The kernel works OK (i.e. no crashes), but right after boot there are these traces others are describing - exactly 3 of them. This happens on bare metal and on EC2 for me. My guess would be the zswap patches that went in: https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.12
Yes, I am also getting similar traces recorded at the top of dmesg. Did not notice at first. The kernel seems to run OK, however, in the simple things I do.
This update has been submitted for testing by jforbes.
This update's test gating status has been changed to 'waiting'.
This update's test gating status has been changed to 'failed'.
Kernel tests passed, running on baremetal i7.
Default (libhugetlbfs, memfd & paxtest skipped) and performance tests pass; works in general.
default & performance tests pass (KVM)
Problems visible at boot:
Feb 02 09:57:32 localhost.localdomain kernel: ------------[ cut here ]------------ Feb 02 09:57:32 localhost.localdomain kernel: WARNING: CPU: 0 PID: 0 at kernel/static_call_inline.c:153 __static_call_update+0x18c/0x1f0 Feb 02 09:57:32 localhost.localdomain kernel: Modules linked in: Feb 02 09:57:32 localhost.localdomain kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.12.12-200.fc41.x86_64 #1 Feb 02 09:57:32 localhost.localdomain kernel: RIP: 0010:__static_call_update+0x18c/0x1f0 Feb 02 09:57:32 localhost.localdomain kernel: Code: 80 3d 4b 77 88 02 00 0f 85 7b ff ff ff 4c 89 f6 48 c7 c7 70 28 e7 98 c6 05 34 77 88 02 01 e8 9b 69 d8 ff 0f 0b e9 5e ff ff ff <0f> 0b 48 c7 c7 40 62 a0 99 e8 46 14 eb 00 48 8b 44 24 28 65 48 2b Feb 02 09:57:32 localhost.localdomain kernel: RSP: 0000:ffffffff99803e28 EFLAGS: 00010046 ORIG_RAX: 0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: RAX: 0000000000000000 RBX: ffffffff98229658 RCX: 0000000059b7e3e9 Feb 02 09:57:32 localhost.localdomain kernel: RDX: 0000000000000000 RSI: ffffffff9a774a70 RDI: ffffffff99872100 Feb 02 09:57:32 localhost.localdomain kernel: RBP: ffffffff99aa9d30 R08: 00000000ff59b7e3 R09: 2038303a32303a39 Feb 02 09:57:32 localhost.localdomain kernel: R10: 3220435455203830 R11: 3a32303a39312031 R12: ffffffff986d4150 Feb 02 09:57:32 localhost.localdomain kernel: R13: 0000000000000002 R14: ffffffff977c4e40 R15: 00000000000947d0 Feb 02 09:57:32 localhost.localdomain kernel: FS: 0000000000000000(0000) GS:ffffffff9a291000(0000) knlGS:0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 02 09:57:32 localhost.localdomain kernel: CR2: ffff8880304ee000 CR3: 000000010d3a4000 CR4: 00000000000000f0 Feb 02 09:57:32 localhost.localdomain kernel: Call Trace: Feb 02 09:57:32 localhost.localdomain kernel: <TASK> Feb 02 09:57:32 localhost.localdomain kernel: ? __static_call_update+0x18c/0x1f0 Feb 02 09:57:32 localhost.localdomain kernel: ? __warn.cold+0x93/0xfa Feb 02 09:57:32 localhost.localdomain kernel: ? __static_call_update+0x18c/0x1f0 Feb 02 09:57:32 localhost.localdomain kernel: ? report_bug+0xff/0x140 Feb 02 09:57:32 localhost.localdomain kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 02 09:57:32 localhost.localdomain kernel: ? early_fixup_exception+0x5d/0xb0 Feb 02 09:57:32 localhost.localdomain kernel: ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8 Feb 02 09:57:32 localhost.localdomain kernel: ? early_idt_handler_common+0x2f/0x3a Feb 02 09:57:32 localhost.localdomain kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 02 09:57:32 localhost.localdomain kernel: ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8 Feb 02 09:57:32 localhost.localdomain kernel: ? __static_call_update+0x18c/0x1f0 Feb 02 09:57:32 localhost.localdomain kernel: ? __static_call_update+0x7e/0x1f0 Feb 02 09:57:32 localhost.localdomain kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 02 09:57:32 localhost.localdomain kernel: ? security_add_hooks+0xb8/0x120 Feb 02 09:57:32 localhost.localdomain kernel: ? lockdown_lsm_init+0x21/0x30 Feb 02 09:57:32 localhost.localdomain kernel: ? initialize_lsm+0x34/0x60 Feb 02 09:57:32 localhost.localdomain kernel: ? early_security_init+0x3d/0x50 Feb 02 09:57:32 localhost.localdomain kernel: ? start_kernel+0x66/0xa00 Feb 02 09:57:32 localhost.localdomain kernel: ? x86_64_start_reservations+0x24/0x30 Feb 02 09:57:32 localhost.localdomain kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 02 09:57:32 localhost.localdomain kernel: ? common_startup_64+0x13e/0x141 Feb 02 09:57:32 localhost.localdomain kernel: </TASK> Feb 02 09:57:32 localhost.localdomain kernel: ---[ end trace 0000000000000000 ]--- Feb 02 09:57:32 localhost.localdomain kernel: ------------[ cut here ]------------ Feb 02 09:57:32 localhost.localdomain kernel: static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init() Feb 02 09:57:32 localhost.localdomain kernel: WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: Modules linked in: Feb 02 09:57:32 localhost.localdomain kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G W 6.12.12-200.fc41.x86_64 #1 Feb 02 09:57:32 localhost.localdomain kernel: Tainted: [W]=WARN Feb 02 09:57:32 localhost.localdomain kernel: RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 99 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 98 48 c7 c7 78 2d e7 98 e8 54 50 d6 ff <0f> 0b eb 86 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f Feb 02 09:57:32 localhost.localdomain kernel: RSP: 0000:ffffffff99803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: RAX: 0000000000000000 RBX: ffffffff9a9285e0 RCX: 000000000000007e Feb 02 09:57:32 localhost.localdomain kernel: RDX: 000000000000007e RSI: 00000000ffffe02a RDI: ffffffff99803d20 Feb 02 09:57:32 localhost.localdomain kernel: RBP: ffffffff98f68498 R08: 0000000020646573 R09: 0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffff986d4150 Feb 02 09:57:32 localhost.localdomain kernel: R13: 0000000000000002 R14: 0000000000000001 R15: 00000000000947d0 Feb 02 09:57:32 localhost.localdomain kernel: FS: 0000000000000000(0000) GS:ffffffff9a291000(0000) knlGS:0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 02 09:57:32 localhost.localdomain kernel: CR2: ffff8880304ee000 CR3: 000000010d3a4000 CR4: 00000000000000f0 Feb 02 09:57:32 localhost.localdomain kernel: Call Trace: Feb 02 09:57:32 localhost.localdomain kernel: <TASK> Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: ? __warn.cold+0x93/0xfa Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: ? report_bug+0xff/0x140 Feb 02 09:57:32 localhost.localdomain kernel: ? early_fixup_exception+0x5d/0xb0 Feb 02 09:57:32 localhost.localdomain kernel: ? early_idt_handler_common+0x2f/0x3a Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable+0x1a/0x20 Feb 02 09:57:32 localhost.localdomain kernel: ? security_add_hooks+0xc9/0x120 Feb 02 09:57:32 localhost.localdomain kernel: ? lockdown_lsm_init+0x21/0x30 Feb 02 09:57:32 localhost.localdomain kernel: ? initialize_lsm+0x34/0x60 Feb 02 09:57:32 localhost.localdomain kernel: ? early_security_init+0x3d/0x50 Feb 02 09:57:32 localhost.localdomain kernel: ? start_kernel+0x66/0xa00 Feb 02 09:57:32 localhost.localdomain kernel: ? x86_64_start_reservations+0x24/0x30 Feb 02 09:57:32 localhost.localdomain kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 02 09:57:32 localhost.localdomain kernel: ? common_startup_64+0x13e/0x141 Feb 02 09:57:32 localhost.localdomain kernel: </TASK> Feb 02 09:57:32 localhost.localdomain kernel: ---[ end trace 0000000000000000 ]--- Feb 02 09:57:32 localhost.localdomain kernel: ------------[ cut here ]------------ Feb 02 09:57:32 localhost.localdomain kernel: static_key_enable_cpuslocked(): static key 'security_hook_active_lock_kernel_down_0+0x0/0x10' used before call to jump_label_init() Feb 02 09:57:32 localhost.localdomain kernel: WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: Modules linked in: Feb 02 09:57:32 localhost.localdomain kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G W 6.12.12-200.fc41.x86_64 #1 Feb 02 09:57:32 localhost.localdomain kernel: Tainted: [W]=WARN Feb 02 09:57:32 localhost.localdomain kernel: RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 99 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 98 48 c7 c7 78 2d e7 98 e8 54 50 d6 ff <0f> 0b eb 86 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f Feb 02 09:57:32 localhost.localdomain kernel: RSP: 0000:ffffffff99803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: RAX: 0000000000000000 RBX: ffffffff9a928540 RCX: 00000000000000ed Feb 02 09:57:32 localhost.localdomain kernel: RDX: 0000000000000083 RSI: 00000000ffffe04f RDI: ffffffff99803d20 Feb 02 09:57:32 localhost.localdomain kernel: RBP: ffffffff98f684b0 R08: 0000000020646573 R09: 0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffff986d4150 Feb 02 09:57:32 localhost.localdomain kernel: R13: 0000000000000002 R14: 0000000000000002 R15: 00000000000947d0 Feb 02 09:57:32 localhost.localdomain kernel: FS: 0000000000000000(0000) GS:ffffffff9a291000(0000) knlGS:0000000000000000 Feb 02 09:57:32 localhost.localdomain kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 02 09:57:32 localhost.localdomain kernel: CR2: ffff8880304ee000 CR3: 000000010d3a4000 CR4: 00000000000000f0 Feb 02 09:57:32 localhost.localdomain kernel: Call Trace: Feb 02 09:57:32 localhost.localdomain kernel: <TASK> Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: ? __warn.cold+0x93/0xfa Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: ? report_bug+0xff/0x140 Feb 02 09:57:32 localhost.localdomain kernel: ? early_fixup_exception+0x5d/0xb0 Feb 02 09:57:32 localhost.localdomain kernel: ? early_idt_handler_common+0x2f/0x3a Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 02 09:57:32 localhost.localdomain kernel: ? static_key_enable+0x1a/0x20 Feb 02 09:57:32 localhost.localdomain kernel: ? security_add_hooks+0xc9/0x120 Feb 02 09:57:32 localhost.localdomain kernel: ? lockdown_lsm_init+0x21/0x30 Feb 02 09:57:32 localhost.localdomain kernel: ? initialize_lsm+0x34/0x60 Feb 02 09:57:32 localhost.localdomain kernel: ? early_security_init+0x3d/0x50 Feb 02 09:57:32 localhost.localdomain kernel: ? start_kernel+0x66/0xa00 Feb 02 09:57:32 localhost.localdomain kernel: ? x86_64_start_reservations+0x24/0x30 Feb 02 09:57:32 localhost.localdomain kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 02 09:57:32 localhost.localdomain kernel: ? common_startup_64+0x13e/0x141 Feb 02 09:57:32 localhost.localdomain kernel: </TASK> Feb 02 09:57:32 localhost.localdomain kernel: ---[ end trace 0000000000000000 ]---
This update has been pushed to testing.
Works.
Looks OK here.
Seems to work fine on bare-metal Lenovo ThinkPad L390 with UEFI and SecureBoot. No issues to report so far and kernel regression tests PASS.
Tests passed on bare-metal. 12th Gen Intel, AMD7900TXT, MSI Motherboard
This update's test gating status has been changed to 'passed'.
This update can be pushed to stable now if the maintainer wishes
I'm also getting warnings under a KVM/qemu virtual machine:
Works well. Ryzen 3700x, Rog Strix B550-F, Nvidia from rpmfusion. ee1004 module loading without failures.
same traces were logged here as well. The kernel testsuite did not fail though.
test suite applied
Also getting stack traces here immediately upon boot. Bare metal Framework 13 AMD 7840U.
Feb 03 09:39:43 kernel: Linux version 6.12.12-200.fc41.x86_64 (mockbuild@705a0f43f2254ed2aafbd5bf2b9db346) (gcc (GCC) 14.2.1 20250110 (Red Hat 14.2.1-7), GNU ld version 2.43.1-5.fc41) #1 SMP PREEMPT_DYNAMIC Sat Feb 1 19:02:08 UTC 2025 Feb 03 09:39:43 kernel: ------------[ cut here ]------------ Feb 03 09:39:43 kernel: WARNING: CPU: 0 PID: 0 at kernel/static_call_inline.c:153 __static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: Modules linked in: Feb 03 09:39:43 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.12.12-200.fc41.x86_64 #1 Feb 03 09:39:43 kernel: RIP: 0010:__static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: Code: 80 3d 4b 77 88 02 00 0f 85 7b ff ff ff 4c 89 f6 48 c7 c7 70 28 e7 95 c6 05 34 77 88 02 01 e8 9b 69 d8 ff 0f 0b e9 5e ff ff ff <0f> 0b 48 c7 c7 40 62 a0 96 e8 46 14 eb 00 48 8b 44 24 28 65 48 2b Feb 03 09:39:43 kernel: RSP: 0000:ffffffff96803e28 EFLAGS: 00010046 ORIG_RAX: 0000000000000000 Feb 03 09:39:43 kernel: RAX: 0000000000000000 RBX: ffffffff95229658 RCX: 0000000059b7e3e9 Feb 03 09:39:43 kernel: RDX: 0000000000000000 RSI: ffffffff97774a70 RDI: ffffffff96872100 Feb 03 09:39:43 kernel: RBP: ffffffff96aa9d30 R08: 00000000ff59b7e3 R09: 2038303a32303a39 Feb 03 09:39:43 kernel: R10: 3220435455203830 R11: 3a32303a39312031 R12: ffffffff956d4150 Feb 03 09:39:43 kernel: R13: 0000000000000002 R14: ffffffff947c4e40 R15: 0000000047c1b000 Feb 03 09:39:43 kernel: FS: 0000000000000000(0000) GS:ffffffff97291000(0000) knlGS:0000000000000000 Feb 03 09:39:43 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 03 09:39:43 kernel: CR2: ffff888043d61000 CR3: 00000009c73a4000 CR4: 00000000000000b0 Feb 03 09:39:43 kernel: Call Trace: Feb 03 09:39:43 kernel: <TASK> Feb 03 09:39:43 kernel: ? __static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: ? __warn.cold+0x93/0xfa Feb 03 09:39:43 kernel: ? __static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: ? report_bug+0xff/0x140 Feb 03 09:39:43 kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 03 09:39:43 kernel: ? early_fixup_exception+0x5d/0xb0 Feb 03 09:39:43 kernel: ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8 Feb 03 09:39:43 kernel: ? early_idt_handler_common+0x2f/0x3a Feb 03 09:39:43 kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 03 09:39:43 kernel: ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8 Feb 03 09:39:43 kernel: ? __static_call_update+0x18c/0x1f0 Feb 03 09:39:43 kernel: ? __static_call_update+0x7e/0x1f0 Feb 03 09:39:43 kernel: ? __pfx_lockdown_is_locked_down+0x10/0x10 Feb 03 09:39:43 kernel: ? security_add_hooks+0xb8/0x120 Feb 03 09:39:43 kernel: ? lockdown_lsm_init+0x21/0x30 Feb 03 09:39:43 kernel: ? initialize_lsm+0x34/0x60 Feb 03 09:39:43 kernel: ? early_security_init+0x3d/0x50 Feb 03 09:39:43 kernel: ? start_kernel+0x66/0xa00 Feb 03 09:39:43 kernel: ? x86_64_start_reservations+0x24/0x30 Feb 03 09:39:43 kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 03 09:39:43 kernel: ? common_startup_64+0x13e/0x141 Feb 03 09:39:43 kernel: </TASK> Feb 03 09:39:43 kernel: ---[ end trace 0000000000000000 ]--- Feb 03 09:39:43 kernel: ------------[ cut here ]------------ Feb 03 09:39:43 kernel: static_key_enable_cpuslocked(): static key 'security_hook_active_locked_down_0+0x0/0x10' used before call to jump_label_init() Feb 03 09:39:43 kernel: WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: Modules linked in: Feb 03 09:39:43 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G W 6.12.12-200.fc41.x86_64 #1 Feb 03 09:39:43 kernel: Tainted: [W]=WARN Feb 03 09:39:43 kernel: RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 96 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 95 48 c7 c7 78 2d e7 95 e8 54 50 d6 ff <0f> 0b eb 86 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f Feb 03 09:39:43 kernel: RSP: 0000:ffffffff96803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000 Feb 03 09:39:43 kernel: RAX: 0000000000000000 RBX: ffffffff979285e0 RCX: 000000000000007e Feb 03 09:39:43 kernel: RDX: 000000000000007e RSI: 00000000ffffe02a RDI: ffffffff96803d20 Feb 03 09:39:43 kernel: RBP: ffffffff95f68498 R08: 0000000020646573 R09: 0000000000000000 Feb 03 09:39:43 kernel: R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffff956d4150 Feb 03 09:39:43 kernel: R13: 0000000000000002 R14: 0000000000000001 R15: 0000000047c1b000 Feb 03 09:39:43 kernel: FS: 0000000000000000(0000) GS:ffffffff97291000(0000) knlGS:0000000000000000 Feb 03 09:39:43 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 03 09:39:43 kernel: CR2: ffff888043d61000 CR3: 00000009c73a4000 CR4: 00000000000000b0 Feb 03 09:39:43 kernel: Call Trace: Feb 03 09:39:43 kernel: <TASK> Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? __warn.cold+0x93/0xfa Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? report_bug+0xff/0x140 Feb 03 09:39:43 kernel: ? early_fixup_exception+0x5d/0xb0 Feb 03 09:39:43 kernel: ? early_idt_handler_common+0x2f/0x3a Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? static_key_enable+0x1a/0x20 Feb 03 09:39:43 kernel: ? security_add_hooks+0xc9/0x120 Feb 03 09:39:43 kernel: ? lockdown_lsm_init+0x21/0x30 Feb 03 09:39:43 kernel: ? initialize_lsm+0x34/0x60 Feb 03 09:39:43 kernel: ? early_security_init+0x3d/0x50 Feb 03 09:39:43 kernel: ? start_kernel+0x66/0xa00 Feb 03 09:39:43 kernel: ? x86_64_start_reservations+0x24/0x30 Feb 03 09:39:43 kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 03 09:39:43 kernel: ? common_startup_64+0x13e/0x141 Feb 03 09:39:43 kernel: </TASK> Feb 03 09:39:43 kernel: ---[ end trace 0000000000000000 ]--- Feb 03 09:39:43 kernel: ------------[ cut here ]------------ Feb 03 09:39:43 kernel: static_key_enable_cpuslocked(): static key 'security_hook_active_lock_kernel_down_0+0x0/0x10' used before call to jump_label_init() Feb 03 09:39:43 kernel: WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: Modules linked in: Feb 03 09:39:43 kernel: CPU: 0 UID: 0 PID: 0 Comm: swapper Tainted: G W 6.12.12-200.fc41.x86_64 #1 Feb 03 09:39:43 kernel: Tainted: [W]=WARN Feb 03 09:39:43 kernel: RIP: 0010:static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: Code: ff c7 03 01 00 00 00 48 c7 c7 e0 8d a0 96 5b e9 2a fb e8 00 48 89 fa 48 c7 c6 e0 70 67 95 48 c7 c7 78 2d e7 95 e8 54 50 d6 ff <0f> 0b eb 86 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f Feb 03 09:39:43 kernel: RSP: 0000:ffffffff96803e70 EFLAGS: 00010086 ORIG_RAX: 0000000000000000 Feb 03 09:39:43 kernel: RAX: 0000000000000000 RBX: ffffffff97928540 RCX: 00000000000000ed Feb 03 09:39:43 kernel: RDX: 0000000000000083 RSI: 00000000ffffe04f RDI: ffffffff96803d20 Feb 03 09:39:43 kernel: RBP: ffffffff95f684b0 R08: 0000000020646573 R09: 0000000000000000 Feb 03 09:39:43 kernel: R10: 6a206f74206c6c61 R11: 0000000000000000 R12: ffffffff956d4150 Feb 03 09:39:43 kernel: R13: 0000000000000002 R14: 0000000000000002 R15: 0000000047c1b000 Feb 03 09:39:43 kernel: FS: 0000000000000000(0000) GS:ffffffff97291000(0000) knlGS:0000000000000000 Feb 03 09:39:43 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Feb 03 09:39:43 kernel: CR2: ffff888043d61000 CR3: 00000009c73a4000 CR4: 00000000000000b0 Feb 03 09:39:43 kernel: Call Trace: Feb 03 09:39:43 kernel: <TASK> Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? __warn.cold+0x93/0xfa Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? report_bug+0xff/0x140 Feb 03 09:39:43 kernel: ? early_fixup_exception+0x5d/0xb0 Feb 03 09:39:43 kernel: ? early_idt_handler_common+0x2f/0x3a Feb 03 09:39:43 kernel: ? static_key_enable_cpuslocked+0x8c/0x90 Feb 03 09:39:43 kernel: ? static_key_enable+0x1a/0x20 Feb 03 09:39:43 kernel: ? security_add_hooks+0xc9/0x120 Feb 03 09:39:43 kernel: ? lockdown_lsm_init+0x21/0x30 Feb 03 09:39:43 kernel: ? initialize_lsm+0x34/0x60 Feb 03 09:39:43 kernel: ? early_security_init+0x3d/0x50 Feb 03 09:39:43 kernel: ? start_kernel+0x66/0xa00 Feb 03 09:39:43 kernel: ? x86_64_start_reservations+0x24/0x30 Feb 03 09:39:43 kernel: ? x86_64_start_kernel+0xed/0xf0 Feb 03 09:39:43 kernel: ? common_startup_64+0x13e/0x141 Feb 03 09:39:43 kernel: </TASK> Feb 03 09:39:43 kernel: ---[ end trace 0000000000000000 ]--- Feb 03 09:39:43 kernel: Command line: BOOT_IMAGE=(hd0,gpt2)/vmlinuz-6.12.12-200.fc41.x86_64 root=UUID=9d8c901c-67b2-493d-b524-c358eb91ff07 ro rootflags=subvol=root rd.luks.uuid=luks-8b9b6486-cbbf-4aa6-9edf-4668ba5d97af rhgb quiet ...
Works for me.
AMD Ryzen 5. Both tests PASS.
The kernel works OK (i.e. no crashes), but right after boot there are these traces others are describing - exactly 3 of them. This happens on bare metal and on EC2 for me. My guess would be the zswap patches that went in: https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.12
Similar stack traces on my Ryzen 9 7900 - Deskmini x600.
no issues on Thinkpad P1 Gen4
Yes, I am also getting similar traces recorded at the top of dmesg. Did not notice at first. The kernel seems to run OK, however, in the simple things I do.
Same stack trace but seems to work?
fails to boot (kernel panic).
No issues seen on Intel Xeon with Dell Precision Tower 7810
Works for me.
CPU: quad core Intel Core i5-7300HQ - Kernel: 6.12.12-200.fc41.x86_64 Intel HD Graphics 630 driver: i915 - NVIDIA GP107M [GeForce GTX 1050 Ti Mobile] driver: nvidia Display: wayland server: X.org v: 1.21.1.15 with: Xwayland v: 24.1.5
This update has been obsoleted by kernel-6.12.13-200.fc41.