kernel: upgrade the kernel to the version 6.6.63

We upgrade the kernel to the version 6.6.63 to fix the following CVEs:

CVE-2024-50193: https://nvd.nist.gov/vuln/detail/CVE-2024-50193
CVE-2024-50180: https://nvd.nist.gov/vuln/detail/CVE-2024-50180
CVE-2024-50269: https://nvd.nist.gov/vuln/detail/CVE-2024-50269
CVE-2024-53068: https://nvd.nist.gov/vuln/detail/CVE-2024-53068
CVE-2024-53082: https://nvd.nist.gov/vuln/detail/CVE-2024-53082
CVE-2024-50275: https://nvd.nist.gov/vuln/detail/CVE-2024-50275
CVE-2024-50279: https://nvd.nist.gov/vuln/detail/CVE-2024-50279
CVE-2024-50278: https://nvd.nist.gov/vuln/detail/CVE-2024-50278
CVE-2024-50150: https://nvd.nist.gov/vuln/detail/CVE-2024-50150
CVE-2024-50164: https://nvd.nist.gov/vuln/detail/CVE-2024-50164
CVE-2024-50155: https://nvd.nist.gov/vuln/detail/CVE-2024-50155
CVE-2024-50158: https://nvd.nist.gov/vuln/detail/CVE-2024-50158
CVE-2024-50151: https://nvd.nist.gov/vuln/detail/CVE-2024-50151
CVE-2024-50221: https://nvd.nist.gov/vuln/detail/CVE-2024-50221
CVE-2024-50268: https://nvd.nist.gov/vuln/detail/CVE-2024-50268
CVE-2024-50267: https://nvd.nist.gov/vuln/detail/CVE-2024-50267
CVE-2024-50301: https://nvd.nist.gov/vuln/detail/CVE-2024-50301
CVE-2024-50276: https://nvd.nist.gov/vuln/detail/CVE-2024-50276
CVE-2024-50283: https://nvd.nist.gov/vuln/detail/CVE-2024-50283
CVE-2024-50282: https://nvd.nist.gov/vuln/detail/CVE-2024-50282
CVE-2024-50286: https://nvd.nist.gov/vuln/detail/CVE-2024-50286
CVE-2024-50264: https://nvd.nist.gov/vuln/detail/CVE-2024-50264
CVE-2024-53061: https://nvd.nist.gov/vuln/detail/CVE-2024-53061
CVE-2024-53057: https://nvd.nist.gov/vuln/detail/CVE-2024-53057
CVE-2024-50063: https://nvd.nist.gov/vuln/detail/CVE-2024-50063
CVE-2024-50209: https://nvd.nist.gov/vuln/detail/CVE-2024-50209
CVE-2024-50143: https://nvd.nist.gov/vuln/detail/CVE-2024-50143
CVE-2024-41071: https://nvd.nist.gov/vuln/detail/CVE-2024-41071
CVE-2024-50154: https://nvd.nist.gov/vuln/detail/CVE-2024-50154
CVE-2024-50159: https://nvd.nist.gov/vuln/detail/CVE-2024-50159
CVE-2024-50226: https://nvd.nist.gov/vuln/detail/CVE-2024-50226
CVE-2024-50250: https://nvd.nist.gov/vuln/detail/CVE-2024-50250
CVE-2024-50235: https://nvd.nist.gov/vuln/detail/CVE-2024-50235
CVE-2024-50215: https://nvd.nist.gov/vuln/detail/CVE-2024-50215
CVE-2024-50261: https://nvd.nist.gov/vuln/detail/CVE-2024-50261
CVE-2024-50257: https://nvd.nist.gov/vuln/detail/CVE-2024-50257
CVE-2024-50222: https://nvd.nist.gov/vuln/detail/CVE-2024-50222
CVE-2024-50262: https://nvd.nist.gov/vuln/detail/CVE-2024-50262
CVE-2024-50242: https://nvd.nist.gov/vuln/detail/CVE-2024-50242
CVE-2024-50246: https://nvd.nist.gov/vuln/detail/CVE-2024-50246
CVE-2024-50234: https://nvd.nist.gov/vuln/detail/CVE-2024-50234
CVE-2024-50230: https://nvd.nist.gov/vuln/detail/CVE-2024-50230
