The 6.12.12 stable kernel update contains a number of important fixes across the tree.
This update has been submitted for testing by jforbes.
This update's test gating status has been changed to 'waiting'.
This update's test gating status has been changed to 'failed'.
This update's test gating status has been changed to 'passed'.
default & performance tests pass (KVM)
This update has been pushed to testing.
Working fine here as a VirtualBox guest.
This update can be pushed to stable now if the maintainer wishes
Works
AMD Ryzen 5. Both tests PASS.
Works.
Linux version 6.12.12-100.fc40.x86_64 (mockbuild@ff5bb2f6aa1f4f82b5e7abd11b40f650) (gcc (GCC) 14.2.1 20240912 (Red Hat 14.2.1-3), GNU ld version 2.41-38.fc40) #1 SMP PREEMPT_DYNAMIC Sat Feb 1 19:04:39 UTC 2025 ------------[ cut here ]------------ WARNING: CPU: 0 PID: 0 at kernel/static_call_inline.c:153 __static_call_update+0x18c/0x1f0 Modules linked in: CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.12.12-100.fc40.x86_64 #1 RIP: 0010:__static_call_update+0x18c/0x1f0 Code: 80 3d 0b 7a 88 02 00 0f 85 7b ff ff ff 4c 89 f6 48 c7 c7 50 17 e7 85 c6 05 f4 79 88 02 01 e8 eb 6b d8 ff 0f 0b e9 5e ff ff ff <0f> 0b 48 c7 c7 40 62 a0 86 e8 26 27 eb 00 48 8b 44 24 28 65 48 2b RSP: 0000:ffffffff86803e28 EFLAGS: 00010046 ORIG_RAX: 0000000000000000 RAX: 0000000000000000 RBX: ffffffff8522a658 RCX: 0000000059a323e9 RDX: 0000000000000000 RSI: ffffffff87774a70 RDI: ffffffff86872100 RBP: ffffffff86aa9d30 R08: 00000000ff59a323 R09: 2039333a34303a39 R10: 3032204354552039 R11: 333a34303a393120 R12: ffffffff856d4150 R13: 0000000000000002 R14: ffffffff847c4980 R15: 000000007ffff000 FS: 0000000000000000(0000) GS:ffffffff87292000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: ffff88807de2e000 CR3: 00000002523a4000 CR4: 00000000000000f0 Call Trace: <TASK> ? __static_call_update+0x18c/0x1f0 ? __warn.cold+0x93/0xfa ? __static_call_update+0x18c/0x1f0 ? report_bug+0xff/0x140 ? __pfx_lockdown_is_locked_down+0x10/0x10 ? early_fixup_exception+0x5d/0xb0 ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8 ? early_idt_handler_common+0x2f/0x3a ? __pfx_lockdown_is_locked_down+0x10/0x10 ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8 ? __static_call_update+0x18c/0x1f0 ? __static_call_update+0x7e/0x1f0 ? __pfx_lockdown_is_locked_down+0x10/0x10 ? security_add_hooks+0xb8/0x120 ? lockdown_lsm_init+0x21/0x30 ? initialize_lsm+0x34/0x60 ? early_security_init+0x3d/0x50 ? start_kernel+0x66/0xa00 ? x86_64_start_reservations+0x24/0x30 ? x86_64_start_kernel+0xed/0xf0 ? common_startup_64+0x13e/0x141 </TASK> ---[ end trace 0000000000000000 ]--- ------------[ cut here ]------------ static_key_enable_cpuslocked(): static key 'security_hook_active_lock_kernel_down_0+0x0/0x10' used before call to jump_label_init() WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90
This update has been obsoleted by kernel-6.12.13-100.fc40.
Please login to add feedback.
Confirm request to re-trigger tests.
This update has been submitted for testing by jforbes.
This update's test gating status has been changed to 'waiting'.
This update's test gating status has been changed to 'waiting'.
This update's test gating status has been changed to 'failed'.
This update's test gating status has been changed to 'passed'.
default & performance tests pass (KVM)
This update has been pushed to testing.
Working fine here as a VirtualBox guest.
This update can be pushed to stable now if the maintainer wishes
Works
AMD Ryzen 5. Both tests PASS.
Works.
This update has been obsoleted by kernel-6.12.13-100.fc40.