obsolete

kernel-6.12.12-200.fc41

FEDORA-2025-d00af34217 created by jforbes a month ago for Fedora 41

The 6.12.12 stable kernel update contains a number of important fixes across the tree.

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

This update has been submitted for testing by jforbes.

a month ago

This update's test gating status has been changed to 'waiting'.

a month ago

This update's test gating status has been changed to 'failed'.

a month ago
User Icon geraldosimiao commented & provided feedback a month ago
karma

Kernel tests passed, running on baremetal i7.

User Icon itrymybest80 commented & provided feedback a month ago
karma

Default (libhugetlbfs, memfd & paxtest skipped) and performance tests pass; works in general.

User Icon bretth commented & provided feedback a month ago
karma

default & performance tests pass (KVM)

Problems visible at boot:

Feb 02 09:57:32 localhost.localdomain kernel: ------------[ cut here ]------------ Feb 02 09:57:32 localhost.localdomain kernel: WARNING: CPU: 0 PID: 0 at kernel/static_call_inline.c:153 __static_call_update+0x18c/0x1f0 Feb 02 09:57:32 localhost.localdomain kernel: Modules linked in: Feb 02 09:57:32 localhost.localdomain kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.12.12-200.fc41.x86_64 #1 Feb 02 09:57:32 localhost.localdomain kernel: RIP: 0010:__static_call_update+0x18c/0x1f0 Feb 02 09:57:32 localhost.localdomain kernel: Code: 80 3d 4b 77 88 02 00 0f 85 7b ff ff ff 4c 89 f6 48 c7 c7 70 28 e7 98 c6 05 34 77 88 02 01 e8 9b 69 d8 ff 0f 0b e9 5e ff ff ff <0f> 0b 48 c7 c7 40 62 a0 99 e8 46 14 eb 00 48 8b 44 24 28 65 48 2b Feb 02 09:57:32 localhost.localdomain kernel: RSP: 0000:ffffffff99803e28 EFLAGS: 00010046 ORIG_RAX: 0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: RAX: 0000000000000000 RBX: ffffffff98229658 RCX: 0000000059b7e3e9 Feb 02 09:57:32 localhost.localdomain kernel: RDX: 0000000000000000 RSI: ffffffff9a774a70 RDI: ffffffff99872100 Feb 02 09:57:32 localhost.localdomain kernel: RBP: ffffffff99aa9d30 R08: 00000000ff59b7e3 R09: 2038303a32303a39 Feb 02 09:57:32 localhost.localdomain kernel: R10: 3220435455203830 R11: 3a32303a39312031 R12: ffffffff986d4150 Feb 02 09:57:32 localhost.localdomain kernel: R13: 0000000000000002 R14: ffffffff977c4e40 R15: 00000000000947d0 Feb 02 09:57:32 localhost.localdomain kernel: FS: 0000000000000000(0000) GS:ffffffff9a291000(0000) knlGS:0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 02 09:57:32 localhost.localdomain kernel: CR2: ffff8880304ee000 CR3: 000000010d3a4000 CR4: 00000000000000f0 Feb 02 09:57:32 localhost.localdomain kernel: Call Trace: Feb 02 09:57:32 localhost.localdomain kernel: <TASK> Feb 02 09:57:32 localhost.localdomain kernel: ? __static_call_update+0x18c/0x1f0 Feb 02 09:57:32 localhost.localdomain kernel: ? __warn.cold+0x93/0xfa Feb 02 09:57:32 localhost.localdomain kernel: ? __static_call_update+0x18c/0x1f0 Feb 02 09:57:32 localhost.localdomain kernel: ? report_bug+0xff/0x140 Feb 02 09:57:32 localhost.localdomain kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 02 09:57:32 localhost.localdomain kernel: ? early_fixup_exception+0x5d/0xb0 Feb 02 09:57:32 localhost.localdomain kernel: ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8 Feb 02 09:57:32 localhost.localdomain kernel: ? early_idt_handler_common+0x2f/0x3a Feb 02 09:57:32 localhost.localdomain kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 02 09:57:32 localhost.localdomain kernel: ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8 Feb 02 09:57:32 localhost.localdomain kernel: ? __static_call_update+0x18c/0x1f0 Feb 02 09:57:32 localhost.localdomain kernel: ? __static_call_update+0x7e/0x1f0 Feb 02 09:57:32 localhost.localdomain kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 02 09:57:32 localhost.localdomain kernel: ? security_add_hooks+0xb8/0x120 Feb 02 09:57:32 localhost.localdomain kernel: ? lockdown_lsm_init+0x21/0x30 Feb 02 09:57:32 localhost.localdomain kernel: ? initialize_lsm+0x34/0x60 Feb 02 09:57:32 localhost.localdomain kernel: ? early_security_init+0x3d/0x50 Feb 02 09:57:32 localhost.localdomain kernel: ? start_kernel+0x66/0xa00 Feb 02 09:57:32 localhost.localdomain kernel: ? x86_64_start_reservations+0x24/0x30 Feb 02 09:57:32 localhost.localdomain kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 02 09:57:32 localhost.localdomain kernel: ? common_startup_64+0x13e/0x141 Feb 02 09:57:32 localhost.localdomain kernel: </TASK> Feb 02 09:57:32 localhost.localdomain kernel: ---[ end trace 0000000000000000 ]--- Feb 02 09:57:32 localhost.localdomain kernel: ------------[ cut here ]------------ Feb 02 09:57:32 localhost.localdomain kernel: static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init() Feb 02 09:57:32 localhost.localdomain kernel: WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: Modules linked in: Feb 02 09:57:32 localhost.localdomain kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G W 6.12.12-200.fc41.x86_64 #1 Feb 02 09:57:32 localhost.localdomain kernel: Tainted: [W]=WARN Feb 02 09:57:32 localhost.localdomain kernel: RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 99 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 98 48 c7 c7 78 2d e7 98 e8 54 50 d6 ff <0f> 0b eb 86 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f Feb 02 09:57:32 localhost.localdomain kernel: RSP: 0000:ffffffff99803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: RAX: 0000000000000000 RBX: ffffffff9a9285e0 RCX: 000000000000007e Feb 02 09:57:32 localhost.localdomain kernel: RDX: 000000000000007e RSI: 00000000ffffe02a RDI: ffffffff99803d20 Feb 02 09:57:32 localhost.localdomain kernel: RBP: ffffffff98f68498 R08: 0000000020646573 R09: 0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffff986d4150 Feb 02 09:57:32 localhost.localdomain kernel: R13: 0000000000000002 R14: 0000000000000001 R15: 00000000000947d0 Feb 02 09:57:32 localhost.localdomain kernel: FS: 0000000000000000(0000) GS:ffffffff9a291000(0000) knlGS:0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 02 09:57:32 localhost.localdomain kernel: CR2: ffff8880304ee000 CR3: 000000010d3a4000 CR4: 00000000000000f0 Feb 02 09:57:32 localhost.localdomain kernel: Call Trace: Feb 02 09:57:32 localhost.localdomain kernel: <TASK> Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: ? __warn.cold+0x93/0xfa Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: ? report_bug+0xff/0x140 Feb 02 09:57:32 localhost.localdomain kernel: ? early_fixup_exception+0x5d/0xb0 Feb 02 09:57:32 localhost.localdomain kernel: ? early_idt_handler_common+0x2f/0x3a Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable+0x1a/0x20 Feb 02 09:57:32 localhost.localdomain kernel: ? security_add_hooks+0xc9/0x120 Feb 02 09:57:32 localhost.localdomain kernel: ? lockdown_lsm_init+0x21/0x30 Feb 02 09:57:32 localhost.localdomain kernel: ? initialize_lsm+0x34/0x60 Feb 02 09:57:32 localhost.localdomain kernel: ? early_security_init+0x3d/0x50 Feb 02 09:57:32 localhost.localdomain kernel: ? start_kernel+0x66/0xa00 Feb 02 09:57:32 localhost.localdomain kernel: ? x86_64_start_reservations+0x24/0x30 Feb 02 09:57:32 localhost.localdomain kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 02 09:57:32 localhost.localdomain kernel: ? common_startup_64+0x13e/0x141 Feb 02 09:57:32 localhost.localdomain kernel: </TASK> Feb 02 09:57:32 localhost.localdomain kernel: ---[ end trace 0000000000000000 ]--- Feb 02 09:57:32 localhost.localdomain kernel: ------------[ cut here ]------------ Feb 02 09:57:32 localhost.localdomain kernel: static_key_enable_cpuslocked(): static key 'security_hook_active_lock_kernel_down_0+0x0/0x10' used before call to jump_label_init() Feb 02 09:57:32 localhost.localdomain kernel: WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: Modules linked in: Feb 02 09:57:32 localhost.localdomain kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G W 6.12.12-200.fc41.x86_64 #1 Feb 02 09:57:32 localhost.localdomain kernel: Tainted: [W]=WARN Feb 02 09:57:32 localhost.localdomain kernel: RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 99 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 98 48 c7 c7 78 2d e7 98 e8 54 50 d6 ff <0f> 0b eb 86 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f Feb 02 09:57:32 localhost.localdomain kernel: RSP: 0000:ffffffff99803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: RAX: 0000000000000000 RBX: ffffffff9a928540 RCX: 00000000000000ed Feb 02 09:57:32 localhost.localdomain kernel: RDX: 0000000000000083 RSI: 00000000ffffe04f RDI: ffffffff99803d20 Feb 02 09:57:32 localhost.localdomain kernel: RBP: ffffffff98f684b0 R08: 0000000020646573 R09: 0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffff986d4150 Feb 02 09:57:32 localhost.localdomain kernel: R13: 0000000000000002 R14: 0000000000000002 R15: 00000000000947d0 Feb 02 09:57:32 localhost.localdomain kernel: FS: 0000000000000000(0000) GS:ffffffff9a291000(0000) knlGS:0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 02 09:57:32 localhost.localdomain kernel: CR2: ffff8880304ee000 CR3: 000000010d3a4000 CR4: 00000000000000f0 Feb 02 09:57:32 localhost.localdomain kernel: Call Trace: Feb 02 09:57:32 localhost.localdomain kernel: <TASK> Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: ? __warn.cold+0x93/0xfa Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: ? report_bug+0xff/0x140 Feb 02 09:57:32 localhost.localdomain kernel: ? early_fixup_exception+0x5d/0xb0 Feb 02 09:57:32 localhost.localdomain kernel: ? early_idt_handler_common+0x2f/0x3a Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable+0x1a/0x20 Feb 02 09:57:32 localhost.localdomain kernel: ? security_add_hooks+0xc9/0x120 Feb 02 09:57:32 localhost.localdomain kernel: ? lockdown_lsm_init+0x21/0x30 Feb 02 09:57:32 localhost.localdomain kernel: ? initialize_lsm+0x34/0x60 Feb 02 09:57:32 localhost.localdomain kernel: ? early_security_init+0x3d/0x50 Feb 02 09:57:32 localhost.localdomain kernel: ? start_kernel+0x66/0xa00 Feb 02 09:57:32 localhost.localdomain kernel: ? x86_64_start_reservations+0x24/0x30 Feb 02 09:57:32 localhost.localdomain kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 02 09:57:32 localhost.localdomain kernel: ? common_startup_64+0x13e/0x141 Feb 02 09:57:32 localhost.localdomain kernel: </TASK> Feb 02 09:57:32 localhost.localdomain kernel: ---[ end trace 0000000000000000 ]---

This update has been pushed to testing.

a month ago
User Icon bojan commented & provided feedback a month ago
karma

Works.

User Icon nixuser commented & provided feedback a month ago
karma

Looks OK here.

User Icon tharadash commented & provided feedback a month ago
karma

Seems to work fine on bare-metal Lenovo ThinkPad L390 with UEFI and SecureBoot. No issues to report so far and kernel regression tests PASS.

User Icon tribly-ray commented & provided feedback a month ago
karma

Tests passed on bare-metal. 12th Gen Intel, AMD7900TXT, MSI Motherboard

User Icon vtrefny provided feedback a month ago
karma

This update's test gating status has been changed to 'passed'.

a month ago

This update can be pushed to stable now if the maintainer wishes

a month ago
User Icon ciupicri commented & provided feedback a month ago

I'm also getting warnings under a KVM/qemu virtual machine:

------------[ cut here ]------------
WARNING: CPU: 0 PID: 0 at kernel/static_call_inline.c:153 __static_call_update+0x18c/0x1f0
Modules linked in:
CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.12.12-200.fc41.x86_64 #1
RIP: 0010:__static_call_update+0x18c/0x1f0
Code: 80 3d 4b 77 88 02 00 0f 85 7b ff ff ff 4c 89 f6 48 c7 c7 70 28 e7 b5 c6 05 34 77 88 02 01 e8 9b 69 d8 ff 0f 0b e9 5e ff ff ff <0f> 0b 48 c7 c7 40 62 a0 b6 e8 46 14 eb 00 48 8b 44 24 28 65 48 2b
RSP: 0000:ffffffffb6803e28 EFLAGS: 00010046 ORIG_RAX: 0000000000000000
RAX: 0000000000000000 RBX: ffffffffb5229658 RCX: 0000000059b7e3e9
RDX: 0000000000000000 RSI: ffffffffb7774a70 RDI: ffffffffb6872100
RBP: ffffffffb6aa9d30 R08: 00000000ff59b7e3 R09: 2038303a32303a39
R10: 3220435455203830 R11: 3a32303a39312031 R12: ffffffffb56d4150
R13: 0000000000000002 R14: ffffffffb47c4e40 R15: 000000007e3be000
FS:  0000000000000000(0000) GS:ffffffffb7291000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff88807e3be000 CR3: 000000027b3a4000 CR4: 00000000000000f0
Call Trace:
 <TASK>
 ? __static_call_update+0x18c/0x1f0
 ? __warn.cold+0x93/0xfa
 ? __static_call_update+0x18c/0x1f0
 ? report_bug+0xff/0x140
 ? __pfx_lockdown_is_locked_down+0x10/0x10
 ? early_fixup_exception+0x5d/0xb0
 ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8
 ? early_idt_handler_common+0x2f/0x3a
 ? __pfx_lockdown_is_locked_down+0x10/0x10
 ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8
 ? __static_call_update+0x18c/0x1f0
 ? __static_call_update+0x7e/0x1f0
 ? __pfx_lockdown_is_locked_down+0x10/0x10
 ? security_add_hooks+0xb8/0x120
 ? lockdown_lsm_init+0x21/0x30
 ? initialize_lsm+0x34/0x60
 ? early_security_init+0x3d/0x50
 ? start_kernel+0x66/0xa00
 ? x86_64_start_reservations+0x24/0x30
 ? x86_64_start_kernel+0xed/0xf0
 ? common_startup_64+0x13e/0x141
 </TASK>
---[ end trace 0000000000000000 ]---

------------[ cut here ]------------
static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init()
WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90
Modules linked in:
CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G        W          6.12.12-200.fc41.x86_64 #1
Tainted: [W]=WARN
RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90
Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 b6 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 b5 48 c7 c7 78 2d e7 b5 e8 54 50 d6 ff <0f> 0b eb 86 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f
RSP: 0000:ffffffffb6803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000
RAX: 0000000000000000 RBX: ffffffffb79285e0 RCX: 000000000000007e
RDX: 000000000000007e RSI: 00000000ffffe02a RDI: ffffffffb6803d20
RBP: ffffffffb5f68498 R08: 0000000020646573 R09: 0000000000000000
R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffffb56d4150
R13: 0000000000000002 R14: 0000000000000001 R15: 000000007e3be000
FS:  0000000000000000(0000) GS:ffffffffb7291000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff88807e3be000 CR3: 000000027b3a4000 CR4: 00000000000000f0
Call Trace:
 <TASK>
 ? static_key_enable_cpuslocked+0x8c/0x90
 ? __warn.cold+0x93/0xfa
 ? static_key_enable_cpuslocked+0x8c/0x90
 ? report_bug+0xff/0x140
 ? early_fixup_exception+0x5d/0xb0
 ? early_idt_handler_common+0x2f/0x3a
 ? static_key_enable_cpuslocked+0x8c/0x90
 ? static_key_enable+0x1a/0x20
 ? security_add_hooks+0xc9/0x120
 ? lockdown_lsm_init+0x21/0x30
 ? initialize_lsm+0x34/0x60
 ? early_security_init+0x3d/0x50
 ? start_kernel+0x66/0xa00
 ? x86_64_start_reservations+0x24/0x30
 ? x86_64_start_kernel+0xed/0xf0
 ? common_startup_64+0x13e/0x141
 </TASK>
---[ end trace 0000000000000000 ]---

------------[ cut here ]------------
static_key_enable_cpuslocked(): static key 'security_hook_active_lock_kernel_down_0+0x0/0x10' used before call to jump_label_init()
WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90
Modules linked in:
CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G        W          6.12.12-200.fc41.x86_64 #1
Tainted: [W]=WARN
RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90
Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 b6 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 b5 48 c7 c7 78 2d e7 b5 e8 54 50 d6 ff <0f> 0b eb 86 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f
RSP: 0000:ffffffffb6803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000
RAX: 0000000000000000 RBX: ffffffffb7928540 RCX: 00000000000000ed
RDX: 0000000000000083 RSI: 00000000ffffe04f RDI: ffffffffb6803d20
RBP: ffffffffb5f684b0 R08: 0000000020646573 R09: 0000000000000000
R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffffb56d4150
R13: 0000000000000002 R14: 0000000000000002 R15: 000000007e3be000
FS:  0000000000000000(0000) GS:ffffffffb7291000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff88807e3be000 CR3: 000000027b3a4000 CR4: 00000000000000f0
Call Trace:
 <TASK>
 ? static_key_enable_cpuslocked+0x8c/0x90
 ? __warn.cold+0x93/0xfa
 ? static_key_enable_cpuslocked+0x8c/0x90
 ? report_bug+0xff/0x140
 ? early_fixup_exception+0x5d/0xb0
 ? early_idt_handler_common+0x2f/0x3a
 ? static_key_enable_cpuslocked+0x8c/0x90
 ? static_key_enable+0x1a/0x20
 ? security_add_hooks+0xc9/0x120
 ? lockdown_lsm_init+0x21/0x30
 ? initialize_lsm+0x34/0x60
 ? early_security_init+0x3d/0x50
 ? start_kernel+0x66/0xa00
 ? x86_64_start_reservations+0x24/0x30
 ? x86_64_start_kernel+0xed/0xf0
 ? common_startup_64+0x13e/0x141
 </TASK>
---[ end trace 0000000000000000 ]---
User Icon eifr0980 provided feedback a month ago
karma
User Icon johnh99 commented & provided feedback a month ago
karma

Works well. Ryzen 3700x, Rog Strix B550-F, Nvidia from rpmfusion. ee1004 module loading without failures.

same traces were logged here as well. The kernel testsuite did not fail though.

$ cat /sys/kernel/security/lockdown 
[none] integrity confidentiality
Feb 03 16:10:56 kernel: ------------[ cut here ]------------
Feb 03 16:10:56 kernel: WARNING: CPU: 0 PID: 0 at kernel/static_call_inline.c:153 __static_call_update+0x18c/0x1f0
Feb 03 16:10:56 kernel: Modules linked in:
Feb 03 16:10:56 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.12.12-200.fc41.x86_64 #1
Feb 03 16:10:56 kernel: RIP: 0010:__static_call_update+0x18c/0x1f0
Feb 03 16:10:56 kernel: Code: 80 3d 4b 77 88 02 00 0f 85 7b ff ff ff 4c 89 f6 48 c7 c7 70 28 e7 a4 c6 05 34 77 88 02 01 e8 9b 69 d8 ff 0f 0b e9 5e ff ff ff <0f> 0b 48 c7 c7 
40 62 a0 a5 e8 46 14 eb 00 48 8b 44 24 28 65 48 2b
Feb 03 16:10:56 kernel: RSP: 0000:ffffffffa5803e28 EFLAGS: 00010046 ORIG_RAX: 0000000000000000
Feb 03 16:10:56 kernel: RAX: 0000000000000000 RBX: ffffffffa4229658 RCX: 0000000059b7e3e9
Feb 03 16:10:56 kernel: RDX: 0000000000000000 RSI: ffffffffa6774a70 RDI: ffffffffa5872100
Feb 03 16:10:56 kernel: RBP: ffffffffa5aa9d30 R08: 00000000ff59b7e3 R09: 2038303a32303a39
Feb 03 16:10:56 kernel: R10: 3220435455203830 R11: 3a32303a39312031 R12: ffffffffa46d4150
Feb 03 16:10:56 kernel: R13: 0000000000000002 R14: ffffffffa37c4e40 R15: 00000000322f5000
Feb 03 16:10:56 kernel: FS:  0000000000000000(0000) GS:ffffffffa6291000(0000) knlGS:0000000000000000
Feb 03 16:10:56 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Feb 03 16:10:56 kernel: CR2: ffff88802d0ef000 CR3: 00000004953a4000 CR4: 00000000000000f0
Feb 03 16:10:56 kernel: Call Trace:
Feb 03 16:10:56 kernel:  <TASK>
Feb 03 16:10:56 kernel:  ? __static_call_update+0x18c/0x1f0
Feb 03 16:10:56 kernel:  ? __warn.cold+0x93/0xfa
Feb 03 16:10:56 kernel:  ? __static_call_update+0x18c/0x1f0
Feb 03 16:10:56 kernel:  ? report_bug+0xff/0x140
Feb 03 16:10:56 kernel:  ? __pfx_lockdown_is_locked_down+0x10/0x10
Feb 03 16:10:56 kernel:  ? early_fixup_exception+0x5d/0xb0
Feb 03 16:10:56 kernel:  ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8
Feb 03 16:10:56 kernel:  ? early_idt_handler_common+0x2f/0x3a
Feb 03 16:10:56 kernel:  ? __pfx_lockdown_is_locked_down+0x10/0x10
Feb 03 16:10:56 kernel:  ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8
Feb 03 16:10:56 kernel:  ? __static_call_update+0x18c/0x1f0
Feb 03 16:10:56 kernel:  ? __static_call_update+0x7e/0x1f0
Feb 03 16:10:56 kernel:  ? __pfx_lockdown_is_locked_down+0x10/0x10
Feb 03 16:10:56 kernel:  ? security_add_hooks+0xb8/0x120
Feb 03 16:10:56 kernel:  ? lockdown_lsm_init+0x21/0x30
Feb 03 16:10:56 kernel:  ? initialize_lsm+0x34/0x60
Feb 03 16:10:56 kernel:  ? early_security_init+0x3d/0x50
Feb 03 16:10:56 kernel:  ? start_kernel+0x66/0xa00
Feb 03 16:10:56 kernel:  ? x86_64_start_reservations+0x24/0x30
Feb 03 16:10:56 kernel:  ? x86_64_start_kernel+0xed/0xf0
Feb 03 16:10:56 kernel:  ? common_startup_64+0x13e/0x141
Feb 03 16:10:56 kernel:  </TASK>
Feb 03 16:10:56 kernel: ---[ end trace 0000000000000000 ]---
Feb 03 16:10:56 kernel: ------------[ cut here ]------------
Feb 03 16:10:56 kernel: static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init()
Feb 03 16:10:56 kernel: WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel: Modules linked in:
Feb 03 16:10:56 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G        W          6.12.12-200.fc41.x86_64 #1
Feb 03 16:10:56 kernel: Tainted: [W]=WARN
Feb 03 16:10:56 kernel: RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel: Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 a5 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 a4 48 c7 c7 78 2d e7 a4 e8 54 50 d6 ff <0f> 0b eb 86 90 
90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f
Feb 03 16:10:56 kernel: RSP: 0000:ffffffffa5803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000
Feb 03 16:10:56 kernel: RAX: 0000000000000000 RBX: ffffffffa69285e0 RCX: 000000000000007e
Feb 03 16:10:56 kernel: RDX: 000000000000007e RSI: 00000000ffffe02a RDI: ffffffffa5803d20
Feb 03 16:10:56 kernel: RBP: ffffffffa4f68498 R08: 0000000020646573 R09: 0000000000000000
Feb 03 16:10:56 kernel: R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffffa46d4150
Feb 03 16:10:56 kernel: R13: 0000000000000002 R14: 0000000000000001 R15: 00000000322f5000
Feb 03 16:10:56 kernel: FS:  0000000000000000(0000) GS:ffffffffa6291000(0000) knlGS:0000000000000000
Feb 03 16:10:56 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Feb 03 16:10:56 kernel: CR2: ffff88802d0ef000 CR3: 00000004953a4000 CR4: 00000000000000f0
Feb 03 16:10:56 kernel: Call Trace:
Feb 03 16:10:56 kernel:  <TASK>
Feb 03 16:10:56 kernel:  ? static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel:  ? __warn.cold+0x93/0xfa
Feb 03 16:10:56 kernel:  ? static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel:  ? report_bug+0xff/0x140
Feb 03 16:10:56 kernel:  ? early_fixup_exception+0x5d/0xb0
Feb 03 16:10:56 kernel:  ? early_idt_handler_common+0x2f/0x3a
Feb 03 16:10:56 kernel:  ? static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel:  ? static_key_enable+0x1a/0x20
Feb 03 16:10:56 kernel:  ? security_add_hooks+0xc9/0x120
Feb 03 16:10:56 kernel:  ? lockdown_lsm_init+0x21/0x30
Feb 03 16:10:56 kernel:  ? initialize_lsm+0x34/0x60
Feb 03 16:10:56 kernel:  ? early_security_init+0x3d/0x50
Feb 03 16:10:56 kernel:  ? start_kernel+0x66/0xa00
Feb 03 16:10:56 kernel:  ? x86_64_start_reservations+0x24/0x30
Feb 03 16:10:56 kernel:  ? x86_64_start_kernel+0xed/0xf0
Feb 03 16:10:56 kernel:  ? common_startup_64+0x13e/0x141
Feb 03 16:10:56 kernel:  </TASK>
Feb 03 16:10:56 kernel: ---[ end trace 0000000000000000 ]---
Feb 03 16:10:56 kernel: ------------[ cut here ]------------
Feb 03 16:10:56 kernel: static_key_enable_cpuslocked(): static key 'security_hook_active_lock_kernel_down_0+0x0/0x10' used before call to jump_label_init()
Feb 03 16:10:56 kernel: WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel: Modules linked in:
Feb 03 16:10:56 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G        W          6.12.12-200.fc41.x86_64 #1
Feb 03 16:10:56 kernel: Tainted: [W]=WARN
Feb 03 16:10:56 kernel: RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel: Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 a5 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 a4 48 c7 c7 78 2d e7 a4 e8 54 50 d6 ff <0f> 0b eb 86 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f
Feb 03 16:10:56 kernel: RSP: 0000:ffffffffa5803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000
Feb 03 16:10:56 kernel: RAX: 0000000000000000 RBX: ffffffffa6928540 RCX: 00000000000000ed
Feb 03 16:10:56 kernel: RDX: 0000000000000083 RSI: 00000000ffffe04f RDI: ffffffffa5803d20
Feb 03 16:10:56 kernel: RBP: ffffffffa4f684b0 R08: 0000000020646573 R09: 0000000000000000
Feb 03 16:10:56 kernel: R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffffa46d4150
Feb 03 16:10:56 kernel: R13: 0000000000000002 R14: 0000000000000002 R15: 00000000322f5000
Feb 03 16:10:56 kernel: FS:  0000000000000000(0000) GS:ffffffffa6291000(0000) knlGS:0000000000000000
Feb 03 16:10:56 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Feb 03 16:10:56 kernel: CR2: ffff88802d0ef000 CR3: 00000004953a4000 CR4: 00000000000000f0
Feb 03 16:10:56 kernel: Call Trace:
Feb 03 16:10:56 kernel:  <TASK>
Feb 03 16:10:56 kernel:  ? static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel:  ? __warn.cold+0x93/0xfa
Feb 03 16:10:56 kernel:  ? static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel:  ? report_bug+0xff/0x140
Feb 03 16:10:56 kernel:  ? early_fixup_exception+0x5d/0xb0
Feb 03 16:10:56 kernel:  ? early_idt_handler_common+0x2f/0x3a
Feb 03 16:10:56 kernel:  ? static_key_enable_cpuslocked+0x8c/0x90
Feb 03 16:10:56 kernel:  ? static_key_enable+0x1a/0x20
Feb 03 16:10:56 kernel:  ? security_add_hooks+0xc9/0x120
Feb 03 16:10:56 kernel:  ? lockdown_lsm_init+0x21/0x30
Feb 03 16:10:56 kernel:  ? initialize_lsm+0x34/0x60
Feb 03 16:10:56 kernel:  ? early_security_init+0x3d/0x50
Feb 03 16:10:56 kernel:  ? start_kernel+0x66/0xa00
Feb 03 16:10:56 kernel:  ? x86_64_start_reservations+0x24/0x30
Feb 03 16:10:56 kernel:  ? x86_64_start_kernel+0xed/0xf0
Feb 03 16:10:56 kernel:  ? common_startup_64+0x13e/0x141
Feb 03 16:10:56 kernel:  </TASK>
Feb 03 16:10:56 kernel: ---[ end trace 0000000000000000 ]---

User Icon niels-s commented & provided feedback a month ago
karma

test suite applied

User Icon dimitrisk commented & provided feedback a month ago
karma

Also getting stack traces here immediately upon boot. Bare metal Framework 13 AMD 7840U.

Feb 03 09:39:43 kernel: Linux version 6.12.12-200.fc41.x86_64 (mockbuild@705a0f43f2254ed2aafbd5bf2b9db346) (gcc (GCC) 14.2.1 20250110 (Red Hat 14.2.1-7), GNU ld version 2.43.1-5.fc41) #1 SMP PREEMPT_DYNAMIC Sat Feb 1 19:02:08 UTC 2025 Feb 03 09:39:43 kernel: ------------[ cut here ]------------ Feb 03 09:39:43 kernel: WARNING: CPU: 0 PID: 0 at kernel/static_call_inline.c:153 __static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: Modules linked in: Feb 03 09:39:43 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.12.12-200.fc41.x86_64 #1 Feb 03 09:39:43 kernel: RIP: 0010:__static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: Code: 80 3d 4b 77 88 02 00 0f 85 7b ff ff ff 4c 89 f6 48 c7 c7 70 28 e7 95 c6 05 34 77 88 02 01 e8 9b 69 d8 ff 0f 0b e9 5e ff ff ff <0f> 0b 48 c7 c7 40 62 a0 96 e8 46 14 eb 00 48 8b 44 24 28 65 48 2b Feb 03 09:39:43 kernel: RSP: 0000:ffffffff96803e28 EFLAGS: 00010046 ORIG_RAX: 0000000000000000 Feb 03 09:39:43 kernel: RAX: 0000000000000000 RBX: ffffffff95229658 RCX: 0000000059b7e3e9 Feb 03 09:39:43 kernel: RDX: 0000000000000000 RSI: ffffffff97774a70 RDI: ffffffff96872100 Feb 03 09:39:43 kernel: RBP: ffffffff96aa9d30 R08: 00000000ff59b7e3 R09: 2038303a32303a39 Feb 03 09:39:43 kernel: R10: 3220435455203830 R11: 3a32303a39312031 R12: ffffffff956d4150 Feb 03 09:39:43 kernel: R13: 0000000000000002 R14: ffffffff947c4e40 R15: 0000000047c1b000 Feb 03 09:39:43 kernel: FS: 0000000000000000(0000) GS:ffffffff97291000(0000) knlGS:0000000000000000 Feb 03 09:39:43 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 03 09:39:43 kernel: CR2: ffff888043d61000 CR3: 00000009c73a4000 CR4: 00000000000000b0 Feb 03 09:39:43 kernel: Call Trace: Feb 03 09:39:43 kernel: <TASK> Feb 03 09:39:43 kernel: ? __static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: ? __warn.cold+0x93/0xfa Feb 03 09:39:43 kernel: ? __static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: ? report_bug+0xff/0x140 Feb 03 09:39:43 kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 03 09:39:43 kernel: ? early_fixup_exception+0x5d/0xb0 Feb 03 09:39:43 kernel: ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8 Feb 03 09:39:43 kernel: ? early_idt_handler_common+0x2f/0x3a Feb 03 09:39:43 kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 03 09:39:43 kernel: ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8 Feb 03 09:39:43 kernel: ? __static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: ? __static_call_update+0x7e/0x1f0 Feb 03 09:39:43 kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 03 09:39:43 kernel: ? security_add_hooks+0xb8/0x120 Feb 03 09:39:43 kernel: ? lockdown_lsm_init+0x21/0x30 Feb 03 09:39:43 kernel: ? initialize_lsm+0x34/0x60 Feb 03 09:39:43 kernel: ? early_security_init+0x3d/0x50 Feb 03 09:39:43 kernel: ? start_kernel+0x66/0xa00 Feb 03 09:39:43 kernel: ? x86_64_start_reservations+0x24/0x30 Feb 03 09:39:43 kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 03 09:39:43 kernel: ? common_startup_64+0x13e/0x141 Feb 03 09:39:43 kernel: </TASK> Feb 03 09:39:43 kernel: ---[ end trace 0000000000000000 ]--- Feb 03 09:39:43 kernel: ------------[ cut here ]------------ Feb 03 09:39:43 kernel: static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init() Feb 03 09:39:43 kernel: WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: Modules linked in: Feb 03 09:39:43 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G W 6.12.12-200.fc41.x86_64 #1 Feb 03 09:39:43 kernel: Tainted: [W]=WARN Feb 03 09:39:43 kernel: RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 96 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 95 48 c7 c7 78 2d e7 95 e8 54 50 d6 ff <0f> 0b eb 86 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f Feb 03 09:39:43 kernel: RSP: 0000:ffffffff96803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000 Feb 03 09:39:43 kernel: RAX: 0000000000000000 RBX: ffffffff979285e0 RCX: 000000000000007e Feb 03 09:39:43 kernel: RDX: 000000000000007e RSI: 00000000ffffe02a RDI: ffffffff96803d20 Feb 03 09:39:43 kernel: RBP: ffffffff95f68498 R08: 0000000020646573 R09: 0000000000000000 Feb 03 09:39:43 kernel: R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffff956d4150 Feb 03 09:39:43 kernel: R13: 0000000000000002 R14: 0000000000000001 R15: 0000000047c1b000 Feb 03 09:39:43 kernel: FS: 0000000000000000(0000) GS:ffffffff97291000(0000) knlGS:0000000000000000 Feb 03 09:39:43 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 03 09:39:43 kernel: CR2: ffff888043d61000 CR3: 00000009c73a4000 CR4: 00000000000000b0 Feb 03 09:39:43 kernel: Call Trace: Feb 03 09:39:43 kernel: <TASK> Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? __warn.cold+0x93/0xfa Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? report_bug+0xff/0x140 Feb 03 09:39:43 kernel: ? early_fixup_exception+0x5d/0xb0 Feb 03 09:39:43 kernel: ? early_idt_handler_common+0x2f/0x3a Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? static_key_enable+0x1a/0x20 Feb 03 09:39:43 kernel: ? security_add_hooks+0xc9/0x120 Feb 03 09:39:43 kernel: ? lockdown_lsm_init+0x21/0x30 Feb 03 09:39:43 kernel: ? initialize_lsm+0x34/0x60 Feb 03 09:39:43 kernel: ? early_security_init+0x3d/0x50 Feb 03 09:39:43 kernel: ? start_kernel+0x66/0xa00 Feb 03 09:39:43 kernel: ? x86_64_start_reservations+0x24/0x30 Feb 03 09:39:43 kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 03 09:39:43 kernel: ? common_startup_64+0x13e/0x141 Feb 03 09:39:43 kernel: </TASK> Feb 03 09:39:43 kernel: ---[ end trace 0000000000000000 ]--- Feb 03 09:39:43 kernel: ------------[ cut here ]------------ Feb 03 09:39:43 kernel: static_key_enable_cpuslocked(): static key 'security_hook_active_lock_kernel_down_0+0x0/0x10' used before call to jump_label_init() Feb 03 09:39:43 kernel: WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: Modules linked in: Feb 03 09:39:43 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G W 6.12.12-200.fc41.x86_64 #1 Feb 03 09:39:43 kernel: Tainted: [W]=WARN Feb 03 09:39:43 kernel: RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 96 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 95 48 c7 c7 78 2d e7 95 e8 54 50 d6 ff <0f> 0b eb 86 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f Feb 03 09:39:43 kernel: RSP: 0000:ffffffff96803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000 Feb 03 09:39:43 kernel: RAX: 0000000000000000 RBX: ffffffff97928540 RCX: 00000000000000ed Feb 03 09:39:43 kernel: RDX: 0000000000000083 RSI: 00000000ffffe04f RDI: ffffffff96803d20 Feb 03 09:39:43 kernel: RBP: ffffffff95f684b0 R08: 0000000020646573 R09: 0000000000000000 Feb 03 09:39:43 kernel: R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffff956d4150 Feb 03 09:39:43 kernel: R13: 0000000000000002 R14: 0000000000000002 R15: 0000000047c1b000 Feb 03 09:39:43 kernel: FS: 0000000000000000(0000) GS:ffffffff97291000(0000) knlGS:0000000000000000 Feb 03 09:39:43 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 03 09:39:43 kernel: CR2: ffff888043d61000 CR3: 00000009c73a4000 CR4: 00000000000000b0 Feb 03 09:39:43 kernel: Call Trace: Feb 03 09:39:43 kernel: <TASK> Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? __warn.cold+0x93/0xfa Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? report_bug+0xff/0x140 Feb 03 09:39:43 kernel: ? early_fixup_exception+0x5d/0xb0 Feb 03 09:39:43 kernel: ? early_idt_handler_common+0x2f/0x3a Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? static_key_enable+0x1a/0x20 Feb 03 09:39:43 kernel: ? security_add_hooks+0xc9/0x120 Feb 03 09:39:43 kernel: ? lockdown_lsm_init+0x21/0x30 Feb 03 09:39:43 kernel: ? initialize_lsm+0x34/0x60 Feb 03 09:39:43 kernel: ? early_security_init+0x3d/0x50 Feb 03 09:39:43 kernel: ? start_kernel+0x66/0xa00 Feb 03 09:39:43 kernel: ? x86_64_start_reservations+0x24/0x30 Feb 03 09:39:43 kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 03 09:39:43 kernel: ? common_startup_64+0x13e/0x141 Feb 03 09:39:43 kernel: </TASK> Feb 03 09:39:43 kernel: ---[ end trace 0000000000000000 ]--- Feb 03 09:39:43 kernel: Command line: BOOT_IMAGE=(hd0,gpt2)/vmlinuz-6.12.12-200.fc41.x86_64 root=UUID=9d8c901c-67b2-493d-b524-c358eb91ff07 ro rootflags=subvol=root rd.luks.uuid=luks-8b9b6486-cbbf-4aa6-9edf-4668ba5d97af rhgb quiet ...

User Icon derekenz commented & provided feedback a month ago
karma

Works for me.

AMD Ryzen 5. Both tests PASS.

The kernel works OK (i.e. no crashes), but right after boot there are these traces others are describing - exactly 3 of them. This happens on bare metal and on EC2 for me. My guess would be the zswap patches that went in: https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.12

Similar stack traces on my Ryzen 9 7900 - Deskmini x600.

User Icon kparal commented & provided feedback a month ago
karma

no issues on Thinkpad P1 Gen4

Yes, I am also getting similar traces recorded at the top of dmesg. Did not notice at first. The kernel seems to run OK, however, in the simple things I do.

User Icon markec commented & provided feedback a month ago
karma

Same stack trace but seems to work?

User Icon augenauf commented & provided feedback a month ago
karma

fails to boot (kernel panic).

User Icon lruzicka commented & provided feedback a month ago
karma

No issues seen on Intel Xeon with Dell Precision Tower 7810

User Icon micmor commented & provided feedback a month ago
karma

Works for me.

CPU: quad core Intel Core i5-7300HQ - Kernel: 6.12.12-200.fc41.x86_64 Intel HD Graphics 630 driver: i915 - NVIDIA GP107M [GeForce GTX 1050 Ti Mobile] driver: nvidia Display: wayland server: X.org v: 1.21.1.15 with: Xwayland v: 24.1.5

This update has been obsoleted by kernel-6.12.13-200.fc41.

a month ago

Please login to add feedback.

Metadata
Type
bugfix
Karma
14
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Thresholds
Minimum Karma
+2
Minimum Testing
14 days
Dates
submitted
a month ago
in testing
a month ago
approved
a month ago

Automated Test Results

Test Cases

-1 7 Test Case kernel regression