kernel: upgrade the kernel to the version 6.6.71
We upgrade the kernel to the version 6.6.71 to fix the following CVEs: https://nvd.nist.gov/vuln/detail/CVE-2024-56627 https://nvd.nist.gov/vuln/detail/CVE-2024-56626 https://nvd.nist.gov/vuln/detail/CVE-2024-56615 https://nvd.nist.gov/vuln/detail/CVE-2024-56598 https://nvd.nist.gov/vuln/detail/CVE-2024-56596 https://nvd.nist.gov/vuln/detail/CVE-2024-56595 https://nvd.nist.gov/vuln/detail/CVE-2024-56551 https://nvd.nist.gov/vuln/detail/CVE-2024-53208 https://nvd.nist.gov/vuln/detail/CVE-2024-53166 https://nvd.nist.gov/vuln/detail/CVE-2024-53206 https://nvd.nist.gov/vuln/detail/CVE-2024-53186 https://nvd.nist.gov/vuln/detail/CVE-2024-53179 https://nvd.nist.gov/vuln/detail/CVE-2024-53173 https://nvd.nist.gov/vuln/detail/CVE-2024-53171 https://nvd.nist.gov/vuln/detail/CVE-2024-53165 https://nvd.nist.gov/vuln/detail/CVE-2024-56582 https://nvd.nist.gov/vuln/detail/CVE-2024-56538 https://nvd.nist.gov/vuln/detail/CVE-2024-53237 https://nvd.nist.gov/vuln/detail/CVE-2024-56581 https://nvd.nist.gov/vuln/detail/CVE-2024-56605 https://nvd.nist.gov/vuln/detail/CVE-2024-56604 https://nvd.nist.gov/vuln/detail/CVE-2024-56603 https://nvd.nist.gov/vuln/detail/CVE-2024-56602 https://nvd.nist.gov/vuln/detail/CVE-2024-56601 https://nvd.nist.gov/vuln/detail/CVE-2024-56600 https://nvd.nist.gov/vuln/detail/CVE-2024-56704 https://nvd.nist.gov/vuln/detail/CVE-2024-56640 https://nvd.nist.gov/vuln/detail/CVE-2024-53227 https://nvd.nist.gov/vuln/detail/CVE-2024-53213 https://nvd.nist.gov/vuln/detail/CVE-2024-56759 https://nvd.nist.gov/vuln/detail/CVE-2024-53156 https://nvd.nist.gov/vuln/detail/CVE-2024-53155 https://nvd.nist.gov/vuln/detail/CVE-2024-53150 https://nvd.nist.gov/vuln/detail/CVE-2024-53103 https://nvd.nist.gov/vuln/detail/CVE-2024-56606 https://nvd.nist.gov/vuln/detail/CVE-2024-56614 https://nvd.nist.gov/vuln/detail/CVE-2024-56631 https://nvd.nist.gov/vuln/detail/CVE-2024-56642 https://nvd.nist.gov/vuln/detail/CVE-2024-56708 https://nvd.nist.gov/vuln/detail/CVE-2024-56766 https://nvd.nist.gov/vuln/detail/CVE-2024-56765 https://nvd.nist.gov/vuln/detail/CVE-2024-56675 https://nvd.nist.gov/vuln/detail/CVE-2024-56672 https://nvd.nist.gov/vuln/detail/CVE-2024-56664 https://nvd.nist.gov/vuln/detail/CVE-2024-56663 https://nvd.nist.gov/vuln/detail/CVE-2024-56662 https://nvd.nist.gov/vuln/detail/CVE-2024-56658 https://nvd.nist.gov/vuln/detail/CVE-2024-56653 https://nvd.nist.gov/vuln/detail/CVE-2024-56651 https://nvd.nist.gov/vuln/detail/CVE-2024-56650 https://nvd.nist.gov/vuln/detail/CVE-2024-8805 https://nvd.nist.gov/vuln/detail/CVE-2024-53144 https://nvd.nist.gov/vuln/detail/CVE-2024-53108 https://nvd.nist.gov/vuln/detail/CVE-2024-53142 https://nvd.nist.gov/vuln/detail/CVE-2024-53141 https://nvd.nist.gov/vuln/detail/CVE-2024-53139 https://nvd.nist.gov/vuln/detail/CVE-2024-53126 Verification: - Build kernel and out of tree modules success for rt and std. - Build iso success for rt and std. - Install success onto a All-in-One lab with rt kernel. - Boot up successfully in the lab. - The cyclictest benchmark was also run on the starlingx lab, the result is "samples: 86400000 avg: 1691.716 std_dev: 58.475 max: 3932 99.9999th percentile: 2591", It is not big difference with 6.6.63 which is "samples: 86400000 avg: 1659.064 std_dev: 58.752 max: 3928 99.9999th percentile: 2546". Closes-Bug: 2092795 Change-Id: I616796274d39f8cadc4417185ff90167cd0e2f25 Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
This commit is contained in:
parent
c8a1b2de7e
commit
29061b437b
@ -24,7 +24,7 @@
|
||||
# building.
|
||||
# Tools needed: tar/sed
|
||||
|
||||
KERNEL_HEAD_COMMIT=db1ff5ceabc3902a2a385e1f1d0a234812bff52c
|
||||
KERNEL_HEAD_COMMIT=94762e4ed9eafc254a5522cf9107e2f450f79dc8
|
||||
DEBIAN_FILE=linux_6.1.27-1~bpo11%2B1.debian.tar.xz
|
||||
|
||||
tar xvf linux-yocto-${KERNEL_HEAD_COMMIT}.tar.gz
|
||||
|
@ -1,14 +1,14 @@
|
||||
---
|
||||
debver: 6.6.63
|
||||
debver: 6.6.71
|
||||
debname: linux-rt
|
||||
dl_hook: dl_hook
|
||||
dl_files:
|
||||
linux-yocto-db1ff5ceabc3902a2a385e1f1d0a234812bff52c.tar.gz:
|
||||
linux-yocto-94762e4ed9eafc254a5522cf9107e2f450f79dc8.tar.gz:
|
||||
topdir: null
|
||||
url:
|
||||
"https://git.yoctoproject.org/linux-yocto/snapshot/\
|
||||
linux-yocto-db1ff5ceabc3902a2a385e1f1d0a234812bff52c.tar.gz"
|
||||
sha256sum: a39f92d47cc43ca49b2283c018cef81e82cc5d18797b55187d83534f20ccbbc2
|
||||
linux-yocto-94762e4ed9eafc254a5522cf9107e2f450f79dc8.tar.gz"
|
||||
sha256sum: a6ec1d5108e798fd3bf7b3e977976412a333aef2d553920b677995e60ad5c5fe
|
||||
linux_6.1.27-1~bpo11%2B1.debian.tar.xz:
|
||||
topdir: null
|
||||
url:
|
||||
|
@ -1,3 +1,9 @@
|
||||
linux-rt (6.6.71-1) unstable; urgency=medium
|
||||
|
||||
* New upstream update:
|
||||
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fpreempt-rt%2Fbase&qt=range&q=94762e4ed9eafc254a5522cf9107e2f450f79dc8
|
||||
-- Peng Zhang <Peng.Zhang2@windriver.com> Thu, 16 Jan 2025 21:38:24 +0800
|
||||
|
||||
linux-rt (6.6.63-1) unstable; urgency=medium
|
||||
|
||||
* New upstream update:
|
||||
|
@ -5,7 +5,7 @@
|
||||
# be put at the same path where this script is located.
|
||||
# Tools needed: tar
|
||||
|
||||
KERNEL_HEAD_COMMIT=7161bda718e673d92774adeec664c182a9503b23
|
||||
KERNEL_HEAD_COMMIT=b51e4ee5e3c342d2035ff50e24e438810bb51b02
|
||||
DEBIAN_FILE=linux_6.1.27-1~bpo11%2B1.debian.tar.xz
|
||||
|
||||
tar xvf linux-yocto-${KERNEL_HEAD_COMMIT}.tar.gz
|
||||
|
@ -1,14 +1,14 @@
|
||||
---
|
||||
debver: 6.6.63
|
||||
debver: 6.6.71
|
||||
debname: linux
|
||||
dl_hook: dl_hook
|
||||
dl_files:
|
||||
linux-yocto-7161bda718e673d92774adeec664c182a9503b23.tar.gz:
|
||||
linux-yocto-b51e4ee5e3c342d2035ff50e24e438810bb51b02.tar.gz:
|
||||
topdir: null
|
||||
url:
|
||||
"https://git.yoctoproject.org/linux-yocto/snapshot/\
|
||||
linux-yocto-7161bda718e673d92774adeec664c182a9503b23.tar.gz"
|
||||
sha256sum: c84c755695e26f880dc66100842ad9e6866b7a55c2a3786865634b995d41bd98
|
||||
linux-yocto-b51e4ee5e3c342d2035ff50e24e438810bb51b02.tar.gz"
|
||||
sha256sum: d92297a89b71f8258760d56c9849c8cce17329a663564088a67f2f77934a5ab5
|
||||
linux_6.1.27-1~bpo11%2B1.debian.tar.xz:
|
||||
topdir: null
|
||||
url:
|
||||
|
@ -1,3 +1,9 @@
|
||||
linux (6.6.71-1) unstable; urgency=medium
|
||||
|
||||
* New upstream update:
|
||||
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fbase&qt=range&q=b51e4ee5e3c342d2035ff50e24e438810bb51b02
|
||||
-- Peng Zhang <Peng.Zhang2@windriver.com> Thu, 16 Jan 2025 09:15:32 +0800
|
||||
|
||||
linux (6.6.63-1) unstable; urgency=medium
|
||||
|
||||
* New upstream update:
|
||||
|
Loading…
x
Reference in New Issue
Block a user