The 6.6.11 stable kernel update contains a number of important fixes across the tree.
The 6.6.10 stable kernel update contains a number of important fixes across the tree.
Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:
sudo dnf upgrade --refresh --advisory=FEDORA-2024-ce5990d53b
Please login to add feedback.
0 | 12 | Test Case kernel regression |
This update has been submitted for testing by acaringi.
This update's test gating status has been changed to 'waiting'.
This update has obsoleted kernel-6.6.10-200.fc39, and has inherited its bugs and notes.
Working native and in a VirtualBox VM.
Dell Precision T5610 2 x Intel(R) Xeon(R) CPU E5-2603 v2 @ 1.80GHz (8 cores total) NVIDIA Corporation GK104 [GeForce GTX 760] (rev a1)
This update's test gating status has been changed to 'passed'.
Works (Xeon W-2225 + Arc A380)
default & performance tests pass (KVM)
Regression test
./runtests.sh
PASS with kernel-6.6.11-200.fc39.x86_64 within QEMU/KVM with CPU-passthrough on an AMD Ryzen 7 PRO 6850U host: F39 KDE Spin with SELinux confined user account (user_u), VM up to date as of now with updates-testing enabled (only the known issues of SELinux confined user accounts in KDE occur), uname -r = 6.6.11-200.fc39.x86_64, tainted = 0. So far it works fine with average activities: firefox browsing, dolphin file organization, ...Vulnerability status:
/sys/devices/system/cpu/vulnerabilities/gather_data_sampling:Not affected
/sys/devices/system/cpu/vulnerabilities/itlb_multihit:Not affected
/sys/devices/system/cpu/vulnerabilities/l1tf:Not affected
/sys/devices/system/cpu/vulnerabilities/mds:Not affected
/sys/devices/system/cpu/vulnerabilities/meltdown:Not affected
/sys/devices/system/cpu/vulnerabilities/mmio_stale_data:Not affected
/sys/devices/system/cpu/vulnerabilities/retbleed:Not affected
/sys/devices/system/cpu/vulnerabilities/spec_rstack_overflow:Vulnerable: Safe RET, no microcode
/sys/devices/system/cpu/vulnerabilities/spec_store_bypass:Mitigation: Speculative Store Bypass disabled via prctl
/sys/devices/system/cpu/vulnerabilities/spectre_v1:Mitigation: usercopy/swapgs barriers and __user pointer sanitization
/sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation: Retpolines, IBPB: conditional, IBRS_FW, STIBP: disabled, RSB filling, PBRSB-eIBRS: Not affected
/sys/devices/system/cpu/vulnerabilities/srbds:Not affected
/sys/devices/system/cpu/vulnerabilities/tsx_async_abort:Not affected
The vulnerability report is though nothing new, it has been already in the recent kernels, at least since 6.6.8. It seems AMD specific, but kernel docs indicate possibilities for mitigation (CVE-2023-20569). Not sure if that can be applied to Fedora atm?
Thinkpad T14s, AMD Ryzen 7840U, Fedora 39, UEFI, Secure Boot, luks+btrfs. Default and performance tests pass OK. Suspend seems to work.
Works for me.. The enabled Default and Performance tests pass OK.
Work Station > Asus Prime mobo, Ryzen5 5600g/AMDGPU 400 Series Chipset, (UEFI + Secure Boot) SSD's > RAID1 (ext4) running Plasma DE.
This update has been pushed to testing.
This update can be pushed to stable now if the maintainer wishes
Works.
Works fine.
Working fine.
Acer Aspire Intel® Core™ i7-3632QM CPU @ 2.20GHz Graphics Processor: Mesa DRI Intel® HD Graphics 4000.
driver: i915 v: kernel arch: Gen-7 wi-fi: Qualcomm Atheros AR9485 Wireless Network.
Adapter vendor: Lite-On. driver: ath9k v: kernel.
Default fedora btrfs filesystem.
Suspension working.
Passed kernel regression tests.
Works perfectly.
Works (R5600X + RX6700XT)
No regressions on a Framework AMD 7840U UEFI GNOME Wayland
Seems to work fine on bare-metal HP Z440, AMD RX570 with UEFI. Kernel regression tests both PASS, Bug 2252130 still present but OpenCL compute now working albeit with trace errors.
Works well.
Host: KVM/QEMU Standard PC (Q35 + ICH9, 2009) (pc-q35-7.2) CPU: Intel(R) Core(TM) i7-4790K (8) @ 3.99 GHz Memory: 2.82 GiB
No performance tests done
Works perfectly on my machine. (Ryzen 5 5600G, RX 7600)
This update has been submitted for stable by acaringi.
works on Lenovo Legion 5 15ACH6A (AMD 5800H, Radeon RX 6600M)
This update has been pushed to stable.
Kernel Version: 6.6.11-200.fc39 Hardware: Razer Blade Ryzen 9 with RTX 3060 Mobile GPU
I'm not sure if this is expected behavior for NVIDIA official drivers after a kernal update, but updating to this version breaks it. After updating to kernel-6.6.11-200.fc39, the NVIDIA persistent daemon fails to start during the system initialization process. As a result, the NVIDIA drivers do not function, and the system boots without the NVIDIA drivers. Please let me know if this is not the right place to post this. I just assumed that since the only difference is the version number, it could possibly be related to this.