Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade kernel from 3.16.57-2 to 3.16.59-1 #2491

Closed
wants to merge 1 commit into from

Conversation

zhenggen-xu
Copy link
Collaborator

Upgrade kernel from 3.16.57-2 to 3.16.59-1
Changelog:
https://tracker.debian.org/media/packages/l/linux/changelog-3.16.59-1

Signed-off-by: Zhenggen Xu zxu@linkedin.com

===

linux (3.16.59-1) jessie-security; urgency=high

  • New upstream stable update:
    https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.58
    • net: Set sk_prot_creator when cloning sockets to the right proto
    • Bluetooth: hidp: buffer overflow in hidp_process_report (CVE-2018-9363)
    • scsi: libsas: defer ata device eh commands to libata (CVE-2018-10021)
    • xfs: set format back to extents if xfs_bmap_extents_to_btree
      (CVE-2018-10323)
    • ext4: only look at the bg_flags field if it is valid (CVE-2018-10876)
    • ext4: fix check to prevent initializing reserved inodes
    • ext4: verify the depth of extent tree in ext4_find_extent()
      (CVE-2018-10877)
    • ext4: always check block group bounds in ext4_init_block_bitmap()
      (CVE-2018-10878)
    • ext4: don't allow r/w mounts if metadata blocks overlap the superblock
    • ext4: make sure bitmaps and the inode table don't overlap with bg
      descriptors (CVE-2018-10878)
    • ext4: fix false negatives and false positives in
      ext4_check_descriptors()
    • ext4: add corruption check in ext4_xattr_set_entry() (CVE-2018-10879)
    • ext4: always verify the magic number in xattr blocks (CVE-2018-10879)
    • ext4: never move the system.data xattr out of the inode body
      (CVE-2018-10880)
    • ext4: clear i_data in ext4_inode_info when removing inline data
      (CVE-2018-10881)
    • ext4: add more inode number paranoia checks (CVE-2018-10882)
    • jbd2: don't mark block as modified if the handle is out of credits
      (CVE-2018-10883)
    • ext4: avoid running out of journal credits when appending to an inline
      file (CVE-2018-10883)
    • Fix up non-directory creation in SGID directories (CVE-2018-13405)
    • [amd64] entry: Remove %ebx handling from error_entry/exit
      (CVE-2018-14678)
    • infiniband: fix a possible use-after-free bug (CVE-2018-14734)
    • USB: yurex: fix out-of-bounds uaccess in read handler (CVE-2018-16276)
    • ALSA: rawmidi: Change resized buffers atomically (CVE-2018-10902)
    • [x86] speculation: Clean up various Spectre related details
    • [x86] speculation: Protect against userspace-userspace spectreRSB
      (CVE-2018-15572)
    • [x86] paravirt: Fix spectre-v2 mitigations for paravirt guests
      (CVE-2018-15594)
    • cdrom: Fix info leak/OOB read in cdrom_ioctl_drive_status
      (CVE-2018-16658)
    • uas: replace WARN_ON_ONCE() with lockdep_assert_held()
    • video: uvesafb: Fix integer overflow in allocation (CVE-2018-13406)
    • btrfs: relocation: Only remove reloc rb_trees if reloc control has been
      initialized (CVE-2018-14609)
    • hfsplus: fix NULL dereference in hfsplus_lookup() (CVE-2018-14617)
    • xfs: catch inode allocation state mismatch corruption
    • xfs: validate cached inodes are free when allocated (CVE-2018-13093)
    • xfs: don't call xfs_da_shrink_inode with NULL bp (CVE-2018-13094)
    • seccomp: create internal mode-setting function
    • seccomp: extract check/assign mode helpers
    • seccomp: split mode setting routines
    • seccomp: add "seccomp" syscall
    • [x86] process: Optimize TIF checks in __switch_to_xtra()
    • [x86] process: Correct and optimize TIF_BLOCKSTEP switch
    • [x86] cpu/AMD: Fix erratum 1076 (CPB bit)
    • [x86] cpu/intel: Add Knights Mill to Intel family
    • [x86] KVM: introduce num_emulated_msrs
    • mm: get rid of vmacache_flush_all() entirely (CVE-2018-17182)
      https://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.16.59
    • [x86] Add support for disabling Speculative Store Bypass (CVE-2018-3639)
      • x86/nospec: Simplify alternative_msr_write()
      • x86/bugs: Concentrate bug detection into a separate function
      • x86/bugs: Concentrate bug reporting into a separate function
      • x86/bugs: Read SPEC_CTRL MSR during boot and re-use reserved bits
      • x86/bugs, KVM: Support the combination of guest and host IBRS
      • x86/bugs: Expose /sys/../spec_store_bypass
      • x86/cpufeatures: Add X86_FEATURE_RDS
      • x86/bugs: Provide boot parameters for the spec_store_bypass_disable
        mitigation
      • x86/bugs/intel: Set proper CPU features and setup RDS
      • x86/bugs: Whitelist allowed SPEC_CTRL MSR values
      • x86/bugs/AMD: Add support to disable RDS on Fam[15,16,17]h if requested
      • x86/KVM/VMX: Expose SPEC_CTRL Bit(2) to the guest
      • x86/speculation: Create spec-ctrl.h to avoid include hell
      • prctl: Add speculation control prctls
      • x86/process: Allow runtime control of Speculative Store Bypass
      • x86/speculation: Add prctl for Speculative Store Bypass mitigation
      • nospec: Allow getting/setting on non-current task
      • proc: Provide details on speculation flaw mitigations
      • seccomp: Enable speculation flaw mitigations
      • prctl: Add force disable speculation
      • seccomp: Use PR_SPEC_FORCE_DISABLE
      • seccomp: Add filter flag to opt-out of SSB mitigation
      • seccomp: Move speculation migitation control to arch code
      • x86/speculation: Make "seccomp" the default mode for Speculative Store
        Bypass
      • x86/bugs: Rename _RDS to _SSBD
      • proc: Use underscores for SSBD in 'status'
      • Documentation/spec_ctrl: Do some minor cleanups
      • x86/bugs: Fix __ssb_select_mitigation() return type
      • x86/bugs: Make cpu_show_common() static
      • x86/bugs: Fix the parameters alignment and missing void
      • x86/cpu: Make alternative_msr_write work for 32-bit code
      • KVM: SVM: Move spec control call after restore of GS
      • x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP
      • x86/cpufeatures: Disentangle MSR_SPEC_CTRL enumeration from IBRS
      • x86/cpufeatures: Disentangle SSBD enumeration
      • x86/cpufeatures: Add FEATURE_ZEN
      • x86/speculation: Handle HT correctly on AMD
      • x86/bugs, KVM: Extend speculation control for VIRT_SPEC_CTRL
      • x86/speculation: Add virtualized speculative store bypass disable
        support
      • x86/speculation: Rework speculative_store_bypass_update()
      • x86/bugs: Unify x86_spec_ctrl_{set_guest,restore_host}
      • x86/bugs: Expose x86_spec_ctrl_base directly
      • x86/bugs: Remove x86_spec_ctrl_set()
      • x86/bugs: Rework spec_ctrl base and mask logic
      • x86/speculation, KVM: Implement support for VIRT_SPEC_CTRL/LS_CFG
      • KVM: SVM: Implement VIRT_SPEC_CTRL support for SSBD
      • x86/bugs: Rename SSBD_NO to SSB_NO
      • KVM/VMX: Expose SSBD properly to guests
      • KVM: x86: SVM: Call x86_spec_ctrl_set_guest/host() with interrupts
        disabled
      • x86/xen: Add call of speculative_store_bypass_ht_init() to PV paths
    • [x86] cpufeatures: Show KAISER in cpuinfo
    • mm: Remove non-linear file mappings:
      • mm: replace remap_file_pages() syscall with emulation
      • mm: fix regression in remap_file_pages() emulation
      • mm: drop support of non-linear mapping from unmap/zap codepath
      • mm: drop support of non-linear mapping from fault codepath
      • mm: drop vm_ops->remap_pages and generic_file_remap_pages() stub
      • proc: drop handling non-linear mappings
      • rmap: drop support of non-linear mappings
      • mm: replace vma->sharead.linear with vma->shared
      • mm: remove rest usage of VM_NONLINEAR and pte_file()
      • asm-generic: drop unused pte_file* helpers
      • arm: drop L_PTE_FILE and pte_file()-related helpers
      • x86: drop _PAGE_FILE and pte_file()-related helpers
    • [x86] mm: Move swap offset/type up in PTE to work around erratum
    • [x86] mm: move _PAGE_SWP_SOFT_DIRTY from bit 7 to bit 1
    • [x86] mm: Add PUD functions
    • mm: Add vm_insert_pfn_prot()
    • mm: fix cache mode tracking in vm_insert_mixed()
    • [x86] io: add interface to reserve io memtype for a resource range
    • drm/drivers: add support for using the arch wc mapping API.
    • mm/pagewalk: remove pgd_entry() and pud_entry()
    • pagewalk: improve vma handling
    • [x86] Add mitigation for L1 Terminal Fault (kernel) (CVE-2018-3620):
      • x86/speculation/l1tf: Increase 32bit PAE __PHYSICAL_PAGE_SHIFT
      • x86/speculation/l1tf: Change order of offset/type in swap entry
      • x86/speculation/l1tf: Protect swap entries against L1TF
      • x86/speculation/l1tf: Protect PROT_NONE PTEs against speculation
      • x86/speculation/l1tf: Make sure the first page is always reserved
      • x86/speculation/l1tf: Add sysfs reporting for l1tf
      • x86/speculation/l1tf: Disallow non privileged high MMIO PROT_NONE
        mappings
      • x86/speculation/l1tf: Limit swap file size to MAX_PA/2
      • x86/init: fix build with CONFIG_SWAP=n
      • x86/bugs: Move the l1tf function and define pr_fmt properly
      • x86/speculation/l1tf: Extend 64bit swap file size limit
      • x86/speculation/l1tf: Protect PAE swap entries against L1TF
      • x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit
      • x86/speculation/l1tf: Fix off-by-one error when warning that system has
        too much RAM
      • x86/speculation/l1tf: Fix up pte->pfn conversion for PAE
      • x86/speculation/l1tf: Unbreak !__HAVE_ARCH_PFN_MODIFY_ALLOWED
        architectures
      • x86/speculation/l1tf: Invert all not present mappings
      • x86/speculation/l1tf: Exempt zeroed PTEs from inversion
      • x86/speculation/l1tf: Protect NUMA-balance entries against L1TF
      • x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert
      • x86/mm/pat: Make set_memory_np() L1TF safe
      • x86/mm/kmmio: Make the tracer robust against L1TF
      • x86/speculation/l1tf: Suggest what to do on systems with too much RAM
    • mm/vmstat: Make NR_TLB_REMOTE_FLUSH_RECEIVED available even on UP
    • irda: Fix memory leak caused by repeated binds of irda socket
      (CVE-2018-6554)
    • irda: Only insert new objects into the global database via setsockopt
      (CVE-2018-6555)
    • floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl
      (CVE-2018-7755)
    • HID: debug: check length before copy_to_user() (CVE-2018-9516)
    • scsi: target: iscsi: Use hex2bin instead of a re-implementation
      (CVE-2018-14633)
    • exec: Limit arg stack to at most 75% of _STK_LIM (CVE-2018-14634)

[ Salvatore Bonaccorso ]

  • nfsd: increase DRC cache limit (Closes: #898137)

[ Ben Hutchings ]

  • Revert "net: increase fragment memory usage limits" (CVE-2018-5391)
  • debian/control: Point Vcs URLs to Salsa
  • README.Debian: Change more URLs to use https: scheme
  • README.Debian: Update URLs that were pointing to Alioth
  • Bump ABI to 7

-- Ben Hutchings ben@decadent.org.uk Wed, 03 Oct 2018 04:25:08 +0100

===

- What I did
Upgrade kernel from 3.16.57-2 to 3.16.59-1

- How I did it
Upgrade kernel from 3.16.57-2 to 3.16.59-1

- How to verify it
Need MSFT to build the new opennsl module and update this file:
platform/broadcom/sdk.mk, then we can verify it.

- Description for the changelog

- A picture of a cute animal (not mandatory but encouraged)

@andriymoroz-mlnx
Copy link
Collaborator

Patch for Mellanox

diff --git a/platform/mellanox/sdk.mk b/platform/mellanox/sdk.mk
index 6391a90..e155834 100644
--- a/platform/mellanox/sdk.mk
+++ b/platform/mellanox/sdk.mk
@@ -1,4 +1,4 @@
-MLNX_SDK_BASE_URL = https://github.com/Mellanox/SAI-Implementation/raw/a8ae004f7c24638424ad70196d7ea4e6aea7f05b/sdk
+MLNX_SDK_BASE_URL = https://github.com/Mellanox/SAI-Implementation/raw/73964784d28c8f0c2b1abe93e8404c6394e8c2bd/sdk
 MLNX_SDK_VERSION = 4.2.7304
 MLNX_SDK_RDEBS += $(APPLIBS) $(IPROUTE2_MLNX) $(SX_ACL_RM) $(SX_COMPLIB) \
                  $(SX_EXAMPLES) $(SX_GEN_UTILS) $(SX_SCEW) $(SX_SDN_HAL) \

@lguohan lguohan closed this Jun 29, 2019
prsunny pushed a commit that referenced this pull request Nov 11, 2022
swss update with following commits:
81f4ea9 orchagent/portsorch: Missing scheduler group after SWSS restart (#2174)
e557855 [SWSS] Innovium platform specific changes in PFC Detect lua script (#2493)
6e288dc New P4Orch development. (#2425)
ab0e474 swss: Fixing race condition for rif counters (#2488)
724f914 [tests] [asan] extend graceful stop flag to also stop syncd (#2491)
84642f3 [Dynamic buffer calculation][Mellanox] Enhance the logic to identify buffer pools and profiles (#2498)
e04bb43 Fix vs test issue: failed to remove vlan due to referenced by vlan interface (#2504)
52c561f Added LAG member check on addLagMember() (#2464)
stephenxs added a commit to stephenxs/sonic-buildimage that referenced this pull request Nov 22, 2022
72b9cf9 [psushow & psuutil] Support PSU power threshold checking (sonic-net#2326)
dfdc92e Revert "Support the bandit check by GitHub Action (sonic-net#2358)" (sonic-net#2509)
85638b2 YANG Validation for ConfigDB Updates: DEVICE_METADATA, SNMP, SNMP_COMMUNITY tables (sonic-net#2481)
da44d71 YANG Validation for ConfigDB Updates: PORT_STORM_CONTROL, PORT_QOS_MAP, BUFFER_PROFILE, BUFFER_PG, BUFFER_QUEUE, BUFFER_POOL, FEATURE, DEFAULT_LOSSLESS_BUFFER_PARAMETER tables (#
ba9b628 [sfp] Fix issue: Application Advertisement is not well formatted (sonic-net#2491)

Signed-off-by: Stephen Sun <stephens@nvidia.com>
prgeor pushed a commit that referenced this pull request Nov 23, 2022
#12791)

* Update submodule sonic-utilities

72b9cf9 [psushow & psuutil] Support PSU power threshold checking (#2326)
dfdc92e Revert "Support the bandit check by GitHub Action (#2358)" (#2509)
85638b2 YANG Validation for ConfigDB Updates: DEVICE_METADATA, SNMP, SNMP_COMMUNITY tables (#2481)
da44d71 YANG Validation for ConfigDB Updates: PORT_STORM_CONTROL, PORT_QOS_MAP, BUFFER_PROFILE, BUFFER_PG, BUFFER_QUEUE, BUFFER_POOL, FEATURE, DEFAULT_LOSSLESS_BUFFER_PARAMETER tables (#
ba9b628 [sfp] Fix issue: Application Advertisement is not well formatted (#2491)

Signed-off-by: Stephen Sun <stephens@nvidia.com>

* Update submodule sonic-platform-daemons

ed818f8 [PSU daemon] Support PSU power threshold checking (#288)
707a720 [chassisd] update chassisd to write fabric and lc asics on sep erate table (#311)
e8c5657 [ycabled] fix exception-handling logic for ycabled (#306)
905874d [ycabled] move swsscommon API's from subroutines to call them exactly once per task_worker/thread (#303)
510d330 Fix typo in xcvrd (#313)
9ae551f [ycabled] add support for detach mode in 'active-active' topology (#309)
82fc7a6 Added filtering logic to send filtered fields from DB event (#307)
8a2dad9 [ycabled] fix no port/state returned by grpc server (#308)
4ea12cf Fix xcvrd to support 400G ZR optic (#293)
23b6970 [ycabled] fix naming error for error condition for CLI handling (#302)
501abb2 [ycabled] add some exception catching logic to some vendor specific API's (#301)
534f839 [ycabled] add support for getting grpc secerts via shared file (#298)
3622aac Remove shell=True (#300)
143422b add support to execute new ycable API's, add datetime field to mux_info (#297)
6522c46 [ycabled] add notification for gRPC connection state transitions to  IDLE/TRANSIENT_FAILURE (#295)
4b3b238 Install libyang to azure pipeline (#292)
8ff5f37 Use get() to fetch default value from dictionary for port admin_status #286
b03cc74 [Xcvrd] Soak duplicate events and process only updated interested events (#285)
3acb171 [ycable] cleanup logic for creating grpc future ready (#289)
ce3b6db [ycabled] fix insert events from xcvrd;cleanup some mux toggle logic (#287)

Signed-off-by: Stephen Sun <stephens@nvidia.com>

* Update submodule sonic-platform-common

7c48be2 Add warning/critical thresholds for PSU power (#304)
f5ba0d0 Add missing PM and VDM related EEPROM read (#326)
02dd597 implement CMIS set_laser_freq to support 100GHz grid space (#294)

Signed-off-by: Stephen Sun <stephens@nvidia.com>

* Revert "Update submodule sonic-platform-daemons"

This reverts commit aea648b.

Signed-off-by: Stephen Sun <stephens@nvidia.com>
yxieca added a commit to yxieca/sonic-buildimage that referenced this pull request Nov 30, 2022
… advance submodule heads

utilities:
* 0157086 2022-11-22 | [VXLAN]Fixing traceback in show remotemac when mac moves during command execution (sonic-net#2506) [Sudharsan Dhamal Gopalarathnam]
* 1f26c8c 2022-11-17 | avoid printing error if no neighbors are present (sonic-net#2502) [arlakshm]
* 2573aae 2022-11-19 | [sfp] Fix issue: Application Advertisement is not well formatted (sonic-net#2491) [Junchao-Mellanox]
* 1d96b55 2022-11-10 | [show][muxcable] Catch port Value error exception (sonic-net#2076) (sonic-net#2486) [Isabella de Leon]
* 6ed2afb 2022-11-09 | bugfix[2024] vnet route check exit code fix. (sonic-net#2480) [siqbal1986]
* d8c49dc 2022-11-17 | Fixed SONIC_CLI_IFACE_MODE=alias show ip|ipv6 route output in default mode issue (sonic-net#2422) [Marty Y. Lok]
* 166739e 2022-11-11 | Accept 0 for queue and dscp (sonic-net#2494) (github/202205) [bingwang-ms]

swss:
* 7e274a4 2022-11-18 | [Fdbsyncd] Bug Fix for remote MAC move to local MAC and Fix for Static MAC advertisement in EVPN. (sonic-net#2521) (HEAD -> 202205, github/202205) [KISHORE KUNAL]
* 434e80c 2022-11-02 | Fix vs test issue: failed to remove vlan due to referenced by vlan interface (sonic-net#2504) [Stephen Sun]
* 11bef87 2022-11-27 | [dual-tor] add missing SAI attribte in order to create IPNIP tunnel (sonic-net#2503) [Andriy Yurkiv]
* 11aba29 2022-11-09 | [SWSS] Innovium platform specific changes in PFC Detect lua script (sonic-net#2493) [maulik_patel_marvell]
* 4a165ee 2022-11-14 | Revert "[vlanmgr] Disable `arp_evict_nocarrier` for vlan host intf (sonic-net#2469)" (sonic-net#2518) [Longxiang Lyu]

sairedis:
* 98def2d 2022-11-16 | [Recorder]: Acquire lock for ofstream changes (sonic-net#1145) (HEAD -> 202205, github/202205) [Lawrence Lee]

platform-daemon:
* 9983106 2022-11-15 | [chassisd] update chassisd to write fabric and lc asics on sep erate table (sonic-net#311) (HEAD -> 202205) [arlakshm]
* 8324c26 2022-11-10 | [ycabled] fix exception-handling logic for ycabled (sonic-net#306) [vdahiya12]
* eaf73f8 2022-11-07 | [ycabled] move swsscommon API's from subroutines to call them exactly once per task_worker/thread (sonic-net#303) [vdahiya12]

platform-common:
* 4b528a0 2022-11-21 | Add missing PM and VDM related EEPROM read (sonic-net#326) (HEAD -> 202205) [mihirpat1]
* 8ca6c17 2022-11-14 | Initial commit (sonic-net#323) [mihirpat1]
* 47f87d9 2022-11-23 | EEPROM/DOM Info: The Compliance Code will show "unknown" by using FINISAR 10G LR XCVR (sonic-net#319) [ChiouRung Haung]
* 6273850 2022-06-01 | [ssd_generic] Fix innodisk health regex (sonic-net#287) [Alexander Allen]

Signed-off-by: Ying Xie <ying.xie@microsoft.com>
yxieca added a commit that referenced this pull request Nov 30, 2022
utilities:
* 4b7335f 2022-11-29 | Add db_migrator_constants.py script to setup.py (#2534) (HEAD -> 202205) [Vaibhav Hemant Dixit]
* 8a78cf4 2022-11-23 | Port 202012 DB migration changes to newer branches (#2515) (HEAD -> 202205) [Vaibhav Hemant Dixit]
* 0157086 2022-11-22 | [VXLAN]Fixing traceback in show remotemac when mac moves during command execution (#2506) [Sudharsan Dhamal Gopalarathnam]
* 1f26c8c 2022-11-17 | avoid printing error if no neighbors are present (#2502) [arlakshm]
* 2573aae 2022-11-19 | [sfp] Fix issue: Application Advertisement is not well formatted (#2491) [Junchao-Mellanox]
* 1d96b55 2022-11-10 | [show][muxcable] Catch port Value error exception (#2076) (#2486) [Isabella de Leon]
* 6ed2afb 2022-11-09 | bugfix[2024] vnet route check exit code fix. (#2480) [siqbal1986]
* d8c49dc 2022-11-17 | Fixed SONIC_CLI_IFACE_MODE=alias show ip|ipv6 route output in default mode issue (#2422) [Marty Y. Lok]
* 166739e 2022-11-11 | Accept 0 for queue and dscp (#2494) (github/202205) [bingwang-ms]

Signed-off-by: Ying Xie <ying.xie@microsoft.com>

Signed-off-by: Ying Xie <ying.xie@microsoft.com>
StormLiangMS pushed a commit to StormLiangMS/sonic-buildimage that referenced this pull request Dec 8, 2022
sonic-net#12791)

* Update submodule sonic-utilities

72b9cf9 [psushow & psuutil] Support PSU power threshold checking (sonic-net#2326)
dfdc92e Revert "Support the bandit check by GitHub Action (sonic-net#2358)" (sonic-net#2509)
85638b2 YANG Validation for ConfigDB Updates: DEVICE_METADATA, SNMP, SNMP_COMMUNITY tables (sonic-net#2481)
da44d71 YANG Validation for ConfigDB Updates: PORT_STORM_CONTROL, PORT_QOS_MAP, BUFFER_PROFILE, BUFFER_PG, BUFFER_QUEUE, BUFFER_POOL, FEATURE, DEFAULT_LOSSLESS_BUFFER_PARAMETER tables (#
ba9b628 [sfp] Fix issue: Application Advertisement is not well formatted (sonic-net#2491)

Signed-off-by: Stephen Sun <stephens@nvidia.com>

* Update submodule sonic-platform-daemons

ed818f8 [PSU daemon] Support PSU power threshold checking (sonic-net#288)
707a720 [chassisd] update chassisd to write fabric and lc asics on sep erate table (sonic-net#311)
e8c5657 [ycabled] fix exception-handling logic for ycabled (sonic-net#306)
905874d [ycabled] move swsscommon API's from subroutines to call them exactly once per task_worker/thread (sonic-net#303)
510d330 Fix typo in xcvrd (sonic-net#313)
9ae551f [ycabled] add support for detach mode in 'active-active' topology (sonic-net#309)
82fc7a6 Added filtering logic to send filtered fields from DB event (sonic-net#307)
8a2dad9 [ycabled] fix no port/state returned by grpc server (sonic-net#308)
4ea12cf Fix xcvrd to support 400G ZR optic (sonic-net#293)
23b6970 [ycabled] fix naming error for error condition for CLI handling (sonic-net#302)
501abb2 [ycabled] add some exception catching logic to some vendor specific API's (sonic-net#301)
534f839 [ycabled] add support for getting grpc secerts via shared file (sonic-net#298)
3622aac Remove shell=True (sonic-net#300)
143422b add support to execute new ycable API's, add datetime field to mux_info (sonic-net#297)
6522c46 [ycabled] add notification for gRPC connection state transitions to  IDLE/TRANSIENT_FAILURE (sonic-net#295)
4b3b238 Install libyang to azure pipeline (sonic-net#292)
8ff5f37 Use get() to fetch default value from dictionary for port admin_status sonic-net#286
b03cc74 [Xcvrd] Soak duplicate events and process only updated interested events (sonic-net#285)
3acb171 [ycable] cleanup logic for creating grpc future ready (sonic-net#289)
ce3b6db [ycabled] fix insert events from xcvrd;cleanup some mux toggle logic (sonic-net#287)

Signed-off-by: Stephen Sun <stephens@nvidia.com>

* Update submodule sonic-platform-common

7c48be2 Add warning/critical thresholds for PSU power (sonic-net#304)
f5ba0d0 Add missing PM and VDM related EEPROM read (sonic-net#326)
02dd597 implement CMIS set_laser_freq to support 100GHz grid space (sonic-net#294)

Signed-off-by: Stephen Sun <stephens@nvidia.com>

* Revert "Update submodule sonic-platform-daemons"

This reverts commit aea648b.

Signed-off-by: Stephen Sun <stephens@nvidia.com>
StormLiangMS pushed a commit that referenced this pull request Dec 10, 2022
#12791)

* Update submodule sonic-utilities

72b9cf9 [psushow & psuutil] Support PSU power threshold checking (#2326)
dfdc92e Revert "Support the bandit check by GitHub Action (#2358)" (#2509)
85638b2 YANG Validation for ConfigDB Updates: DEVICE_METADATA, SNMP, SNMP_COMMUNITY tables (#2481)
da44d71 YANG Validation for ConfigDB Updates: PORT_STORM_CONTROL, PORT_QOS_MAP, BUFFER_PROFILE, BUFFER_PG, BUFFER_QUEUE, BUFFER_POOL, FEATURE, DEFAULT_LOSSLESS_BUFFER_PARAMETER tables (#
ba9b628 [sfp] Fix issue: Application Advertisement is not well formatted (#2491)

Signed-off-by: Stephen Sun <stephens@nvidia.com>

* Update submodule sonic-platform-daemons

ed818f8 [PSU daemon] Support PSU power threshold checking (#288)
707a720 [chassisd] update chassisd to write fabric and lc asics on sep erate table (#311)
e8c5657 [ycabled] fix exception-handling logic for ycabled (#306)
905874d [ycabled] move swsscommon API's from subroutines to call them exactly once per task_worker/thread (#303)
510d330 Fix typo in xcvrd (#313)
9ae551f [ycabled] add support for detach mode in 'active-active' topology (#309)
82fc7a6 Added filtering logic to send filtered fields from DB event (#307)
8a2dad9 [ycabled] fix no port/state returned by grpc server (#308)
4ea12cf Fix xcvrd to support 400G ZR optic (#293)
23b6970 [ycabled] fix naming error for error condition for CLI handling (#302)
501abb2 [ycabled] add some exception catching logic to some vendor specific API's (#301)
534f839 [ycabled] add support for getting grpc secerts via shared file (#298)
3622aac Remove shell=True (#300)
143422b add support to execute new ycable API's, add datetime field to mux_info (#297)
6522c46 [ycabled] add notification for gRPC connection state transitions to  IDLE/TRANSIENT_FAILURE (#295)
4b3b238 Install libyang to azure pipeline (#292)
8ff5f37 Use get() to fetch default value from dictionary for port admin_status #286
b03cc74 [Xcvrd] Soak duplicate events and process only updated interested events (#285)
3acb171 [ycable] cleanup logic for creating grpc future ready (#289)
ce3b6db [ycabled] fix insert events from xcvrd;cleanup some mux toggle logic (#287)

Signed-off-by: Stephen Sun <stephens@nvidia.com>

* Update submodule sonic-platform-common

7c48be2 Add warning/critical thresholds for PSU power (#304)
f5ba0d0 Add missing PM and VDM related EEPROM read (#326)
02dd597 implement CMIS set_laser_freq to support 100GHz grid space (#294)

Signed-off-by: Stephen Sun <stephens@nvidia.com>

* Revert "Update submodule sonic-platform-daemons"

This reverts commit aea648b.

Signed-off-by: Stephen Sun <stephens@nvidia.com>
tshalvi pushed a commit to tshalvi/sonic-buildimage that referenced this pull request Dec 20, 2022
…t#2491)

- What I did
Extended DVS test "--graceful-stop" flag to also stop syncd.

- Why I did it
So ASAN can generate reports for syncd.

- How I verified it
Run the tests with --graceful-stop, observe that the syncd process is stopped via SIGTERM

Signed-off-by: Yakiv Huryk <yhuryk@nvidia.com>
@zhenggen-xu zhenggen-xu deleted the 201803-k-upgrade branch May 24, 2024 19:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants