Comments

74 Comments

Works.

Linux version 6.12.12-100.fc40.x86_64 (mockbuild@ff5bb2f6aa1f4f82b5e7abd11b40f650) (gcc (GCC) 14.2.1 20240912 (Red Hat 14.2.1-3), GNU ld version 2.41-38.fc40) #1 SMP PREEMPT_DYNAMIC Sat Feb  1 19:04:39 UTC 2025
------------[ cut here ]------------
WARNING: CPU: 0 PID: 0 at kernel/static_call_inline.c:153 __static_call_update+0x18c/0x1f0
Modules linked in:
CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.12.12-100.fc40.x86_64 #1
RIP: 0010:__static_call_update+0x18c/0x1f0
Code: 80 3d 0b 7a 88 02 00 0f 85 7b ff ff ff 4c 89 f6 48 c7 c7 50 17 e7 85 c6 05 f4 79 88 02 01 e8 eb 6b d8 ff 0f 0b e9 5e ff ff ff <0f> 0b 48 c7 c7 40 62 a0 86 e8 26 27 eb 00 48 8b 44 24 28 65 48 2b
RSP: 0000:ffffffff86803e28 EFLAGS: 00010046 ORIG_RAX: 0000000000000000
RAX: 0000000000000000 RBX: ffffffff8522a658 RCX: 0000000059a323e9
RDX: 0000000000000000 RSI: ffffffff87774a70 RDI: ffffffff86872100
RBP: ffffffff86aa9d30 R08: 00000000ff59a323 R09: 2039333a34303a39
R10: 3032204354552039 R11: 333a34303a393120 R12: ffffffff856d4150
R13: 0000000000000002 R14: ffffffff847c4980 R15: 000000007ffff000
FS:  0000000000000000(0000) GS:ffffffff87292000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff88807de2e000 CR3: 00000002523a4000 CR4: 00000000000000f0
Call Trace:
 <TASK>
 ? __static_call_update+0x18c/0x1f0
 ? __warn.cold+0x93/0xfa
 ? __static_call_update+0x18c/0x1f0
 ? report_bug+0xff/0x140
 ? __pfx_lockdown_is_locked_down+0x10/0x10
 ? early_fixup_exception+0x5d/0xb0
 ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8
 ? early_idt_handler_common+0x2f/0x3a
 ? __pfx_lockdown_is_locked_down+0x10/0x10
 ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8
 ? __static_call_update+0x18c/0x1f0
 ? __static_call_update+0x7e/0x1f0
 ? __pfx_lockdown_is_locked_down+0x10/0x10
 ? security_add_hooks+0xb8/0x120
 ? lockdown_lsm_init+0x21/0x30
 ? initialize_lsm+0x34/0x60
 ? early_security_init+0x3d/0x50
 ? start_kernel+0x66/0xa00
 ? x86_64_start_reservations+0x24/0x30
 ? x86_64_start_kernel+0xed/0xf0
 ? common_startup_64+0x13e/0x141
 </TASK>
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
static_key_enable_cpuslocked(): static key 'security_hook_active_lock_kernel_down_0+0x0/0x10' used before call to   jump_label_init()
WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90

The package contains invalid symbolic links. /usr/bin/{httptest,lmtptest,pop3test,sivtest,smtptest,synctest} point to imtest instead of cyr_imtest

The test at https://www.cyrusimap.org/3.4/imap/developer/jmap.html#developer-jmap returns "The requested method is not allowed for the URL"

Unable to boot under aarch64/rpi3.
The error message is: "Unable to construct new device tree. Failed to update FDT and exit boot services"
No problems with kernel 6.0.17

Test passed.
Unable to start Windows VM - freezes

karma

x86_64 HP Notebook. KVM problems: unable to start virtual machine [ +2,690304] BUG: kernel NULL pointer dereference, address: 0000000000000005 [ +0,000008] #PF: supervisor write access in kernel mode [ +0,000002] #PF: error_code(0x0002) - not-present page ..... [ +0,000001] RIP: 0010:__bio_split_to_limits+0x272/0x440

iproute option is not available configure: --enable-iproute2 enable support for iproute2 [default=no]

x86_64 and aarch64

karma

aarch64 and x86_64

karma

x86_64 and aarch64

karma

x86_64 and aarch64

karma

aarch64

x86_64 and aarch64

karma

Works. x86_64 and aarch64

karma

aarch64 and x86_64

karma

aarch64 and x86_64

karma

x86_64 vm

karma

x86_64 and aarch64

karma

Works - x86_64, aarch64 Package wireguard-dkms needs to be updated.

karma

x86_64 and aarch64