StarlingX Linux kernel
Go to file
Peng Zhang 7f53ef73e9 kernel: upgrade the kernel to the version 6.6.52
We upgrade the kernel to the version 6.6.52 to fix the following CVEs:
CVE-2024-46786: https://nvd.nist.gov/vuln/detail/CVE-2024-46786
CVE-2024-46746: https://nvd.nist.gov/vuln/detail/CVE-2024-46746
CVE-2024-46731: https://nvd.nist.gov/vuln/detail/CVE-2024-46731
CVE-2024-46782: https://nvd.nist.gov/vuln/detail/CVE-2024-46782
CVE-2024-46759: https://nvd.nist.gov/vuln/detail/CVE-2024-46759
CVE-2024-46758: https://nvd.nist.gov/vuln/detail/CVE-2024-46758
CVE-2024-46757: https://nvd.nist.gov/vuln/detail/CVE-2024-46757
CVE-2024-46756: https://nvd.nist.gov/vuln/detail/CVE-2024-46756
CVE-2024-46800: https://nvd.nist.gov/vuln/detail/CVE-2024-46800
CVE-2024-46796: https://nvd.nist.gov/vuln/detail/CVE-2024-46796
CVE-2024-46798: https://nvd.nist.gov/vuln/detail/CVE-2024-46798
CVE-2024-46747: https://nvd.nist.gov/vuln/detail/CVE-2024-46747
CVE-2024-46738: https://nvd.nist.gov/vuln/detail/CVE-2024-46738
CVE-2024-46740: https://nvd.nist.gov/vuln/detail/CVE-2024-46740
CVE-2024-46741: https://nvd.nist.gov/vuln/detail/CVE-2024-46741
CVE-2024-46743: https://nvd.nist.gov/vuln/detail/CVE-2024-46743

It also contains kernel 6.6.50 which fix following CVEs:
CVE-2024-46725: https://nvd.nist.gov/vuln/detail/CVE-2024-46725
CVE-2024-46724: https://nvd.nist.gov/vuln/detail/CVE-2024-46724
CVE-2024-46723: https://nvd.nist.gov/vuln/detail/CVE-2024-46723
CVE-2024-46722: https://nvd.nist.gov/vuln/detail/CVE-2024-46722
CVE-2024-45026: https://nvd.nist.gov/vuln/detail/CVE-2024-45026
CVE-2024-46687: https://nvd.nist.gov/vuln/detail/CVE-2024-46687
CVE-2024-46674: https://nvd.nist.gov/vuln/detail/CVE-2024-46674
CVE-2024-46673: https://nvd.nist.gov/vuln/detail/CVE-2024-46673
CVE-2024-44941: https://nvd.nist.gov/vuln/detail/CVE-2024-44941
CVE-2024-44940: https://nvd.nist.gov/vuln/detail/CVE-2024-44940
CVE-2024-41040: https://nvd.nist.gov/vuln/detail/CVE-2024-41040
CVE-2024-41039: https://nvd.nist.gov/vuln/detail/CVE-2024-41039
CVE-2024-42280: https://nvd.nist.gov/vuln/detail/CVE-2024-42280
CVE-2024-41059: https://nvd.nist.gov/vuln/detail/CVE-2024-41059
CVE-2024-44983: https://nvd.nist.gov/vuln/detail/CVE-2024-44983
CVE-2024-44985: https://nvd.nist.gov/vuln/detail/CVE-2024-44985
CVE-2024-44974: https://nvd.nist.gov/vuln/detail/CVE-2024-44974
CVE-2024-44987: https://nvd.nist.gov/vuln/detail/CVE-2024-44987
CVE-2024-44986: https://nvd.nist.gov/vuln/detail/CVE-2024-44986
CVE-2024-44999: https://nvd.nist.gov/vuln/detail/CVE-2024-44999
CVE-2024-44997: https://nvd.nist.gov/vuln/detail/CVE-2024-44997
CVE-2024-44998: https://nvd.nist.gov/vuln/detail/CVE-2024-44998
CVE-2024-43882: https://nvd.nist.gov/vuln/detail/CVE-2024-43882
CVE-2024-43873: https://nvd.nist.gov/vuln/detail/CVE-2024-43873

