]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/log
thirdparty/openembedded/openembedded-core.git
7 weeks agottyrun: upgrade 2.40.0 -> 2.41.0
Wang Mingyu [Tue, 3 Mar 2026 10:09:26 +0000 (18:09 +0800)] 
ttyrun: upgrade 2.40.0 -> 2.41.0

Changes of existing tools:
------------------------------
- chreipl: Make --bootparms work for ECKD re-IPL
- cpacfstats: Add 'unauthorized' state to CPU-MF counters
- cpictl: Detect RHCOS using VARIANT_ID
- hsci: Automatically set appropriate MTU for HSCI
- libutil: Add util_readlink() and util_readlinkat() helpers
- libutil: Add util_startswith() to util_str
- libutil: Add utility parsing functions
- lschp: Add support for structured output (--format)
- lsreipl: Suppress 'clear' output if not supported
- pvimg: Add '--format text' support to 'pvimg info'
- pvimg: Add '--print-schema ' option to 'pvimg info'
- pvimg: Add '--show-secrets' flag to 'pvimg info'
- pvimg: Provide improved JSON output to 'pvimg info --format json'
- pvinfo: Improve User experience on non-SE enabled systems
- zipl/ngdump: Ensure ext4 file system is used on dump partition
- zkey: Add support for integrity protected disks using HMAC keys

Bug Fixes:
-------------
- cpumf/pai: Handle different size of perf_event_attr
- lscss: Fix memory leak
- zipl: Fix dump job on tape devices

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agotaglib: upgrade 2.1.1 -> 2.2
Wang Mingyu [Tue, 3 Mar 2026 10:09:25 +0000 (18:09 +0800)] 
taglib: upgrade 2.1.1 -> 2.2

Changelog:
=========
 * Support for Matroska (MKA, MKV) and WebM files.
 * Support for NI STEM in MP4 files.
 * New method isDsd() in WavPack Properties.
 * Stricter verification of ID3v2 frames.
 * Fix setting the last header flag in Ogg FLAC files.
 * Fix reading of the last page in Ogg streams.
 * Avoid corrupting invalid Ogg FLAC files without Vorbis comment.
 * Windows: Support MP4 files with 64-bit atoms.
 * Fix use of property keys with non-ASCII characters in C bindings.
 * Fix building with Android NDK 29.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agospirv-llvm-translator: upgrade 21.1.3 -> 21.1.5
Wang Mingyu [Tue, 3 Mar 2026 10:09:24 +0000 (18:09 +0800)] 
spirv-llvm-translator: upgrade 21.1.3 -> 21.1.5

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agosbc: upgrade 2.1 -> 2.2
Wang Mingyu [Tue, 3 Mar 2026 10:09:23 +0000 (18:09 +0800)] 
sbc: upgrade 2.1 -> 2.2

Changelog:
 Fix issue when compiling with C23 requirements.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agorpm-sequoia-crypto-policy: upgrade to latest revision
Wang Mingyu [Tue, 3 Mar 2026 10:09:22 +0000 (18:09 +0800)] 
rpm-sequoia-crypto-policy: upgrade to latest revision

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agop11-kit: upgrade 0.26.1 -> 0.26.2
Wang Mingyu [Tue, 3 Mar 2026 10:09:21 +0000 (18:09 +0800)] 
p11-kit: upgrade 0.26.1 -> 0.26.2

Changelog:
 rpc: fix NULL dereference via C_DeriveKey with specific NULL parameters (CVE-2026-2100)

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agolibxmlb: upgrade 0.3.24 -> 0.3.25
Wang Mingyu [Tue, 3 Mar 2026 10:09:20 +0000 (18:09 +0800)] 
libxmlb: upgrade 0.3.24 -> 0.3.25

Bugfixes:
 - Correctly decompress heavily compressed zstd streams

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agolibx11: upgrade 1.8.12 -> 1.8.13
Wang Mingyu [Tue, 3 Mar 2026 10:09:19 +0000 (18:09 +0800)] 
libx11: upgrade 1.8.12 -> 1.8.13

License-Update: Drop vestiges of OS/2 support

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agolibuv: upgrade 1.51.0 -> 1.52.0
Wang Mingyu [Tue, 3 Mar 2026 10:09:18 +0000 (18:09 +0800)] 
libuv: upgrade 1.51.0 -> 1.52.0

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agolibtraceevent: upgrade 1.8.6 -> 1.9.0
Wang Mingyu [Tue, 3 Mar 2026 10:09:17 +0000 (18:09 +0800)] 
libtraceevent: upgrade 1.8.6 -> 1.9.0

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agolibsoup: upgrade 3.6.5 -> 3.6.6
Wang Mingyu [Tue, 3 Mar 2026 10:09:16 +0000 (18:09 +0800)] 
libsoup: upgrade 3.6.5 -> 3.6.6

Changelog:
============
* websocket: Fix out-of-bounds read in process_frame
* Check nulls returned by soup_date_time_new_from_http_string()
* Numerous fixes to handling of Range headers
* server: close the connection after responsing a request containing Content-Length and Transfer-Encoding
* Use CRLF as line boundary when parsing chunked enconding data
* websocket: do not accept messages frames after closing due to an error
* Sanitize filename of content disposition header values
* Always validate the headers value when coming from untrusted source
* uri-utils: do host validation when checking if a GUri is valid
* multipart: check length of bytes read soup_filter_input_stream_read_until()
* message-headers: Reject duplicate Host headers
* server: null-check soup_date_time_to_string()
* auth-digest: fix crash in soup_auth_digest_get_protection_space()
* session: fix 'heap-use-after-free' caused by 'finishing' queue item twice
* cookies: Avoid expires attribute if date is invalid
* http1: Set EOF flag once content-length bytes have been read
* date-utils: Add value checks for date/time parsing
* multipart: Fix multiple boundry limits
* Fixed multiple possible memory leaks
* message-headers: Correct merge of ranges
* body-input-stream: Correct chunked trailers end detection
* server-http2: Correctly validate URIs
* multipart: Fix read out of buffer bounds under soup_multipart_new_from_message()
* headers: Ensure Request-Line comprises entire first line
* tests: Fix MSVC build error
* Fix possible deadlock on init from gmodule usage
* Add Cornish translation
* Update Turkish translation
* Update Uighur translation
* Update Romanian translation
* Add Uzbek (Latin) translation
* Add Kazakh translation

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agolibgpg-error: upgrade 1.58 -> 1.59
Wang Mingyu [Tue, 3 Mar 2026 10:09:15 +0000 (18:09 +0800)] 
libgpg-error: upgrade 1.58 -> 1.59

License-Update: Copyright year updated to 2026.

Changelog:
=============
* Take care of POSIX semaphore "shared" semantics.  This fixes a
  problem on NetBSD.
* Fix preparing the environment block on Windows.
* Fix for GPGRT_PROCESS_*_KEEP flags on Windows.
* Update Russian and Swedish translations.
* Introduce autogen.rc variable autogen_use_force.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agolibfontenc: upgrade 1.1.8 -> 1.1.9
Wang Mingyu [Tue, 3 Mar 2026 10:09:14 +0000 (18:09 +0800)] 
libfontenc: upgrade 1.1.8 -> 1.1.9

Changelog:
===========
- gitlab CI: drop the ci-fairy check-mr job
- meson: Add option to build with meson
- configure: Use pkg-config to handle zlib dependency if possible

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agolibcap-ng/libcap-ng-python: Upgrade 0.9 -> 0.9.1
Wang Mingyu [Tue, 3 Mar 2026 10:09:13 +0000 (18:09 +0800)] 
libcap-ng/libcap-ng-python: Upgrade 0.9 -> 0.9.1

Changelog:
==============
- Deprecate captest
- In cap-audit, if tested app uses file system based capabilities, drop setpcap
- In cap-audit, fully resolve paths before classifying
- In cap-audit, add JSON escaping to output
- In cap-audit, filter pre-exec, startup, and shutdown capability noise
- pscap now has a --tree disply mode
- More code cleanups
- Improve output alignment of various utilities

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agoless: upgrade 691 -> 692
Wang Mingyu [Tue, 3 Mar 2026 10:09:12 +0000 (18:09 +0800)] 
less: upgrade 691 -> 692

Changelog:
==========
- Revert HOME key to scroll to beginning of file and END key to scroll to end of file
- Configure tty to leave CR and NL unmodified
- Add commands to lesskey parser (forw-bell-hilite, goto-pos and osc8-jump).
- Add key sequences to lesskey parser (\kE, \kF, \kH, \kI, \kM, and \kS).
- Fix bug using negative value with -z option
- Fix bug handling empty terminfo capabilties
- Fix memory leak in setupterm
- Make lesstest ignore system locale (nl_langinfo)

License-Update: Copyright year updated to 2026.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agohwdata: upgrade 0.403 -> 0.404
Wang Mingyu [Tue, 3 Mar 2026 10:09:11 +0000 (18:09 +0800)] 
hwdata: upgrade 0.403 -> 0.404

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agofastfloat: upgrade 8.2.2 -> 8.2.3
Wang Mingyu [Tue, 3 Mar 2026 10:09:10 +0000 (18:09 +0800)] 
fastfloat: upgrade 8.2.2 -> 8.2.3

Changelog:
=========
- add base check for uint8
- fix issue with s390x.
- optimize uint16 parsing
- optimize fastfloat_strncasecmp
- Bump the github-actions group across 1 directory with 4 updates
- fix early return error in fastfloat_strncasecmp
- Clarify behavior for underflow
- Fix overzealous build-time /permissive- propagating to compile-time (cross-compilation bug)

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agoenchant2: upgrade 2.8.14 -> 2.8.15
Wang Mingyu [Tue, 3 Mar 2026 10:09:09 +0000 (18:09 +0800)] 
enchant2: upgrade 2.8.14 -> 2.8.15

Bugfix:
=========
- removing a word that happens to be at the end of a personal word list
  file has not worked since 2.7.0.
- the way that personal word lists are merged with the current
  session has been changed so that personal word list words now appear in
  suggestions with providers that support adding words to the current session
  (Aspell and Hunspell).

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agoed: upgrade 1.22.4 -> 1.22.5
Wang Mingyu [Tue, 3 Mar 2026 10:09:08 +0000 (18:09 +0800)] 
ed: upgrade 1.22.4 -> 1.22.5

Changelog:
============
- Use 'sizeof active_list[0]' instead of 'sizeof (line_node **)'.
- A file name ending in slash '/' is now diagnosed as 'Invalid filename'
  instead of 'Is a directory'.

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agodiffoscope: upgrade 311 -> 313
Wang Mingyu [Tue, 3 Mar 2026 10:09:07 +0000 (18:09 +0800)] 
diffoscope: upgrade 311 -> 313

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agoccache: upgrade 4.12.2 -> 4.12.3
Wang Mingyu [Tue, 3 Mar 2026 10:09:06 +0000 (18:09 +0800)] 
ccache: upgrade 4.12.2 -> 4.12.3

License-Update: Copyright year updated to 2026

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agoxauth: upgrade 1.1.4 -> 1.1.5
Hongxu Jia [Tue, 3 Mar 2026 06:56:40 +0000 (14:56 +0800)] 
xauth: upgrade 1.1.4 -> 1.1.5

ChangeLog in 1.1.5:

commit 6fe9365f11181a043f151f2e67f36015c278791d
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Wed Dec 31 11:58:21 2025 -0800

    xauth 1.1.5

Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
commit 1cb1d8e0284870a03970a0a45d1c8cfe7ec6a696
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sun May 18 16:31:05 2025 -0700

    man page: fix warnings from `mandoc -T lint` and `groff -rCHECKSTYLE=10`

    mandoc: xauth.1:26:13: WARNING: cannot parse date, using it verbatim: TH xauth 1.1.4
    mandoc: xauth.1:33:2: WARNING: skipping paragraph macro: PP after SH
    mandoc: xauth.1:225:2: WARNING: skipping paragraph macro: sp after PP
    mandoc: xauth.1:216:2: WARNING: skipping paragraph macro: PP after SH
    mandoc: xauth.1:254:2: WARNING: skipping paragraph macro: PP after SH
    an.tmac:xauth.1:96: style: blank line in input
    an.tmac:xauth.1:104: style: blank line in input
    an.tmac:xauth.1:114: style: blank line in input
    an.tmac:xauth.1:122: style: blank line in input
    an.tmac:xauth.1:130: style: blank line in input
    an.tmac:xauth.1:135: style: blank line in input
    an.tmac:xauth.1:142: style: blank line in input
    an.tmac:xauth.1:166: style: blank line in input

Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Part-of: <https://gitlab.freedesktop.org/xorg/app/xauth/-/merge_requests/28>

commit 0d43570ad3ca169464daf4304151c9b8d7ab05b8
Author: Michael Gilbert <michael.s.gilbert@gmail.com>
Date:   Fri Jul 22 14:57:37 2011 -0400

    xauth: needs cookie handling warnings in man page [Debian bug #635109]

Reported-by: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=635109
Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Part-of: <https://gitlab.freedesktop.org/xorg/app/xauth/-/merge_requests/27>

commit 23735afd04ab561914aa3d5465532be0a6975fef
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sun Mar 30 09:07:57 2025 -0700

    Improve man page formatting

Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Part-of: <https://gitlab.freedesktop.org/xorg/app/xauth/-/merge_requests/26>

commit 9e238deb87c07ecda45ad86ff1e4a49125839446
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sun Mar 23 13:14:50 2025 -0700

    Add --help and --version options

Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Part-of: <https://gitlab.freedesktop.org/xorg/app/xauth/-/merge_requests/26>

commit eb8b2ef585dc837558cc3f02f85cb88d2a6de5db
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sun Mar 23 11:25:50 2025 -0700

    Report unknown argument that caused error before printing usage message

Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
    Part-of: <https://gitlab.freedesktop.org/xorg/app/xauth/-/merge_requests/26>

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agopython3-xmltodict: upgrade 1.0.2 -> 1.0.3
Hongxu Jia [Tue, 3 Mar 2026 06:56:39 +0000 (14:56 +0800)] 
python3-xmltodict: upgrade 1.0.2 -> 1.0.3

Release notes[1]:

Bug Fixes

- unparse: serialize None text/attrs as empty values (fixes #401) (aa16511)

Documentation

- readme: fix Fedora and Arch package links (fd6a73b)

[1] https://github.com/martinblech/xmltodict/releases/tag/v1.0.3

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agopython3-uv-build: upgrade 0.9.28 -> 0.10.4
Hongxu Jia [Tue, 3 Mar 2026 06:56:38 +0000 (14:56 +0800)] 
python3-uv-build: upgrade 0.9.28 -> 0.10.4

Released on 2026-02-17[1].
Enhancements

    Remove duplicate references to the affected paths when showing uv python errors (#18008)
    Skip discovery of workspace members that contain only git-ignored files, including in sub-directories (#18051)

Bug fixes

    Don't panic when initialising a package at the filesystem root (e.g. uv init / --name foo) (#17983)
    Fix permissions on wheel and sdist files produced by the uv_build build backend (#18020)
    Revert locked file change to fix locked files on NFS mounts (#18071)

[1] https://github.com/astral-sh/uv/releases/tag/0.10.4

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agopython3-trove-classifiers: upgrade 2025.12.1.14 -> 2026.1.14.14
Hongxu Jia [Tue, 3 Mar 2026 06:56:37 +0000 (14:56 +0800)] 
python3-trove-classifiers: upgrade 2025.12.1.14 -> 2026.1.14.14

Rlease notes[1]:

Update __init__.py to add Cygwin as a classifier (#232)

Add "Environment :: Cygwin (MS Windows)" as a classifier as some modules,
such as mine, work on Windows but only via the Cygwin POSIX layer (www.cygwin.com)

[1] https://github.com/pypa/trove-classifiers/releases/tag/2026.1.14.14

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agopython3-testtools: upgrade 2.8.2 -> 2.8.3
Hongxu Jia [Tue, 3 Mar 2026 06:56:36 +0000 (14:56 +0800)] 
python3-testtools: upgrade 2.8.2 -> 2.8.3

What's Changed [1]

- Support binary contents in FileContains matcher by @jelmer in #553
- Be more lenient to stream=None being passed into TestResult classes by @jelmer in #554
- Support async setUp/tearDown validation with Deferreds by @jelmer in #552
- Bump ruff from 0.14.9 to 0.14.10 by @dependabot[bot] in #555
- Add more typing, reduce size of testtools.compat by @jelmer in #556
- Bump ruff from 0.14.10 to 0.14.11 by @dependabot[bot] in #558
- Add more typing by @jelmer in #559
- Finish typing by @jelmer in #561

[1] https://github.com/testing-cabal/testtools/releases/tag/2.8.3

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agopython3-pyproject-metadata: upgrade 0.10.0 -> 0.11.0
Hongxu Jia [Tue, 3 Mar 2026 06:56:34 +0000 (14:56 +0800)] 
python3-pyproject-metadata: upgrade 0.10.0 -> 0.11.0

Relase note [1]:

This release refactors a lot of the internals to break up conversion and validation.
This should not be noticeable except for better error messages in some cases. We also
now test on some downstream projects; if you are using pyproject-metadata for a backend,
you can suggest adding a downstream test to our noxfile.

Refactoring:

    Restructured internals around conversion.

