kernel: upgrade the kernel to the version 6.6.71

We upgrade the kernel to the version 6.6.71 to fix the following CVEs:
https://nvd.nist.gov/vuln/detail/CVE-2024-56627
https://nvd.nist.gov/vuln/detail/CVE-2024-56626
https://nvd.nist.gov/vuln/detail/CVE-2024-56615
https://nvd.nist.gov/vuln/detail/CVE-2024-56598
https://nvd.nist.gov/vuln/detail/CVE-2024-56596
https://nvd.nist.gov/vuln/detail/CVE-2024-56595
https://nvd.nist.gov/vuln/detail/CVE-2024-56551
https://nvd.nist.gov/vuln/detail/CVE-2024-53208
https://nvd.nist.gov/vuln/detail/CVE-2024-53166
https://nvd.nist.gov/vuln/detail/CVE-2024-53206
https://nvd.nist.gov/vuln/detail/CVE-2024-53186
https://nvd.nist.gov/vuln/detail/CVE-2024-53179
https://nvd.nist.gov/vuln/detail/CVE-2024-53173
https://nvd.nist.gov/vuln/detail/CVE-2024-53171
https://nvd.nist.gov/vuln/detail/CVE-2024-53165
https://nvd.nist.gov/vuln/detail/CVE-2024-56582
https://nvd.nist.gov/vuln/detail/CVE-2024-56538
https://nvd.nist.gov/vuln/detail/CVE-2024-53237
https://nvd.nist.gov/vuln/detail/CVE-2024-56581
https://nvd.nist.gov/vuln/detail/CVE-2024-56605
https://nvd.nist.gov/vuln/detail/CVE-2024-56604
https://nvd.nist.gov/vuln/detail/CVE-2024-56603
https://nvd.nist.gov/vuln/detail/CVE-2024-56602
https://nvd.nist.gov/vuln/detail/CVE-2024-56601
https://nvd.nist.gov/vuln/detail/CVE-2024-56600
https://nvd.nist.gov/vuln/detail/CVE-2024-56704
https://nvd.nist.gov/vuln/detail/CVE-2024-56640
https://nvd.nist.gov/vuln/detail/CVE-2024-53227
https://nvd.nist.gov/vuln/detail/CVE-2024-53213
https://nvd.nist.gov/vuln/detail/CVE-2024-56759
https://nvd.nist.gov/vuln/detail/CVE-2024-53156
https://nvd.nist.gov/vuln/detail/CVE-2024-53155
https://nvd.nist.gov/vuln/detail/CVE-2024-53150
https://nvd.nist.gov/vuln/detail/CVE-2024-53103
https://nvd.nist.gov/vuln/detail/CVE-2024-56606
https://nvd.nist.gov/vuln/detail/CVE-2024-56614
https://nvd.nist.gov/vuln/detail/CVE-2024-56631
https://nvd.nist.gov/vuln/detail/CVE-2024-56642
https://nvd.nist.gov/vuln/detail/CVE-2024-56708
https://nvd.nist.gov/vuln/detail/CVE-2024-56766
https://nvd.nist.gov/vuln/detail/CVE-2024-56765
https://nvd.nist.gov/vuln/detail/CVE-2024-56675
https://nvd.nist.gov/vuln/detail/CVE-2024-56672
https://nvd.nist.gov/vuln/detail/CVE-2024-56664
https://nvd.nist.gov/vuln/detail/CVE-2024-56663
https://nvd.nist.gov/vuln/detail/CVE-2024-56662
https://nvd.nist.gov/vuln/detail/CVE-2024-56658
https://nvd.nist.gov/vuln/detail/CVE-2024-56653
https://nvd.nist.gov/vuln/detail/CVE-2024-56651
https://nvd.nist.gov/vuln/detail/CVE-2024-56650
https://nvd.nist.gov/vuln/detail/CVE-2024-8805
https://nvd.nist.gov/vuln/detail/CVE-2024-53144
https://nvd.nist.gov/vuln/detail/CVE-2024-53108
https://nvd.nist.gov/vuln/detail/CVE-2024-53142
https://nvd.nist.gov/vuln/detail/CVE-2024-53141
https://nvd.nist.gov/vuln/detail/CVE-2024-53139
https://nvd.nist.gov/vuln/detail/CVE-2024-53126

Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a All-in-One lab with rt kernel.
- Boot up successfully in the lab.
- The cyclictest benchmark was also run on the starlingx lab, the result
  is "samples:  86400000  avg: 1691.716   std_dev: 58.475 max: 3932
  99.9999th percentile: 2591", It is not big difference with 6.6.63
  which is "samples:  86400000  avg: 1659.064 std_dev: 58.752 max: 3928
  99.9999th percentile: 2546".

