Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2217664/?format=api
{ "id": 2217664, "url": "http://patchwork.ozlabs.org/api/patches/2217664/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/patch/20260330111505.3162298-1-danek.brat@gmail.com/", "project": { "id": 27, "url": "http://patchwork.ozlabs.org/api/projects/27/?format=api", "name": "Buildroot development", "link_name": "buildroot", "list_id": "buildroot.buildroot.org", "list_email": "buildroot@buildroot.org", "web_url": "", "scm_url": "", "webscm_url": "", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260330111505.3162298-1-danek.brat@gmail.com>", "list_archive_url": null, "date": "2026-03-30T11:15:05", "name": "[1/1] package/musl: bump to version 1.2.6", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "952c2df7b12a8513568ce881798edfcd1b6ad30e", "submitter": { "id": 93005, "url": "http://patchwork.ozlabs.org/api/people/93005/?format=api", "name": "Daniel Brát", "email": "danek.brat@gmail.com" }, "delegate": { "id": 89618, "url": "http://patchwork.ozlabs.org/api/users/89618/?format=api", "username": "juju", "first_name": "Julien", "last_name": "Olivain", "email": "juju@cotds.org" }, "mbox": "http://patchwork.ozlabs.org/project/buildroot/patch/20260330111505.3162298-1-danek.brat@gmail.com/mbox/", "series": [ { "id": 497997, "url": "http://patchwork.ozlabs.org/api/series/497997/?format=api", "web_url": "http://patchwork.ozlabs.org/project/buildroot/list/?series=497997", "date": "2026-03-30T11:15:05", "name": "[1/1] package/musl: bump to version 1.2.6", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/497997/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2217664/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2217664/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<buildroot-bounces@buildroot.org>", "X-Original-To": [ "incoming-buildroot@patchwork.ozlabs.org", "buildroot@buildroot.org" ], "Delivered-To": [ "patchwork-incoming-buildroot@legolas.ozlabs.org", "buildroot@buildroot.org" ], "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=To6oYnUw;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=2605:bc80:3010::137; helo=smtp4.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)" ], "Received": [ "from smtp4.osuosl.org (smtp4.osuosl.org [IPv6:2605:bc80:3010::137])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fkpZG5Z9kz1yG8\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Mon, 30 Mar 2026 22:15:18 +1100 (AEDT)", "from localhost (localhost [127.0.0.1])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id BA16A4025D;\n\tMon, 30 Mar 2026 11:15:16 +0000 (UTC)", "from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id ELUfyPlHCImj; Mon, 30 Mar 2026 11:15:15 +0000 (UTC)", "from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp4.osuosl.org (Postfix) with ESMTP id A3BFA4040E;\n\tMon, 30 Mar 2026 11:15:15 +0000 (UTC)", "from smtp2.osuosl.org (smtp2.osuosl.org [140.211.166.133])\n by lists1.osuosl.org (Postfix) with ESMTP id 7B83B1D3\n for <buildroot@buildroot.org>; Mon, 30 Mar 2026 11:15:14 +0000 (UTC)", "from localhost (localhost [127.0.0.1])\n by smtp2.osuosl.org (Postfix) with ESMTP id 6185B4042E\n for <buildroot@buildroot.org>; Mon, 30 Mar 2026 11:15:14 +0000 (UTC)", "from smtp2.osuosl.org ([127.0.0.1])\n by localhost (smtp2.