Internal and CI:

    Test on some downstream projects.
    Remove some PEP 621 terminology

[1] https://github.com/pypa/pyproject-metadata/releases/tag/0.11.0

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agopython3-pycparser: upgrade 2.23 -> 3.0
Hongxu Jia [Tue, 3 Mar 2026 06:56:33 +0000 (14:56 +0800)] 
python3-pycparser: upgrade 2.23 -> 3.0

Convert to python_setuptools_build_meta to fix

  WARNING: python3-pycparser-3.0-r0 do_check_backend: QA Issue:
  inherits setuptools3 but has pyproject.toml with setuptools.build_meta,
  use the correct class [pep517-backend]

What's Changed [1]

- Removed dependency on PLY, by rewriting pycparser to use a hand-written lexer
  and recursive-descent parser for C. No API changes / functionality changes
  intended - the same AST is produced.
- Add support for Python 3.14 and drop EOL 3.8 by @hugovk in #581
- Update _ast_gen.py to be in sync with c_ast.py by @simonlindholm in #582

[1] https://github.com/eliben/pycparser/releases/tag/release_v3.00

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agopython3-pip: upgrade 26.0 -> 26.0.1
Hongxu Jia [Tue, 3 Mar 2026 06:56:32 +0000 (14:56 +0800)] 
python3-pip: upgrade 26.0 -> 26.0.1

ChangeLog: 26.0.1 (2026-02-04) [1]
Bug Fixes

    Fix --pre not being respected from the command line when a requirement file includes an option e.g. -extra-index-url. (#13788)

[1] https://pip.pypa.io/en/stable/news/#v26-0-1

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agopython3-markdown: upgrade 3.10.1 -> 3.10.2
Hongxu Jia [Tue, 3 Mar 2026 06:56:31 +0000 (14:56 +0800)] 
python3-markdown: upgrade 3.10.1 -> 3.10.2

Release note [1]:

Fixed
- Fix a regression related to comment handling (#1590).
- More reliable fix for </ (#1593).

[1] https://github.com/Python-Markdown/markdown/releases/tag/3.10.2

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agopython3-hypothesis: upgrade 6.151.4 -> 6.151.9
Hongxu Jia [Tue, 3 Mar 2026 06:56:30 +0000 (14:56 +0800)] 
python3-hypothesis: upgrade 6.151.4 -> 6.151.9

6.151.9 - 2026-02-16 [1]
- Remove some old unused code.

[1] https://hypothesis.readthedocs.io/en/latest/changelog.html#v6-151-9

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agopython3-cryptography{-vectors}: 46.0.4 -> 46.0.5
Hongxu Jia [Tue, 3 Mar 2026 06:56:29 +0000 (14:56 +0800)] 
python3-cryptography{-vectors}: 46.0.4 -> 46.0.5

46.0.5 - 2026-02-10 [1]

- An attacker could create a malicious public key that reveals portions of your
  private key when using certain uncommon elliptic curves (binary curves).
  This version now includes additional security checks to prevent this attack.
  This issue only affects binary elliptic curves, which are rarely used in
  real-world applications. Credit to XlabAI Team of Tencent Xuanwu Lab and Atuin
  Automated Vulnerability Discovery Engine for reporting the issue. CVE-2026-26007

- Support for SECT* binary elliptic curves is deprecated and will be removed in
  the next release.

[1] https://github.com/pyca/cryptography/blob/main/CHANGELOG.rst#4605---2026-02-10

Backport 0001-bump-uv_build-to-0.10.0-14271.patch to fix compile failure
...
| ERROR Missing dependencies:
|       uv_build<0.10.0,>=0.7.19
| WARNING: exit code 1 from a shell command.
...

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agogn: upgrade to latest revision
Hongxu Jia [Tue, 3 Mar 2026 06:56:27 +0000 (14:56 +0800)] 
gn: upgrade to latest revision

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agofont-alias: upgrade 1.0.5 -> 1.0.6
Hongxu Jia [Tue, 3 Mar 2026 06:56:26 +0000 (14:56 +0800)] 
font-alias: upgrade 1.0.5 -> 1.0.6

ChangeLog in 1.0.6

commit ebeee85f070dc12197ad98d1c849786f8e3be124
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sat Feb 7 17:20:58 2026 -0800

    font-alias 1.0.6

Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
commit 55ceddb52f9e08a277ba634b2b0a03a9be31fb46
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sun Jan 11 11:20:41 2026 -0800

    gitlab CI: drop the ci-fairy check-mr job

    The only thing this checked was the checkbox for allowing maintainers to
    edit the MR. Changed permissions checks now fail this job but luckily
    the setting it checked has been the default for years anyway so we can
    drop it.

    https://gitlab.freedesktop.org/freedesktop/ci-templates/-/issues/81

Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
commit 184c43dd059f785537c8a48a4a7972c488ac1215
Author: Alan Coopersmith <alan.coopersmith@oracle.com>
Date:   Sun Nov 19 09:45:41 2023 -0800

    Add a meson build system

    Includes CI checks comparing installed files based on those from xorgproto

Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agoell: upgrade 0.81 -> 0.82
Hongxu Jia [Tue, 3 Mar 2026 06:56:25 +0000 (14:56 +0800)] 
ell: upgrade 0.81 -> 0.82

ChangeLog ver 0.82:
    Fix issue with using -std=c23 compiler setting.

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agoconnman: upgrade 1.45 -> 2.0
Hongxu Jia [Tue, 3 Mar 2026 06:56:24 +0000 (14:56 +0800)] 
connman: upgrade 1.45 -> 2.0

ver 2.0 [1]:
Fix issue with agent request on NoReply D-Bus error.
Add support for DefaultEnabledTechnologies setting.
Remove installation of include headers.

[1] https://kernel.googlesource.com/pub/scm/network/connman/connman/+/refs/tags/2.0%5E%21/

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agobtrfs-tools: upgrade 6.17.1 -> 6.19
Hongxu Jia [Tue, 3 Mar 2026 06:56:22 +0000 (14:56 +0800)] 
btrfs-tools: upgrade 6.17.1 -> 6.19

Release Notes:
https://github.com/kdave/btrfs-progs/releases/tag/v6.19

Signed-off-by: Hongxu Jia <hongxu.jia@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agopseudo: Add fix for glibc 2.43
Richard Purdie [Sat, 7 Mar 2026 10:42:00 +0000 (10:42 +0000)] 
pseudo: Add fix for glibc 2.43

Update to add a fix for a function definition to work with glibc 2.43.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agooeqa/runtime/ptest: Improve timeout values
Richard Purdie [Wed, 4 Mar 2026 18:40:29 +0000 (18:40 +0000)] 
oeqa/runtime/ptest: Improve timeout values

The ptest runner command has timeouts disabled which has the side effect of limiting
the command logging. This can lead to incomplete logs and makes issues harder to debug
since the log buffer is lost if things crash or are interrupted.

Pass in a timeout value of the ptest timeout + 30 so that debugging is improved.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agooeqa/runtime/ptest: Use a timeout with command, remove disabling
Richard Purdie [Wed, 4 Mar 2026 18:39:25 +0000 (18:39 +0000)] 
oeqa/runtime/ptest: Use a timeout with command, remove disabling

A simple 'which' call doesn't need the timeout disabling. This was likely
a copy and paste error and can be removed.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agoptest-runner: Upgrade 2.5.0 -> 2.5.1
Richard Purdie [Sat, 7 Mar 2026 07:06:26 +0000 (07:06 +0000)] 
ptest-runner: Upgrade 2.5.0 -> 2.5.1

Pull in buffering fix:

"""
When running slow ptests, we can see an issue where the tests are writing output
but it doesn't make it to the process (e.g. ssh connection) running ptest-runner.

The issue is that the standard buffering for non-interactive terminals is 8kb and
some ptests don't output enough data to trigger a write. This can lead to
the controlling connection timing out.

This change forces the output streams to be line buffered in all cases. Most
ptest output would contain newlines so this should work well. stderr can be
unbuffered by default but making it consistent here seems the best approach.

Testing with this change on slow ptest runs (e.g. qemu emulated) showed much
more consistent data with this change.
"""

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agoptest-runner: Use git tag in SRC_URI
Yoann Congal [Fri, 6 Mar 2026 08:40:44 +0000 (09:40 +0100)] 
ptest-runner: Use git tag in SRC_URI

Also, remove an extra line split.

Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
7 weeks agoptest-runner: Upgrade 2.4.5.1 -> 2.5.0
Yoann Congal [Fri, 6 Mar 2026 08:40:43 +0000 (09:40 +0100)] 
ptest-runner: Upgrade 2.4.5.1 -> 2.5.0

Changelog:
- utils.c: Fix dirname() handling in run_ptests()
- ptest-runner-collect-system-data: add info to logs
- main.c: Set PYTHONUNBUFFERED in the environment
- utils.c: print a message when a timeout occurs
- main.c: Add print_helptext() for detailed help
- main.print_usage: Remove unused argument list of -l

Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agomesa: depend on mesa-tools-native for less expensive libclc dependency
Quentin Schulz [Fri, 6 Feb 2026 17:23:59 +0000 (18:23 +0100)] 
mesa: depend on mesa-tools-native for less expensive libclc dependency

libclc is required for some drivers (asahi, panfrost and intel at the
very least).

libclc brings very expensive per-target dependencies such as llvm and
clang.

However, we can make libclc depend on native tools (mesa-clc and
precomp-compiler via mesa-tools-native) such that this cost exists only
once (for the native build machine) and not for each machine to build.

So this migrates the libclc dependency to make use of the newly
introduced mesa-tools-native to make use of mesa-clc=system and
precomp-compiler=system.

We told the user to have libclc PACKAGECONFIG when selecting opencl
PACKAGECONFIG but its dependencies are now gone since we're using
mesa-tools-native for libclc. Therefore, this also moves the previous
dependencies of libclc PACKAGECONFIG to opencl such that we can still
build rusticl which still requires all dependencies from previous
implementation of libclc (as specified in meson.build[1][2][3][4]).

For some reason, libclc PACKAGECONFIG is still required otherwise
rusticl fails to build with the following (stripped) message:

"""
FAILED: [code=101] src/gallium/frontends/rusticl/rusticl_libc_bindings.rs
/build/tmp/work/cortexa35-poky-linux/mesa/25.3.3/recipe-sysroot-native/usr/bin/bindgen
../sources/mesa-25.3.3/src/gallium/frontends/rusticl/rusticl_libc_bindings.h
--output /build/tmp/work/cortexa35-poky-linux/mesa/25.3.3/build/src/gallium/frontends/rusticl/rusticl_libc_bindings.rs
[...]
-MD -MQ ../sources/mesa-25.3.3/src/gallium/frontends/rusticl/rusticl_libc_bindings.h
-MF src/gallium/frontends/rusticl/rusticl_libc_bindings.h.d

thread 'main' (3601157) panicked at bindgen/lib.rs:616:27:
Unable to find libclang: "couldn't find any valid shared libraries
matching: ['libclang.so', 'libclang-*.so', 'libclang.so.*',
'libclang-*.so.*'], set the `LIBCLANG_PATH` environment variable to a
path where one of these files can be found (invalid: [])"
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
"""

libclang.so is available in the sysroot. Exporting LIBCLANG_PATH with
"${STAGING_LIB_DIR}" in the recipe doesn't do anything.

So for now, we keep telling the user to add libclc PACKAGECONFIG when
opencl is selected (and keep it in mesa.bb when DISTRO_FEATURES has
opencl) and maybe can figure out why we cannot build rusticl without
libclc PACKAGECONFIG later on. I'm also not sure if the

Note that does mean that when selecting opencl, mesa will bring the
expensive dependencies again, but I'm not sure there's anything we can
do about that at the moment.

[1] https://gitlab.freedesktop.org/mesa/mesa/-/blob/mesa-25.3.4/meson.build?ref_type=tags#L838-L839
[2] https://gitlab.freedesktop.org/mesa/mesa/-/blob/mesa-25.3.4/meson.build?ref_type=tags#L850-L852
[3] https://gitlab.freedesktop.org/mesa/mesa/-/blob/mesa-25.3.4/meson.build?ref_type=tags#L1849-L1850
[4] https://gitlab.freedesktop.org/mesa/mesa/-/blob/mesa-25.3.4/meson.build?ref_type=tags#L1855-L1856

Suggested-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Quentin Schulz <quentin.schulz@cherry.de>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agoadd mesa-tools native-only recipe
Quentin Schulz [Fri, 6 Feb 2026 17:23:58 +0000 (18:23 +0100)] 
add mesa-tools native-only recipe

libclc is required for some drivers (asahi, panfrost and intel at the
very least).

libclc brings very expensive dependencies such as llvm (through its
spirv-llvm-translator dependency) and clang.

Building clang and llvm for each target architecture is very expensive,
but mesa allows to depend on prebuilt host binaries (mesa-clc and
precomp-compiler). Those are built by mesa as well, but can be compiled
in mesa-native instead of mesa, making the dependency expensive but only
once regardless of the number of target architectures to build for.
Ideally the mesa-clc and precomp-compiler would only be compiled in
mesa-native if target mesa requires libclc support, however this is not
possible as a target recipe cannot impact or depend on a native recipe's
configuration. We thus have two choices, always build libclc in
mesa-native with its heavy dependencies and impact every build, or force
the user to modify the mesa-native recipe in a custom layer (as a native
recipe cannot use target's OVERRIDES). The latter is unacceptable so the
former seems to be the only option. Another big downside is that
mesa-native currently builds drivers (amd, nouveau, svga) which we may
have absolutely no interest in building, increasing the build time and
possibly dependencies list.

A third choice is to spin-off the native mesa recipe with libclc support
into a new recipe without drivers and only what's necessary to build
mesa-clc and precomp-compiler binaries.
This allows to keep a "clean" mesa-native recipe for whoever needs those
drivers built-in (e.g. for testing, for qemu-native, or whatever else)
and only bring the libclc dependency when required by the target recipe.

This is the native mesa tool recipe from the third choice. The next
commit will make use of it in the mesa recipes.

Suggested-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Quentin Schulz <quentin.schulz@cherry.de>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agomesa: security bump 26.0.0 -> 26.0.1
Quentin Schulz [Fri, 27 Feb 2026 16:14:56 +0000 (17:14 +0100)] 
mesa: security bump 26.0.0 -> 26.0.1

See https://docs.mesa3d.org/relnotes/26.0.1.html for the changelog and
sha256sum.

The announcement[1] on the mailing list states this contains an
important security fix.

[1] https://lists.freedesktop.org/archives/mesa-dev/2026-February/226597.html

Signed-off-by: Quentin Schulz <quentin.schulz@cherry.de>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agoruby: refresh patches
Changqing Li [Tue, 3 Mar 2026 05:13:41 +0000 (13:13 +0800)] 
ruby: refresh patches

* 0003-rdoc-build-reproducible-documentation.patch remove the not needed
  lines
* 0001-Don-t-save-the-original-name-and-timestamp.patch use better array

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agokernel: remove pkg-config variables for old (<5.15) kernels
Ross Burton [Thu, 26 Feb 2026 14:31:12 +0000 (14:31 +0000)] 
kernel: remove pkg-config variables for old (<5.15) kernels

The kernel has supported setting an alternative binary for pkg-config
with a variable since 5.19 (in 2022[1]) and we set that to
pkg-config-native, so there is no longer any need to also manually set
the PKG_CONFIG_* variables.

The relevant commit was backported and is present in 5.15.91 onwards,
but is not yet in 5.10.x.

[1] linux d5ea4fece450 ("kbuild: Allow kernel installation packaging to override pkg-config")

Signed-off-by: Ross Burton <ross.burton@arm.com>
Acked-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agoqemu: extend PKG_CONFIG_LIBDIR when using the host search path
Ross Burton [Thu, 26 Feb 2026 14:31:11 +0000 (14:31 +0000)] 
qemu: extend PKG_CONFIG_LIBDIR when using the host search path

The qemu recipe does something horrible when building natively and can
also search the build host's search path.

Now that we've moved from PKG_CONFIG_PATH to PKG_CONFIG_LIBDIR, this
code also needs to do the same as otherwise it will find packages on the
build host before the native sysroot.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agoclasses/pkgconfig: rationalise variable usage
Ross Burton [Thu, 26 Feb 2026 14:31:10 +0000 (14:31 +0000)] 
classes/pkgconfig: rationalise variable usage

Our PKG_CONFIG_* variables were a bit of a mess.

First, PKG_CONFIG_DIR is not used by either pkg-config or pkgconf.  It's
set to (approximately) ${libdir}/pkgconfig but we also want to search
${datadir}/pkgconfig so it isn't actually useful as an intermediate
variable.

Remove PKG_CONFIG_DIR and replace with the neatest expression for the
value we want: ${STAGING_LIBDIR}/pkgconfig.

Second, PKG_CONFIG_PATH and PKG_CONFIG_LIBDIR shouldn't be set to the
same paths. The semantics of these variables is that PKG_CONFIG_PATH is
searched first, followed by either PKG_CONFIG_LIBDIR or the default paths
compiled into the pkg-config binary.

Currently we set PKG_CONFIG_PATH to (approx.) ${libdir}:${datadir} and
PKG_CONFIG_LIBDIR to ${libdir}, so we search libdir twice.

Also the default paths embedded in the binary will be incorrect as they
point to pkgconfig-native's sysroot, so we absolutely need to set
PKG_CONFIG_LIBDIR.

Instead, set PKG_CONFIG_LIBDIR to ${libdir}:${datadir} so that the
default search path is correct. We can then leave PKG_CONFIG_PATH empty,
if a recipe has specific needs it can set that but normally it is not
needed anymore.

Then bubble these changes out to the few places where the variables are
used directly:

- Kernel/kconfig interaction where 'pkg-config' needs to read the
native files, not target.

