backport !4954 (merged) “glib-compile-resources:
    Always assume MSVC compiler if VCINSTALLDIR is set” to glib-2-86
  * !4961 (merged) Backport !4960 (merged) “glib/gvariant: add failing
    test for bytestring and fix it” to glib-2-86
  * !4979 (merged) [glib-2-86] gbase64: Use gsize to prevent potential
    overflow
  * !4981 (merged) [glib-2-86] gio/gcontenttype-fdo: Do not overflow if
    header is longer than MAXINT
  * !4984 (merged) [glib-2-86] guniprop: Use size_t for output_marks
    length
  * !5010 (merged) Update Kazakh translation
* Translation updates:
  * Kazakh (Baurzhan Muftakhidinov)
  * Romanian (Antonio Marin)

[1] https://gitlab.gnome.org/GNOME/glib/-/releases/2.86.4

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agocmake: remove obsolete patches
Ross Burton [Mon, 16 Feb 2026 13:48:35 +0000 (13:48 +0000)] 
cmake: remove obsolete patches

0001-Disable-use-of-ext2fs-ext2_fs.h-by-cmake-s-internal.patch can be
replaced with two variable assignments to seed the results we want.

0002-CMakeLists.txt-disable-USE_NGHTTP2.patch is not needed anymore as
the vendored curl will disable the use of nghttp2 automatically if it
isn't found.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agocmake: add license information for vendored cppdap library
Ross Burton [Mon, 16 Feb 2026 13:48:34 +0000 (13:48 +0000)] 
cmake: add license information for vendored cppdap library

Add missing license information for the vendored cppdap library that we
don't yet have a recipe for.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agocmake: use system libuv
Ross Burton [Mon, 16 Feb 2026 13:48:33 +0000 (13:48 +0000)] 
cmake: use system libuv

We have a recipe for libuv in oe-core, so use it in the target recipe to
avoid vendoring in more code.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agolibuv: enable nativesdk builds
Ross Burton [Mon, 16 Feb 2026 13:48:29 +0000 (13:48 +0000)] 
libuv: enable nativesdk builds

This avoids the internal copy of libuv that cmake would otherwise include
from the nativesdk-cmake build.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agocmake: consolidate CMAKE_USE_SYSTEM_LIBRARIES
Ross Burton [Mon, 16 Feb 2026 13:48:32 +0000 (13:48 +0000)] 
cmake: consolidate CMAKE_USE_SYSTEM_LIBRARIES

Move CMAKE_USE_SYSTEM_LIBRARIES=1 to cmake.inc so that all builds use
system libraries unless told otherwise.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agocmake: clean up variables shared between .bb and .inc
Ross Burton [Mon, 16 Feb 2026 13:48:31 +0000 (13:48 +0000)] 
cmake: clean up variables shared between .bb and .inc

Use EXTRA_OECMAKE in the non-cmake-inheriting cmake-native recipe, so
that the cmake.inc can assign once.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agocmake: remove obsolete variable assignments
Ross Burton [Mon, 16 Feb 2026 13:48:30 +0000 (13:48 +0000)] 
cmake: remove obsolete variable assignments

Remove obsolete assignments:

- KWSYS_CHAR_IS_SIGNED was removed in 3.5.0[1]
- KWSYS_LFS_WORKS was removed in 3.15.0[2]

[1] cmake ec1398d7ae ("KWSys 2015-12-14 (c1149ef6)")
[2] cmake 11fe7c9063 ("KWSys 2019-02-25 (833b2470)")

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agopkgconf: add pkg-config-native to the nativesdk package
Ross Burton [Mon, 9 Feb 2026 12:56:26 +0000 (12:56 +0000)] 
pkgconf: add pkg-config-native to the nativesdk package

This was added to the pkg-config recipe but not pkgconf.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agopkgconf: small cleanups
Ross Burton [Mon, 9 Feb 2026 12:56:25 +0000 (12:56 +0000)] 
pkgconf: small cleanups

There's no need to --with-pkg-confg-dir as the default is the same and
correct.

Don't append BBCLASSEXTEND, there's no need.

Sync pkg-config-native with the pkg-config recipe so that it sets
the variables in the same way.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agodistro/defaultsetup: Enable space optimization tweaks
Richard Purdie [Sat, 21 Feb 2026 08:42:30 +0000 (08:42 +0000)] 
distro/defaultsetup: Enable space optimization tweaks

This enables a collection of tweaks which reudce build output size where
the output has been found to be particularly problematic.

This reduces sstate object size as well as on disk build footprint, it
also helps memory usage for linking some of the recipes. This in turn
improves built speed and the smaller sstate objects are faster to compress,
decompress and transfer over the network.

This change has been tested in poky for a long time.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agodistro/defaultsetup: Enable security flags by default
Richard Purdie [Sat, 21 Feb 2026 08:42:29 +0000 (08:42 +0000)] 
distro/defaultsetup: Enable security flags by default

This defaults to including our security flags which use stack-protector-strong
and D_FORTIFY_SOURCE=2 by default, as aids to improve detection of security issues.

This change has been tested in poky for a long time and allows us to align
our default compilation flags and environment.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agodistro/defaultsetup: Enable no-static-libs by default
Richard Purdie [Sat, 21 Feb 2026 08:42:28 +0000 (08:42 +0000)] 
distro/defaultsetup: Enable no-static-libs by default

In general, few people use statlic libraries. They are however large and take up a lot
of space on disk as well as taking time to compress/decompress and tranfser in sstate
objects.

This change disables most of them by default for disk space and speed/size performance
benefits.

This change has been tested in poky for a long time.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agodefaultsetup: Enable uninative by default
Richard Purdie [Sat, 21 Feb 2026 08:42:27 +0000 (08:42 +0000)] 
defaultsetup: Enable uninative by default

uninative allows reuse of native sstate built on one distro on another. This change
enables it by default, as has been done by default in poky for a long time.

The reason for the change is that this makes the sstate CDN much more useful
to speed up builds if good network access is available. It also standardises
the builds to our usual testing configuration, removing one key difference
which new users sometimes run into.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agoconf: Switch to systemd by default and simplify init manager selection
Richard Purdie [Sat, 21 Feb 2026 08:42:25 +0000 (08:42 +0000)] 
conf: Switch to systemd by default and simplify init manager selection

This change effectively switches things to use INIT_MANAGER to select the init
system and drops the old compatibility 'none' method. The init manager selection
is now complex enough that requiring users to select it makes sense.

The new default is systemd, which reflects popular opinion. This is known to have
issues in some of our configurations such as musl but is also frequently asked for.

Anyone replacing defaultsetup.conf in their own setup will need to provide
equivalent functionality but that is execpted for any of the settings in there.

This change drops sysvinit from the default distro features backfill, meaning
we no longer need to remove it in systemd setups and places the init managers
on a more equal and equivalent standing.

This is a behaviour change for anyone using nodistro and anyone not already
setting INIT_MANAGER explictly. This does not change the default for distros
which select an init manager already (e.g. poky).

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agoconf/distro: Drop default-versions.inc
Richard Purdie [Sat, 21 Feb 2026 08:16:47 +0000 (08:16 +0000)] 
conf/distro: Drop default-versions.inc

This conf file used to be useful when we had multiple versions of recipes
but we no longer do that and the file is empty. Remove it as obsolete and
not needed anymore.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agobinutils: Drop unneeded and problematic vardeps explict value and immediate expansion
Richard Purdie [Sat, 21 Feb 2026 08:16:46 +0000 (08:16 +0000)] 
binutils: Drop unneeded and problematic vardeps explict value and immediate expansion

This was introduced in 0788cf349fe37ef4a36c626dbc396c97d1ab14d7 as a way of
tracking the EXTRA_OECONF changes. These should be tracked reliably by the
contains() code now so it is assumed this was working around a bug at the time.
I checked the current task hashes and that information is there.

Therefore drop this bit of code as the immediate expansion causes inaccurate
values.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
6 weeks agonativesdk/crosssdk: Fix DISTRO_FEATURES_BACKFILL handling
Richard Purdie [Sat, 21 Feb 2026 08:16:45 +0000 (08:16 +0000)] 
nativesdk/crosssdk: Fix DISTRO_FEATURES_BACKFILL handling

Similar to native, backfilling of items from DISTRO_FEATURES when
combined with DISTRO_FEATURES_FILTER_NATIVESDK was not functioning
correctly.

Ensure the backfill is applied before filtering, then clear the value to
prevent further backfill. This makes the nativesdk and crosssdk cases
match the native code.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agorust: Enable dynamic linking with llvm
Sunil Dora [Thu, 19 Feb 2026 12:59:18 +0000 (04:59 -0800)] 
rust: Enable dynamic linking with llvm

Fixes [Yocto #16058]

A segmentation fault occurs in rustc (e.g. in
llvm::X86ReadAdvanceTable) when reusing sstate artifacts built with
different host toolchain versions.

Issue sequence:
1. llvm-native is built with a newer toolchain
   (e.g. GCC 15/Binutils 2.45).
2. rust-native is later built with an older linker.
   (e.g. GCC 12/Binutils 2.40).
3. The older linker statically links parts of llvm-native into
   librustc_driver.
4. The resulting binary crashes at runtime inside the statically
   linked LLVM code.

The corruption happens at link time when mixing static native objects
produced by different toolchain generations.

Enable dynamic LLVM linking (link-shared = true) for rust-native so rustc
links against libLLVM.so instead of static archives, avoiding host linker
incompatibilities when reusing sstate artifacts.

Signed-off-by: Sunil Dora <sunilkumar.dora@windriver.com>
Suggested-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>