Files
kernel/kernel-rt/debian/deb_patches/series
Peng Zhang 706581da39 Update kernel to v5.10.205
This commit updates kernel to v5.10.205 to fix following CVE issues:
1.CVE-2023-51782: https://nvd.nist.gov/vuln/detail/CVE-2023-51782
2.CVE-2023-51781:https://nvd.nist.gov/vuln/detail/CVE-2023-51781
3.CVE-2023-51780: https://nvd.nist.gov/vuln/detail/CVE-2023-51780
4.CVE-2023-6531: https://nvd.nist.gov/vuln/detail/CVE-2023-6531
5.CVE-2023-6121: https://nvd.nist.gov/vuln/detail/CVE-2023-6121
6.CVE-2023-6546: https://nvd.nist.gov/vuln/detail/CVE-2023-6546
7.CVE-2023-6931: https://nvd.nist.gov/vuln/detail/CVE-2023-6931
8.CVE-2023-6932: https://nvd.nist.gov/vuln/detail/CVE-2023-6932
9.CVE-2023-6817: https://nvd.nist.gov/vuln/detail/CVE-2023-6817
10.CVE-2023-46862: https://nvd.nist.gov/vuln/detail/CVE-2023-46862
11.CVE-2023-39197: https://nvd.nist.gov/vuln/detail/CVE-2023-39197
12.CVE-2023-6176: https://nvd.nist.gov/vuln/detail/CVE-2023-6176
13.CVE-2023-4881: https://nvd.nist.gov/vuln/detail/CVE-2023-4881
14.CVE-2023-34324:  https://nvd.nist.gov/vuln/detail/CVE-2023-34324
15.CVE-2023-5717: https://nvd.nist.gov/vuln/detail/CVE-2023-5717
16.CVE-2023-5178: https://nvd.nist.gov/vuln/detail/CVE-2023-5178
17.CVE-2023-46813: https://nvd.nist.gov/vuln/detail/CVE-2023-46813
18.CVE-2023-35827: https://nvd.nist.gov/vuln/detail/CVE-2023-35827

A local StarlingX kernel patch had already been integrated into the
linux-yocto repository's v5.10/standard/preempt-rt/base branch after
v5.10.198 as commit 2dccf008aa65 ("net: replace
raw_write_seqcount_t_begin by do_raw_write_seqcount_begin").
Hence, we drop the following now-redundant local patch:
  0083-net-replace-raw_write_seqcount_t_begin-by-do_raw_wri.patch.

Verification:
- Build kernel and out of tree modules success for rt and std.
- Build iso success for rt and std.
- Install success onto a AIO-DX lab with rt kernel.
- Boot up successfully in the lab.
- The sanity testing was done by our test team and no regression
  defect was found.
- The cyclictest benchmark was also run on the starlingx lab, the
  result is "samples: 259200000 avg: 1602 max: 4460 99.9999th
  percentile: 2737 overflows: 0".
  Given that the maximum and 99.9999 percentile latency values are
  well below 5 microseconds, the results are acceptable, and they are
  not significantly different than the ones acquired with kernel
  v5.10.198.

Closes-Bug: 2043947

Change-Id: I558e40c4398428d73444bd4f50928c5248da0899
Signed-off-by: Peng Zhang <Peng.Zhang2@windriver.com>
2024-01-19 10:59:54 +08:00

35 lines
1.6 KiB
Plaintext

0001-kernel-rt-Remove-the-old-changelog-file.patch
0002-kernel-rt-Add-a-new-changelog-file.patch
0003-kernel-rt-Add-a-kernel-config-file-for-stx-debian.patch
0004-kernel-rt-Adapt-the-debian-folder-for-new-source.patch
0005-kernel-modules-sign-kernel-modules.patch
0006-Debian-align-config-file-with-stx-centos.patch
0007-Debian-update-5.10-Kernel-to-5.10.99.patch
0008-config-set-configs-needed-for-secure-boot.patch
0009-Drop-Android-patches.patch
0010-Debian-Disable-CONFIG_BNXT.patch
0011-Debian-Hardcode-net.naming-scheme-in-CONFIG_CMDLINE.patch
0012-kernel-rt-add-rt-to-abiname.patch
0013-Debian-update-5.10-Kernel-to-5.10.112.patch
0014-kernel-rt-fix-proc-version-content.patch
0015-kernel-rt-clean-patches-from-debian-release.patch
0016-Debian-Added-apparmor-security-module.patch
0017-debian-rules.real-Parallelize-xz-compression.patch
0018-Debian-Enable-WireGuard-config.patch
0019-Place-module-signing-keys-in-a-separate-packa.patch
0020-Upgrade-5.10-kernel-to-5.10.152.patch
0021-kernel-rt-unset-LOCK_DOWN_IN_EFI_SECURE_BOOT.patch
0022-config-don-t-unset-CONFIG_EFIVAR_FS.patch
0023-Upgrade-5.10-kernel-to-5.10.162.patch
0024-Fix-badly-formatted-trailer-line.patch
0025-Upgrade-5.10-kernel-to-5.10.177.patch
0026-Disable-unprivileged-eBPF-by-default.patch
0027-Upgrade-5.10-kernel-to-5.10.180.patch
0028-config-Enable-Intel-RAPL-and-uncore-frequency-contro.patch
0029-Upgrade-5.10-kernel-to-5.10.185.patch
0030-Upgrade-5.10-kernel-to-5.10.189.patch
0031-kernel-rt-Add-pkgs-without-abiname-for-image-headers.patch
0032-Upgrade-5.10-kernel-to-5.10.192.patch
0033-Upgrade-5.10-kernel-to-5.10.198.patch
0034-Upgrade-5.10-kernel-to-5.10.205.patch