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id da79FBULk07u for <buildroot@buildroot.org>;\n Mon, 30 Mar 2026 11:15:13 +0000 (UTC)", "from mail-wm1-x32b.google.com (mail-wm1-x32b.google.com\n [IPv6:2a00:1450:4864:20::32b])\n by smtp2.osuosl.org (Postfix) with ESMTPS id 403BA400FE\n for <buildroot@buildroot.org>; Mon, 30 Mar 2026 11:15:13 +0000 (UTC)", "by mail-wm1-x32b.google.com with SMTP id\n 5b1f17b1804b1-4852b81c73aso36950885e9.3\n for <buildroot@buildroot.org>; Mon, 30 Mar 2026 04:15:13 -0700 (PDT)", "from PC-BRAT-W10.intra.eskon.cz (mx1.eskon.cz. [83.240.30.122])\n by smtp.gmail.com with ESMTPSA id\n 5b1f17b1804b1-48722d2366dsm268328365e9.10.2026.03.30.04.15.09\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Mon, 30 Mar 2026 04:15:09 -0700 (PDT)" ], "X-Virus-Scanned": [ "amavis at osuosl.org", "amavis at osuosl.org" ], "X-Comment": "SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ", "DKIM-Filter": [ "OpenDKIM Filter v2.11.0 smtp4.osuosl.org A3BFA4040E", "OpenDKIM Filter v2.11.0 smtp2.osuosl.org 403BA400FE" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1774869315;\n\tbh=RK96w2nz2nqvuHbHJe9baci+N1BysVyhBpUYKtHdD3c=;\n\th=From:To:Cc:Date:Subject:List-Id:List-Unsubscribe:List-Archive:\n\t List-Post:List-Help:List-Subscribe:From;\n\tb=To6oYnUwbvBlCp6BrWhigz6zB8wK9qJ3FqkEBmwusoU1Zfyde0EvQtlpvBSZ1Ah8C\n\t z7IhZKeG1dckmPHmRxHxlgI/V8MSoHq0CG+mAzCdbJhWG1zw+yQGWmYSpiFxHnzLJC\n\t RdcqS7CFr/iwTUZ1hps9YBiWmWpfaot231tV21+Q6ZYKmTeuLRzAM20X88sgfHQcNy\n\t TaeRFpCNOzbCgaSXbPV/0cjKSviQCDjTZOlVEDU3d+lfsjkESFIpfFEIodDndQLl9x\n\t bcd+35C/pSKEU1B/igCaDLSYNqroMmYXTYEIeJJSjO2eSw1lNYJMg5vK1Zs/XXsnbE\n\t d0PBq6XQRFx2Q==", "Received-SPF": "Pass (mailfrom) identity=mailfrom;\n client-ip=2a00:1450:4864:20::32b; helo=mail-wm1-x32b.google.com;\n envelope-from=danek.brat@gmail.com; receiver=<UNKNOWN>", "DMARC-Filter": "OpenDMARC Filter v1.4.2 smtp2.osuosl.org 403BA400FE", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20251104; t=1774869311; x=1775474111;\n h=content-transfer-encoding:mime-version:message-id:date:subject:cc\n :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date\n :message-id:reply-to;\n bh=MOrU5Dm/TPuKyE/bNs5N1yasFrFdigO4JUFwRP/A/DI=;\n b=YG37d0Vhbu+JKfJTvpuTACqU+F4ndP4yFyxdAEw03lOtIyTiMjC2oNavXl1cOrIavX\n YGFyZP0OM7Y6h6EVZciWh3b2wdwIgCsrxVk201gq0wiDlpRuAAOc4bh4k/va2FJH4PEf\n 6/bVOETkdj2AyvziHC4DnJF7H0g9egrd69jVvcKT3BlRzromFKIWXGCvCgnG+XiBmR1X\n /4PiYTRrz6bP6JAMQ/0Tnq+RZI2DfmE0836X5Wvr9oABozmki0aehMGCoELomW/yWLYf\n noYb883IygO9xOhXbREQmK0aLEbH61u+4fDjFqDvu4L2PGik/f8ivxJUiqd8wd8YuWCY\n Fa2A==", "X-Gm-Message-State": "AOJu0YywfueRqbgE40sy3vukWmmtHSBDE1IhQTbqAxkB+d8IqWfJS2Os\n V/IWDK8BjzBjRLP0vtCQBdiOGE1WGHVpHUEgLj2hKnYzHXr1RXofVVoC4LaxNZqz", "X-Gm-Gg": "ATEYQzx5q2ovDjx7C0K8Vfz5nopOgGM7n59/11sKaG4TmYr/26UxDYkDO7VLDF1Ypvx\n KExt1iIIu3FcroVkHgrm5L9gKbH59Exh69VqmoAcIAWYEczrN9RQK1JRyHMlRFjAX+6Xj18uSrz\n