Peng zhang 29061b437b kernel: upgrade the kernel to the version 6.6.71
We upgrade the kernel to the version 6.6.71 to fix the following CVEs:
https://nvd.nist.gov/vuln/detail/CVE-2024-56627
https://nvd.nist.gov/vuln/detail/CVE-2024-56626
https://nvd.nist.gov/vuln/detail/CVE-2024-56615
https://nvd.nist.gov/vuln/detail/CVE-2024-56598
https://nvd.nist.gov/vuln/detail/CVE-2024-56596
https://nvd.nist.gov/vuln/detail/CVE-2024-56595
https://nvd.nist.gov/vuln/detail/CVE-2024-56551
https://nvd.nist.gov/vuln/detail/CVE-2024-53208
https://nvd.nist.gov/vuln/detail/CVE-2024-53166
https://nvd.nist.gov/vuln/detail/CVE-2024-53206
https://nvd.nist.gov/vuln/detail/CVE-2024-53186
https://nvd.nist.gov/vuln/detail/CVE-2024-53179
https://nvd.nist.gov/vuln/detail/CVE-2024-53173
https://nvd.nist.gov/vuln/detail/CVE-2024-53171
https://nvd.nist.gov/vuln/detail/CVE-2024-53165
https://nvd.nist.gov/vuln/detail/CVE-2024-56582
https://nvd.nist.gov/vuln/detail/CVE-2024-56538
https://nvd.nist.gov/vuln/detail/CVE-2024-53237
https://nvd.nist.gov/vuln/detail/CVE-2024-56581
https://nvd.nist.gov/vuln/detail/CVE-2024-56605
https://nvd.nist.gov/vuln/detail/CVE-2024-56604
https://nvd.nist.gov/vuln/detail/CVE-2024-56603
https://nvd.nist.gov/vuln/detail/CVE-2024-56602
https://nvd.nist.gov/vuln/detail/CVE-2024-56601
https://nvd.nist.gov/vuln/detail/CVE-2024-56600
https://nvd.nist.gov/vuln/detail/CVE-2024-56704
https://nvd.nist.gov/vuln/detail/CVE-2024-56640
https://nvd.nist.gov/vuln/detail/CVE-2024-53227
https://nvd.nist.gov/vuln/detail/CVE-2024-53213
https://nvd.nist.gov/vuln/detail/CVE-2024-56759
https://nvd.nist.gov/vuln/detail/CVE-2024-53156
https://nvd.nist.gov/vuln/detail/CVE-2024-53155
https://nvd.nist.gov/vuln/detail/CVE-2024-53150
https://nvd.nist.gov/vuln/detail/CVE-2024-53103
https://nvd.nist.gov/vuln/detail/CVE-2024-56606
https://nvd.nist.gov/vuln/detail/CVE-2024-56614
https://nvd.nist.gov/vuln/detail/CVE-2024-56631
https://nvd.nist.gov/vuln/detail/CVE-2024-56642
https://nvd.nist.gov/vuln/detail/CVE-2024-56708
https://nvd.nist.gov/vuln/detail/CVE-2024-56766
https://nvd.nist.gov/vuln/detail/CVE-2024-56765
https://nvd.nist.gov/vuln/detail/CVE-2024-56675
https://nvd.nist.gov/vuln/detail/CVE-2024-56672
https://nvd.nist.gov/vuln/detail/CVE-2024-56664
https://nvd.nist.gov/vuln/detail/CVE-2024-56663
https://nvd.nist.gov/vuln/detail/CVE-2024-56662
https://nvd.nist.gov/vuln/detail/CVE-2024-56658
https://nvd.nist.gov/vuln/detail/CVE-2024-56653
https://nvd.nist.gov/vuln/detail/CVE-2024-56651
https://nvd.nist.gov/vuln/detail/CVE-2024-56650
https://nvd.nist.gov/vuln/detail/CVE-2024-8805
https://nvd.nist.gov/vuln/detail/CVE-2024-53144
https://nvd.nist.gov/vuln/detail/CVE-2024-53108
https://nvd.nist.gov/vuln/detail/CVE-2024-53142
https://nvd.nist.gov/vuln/detail/CVE-2024-53141
https://nvd.nist.gov/vuln/detail/CVE-2024-53139
https://nvd.nist.gov/vuln/detail/CVE-2024-53126

Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a All-in-One lab with rt kernel.
- Boot up successfully in the lab.
- The cyclictest benchmark was also run on the starlingx lab, the result
  is "samples:  86400000  avg: 1691.716   std_dev: 58.475 max: 3932
  99.9999th percentile: 2591", It is not big difference with 6.6.63
  which is "samples:  86400000  avg: 1659.064 std_dev: 58.752 max: 3928
  99.9999th percentile: 2546".

Closes-Bug: 2092795

Change-Id: I616796274d39f8cadc4417185ff90167cd0e2f25
Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
2025-02-05 20:10:16 +08:00
..
2024-09-26 10:16:53 -04:00