Closes-Bug: 2092795

Change-Id: I616796274d39f8cadc4417185ff90167cd0e2f25
Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
This commit is contained in:
Peng zhang 2025-02-05 11:59:37 +00:00 committed by Peng Zhang
parent c8a1b2de7e
commit 29061b437b
6 changed files with 22 additions and 10 deletions

View File

@ -24,7 +24,7 @@
# building.
# Tools needed: tar/sed
KERNEL_HEAD_COMMIT=db1ff5ceabc3902a2a385e1f1d0a234812bff52c
KERNEL_HEAD_COMMIT=94762e4ed9eafc254a5522cf9107e2f450f79dc8
DEBIAN_FILE=linux_6.1.27-1~bpo11%2B1.debian.tar.xz
tar xvf linux-yocto-${KERNEL_HEAD_COMMIT}.tar.gz

View File

@ -1,14 +1,14 @@
---
debver: 6.6.63
debver: 6.6.71
debname: linux-rt
dl_hook: dl_hook
dl_files:
linux-yocto-db1ff5ceabc3902a2a385e1f1d0a234812bff52c.tar.gz:
linux-yocto-94762e4ed9eafc254a5522cf9107e2f450f79dc8.tar.gz:
topdir: null
url:
"https://git.yoctoproject.org/linux-yocto/snapshot/\
linux-yocto-db1ff5ceabc3902a2a385e1f1d0a234812bff52c.tar.gz"
sha256sum: a39f92d47cc43ca49b2283c018cef81e82cc5d18797b55187d83534f20ccbbc2
linux-yocto-94762e4ed9eafc254a5522cf9107e2f450f79dc8.tar.gz"
sha256sum: a6ec1d5108e798fd3bf7b3e977976412a333aef2d553920b677995e60ad5c5fe
linux_6.1.27-1~bpo11%2B1.debian.tar.xz:
topdir: null
url:

View File

@ -1,3 +1,9 @@
linux-rt (6.6.71-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fpreempt-rt%2Fbase&qt=range&q=94762e4ed9eafc254a5522cf9107e2f450f79dc8
-- Peng Zhang <Peng.Zhang2@windriver.com> Thu, 16 Jan 2025 21:38:24 +0800
linux-rt (6.6.63-1) unstable; urgency=medium
* New upstream update:

View File

@ -5,7 +5,7 @@
# be put at the same path where this script is located.
# Tools needed: tar
KERNEL_HEAD_COMMIT=7161bda718e673d92774adeec664c182a9503b23
KERNEL_HEAD_COMMIT=b51e4ee5e3c342d2035ff50e24e438810bb51b02
DEBIAN_FILE=linux_6.1.27-1~bpo11%2B1.debian.tar.xz
tar xvf linux-yocto-${KERNEL_HEAD_COMMIT}.tar.gz

View File

@ -1,14 +1,14 @@
---
debver: 6.6.63
debver: 6.6.71
debname: linux
dl_hook: dl_hook
dl_files:
linux-yocto-7161bda718e673d92774adeec664c182a9503b23.tar.gz:
linux-yocto-b51e4ee5e3c342d2035ff50e24e438810bb51b02.tar.gz:
topdir: null
url:
"https://git.yoctoproject.org/linux-yocto/snapshot/\
linux-yocto-7161bda718e673d92774adeec664c182a9503b23.tar.gz"
sha256sum: c84c755695e26f880dc66100842ad9e6866b7a55c2a3786865634b995d41bd98
linux-yocto-b51e4ee5e3c342d2035ff50e24e438810bb51b02.tar.gz"
sha256sum: d92297a89b71f8258760d56c9849c8cce17329a663564088a67f2f77934a5ab5
linux_6.1.27-1~bpo11%2B1.debian.tar.xz:
topdir: null
url:

View File

@ -1,3 +1,9 @@
linux (6.6.71-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fbase&qt=range&q=b51e4ee5e3c342d2035ff50e24e438810bb51b02
-- Peng Zhang <Peng.Zhang2@windriver.com> Thu, 16 Jan 2025 09:15:32 +0800
linux (6.6.63-1) unstable; urgency=medium
* New upstream update: