obsolete

kernel-6.6.10-200.fc39

FEDORA-2024-65560146c1 created by acaringi 8 months ago for Fedora 39

The 6.6.10 stable kernel update contains a number of important fixes across the tree.

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

This update has been submitted for testing by acaringi.

8 months ago

This update's test gating status has been changed to 'waiting'.

8 months ago

This update's test gating status has been changed to 'passed'.

8 months ago
User Icon g6avk commented & provided feedback 8 months ago
karma

Works for me.. The enabled Default and Performance tests pass OK.

Work Station > Asus Prime mobo, Ryzen5 5600g/AMDGPU 400 Series Chipset, (UEFI + Secure Boot) SSD's > RAID1 (ext4) running Plasma DE.

User Icon py0xc3 commented & provided feedback 8 months ago
karma

6.6.10-200.fc39.x86_64 works fine on an AMD Ryzen 7 PRO 6850U host: F39 KDE Spin (up to date with stable repos as of now, plus the 6.6.10-200.fc39 kernel from koji) with SELinux confined user account, uname -r = 6.6.10-200.fc39.x86_64, tainted = 0. So far it works fine with average activities.

Maybe I have later some time to run a regression test in the VM.

User Icon bretth commented & provided feedback 8 months ago
karma

default & performance tests pass (KVM)

User Icon nixuser commented & provided feedback 8 months ago
karma

Working fine here, native and VM.

Intel NUC NUC13ANHi7 (NUC13ANHi7000) (rev N11225-207) 1 x 13th Gen Intel(R) Core(TM) i7-1360P Intel Corporation Raptor Lake-P [Iris Xe Graphics] (rev 04)

Dell Precision T3600 Intel(R) Xeon(R) CPU E5-1620 0 @ 3.60GHz (8 cores total) NVIDIA Corporation GF119 [NVS 310] (rev a1)

Intel NUC i7 NUC11PAH 1 x 11th Gen Intel(R) Core(TM) i7-1165G7 @ 2.80GHz Intel Corporation TigerLake-LP GT2 [Iris Xe Graphics] (rev 01)

User Icon js314592 provided feedback 8 months ago
karma

This update has been pushed to testing.

8 months ago

This update can be pushed to stable now if the maintainer wishes

8 months ago
User Icon bojan commented & provided feedback 8 months ago
karma

Works.

User Icon charn commented & provided feedback 8 months ago
karma

Thinkpad T14s, AMD Ryzen 7840U, Fedora 39, UEFI, Secure Boot, luks+btrfs. Default and performance tests pass OK. Suspend seems to work.

User Icon markec provided feedback 8 months ago
karma
User Icon geraldosimiao commented & provided feedback 8 months ago
karma

Working fine.

Acer Aspire Intel® Core™ i7-3632QM CPU @ 2.20GHz Graphics Processor: Mesa DRI Intel® HD Graphics 4000.
driver: i915 v: kernel arch: Gen-7 wi-fi: Qualcomm Atheros AR9485 Wireless Network.
Adapter vendor: Lite-On.
driver: ath9k v: kernel.

Default fedora btrfs filesystem.
Suspension working.
Passed kernel regression tests.

User Icon lruzicka commented & provided feedback 8 months ago
karma

No problems seen while running this kernel.

User Icon agurenko commented & provided feedback 8 months ago
karma

Works well

karma
User Icon steiner provided feedback 8 months ago
karma
User Icon evillagr commented & provided feedback 8 months ago
karma

works fine

User Icon johnh99 commented & provided feedback 8 months ago
karma

Works fine on my system. Ryzen 3700x, Rog Strix B550-F, Nvidia 2070 from rpmfusion. Secure boot disabled. UEFI.

User Icon py0xc3 commented & provided feedback 8 months ago
karma

Additional to my native test above: regression test ./runtests.sh PASS with kernel-6.6.10-200.fc39.x86_64 within QEMU/KVM with CPU-passthrough on an AMD Ryzen 7 PRO 6850U host: F39 KDE Spin with SELinux confined user account (user_u), VM up to date as of now with updates-testing enabled (only the known issues of SELinux confined user accounts in KDE occur), uname -r = 6.6.10-200.fc39.x86_64, tainted = 0. Works fine with average activities: firefox browsing, dolphin file organization.

@acaringi the regression test passes, but I am worrying about the following line of the vulnerability status:

/sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow:Vulnerable: Safe RET, no microcode

I am not sure if that is currently intended / known?

The full vulnerability status is the following:

/sys/devices/system/cpu/vulnerabilities/gather_data_sampling:Not affected
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/mmio_stale_data:Not affected
/sys/devices/system/cpu/vulnerabilities/retbleed:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow:Vulnerable: Safe RET, no microcode
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Retpolines, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling, PBRSB-eIBRS: Not affected
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected

Kernel Docs indicate that the user space might be vulnerable in this condition:

The "Safe RET" mitigation (see below) has been applied to protect the kernel, but the IBPB-extending microcode has not been applied. User space tasks may still be vulnerable.

Looks hardly exploitable in practice as long as the system is configured with best-practices or defaults, but maybe some mitigation can be achieved in future?

User Icon dimitrisk commented & provided feedback 8 months ago
karma

No regressions here; CPU is AMD Ryzen 7 7840U w/ Radeon 780M Graphics

@py0x3 I booted 6.6.{7,8,9} and the same message appears in lscpu in all of them so if this a regression it doesn't look like it's this recent.

User Icon eifr0980 provided feedback 8 months ago
karma
User Icon tharadash commented & provided feedback 8 months ago
karma

Seems to work fine on bare-metal HP Z440, AMD RX570 with UEFI. Kernel regression tests both PASS, Bug 2252130 still present but OpenCL compute now working but with trace errors.

This update has been obsoleted by kernel-6.6.11-200.fc39.

8 months ago

Please login to add feedback.

Metadata
Type
bugfix
Karma
18
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Dates
submitted
8 months ago
in testing
8 months ago
approved
8 months ago

Automated Test Results

Test Cases

0 9 Test Case kernel regression