Go to file
Peng Zhang b5cfde2411 Update kernel to v5.10.192
This commit updates kernel to v5.10.192 to fix following CVE issues:
CVE-2023-21400: https://nvd.nist.gov/vuln/detail/CVE-2023-21400
CVE-2023-3773: https://nvd.nist.gov/vuln/detail/CVE-2023-3773
CVE-2023-3777: https://nvd.nist.gov/vuln/detail/CVE-2023-3777
CVE-2023-4015: https://nvd.nist.gov/vuln/detail/CVE-2023-4015
CVE-2023-4208: https://nvd.nist.gov/vuln/detail/CVE-2023-4208
CVE-2023-4206: https://nvd.nist.gov/vuln/detail/CVE-2023-4206
CVE-2023-4207: https://nvd.nist.gov/vuln/detail/CVE-2023-4207
CVE-2023-3772: https://nvd.nist.gov/vuln/detail/CVE-2023-3772
CVE-2022-45887: https://nvd.nist.gov/vuln/detail/CVE-2022-45887
CVE-2022-45886: https://nvd.nist.gov/vuln/detail/CVE-2022-45886
CVE-2022-45919: https://nvd.nist.gov/vuln/detail/CVE-2022-45919.
Also this commit fixes following CVE issues which can be fixed
in v5.10.190.
CVE-2022-45919: https://nvd.nist.gov/vuln/detail/CVE-2022-45919
CVE-2023-20588: https://nvd.nist.gov/vuln/detail/CVE-2023-20588
CVE-2023-35829: https://nvd.nist.gov/vuln/detail/CVE-2023-35829
CVE-2023-35828: https://nvd.nist.gov/vuln/detail/CVE-2023-35828
CVE-2023-35824: https://nvd.nist.gov/vuln/detail/CVE-2023-35824
CVE-2023-35823: https://nvd.nist.gov/vuln/detail/CVE-2023-35823
CVE-2023-2163: https://nvd.nist.gov/vuln/detail/CVE-2023-2163
CVE-2023-34256: https://nvd.nist.gov/vuln/detail/CVE-2023-34256
CVE-2022-39189: https://nvd.nist.gov/vuln/detail/CVE-2022-39189
CVE-2022-4269: https://nvd.nist.gov/vuln/detail/CVE-2022-4269
CVE-2023-1380: https://nvd.nist.gov/vuln/detail/CVE-2023-1380
CVE-2023-2002: https://nvd.nist.gov/vuln/detail/CVE-2023-2002
CVE-2023-21255: https://nvd.nist.gov/vuln/detail/CVE-2023-21255
CVE-2023-2269: https://nvd.nist.gov/vuln/detail/CVE-2023-2269
CVE-2023-31084: https://nvd.nist.gov/vuln/detail/CVE-2023-31084
CVE-2023-3268: https://nvd.nist.gov/vuln/detail/CVE-2023-3268
CVE-2023-3389: https://nvd.nist.gov/vuln/detail/CVE-2023-3389
CVE-2023-34319: https://nvd.nist.gov/vuln/detail/CVE-2023-34319
CVE-2023-4194: https://nvd.nist.gov/vuln/detail/CVE-2023-4194
CVE-2023-4147: https://nvd.nist.gov/vuln/detail/CVE-2023-4147
CVE-2023-4273: https://nvd.nist.gov/vuln/detail/CVE-2023-4273
CVE-2022-40982: https://nvd.nist.gov/vuln/detail/CVE-2022-40982
CVE-2023-4128: https://nvd.nist.gov/vuln/detail/CVE-2023-4128
CVE-2023-40283: https://nvd.nist.gov/vuln/detail/CVE-2023-40283
CVE-2023-1206: https://nvd.nist.gov/vuln/detail/CVE-2023-1206
CVE-2023-0160: https://nvd.nist.gov/vuln/detail/CVE-2023-0160

None of our source patches requires refresh against the new kernel
source.

Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a AIO-DX lab with rt kernel.
- Boot up successfully in the lab.
- The sanity testing was done by our test team and no regression
  defect was found.
- The cyclictest benchmark was also run on the starlingx lab, the
  result is "samples: 259200000 avg: 1631 max: 9232 99.9999th
  percentile: 8542 overflows: 0", It is not big difference with
  5.10.189 for avg.

Closes-Bug: 2036491
Closes-Bug: 2036311

Change-Id: I1a4d8c640c0a0bd9fc656b0d5bc46ee4e6937d86
Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
2023-10-10 10:50:22 +08:00
2023-08-31 01:36:50 +00:00
2023-10-10 10:50:22 +08:00
2023-10-10 10:50:22 +08:00
2023-04-28 12:38:51 -04:00
2022-12-26 22:28:20 +00:00
Description
StarlingX Linux kernel
12 MiB
Languages
Python 49.3%
Shell 25%
Makefile 23.7%
Perl 1.1%
POV-Ray SDL 0.9%