Pi+NoE+4jquFRgThwkU/FBOX3F5eDODxIv9XUwseFqgulgyvYqmnZMeu/rxQV/9fXzaWkoAWZcF\n nEjRv1FoiAC3dq+ISj9Ju6OclRttbe0NVNsiSAE6mBvD6Ni3KqbWOulcqj0trLX977IwIQl9OuT\n TeQMLJKqjtXLsdOcpEyc+c6CidQonjTLeB4sXe+m3M52aI7DST7We7Q40Nx27od8Qu9NQCxx2Ra\n L+28AYj4uF9MZcbz3Gya7GqmVlpq6EyqImvYEPuhzORCwLSyP8w8LSY/Ior1R02/C1oBMBl41b6\n iysXYmS67rXOuGV/HmAXzVIaEBUHUq00iZnGhBkVZq56Pb/TdB1BdPQBe0Omso8+EpcOgz+aoZZ\n mCJ+g0ajg==", "X-Received": "by 2002:a05:600c:4f53:b0:485:45fb:3472 with SMTP id\n 5b1f17b1804b1-48727ee9872mr203377585e9.7.1774869310170;\n Mon, 30 Mar 2026 04:15:10 -0700 (PDT)", "From": "=?utf-8?q?Daniel_Br=C3=A1t?= <danek.brat@gmail.com>", "To": "buildroot@buildroot.org", "Cc": "Thomas Petazzoni <thomas.petazzoni@bootlin.com>, =?utf-8?q?Daniel_Br?=\n\t=?utf-8?q?=C3=A1t?= <danek.brat@gmail.com>", "Date": "Mon, 30 Mar 2026 13:15:05 +0200", "Message-Id": "<20260330111505.3162298-1-danek.brat@gmail.com>", "X-Mailer": "git-send-email 2.39.5", "MIME-Version": "1.0", "X-Mailman-Original-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=gmail.com; s=20251104; t=1774869311; x=1775474111; darn=buildroot.org;\n h=content-transfer-encoding:mime-version:message-id:date:subject:cc\n :to:from:from:to:cc:subject:date:message-id:reply-to;\n bh=MOrU5Dm/TPuKyE/bNs5N1yasFrFdigO4JUFwRP/A/DI=;\n b=a+evTUrXwkvCTHob5T8hW5yZOy8cJbH9tZ6Qj8bixcDBTW1GilH/cL2r6SEXPpn3jN\n RHU1Bvz1g6KtxusbHIRWx1SsDixlnUNuBpySgIo932PrWCT1DGagB3J70z9LyrS8xJq+\n azXG5qEWXI/G1R7rnMuQvqVELd5bGxoYRZ0tx/eJHIg4m1+CJZ6Y7rKNn1Wvf3n9kHJs\n 6C8ciB1ocPxq+0JNpVe7WrTBNPdl7vUqLM3h1JkLvXhPLIHWwMPLgWapVHD9JNoVgCmb\n Bca2r+Tjz7tWFcRFARoD8ZXzX4beZzSA+82ldBDth0S6pZqsOi69V+lPVHbKlJZI3rOW\n ui5w==", "X-Mailman-Original-Authentication-Results": [ "smtp2.osuosl.org;\n dmarc=pass (p=none dis=none)\n header.from=gmail.com", "smtp2.osuosl.org;\n dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com\n header.a=rsa-sha256 header.s=20251104 header.b=a+evTUrX" ], "Subject": "[Buildroot] [PATCH 1/1] package/musl: bump to version 1.2.6", "X-BeenThere": "buildroot@buildroot.org", "X-Mailman-Version": "2.1.30", "Precedence": "list", "List-Id": "Discussion and development of buildroot <buildroot.buildroot.org>", "List-Unsubscribe": "<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>", "List-Archive": "<http://lists.buildroot.org/pipermail/buildroot/>", "List-Post": "<mailto:buildroot@buildroot.org>", "List-Help": "<mailto:buildroot-request@buildroot.org?subject=help>", "List-Subscribe": "<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>", "Content-Type": "text/plain; charset=\"utf-8\"", "Content-Transfer-Encoding": "base64", "Errors-To": "buildroot-bounces@buildroot.org", "Sender": "\"buildroot\" <buildroot-bounces@buildroot.org>" }, "content": "This upstream relase includes fix for the CVE-2025-26519 and several other\nissues buildroot previously needed to apply its own patches for.\nSha256 of the COPYRIGHT file has changed due to a contributor name change,\nlicence remains otherwise the same.\n\nSigned-off-by: Daniel Brát <danek.brat@gmail.com>\n---\n ...ility-for-C-entry-point-function-_st.patch | 42 -------------------\n ...ous-input-validation-in-EUC-KR-decod.patch | 42 -------------------\n ...