CVE-2024-50247: https://nvd.nist.gov/vuln/detail/CVE-2024-50247
CVE-2024-50228: https://nvd.nist.gov/vuln/detail/CVE-2024-50228
CVE-2024-47670: https://nvd.nist.gov/vuln/detail/CVE-2024-47670
CVE-2024-49855: https://nvd.nist.gov/vuln/detail/CVE-2024-49855
CVE-2024-49854: https://nvd.nist.gov/vuln/detail/CVE-2024-49854
CVE-2024-47757: https://nvd.nist.gov/vuln/detail/CVE-2024-47757
CVE-2024-49852: https://nvd.nist.gov/vuln/detail/CVE-2024-49852
CVE-2024-49862: https://nvd.nist.gov/vuln/detail/CVE-2024-49862
CVE-2024-49861: https://nvd.nist.gov/vuln/detail/CVE-2024-49861
CVE-2024-49860: https://nvd.nist.gov/vuln/detail/CVE-2024-49860
CVE-2024-49853: https://nvd.nist.gov/vuln/detail/CVE-2024-49853
CVE-2024-47701: https://nvd.nist.gov/vuln/detail/CVE-2024-47701
CVE-2024-47723: https://nvd.nist.gov/vuln/detail/CVE-2024-47723
CVE-2024-47719: https://nvd.nist.gov/vuln/detail/CVE-2024-47719
CVE-2024-47718: https://nvd.nist.gov/vuln/detail/CVE-2024-47718
CVE-2024-47727: https://nvd.nist.gov/vuln/detail/CVE-2024-47727
CVE-2024-47751: https://nvd.nist.gov/vuln/detail/CVE-2024-47751
CVE-2024-47750: https://nvd.nist.gov/vuln/detail/CVE-2024-47750
CVE-2024-47748: https://nvd.nist.gov/vuln/detail/CVE-2024-47748
CVE-2024-47747: https://nvd.nist.gov/vuln/detail/CVE-2024-47747
CVE-2024-47745: https://nvd.nist.gov/vuln/detail/CVE-2024-47745
CVE-2024-47742: https://nvd.nist.gov/vuln/detail/CVE-2024-47742
CVE-2024-47730: https://nvd.nist.gov/vuln/detail/CVE-2024-47730
CVE-2024-47682: https://nvd.nist.gov/vuln/detail/CVE-2024-47682
CVE-2024-47691: https://nvd.nist.gov/vuln/detail/CVE-2024-47691
CVE-2024-47675: https://nvd.nist.gov/vuln/detail/CVE-2024-47675
CVE-2024-47685: https://nvd.nist.gov/vuln/detail/CVE-2024-47685
CVE-2024-47686: https://nvd.nist.gov/vuln/detail/CVE-2024-47686
CVE-2024-50047: https://nvd.nist.gov/vuln/detail/CVE-2024-50047
CVE-2024-50055: https://nvd.nist.gov/vuln/detail/CVE-2024-50055
CVE-2024-50061: https://nvd.nist.gov/vuln/detail/CVE-2024-50061
CVE-2024-50059: https://nvd.nist.gov/vuln/detail/CVE-2024-50059
CVE-2024-50035: https://nvd.nist.gov/vuln/detail/CVE-2024-50035
CVE-2024-50033: https://nvd.nist.gov/vuln/detail/CVE-2024-50033
CVE-2024-49874: https://nvd.nist.gov/vuln/detail/CVE-2024-49874
CVE-2024-47741: https://nvd.nist.gov/vuln/detail/CVE-2024-47741
CVE-2024-47696: https://nvd.nist.gov/vuln/detail/CVE-2024-47696
CVE-2024-47695: https://nvd.nist.gov/vuln/detail/CVE-2024-47695
CVE-2024-47698: https://nvd.nist.gov/vuln/detail/CVE-2024-47698
CVE-2024-47697: https://nvd.nist.gov/vuln/detail/CVE-2024-47697
CVE-2024-49884: https://nvd.nist.gov/vuln/detail/CVE-2024-49884
CVE-2024-49883: https://nvd.nist.gov/vuln/detail/CVE-2024-49883
CVE-2024-49900: https://nvd.nist.gov/vuln/detail/CVE-2024-49900
CVE-2024-49889: https://nvd.nist.gov/vuln/detail/CVE-2024-49889
