obsolete

kernel-6.12.12-100.fc40

FEDORA-2025-f391621af2 created by jforbes 2 months ago for Fedora 40

The 6.12.12 stable kernel update contains a number of important fixes across the tree.

Reboot Required
After installing this update it is required that you reboot your system to ensure the changes supplied by this update are applied properly.

This update has been submitted for testing by jforbes.

2 months ago

This update's test gating status has been changed to 'waiting'.

2 months ago

This update's test gating status has been changed to 'waiting'.

2 months ago

This update's test gating status has been changed to 'failed'.

2 months ago

This update's test gating status has been changed to 'passed'.

2 months ago
User Icon bretth commented & provided feedback 2 months ago
karma

default & performance tests pass (KVM)

This update has been pushed to testing.

2 months ago
User Icon nixuser commented & provided feedback 2 months ago
karma

Working fine here as a VirtualBox guest.

This update can be pushed to stable now if the maintainer wishes

2 months ago
User Icon vtrefny provided feedback 2 months ago
karma
User Icon derekenz commented & provided feedback 2 months ago
karma

Works

AMD Ryzen 5. Both tests PASS.

karma

Works.

Linux version 6.12.12-100.fc40.x86_64 (mockbuild@ff5bb2f6aa1f4f82b5e7abd11b40f650) (gcc (GCC) 14.2.1 20240912 (Red Hat 14.2.1-3), GNU ld version 2.41-38.fc40) #1 SMP PREEMPT_DYNAMIC Sat Feb  1 19:04:39 UTC 2025
------------[ cut here ]------------
WARNING: CPU: 0 PID: 0 at kernel/static_call_inline.c:153 __static_call_update+0x18c/0x1f0
Modules linked in:
CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.12.12-100.fc40.x86_64 #1
RIP: 0010:__static_call_update+0x18c/0x1f0
Code: 80 3d 0b 7a 88 02 00 0f 85 7b ff ff ff 4c 89 f6 48 c7 c7 50 17 e7 85 c6 05 f4 79 88 02 01 e8 eb 6b d8 ff 0f 0b e9 5e ff ff ff <0f> 0b 48 c7 c7 40 62 a0 86 e8 26 27 eb 00 48 8b 44 24 28 65 48 2b
RSP: 0000:ffffffff86803e28 EFLAGS: 00010046 ORIG_RAX: 0000000000000000
RAX: 0000000000000000 RBX: ffffffff8522a658 RCX: 0000000059a323e9
RDX: 0000000000000000 RSI: ffffffff87774a70 RDI: ffffffff86872100
RBP: ffffffff86aa9d30 R08: 00000000ff59a323 R09: 2039333a34303a39
R10: 3032204354552039 R11: 333a34303a393120 R12: ffffffff856d4150
R13: 0000000000000002 R14: ffffffff847c4980 R15: 000000007ffff000
FS:  0000000000000000(0000) GS:ffffffff87292000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff88807de2e000 CR3: 00000002523a4000 CR4: 00000000000000f0
Call Trace:
 <TASK>
 ? __static_call_update+0x18c/0x1f0
 ? __warn.cold+0x93/0xfa
 ? __static_call_update+0x18c/0x1f0
 ? report_bug+0xff/0x140
 ? __pfx_lockdown_is_locked_down+0x10/0x10
 ? early_fixup_exception+0x5d/0xb0
 ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8
 ? early_idt_handler_common+0x2f/0x3a
 ? __pfx_lockdown_is_locked_down+0x10/0x10
 ? __SCT__lsm_static_call_bpf_token_capable_9+0x8/0x8
 ? __static_call_update+0x18c/0x1f0
 ? __static_call_update+0x7e/0x1f0
 ? __pfx_lockdown_is_locked_down+0x10/0x10
 ? security_add_hooks+0xb8/0x120
 ? lockdown_lsm_init+0x21/0x30
 ? initialize_lsm+0x34/0x60
 ? early_security_init+0x3d/0x50
 ? start_kernel+0x66/0xa00
 ? x86_64_start_reservations+0x24/0x30
 ? x86_64_start_kernel+0xed/0xf0
 ? common_startup_64+0x13e/0x141
 </TASK>
---[ end trace 0000000000000000 ]---
------------[ cut here ]------------
static_key_enable_cpuslocked(): static key 'security_hook_active_lock_kernel_down_0+0x0/0x10' used before call to   jump_label_init()
WARNING: CPU: 0 PID: 0 at kernel/jump_label.c:199 static_key_enable_cpuslocked+0x8c/0x90

This update has been obsoleted by kernel-6.12.13-100.fc40.

2 months ago

Please login to add feedback.

Metadata
Type
bugfix
Karma
5
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
disabled
Thresholds
Minimum Karma
+2
Minimum Testing
14 days
Dates
submitted
2 months ago
in testing
2 months ago
approved
2 months ago

Automated Test Results

Test Cases

0 5 Test Case kernel regression