kernel: upgrade the kernel to the version 6.6.63
We upgrade the kernel to the version 6.6.63 to fix the following CVEs: CVE-2024-50193: https://nvd.nist.gov/vuln/detail/CVE-2024-50193 CVE-2024-50180: https://nvd.nist.gov/vuln/detail/CVE-2024-50180 CVE-2024-50269: https://nvd.nist.gov/vuln/detail/CVE-2024-50269 CVE-2024-53068: https://nvd.nist.gov/vuln/detail/CVE-2024-53068 CVE-2024-53082: https://nvd.nist.gov/vuln/detail/CVE-2024-53082 CVE-2024-50275: https://nvd.nist.gov/vuln/detail/CVE-2024-50275 CVE-2024-50279: https://nvd.nist.gov/vuln/detail/CVE-2024-50279 CVE-2024-50278: https://nvd.nist.gov/vuln/detail/CVE-2024-50278 CVE-2024-50150: https://nvd.nist.gov/vuln/detail/CVE-2024-50150 CVE-2024-50164: https://nvd.nist.gov/vuln/detail/CVE-2024-50164 CVE-2024-50155: https://nvd.nist.gov/vuln/detail/CVE-2024-50155 CVE-2024-50158: https://nvd.nist.gov/vuln/detail/CVE-2024-50158 CVE-2024-50151: https://nvd.nist.gov/vuln/detail/CVE-2024-50151 CVE-2024-50221: https://nvd.nist.gov/vuln/detail/CVE-2024-50221 CVE-2024-50268: https://nvd.nist.gov/vuln/detail/CVE-2024-50268 CVE-2024-50267: https://nvd.nist.gov/vuln/detail/CVE-2024-50267 CVE-2024-50301: https://nvd.nist.gov/vuln/detail/CVE-2024-50301 CVE-2024-50276: https://nvd.nist.gov/vuln/detail/CVE-2024-50276 CVE-2024-50283: https://nvd.nist.gov/vuln/detail/CVE-2024-50283 CVE-2024-50282: https://nvd.nist.gov/vuln/detail/CVE-2024-50282 CVE-2024-50286: https://nvd.nist.gov/vuln/detail/CVE-2024-50286 CVE-2024-50264: https://nvd.nist.gov/vuln/detail/CVE-2024-50264 CVE-2024-53061: https://nvd.nist.gov/vuln/detail/CVE-2024-53061 CVE-2024-53057: https://nvd.nist.gov/vuln/detail/CVE-2024-53057 CVE-2024-50063: https://nvd.nist.gov/vuln/detail/CVE-2024-50063 CVE-2024-50209: https://nvd.nist.gov/vuln/detail/CVE-2024-50209 CVE-2024-50143: https://nvd.nist.gov/vuln/detail/CVE-2024-50143 CVE-2024-41071: https://nvd.nist.gov/vuln/detail/CVE-2024-41071 CVE-2024-50154: https://nvd.nist.gov/vuln/detail/CVE-2024-50154 CVE-2024-50159: https://nvd.nist.gov/vuln/detail/CVE-2024-50159 CVE-2024-50226: https://nvd.nist.gov/vuln/detail/CVE-2024-50226 CVE-2024-50250: https://nvd.nist.gov/vuln/detail/CVE-2024-50250 CVE-2024-50235: https://nvd.nist.gov/vuln/detail/CVE-2024-50235 CVE-2024-50215: https://nvd.nist.gov/vuln/detail/CVE-2024-50215 CVE-2024-50261: https://nvd.nist.gov/vuln/detail/CVE-2024-50261 CVE-2024-50257: https://nvd.nist.gov/vuln/detail/CVE-2024-50257 CVE-2024-50222: https://nvd.nist.gov/vuln/detail/CVE-2024-50222 CVE-2024-50262: https://nvd.nist.gov/vuln/detail/CVE-2024-50262 CVE-2024-50242: https://nvd.nist.gov/vuln/detail/CVE-2024-50242 CVE-2024-50246: https://nvd.nist.gov/vuln/detail/CVE-2024-50246 CVE-2024-50234: https://nvd.nist.gov/vuln/detail/CVE-2024-50234 CVE-2024-50230: https://nvd.nist.gov/vuln/detail/CVE-2024-50230 CVE-2024-50247: https://nvd.nist.gov/vuln/detail/CVE-2024-50247 CVE-2024-50228: https://nvd.nist.gov/vuln/detail/CVE-2024-50228 CVE-2024-47670: https://nvd.nist.gov/vuln/detail/CVE-2024-47670 CVE-2024-49855: https://nvd.nist.gov/vuln/detail/CVE-2024-49855 CVE-2024-49854: https://nvd.nist.gov/vuln/detail/CVE-2024-49854 CVE-2024-47757: https://nvd.nist.gov/vuln/detail/CVE-2024-47757 CVE-2024-49852: https://nvd.nist.gov/vuln/detail/CVE-2024-49852 CVE-2024-49862: https://nvd.nist.gov/vuln/detail/CVE-2024-49862 CVE-2024-49861: https://nvd.nist.gov/vuln/detail/CVE-2024-49861 CVE-2024-49860: https://nvd.nist.gov/vuln/detail/CVE-2024-49860 CVE-2024-49853: https://nvd.nist.gov/vuln/detail/CVE-2024-49853 CVE-2024-47701: https://nvd.nist.gov/vuln/detail/CVE-2024-47701 CVE-2024-47723: https://nvd.nist.gov/vuln/detail/CVE-2024-47723 CVE-2024-47719: https://nvd.nist.gov/vuln/detail/CVE-2024-47719 CVE-2024-47718: https://nvd.nist.gov/vuln/detail/CVE-2024-47718 CVE-2024-47727: https://nvd.nist.gov/vuln/detail/CVE-2024-47727 CVE-2024-47751: https://nvd.nist.gov/vuln/detail/CVE-2024-47751 CVE-2024-47750: https://nvd.nist.gov/vuln/detail/CVE-2024-47750 CVE-2024-47748: https://nvd.nist.gov/vuln/detail/CVE-2024-47748 CVE-2024-47747: https://nvd.nist.gov/vuln/detail/CVE-2024-47747 CVE-2024-47745: https://nvd.nist.gov/vuln/detail/CVE-2024-47745 CVE-2024-47742: https://nvd.nist.gov/vuln/detail/CVE-2024-47742 CVE-2024-47730: https://nvd.nist.gov/vuln/detail/CVE-2024-47730 CVE-2024-47682: https://nvd.nist.gov/vuln/detail/CVE-2024-47682 CVE-2024-47691: https://nvd.nist.gov/vuln/detail/CVE-2024-47691 CVE-2024-47675: https://nvd.nist.gov/vuln/detail/CVE-2024-47675 CVE-2024-47685: https://nvd.nist.gov/vuln/detail/CVE-2024-47685 CVE-2024-47686: https://nvd.nist.gov/vuln/detail/CVE-2024-47686 CVE-2024-50047: https://nvd.nist.gov/vuln/detail/CVE-2024-50047 CVE-2024-50055: https://nvd.nist.gov/vuln/detail/CVE-2024-50055 CVE-2024-50061: https://nvd.nist.gov/vuln/detail/CVE-2024-50061 CVE-2024-50059: https://nvd.nist.gov/vuln/detail/CVE-2024-50059 CVE-2024-50035: https://nvd.nist.gov/vuln/detail/CVE-2024-50035 CVE-2024-50033: https://nvd.nist.gov/vuln/detail/CVE-2024-50033 CVE-2024-49874: https://nvd.nist.gov/vuln/detail/CVE-2024-49874 CVE-2024-47741: https://nvd.nist.gov/vuln/detail/CVE-2024-47741 CVE-2024-47696: https://nvd.nist.gov/vuln/detail/CVE-2024-47696 CVE-2024-47695: https://nvd.nist.gov/vuln/detail/CVE-2024-47695 CVE-2024-47698: https://nvd.nist.gov/vuln/detail/CVE-2024-47698 CVE-2024-47697: https://nvd.nist.gov/vuln/detail/CVE-2024-47697 CVE-2024-49884: https://nvd.nist.gov/vuln/detail/CVE-2024-49884 CVE-2024-49883: https://nvd.nist.gov/vuln/detail/CVE-2024-49883 CVE-2024-49900: https://nvd.nist.gov/vuln/detail/CVE-2024-49900 CVE-2024-49889: https://nvd.nist.gov/vuln/detail/CVE-2024-49889 CVE-2024-49894: https://nvd.nist.gov/vuln/detail/CVE-2024-49894 CVE-2024-49895: https://nvd.nist.gov/vuln/detail/CVE-2024-49895 CVE-2024-49903: https://nvd.nist.gov/vuln/detail/CVE-2024-49903 CVE-2024-49930: https://nvd.nist.gov/vuln/detail/CVE-2024-49930 CVE-2024-49931: https://nvd.nist.gov/vuln/detail/CVE-2024-49931 CVE-2024-49936: https://nvd.nist.gov/vuln/detail/CVE-2024-49936 CVE-2024-49924: https://nvd.nist.gov/vuln/detail/CVE-2024-49924 CVE-2024-49969: https://nvd.nist.gov/vuln/detail/CVE-2024-49969 CVE-2024-49960: https://nvd.nist.gov/vuln/detail/CVE-2024-49960 CVE-2024-49981: https://nvd.nist.gov/vuln/detail/CVE-2024-49981 CVE-2024-49982: https://nvd.nist.gov/vuln/detail/CVE-2024-49982 CVE-2024-49983: https://nvd.nist.gov/vuln/detail/CVE-2024-49983 CVE-2024-49986: https://nvd.nist.gov/vuln/detail/CVE-2024-49986 CVE-2024-49989: https://nvd.nist.gov/vuln/detail/CVE-2024-49989 CVE-2024-49992: https://nvd.nist.gov/vuln/detail/CVE-2024-49992 CVE-2024-49996: https://nvd.nist.gov/vuln/detail/CVE-2024-49996 CVE-2024-49991: https://nvd.nist.gov/vuln/detail/CVE-2024-49991 CVE-2024-49997: https://nvd.nist.gov/vuln/detail/CVE-2024-49997 CVE-2024-50067: https://nvd.nist.gov/vuln/detail/CVE-2024-50067 CVE-2024-49995: https://nvd.nist.gov/vuln/detail/CVE-2024-49995 CVE-2024-50036: https://nvd.nist.gov/vuln/detail/CVE-2024-50036 CVE-2024-50029: https://nvd.nist.gov/vuln/detail/CVE-2024-50029 CVE-2024-50074: https://nvd.nist.gov/vuln/detail/CVE-2024-50074 CVE-2024-50083: https://nvd.nist.gov/vuln/detail/CVE-2024-50083 CVE-2024-50086: https://nvd.nist.gov/vuln/detail/CVE-2024-50086 CVE-2024-50130: https://nvd.nist.gov/vuln/detail/CVE-2024-50130 CVE-2024-50131: https://nvd.nist.gov/vuln/detail/CVE-2024-50131 CVE-2024-50115: https://nvd.nist.gov/vuln/detail/CVE-2024-50115 CVE-2024-50112: https://nvd.nist.gov/vuln/detail/CVE-2024-50112 CVE-2024-50127: https://nvd.nist.gov/vuln/detail/CVE-2024-50127 CVE-2024-50124: https://nvd.nist.gov/vuln/detail/CVE-2024-50124 CVE-2024-50128: https://nvd.nist.gov/vuln/detail/CVE-2024-50128 CVE-2024-50126: https://nvd.nist.gov/vuln/detail/CVE-2024-50126 CVE-2024-50121: https://nvd.nist.gov/vuln/detail/CVE-2024-50121 CVE-2024-50125: https://nvd.nist.gov/vuln/detail/CVE-2024-50125 CVE-2024-50088: https://nvd.nist.gov/vuln/detail/CVE-2024-50088 CVE-2024-50073: https://nvd.nist.gov/vuln/detail/CVE-2024-50073 CVE-2024-50066: https://nvd.nist.gov/vuln/detail/CVE-2024-50066 CVE-2024-50007: https://nvd.nist.gov/vuln/detail/CVE-2024-50007 CVE-2024-50005: https://nvd.nist.gov/vuln/detail/CVE-2024-50005 CVE-2024-49967: https://nvd.nist.gov/vuln/detail/CVE-2024-49967 CVE-2024-49966: https://nvd.nist.gov/vuln/detail/CVE-2024-49966 CVE-2024-49950: https://nvd.nist.gov/vuln/detail/CVE-2024-49950 CVE-2024-49882: https://nvd.nist.gov/vuln/detail/CVE-2024-49882 Verification: - Build kernel and out of tree modules success for rt and std. - Build iso success for rt and std. - Install success onto a All-in-One lab with rt kernel. - Boot up successfully in the lab. - The sanity testing was run and the test results PASS. - The cyclictest benchmark was also run on the starlingx lab, the result is "samples: 86400000 avg: 1659.064 std_dev: 58.752 max: 3928 99.9999th percentile: 2546". - The values are relatively similar kernel v6.6.52 (1659 vs 1674, 58 vs 49 and 2546 vs 2625). Closes-Bug: 2089729 Change-Id: Ie7df6f84888768c566e3124a0e59e114674978bb Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
This commit is contained in:
parent
7f53ef73e9
commit
2f36efec28
@ -24,7 +24,7 @@
|
||||
# building.
|
||||
# Tools needed: tar/sed
|
||||
|
||||
KERNEL_HEAD_COMMIT=a2252fce7715d414dc5877902ff4fe07630aa92c
|
||||
KERNEL_HEAD_COMMIT=db1ff5ceabc3902a2a385e1f1d0a234812bff52c
|
||||
DEBIAN_FILE=linux_6.1.27-1~bpo11%2B1.debian.tar.xz
|
||||
|
||||
tar xvf linux-yocto-${KERNEL_HEAD_COMMIT}.tar.gz
|
||||
|
@ -1,14 +1,14 @@
|
||||
---
|
||||
debver: 6.6.52
|
||||
debver: 6.6.63
|
||||
debname: linux-rt
|
||||
dl_hook: dl_hook
|
||||
dl_files:
|
||||
linux-yocto-a2252fce7715d414dc5877902ff4fe07630aa92c.tar.gz:
|
||||
linux-yocto-db1ff5ceabc3902a2a385e1f1d0a234812bff52c.tar.gz:
|
||||
topdir: null
|
||||
url:
|
||||
"https://git.yoctoproject.org/linux-yocto/snapshot/\
|
||||
linux-yocto-a2252fce7715d414dc5877902ff4fe07630aa92c.tar.gz"
|
||||
sha256sum: 0dc003f200aba9965ec7609c67eaffd88900ad608597007ce55d3a3f9d2d318a
|
||||
linux-yocto-db1ff5ceabc3902a2a385e1f1d0a234812bff52c.tar.gz"
|
||||
sha256sum: a39f92d47cc43ca49b2283c018cef81e82cc5d18797b55187d83534f20ccbbc2
|
||||
linux_6.1.27-1~bpo11%2B1.debian.tar.xz:
|
||||
topdir: null
|
||||
url:
|
||||
|
@ -1,3 +1,9 @@
|
||||
linux-rt (6.6.63-1) unstable; urgency=medium
|
||||
|
||||
* New upstream update:
|
||||
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fpreempt-rt%2Fbase&qt=range&q=db1ff5ceabc3902a2a385e1f1d0a234812bff52c
|
||||
-- Peng Zhang <Peng.Zhang2@windriver.com> Wed, 27 Nov 2024 13:28:52 +0800
|
||||
|
||||
linux-rt (6.6.52-1) unstable; urgency=medium
|
||||
|
||||
* New upstream update:
|
||||
|
@ -5,7 +5,7 @@
|
||||
# be put at the same path where this script is located.
|
||||
# Tools needed: tar
|
||||
|
||||
KERNEL_HEAD_COMMIT=01b1f32be4b0eb108c00b16ec4eef29ce7fa9546
|
||||
KERNEL_HEAD_COMMIT=7161bda718e673d92774adeec664c182a9503b23
|
||||
DEBIAN_FILE=linux_6.1.27-1~bpo11%2B1.debian.tar.xz
|
||||
|
||||
tar xvf linux-yocto-${KERNEL_HEAD_COMMIT}.tar.gz
|
||||
|
@ -1,14 +1,14 @@
|
||||
---
|
||||
debver: 6.6.52
|
||||
debver: 6.6.63
|
||||
debname: linux
|
||||
dl_hook: dl_hook
|
||||
dl_files:
|
||||
linux-yocto-01b1f32be4b0eb108c00b16ec4eef29ce7fa9546.tar.gz:
|
||||
linux-yocto-7161bda718e673d92774adeec664c182a9503b23.tar.gz:
|
||||
topdir: null
|
||||
url:
|
||||
"https://git.yoctoproject.org/linux-yocto/snapshot/\
|
||||
linux-yocto-01b1f32be4b0eb108c00b16ec4eef29ce7fa9546.tar.gz"
|
||||
sha256sum: eab4cf25bcb0e66d2610e6fb55da6916250374aa0f97a94bfec8b19895c189b1
|
||||
linux-yocto-7161bda718e673d92774adeec664c182a9503b23.tar.gz"
|
||||
sha256sum: c84c755695e26f880dc66100842ad9e6866b7a55c2a3786865634b995d41bd98
|
||||
linux_6.1.27-1~bpo11%2B1.debian.tar.xz:
|
||||
topdir: null
|
||||
url:
|
||||
|
@ -1,3 +1,9 @@
|
||||
linux (6.6.63-1) unstable; urgency=medium
|
||||
|
||||
* New upstream update:
|
||||
https://git.yoctoproject.org/linux-yocto/log/?h=v6.6%2Fstandard%2Fbase&qt=range&q=7161bda718e673d92774adeec664c182a9503b23
|
||||
-- Peng Zhang <Peng.Zhang2@windriver.com> Wen, 27 Nov 2024 15:46:21 +0800
|
||||
|
||||
linux (6.6.52-1) unstable; urgency=medium
|
||||
|
||||
* New upstream update:
|
||||
|
Loading…
x
Reference in New Issue
Block a user