- The class classes (native, etc) which redefine the values.  However,
as the values are defined in terms of sysroot variables, we can
typically remove assignments from those classes as they are redundant.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agoclasses/pkgconfig: move assignments
Ross Burton [Thu, 26 Feb 2026 13:45:00 +0000 (13:45 +0000)] 
classes/pkgconfig: move assignments

Move the pkg-config-specific assignments (PKG_CONFIG_LIBDIR, etc) out of
bitbake.conf and into pkgconfig.bbclass.

Note that the assignments now have to be ?= so that recipes such as
gdb-cross-canadian-* can build. This is because previously the assignment
order of PKG_CONFIG_PATH was:

1) bitbake.conf
2) cross-canadian.bbclass

But with this new layout it is:

1) cross-canadian.bbclass
2) pkgconfig.bbclass

If pkgconfig does a hard assign then it replaces any assignments that
have happened already.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agosystemd: add back warning for use with musl
Ross Burton [Thu, 5 Mar 2026 14:33:10 +0000 (14:33 +0000)] 
systemd: add back warning for use with musl

Add back a warning linking to the release notes to alert users that
systemd with musl is still experimental and has limitations compared to
glibc.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agosystemd 259.1: fix udev rootfs by-partuuid link generation
Mikko Rapeli [Fri, 20 Feb 2026 11:51:23 +0000 (13:51 +0200)] 
systemd 259.1: fix udev rootfs by-partuuid link generation

systemd update from 257 to 258 broke genericarm64 machine boot
on Renesas SMARC EVK board. The firmware and kernel drivers
trigger a lot of udev events and the changed event priority handling
meant that rootfs by-partuuid link was not generated inside
initramfs even when all needed kernel drivers were loaded
and correct block devices were detected.

Backported patches from main branch fix the issue. The patches
have been queued to upstream v258 and v259 stable branches.

For details see:
https://github.com/systemd/systemd/issues/40654

Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
8 weeks agosystemd: upgrade from 258.1 to 259.1
Chen Qi [Mon, 9 Feb 2026 08:02:13 +0000 (08:02 +0000)] 
systemd: upgrade from 258.1 to 259.1

Changes with v259:
https://github.com/systemd/systemd/releases/tag/v259

The 'iptc' PACKAGECONFIG is dropped, because:
"""
systemd-networkd and systemd-nspawn no longer support creating NAT
rules via iptables/libiptc APIs; only nftables is now supported.
"""

Add 'empower' group for systemd. See commit below:
https://github.com/systemd/systemd/commit/3150c342705f4ac27f2b3299ac0961e7a70e4451

This new version has big change on musl support.
"""
Incomplete support for musl libc is now available by setting the
"libc" meson option to "musl".
...
This support for musl is provided without a promise of continued
support in future releases.
"""
See https://github.com/systemd/systemd/blob/main/NEWS#L562 for more details.

Here are some examples:
- The musl specific '-D_LARGEFILE64_SOURCE' could be dropped because:
  https://github.com/systemd/systemd/commit/fb33d20c072f2e7c3d500f00f8c04c99271f34c1
- The 0017-Always-include-netinet-if_ether.h-first.patch and '-D__UAPI_DEF_ETHHDR=0
  could be dropped because:
  https://github.com/systemd/systemd/commit/8324ef421373c84b5034bf47b84fe42d84b1032f
- The 0015-Avoid-sequence-point-error.patch could be dropped because:
  https://github.com/systemd/systemd/commit/ebbc0ea7fd764c870bb8689111138b4f73854d42

With the above musl support, here are the changes for this 259.1 recipe:
- Add '-Dlibc=${TCLIBC}' configure option.
- The musl warning, do_warn_musl, is removed.
- *ALL* musl specific patches are dropped.
  Any further fix for musl should be sent to systemd upstream.

Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
8 weeks agolinux-yocto/6.18: genericarm64: fix configuration audit warning
Bruce Ashfield [Tue, 3 Mar 2026 16:51:38 +0000 (11:51 -0500)] 
linux-yocto/6.18: genericarm64: fix configuration audit warning

Integrating the following commit(s) to linux-yocto/.:

1/1 [
    Author: Bruce Ashfield
    Email: bruce.ashfield@gmail.com
    Subject: genericarm64: drop CONFIG_PINCTRL_SM8350_LPASS_LPI
    Date: Tue, 3 Mar 2026 11:48:55 -0500

    It has been removed upstream:

      commit 112d4978099700bcf5e3a4a7e571cf672188f3bc
      Author: Krzysztof Kozlowski <krzysztof.kozlowski@oss.qualcomm.com>
      Date:   Thu Jan 8 11:07:22 2026 +0100

          pinctrl: qcom: sm8350-lpass-lpi: Merge with SC7280 to fix I2S2 and SWR TX pins

          commit 1fbe3abb449c5ef2178e1c3e3e8b9a43a7a410ac upstream.

          Qualcomm SC7280 and SM8350 SoCs have slightly different LPASS audio
          blocks (v9.4.5 and v9.2), however the LPASS LPI pin controllers are
          exactly the same.  The driver for SM8350 has two issues, which can be
          fixed by simply moving over to SC7280 driver which has them correct:

          1. "i2s2_data_groups" listed twice GPIO12, but should have both GPIO12
             and GPIO13,

          2. "swr_tx_data_groups" contained GPIO5 for "swr_tx_data2" function, but
             that function is also available on GPIO14, thus listing it twice is
             not necessary.  OTOH, GPIO5 has also "swr_rx_data1", so selecting
             swr_rx_data function should not block  the TX one.

Fixes: be9f6d56381d ("pinctrl: qcom: sm8350-lpass-lpi: add SM8350 LPASS TLMM")
Cc: stable@vger.kernel.org
Signed-off-by: Krzysztof Kozlowski <krzysztof.kozlowski@oss.qualcomm.com>
Reviewed-by: Bartosz Golaszewski <bartosz.golaszewski@oss.qualcomm.com>
Reviewed-by: Konrad Dybcio <konrad.dybcio@oss.qualcomm.com>
Signed-off-by: Linus Walleij <linusw@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
    And is causing an audit warning, so we drop our assignement

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
]

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
8 weeks agoruby: Fix reproducibility issue in docs package
Changqing Li [Mon, 2 Mar 2026 15:08:25 +0000 (15:08 +0000)] 
ruby: Fix reproducibility issue in docs package

Add a patch, submitted upstream to address a timestamp sometimes added to the
docs files.

[RP: Extracted the missing pieces of a v2 patch into a separate commit]
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agosbom-cve-check: add recipe
Benjamin Robin [Thu, 26 Feb 2026 17:01:19 +0000 (18:01 +0100)] 
sbom-cve-check: add recipe

Provide sbom-cve-check (native) executable.

Signed-off-by: Benjamin Robin <benjamin.robin@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agopython3-spdx-python-model: add recipe
Benjamin Robin [Thu, 26 Feb 2026 17:01:18 +0000 (18:01 +0100)] 
python3-spdx-python-model: add recipe

 - Part of the dependency chain for sbom-cve-check

Signed-off-by: Benjamin Robin <benjamin.robin@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agopython3-hatch-build-scripts: add recipe
Benjamin Robin [Thu, 26 Feb 2026 17:01:17 +0000 (18:01 +0100)] 
python3-hatch-build-scripts: add recipe

 - Build dependency of python3-spdx-python-model.
 - Part of the dependency chain for sbom-cve-check

Signed-off-by: Benjamin Robin <benjamin.robin@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agopython3-shacl2code: add recipe
Benjamin Robin [Thu, 26 Feb 2026 17:01:16 +0000 (18:01 +0100)] 
python3-shacl2code: add recipe

 - Build dependency of python3-spdx-python-model.
 - Part of the dependency chain for sbom-cve-check

Signed-off-by: Benjamin Robin <benjamin.robin@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agomaintainers.inc: Sort list in alphabetical order
Benjamin Robin [Thu, 26 Feb 2026 17:01:15 +0000 (18:01 +0100)] 
maintainers.inc: Sort list in alphabetical order

No modification was realized except sorting the content of the file.
This way this is easier to add an entry; we just have to add a line
into maintainers.inc file, and sort it again.

Signed-off-by: Benjamin Robin <benjamin.robin@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agooe-selftest: devtool: add ide-sdk test for kernel modules
Adrian Freihofer [Mon, 23 Feb 2026 21:06:40 +0000 (22:06 +0100)] 
oe-selftest: devtool: add ide-sdk test for kernel modules

Add a new selftest that validates `devtool ide-sdk --ide=code` output for
a kernel module recipe.

The test verifies:
- generated makefile build/clean configurations
- read-only kernel source mapping
- exported cross-build terminal environment variables
- kernel-specific file exclude patterns
- extension recommendations for makefile/cpptools
- `gnu11` and kernel include paths in c_cpp_properties.json

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agometa-selftest: add test kernel module recipe
Adrian Freihofer [Mon, 23 Feb 2026 21:06:39 +0000 (22:06 +0100)] 
meta-selftest: add test kernel module recipe

Add a minimal out-of-tree kernel module and corresponding recipe under
meta-selftest for devtool ide-sdk test coverage.

This provides a simple module source and Makefile that can be built via
the module class in selftest scenarios.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agodevtool: ide-sdk: support kernel module development
Adrian Freihofer [Mon, 23 Feb 2026 21:06:38 +0000 (22:06 +0100)] 
devtool: ide-sdk: support kernel module development

This add very basic support for kernel module development with devtool
ide-sdk. It exports the kernel build environment and sets up
tasks for building and cleaning the module. But it does not yet support
install, deploy, and debug tasks. It looks like possible to offer the
same level of support as for CMake and Meson based projects, but that
requires more work.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agomodule.bbclass: move environment setup to kernel_module.py
Adrian Freihofer [Mon, 23 Feb 2026 21:06:37 +0000 (22:06 +0100)] 
module.bbclass: move environment setup to kernel_module.py

Refactor: move kernel module environment setup from do_devshell to
kernel_module.py

Extract the kernel module environment variable setup from do_devshell
into oe.kernel_module.kernel_module_os_env(). This enables code reuse
for future features such as devtool ide-sdk.

Note: it would also be possible to e.g. bb.utils.py. But when every such
a widely used utility function gets changed, bitbake needs to recompile
a lot of code. Therefore it's probably better to put it into a
separate file. It also is a very specific function, so oe.kernel_module
seems to be a good place.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agodevtool: ide-sdk gate gdbserver warnings on recipe need
Adrian Freihofer [Mon, 23 Feb 2026 21:06:36 +0000 (22:06 +0100)] 
devtool: ide-sdk gate gdbserver warnings on recipe need

Add a `wants_gdbserver` attribute to modified recipes and evaluate it
across the selected set. Only emit warnings about missing `gdbserver`
and missing `image-combined-dbg` when at least one recipe actually
requires remote debugging support.

This avoids noisy, irrelevant warnings in setups that do not use
gdbserver.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agooe-selftest: devtool: improve test_devtool_ide_sdk_shared_sysroots
Adrian Freihofer [Mon, 23 Feb 2026 21:06:35 +0000 (22:06 +0100)] 
oe-selftest: devtool: improve test_devtool_ide_sdk_shared_sysroots

In shared-sysroot IDE SDK mode, the C++ CMake example test ran CMake
commands but did not assert that configure/build completed successfully.
This could hide failures and produce false positives.

Capture command output from both steps and assert expected messages:
- configure: "Build files have been written to: <builddir>"
- build: "Built target"

This makes the test explicitly fail when CMake configure or build does not
complete as expected.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agooe-selftest: devtool: add compile step in ide-sdk tests
Adrian Freihofer [Mon, 23 Feb 2026 21:06:34 +0000 (22:06 +0100)] 
oe-selftest: devtool: add compile step in ide-sdk tests

Add explicit compile step to the ide-sdk test workflow. The current
implementation relies on calling bitbake -c install to perform the
install step, which also triggers a build. But this will change when
bitbake will support task execution without handling dependencies.
To make the tests future-proof, add an explicit compile step after
modifying the source code.

This also improves the test coverage for meson based recipes, as the
compile step is now explicitly tested.

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agotemplates: site.conf.sample: remove CVS proxy instructions
Antonin Godard [Tue, 3 Mar 2026 11:02:27 +0000 (12:02 +0100)] 
templates: site.conf.sample: remove CVS proxy instructions

The CVS fetcher was disabled with 5427500e4f23 ("fetch: Drop CVS fetcher
module") in BitBake. Remove the CVS instructions from this file.

Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agolibadwaita: upgrade 1.8.2 -> 1.8.4
Liu Yiding [Tue, 3 Mar 2026 10:01:27 +0000 (18:01 +0800)] 
libadwaita: upgrade 1.8.2 -> 1.8.4

=============
Version 1.8.4
=============
  - AdwDialog
    - Fix initial focus in bottom sheet mode
  - AdwWrapBox
    - Fix ADW_JUSTIFY_SPREAD
  - Translation updates
    - Indonesian
    - Kazakh
    - Romanian

Signed-off-by: Liu Yiding <liuyd.fnst@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agogtk4: upgrade 4.20.2 -> 4.20.3
Liu Yiding [Tue, 3 Mar 2026 10:00:51 +0000 (10:00 +0000)] 
gtk4: upgrade 4.20.2 -> 4.20.3

Changelog
  https://gitlab.gnome.org/GNOME/gtk/-/blob/4.20.3/NEWS?ref_type=tags

Signed-off-by: Liu Yiding <liuyd.fnst@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agosystemd: add nologin shell to polkitd user
sven.kalmbach [Tue, 3 Mar 2026 07:43:15 +0000 (08:43 +0100)] 
systemd: add nologin shell to polkitd user

Signed-off-by: sven.kalmbach <sven.kalmbach@loewensteinmedical.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agolibcomps: upgrade 0.1.23 -> 0.1.24
Moritz Haase [Tue, 3 Mar 2026 05:15:13 +0000 (06:15 +0100)] 
libcomps: upgrade 0.1.23 -> 0.1.24

The project did not publish release notes, but the list of changes is available
at [0].

[0]: https://github.com/rpm-software-management/libcomps/compare/0.1.23...0.1.24

Signed-off-by: Moritz Haase <Moritz.Haase@bmw.de>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agoimprove_kernel_cve_report: validate that cve details field exists
Daniel Turull [Wed, 4 Feb 2026 13:42:35 +0000 (14:42 +0100)] 
improve_kernel_cve_report: validate that cve details field exists

Check if the cve information has the details field to avoid crashing

Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agoimprove_kernel_cve_report: update data if CVE exists
Daniel Turull [Wed, 4 Feb 2026 13:42:34 +0000 (14:42 +0100)] 
improve_kernel_cve_report: update data if CVE exists

This allow to include additional information if one of the
sources is more complete. Updating description with more
up to date information and including summary.

For example:

Before while using cve_check:

       {
          "id": "CVE-2025-68167",
          "status": "Patched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2025-68167",
          "detail": "fixed-version",
          "description": "Fixed from version 6.18"
        },

After:
        {
          "id": "CVE-2025-68167",
          "status": "Patched",
          "link": "https://nvd.nist.gov/vuln/detail/CVE-2025-68167",
          "detail": "fixed-version",
          "description": "Fixed from version 6.18",
          "summary": "In the Linux kernel, the following (...)"
        },

Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agoimprove_kernel_cve_report: correct description for fixed-version
Daniel Turull [Wed, 4 Feb 2026 13:42:33 +0000 (14:42 +0100)] 
improve_kernel_cve_report: correct description for fixed-version

Remove duplication in the description when fixed-version, to be
consistent with the other status description.

Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agoimprove_kernel_cve_report: sort kernel_compiled_files
Daniel Turull [Wed, 4 Feb 2026 13:42:32 +0000 (14:42 +0100)] 
improve_kernel_cve_report: sort kernel_compiled_files

Sorting the set so the that output is predictable

Signed-off-by: Andrew Fenner <andrew.fenner@est.tech>
Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agolinux-yocto/6.18: update CVE exclusions (6.18.13)
Bruce Ashfield [Mon, 2 Mar 2026 04:55:33 +0000 (23:55 -0500)] 
linux-yocto/6.18: update CVE exclusions (6.18.13)

Data pulled from: https://github.com/CVEProject/cvelistV5

    1/1 [
        Author: cvelistV5 Github Action
        Email: github_action@example.com
        Subject: 2 changes (2 new | 0 updated): - 2 new CVEs: CVE-2026-2969, CVE-2026-2970 - 0 updated CVEs:
        Date: Mon, 23 Feb 2026 04:14:58 +0000

    ]

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agolinux-yocto/6.18: update to v6.18.13
Bruce Ashfield [Mon, 2 Mar 2026 04:55:32 +0000 (23:55 -0500)] 
linux-yocto/6.18: update to v6.18.13

Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:

    25e0b1c206e3d Linux 6.18.13
    df337ba02ca53 f2fs: fix incomplete block usage in compact SSA summaries
    855c54f1803e3 f2fs: fix to do sanity check on node footer in {read,write}_end_io
    cd2fec912a0f0 f2fs: fix to do sanity check on node footer in __write_node_folio()
    715a7a72e4736 USB: serial: option: add Telit FN920C04 RNDIS compositions
    f611dafe0ffd3 iommu/arm-smmu-qcom: do not register driver in probe()
    0415ae51a40e3 f2fs: optimize f2fs_overwrite_io() for f2fs_iomap_begin
    fee27b69dde1a f2fs: fix to avoid mapping wrong physical block for swapfile
    97e4f479939e5 f2fs: support non-4KB block size without packed_ssa feature
    995030be4ce63 f2fs: fix to avoid UAF in f2fs_write_end_io()
    d4a594dd952df f2fs: fix out-of-bounds access in sysfs attribute read/write
    bd66b4c487d50 f2fs: fix IS_CHECKPOINTED flag inconsistency issue caused by concurrent atomic commit and checkpoint writes
    70cf1e96bde07 f2fs: fix to check sysfs filename w/ gc_pin_file_thresh correctly
    fb9f7e52273db f2fs: fix to add gc count stat in f2fs_gc_range
    1c008ad0f0d1c fbdev: smscufx: properly copy ioctl memory to kernelspace
    3e4cbd1d46c24 fbdev: rivafb: fix divide error in nv3_arb()
    98d91080517d4 cpuset: Fix missing adaptation for cpuset_is_populated
    eaa9fcf57934c LoongArch: Rework KASAN initialization for PTW-enabled systems
    9b671f6f432be mm/hugetlb: fix excessive IPI broadcasts when unsharing PMD tables using mmu_gather
    0c74d37343b93 arm64: dts: mediatek: mt8183: Add missing endpoint IDs to display graph
    6d66464d1a059 gpiolib: acpi: Fix gpio count with string references
    fa4938e0d0d64 io_uring/fdinfo: be a bit nicer when looping a lot of SQEs/CQEs
    cab928242853a ASoC: fsl_xcvr: fix missing lock in fsl_xcvr_mode_put()
    00c57e2369386 drm/amd/display: remove assert around dpp_base replacement
    8e6f503961709 drm/amd/display: extend delta clamping logic to CM3 LUT helper
    f2584f791a103 tracing/dma: Cap dma_map_sg tracepoint arrays to prevent buffer overflow
    7bc40c6f36575 ASoC: cs42l43: Correct handling of 3-pole jack load detection
    a8ed5b974a244 platform/x86: panasonic-laptop: Fix sysfs group leak in error path
    2ca80dd4bb0e2 ASoC: sof_sdw: Add a quirk for Lenovo laptop using sidecar amps with cs42l43
    bb6ff25035da5 platform/x86/amd/pmc: Add quirk for MECHREVO Wujie 15X Pro
    a9584e9e46448 ALSA: hda/realtek: Enable headset mic for Acer Nitro 5
    78783e8d588cf ASoC: amd: yc: Add quirk for HP 200 G2a 16
    c3b2e922924bf ASoC: Intel: sof_es8336: Add DMI quirk for Huawei BOD-WXX9
    97528b1622b8f platform/x86: classmate-laptop: Add missing NULL pointer checks
    efdb9c8ca3cfb drm/tegra: hdmi: sor: Fix error: variable ‘j’ set but not used
    4b71ad7676564 romfs: check sb_set_blocksize() return value
    d2e01e0c5e947 ALSA: hda/realtek - fixed speaker no sound
    20bc7062c352f ASoC: cs35l45: Corrects ASP_TX5 DAPM widget channel
    1bdbcf326474c ALSA: hda/realtek: Add quirk for Inspur S14-G1
    b0b2cb84b64a9 gpio: sprd: Change sprd_gpio lock to raw_spin_lock
    652667ac1369e ASoC: amd: yc: Add ASUS ExpertBook PM1503CDA to quirks list
    464a50c6b23aa rust: driver: fix broken intra-doc links to example driver types
    7d82e965fe0e3 rust: dma: fix broken intra-doc links
    68dd6c5ebe799 rust: device: fix broken intra-doc links
    31f33b856d232 scsi: qla2xxx: Fix bsg_done() causing double free
    2784b1b43af37 Linux 6.18.12
    53a76425e0764 Revert "driver core: enforce device_lock for driver_match_device()"

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agolinux-yocto/6.18: genericarm64: feature splits and enablement
Bruce Ashfield [Mon, 2 Mar 2026 04:55:31 +0000 (23:55 -0500)] 
linux-yocto/6.18: genericarm64: feature splits and enablement

Integrating the following commit(s) to linux-yocto/.:

    98a36302 cfgs/nfc: create an intel-nfc-vendor specific feature
    6350b56a netfilter.cfg: enable NF_CONNTRACK_SNMP
    a425fdd0 pmem.cfg: enable DEV_DAX and DEV_DAX_HMEM
    70eeaeff genericarm64.scc: enable TRANSPARENT_HUGEPAGE support
    d62a1267 security-arm64.cfg: rename CFI_CLANG to CFI
    b925ef94 security-arm64.cfg: correctly enable KASAN
    1fdb98a4 security-arm64.cfg: add comment for ARM64_BTI_KERNEL
    6d8bf6f0 security.cfg: move RANDOMIZE_MEMORY to x86_64
    18fcb6dc arm.scc: move ARM_CPUIDLE to arm only
    7e1d9b2b numa_x86_64.scc: move x86_64 config from numa.cfg to numa_x86_64.cfg
    e93e999e sound.cfg: split SND_SOC_WM8731 to I2C and SPI variants
    5a567776 sound_x86.scc: take over x86 configs from sound.scc
    1ae7ce94 genericarm64.cfg: enable MTD NAND ECC support
    15d48f71 genericarm64.cfg: enable TI MTD NAND support
    40a67254 genericarm64-serial.cfg: set SERIAL_8250_CONSOLE to y
    5ee6148e qemu-kvm.cfg: remove extra space
    9f780417 firmware.cfg: whitespace fixes
    bc221187 genericarm64.cfg: fix CONFIG_PM_DEVFREQ_EVENT
    aef69bf3 Revert "genericarm64.scc: enable OP-TEE support"
    6f597e1a genericarm64.cfg: enable SCSI support for HiSilicon etc
    f1f313cf genericarm64.scc: enable RPMB support
    a4565911 genericarm64.scc: enable GNSS support
    391566e2 gnss.scc: add feature
    d40a455d genericarm64.cfg: enable more bus drivers
    20e41104 genericarm64.cfg: enable PCI_PASID support
    0b2967f5 genericarm64.scc: enable NFC support
    2643b37e nfc-vendor.scc: move Intel configs to nfc-vendor-intel.cfg
    b1d00b01 genericarm64.scc: enable RFKILL LED, INPUT and GPIO
    92610953 rfkill-extra.scc: add fragment for RFKILL LEDs, input and GPIO support
    fc7d5f45 bluetooth.cfg: enable BT_LEDS support
    f18ec272 genericarm64.scc: enable HSR
    79fa2c17 hsr.scc: add feature for High-availability Seamless Redundancy (HSR & PRP)
    1313923a genericarm64.scc: enable Time Sensitive Networking
    e190eeff intel-x86.scc: enable hibernation with feature
    c941f4ee genericarm64.scc: enable hibernation support
    ce5c6d9d hibernation.scc: add feature
    83620a7d bluetooth-usb.cfg: enable MediaTek and RealTek support
    cf6e1261 bluetooth-hw.cfg: enable BT_MTK
    ffdd0769 genericarm64.cfg: enable Microchip PHY support

Signed-off-by: Mikko Rapeli <mikko.rapeli@linaro.org>
Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agolinux-yocto/6.18: update CVE exclusions (6.18.11)
Bruce Ashfield [Mon, 2 Mar 2026 04:55:30 +0000 (23:55 -0500)] 
linux-yocto/6.18: update CVE exclusions (6.18.11)

