You are not logged in.
Isn't it strange that only dell laptops have this issue?
Is it unique hardware? I know the IPU6 hardware modules seem to be a bit of a basketcase. I still don't have a clear understanding of the hardware stack. Would this be a Dell issue, or an Intel issue, or kernel issue? I'm pretty green at interpreting kernel oops messages and still have a lot to learn.
Anyway Dell Precision 5680 here, rolling back the kernel got me running again. I'm glad I found this post because I thought it was a "me" problem!
Offline
I have the same issue with an Asus Zephyrus G14, downgrading the kernel worked. Thank you!
My system is AMD-based (CPU and GPU) so it doesn't seem to be Dell or Intel specific.
Last edited by trougnouf (2025-05-04 11:50:12)
Offline
I have the same issue with an Asus Zephyrus G14, downgrading the kernel worked. Thank you!
My system is AMD-based (CPU and GPU) so it doesn't seem to be Dell or Intel specific.
Oh that's interesting. Do you have similar kernel messages to Xwang & ohaagh?
Last edited by MichaelN (2025-05-04 12:50:30)
Offline
Has anybody managed to test 6.14.5?
Offline
Yes,
[...]
May 03 10:35:22 l systemd[1]: Starting Load/Save OS Random Seed...
May 03 10:35:22 l systemd[1]: TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki).
May 03 10:35:22 l systemd[1]: Started User Database Manager.
May 03 10:35:22 l systemd-journald[447]: Journal started
May 03 10:35:22 l systemd-journald[447]: Runtime Journal (/run/log/journal/a0eebd250105450a8336b3dbc0a1d91d) is 8M, max 1.9G>
May 03 10:35:22 l systemd-modules-load[448]: Inserted module 'crypto_user'
May 03 10:35:22 l systemd-modules-load[448]: Inserted module 'i2c_dev'
May 03 10:35:22 l systemd-modules-load[448]: Inserted module 'pkcs8_key_parser'
May 03 10:35:22 l systemd[1]: Started Journal Service.
May 03 10:35:22 l kernel: ------------[ cut here ]------------
May 03 10:35:22 l kernel: memcpy: detected buffer overflow: 1 byte write of buffer size 0
May 03 10:35:22 l kernel: WARNING: CPU: 2 PID: 475 at lib/string_helpers.c:1032 __fortify_report+0x49/0x50
May 03 10:35:22 l kernel: Modules linked in: pkcs8_key_parser i2c_dev crypto_user dm_mod loop nfnetlink ip_tables x_tables b>
May 03 10:35:22 l kernel: CPU: 2 UID: 0 PID: 475 Comm: systemd-random- Not tainted 6.14.4-zen1-2-zen #1 5ebf8709a7a4a4d9e2b7>
May 03 10:35:22 l kernel: Hardware name: ASUSTeK COMPUTER INC. ROG Zephyrus G14 GA402RJ_GA402RJ/GA402RJ, BIOS GA402RJ.319 06>
May 03 10:35:22 l kernel: RIP: 0010:__fortify_report+0x49/0x50
May 03 10:35:22 l kernel: Code: d0 48 0f 47 c2 83 e7 01 4c 89 ca 48 c7 c7 70 ab 5b 9b 48 8b 34 c5 00 ae f0 9a 48 c7 c0 93 ae>
May 03 10:35:22 l kernel: RSP: 0018:ffffbf584e0175b0 EFLAGS: 00010246
May 03 10:35:22 l kernel: RAX: 0000000000000000 RBX: ffffa0db91e38000 RCX: 0000000000000027
May 03 10:35:22 l kernel: RDX: ffffa0e476121908 RSI: 0000000000000001 RDI: ffffa0e476121900
May 03 10:35:22 l kernel: RBP: ffffbf584e017800 R08: 00000000ffffefff R09: 0000000000000003
May 03 10:35:22 l kernel: R10: ffffffff9be5d700 R11: ffffbf584e017400 R12: ffffa0db8816e5a0
May 03 10:35:22 l kernel: R13: 0000000000000009 R14: 0000000000000000 R15: 0000000000000016
May 03 10:35:22 l kernel: FS: 000074b8c707f880(0000) GS:ffffa0e476100000(0000) knlGS:0000000000000000
