Comments

366 Comments
karma

Also getting stack traces here immediately upon boot. Bare metal Framework 13 AMD 7840U.

Feb 03 09:39:43 kernel: Linux version 6.12.12-200.fc41.x86_64 (mockbuild@705a0f43f2254ed2aafbd5bf2b9db346) (gcc (GCC) 14.2.1 20250110 (Red Hat 14.2.1-7), GNU ld version 2.43.1-5.fc41) #1 SMP PREEMPT_DYNAMIC Sat Feb 1 19:02:08 UTC 2025 Feb 03 09:39:43 kernel: ------------[ cut here ]------------ Feb 03 09:39:43 kernel: WARNING: CPU: 0 PID: 0 at kernel/static_call_inline.c:153 __static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: Modules linked in: Feb 03 09:39:43 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.12.12-200.fc41.x86_64 #1 Feb 03 09:39:43 kernel: RIP: 0010:__static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: Code: 80 3d 4b 77 88 02 00 0f 85 7b ff ff ff 4c 89 f6 48 c7 c7 70 28 e7 95 c6 05 34 77 88 02 01 e8 9b 69 d8 ff 0f 0b e9 5e ff ff ff <0f> 0b 48 c7 c7 40 62 a0 96 e8 46 14 eb 00 48 8b 44 24 28 65 48 2b Feb 03 09:39:43 kernel: RSP: 0000:ffffffff96803e28 EFLAGS: 00010046 ORIG_RAX: 0000000000000000 Feb 03 09:39:43 kernel: RAX: 0000000000000000 RBX: ffffffff95229658 RCX: 0000000059b7e3e9 Feb 03 09:39:43 kernel: RDX: 0000000000000000 RSI: ffffffff97774a70 RDI: ffffffff96872100 Feb 03 09:39:43 kernel: RBP: ffffffff96aa9d30 R08: 00000000ff59b7e3 R09: 2038303a32303a39 Feb 03 09:39:43 kernel: R10: 3220435455203830 R11: 3a32303a39312031 R12: ffffffff956d4150 Feb 03 09:39:43 kernel: R13: 0000000000000002 R14: ffffffff947c4e40 R15: 0000000047c1b000 Feb 03 09:39:43 kernel: FS: 0000000000000000(0000) GS:ffffffff97291000(0000) knlGS:0000000000000000 Feb 03 09:39:43 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 03 09:39:43 kernel: CR2: ffff888043d61000 CR3: 00000009c73a4000 CR4: 00000000000000b0 Feb 03 09:39:43 kernel: Call Trace: Feb 03 09:39:43 kernel: <TASK> Feb 03 09:39:43 kernel: ? __static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: ? __warn.cold+0x93/0xfa Feb 03 09:39:43 kernel: ? __static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: ? report_bug+0xff/0x140 Feb 03 09:39:43 kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 03 09:39:43 kernel: ? early_fixup_exception+0x5d/0xb0 Feb 03 09:39:43 kernel: ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8 Feb 03 09:39:43 kernel: ? early_idt_handler_common+0x2f/0x3a Feb 03 09:39:43 kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 03 09:39:43 kernel: ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8 Feb 03 09:39:43 kernel: ? __static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: ? __static_call_update+0x7e/0x1f0 Feb 03 09:39:43 kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 03 09:39:43 kernel: ? security_add_hooks+0xb8/0x120 Feb 03 09:39:43 kernel: ? lockdown_lsm_init+0x21/0x30 Feb 03 09:39:43 kernel: ? initialize_lsm+0x34/0x60 Feb 03 09:39:43 kernel: ? early_security_init+0x3d/0x50 Feb 03 09:39:43 kernel: ? start_kernel+0x66/0xa00 Feb 03 09:39:43 kernel: ? x86_64_start_reservations+0x24/0x30 Feb 03 09:39:43 kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 03 09:39:43 kernel: ? common_startup_64+0x13e/0x141 Feb 03 09:39:43 kernel: </TASK> Feb 03 09:39:43 kernel: ---[ end trace 0000000000000000 ]--- Feb 03 09:39:43 kernel: ------------[ cut here ]------------ Feb 03 09:39:43 kernel: static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init() Feb 03 09:39:43 kernel: WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: Modules linked in: Feb 03 09:39:43 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G W 6.12.12-200.fc41.x86_64 #1 Feb 03 09:39:43 kernel: Tainted: [W]=WARN Feb 03 09:39:43 kernel: RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 96 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 95 48 c7 c7 78 2d e7 95 e8 54 50 d6 ff <0f> 0b eb 86 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f Feb 03 09:39:43 kernel: RSP: 0000:ffffffff96803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000 Feb 03 09:39:43 kernel: RAX: 0000000000000000 RBX: ffffffff979285e0 RCX: 000000000000007e Feb 03 09:39:43 kernel: RDX: 000000000000007e RSI: 00000000ffffe02a RDI: ffffffff96803d20 Feb 03 09:39:43 kernel: RBP: ffffffff95f68498 R08: 0000000020646573 R09: 0000000000000000 Feb 03 09:39:43 kernel: R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffff956d4150 Feb 03 09:39:43 kernel: R13: 0000000000000002 R14: 0000000000000001 R15: 0000000047c1b000 Feb 03 09:39:43 kernel: FS: 0000000000000000(0000) GS:ffffffff97291000(0000) knlGS:0000000000000000 Feb 03 09:39:43 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 03 09:39:43 kernel: CR2: ffff888043d61000 CR3: 00000009c73a4000 CR4: 00000000000000b0 Feb 03 09:39:43 kernel: Call Trace: Feb 03 09:39:43 kernel: <TASK> Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? __warn.cold+0x93/0xfa Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? report_bug+0xff/0x140 Feb 03 09:39:43 kernel: ? early_fixup_exception+0x5d/0xb0 Feb 03 09:39:43 kernel: ? early_idt_handler_common+0x2f/0x3a Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? static_key_enable+0x1a/0x20 Feb 03 09:39:43 kernel: ? security_add_hooks+0xc9/0x120 Feb 03 09:39:43 kernel: ? lockdown_lsm_init+0x21/0x30 Feb 03 09:39:43 kernel: ? initialize_lsm+0x34/0x60 Feb 03 09:39:43 kernel: ? early_security_init+0x3d/0x50 Feb 03 09:39:43 kernel: ? start_kernel+0x66/0xa00 Feb 03 09:39:43 kernel: ? x86_64_start_reservations+0x24/0x30 Feb 03 09:39:43 kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 03 09:39:43 kernel: ? common_startup_64+0x13e/0x141 Feb 03 09:39:43 kernel: </TASK> Feb 03 09:39:43 kernel: ---[ end trace 0000000000000000 ]--- Feb 03 09:39:43 kernel: ------------[ cut here ]------------ Feb 03 09:39:43 kernel: static_key_enable_cpuslocked(): static key 'security_hook_active_lock_kernel_down_0+0x0/0x10' used before call to jump_label_init() Feb 03 09:39:43 kernel: WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: Modules linked in: Feb 03 09:39:43 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G W 6.12.12-200.fc41.x86_64 #1 Feb 03 09:39:43 kernel: Tainted: [W]=WARN Feb 03 09:39:43 kernel: RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 96 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 95 48 c7 c7 78 2d e7 95 e8 54 50 d6 ff <0f> 0b eb 86 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f Feb 03 09:39:43 kernel: RSP: 0000:ffffffff96803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000 Feb 03 09:39:43 kernel: RAX: 0000000000000000 RBX: ffffffff97928540 RCX: 00000000000000ed Feb 03 09:39:43 kernel: RDX: 0000000000000083 RSI: 00000000ffffe04f RDI: ffffffff96803d20 Feb 03 09:39:43 kernel: RBP: ffffffff95f684b0 R08: 0000000020646573 R09: 0000000000000000 Feb 03 09:39:43 kernel: R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffff956d4150 Feb 03 09:39:43 kernel: R13: 0000000000000002 R14: 0000000000000002 R15: 0000000047c1b000 Feb 03 09:39:43 kernel: FS: 0000000000000000(0000) GS:ffffffff97291000(0000) knlGS:0000000000000000 Feb 03 09:39:43 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 03 09:39:43 kernel: CR2: ffff888043d61000 CR3: 00000009c73a4000 CR4: 00000000000000b0 Feb 03 09:39:43 kernel: Call Trace: Feb 03 09:39:43 kernel: <TASK> Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? __warn.cold+0x93/0xfa Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? report_bug+0xff/0x140 Feb 03 09:39:43 kernel: ? early_fixup_exception+0x5d/0xb0 Feb 03 09:39:43 kernel: ? early_idt_handler_common+0x2f/0x3a Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? static_key_enable+0x1a/0x20 Feb 03 09:39:43 kernel: ? security_add_hooks+0xc9/0x120 Feb 03 09:39:43 kernel: ? lockdown_lsm_init+0x21/0x30 Feb 03 09:39:43 kernel: ? initialize_lsm+0x34/0x60 Feb 03 09:39:43 kernel: ? early_security_init+0x3d/0x50 Feb 03 09:39:43 kernel: ? start_kernel+0x66/0xa00 Feb 03 09:39:43 kernel: ? x86_64_start_reservations+0x24/0x30 Feb 03 09:39:43 kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 03 09:39:43 kernel: ? common_startup_64+0x13e/0x141 Feb 03 09:39:43 kernel: </TASK> Feb 03 09:39:43 kernel: ---[ end trace 0000000000000000 ]--- Feb 03 09:39:43 kernel: Command line: BOOT_IMAGE=(hd0,gpt2)/vmlinuz-6.12.12-200.fc41.x86_64 root=UUID=9d8c901c-67b2-493d-b524-c358eb91ff07 ro rootflags=subvol=root rd.luks.uuid=luks-8b9b6486-cbbf-4aa6-9edf-4668ba5d97af rhgb quiet ...

