A local StarlingX kernel patch had already been integrated into the
linux-yocto repository's v5.10/standard/preempt-rt/base branch after
v5.10.198 as commit 2dccf008aa65 ("net: replace
raw_write_seqcount_t_begin by do_raw_write_seqcount_begin").
Hence, we drop the following now-redundant local patch:
0083-net-replace-raw_write_seqcount_t_begin-by-do_raw_wri.patch.
Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a AIO-DX lab with rt kernel.
- Boot up successfully in the lab.
- The sanity testing was done by our test team and no regression
defect was found.
- The cyclictest benchmark was also run on the starlingx lab, the
result is "samples: 259200000 avg: 1602 max: 4460 99.9999th
percentile: 2737 overflows: 0".
Given that the maximum and 99.9999 percentile latency values are
well below 5 microseconds, the results are acceptable, and they are
not significantly different than the ones acquired with kernel
v5.10.198.
Reviewed: https:/ /review. opendev. org/c/starlingx /kernel/ +/906036 /opendev. org/starlingx/ kernel/ commit/ 706581da39e96f2 ad3ca906c38f3eb 4778fb78a2
Committed: https:/
Submitter: "Zuul (22348)"
Branch: master
commit 706581da39e96f2 ad3ca906c38f3eb 4778fb78a2
Author: Peng Zhang <email address hidden>
Date: Thu Jan 18 11:20:58 2024 +0000
Update kernel to v5.10.205
This commit updates kernel to v5.10.205 to fix following CVE issues: 2023-51782: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 51782 2023-51781:https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 51781 2023-51780: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 51780 2023-6531: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 6531 2023-6121: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 6121 2023-6546: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 6546 2023-6931: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 6931 2023-6932: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 6932 2023-6817: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 6817 CVE-2023- 46862: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 46862 CVE-2023- 39197: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 39197 CVE-2023- 6176: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 6176 CVE-2023- 4881: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 4881 CVE-2023- 34324: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 34324 CVE-2023- 5717: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 5717 CVE-2023- 5178: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 5178 CVE-2023- 46813: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 46813 CVE-2023- 35827: https:/ /nvd.nist. gov/vuln/ detail/ CVE-2023- 35827
1.CVE-
2.CVE-
3.CVE-
4.CVE-
5.CVE-
6.CVE-
7.CVE-
8.CVE-
9.CVE-
10.
11.
12.
13.
14.
15.
16.
17.
18.
A local StarlingX kernel patch had already been integrated into the preempt- rt/base branch after write_seqcount_ t_begin by do_raw_ write_seqcount_ begin") . net-replace- raw_write_ seqcount_ t_begin- by-do_raw_ wri.patch.
linux-yocto repository's v5.10/standard/
v5.10.198 as commit 2dccf008aa65 ("net: replace
raw_
Hence, we drop the following now-redundant local patch:
0083-
Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a AIO-DX lab with rt kernel.
- Boot up successfully in the lab.
- The sanity testing was done by our test team and no regression
defect was found.
- The cyclictest benchmark was also run on the starlingx lab, the
result is "samples: 259200000 avg: 1602 max: 4460 99.9999th
percentile: 2737 overflows: 0".
Given that the maximum and 99.9999 percentile latency values are
well below 5 microseconds, the results are acceptable, and they are
not significantly different than the ones acquired with kernel
v5.10.198.
Closes-Bug: 2043947
Change-Id: I558e40c4398428 d73444bd4f50928 c5248da0899
Signed-off-by: Peng Zhang <email address hidden>