It also contains kernel 6.6.47 which fix following CVEs:
CVE-2024-43858: https://nvd.nist.gov/vuln/detail/CVE-2024-43858
CVE-2024-42314: https://nvd.nist.gov/vuln/detail/CVE-2024-42314
CVE-2024-42313: https://nvd.nist.gov/vuln/detail/CVE-2024-42313
CVE-2024-42302: https://nvd.nist.gov/vuln/detail/CVE-2024-42302
CVE-2024-42301: https://nvd.nist.gov/vuln/detail/CVE-2024-42301
CVE-2024-41046: https://nvd.nist.gov/vuln/detail/CVE-2024-41046
CVE-2024-41049: https://nvd.nist.gov/vuln/detail/CVE-2024-41049
CVE-2024-41057: https://nvd.nist.gov/vuln/detail/CVE-2024-41057
CVE-2024-41058: https://nvd.nist.gov/vuln/detail/CVE-2024-41058
CVE-2024-41070: https://nvd.nist.gov/vuln/detail/CVE-2024-41070
CVE-2024-41073: https://nvd.nist.gov/vuln/detail/CVE-2024-41073
CVE-2024-42284: https://nvd.nist.gov/vuln/detail/CVE-2024-42284
CVE-2024-42271: https://nvd.nist.gov/vuln/detail/CVE-2024-42271
CVE-2024-42285: https://nvd.nist.gov/vuln/detail/CVE-2024-42285
CVE-2024-44942: https://nvd.nist.gov/vuln/detail/CVE-2024-44942
CVE-2024-44934: https://nvd.nist.gov/vuln/detail/CVE-2024-44934
CVE-2024-43900: https://nvd.nist.gov/vuln/detail/CVE-2024-43900

For updated kernel v6.6.52 has contained following patch under
ice-ptp-vsi directory:
    ice-fix-VSI-lists-confusion-when-adding-VLANs.patch
it will be deleted to adapt source code.

Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a All-in-One lab with rt kernel.
- Boot up successfully in the lab.
- The sanity testing was run and the test results PASS.
- The cyclictest benchmark was also run on the starlingx lab, the result
  is "samples: 86400000 avg: 1674.128 std_dev: 49.673 max: 3711
  99.9999th percentile: 2625".
- The values are relatively similar kernel v6.6.40 (1674 vs 1658,
  49 vs 44 and 2625 vs 2590).

Closes-Bug: 2077387
Closes-Bug: 2079952
Closes-Bug: 2081784

Change-Id: I140260d0a9c5617ee8f9650cc8a89db5b284a8db
Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
2024-10-21 10:32:55 +08:00
doc doc: Fix Zuul/tox failures 2023-08-31 01:36:50 +00:00
kernel-modules kernel-modules: upgrade ice,i40e,iavf drivers to the bundle 29.1 2024-08-30 03:28:43 +00:00
kernel-rt kernel: upgrade the kernel to the version 6.6.52 2024-10-21 10:32:55 +08:00
kernel-signed Update debian package versions to use git commits 2023-02-14 12:32:13 -08:00
kernel-std kernel: upgrade the kernel to the version 6.6.52 2024-10-21 10:32:55 +08:00
releasenotes Switch to newer openstackdocstheme and reno versions 2020-06-04 14:30:28 +02:00
userspace kernel-modules: re-enable bnxt_en 2024-07-10 23:28:50 +00:00
.gitignore Added .gitreview, .zuul.yaml & tox.ini 2020-04-21 16:01:28 -04:00
.gitreview Added .gitreview, .zuul.yaml & tox.ini 2020-04-21 16:01:28 -04:00
.zuul.yaml Fix github mirroring for this repo 2023-04-28 12:38:51 -04:00
centos_srpms_centos3rdparties.lst [kernel-rt 4.18] Upgrade kernel-rt to version 4.18.0-147.3.1 based on SRPM 2020-04-30 11:25:20 +08:00
debian_build_layer.cfg Add debian_build_layer.cfg file 2021-10-05 14:08:21 -04:00
debian_iso_image.inc kernel-modules: re-enable bnxt_en 2024-07-10 23:28:50 +00:00
debian_pkg_dirs kernel-modules: re-enable bnxt_en 2024-07-10 23:28:50 +00:00
debian_pkg_dirs_rt kernel-modules: re-enable bnxt_en 2024-07-10 23:28:50 +00:00
debian_pkg_dirs_sign Debian:kernel-signed: Added signed packages into debian_pkg_dirs_sign 2022-06-01 23:07:32 +08:00
LICENSE Config file changes to add 'kernel-std kernel-rt kernel-modules ' after relocation from 'stx/integ' 2020-04-09 10:50:11 -04:00
test-requirements.txt kernel: modify spec file to set grub default boot 2021-12-17 19:35:08 +00:00
tox.ini Fix constraints file in tox.ini 2024-03-01 19:24:03 -03:00