May 03 10:35:22 l kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
May 03 10:35:22 l kernel: CR2: 000074b8c6fbccc0 CR3: 0000000110764000 CR4: 0000000000f50ef0
May 03 10:35:22 l kernel: PKRU: 55555554
May 03 10:35:22 l kernel: Call Trace:
May 03 10:35:22 l kernel: <TASK>
May 03 10:35:22 l kernel: __fortify_panic+0xd/0xf
May 03 10:35:22 l kernel: bch2_xattr_set.cold+0x13/0x1d9 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? local_clock_noinstr+0xf/0xf0
May 03 10:35:22 l kernel: ? __bch2_subvolume_get_snapshot+0xc0/0x200 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? bch2_btree_path_traverse_one+0x700/0x1270 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? __bch2_time_stats_update+0xe0/0x2b0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? bch2_trans_begin+0x6e8/0x7a0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: bch2_xattr_set_handler+0x16e/0x2f0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? bch2_path_get+0x188/0x520 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? __bch2_inode_peek+0xd1/0x1e0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? bch2_inode_unpack_v3+0x7e7/0x980 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? __bch2_inode_peek+0x128/0x1e0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? bch2_printbuf_exit+0x27/0x40 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? bch2_get_inode_journal_seq_trans+0x133/0x1d0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? __vfs_setxattr_noperm+0x19c/0x280
May 03 10:35:22 l kernel: __vfs_setxattr_noperm+0x19c/0x280
May 03 10:35:22 l kernel: vfs_setxattr+0x10f/0x200
May 03 10:35:22 l kernel: file_setxattr+0xd5/0xf0
May 03 10:35:22 l kernel: path_setxattrat+0x188/0x1f0
May 03 10:35:22 l kernel: __x64_sys_fsetxattr+0x29/0x40
May 03 10:35:22 l kernel: do_syscall_64+0x7b/0x190
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? __x64_sys_openat+0x1f0/0x220
May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x1d6/0x210
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x10/0x210
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? do_syscall_64+0x87/0x190
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? do_user_addr_fault+0x597/0x8a0
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? exc_page_fault+0x81/0x190
May 03 10:35:22 l kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e
May 03 10:35:22 l kernel: RIP: 0033:0x74b8c6b1f02e
May 03 10:35:22 l kernel: Code: 48 8b 0d e5 6c 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e>
May 03 10:35:22 l kernel: RSP: 002b:00007ffd8b358d18 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
May 03 10:35:22 l kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000074b8c6b1f02e
May 03 10:35:22 l kernel: RDX: 000061777a35a0cf RSI: 000061777a35a091 RDI: 0000000000000005
May 03 10:35:22 l kernel: RBP: 00007ffd8b358e60 R08: 0000000000000000 R09: 0000000000000000
May 03 10:35:22 l kernel: R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000005
May 03 10:35:22 l kernel: R13: 0000000000000004 R14: 0000000000000001 R15: 000061779d934ae0
May 03 10:35:22 l kernel: </TASK>
May 03 10:35:22 l kernel: ---[ end trace 0000000000000000 ]---
May 03 10:35:22 l kernel: ------------[ cut here ]------------
May 03 10:35:22 l kernel: kernel BUG at lib/string_helpers.c:1040!