Data pulled from: https://github.com/CVEProject/cvelistV5

    1/1 [
        Author: cvelistV5 Github Action
        Email: github_action@example.com
        Subject: 1416 changes (1 new | 1415 updated): - 1 new CVEs: CVE-2026-2563 - 1415 updated CVEs: CVE-2001-0143, CVE-2001-0144, CVE-2001-0145, CVE-2001-0146, CVE-2001-0147, CVE-2001-0148, CVE-2001-0149, CVE-2001-0150, CVE-2001-0151, CVE-2001-0152, CVE-2001-0153, CVE-2001-0154, CVE-2001-0155, CVE-2001-0156, CVE-2001-0157, CVE-2001-0160, CVE-2001-0161, CVE-2001-0162, CVE-2001-0163, CVE-2001-0164, CVE-2001-0165, CVE-2001-0166, CVE-2001-0167, CVE-2001-0168, CVE-2001-0169, CVE-2001-0170, CVE-2001-0171, CVE-2001-0172, CVE-2001-0173, CVE-2001-0174, CVE-2001-0175, CVE-2001-0176, CVE-2001-0177, CVE-2001-0178, CVE-2001-0179, CVE-2001-0180, CVE-2001-0181, CVE-2001-0182, CVE-2001-0183, CVE-2001-0184, CVE-2001-0185, CVE-2001-0186, CVE-2001-0187, CVE-2001-0188, CVE-2001-0189, CVE-2001-0190, CVE-2001-0191, CVE-2001-0192, CVE-2001-0193, CVE-2001-0194, CVE-2001-0195, CVE-2001-0196, CVE-2001-0197, CVE-2001-0198, CVE-2001-0199, CVE-2001-0200, CVE-2001-0201, CVE-2001-0202, CVE-2001-0203, CVE-2001-0204, CVE-2001-0205, CVE-2001-0206, CVE-2001-0207, CVE-2001-0208, CVE-2001-0209, CVE-2001-0210, CVE-2001-0211, CVE-2001-0212, CVE-2001-0213, CVE-2001-0214, CVE-2001-0215, CVE-2001-0216, CVE-2001-0217, CVE-2001-0218, CVE-2001-0219, CVE-2001-0220, CVE-2001-0221, CVE-2001-0222, CVE-2001-0223, CVE-2001-0224, CVE-2001-0225, CVE-2001-0226, CVE-2001-0227, CVE-2001-0228, CVE-2001-0229, CVE-2001-0230, CVE-2001-0231, CVE-2001-0232, CVE-2001-0233, CVE-2001-0234, CVE-2001-0235, CVE-2001-0236, CVE-2001-0237, CVE-2001-0238, CVE-2001-0239, CVE-2001-0240, CVE-2001-0241, CVE-2001-0242, CVE-2001-0243, CVE-2001-0244, CVE-2001-0245, CVE-2001-0246, CVE-2001-0247, CVE-2001-0248, CVE-2001-0249, CVE-2001-0250, CVE-2001-0251, CVE-2001-0252, CVE-2001-0253, CVE-2001-0254, CVE-2001-0255, CVE-2001-0256, CVE-2001-0257, CVE-2001-0258, CVE-2001-0259, CVE-2001-0260, CVE-2001-0261, CVE-2001-0262, CVE-2001-0263, CVE-2001-0264, CVE-2001-0265, CVE-2001-0266, CVE-2001-0267, CVE-2001-0268, CVE-2001-0269, CVE-2001-0270, CVE-2001-0271, CVE-2001-0272, CVE-2001-0273, CVE-2001-0274, CVE-2001-0275, CVE-2001-0276, CVE-2001-0277, CVE-2001-0278, CVE-2001-0279, CVE-2001-0280, CVE-2001-0281, CVE-2001-0282, CVE-2001-0283, CVE-2001-0284, CVE-2001-0285, CVE-2001-0286, CVE-2001-0287, CVE-2001-0288, CVE-2001-0289, CVE-2001-0290, CVE-2001-0291, CVE-2001-0292, CVE-2001-0293, CVE-2001-0294, CVE-2001-0295, CVE-2001-0296, CVE-2001-0297, CVE-2001-0298, CVE-2001-0299, CVE-2001-0300, CVE-2001-0301, CVE-2001-0302, CVE-2001-0303, CVE-2001-0304, CVE-2001-0305, CVE-2001-0306, CVE-2001-0307, CVE-2001-0308, CVE-2001-0309, CVE-2001-0310, CVE-2001-0311, CVE-2001-0312, CVE-2001-0313, CVE-2001-0314, CVE-2001-0315, CVE-2001-0316, CVE-2001-0317, CVE-2001-0318, CVE-2001-0319, CVE-2001-0320, CVE-2001-0321, CVE-2001-0322, CVE-2001-0323, CVE-2001-0324, CVE-2001-0325, CVE-2001-0326, CVE-2001-0327, CVE-2001-0328, CVE-2001-0329, CVE-2001-0330, CVE-2001-0331, CVE-2001-0332, CVE-2001-0333, CVE-2001-0334, CVE-2001-0335, CVE-2001-0336, CVE-2001-0337, CVE-2001-0338, CVE-2001-0339, CVE-2001-0340, CVE-2001-0341, CVE-2001-0344, CVE-2001-0345, CVE-2001-0346, CVE-2001-0347, CVE-2001-0348, CVE-2001-0349, CVE-2001-0350, CVE-2001-0351, CVE-2001-0352, CVE-2001-0353, CVE-2001-0354, CVE-2001-0355, CVE-2001-0357, CVE-2001-0358, CVE-2001-0359, CVE-2001-0360, CVE-2001-0361, CVE-2001-0364, CVE-2001-0365, CVE-2001-0366, CVE-2001-0367, CVE-2001-0368, CVE-2001-0369, CVE-2001-0370, CVE-2001-0371, CVE-2001-0372, CVE-2001-0373, CVE-2001-0374, CVE-2001-0375, CVE-2001-0376, CVE-2001-0377, CVE-2001-0378, CVE-2001-0379, CVE-2001-0380, CVE-2001-0381, CVE-2001-0382, CVE-2001-0383, CVE-2001-0384, CVE-2001-0385, CVE-2001-0386, CVE-2001-0387, CVE-2001-0388, CVE-2001-0389, CVE-2001-0390, CVE-2001-0391, CVE-2001-0392, CVE-2001-0393, CVE-2001-0394, CVE-2001-0395, CVE-2001-0396, CVE-2001-0397, CVE-2001-0398, CVE-2001-0399, CVE-2001-0400, CVE-2001-0401, CVE-2001-0402, CVE-2001-0403, CVE-2001-0404, CVE-2001-0405, CVE-2001-0406, CVE-2001-0407, CVE-2001-0408, CVE-2001-0409, CVE-2001-0410, CVE-2001-0411, CVE-2001-0412, CVE-2001-0413, CVE-2001-0414, CVE-2001-0415, CVE-2001-0416, CVE-2001-0417, CVE-2001-0418, CVE-2001-0419, CVE-2001-0420, CVE-2001-0421, CVE-2001-0422, CVE-2001-0423, CVE-2001-0424, CVE-2001-0425, CVE-2001-0426, CVE-2001-0427, CVE-2001-0428, CVE-2001-0429, CVE-2001-0430, CVE-2001-0431, CVE-2001-0432, CVE-2001-0433, CVE-2001-0434, CVE-2001-0435, CVE-2001-0436, CVE-2001-0437, CVE-2001-0438, CVE-2001-0439, CVE-2001-0440, CVE-2001-0441, CVE-2001-0442, CVE-2001-0443, CVE-2001-0444, CVE-2001-0446, CVE-2001-0447, CVE-2001-0448, CVE-2001-0449, CVE-2001-0450, CVE-2001-0451, CVE-2001-0452, CVE-2001-0453, CVE-2001-0454, CVE-2001-0455, CVE-2001-0456, CVE-2001-0457, CVE-2001-0458, CVE-2001-0459, CVE-2001-0460, CVE-2001-0461, CVE-2001-0462, CVE-2001-0463, CVE-2001-0464, CVE-2001-0465, CVE-2001-0466, CVE-2001-0467, CVE-2001-0468, CVE-2001-0469, CVE-2001-0470, CVE-2001-0471, CVE-2001-0472, CVE-2001-0473, CVE-2001-0474, CVE-2001-0475, CVE-2001-0476, CVE-2001-0477, CVE-2001-0478, CVE-2001-0479, CVE-2001-0480, CVE-2001-0481, CVE-2001-0482, CVE-2001-0483, CVE-2001-0484, CVE-2001-0485, CVE-2001-0486, CVE-2001-0487, CVE-2001-0488, CVE-2001-0489, CVE-2001-0490, CVE-2001-0491, CVE-2001-0492, CVE-2001-0493, CVE-2001-0494, CVE-2001-0495, CVE-2001-0496, CVE-2001-0497, CVE-2001-0498, CVE-2001-0499, CVE-2001-0500, CVE-2001-0501, CVE-2001-0502, CVE-2001-0503, CVE-2001-0504, CVE-2001-0505, CVE-2001-0506, CVE-2001-0507, CVE-2001-0508, CVE-2001-0509, CVE-2001-0513, CVE-2001-0514, CVE-2001-0515, CVE-2001-0516, CVE-2001-0517, CVE-2001-0518, CVE-2001-0519, CVE-2001-0520, CVE-2001-0521, CVE-2001-0522, CVE-2001-0523, CVE-2001-0524, CVE-2001-0525, CVE-2001-0526, CVE-2001-0527, CVE-2001-0528, CVE-2001-0529, CVE-2001-0530, CVE-2001-0533, CVE-2001-0534, CVE-2001-0535, CVE-2001-0537, CVE-2001-0538, CVE-2001-0540, CVE-2001-0541, CVE-2001-0542, CVE-2001-0543, CVE-2001-0544, CVE-2001-0545, CVE-2001-0546, CVE-2001-0547, CVE-2001-0548, CVE-2001-0549, CVE-2001-0550, CVE-2001-0551, CVE-2001-0552, CVE-2001-0553, CVE-2001-0554, CVE-2001-0555, CVE-2001-0556, CVE-2001-0557, CVE-2001-0558, CVE-2001-0559, CVE-2001-0560, CVE-2001-0561, CVE-2001-0562, CVE-2001-0563, CVE-2001-0564, CVE-2001-0565, CVE-2001-0566, CVE-2001-0567, CVE-2001-0568, CVE-2001-0569, CVE-2001-0570, CVE-2001-0571, CVE-2001-0572, CVE-2001-0573, CVE-2001-0574, CVE-2001-0575, CVE-2001-0576, CVE-2001-0577, CVE-2001-0578, CVE-2001-0579, CVE-2001-0580, CVE-2001-0581, CVE-2001-0582, CVE-2001-0583, CVE-2001-0584, CVE-2001-0585, CVE-2001-0586, CVE-2001-0587, CVE-2001-0588, CVE-2001-0589, CVE-2001-0590, CVE-2001-0591, CVE-2001-0592, CVE-2001-0593, CVE-2001-0594, CVE-2001-0595, CVE-2001-0596, CVE-2001-0597, CVE-2001-0598, CVE-2001-0599, CVE-2001-0600, CVE-2001-0601, CVE-2001-0602, CVE-2001-0603, CVE-2001-0604, CVE-2001-0605, CVE-2001-0606, CVE-2001-0607, CVE-2001-0608, CVE-2001-0609, CVE-2001-0610, CVE-2001-0611, CVE-2001-0612, CVE-2001-0613, CVE-2001-0614, CVE-2001-0615, CVE-2001-0616, CVE-2001-0617, CVE-2001-0618, CVE-2001-0619, CVE-2001-0620, CVE-2001-0621, CVE-2001-0622, CVE-2001-0623, CVE-2001-0624, CVE-2001-0625, CVE-2001-0626, CVE-2001-0627, CVE-2001-0628, CVE-2001-0629, CVE-2001-0630, CVE-2001-0631, CVE-2001-0632, CVE-2001-0633, CVE-2001-0634, CVE-2001-0635, CVE-2001-0636, CVE-2001-0641, CVE-2001-0642, CVE-2001-0643, CVE-2001-0644, CVE-2001-0645, CVE-2001-0646, CVE-2001-0647, CVE-2001-0648, CVE-2001-0649, CVE-2001-0650, CVE-2001-0652, CVE-2001-0653, CVE-2001-0654, CVE-2001-0655, CVE-2001-0656, CVE-2001-0657, CVE-2001-0658, CVE-2001-0659, CVE-2001-0660, CVE-2001-0662, CVE-2001-0663, CVE-2001-0664, CVE-2001-0665, CVE-2001-0666, CVE-2001-0667, CVE-2001-0668, CVE-2001-0669, CVE-2001-0670, CVE-2001-0671, CVE-2001-0674, CVE-2001-0675, CVE-2001-0676, CVE-2001-0677, CVE-2001-0678, CVE-2001-0679, CVE-2001-0680, CVE-2001-0681, CVE-2001-0682, CVE-2001-0683, CVE-2001-0684, CVE-2001-0685, CVE-2001-0686, CVE-2001-0687, CVE-2001-0688, CVE-2001-0689, CVE-2001-0690, CVE-2001-0691, CVE-2001-0692, CVE-2001-0693, CVE-2001-0694, CVE-2001-0695, CVE-2001-0696, CVE-2001-0697, CVE-2001-0698, CVE-2001-0699, CVE-2001-0700, CVE-2001-0701, CVE-2001-0702, CVE-2001-0703, CVE-2001-0704, CVE-2001-0705, CVE-2001-0706, CVE-2001-0707, CVE-2001-0708, CVE-2001-0709, CVE-2001-0710, CVE-2001-0711, CVE-2001-0712, CVE-2001-0713, CVE-2001-0714, CVE-2001-0715, CVE-2001-0716, CVE-2001-0717, CVE-2001-0718, CVE-2001-0719, CVE-2001-0720, CVE-2001-0721, CVE-2001-0722, CVE-2001-0723, CVE-2001-0724, CVE-2001-0726, CVE-2001-0727, CVE-2001-0728, CVE-2001-0729, CVE-2001-0730, CVE-2001-0731, CVE-2001-0733, CVE-2001-0734, CVE-2001-0735, CVE-2001-0736, CVE-2001-0737, CVE-2001-0738, CVE-2001-0739, CVE-2001-0740, CVE-2001-0741, CVE-2001-0742, CVE-2001-0743, CVE-2001-0744, CVE-2001-0745, CVE-2001-0746, CVE-2001-0747, CVE-2001-0748, CVE-2001-0749, CVE-2001-0750, CVE-2001-0751, CVE-2001-0752, CVE-2001-0753, CVE-2001-0754, CVE-2001-0755, CVE-2001-0756, CVE-2001-0757, CVE-2001-0758, CVE-2001-0759, CVE-2001-0760, CVE-2001-0761, CVE-2001-0762, CVE-2001-0763, CVE-2001-0764, CVE-2001-0765, CVE-2001-0766, CVE-2001-0767, CVE-2001-0768, CVE-2001-0769, CVE-2001-0770, CVE-2001-0771, CVE-2001-0772, CVE-2001-0773, CVE-2001-0774, CVE-2001-0775, CVE-2001-0776, CVE-2001-0777, CVE-2001-0778, CVE-2001-0779, CVE-2001-0780, CVE-2001-0781, CVE-2001-0782, CVE-2001-0783, CVE-2001-0784, CVE-2001-0785, CVE-2001-0786, CVE-2001-0787, CVE-2001-0788, CVE-2001-0789, CVE-2001-0790, CVE-2001-0791, CVE-2001-0792, CVE-2001-0794, CVE-2001-0795, CVE-2001-0796, CVE-2001-0797, CVE-2001-0798, CVE-2001-0799, CVE-2001-0800, CVE-2001-0801, CVE-2001-0802, CVE-2001-0803, CVE-2001-0804, CVE-2001-0805, CVE-2001-0806, CVE-2001-0807, CVE-2001-0808, CVE-2001-0809, CVE-2001-0810, CVE-2001-0811, CVE-2001-0812, CVE-2001-0813, CVE-2001-0814, CVE-2001-0815, CVE-2001-0816, CVE-2001-0817, CVE-2001-0818, CVE-2001-0819, CVE-2001-0820, CVE-2001-0821, CVE-2001-0822, CVE-2001-0823, CVE-2001-0824, CVE-2001-0825, CVE-2001-0826, CVE-2001-0828, CVE-2001-0829, CVE-2001-0830, CVE-2001-0831, CVE-2001-0832, CVE-2001-0833, CVE-2001-0834, CVE-2001-0835, CVE-2001-0836, CVE-2001-0837, CVE-2001-0838, CVE-2001-0839, CVE-2001-0840, CVE-2001-0841, CVE-2001-0842, CVE-2001-0843, CVE-2001-0844, CVE-2001-0845, CVE-2001-0846, CVE-2001-0847, CVE-2001-0848, CVE-2001-0849, CVE-2001-0850, CVE-2001-0851, CVE-2001-0852, CVE-2001-0853, CVE-2001-0854, CVE-2001-0855, CVE-2001-0856, CVE-2001-0857, CVE-2001-0858, CVE-2001-0859, CVE-2001-0860, CVE-2001-0861, CVE-2001-0862, CVE-2001-0863, CVE-2001-0864, CVE-2001-0865, CVE-2001-0866, CVE-2001-0867, CVE-2001-0868, CVE-2001-0869, CVE-2001-0870, CVE-2001-0871, CVE-2001-0872, CVE-2001-0873, CVE-2001-0874, CVE-2001-0875, CVE-2001-0876, CVE-2001-0877, CVE-2001-0879, CVE-2001-0884, CVE-2001-0886, CVE-2001-0887, CVE-2001-0888, CVE-2001-0889, CVE-2001-0890, CVE-2001-0891, CVE-2001-0892, CVE-2001-0893, CVE-2001-0894, CVE-2001-0895, CVE-2001-0896, CVE-2001-0897, CVE-2001-0898, CVE-2001-0899, CVE-2001-0900, CVE-2001-0901, CVE-2001-0902, CVE-2001-0903, CVE-2001-0904, CVE-2001-0905, CVE-2001-0906, CVE-2001-0907, CVE-2001-0908, CVE-2001-0909, CVE-2001-0910, CVE-2001-0911, CVE-2001-0912, CVE-2001-0913, CVE-2001-0914, CVE-2001-0915, CVE-2001-0916, CVE-2001-0917, CVE-2001-0918, CVE-2001-0919, CVE-2001-0920, CVE-2001-0921, CVE-2001-0922, CVE-2001-0923, CVE-2001-0924, CVE-2001-0925, CVE-2001-0926, CVE-2001-0927, CVE-2001-0928, CVE-2001-0929, CVE-2001-0930, CVE-2001-0931, CVE-2001-0932, CVE-2001-0933, CVE-2001-0934, CVE-2001-0935, CVE-2001-0936, CVE-2001-0937, CVE-2001-0938, CVE-2001-0939, CVE-2001-0940, CVE-2001-0941, CVE-2001-0942, CVE-2001-0943, CVE-2001-0944, CVE-2001-0945, CVE-2001-0946, CVE-2001-0947, CVE-2001-0948, CVE-2001-0949, CVE-2001-0950, CVE-2001-0951, CVE-2001-0952, CVE-2001-0953, CVE-2001-0954, CVE-2001-0955, CVE-2001-0956, CVE-2001-0958, CVE-2001-0959, CVE-2001-0960, CVE-2001-0961, CVE-2001-0962, CVE-2001-0963, CVE-2001-0964, CVE-2001-0965, CVE-2001-0966, CVE-2001-0967, CVE-2001-0968, CVE-2001-0969, CVE-2001-0970, CVE-2001-0971, CVE-2001-0972, CVE-2001-0973, CVE-2001-0974, CVE-2001-0975, CVE-2001-0976, CVE-2001-0977, CVE-2001-0978, CVE-2001-0979, CVE-2001-0980, CVE-2001-0981, CVE-2001-0982, CVE-2001-0983, CVE-2001-0984, CVE-2001-0985, CVE-2001-0986, CVE-2001-0987, CVE-2001-0988, CVE-2001-0989, CVE-2001-0990, CVE-2001-0991, CVE-2001-0992, CVE-2001-0993, CVE-2001-0994, CVE-2001-0995, CVE-2001-0996, CVE-2001-0997, CVE-2001-0998, CVE-2001-0999, CVE-2001-1000, CVE-2001-1002, CVE-2001-1003, CVE-2001-1004, CVE-2001-1005, CVE-2001-1006, CVE-2001-1007, CVE-2001-1008, CVE-2001-1009, CVE-2001-1010, CVE-2001-1011, CVE-2001-1012, CVE-2001-1013, CVE-2001-1014, CVE-2001-1015, CVE-2001-1016, CVE-2001-1017, CVE-2001-1018, CVE-2001-1019, CVE-2001-1020, CVE-2001-1021, CVE-2001-1022, CVE-2001-1023, CVE-2001-1024, CVE-2001-1025, CVE-2001-1026, CVE-2001-1027, CVE-2001-1028, CVE-2001-1029, CVE-2001-1030, CVE-2001-1031, CVE-2001-1032, CVE-2001-1033, CVE-2001-1034, CVE-2001-1035, CVE-2001-1036, CVE-2001-1037, CVE-2001-1038, CVE-2001-1039, CVE-2001-1040, CVE-2001-1041, CVE-2001-1042, CVE-2001-1043, CVE-2001-1044, CVE-2001-1045, CVE-2001-1046, CVE-2001-1047, CVE-2001-1048, CVE-2001-1049, CVE-2001-1050, CVE-2001-1051, CVE-2001-1052, CVE-2001-1053, CVE-2001-1054, CVE-2001-1055, CVE-2001-1056, CVE-2001-1057, CVE-2001-1058, CVE-2001-1059, CVE-2001-1060, CVE-2001-1061, CVE-2001-1062, CVE-2001-1063, CVE-2001-1064, CVE-2001-1065, CVE-2001-1066, CVE-2001-1067, CVE-2001-1068, CVE-2001-1069, CVE-2001-1070, CVE-2001-1071, CVE-2001-1072, CVE-2001-1073, CVE-2001-1074, CVE-2001-1075, CVE-2001-1076, CVE-2001-1077, CVE-2001-1078, CVE-2001-1079, CVE-2001-1080, CVE-2001-1081, CVE-2001-1082, CVE-2001-1083, CVE-2001-1084, CVE-2001-1085, CVE-2001-1086, CVE-2001-1087, CVE-2001-1088, CVE-2001-1089, CVE-2001-1090, CVE-2001-1091, CVE-2001-1092, CVE-2001-1093, CVE-2001-1094, CVE-2001-1095, CVE-2001-1096, CVE-2001-1097, CVE-2001-1098, CVE-2001-1099, CVE-2001-1100, CVE-2001-1101, CVE-2001-1102, CVE-2001-1103, CVE-2001-1104, CVE-2001-1105, CVE-2001-1106, CVE-2001-1107, CVE-2001-1108, CVE-2001-1109, CVE-2001-1110, CVE-2001-1111, CVE-2001-1112, CVE-2001-1113, CVE-2001-1114, CVE-2001-1115, CVE-2001-1116, CVE-2001-1117, CVE-2001-1118, CVE-2001-1119, CVE-2001-1120, CVE-2001-1121, CVE-2001-1122, CVE-2001-1123, CVE-2001-1124, CVE-2001-1125, CVE-2001-1126, CVE-2001-1127, CVE-2001-1128, CVE-2001-1129, CVE-2001-1130, CVE-2001-1131, CVE-2001-1132, CVE-2001-1133, CVE-2001-1134, CVE-2001-1135, CVE-2001-1136, CVE-2001-1137, CVE-2001-1138, CVE-2001-1139, CVE-2001-1140, CVE-2001-1141, CVE-2001-1142, CVE-2001-1143, CVE-2001-1144, CVE-2001-1145, CVE-2001-1146, CVE-2001-1147, CVE-2001-1148, CVE-2001-1149, CVE-2001-1150, CVE-2001-1151, CVE-2001-1152, CVE-2001-1153, CVE-2001-1154, CVE-2001-1155, CVE-2001-1156, CVE-2001-1157, CVE-2001-1158, CVE-2001-1159, CVE-2001-1160, CVE-2001-1161, CVE-2001-1162, CVE-2001-1163, CVE-2001-1164, CVE-2001-1165, CVE-2001-1166, CVE-2001-1167, CVE-2001-1168, CVE-2001-1169, CVE-2001-1170, CVE-2001-1171, CVE-2001-1172, CVE-2001-1173, CVE-2001-1174, CVE-2001-1175, CVE-2001-1176, CVE-2001-1177, CVE-2001-1178, CVE-2001-1179, CVE-2001-1180, CVE-2001-1181, CVE-2001-1182, CVE-2001-1183, CVE-2001-1184, CVE-2001-1185, CVE-2001-1186, CVE-2001-1187, CVE-2001-1188, CVE-2001-1189, CVE-2001-1190, CVE-2001-1191, CVE-2001-1192, CVE-2001-1193, CVE-2001-1194, CVE-2001-1195, CVE-2001-1196, CVE-2001-1197, CVE-2001-1198, CVE-2001-1199, CVE-2001-1200, CVE-2001-1201, CVE-2001-1202, CVE-2001-1203, CVE-2001-1204, CVE-2001-1205, CVE-2001-1206, CVE-2001-1207, CVE-2001-1208, CVE-2001-1209, CVE-2001-1210, CVE-2001-1211, CVE-2001-1212, CVE-2001-1213, CVE-2001-1214, CVE-2001-1215, CVE-2001-1216, CVE-2001-1217, CVE-2001-1218, CVE-2001-1219, CVE-2001-1220, CVE-2001-1221, CVE-2001-1222, CVE-2001-1223, CVE-2001-1224, CVE-2001-1225, CVE-2001-1226, CVE-2001-1227, CVE-2001-1228, CVE-2001-1229, CVE-2001-1230, CVE-2001-1231, CVE-2001-1232, CVE-2001-1233, CVE-2001-1234, CVE-2001-1235, CVE-2001-1236, CVE-2001-1237, CVE-2001-1238, CVE-2001-1239, CVE-2001-1240, CVE-2001-1241, CVE-2001-1242, CVE-2001-1243, CVE-2001-1244, CVE-2001-1245, CVE-2001-1246, CVE-2001-1247, CVE-2001-1248, CVE-2001-1249, CVE-2001-1250, CVE-2001-1251, CVE-2001-1252, CVE-2001-1253, CVE-2001-1254, CVE-2001-1255, CVE-2001-1256, CVE-2001-1257, CVE-2001-1258, CVE-2001-1259, CVE-2001-1260, CVE-2001-1261, CVE-2001-1262, CVE-2001-1263, CVE-2001-1264, CVE-2001-1265, CVE-2001-1266, CVE-2001-1267, CVE-2001-1268, CVE-2001-1269, CVE-2001-1270, CVE-2001-1271, CVE-2001-1272, CVE-2001-1273, CVE-2001-1274, CVE-2001-1275, CVE-2001-1276, CVE-2001-1277, CVE-2001-1278, CVE-2001-1279, CVE-2001-1280, CVE-2001-1281, CVE-2001-1282, CVE-2001-1283, CVE-2001-1284, CVE-2001-1285, CVE-2001-1286, CVE-2001-1287, CVE-2001-1288, CVE-2001-1289, CVE-2001-1290, CVE-2001-1291, CVE-2001-1292, CVE-2001-1293, CVE-2001-1294, CVE-2001-1295, CVE-2001-1296, CVE-2001-1297, CVE-2001-1298, CVE-2001-1299, CVE-2001-1300, CVE-2001-1301, CVE-2001-1302, CVE-2001-1303, CVE-2001-1304, CVE-2001-1305, CVE-2001-1306, CVE-2001-1307, CVE-2001-1308, CVE-2001-1309, CVE-2001-1310, CVE-2001-1311, CVE-2001-1312, CVE-2001-1313, CVE-2001-1314, CVE-2001-1315, CVE-2001-1316, CVE-2001-1317, CVE-2001-1318, CVE-2001-1319, CVE-2001-1320, CVE-2001-1321, CVE-2001-1322, CVE-2001-1323, CVE-2001-1324, CVE-2001-1325, CVE-2001-1326, CVE-2001-1327, CVE-2001-1328, CVE-2001-1329, CVE-2001-1330, CVE-2001-1331, CVE-2001-1332, CVE-2001-1333, CVE-2001-1334, CVE-2001-1335, CVE-2001-1336, CVE-2001-1337, CVE-2001-1338, CVE-2001-1339, CVE-2001-1340, CVE-2001-1341, CVE-2001-1342, CVE-2001-1343, CVE-2001-1344, CVE-2001-1345, CVE-2001-1346, CVE-2001-1347, CVE-2001-1348, CVE-2001-1349, CVE-2001-1350, CVE-2001-1351, CVE-2001-1352, CVE-2001-1353, CVE-2001-1354, CVE-2001-1355, CVE-2001-1356, CVE-2001-1357, CVE-2001-1358, CVE-2001-1359, CVE-2001-1360, CVE-2001-1361, CVE-2001-1362, CVE-2001-1363, CVE-2001-1364, CVE-2001-1365, CVE-2001-1366, CVE-2001-1367, CVE-2001-1368, CVE-2001-1369, CVE-2001-1370, CVE-2001-1371, CVE-2001-1372, CVE-2001-1373, CVE-2001-1374, CVE-2001-1375, CVE-2001-1376, CVE-2001-1377, CVE-2001-1378, CVE-2001-1379, CVE-2001-1380, CVE-2001-1382, CVE-2001-1383, CVE-2001-1384, CVE-2001-1385, CVE-2001-1386, CVE-2001-1387, CVE-2001-1388, CVE-2001-1389, CVE-2001-1390, CVE-2001-1391, CVE-2001-1392, CVE-2001-1393, CVE-2001-1394, CVE-2001-1395, CVE-2001-1396, CVE-2001-1397, CVE-2001-1398, CVE-2001-1399, CVE-2001-1400, CVE-2001-1401, CVE-2001-1402, CVE-2001-1403, CVE-2001-1404, CVE-2001-1405, CVE-2001-1406, CVE-2001-1407, CVE-2001-1408, CVE-2001-1409, CVE-2001-1410, CVE-2001-1411, CVE-2001-1412, CVE-2001-1413, CVE-2001-1414, CVE-2001-1415, CVE-2001-1416, CVE-2001-1417, CVE-2001-1418, CVE-2001-1419, CVE-2001-1420, CVE-2001-1421, CVE-2001-1422, CVE-2001-1423, CVE-2001-1424, CVE-2001-1425, CVE-2001-1426, CVE-2001-1427, CVE-2001-1428, CVE-2001-1429, CVE-2001-1430, CVE-2001-1431, CVE-2001-1432, CVE-2001-1433, CVE-2001-1434, CVE-2001-1435, CVE-2001-1436, CVE-2001-1437, CVE-2001-1438, CVE-2001-1439, CVE-2001-1440, CVE-2001-1441, CVE-2001-1442, CVE-2001-1443, CVE-2001-1444, CVE-2001-1445, CVE-2001-1446, CVE-2001-1447, CVE-2001-1448, CVE-2001-1449, CVE-2001-1450, CVE-2001-1451, CVE-2001-1452, CVE-2001-1453, CVE-2001-1454, CVE-2001-1455, CVE-2001-1456, CVE-2001-1457, CVE-2001-1458, CVE-2001-1459, CVE-2001-1460, CVE-2001-1461, CVE-2001-1462, CVE-2001-1463, CVE-2001-1464, CVE-2001-1465, CVE-2001-1466, CVE-2001-1467, CVE-2001-1468, CVE-2001-1469, CVE-2001-1470, CVE-2001-1471, CVE-2001-1472, CVE-2001-1473, CVE-2001-1474, CVE-2001-1475, CVE-2001-1476, CVE-2001-1477, CVE-2001-1478, CVE-2001-1479, CVE-2001-1480, CVE-2001-1481, CVE-2001-1482, CVE-2001-1483, CVE-2001-1484, CVE-2001-1487, CVE-2001-1488, CVE-2001-1489, CVE-2001-1490, CVE-2001-1491, CVE-2001-1492, CVE-2001-1494, CVE-2001-1495, CVE-2001-1496, CVE-2001-1497, CVE-2001-1498, CVE-2001-1499, CVE-2001-1500, CVE-2001-1501, CVE-2001-1502, CVE-2001-1503, CVE-2001-1504, CVE-2001-1505, CVE-2001-1506, CVE-2001-1507, CVE-2001-1508, CVE-2001-1509, CVE-2001-1510, CVE-2001-1511, CVE-2001-1512, CVE-2001-1513, CVE-2001-1514, CVE-2001-1515, CVE-2001-1516, CVE-2001-1517, CVE-2001-1518, CVE-2001-1519, CVE-2001-1520, CVE-2001-1521, CVE-2001-1522, CVE-2001-1523, CVE-2001-1524, CVE-2001-1525, CVE-2001-1526, CVE-2001-1527, CVE-2001-1528, CVE-2001-1529, CVE-2001-1530, CVE-2001-1531, CVE-2001-1532, CVE-2001-1533, CVE-2001-1534, CVE-2001-1535, CVE-2001-1536, CVE-2001-1537, CVE-2001-1538, CVE-2001-1539, CVE-2001-1540, CVE-2001-1541, CVE-2001-1542, CVE-2001-1543, CVE-2001-1544, CVE-2001-1545, CVE-2001-1546, CVE-2001-1547, CVE-2001-1548, CVE-2001-1549, CVE-2001-1550, CVE-2001-1551, CVE-2001-1552, CVE-2001-1553, CVE-2001-1554, CVE-2001-1555, CVE-2001-1556, CVE-2001-1557, CVE-2001-1558, CVE-2001-1559, CVE-2001-1560, CVE-2001-1561, CVE-2001-1562, CVE-2001-1563, CVE-2001-1564, CVE-2001-1565, CVE-2001-1566, CVE-2001-1567, CVE-2001-1568, CVE-2001-1569, CVE-2001-1570, CVE-2001-1571, CVE-2001-1572, CVE-2001-1573, CVE-2001-1574, CVE-2001-1575, CVE-2001-1576, CVE-2001-1577, CVE-2001-1578, CVE-2001-1579, CVE-2001-1580, CVE-2001-1581, CVE-2001-1582, CVE-2001-1583, CVE-2001-1584, CVE-2001-1585, CVE-2001-1586, CVE-2001-1587, CVE-2001-1588, CVE-2001-1589, CVE-2001-1590, CVE-2001-1591, CVE-2001-1592, CVE-2001-1593, CVE-2001-1594, CVE-2024-8419, CVE-2025-7195
        Date: Mon, 16 Feb 2026 15:50:20 +0000

    ]

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agolinux-yocto/6.18: update to v6.18.11
Bruce Ashfield [Mon, 2 Mar 2026 04:55:29 +0000 (23:55 -0500)] 
linux-yocto/6.18: update to v6.18.11

Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:

    ee4fb138af107 Linux 6.18.11
    32f08c3ddd6dd gpio: omap: do not register driver in probe()
    116f7bd8160c6 wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add
    24a253c3aa6d9 PCI: endpoint: Avoid creating sub-groups asynchronously
    60b75407c172e drm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free
    ed82e7949f5ca xfs: fix UAF in xchk_btree_check_block_owner
    d741534302f71 erofs: fix UAF issue for file-backed mounts w/ directio option
    1d6bd6183e723 bus: fsl-mc: fix use-after-free in driver_override_show()
    d14e991279831 scsi: qla2xxx: Query FW again before proceeding with login
    f04840512438a scsi: qla2xxx: Free sp in error path to fix system crash
    c068ebbaf5282 scsi: qla2xxx: Delay module unload while fabric scan in progress
    ae49d33bfc08b scsi: qla2xxx: Allow recovery for tape devices
    1a9585e4c58d1 scsi: qla2xxx: Validate sp before freeing associated memory
    1339455044155 wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()
    46c1d56ad321f hfs: ensure sb->s_fs_info is always cleaned up
    4aa45f841413c nilfs2: Fix potential block overflow that cause system hang
    52505d7f713bf crypto: virtio - Remove duplicated virtqueue_kick in virtio_crypto_skcipher_crypt_req
    e69a7b0a71b65 crypto: virtio - Add spinlock protection with virtqueue notification
    2ed27b5a11743 crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly
    62c89e1992c86 crypto: octeontx - Fix length check to avoid truncation in ucode_load_store
    d75207465eed2 crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode
    65a0016016e8b ALSA: hda/conexant: Add quirk for HP ZBook Studio G4
    be7a9bcee0ca6 Bluetooth: btusb: Add USB ID 7392:e611 for Edimax EW-7611UXB
    8d76b2488eb3c driver core: enforce device_lock for driver_match_device()
    16c8be3d55441 smb: client: let send_done handle a completion without IB_SEND_SIGNALED
    6bf260ace7301 smb: client: let smbd_post_send_negotiate_req() use smbd_post_send()
    69ce4ae2ab65c smb: client: fix last send credit problem causing disconnects
    cca0526ef2344 smb: client: make use of smbdirect_socket.send_io.bcredits
    9eff83600edf6 smb: client: use smbdirect_send_batch processing
    d059e5fc49755 smb: client: introduce and use smbd_{alloc, free}_send_io()
    1f3e8e2c67cbc smb: client: split out smbd_ib_post_send()
    8786127068d51 smb: client: port and use the wait_for_credits logic used by server
    1fe0f989beb8b smb: client: remove pointless sc->send_io.pending handling in smbd_post_send_iter()
    2b08ca3ab6cc5 smb: client: remove pointless sc->recv_io.credits.count rollback
    b9ec75aba3c8f smb: client: let smbd_post_send() make use of request->wr
    5b69ba9978dd0 smb: client: let recv_done() queue a refill when the peer is low on credits
    f664e6e8a8110 smb: client: make use of smbdirect_socket.recv_io.credits.available
    24082642654f3 smb: server: let send_done handle a completion without IB_SEND_SIGNALED
    85bf0a73831cc smb: server: fix last send credit problem causing disconnects
    5ef18a2e66f2f smb: server: make use of smbdirect_socket.send_io.bcredits
    cea7afb097b00 smb: server: let recv_done() queue a refill when the peer is low on credits
    66c082e3d4651 smb: server: make use of smbdirect_socket.recv_io.credits.available
    88cf40f7b5fb4 smb: smbdirect: introduce smbdirect_socket.send_io.bcredits.*
    e811e60e1cc79 smb: smbdirect: introduce smbdirect_socket.recv_io.credits.available
    cd25e0d809531 smb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()
    e4a8a96a93d08 ksmbd: add chann_lock to protect ksmbd_chann_list xarray
    71b5e7c528315 ksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths
    c4b9edd559873 smb: client: split cached_fid bitfields to avoid shared-byte RMW races
    1658b66fed206 io_uring: allow io-wq workers to exit when unused
    f02693a40e407 io_uring/io-wq: add exit-on-idle state
    41cec610f6906 Linux 6.18.10
    31b593fbece63 riscv: Add intermediate cast to 'unsigned long' in __get_user_asm
    ecd164120c248 ALSA: usb-audio: Use the right limit for PCM OOB check
    24ad4cfac0b8e ALSA: hda/realtek: Really fix headset mic for TongFang X6AR55xU.
    57bac08056787 spi: tegra114: Preserve SPI mode bits in def_command1_reg
    b8eec12aa666c spi: tegra: Fix a memory leak in tegra_slink_probe()
    2ac3a105e5149 spi: tegra210-quad: Protect curr_xfer check in IRQ handler
    d51554dc05695 spi: tegra210-quad: Protect curr_xfer clearing in tegra_qspi_non_combined_seq_xfer
    3bc293d5b5650 spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer
    2d3c0122e9611 spi: tegra210-quad: Protect curr_xfer assignment in tegra_qspi_setup_transfer_one
    51013068438ac spi: tegra210-quad: Move curr_xfer read inside spinlock
    e1777c400b7a9 spi: tegra210-quad: Return IRQ_HANDLED when timeout already processed transfer
    b767cf2d4efc8 regulator: spacemit-p1: Fix n_voltages for BUCK and LDO regulators
    3f9b508b3eecc i2c: imx: preserve error state in block data length handler
    e71e3fa90a151 gpio: loongson-64bit: Fix incorrect NULL check after devm_kcalloc()
    279cb9180510f ASoC: amd: fix memory leak in acp3x pdm dma ops
    8434b351cd4ea ALSA: usb-audio: fix broken logic in snd_audigy2nx_led_update()
    01d2fb15f15c1 firmware: cs_dsp: rate-limit log messages in KUnit builds
    abd66845227c5 firmware: cs_dsp: Factor out common debugfs string read
    b8ad2d53f706a ipv6: Fix ECMP sibling count mismatch when clearing RTF_ADDRCONF
    f3ed399e9aa6f nvme-pci: handle changing device dma map requirements
    3c58f6121863c drm/xe/guc: Fix CFI violation in debugfs access.
    8b68a45f9722f netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()
    32ddd09d1103e hwmon: (occ) Mark occ_init_attribute() as __printf
    8abb71d4a1dce drm/xe/pm: Disable D3Cold for BMG only on specific platforms
    7c5db0957a230 drm/xe/query: Fix topology query pointer advance
    184a84f03b5e6 drm/mgag200: fix mgag200_bmc_stop_scanout()
    2e5edb69e5d0e net: gro: fix outer network offset
    589a530ae44d0 net: add proper RCU protection to /proc/net/ptype
    9f42cb8fafd6d net: ethernet: adi: adin1110: Check return value of devm_gpiod_get_optional() in adin1110_check_spi()
    100f3bf914612 drm/amd/display: fix wrong color value mapping on MCM shaper LUT
    0031f8829c7fb wifi: iwlwifi: mvm: pause TCM on fast resume
    9b9f52f052f49 wifi: iwlwifi: mld: cancel mlo_scan_start_wk
    5a2b4b0e9c003 net: enetc: Convert 16-bit register reads to 32-bit for ENETC v4
    566ea5769ec27 net: enetc: Convert 16-bit register writes to 32-bit for ENETC v4
    f346253e5fd95 net: enetc: Remove CBDR cacheability AXI settings for ENETC v4
    d98745c68023f net: enetc: Remove SI/BDR cacheability AXI settings for ENETC v4
    c175b1eaf729e tipc: use kfree_sensitive() for session key material
    f3931416cbdd0 net: rss: fix reporting RXH_XFRM_NO_CHANGE as input_xfrm for contexts
    2718ae6af7445 linkwatch: use __dev_put() in callers to prevent UAF
    64cf3016234ce io_uring/zcrx: fix page array leak
    fad7334082cd1 net: don't touch dev->stats in BPF redirect paths
    8860ddf0e07be hwmon: (acpi_power_meter) Fix deadlocks related to acpi_power_meter_notify()
    1b2efc593dca9 net: usb: r8152: fix resume reset deadlock
    cdedcd5aa3f3c macvlan: fix error recovery in macvlan_common_newlink()
    c9e4daf62ca07 net: sfp: Fix quirk for Ubiquiti U-Fiber Instant SFP module
    8553bf2e09828 i40e: drop udp_tunnel_get_rx_info() call from i40e_open()
    07bb882485f89 ice: drop udp_tunnel_get_rx_info() call from ndo_open()
    7565d4df66b66 ice: Fix PTP NULL pointer dereference during VSI rebuild
    ef72678c9df0e ice: PTP: fix missing timestamps on E825 hardware
    6801ef140fc33 ice: fix missing TX timestamps interrupts on E825 devices
    1b381a638e185 dpaa2-switch: add bounds check for if_id in IRQ handler
    4640fa5ad5e1a net: liquidio: Fix off-by-one error in VF setup_nic_devices() cleanup
    293eaad0d6d6b net: liquidio: Fix off-by-one error in PF setup_nic_devices() cleanup
    d028147ae0640 net: liquidio: Initialize netdev pointer before queue setup
    155eb99aff292 dpaa2-switch: prevent ZERO_SIZE_PTR dereference when num_ifs is zero
    8a672f177ebe1 net/sched: cls_u32: use skb_header_pointer_careful()
    9b186feb75267 net: add skb_header_pointer_careful() helper
    f8611a7981cd0 hwmon: (dell-smm) Add Dell G15 5510 to fan control whitelist
    9ee608a64e37c smb/client: fix memory leak in smb2_open_file()
    faff38ebbfe63 platform/x86/intel/tpmi/plr: Make the file domain<n>/status writeable
    9029ccfab2ca9 platform/x86: hp-bioscfg: Skip empty attribute names
    6c45a5a7e1e3b platform/x86: intel_telemetry: Fix PSS event register mask
    f93ae43780b75 platform/x86: toshiba_haps: Fix memory leaks in add/remove routines
    245ff08e261ce Revert "drm/amd/display: pause the workload setting in dm"
    98bf5bc8cb8cb tracing: Avoid possible signed 64-bit truncation
    6dd87f6afe9e9 ALSA: hda/realtek: ALC269 fixup for Lenovo Yoga Book 9i 13IRU8 audio
    3228b2eceb6c3 btrfs: reject new transactions if the fs is fully read-only
    b4b065a880997 wifi: mac80211: don't increment crypto_tx_tailroom_needed_cnt twice
    ccb3c75d57039 btrfs: sync read disk super and set block size
    7a1bec39c014e wifi: mac80211: correctly check if CSA is active
    990e40fb1d111 btrfs: fix Wmaybe-uninitialized warning in replay_one_buffer()
    3835e49e146a4 scsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()
    108cbf2b7d295 ALSA: hda/realtek: Fix headset mic for TongFang X6AR55xU
    1d5f2329ab4df io_uring/rw: free potentially allocated iovec on cache put failure
    c65a1a72a41e4 riscv: Use 64-bit variable for output in __get_user_asm
    4530f4e4d0e6a scsi: target: iscsi: Fix use-after-free in iscsit_dec_session_usage_count()
    8a7ef96e6af91 wifi: cfg80211: Fix bitrate calculation overflow for HE rates
    36e88bd40a8c0 spi: intel-pci: Add support for Nova Lake SPI serial flash
    7178b36de1850 ALSA: usb-audio: Add delay quirk for MOONDROP Moonriver2 Ti
    f08f2d2907675 regmap: maple: free entry on mas_store_gfp() failure
    7d4c9c448c2b3 spi: hisi-kunpeng: Fixed the wrong debugfs node name in hisi_spi debugfs initialization
    66b73d3f2cfc7 ALSA: hda/tas2781: Add newly-released HP laptop
    e6ce61e01c9a2 ASoC: tlv320adcx140: Propagate error codes during probe
    3ba3d959c17aa ASoC: amd: yc: Fix microphone on ASUS M6500RE
    1c90f930e7b41 nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()
    62932d9ed639a ALSA: usb-audio: Prevent excessive number of frames
    e810b290922c5 nvme-fc: release admin tagset if init fails
    a883080063f97 ASoC: simple-card-utils: Check device node before overwrite direction
    61fa85497c7b7 ASoC: davinci-evm: Fix reference leak in davinci_evm_probe
    9f665b3c3d9a1 dmaengine: mmp_pdma: Fix race condition in mmp_pdma_residue()
    921903d73967f ASoC: Intel: sof_sdw: Add new quirks for PTL on Dell with CS42L43
    74309a4b0ffc7 wifi: mac80211: collect station statistics earlier when disconnect
    da1880c7b6b83 HID: Elecom: Add support for ELECOM M-XT3DRBK (018C)
    71434e45bf124 HID: logitech: add HID++ support for Logitech MX Anywhere 3S
    b1f8285bc8e35 riscv: trace: fix snapshot deadlock with sbi ecall
    151589d15ee87 ring-buffer: Avoid softlockup in ring_buffer_resize() during memory free
    cd7ff7fd3e4b7 drm/amd/pm: Disable MMIO access during SMU Mode 1 reset
    ecb8653a8fe9d HID: Apply quirk HID_QUIRK_ALWAYS_POLL to Edifier QR30 (2d99:a101)
    1e84a807c98a7 HID: Intel-thc-hid: Intel-thc: Add safety check for reading DMA buffer
    2124279f1f8c3 HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()
    6e2108daed94e HID: quirks: Add another Chicony HP 5MP Cameras to hid_ignore_list
    645671377158f drm/amd/display: Reduce number of arguments of dcn30's CalculatePrefetchSchedule()
    eb5d6dedadd66 netfilter: replace -EEXIST with -EBUSY
    ddab2d0f93200 PCI: qcom: Remove ASPM L0s support for MSM8996 SoC
    3210077ed2648 ALSA: hda/realtek: add HP Laptop 15s-eq1xxx mute LED quirk
    5b9bbe3d7bb90 x86/sev: Disable GCOV on noinstr object
    75f1f512b1567 ALSA: hda/realtek: Add quirk for Acer Nitro AN517-55
    747b9a7d4c712 HID: playstation: Center initial joystick axes to prevent spurious events
    7ae5b35148119 HID: intel-ish-hid: Reset enum_devices_done before enumeration
    8b44e75379510 riscv: Sanitize syscall table indexing under speculation
    28768bd3abf99 btrfs: fix reservation leak in some error paths when inserting inline extent
    a206870513cda HID: multitouch: add MT_QUIRK_STICKY_FINGERS to MT_CLS_VTL
    ea5ef771f3c26 HID: intel-ish-hid: Update ishtp bus match to support device ID table
    6de3a371a8b9f btrfs: do not free data reservation in fallback from inline due to -ENOSPC
    70dd3513ed6ac smb/server: fix refcount leak in parse_durable_handle_context()
    c2ed4f71e9288 LoongArch: Enable exception fixup for specific ADE subcode
    2bb9c8a77df50 io_uring: use GFP_NOWAIT for overflow CQEs on legacy rings
    4665e52bde3b1 smb/server: fix refcount leak in smb2_open()
    0107b18cd8ac1 md: suspend array while updating raid_disks via sysfs
    9531210f348aa LoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED
    fdda836fcee6f smb/server: call ksmbd_session_rpc_close() on error path in create_smb2_pipe()
    f309b2c7df659 block,bfq: fix aux stat accumulation destination
    86acdc1791944 platform/x86: dell-lis3lv02d: Add Latitude 5400
    ff6892ea544c4 wifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP
    6b7c60feab3c6 net: usb: sr9700: support devices with virtual driver CD
    10d3ff7e5812c wifi: mac80211: don't WARN for connections on invalid channels
    689a7980e4788 wifi: wlcore: ensure skb headroom before skb_push
    e0bd226804f8e wifi: mac80211: ocb: skip rx_no_sta when interface is not joined
    abd219fd48b11 tracing: Fix ftrace event field alignments
    116ffca92dc4d binderfs: fix ida_alloc_max() upper bound
    e9bcfe865188a binder: fix BR_FROZEN_REPLY error log
    a6050dedb6f1c binder: fix UAF in binder_netlink_report()
    287221c5e0707 rust_binderfs: fix ida_alloc_max() upper bound
    685bb05d307ac rust_binder: add additional alignment checks
    598fe3ff32e43 rust_binder: correctly handle FDA objects of length zero
    13de38aa3ea7a sched/fair: Have SD_SERIALIZE affect newidle balancing
    de7cb4282dafc sched/fair: Skip sched_balance_running cmpxchg when balance is not due
    3a15c519d2b0f bus: mhi: host: pci_generic: Add Telit FE990B40 modem support
    fa2274bb17a4a treewide: Drop pci_save_state() after pci_restore_state()
    71c50e60421bb PCI/ERR: Ensure error recoverability at all times
    1a893bd719121 hwmon: (gpio-fan) Allow to stop FANs when CONFIG_PM is disabled
    37751b6d0b6b5 hwmon: (gpio-fan) Fix set_rpm() return value
    4385b2f284354 KVM: Don't clobber irqfd routing type when deassigning irqfd
    7a245ef476ffb KVM: selftests: Add -U_FORTIFY_SOURCE to avoid some unpredictable test failures
    a82647e1a9499 net: spacemit: k1-emac: fix jumbo frame support
    d5b3a66986697 net: cpsw_new: Execute ndo_set_rx_mode callback in a work queue
    488009aa62bb1 net: cpsw: Execute ndo_set_rx_mode callback in a work queue
    ef763b480a3de nouveau/gsp: fix suspend/resume regression on r570 firmware
    a20887d5239a3 nouveau/gsp: use rpc sequence numbers properly.
    9cc8caba82c2b nouveau: add a third state to the fini handler.
    5f645222eb30c Revert "drm/amd: Check if ASPM is enabled from PCIe subsystem"
    7b6a0f121d502 mm, shmem: prevent infinite loop on truncate race
    41a7b9ab855c8 gve: Correct ethtool rx_dropped calculation
    11f8311f69e4c gve: Fix stats report corruption on queue count change
    e9cdd54797dc2 drm/amd: Set minimum version for set_hw_resource_1 on gfx11 to 0x52
    d3081353acaa6 cgroup/dmem: avoid pool UAF
    5c38604abbfa5 cgroup/dmem: avoid rcu warning when unregister region
    c13816e8fa23d cgroup/dmem: fix NULL pointer dereference when setting max
    e258ed369c9e0 ceph: fix oops due to invalid pointer for kfree() in parse_longname()
    35e6fd0d5bc30 ARM: 9468/1: fix memset64() on big-endian
    46dfdb6f7a79d rbd: check for EOD after exclusive lock is ensured to be held
    57b36ffc8881d ceph: fix NULL pointer dereference in ceph_mds_auth_match()
    e8af57e090790 mm/slab: Add alloc_tagging_slab_free_hook for memcg_alloc_abort_single
    cbc03ce3e6ce7 procfs: avoid fetching build ID while holding VMA lock
    eb54ce033b344 pmdomain: imx8m-blk-ctrl: fix out-of-range access of bc->domains
    11ca03ce17d7d pmdomain: imx8mp-blk-ctrl: Keep usb phy power domain on for system wakeup
    5171a3dddf427 pmdomain: imx: gpcv2: Fix the imx8mm gpu hang due to wrong adb400 reset
    72129d55be9ce pmdomain: imx8mp-blk-ctrl: Keep gpc power domain on for system wakeup
    d72563e402bab pmdomain: qcom: rpmpd: fix off-by-one error in clamping to the highest state
    5727ccf9d19ca ALSA: aloop: Fix racy access at PCM trigger
    21816bbc8492f platform/x86: intel_telemetry: Fix swapped arrays in PSS output
    b5a02290ee3a4 KVM: x86: Explicitly configure supported XSS from {svm,vmx}_set_cpu_caps()
    a94b956bb7272 x86/kfence: fix booting on 32bit non-PAE systems
    feb603a69f830 x86/vmware: Fix hypercall clobbers
    ab200d71553bd nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agolinux-yocto/6.18: update CVE exclusions (6.18.9)
Bruce Ashfield [Mon, 2 Mar 2026 04:55:28 +0000 (23:55 -0500)] 
linux-yocto/6.18: update CVE exclusions (6.18.9)

Data pulled from: https://github.com/CVEProject/cvelistV5

    1/1 [
        Author: cvelistV5 Github Action
        Email: github_action@example.com
        Subject: 4 changes (4 new | 0 updated): - 4 new CVEs: CVE-2026-25931, CVE-2026-25934, CVE-2026-25938, CVE-2026-25939 - 0 updated CVEs:
        Date: Mon, 9 Feb 2026 22:23:00 +0000

    ]

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
8 weeks agolinux-yocto/6.18: update to v6.18.9
Bruce Ashfield [Mon, 2 Mar 2026 04:55:27 +0000 (23:55 -0500)] 
linux-yocto/6.18: update to v6.18.9

Updating linux-yocto/6.18 to the latest korg -stable release that comprises
the following commits:

    adb851edb7078 Linux 6.18.9
    0d26aa84ff0b7 mptcp: avoid dup SUB_CLOSED events after disconnect
    01b0831d71b6d sched_ext: Fix SCX_KICK_WAIT to work reliably
    664e78f2d4ec3 sched_ext: Don't kick CPUs running higher classes
    edb9fab1b78c6 net/sched: act_ife: convert comma to semicolon
    5b22c6cbabc78 Revert "drm/nouveau/disp: Set drm_mode_config_funcs.atomic_(check|commit)"
    ab21cf885fb2a libbpf: Fix -Wdiscarded-qualifiers under C23
    f749b366b8e79 gpiolib: acpi: Fix potential out-of-boundary left shift
    84df65fcfbff1 iommu/tegra241-cmdqv: Reset VCMDQ in tegra241_vcmdq_hw_init_user()
    078377b07f8e8 drm/amdgpu: Fix cond_exec handling in amdgpu_ib_schedule()
    ac251d17d8af5 drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove
    2d9bff2af0adb drm/amdgpu/gfx12: adjust KGQ reset sequence
    d9790cf8bbe80 drm/amdgpu/gfx12: fix wptr reset in KGQ init
    4867b512bb7f5 drm/amdgpu/gfx11: adjust KGQ reset sequence
    018892bd9a0c0 drm/amdgpu/gfx11: fix wptr reset in KGQ init
    75ebd42441702 drm/amdgpu/gfx10: fix wptr reset in KGQ init
    9a6d87fbe3f51 drm/amdgpu/soc21: fix xclk for APUs
    5f841c308c453 drm/amd/pm: fix smu v14 soft clock frequency setting issue
    191e22e5d742e drm/amd/pm: fix smu v13 soft clock frequency setting issue
    ca68745e820ec drm/imx/tve: fix probe device leak
    31203f5680c3d drm/msm/a6xx: fix bogus hwcg register updates
    a4ea228271cd4 drm/tyr: depend on `COMMON_CLK` to fix build error
    3e845c46dfe5a drm/xe/xelp: Fix Wa_18022495364
    ae8831ee0fb2f drm: Do not allow userspace to trigger kernel warnings in drm_gem_change_handle_ioctl()
    dd222df5b356e scripts: generate_rust_analyzer: Add compiler_builtins -> core dep
    8afa6c4d7abfb scripts: generate_rust_analyzer: fix resolution of #[pin_data] macros
    2426867644cc7 scripts: generate_rust_analyzer: compile sysroot with correct edition
    ce798a0fe6b79 scripts: generate_rust_analyzer: remove sysroot assertion
    595718c74f85b scripts: generate_rust_analyzer: Add pin_init_internal deps
    5bfa32ff75b50 scripts: generate_rust_analyzer: Add pin_init -> compiler_builtins dep
    e82f822ed1472 rust: sync: refcount: always inline functions using build_assert with arguments
    4bb727f4b0614 rust: sync: atomic: Provide stub for `rusttest` 32-bit hosts
    625605ac8be50 rust: bits: always inline functions using build_assert with arguments
    3d48d59235c49 net: fix segmentation of forwarding fraglist GRO
    b23bee8cdb7aa mm/shmem, swap: fix race of truncate and swap entry split
    40aed8b856580 mm/memory-failure: teach kill_accessing_process to accept hugetlb tail page pfn
    b0020cbd26380 mm, swap: restore swap_space attr aviod kernel panic
    4f57516293fda mm/memory-failure: fix missing ->mf_stats count in hugetlb poison
    c71fae335dfe7 mm/kfence: randomize the freelist on initialization
    629666d20c7dc btrfs: do not strictly require dirty metadata threshold for metadata writepages
    b91a84299d72a flex_proportions: make fprop_new_period() hardirq safe
    131af3df59b24 selftests: mptcp: join: fix local endp not being tracked
    e73aab3337833 selftests: mptcp: check subflow errors in close events
    8d4ccc10a77f0 selftests: mptcp: check no dup close events after error
    35bb480000cd2 mptcp: only reset subflow errors when propagated
    33f971476ffc1 mm/kasan: fix KASAN poisoning in vrealloc()
    0ac0e2e64b068 gpio: rockchip: Stop calling pinctrl for set_direction
    f69cae1bf44ca ALSA: hda/realtek: fix right sounds and mute/micmute LEDs for HP machine
    68207ceefd71c nvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference
    e4e15a0a4403c efivarfs: fix error propagation in efivar_entry_get()
    14ca9fa020829 scsi: qla2xxx: edif: Fix dma_free_coherent() size
    5ba425a7bab31 kbuild: rust: clean libpin_init_internal in mrproper
    e4c0a92146ddf gpio: pca953x: mask interrupts in irq shutdown
    cb69b0a0c0aaf ASoC: amd: yc: Add DMI quirk for Acer TravelMate P216-41-TCO
    98e0bc206a321 scsi: be2iscsi: Fix a memory leak in beiscsi_boot_get_sinfo()
    91539cf522ed0 ASoC: fsl: imx-card: Do not force slot width to sample width
    8b581837295fc rust: kbuild: give `--config-path` to `rustfmt` in `.rsi` target
    50c66cb08070c rust: rbtree: fix documentation typo in CursorMut peek_next method
    fe9a1a825b4ae riscv: compat: fix COMPAT_UTS_MACHINE definition
    b038874e31fc3 firewire: core: fix race condition against transaction list
    a28fce0365e1c perf: sched: Fix perf crash with new is_user_task() helper
    112d497809970 pinctrl: qcom: sm8350-lpass-lpi: Merge with SC7280 to fix I2S2 and SWR TX pins
    e81d1bc4ea791 pinctrl: meson: mark the GPIO controller as sleeping
    e0468c4527a22 pinctrl: lpass-lpi: implement .get_direction() for the GPIO driver
    b1f41c1f0bbbe writeback: fix 100% CPU usage when dirtytime_expire_interval is 0
    36370892e3111 sched/deadline: Fix 'stuck' dl_server
    0bbcb7586bc81 sched/deadline: Document dl_server
    32887d8e4bc06 drm/xe/nvm: Fix double-free on aux add failure
    02dc6cf6409e5 drm/xe/nvm: Manage nvm aux cleanup with devres
    2859fa957a936 drm/xe/configfs: Fix is_bound() pci_dev lifetime
    64364ccf491c7 dma/pool: distinguish between missing and exhausted atomic pools
    d36c4149ea224 bcache: fix I/O accounting leak in detached_dev_do_request
    7b72d76a58e6b bcache: use bio cloning for detached device requests
    db6e287bd6e80 bcache: fix improper use of bi_end_io
    23f9f9c46edd9 of: reserved_mem: Allow reserved_mem framework detect "cma=" kernel param
    14e32032c42fe of/reserved_mem: Simplify the logic of fdt_scan_reserved_mem_reg_nodes()
    8d9c5ceff4b53 kbuild: Fix permissions of modules.builtin.modinfo
    32d8f998bb8d4 kbuild: rpm-pkg: Generate debuginfo package manually
    d4dbada7ac6f3 gpio: brcmstb: correct hwirq to bank map
    546e62c3fb29a drm/amd/pm: fix race in power state check before mutex lock
    7bec90f605cfb gpio: virtuser: fix UAF in configfs release path
    c0ce86d92565b gpiolib: acpi: use BIT_ULL() for u64 mask in address space handler
    ecb638fb9a5cc ASoC: Intel: sof_es8336: fix headphone GPIO logic inversion
    e67828aeb58d9 drm/xe: Skip address copy for sync-only execs
    4d7b7abb525b4 ASoC: soc-acpi-intel-ptl-match: fix name_prefix of rt1320-2
    a42bdbcada187 scsi: firewire: sbp-target: Fix overflow in sbp_make_tpg()
    aabc36857bd39 wifi: mac80211: correctly decode TTLM with default link map
    a4f9a19a266e6 wifi: mac80211: apply advertised TTLM from association response
    b8d890f8c3223 wifi: mac80211: parse all TTLM entries
    cc3f137d36fda net/mlx5e: Skip ESN replay window setup for IPsec crypto offload
    19bb3c68e18cf net/mlx5: Fix vhca_id access call trace use before alloc
    fc3da1466af5f net/mlx5: Initialize events outside devlink lock
    2614734c4bc67 net/mlx5: fs, Fix inverted cap check in tx flow table root disconnect
    335031cacd7e8 net: phy: micrel: fix clk warning when removing the driver
    92db64d3546f9 net/mlx5e: don't assume psp tx skbs are ipv6 csum handling
    f4bb58e14f042 net: bridge: fix static key check
    c3369fc5e6120 nfc: nci: Fix race between rfkill and nci_unregister_device().
    92e0483402afc net/mlx5e: Account for netdev stats in ndo_get_stats64
    fdf8437016f57 net/mlx5e: TC, delete flows only for existing peers
    2df2aad9cf2f4 ice: stop counting UDP csum mismatch as rx_errors
    36126ddbe9247 ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues
    214aed313f7a5 ixgbe: don't initialize aci lock in ixgbe_recovery_probe()
    c721ea2ff5672 ixgbe: fix memory leaks in the ixgbe_recovery_probe() path
    bd25b092a06a3 bonding: fix use-after-free due to enslave fail after slave array update
    61858cbce6ca4 nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame().
    fdb99161cbef2 net: spacemit: Check for netif_carrier_ok() in emac_stats_update()
    1f1b9523527df mptcp: fix race in mptcp_pm_nl_flush_addrs_doit()
    dce375f4afc34 rocker: fix memory leak in rocker_world_port_post_fini()
    cdc4deb9e7be2 net/mlx5: Fix return type mismatch in mlx5_esw_vport_vhca_id()
    2c0fb0f60bc15 net: wwan: t7xx: fix potential skb->frags overflow in RX path
    500c1237c9a13 ipv6: use the right ifindex when replying to icmpv6 from localhost
    0b74c6e132737 net: mvpp2: cls: Fix memory leak in mvpp2_ethtool_cls_rule_ins()
    590c8179ffb01 sfc: fix deadlock in RSS config read
    bd98324e327e4 bonding: annotate data-races around slave->last_rx
    d753f3c3f9d7a octeon_ep: Fix memory leak in octep_device_setup()
    f14d881f0a5aa net: bcmasp: fix early exit leak with fixed phy
    713ba826ae114 can: gs_usb: gs_usb_receive_bulk_callback(): fix error message
    23f40dbda938e net/mlx5: Fix memory leak in esw_acl_ingress_lgcy_setup()
    3b63185053788 Bluetooth: MGMT: Fix memory leak in set_ssp_complete
    03e8c90c62233 Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work
    4081d53864dae can: at91_can: Fix memory leak in at91_can_probe()
    e80617a5e1c24 btrfs: zlib: fix the folio leak on S390 hardware acceleration
    474f851ec5e2e readdir: require opt-in for d_type flags

Signed-off-by: Bruce Ashfield <bruce.ashfield@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agotestimage.bbclass: enable PTEST_RUNNER_TIMEOUT variable
Tim Orling [Fri, 27 Feb 2026 19:39:30 +0000 (11:39 -0800)] 
testimage.bbclass: enable PTEST_RUNNER_TIMEOUT variable

QB_MEM works in recipe scope because testimage.bbclass reads it from the
current recipe datastore (d) at test time via the qemuboot.conf mechanism.
PTEST_RUNNER_TIMEOUT was only available through testdata.json (written
during image build via export2json). The testimage task reads td from the
potentially stale testdata.json, and PTEST_RUNNER_TIMEOUT was never
refreshed from the live recipe context.

[YOCTO #16163]

Signed-off-by: Tim Orling <tim.orling@konsulko.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agocore-image-ptest: add PTEST_RUNNER_TIMEOUT
Tim Orling [Fri, 27 Feb 2026 19:39:29 +0000 (11:39 -0800)] 
core-image-ptest: add PTEST_RUNNER_TIMEOUT

In lib/oeqa/runtime/cases/ptest.py, the timeout used to be hardcoded to 450 seconds.
Now that it is a variable, make that a bit more obvious by setting a default value.

Set PTEST_RUNNER_TIMEOUT for python3-cffi to 600 seconds as it is known to come close
to and surpass the 450 second limit under heavy load.

Fixes: [YOCTO #16163]
Signed-off-by: Tim Orling <tim.orling@konsulko.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agooeqa/runtime/ptest: Make ptest-runner timeout configurable
Tim Orling [Fri, 27 Feb 2026 19:39:28 +0000 (11:39 -0800)] 
oeqa/runtime/ptest: Make ptest-runner timeout configurable

Replace the hardcoded 450 second timeout with a configurable
PTEST_RUNNER_TIMEOUT variable, defaulting to 450 seconds.

[YOCTO #16163]

Signed-off-by: Tim Orling <tim.orling@konsulko.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agokernel-fit-image: support arbitrary loadables
Francesco Valla [Sun, 1 Mar 2026 21:17:03 +0000 (22:17 +0100)] 
kernel-fit-image: support arbitrary loadables

Allow a user to insert additional, arbitrary loadables in a FIT image.
The loadables can be specified through the FIT_LOADABLES variable as
a list, with parameters defined by flags on dedicated FIT_LOADABLE_*
variables; they will be included in all configurations.

Sensible defaults will be used for some parameters (type, compression,
description, arch, os) if the corresponding flag is not set, while
others (load address and entry point) will be omitted in the final FIT
image.

As an example, the following configuration can be specified to add as
loadables a TF-A BL31 firmware and a (compressed) TEE firmware, to be
loaded respectively at 0x204E0000 and 0x96000000:

  FIT_LOADABLES = "atf tee"

  FIT_LOADABLE_FILENAME[atf] = "bl31.bin"
  FIT_LOADABLE_TYPE[atf] = "tfa-bl31"
  FIT_LOADABLE_ARCH[atf] = "arm64"
  FIT_LOADABLE_OS[atf] = "arm-trusted-firmware"
  FIT_LOADABLE_LOADADDRESS[atf] = "0x204E0000"

  FIT_LOADABLE_FILENAME[tee] = "tee.bin.gz"
  FIT_LOADABLE_COMPRESSSION[tee] = "gzip"
  FIT_LOADABLE_TYPE[tee] = "tee"
  FIT_LOADABLE_OS[tee] = "tee"
  FIT_LOADABLE_LOADADDRESS[tee] = "0x21000000"

Signed-off-by: Francesco Valla <francesco@valla.it>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agoffmpeg: set status for CVE-2025-12343
Peter Marko [Sat, 28 Feb 2026 21:45:01 +0000 (22:45 +0100)] 
ffmpeg: set status for CVE-2025-12343

Per [1] is patch for this CVE [2].
This is equivalent of [3] which is included in n8.0.

[1] https://security-tracker.debian.org/tracker/CVE-2025-12343
[2] https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/b8d5f65b9e89d893f27cf00799dbc15fc0ca2f8e
[3] https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/263e819aa45cd3c48bf6887be02b4ec504c02048

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agobusybox: Fixes CVE-2025-60876
Livin Sunny [Fri, 27 Feb 2026 22:38:02 +0000 (16:38 -0600)] 
busybox: Fixes CVE-2025-60876

This addresses CVE-2025-60876[1], which allows malicious URLs to inject
HTTP headers. It has been accepted by Debian[2] and is tracked here [4].
The upstream fix has been submitted [3] and is pending merge.

[1] https://nvd.nist.gov/vuln/detail/CVE-2025-60876
[2] https://bugs.debian.org/1120795
[3] https://lists.busybox.net/pipermail/busybox/2025-November/091840.html
[4] https://security-tracker.debian.org/tracker/CVE-2025-60876

Upstream-Status: Submitted [https://lists.busybox.net/pipermail/busybox/2025-November/0918
40.html]

Signed-off-by: Livin Sunny <livinsunny519@gmail.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agotoolchain-scripts-base.bbclass: remove timestamp
Changqing Li [Sat, 28 Feb 2026 09:27:52 +0000 (17:27 +0800)] 
toolchain-scripts-base.bbclass: remove timestamp

This timestamp makes the package meta-environment-qemux86-64 not
reproducible, and it is the time when the package is built, mabybe not
that important, the key info is the meta revision.

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agotcl8: skip more timing-sensitive tests
Ross Burton [Fri, 27 Feb 2026 14:08:45 +0000 (14:08 +0000)] 
tcl8: skip more timing-sensitive tests

Skip more tests, as we already do for the tcl9 recipe.

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agooeqa/selftest/sdk: add test_sdk_runqemu
Chen Qi [Fri, 27 Feb 2026 02:24:21 +0000 (02:24 +0000)] 
oeqa/selftest/sdk: add test_sdk_runqemu

Add test case to ensure runqemu works in SDK.

Using runqemu from SDK has been supported for many years. Add a
test case to ensure we have no regression.

Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agorunqemu: restore support to run inside SDK
Chen Qi [Fri, 27 Feb 2026 02:24:20 +0000 (02:24 +0000)] 
runqemu: restore support to run inside SDK

Using runqemu from SDK has been supported for a long time[1].

Below are example steps for using runqemu inside SDK.
1. mkdir destdir
2. cp -r /path/to/build/tmp/deploy/image/qemux86-64 destdir
3. Install SDK to destdir
4. Source SDK
5. runqemu qemux86-64 nographic slirp

Recently the related code path was deleted by accident during
an effort to make codes cleaner and more consistent.

We need to restore support for it.

What actually matters is the STAGING_BINDIR_NATIVE, which we
use to locate the qemu binary. So in case of SDK, we set it
from OECORE_NATIVE_SYSROOT. The STAGING_DIR_NATIVE checking
and setting are meaningless, thus deleting it.

[1] https://git.openembedded.org/openembedded-core/commit/?id=93649edc034f2540ff55dc9b41638797209cfb9c

Signed-off-by: Chen Qi <Qi.Chen@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agogawk: upgrade from 5.3.2 -> 5.4.0
Randy MacLeod [Fri, 27 Feb 2026 00:09:58 +0000 (19:09 -0500)] 
gawk: upgrade from 5.3.2 -> 5.4.0

Changes:
  https://lists.gnu.org/archive/html/info-gnu/2026-02/msg00011.html

A notable change is:
   1. This release now uses Mike Haertel's MinRX regular expression matcher
      as the default regexp engine. The old regex and dfa engines are still
      available.
The former regex matcher is selectable at run-time by setting the environemnt
variable:
   GAWK_GNU_MATCHERS
More details are available here:
   https://cgit.git.savannah.gnu.org/cgit/gawk.git/tree/README_d/README.matchers?h=gawk-5.4-stable
Switch the tarball from .gz to .xz to reduce size by ~3MB.

No ptests errors for x86-64 for glibc/musl.

Signed-off-by: Randy MacLeod <Randy.MacLeod@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agoopenssl: Package /etc/ssl/openssl.conf.d in openssl-conf
Peter Kjellerstedt [Thu, 26 Feb 2026 21:08:08 +0000 (22:08 +0100)] 
openssl: Package /etc/ssl/openssl.conf.d in openssl-conf

Since the /etc/ssl/openssl.conf file is packaged in openssl-conf, it
makes sense to also add the new /etc/ssl/openssl.conf.d directory to the
same package.

Signed-off-by: Peter Kjellerstedt <peter.kjellerstedt@axis.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agooe-init-build-env: Drop VSCode setup
Adrian Freihofer [Thu, 26 Feb 2026 20:19:50 +0000 (21:19 +0100)] 
oe-init-build-env: Drop VSCode setup

Remove the VSCode setup from oe-init-build-env.

Since poky as a combo-layer repository is no longer available, using the
oe-init-build-env script from openembedded-core is no longer
straightforward. There are too many ways to set up a build environment,
with different directory structures, with containers involved or not,
etc. Each of these setups may have its own way to provide IDE support.
A simple shell script like oe-init-vscode cannot address all these use
cases. Rather than trying to make oe-init-build-env smart enough to
cover all these cases, it is better to delegate the responsibility to
whatever tool or repository is used to set up the build environment.

If no tool such as bitbake-setup is used, it is still possible to use
a variant of the oe-setup-vscode script from a custom layer. One way
which works well is to create a custom oe-init-build-env script in the
custom layer repository which calls the custom oe-setup-vscode script
from the custom layer repository. Example directory structure:

  my-project/
  ├── .vscode     # generated by oe-setup-vscode
  |               # when oe-init-build-env is called
  ├── layers/
  │   └── openembedded-core/
  |   └── bitbake/
  ├── scripts/
  │   └── oe-setup-vscode
  ├── build/
  │   └── conf
  └── oe-init-build-env

Signed-off-by: Adrian Freihofer <adrian.freihofer@siemens.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agoperl: upgrade from 5.40.2 to 5.42.0
Changqing Li [Thu, 26 Feb 2026 11:24:38 +0000 (19:24 +0800)] 
perl: upgrade from 5.40.2 to 5.42.0

License-Update: Update copies of GPL to match recent FSF changes

Changes: https://perldoc.perl.org/5.42.0/perldelta

Update RDEPENDS for perl-module-extutils-parsexs, refer [1], this should
fix libmodule-build-perl ptest failure:
Failed to load or import from ExtUtils::ParseXS (version 3.57). Please
check that ExtUtils::ParseXS is installed correctly and that the newest
version will be found in your @INC path: Can't locate
ExtUtils/ParseXS/Node.pm in @INC

[1] https://github.com/Perl/perl5/commit/36118f523541d3e74ab495202ca8efbd9c9611b5

Signed-off-by: Changqing Li <changqing.li@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agobinutils: Upgrade to 2.46 release
Hemanth Kumar M D [Wed, 25 Feb 2026 11:43:38 +0000 (03:43 -0800)] 
binutils: Upgrade to 2.46 release

New Features:
Support for new instructions added to AMD, ARM and RISC-V architectures.
Support for version 3 of the SFrame standard.
The readelf program can now display the contents of Global Offset Tables.
Improved linker tagging support.

Detailed release notes are here [1]

[1] https://lists.gnu.org/archive/html/info-gnu/2026-02/msg00006.html

Dropped patches:
0001-aarch64-constify-BTI-and-GCS-report-functions.patch
Since the fix is already included in binutils 2.46.

CVE patches: CVE-2025-11081,CVE-2025-11082,CVE-2025-11083,
CVE-2025-11839,CVE-2025-11840,CVE-2025-11412,CVE-2025-11413,
CVE-2025-11414,CVE-2025-11494,CVE-2025-11495.
These were dropped because they are already addressed in binutils 2.46.

Drop CVE_STATUS:
binutils 2.46 has needed fixes for CVE-2025-7545 and CVE-2025-7546.

Rebased existing patches with binutils 2.46.

Fixed elfutils-ptest regression for arm64.

Testing Results:
+----------------------+--------+--------+------+
| Result               | 2.45.1 |  2.46  | Diff |
+----------------------+--------+--------+------+
| Expected Passes      | 318    |  331   | +13  |
| Untested Testcases   | 5      |  5     |  0   |
| Unsupported Tests    | 8      |  6     | -2   |
+----------------------+--------+--------+------+

Testcases changes:
-------------------------------------------------------------------------------
Testcase-name                                             2.45.1        2.46
-------------------------------------------------------------------------------
nm --ifunc-chars=-- (global ifunc)                          -           PASS
nm --ifunc-chars=-- (local ifunc)                           -           PASS
copy with unknown section flag                              -           PASS
objcopy tek2bin                                             -           PASS
binary symbol (implicit)                                    -           PASS
binary symbol (explicit)                                    -           PASS
readelf SFrame V2 (x86-64/test-v2-ET_EXEC.sframe)           -           PASS
objdump SFrame V2 (x86-64/test-v2-ET_EXEC.sframe)           -           PASS
readelf SFrame V2 (x86-64/test-v2-ET_REL.sframe)            -           PASS
objdump SFrame V2 (x86-64/test-v2-ET_REL.sframe)            -           PASS
run objcopy of executable                                UNSUPPORTED    PASS
run stripped executable                                  UNSUPPORTED    PASS
run stripped executable with saving a symbol             UNSUPPORTED    PASS
Copy object attributes v2 data from an object to another    -        UNSUPPORTED

Signed-off-by: Hemanth Kumar M D <Hemanth.KumarMD@windriver.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2 months agopython3-rdflib: upgrade 7.5.0 -> 7.6.0
Wang Mingyu [Thu, 26 Feb 2026 03:39:23 +0000 (11:39 +0800)] 
python3-rdflib: upgrade 7.5.0 -> 7.6.0

License-Update: Copyright year updated to 7.6.0

Signed-off-by: Wang Mingyu <wangmy@fujitsu.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>