Framework 13 AMD 7840U, btrfs on LUKS, GNOME on Wayland; not seeing any regressions.

Tested with https://webrtc.github.io/test-pages/ - 1.18.4-2 was failing, 1.18.4-3 works.

Framework 13 AMD 7840U, no regressions. LUKS, btrfs, GNOME on Wayland.

Works, no regressions spotted on Framework 13 AMD 7840U with LUKS/btrfs and GNOME on Wayland.

karma

LGTM on a Framework 13 AMD 7840U. -2 was hitting #2299031, this looks good.

BZ#2299031 mesa 24.1.4 breaks AV1 video playback in firefox on amdgpu
karma

LGTM on a Framework 13 AMD 7840U laptop. LUKS, btrfs, GNOME on Wayland.

karma

Thanks for the merge! LGTM, user mode virtiofs working here between F40 guest and host.

karma

Works here; Framework 13 AMD 7840 U, btrfs on LUKS, GNOME on Wayland.

karma

No regressions noted. Framework 13 AMD 7840U, Secure boot enabled, LUKS/btrfs, GNOME/Wayland.

LGTM; no regressions on a Framework 13 AMD 7840U; Secure boot enabled, LUKS+btrfs, GNOME on Wayland.

LGTM on Framework 13 AMD 7840U. dracut is at 101-1.fc40. btrfs on LUKS, GNOME on Wayland.

LGTM on Framework 13 AMD 7840U. UEFI Secure Boot enabled, luks with btrfs, GNOME on Wayland.

@js314592 you should also be able to downgrade from the command line with

sudo dnf -y install fedora-repos-archive
sudo dnf --enablerepo updates-archive downgrade dracut

then run dracut again for 6.8.11.

Might want to set enabled=0 in /etc/yum.repos.d/fedora-updates-archive.repo so it doesn't get considered by default.

karma

Despite the reported issue at https://bodhi.fedoraproject.org/updates/FEDORA-2024-92664ae6fe#comment-3529261 this worked for me. dracut --force followed by successful reboot with kernel 6.8.10-300.fc40.x86_64. cc @tyrbiter

LGTM here on a Framework laptop 13 AMD 7840U UEFI LUKS btrfs GNOME Wayland.

@tyrbiter did you also update dracut (https://bodhi.fedoraproject.org/updates/FEDORA-2024-6f919aaf6d) before updating the kernel by any chance?

BZ#2279206 keepassxc-2.7.8 is available

LGTM, also fixes the segfault when locking the desktop with the vault unlocked: https://github.com/keepassxreboot/keepassxc/issues/10432

karma

LGTM: Framework laptop 13 AMD 7840U UEFI secure boot / LUKS / btrfs / GNOME / Wayland

BZ#2276375 Missing randomized slab caches for normal kmalloc: enable CONFIG_RANDOM_KMALLOC_CACHES=y

LGTM on Framework laptop 13 AMD 7840U; Secure Boot/LUKS/btrfs/GNOME/Wayland