May 03 10:35:22 l kernel: Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
May 03 10:35:22 l kernel: fbcon: Taking over console
May 03 10:35:22 l kernel: CPU: 2 UID: 0 PID: 475 Comm: systemd-random- Tainted: G W 6.14.4-zen1-2-zen #1 5eb>
May 03 10:35:22 l kernel: Tainted: [W]=WARN
May 03 10:35:22 l kernel: Hardware name: ASUSTeK COMPUTER INC. ROG Zephyrus G14 GA402RJ_GA402RJ/GA402RJ, BIOS GA402RJ.319 06>
May 03 10:35:22 l kernel: RIP: 0010:__fortify_panic+0xd/0xf
May 03 10:35:22 l kernel: Code: bf a3 00 e8 75 02 00 00 e9 e3 cf a3 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f>
May 03 10:35:22 l kernel: RSP: 0018:ffffbf584e0175b8 EFLAGS: 00010246
May 03 10:35:22 l kernel: RAX: 0000000000000000 RBX: ffffa0db91e38000 RCX: 0000000000000027
May 03 10:35:22 l kernel: RDX: ffffa0e476121908 RSI: 0000000000000001 RDI: ffffa0e476121900
May 03 10:35:22 l kernel: RBP: ffffbf584e017800 R08: 00000000ffffefff R09: 0000000000000003
May 03 10:35:22 l kernel: R10: ffffffff9be5d700 R11: ffffbf584e017400 R12: ffffa0db8816e5a0
May 03 10:35:22 l kernel: R13: 0000000000000009 R14: 0000000000000000 R15: 0000000000000016
May 03 10:35:22 l kernel: FS: 000074b8c707f880(0000) GS:ffffa0e476100000(0000) knlGS:0000000000000000
May 03 10:35:22 l kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
May 03 10:35:22 l kernel: CR2: 000074b8c6fbccc0 CR3: 0000000110764000 CR4: 0000000000f50ef0
May 03 10:35:22 l kernel: PKRU: 55555554
May 03 10:35:22 l kernel: Call Trace:
May 03 10:35:22 l kernel: <TASK>
May 03 10:35:22 l kernel: bch2_xattr_set.cold+0x13/0x1d9 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? local_clock_noinstr+0xf/0xf0
May 03 10:35:22 l kernel: ? __bch2_subvolume_get_snapshot+0xc0/0x200 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? bch2_btree_path_traverse_one+0x700/0x1270 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? __bch2_time_stats_update+0xe0/0x2b0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? bch2_trans_begin+0x6e8/0x7a0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: bch2_xattr_set_handler+0x16e/0x2f0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? bch2_path_get+0x188/0x520 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? __bch2_inode_peek+0xd1/0x1e0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? bch2_inode_unpack_v3+0x7e7/0x980 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? __bch2_inode_peek+0x128/0x1e0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? bch2_printbuf_exit+0x27/0x40 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? bch2_get_inode_journal_seq_trans+0x133/0x1d0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? __vfs_setxattr_noperm+0x19c/0x280
May 03 10:35:22 l kernel: __vfs_setxattr_noperm+0x19c/0x280
May 03 10:35:22 l kernel: vfs_setxattr+0x10f/0x200
May 03 10:35:22 l kernel: file_setxattr+0xd5/0xf0
May 03 10:35:22 l kernel: path_setxattrat+0x188/0x1f0
May 03 10:35:22 l kernel: __x64_sys_fsetxattr+0x29/0x40
May 03 10:35:22 l kernel: do_syscall_64+0x7b/0x190
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? __x64_sys_openat+0x1f0/0x220
May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x1d6/0x210
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x10/0x210
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? do_syscall_64+0x87/0x190
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? do_user_addr_fault+0x597/0x8a0
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? exc_page_fault+0x81/0x190
May 03 10:35:22 l kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e
May 03 10:35:22 l kernel: RIP: 0033:0x74b8c6b1f02e
May 03 10:35:22 l kernel: Code: 48 8b 0d e5 6c 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e>
May 03 10:35:22 l kernel: RSP: 002b:00007ffd8b358d18 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
May 03 10:35:22 l kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000074b8c6b1f02e