-8-output-code-path-against-input-de.patch | 41 ------------------\n package/musl/0006-m68k-fix-poll.patch | 26 ------------\n package/musl/musl.hash | 6 +--\n package/musl/musl.mk | 6 +--\n 6 files changed, 4 insertions(+), 159 deletions(-)\n delete mode 100644 package/musl/0003-use-hidden-visibility-for-C-entry-point-function-_st.patch\n delete mode 100644 package/musl/0004-iconv-fix-erroneous-input-validation-in-EUC-KR-decod.patch\n delete mode 100644 package/musl/0005-iconv-harden-UTF-8-output-code-path-against-input-de.patch\n delete mode 100644 package/musl/0006-m68k-fix-poll.patch", "diff": "diff --git a/package/musl/0003-use-hidden-visibility-for-C-entry-point-function-_st.patch b/package/musl/0003-use-hidden-visibility-for-C-entry-point-function-_st.patch\ndeleted file mode 100644\nindex 6359565cd7..0000000000\n--- a/package/musl/0003-use-hidden-visibility-for-C-entry-point-function-_st.patch\n+++ /dev/null\n@@ -1,42 +0,0 @@\n-From 9c78557af0a5e521cdb46a4ca7630f2987d2523e Mon Sep 17 00:00:00 2001\n-From: Rich Felker <dalias@aerifal.cx>\n-Date: Sat, 10 Aug 2024 19:49:24 -0400\n-Subject: [PATCH] use hidden visibility for C entry point function _start_c\n-\n-the file-level crt_arch.h asm fragments generally make direct\n-(non-PLT) calls from _start to _start_c, which is only valid when\n-there is a local, non-interposable definition for _start_c. generally,\n-the linker is expected to know that local definitions in a main\n-executable (as opposed to shared library) output are non-interposable,\n-making this work, but historically there have been linker bugs in this\n-area, and microblaze is reportedly still broken, flagging the\n-relocation for the call as a textrel.\n-\n-the equivalent _dlstart_c, called from the same crt_arch.h asm\n-fragments, has always used hidden visibility without problem, and\n-semantically it should be hidden, so make it hidden. this ensures the\n-direct call is always valid regardless of whether the linker properly\n-special-cases main executable output.\n-\n-Upstream: https://git.musl-libc.org/cgit/musl/commit/?id=9c78557af0a5e521cdb46a4ca7630f2987d2523e\n-Signed-off-by: J. Neuschäfer <j.neuschaefer@gmx.net>\n----\n- crt/crt1.c | 2 +-\n- 1 file changed, 1 insertion(+), 1 deletion(-)\n-\n-diff --git a/crt/crt1.c b/crt/crt1.c\n-index 8fe8ab5d..10601215 100644\n---- a/crt/crt1.c\n-+++ b/crt/crt1.c\n-@@ -11,7 +11,7 @@ weak void _fini();\n- int __libc_start_main(int (*)(), int, char **,\n- \tvoid (*)(), void(*)(), void(*)());\n-\n--void _start_c(long *p)\n-+hidden void _start_c(long *p)\n- {\n- \tint argc = p[0];\n- \tchar **argv = (void *)(p+1);\n---\n-2.45.2\n-\ndiff --git a/package/musl/0004-iconv-fix-erroneous-input-validation-in-EUC-KR-decod.patch b/package/musl/0004-iconv-fix-erroneous-input-validation-in-EUC-KR-decod.patch\ndeleted file mode 100644\nindex a0418e1df8..0000000000\n--- a/package/musl/0004-iconv-fix-erroneous-input-validation-in-EUC-KR-decod.patch\n+++ /dev/null\n@@ -1,42 +0,0 @@\n-From e5adcd97b5196e29991b524237381a0202a60659 Mon Sep 17 00:00:00 2001\n-From: Rich Felker <dalias@aerifal.cx>\n-Date: Sun, 9 Feb 2025 10:07:19 -0500\n-Subject: [PATCH] iconv: fix erroneous input validation in EUC-KR decoder\n-\n-as a result of incorrect bounds checking on the lead byte being\n-decoded, certain invalid inputs which should produce an encoding\n-error, such as \"\\xc8\\x41\", instead produced out-of-bounds loads from\n-the ksc table.