CVE-2024-49894: https://nvd.nist.gov/vuln/detail/CVE-2024-49894
CVE-2024-49895: https://nvd.nist.gov/vuln/detail/CVE-2024-49895
CVE-2024-49903: https://nvd.nist.gov/vuln/detail/CVE-2024-49903
CVE-2024-49930: https://nvd.nist.gov/vuln/detail/CVE-2024-49930
CVE-2024-49931: https://nvd.nist.gov/vuln/detail/CVE-2024-49931
CVE-2024-49936: https://nvd.nist.gov/vuln/detail/CVE-2024-49936
CVE-2024-49924: https://nvd.nist.gov/vuln/detail/CVE-2024-49924
CVE-2024-49969: https://nvd.nist.gov/vuln/detail/CVE-2024-49969
CVE-2024-49960: https://nvd.nist.gov/vuln/detail/CVE-2024-49960
CVE-2024-49981: https://nvd.nist.gov/vuln/detail/CVE-2024-49981
CVE-2024-49982: https://nvd.nist.gov/vuln/detail/CVE-2024-49982
CVE-2024-49983: https://nvd.nist.gov/vuln/detail/CVE-2024-49983
CVE-2024-49986: https://nvd.nist.gov/vuln/detail/CVE-2024-49986
CVE-2024-49989: https://nvd.nist.gov/vuln/detail/CVE-2024-49989
CVE-2024-49992: https://nvd.nist.gov/vuln/detail/CVE-2024-49992
CVE-2024-49996: https://nvd.nist.gov/vuln/detail/CVE-2024-49996
CVE-2024-49991: https://nvd.nist.gov/vuln/detail/CVE-2024-49991
CVE-2024-49997: https://nvd.nist.gov/vuln/detail/CVE-2024-49997
CVE-2024-50067: https://nvd.nist.gov/vuln/detail/CVE-2024-50067
CVE-2024-49995: https://nvd.nist.gov/vuln/detail/CVE-2024-49995
CVE-2024-50036: https://nvd.nist.gov/vuln/detail/CVE-2024-50036
CVE-2024-50029: https://nvd.nist.gov/vuln/detail/CVE-2024-50029
CVE-2024-50074: https://nvd.nist.gov/vuln/detail/CVE-2024-50074
CVE-2024-50083: https://nvd.nist.gov/vuln/detail/CVE-2024-50083
CVE-2024-50086: https://nvd.nist.gov/vuln/detail/CVE-2024-50086
CVE-2024-50130: https://nvd.nist.gov/vuln/detail/CVE-2024-50130
CVE-2024-50131: https://nvd.nist.gov/vuln/detail/CVE-2024-50131
CVE-2024-50115: https://nvd.nist.gov/vuln/detail/CVE-2024-50115
CVE-2024-50112: https://nvd.nist.gov/vuln/detail/CVE-2024-50112
CVE-2024-50127: https://nvd.nist.gov/vuln/detail/CVE-2024-50127
CVE-2024-50124: https://nvd.nist.gov/vuln/detail/CVE-2024-50124
CVE-2024-50128: https://nvd.nist.gov/vuln/detail/CVE-2024-50128
CVE-2024-50126: https://nvd.nist.gov/vuln/detail/CVE-2024-50126
CVE-2024-50121: https://nvd.nist.gov/vuln/detail/CVE-2024-50121
CVE-2024-50125: https://nvd.nist.gov/vuln/detail/CVE-2024-50125
CVE-2024-50088: https://nvd.nist.gov/vuln/detail/CVE-2024-50088
CVE-2024-50073: https://nvd.nist.gov/vuln/detail/CVE-2024-50073
CVE-2024-50066: https://nvd.nist.gov/vuln/detail/CVE-2024-50066
CVE-2024-50007: https://nvd.nist.gov/vuln/detail/CVE-2024-50007
CVE-2024-50005: https://nvd.nist.gov/vuln/detail/CVE-2024-50005
CVE-2024-49967: https://nvd.nist.gov/vuln/detail/CVE-2024-49967
CVE-2024-49966: https://nvd.nist.gov/vuln/detail/CVE-2024-49966
CVE-2024-49950: https://nvd.nist.gov/vuln/detail/CVE-2024-49950
CVE-2024-49882: https://nvd.nist.gov/vuln/detail/CVE-2024-49882

Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a All-in-One lab with rt kernel.
- Boot up successfully in the lab.
- The sanity testing was run and the test results PASS.
- The cyclictest benchmark was also run on the starlingx lab, the result
  is "samples: 86400000 avg: 1659.064 std_dev: 58.752 max: 3928
  99.9999th percentile: 2546".
- The values are relatively similar kernel v6.6.52 (1659 vs 1674,
  58 vs 49 and 2546 vs 2625).

Closes-Bug: 2089729

Change-Id: Ie7df6f84888768c566e3124a0e59e114674978bb
Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
This commit is contained in:
Peng Zhang 2024-12-01 11:36:39 +00:00
parent 7f53ef73e9
commit 2f36efec28
6 changed files with 22 additions and 10 deletions

View File

@ -24,7 +24,7 @@
# building.
# Tools needed: tar/sed
KERNEL_HEAD_COMMIT=a2252fce7715d414dc5877902ff4fe07630aa92c
KERNEL_HEAD_COMMIT=db1ff5ceabc3902a2a385e1f1d0a234812bff52c
DEBIAN_FILE=linux_6.1.27-1~bpo11%2B1.debian.tar.xz
tar xvf linux-yocto-${KERNEL_HEAD_COMMIT}.tar.gz

View File

@ -1,14 +1,14 @@
---
debver: 6.6.52
debver: 6.6.63
debname: linux-rt
dl_hook: dl_hook
dl_files:
linux-yocto-a2252fce7715d414dc5877902ff4fe07630aa92c.tar.gz:
linux-yocto-db1ff5ceabc3902a2a385e1f1d0a234812bff52c.tar.gz:
topdir: null
url:
"https://git.yoctoproject.org/linux-yocto/snapshot/\
linux-yocto-a2252fce7715d414dc5877902ff4fe07630aa92c.tar.gz"
sha256sum: 0dc003f200aba9965ec7609c67eaffd88900ad608597007ce55d3a3f9d2d318a
linux-yocto-db1ff5ceabc3902a2a385e1f1d0a234812bff52c.tar.gz"
sha256sum: a39f92d47cc43ca49b2283c018cef81e82cc5d18797b55187d83534f20ccbbc2
linux_6.1.27-1~bpo11%2B1.debian.tar.xz:
topdir: null
url:

View File

@ -1,3 +1,9 @@
linux-rt (6.6.63-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fpreempt-rt%2Fbase&qt=range&q=db1ff5ceabc3902a2a385e1f1d0a234812bff52c
-- Peng Zhang <Peng.Zhang2@windriver.com> Wed, 27 Nov 2024 13:28:52 +0800
linux-rt (6.6.52-1) unstable; urgency=medium
* New upstream update:

View File

@ -5,7 +5,7 @@
# be put at the same path where this script is located.
# Tools needed: tar
KERNEL_HEAD_COMMIT=01b1f32be4b0eb108c00b16ec4eef29ce7fa9546
KERNEL_HEAD_COMMIT=7161bda718e673d92774adeec664c182a9503b23
DEBIAN_FILE=linux_6.1.27-1~bpo11%2B1.debian.tar.xz
tar xvf linux-yocto-${KERNEL_HEAD_COMMIT}.tar.gz

View File

@ -1,14 +1,14 @@
---
debver: 6.6.52
debver: 6.6.63
debname: linux
dl_hook: dl_hook
dl_files:
linux-yocto-01b1f32be4b0eb108c00b16ec4eef29ce7fa9546.tar.gz:
linux-yocto-7161bda718e673d92774adeec664c182a9503b23.tar.gz:
topdir: null
url:
"https://git.yoctoproject.org/linux-yocto/snapshot/\
linux-yocto-01b1f32be4b0eb108c00b16ec4eef29ce7fa9546.tar.gz"
sha256sum: eab4cf25bcb0e66d2610e6fb55da6916250374aa0f97a94bfec8b19895c189b1
linux-yocto-7161bda718e673d92774adeec664c182a9503b23.tar.gz"
sha256sum: c84c755695e26f880dc66100842ad9e6866b7a55c2a3786865634b995d41bd98
linux_6.1.27-1~bpo11%2B1.debian.tar.xz:
topdir: null
url:

View File

@ -1,3 +1,9 @@
linux (6.6.63-1) unstable; urgency=medium
* New upstream update:
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fbase&qt=range&q=7161bda718e673d92774adeec664c182a9503b23
-- Peng Zhang <Peng.Zhang2@windriver.com> Wen, 27 Nov 2024 15:46:21 +0800
linux (6.6.52-1) unstable; urgency=medium
* New upstream update: