One of our source patches requires refresh against the new kernel
source. It was modified for missed parameter need be added in the
new kernel: Port-negative-dentries-limit-feature-from-3.10.patch.
After upgrading kernel, new function eth_hw_addr_set was added in
linux-headers-5.10.0-6-common. While it has already defined in the
following driver modules: i40e,i40e-cvl-4.10,iavf,iavf-cvl-4.10,ice,ice-cvl-4.10.
To avoid the redefinition conflict, we allow the out-of-tree drivers
to use the newly added in-tree version of the eth_hw_addr_set
function. This is achieved by undefining the NEED_ETH_HW_ADDR_SET
macro.
Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a AIO-DX lab with rt kernel.
- Boot up successfully in the lab.
- The sanity testing was done by our test team and no regression
defect was found.
- The cyclictest benchmark was also run on the starlingx lab, the
result is "samples: 259199999 avg: 1633 max: 8817 99.9999th
percentile: 7612 overflows: 0", It is not big difference with
5.10.185 for avg and max.
Reviewed: https:/ /review. opendev. org/c/starlingx /kernel/ +/895943 /opendev. org/starlingx/ kernel/ commit/ 825266d5ac65dd1 81e7de3eb142eb9 75d2f17d29
Committed: https:/
Submitter: "Zuul (22348)"
Branch: master
commit 825266d5ac65dd1 81e7de3eb142eb9 75d2f17d29
Author: Peng Zhang <email address hidden>
Date: Sat Sep 23 01:17:16 2023 +0800
Update kernel to v5.10.189
This commit updates kernel to 5.10.189 to fix following CVE issue: /nvd.nist. gov/vuln/ detail/ CVE-2023- 4132 /nvd.nist. gov/vuln/ detail/ CVE-2023- 4004 /nvd.nist. gov/vuln/ detail/ CVE-2023- 20593 /nvd.nist. gov/vuln/ detail/ CVE-2023- 3863 /nvd.nist. gov/vuln/ detail/ CVE-2023- 31248 /nvd.nist. gov/vuln/ detail/ CVE-2023- 35001 /nvd.nist. gov/vuln/ detail/ CVE-2023- 3117 /nvd.nist. gov/vuln/ detail/ CVE-2023- 3611 /nvd.nist. gov/vuln/ detail/ CVE-2023- 3610 /nvd.nist. gov/vuln/ detail/ CVE-2023- 3776 /nvd.nist. gov/vuln/ detail/ CVE-2023- 3390 /nvd.nist. gov/vuln/ detail/ CVE-2023- 2898
CVE-2023-4132: https:/
CVE-2023-4004: https:/
CVE-2023-20593: https:/
CVE-2023-3863: https:/
CVE-2023-31248: https:/
CVE-2023-35001: https:/
CVE-2023-3117: https:/
CVE-2023-3611: https:/
CVE-2023-3610: https:/
CVE-2023-3776: https:/
CVE-2023-3390: https:/
CVE-2023-2898: https:/
One of our source patches requires refresh against the new kernel
Port- negative- dentries- limit-feature- from-3. 10.patch.
source. It was modified for missed parameter need be added in the
new kernel:
After upgrading kernel, new function eth_hw_addr_set was added in headers- 5.10.0- 6-common. While it has already defined in the
i40e, i40e-cvl- 4.10,iavf, iavf-cvl- 4.10,ice, ice-cvl- 4.10. HW_ADDR_ SET
linux-
following driver modules:
To avoid the redefinition conflict, we allow the out-of-tree drivers
to use the newly added in-tree version of the eth_hw_addr_set
function. This is achieved by undefining the NEED_ETH_
macro.
Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a AIO-DX lab with rt kernel.
- Boot up successfully in the lab.
- The sanity testing was done by our test team and no regression
defect was found.
- The cyclictest benchmark was also run on the starlingx lab, the
result is "samples: 259199999 avg: 1633 max: 8817 99.9999th
percentile: 7612 overflows: 0", It is not big difference with
5.10.185 for avg and max.
Closes-Bug: 2029211
Change-Id: I107a0c0285ad2d e39d56863cc5fed 6273ad7fbd4
Signed-off-by: Peng Zhang <email address hidden>