\n-\n-in a worst case, the loaded value may not be a valid unicode scalar\n-value, in which case, if the output encoding was UTF-8, wctomb would\n-return (size_t)-1, causing an overflow in the output pointer and\n-remaining buffer size which could clobber memory outside of the output\n-buffer.\n-\n-bug report was submitted in private by Nick Wellnhofer on account of\n-potential security implications.\n-\n-CVE: CVE-2025-26519\n-Upstream: https://git.musl-libc.org/cgit/musl/commit/?id=e5adcd97b5196e29991b524237381a0202a60659\n-Signed-off-by: Peter Korsgaard <peter@korsgaard.com>\n----\n- src/locale/iconv.c | 2 +-\n- 1 file changed, 1 insertion(+), 1 deletion(-)\n-\n-diff --git a/src/locale/iconv.c b/src/locale/iconv.c\n-index 9605c8e9..008c93f0 100644\n---- a/src/locale/iconv.c\n-+++ b/src/locale/iconv.c\n-@@ -502,7 +502,7 @@ size_t iconv(iconv_t cd, char **restrict in, size_t *restrict inb, char **restri\n- \t\t\tif (c >= 93 || d >= 94) {\n- \t\t\t\tc += (0xa1-0x81);\n- \t\t\t\td += 0xa1;\n--\t\t\t\tif (c >= 93 || c>=0xc6-0x81 && d>0x52)\n-+\t\t\t\tif (c > 0xc6-0x81 || c==0xc6-0x81 && d>0x52)\n- \t\t\t\t\tgoto ilseq;\n- \t\t\t\tif (d-'A'<26) d = d-'A';\n- \t\t\t\telse if (d-'a'<26) d = d-'a'+26;\n--- \n-2.39.5\n-\ndiff --git a/package/musl/0005-iconv-harden-UTF-8-output-code-path-against-input-de.patch b/package/musl/0005-iconv-harden-UTF-8-output-code-path-against-input-de.patch\ndeleted file mode 100644\nindex 8250790d4f..0000000000\n--- a/package/musl/0005-iconv-harden-UTF-8-output-code-path-against-input-de.patch\n+++ /dev/null\n@@ -1,41 +0,0 @@\n-From c47ad25ea3b484e10326f933e927c0bc8cded3da Mon Sep 17 00:00:00 2001\n-From: Rich Felker <dalias@aerifal.cx>\n-Date: Wed, 12 Feb 2025 17:06:30 -0500\n-Subject: [PATCH] iconv: harden UTF-8 output code path against input decoder\n- bugs\n-\n-the UTF-8 output code was written assuming an invariant that iconv's\n-decoders only emit valid Unicode Scalar Values which wctomb can encode\n-successfully, thereby always returning a value between 1 and 4.\n-\n-if this invariant is not satisfied, wctomb returns (size_t)-1, and the\n-subsequent adjustments to the output buffer pointer and remaining\n-output byte count overflow, moving the output position backwards,\n-potentially past the beginning of the buffer, without storing any\n-bytes.\n-\n-CVE: CVE-2025-26519\n-Upstream: https://git.musl-libc.org/cgit/musl/commit/?id=c47ad25ea3b484e10326f933e927c0bc8cded3da\n-Signed-off-by: Peter Korsgaard <peter@korsgaard.com>\n----\n- src/locale/iconv.c | 4 ++++\n- 1 file changed, 4 insertions(+)\n-\n-diff --git a/src/locale/iconv.c b/src/locale/iconv.c\n-index 008c93f0..52178950 100644\n---- a/src/locale/iconv.c\n-+++ b/src/locale/iconv.c\n-@@ -545,6 +545,10 @@ size_t iconv(iconv_t cd, char **restrict in, size_t *restrict inb, char **restri\n- \t\t\t\tif (*outb < k) goto toobig;\n- \t\t\t\tmemcpy(*out, tmp, k);\n- \t\t\t} else k = wctomb_utf8(*out, c);\n-+\t\t\t/* This failure condition should be unreachable, but\n-+\t\t\t * is included to prevent decoder bugs from translating\n-+\t\t\t * into advancement outside the output buffer range. */\n-+\t\t\tif (k>4) goto ilseq;\n- \t\t\t*out += k;\n- \t\t\t*outb -= k;\n- \t\t\tbreak;\n--- \n-2.39.5\n-\ndiff --git a/package/musl/0006-m68k-fix-poll.patch b/package/musl/0006-m68k-fix-poll.patch\ndeleted file mode 100644\nindex cafee534e4..0000000000\n--- a/package/musl/0006-m68k-fix-poll.patch\n+++ /dev/null\n@@ -1,26 +0,0 @@\n-From b09e3174a695d1db60b2abc442d29ed3f87f0358 Mon Sep 17 00:00:00 2001\n-From: Baruch Siach <baruch@tkos.co.il>\n-Date: Wed, 7 Aug 2024 08:51:03 +0300\n-Subject: m68k: fix POLLWRNORM and POLLWRBAND\n-\n-As noted in commit f5011c62c3 (\"fix POLLWRNORM and POLLWRBAND on mips\")\n-m68k uses a different definition.\n-\n-Signed-off-by: Daniel Palmer <daniel@0x0f.com>\n-Upstream: https://git.musl-libc.org/cgit/musl/commit/?id=b09e3174a695d1db60b2abc442d29ed3f87f0358\n----\n- arch/m68k/bits/poll.h | 2 ++\n- 1 file changed, 2 insertions(+)\n- create mode 100644 arch/m68k/bits/poll.h\n-\n-diff --git a/arch/m68k/bits/poll.h b/arch/m68k/bits/poll.h\n-new file mode 100644\n-index 00000000..00063f41\n---- /dev/null\n-+++ b/arch/m68k/bits/poll.h\n-@@ -0,0 +1,2 @@\n-+#define POLLWRNORM POLLOUT\n-+#define POLLWRBAND 256\n--- \n-cgit v1.2.1\n-\ndiff --git a/package/musl/musl.hash b/package/musl/musl.hash\nindex b105320bac..e3cc652f5b 100644\n--- a/package/musl/musl.hash\n+++ b/package/musl/musl.hash\n@@ -1,4 +1,4 @@\n # Locally calculated after checking pgp signature from\n-# http://musl.libc.org/releases/musl-1.2.5.tar.gz.asc\n-sha256 a9a118bbe84d8764da0ea0d28b3ab3fae8477fc7e4085d90102b8596fc7c75e4 musl-1.2.5.tar.gz\n-sha256 f9bc4423732350eb0b3f7ed7e91d530298476f8fec0c6c427a1c04ade22655af COPYRIGHT\n+# http://musl.libc.org/releases/musl-1.2.6.tar.gz.asc\n+sha256 d585fd3b613c66151fc3249e8ed44f77020cb5e6c1e635a616d3f9f82460512a musl-1.2.6.tar.gz\n+sha256 b870108ec5e7790e9f9919064f1b9421d62d5f9b0e6c230c6adf7ea2da62e97b COPYRIGHT\ndiff --git a/package/musl/musl.mk b/package/musl/musl.mk\nindex 13a49a15eb..bea9029455 100644\n--- a/package/musl/musl.mk\n+++ b/package/musl/musl.mk\n@@ -4,7 +4,7 @@\n #\n ################################################################################\n \n-MUSL_VERSION = 1.2.5\n+MUSL_VERSION = 1.2.6\n MUSL_SITE = http://musl.libc.org/releases\n MUSL_LICENSE = MIT\n MUSL_LICENSE_FILES = COPYRIGHT\n@@ -26,10 +26,6 @@ MUSL_ADD_TOOLCHAIN_DEPENDENCY = NO\n \n MUSL_INSTALL_STAGING = YES\n \n-# 0004-iconv-fix-erroneous-input-validation-in-EUC-KR-decod.patch\n-# 0005-iconv-harden-UTF-8-output-code-path-against-input-de.patch\n-MUSL_IGNORE_CVES += CVE-2025-26519\n-\n # musl does not build with LTO, so explicitly disable it\n # when using a compiler that may have support for LTO\n ifeq ($(BR2_TOOLCHAIN_GCC_AT_LEAST_4_7),y)\n", "prefixes": [ "1/1" ] }