One of our source patches requires refresh against the new kernel
source.It was deleted for content has been contained in the new
kernel:
0072-kernel-fork-beware-of-__put_task_struct-calling-cont.patch.
Under PREEMPT_RT, when kernel is upgraded to v5.10.198,
raw_write_seqcount_t_begin function is still used by qdisc_run_begin
function in include/net/sch_generic.h. While
raw_write_seqcount_t_begin function is replaced by
do_raw_write_seqcount_begin in include/linux/seqlock.h whose commit
is a8dd21118b0f.
Commit ID Title
a8dd21118b0f seqlock: Prefix internal seqcount_t-only macros with
a "do_"
To fix implicit declaration of function raw_write_seqcount_t_begin,
replace it with do_raw_write_seqcount_begin in the following patch:
0083-net-replace-raw_write_seqcount_t_begin-by-do_raw_wri.patch
Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a AIO-DX lab with rt kernel.
- Boot up successfully in the lab.
- The sanity testing was done by our test team and no regression
defect was found.
- The cyclictest benchmark was also run on the starlingx lab, the
result is "samples: 259200000 avg: 1610 max: 4658 99.9999th
percentile: 2403 overflows: 0", It is not big difference with
5.10.192 for avg and percentile.
Reviewed: https:/ /review. opendev. org/c/starlingx /kernel/ +/899024 /opendev. org/starlingx/ kernel/ commit/ 88eaffd00c2b4cc 1e866ea2ead446d 648e04296b
Committed: https:/
Submitter: "Zuul (22348)"
Branch: master
commit 88eaffd00c2b4cc 1e866ea2ead446d 648e04296b
Author: Peng Zhang <email address hidden>
Date: Wed Nov 1 11:03:09 2023 +0000
Update kernel to v5.10.198
This commit updates kernel to v5.10.198 to fix following CVE issues: 2023-4244: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 4244 2023-31085: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 31085 2023-45871: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 45871 2023-5197: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 5197 2023-39194: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 39194 2023-39192: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 39192 2023-39193: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 39193 2023-42756: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 42756 2023-42754: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 42754 CVE-2023- 39189: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 39189 CVE-2023- 31084: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 31084 CVE-2023- 3389: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 3389 CVE-2022- 45884: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2022- 45884 CVE-2023- 42755: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 42755 CVE-2023- 42752: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 42752 CVE-2023- 4622: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 4622 CVE-2023- 37453: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 37453 CVE-2023- 42753: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 42753 CVE-2023- 4623: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 4623 CVE-2023- 4921: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 4921
1.CVE-
2.CVE-
3.CVE-
4.CVE-
5.CVE-
6.CVE-
7.CVE-
8.CVE-
9.CVE-
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
One of our source patches requires refresh against the new kernel kernel- fork-beware- of-__put_ task_struct- calling- cont.patch.
source.It was deleted for content has been contained in the new
kernel:
0072-
Under PREEMPT_RT, when kernel is upgraded to v5.10.198, write_seqcount_ t_begin function is still used by qdisc_run_begin net/sch_ generic. h. While write_seqcount_ t_begin function is replaced by raw_write_ seqcount_ begin in include/ linux/seqlock. h whose commit seqcount_ t_begin, write_seqcount_ begin in the following patch: net-replace- raw_write_ seqcount_ t_begin- by-do_raw_ wri.patch
raw_
function in include/
raw_
do_
is a8dd21118b0f.
Commit ID Title
a8dd21118b0f seqlock: Prefix internal seqcount_t-only macros with
a "do_"
To fix implicit declaration of function raw_write_
replace it with do_raw_
0083-
Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a AIO-DX lab with rt kernel.
- Boot up successfully in the lab.
- The sanity testing was done by our test team and no regression
defect was found.
- The cyclictest benchmark was also run on the starlingx lab, the
result is "samples: 259200000 avg: 1610 max: 4658 99.9999th
percentile: 2403 overflows: 0", It is not big difference with
5.10.192 for avg and percentile.
Closes-Bug: 2038710
Change-Id: I7ed77309e83d4e dd39623452c9348 488f8db1523
Signed-off-by: Peng Zhang <email address hidden>