May 03 10:35:22 l kernel: ? bch2_get_inode_journal_seq_trans+0x133/0x1d0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c]
May 03 10:35:22 l kernel: ? __vfs_setxattr_noperm+0x19c/0x280
May 03 10:35:22 l kernel: __vfs_setxattr_noperm+0x19c/0x280
May 03 10:35:22 l kernel: vfs_setxattr+0x10f/0x200
May 03 10:35:22 l kernel: file_setxattr+0xd5/0xf0
May 03 10:35:22 l kernel: path_setxattrat+0x188/0x1f0
May 03 10:35:22 l kernel: __x64_sys_fsetxattr+0x29/0x40
May 03 10:35:22 l kernel: do_syscall_64+0x7b/0x190
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? __x64_sys_openat+0x1f0/0x220
May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x1d6/0x210
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x10/0x210
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? do_syscall_64+0x87/0x190
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? do_user_addr_fault+0x597/0x8a0
May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5
May 03 10:35:22 l kernel: ? exc_page_fault+0x81/0x190
May 03 10:35:22 l kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e
May 03 10:35:22 l kernel: RIP: 0033:0x74b8c6b1f02e
May 03 10:35:22 l kernel: Code: 48 8b 0d e5 6c 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e>
May 03 10:35:22 l kernel: RSP: 002b:00007ffd8b358d18 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
May 03 10:35:22 l kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000074b8c6b1f02e
May 03 10:35:22 l kernel: RDX: 000061777a35a0cf RSI: 000061777a35a091 RDI: 0000000000000005
May 03 10:35:22 l kernel: RBP: 00007ffd8b358e60 R08: 0000000000000000 R09: 0000000000000000
May 03 10:35:22 l kernel: R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000005
May 03 10:35:22 l kernel: R13: 0000000000000004 R14: 0000000000000001 R15: 000061779d934ae0
May 03 10:35:22 l kernel: </TASK>
May 03 10:35:22 l kernel: Modules linked in: pkcs8_key_parser i2c_dev crypto_user dm_mod loop nfnetlink ip_tables x_tables b>
May 03 10:35:22 l kernel: ---[ end trace 0000000000000000 ]---
May 03 10:35:22 l systemd[1]: systemd-random-seed.service: Main process exited, code=killed, status=11/SEGV
May 03 10:35:22 l systemd[1]: systemd-random-seed.service: Failed with result 'signal'.
May 03 10:35:22 l systemd[1]: Failed to start Load/Save OS Random Seed.
May 03 10:35:22 l kernel: RIP: 0010:__fortify_panic+0xd/0xf
May 03 10:35:22 l kernel: Code: bf a3 00 e8 75 02 00 00 e9 e3 cf a3 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f>
May 03 10:35:22 l kernel: RSP: 0018:ffffbf584e0175b8 EFLAGS: 00010246
May 03 10:35:22 l kernel: RAX: 0000000000000000 RBX: ffffa0db91e38000 RCX: 0000000000000027
May 03 10:35:22 l kernel: RDX: ffffa0e476121908 RSI: 0000000000000001 RDI: ffffa0e476121900
May 03 10:35:22 l kernel: RBP: ffffbf584e017800 R08: 00000000ffffefff R09: 0000000000000003
May 03 10:35:22 l kernel: R10: ffffffff9be5d700 R11: ffffbf584e017400 R12: ffffa0db8816e5a0
May 03 10:35:22 l kernel: R13: 0000000000000009 R14: 0000000000000000 R15: 0000000000000016
May 03 10:35:22 l kernel: FS: 000074b8c707f880(0000) GS:ffffa0e476580000(0000) knlGS:0000000000000000
May 03 10:35:22 l kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
May 03 10:35:22 l kernel: CR2: 00007107b52a2010 CR3: 0000000110764000 CR4: 0000000000f50ef0
May 03 10:35:22 l kernel: PKRU: 55555554
May 03 10:35:22 l kernel: Console: switching to colour frame buffer device 160x50
May 03 10:35:22 l systemd[1]: Starting Flush Journal to Persistent Storage...
May 03 10:35:22 l systemd[1]: Finished Create Static Device Nodes in /dev gracefully.
May 03 10:35:22 l systemd[1]: Starting Create System Users...
May 03 10:35:22 l systemd-journald[447]: Time spent on flushing to /var/log/journal/a0eebd250105450a8336b3dbc0a1d91d is 227.>Offline
Another kernel oops with Dell (Latitude 9430) and kernel 6.14.4.arch1-2. No kernel oops with same kernel if camera is deactivated in EFI. No kernel oops if camera is activated in EFI and kernel is 6.12.26-1, but for some reason boot.mount took longer than usual (~11s).
Offline
MichaelN wrote:Yes,
[...] May 03 10:35:22 l systemd[1]: Starting Load/Save OS Random Seed... May 03 10:35:22 l systemd[1]: TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki). May 03 10:35:22 l systemd[1]: Started User Database Manager. May 03 10:35:22 l systemd-journald[447]: Journal started May 03 10:35:22 l systemd-journald[447]: Runtime Journal (/run/log/journal/a0eebd250105450a8336b3dbc0a1d91d) is 8M, max 1.9G> May 03 10:35:22 l systemd-modules-load[448]: Inserted module 'crypto_user' May 03 10:35:22 l systemd-modules-load[448]: Inserted module 'i2c_dev' May 03 10:35:22 l systemd-modules-load[448]: Inserted module 'pkcs8_key_parser' May 03 10:35:22 l systemd[1]: Started Journal Service. May 03 10:35:22 l kernel: ------------[ cut here ]------------ May 03 10:35:22 l kernel: memcpy: detected buffer overflow: 1 byte write of buffer size 0 May 03 10:35:22 l kernel: WARNING: CPU: 2 PID: 475 at lib/string_helpers.c:1032 __fortify_report+0x49/0x50 May 03 10:35:22 l kernel: Modules linked in: pkcs8_key_parser i2c_dev crypto_user dm_mod loop nfnetlink ip_tables x_tables b> May 03 10:35:22 l kernel: CPU: 2 UID: 0 PID: 475 Comm: systemd-random- Not tainted 6.14.4-zen1-2-zen #1 5ebf8709a7a4a4d9e2b7> May 03 10:35:22 l kernel: Hardware name: ASUSTeK COMPUTER INC. ROG Zephyrus G14 GA402RJ_GA402RJ/GA402RJ, BIOS GA402RJ.319 06> May 03 10:35:22 l kernel: RIP: 0010:__fortify_report+0x49/0x50 May 03 10:35:22 l kernel: Code: d0 48 0f 47 c2 83 e7 01 4c 89 ca 48 c7 c7 70 ab 5b 9b 48 8b 34 c5 00 ae f0 9a 48 c7 c0 93 ae> May 03 10:35:22 l kernel: RSP: 0018:ffffbf584e0175b0 EFLAGS: 00010246 May 03 10:35:22 l kernel: RAX: 0000000000000000 RBX: ffffa0db91e38000 RCX: 0000000000000027 May 03 10:35:22 l kernel: RDX: ffffa0e476121908 RSI: 0000000000000001 RDI: ffffa0e476121900 May 03 10:35:22 l kernel: RBP: ffffbf584e017800 R08: 00000000ffffefff R09: 0000000000000003 May 03 10:35:22 l kernel: R10: ffffffff9be5d700 R11: ffffbf584e017400 R12: ffffa0db8816e5a0 May 03 10:35:22 l kernel: R13: 0000000000000009 R14: 0000000000000000 R15: 0000000000000016 May 03 10:35:22 l kernel: FS: 000074b8c707f880(0000) GS:ffffa0e476100000(0000) knlGS:0000000000000000 May 03 10:35:22 l kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 May 03 10:35:22 l kernel: CR2: 000074b8c6fbccc0 CR3: 0000000110764000 CR4: 0000000000f50ef0 May 03 10:35:22 l kernel: PKRU: 55555554 May 03 10:35:22 l kernel: Call Trace: May 03 10:35:22 l kernel: <TASK> May 03 10:35:22 l kernel: __fortify_panic+0xd/0xf May 03 10:35:22 l kernel: bch2_xattr_set.cold+0x13/0x1d9 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? local_clock_noinstr+0xf/0xf0 May 03 10:35:22 l kernel: ? __bch2_subvolume_get_snapshot+0xc0/0x200 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_btree_path_traverse_one+0x700/0x1270 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? __bch2_time_stats_update+0xe0/0x2b0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_trans_begin+0x6e8/0x7a0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: bch2_xattr_set_handler+0x16e/0x2f0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_path_get+0x188/0x520 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? __bch2_inode_peek+0xd1/0x1e0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_inode_unpack_v3+0x7e7/0x980 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? __bch2_inode_peek+0x128/0x1e0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_printbuf_exit+0x27/0x40 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_get_inode_journal_seq_trans+0x133/0x1d0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? __vfs_setxattr_noperm+0x19c/0x280 May 03 10:35:22 l kernel: __vfs_setxattr_noperm+0x19c/0x280 May 03 10:35:22 l kernel: vfs_setxattr+0x10f/0x200 May 03 10:35:22 l kernel: file_setxattr+0xd5/0xf0 May 03 10:35:22 l kernel: path_setxattrat+0x188/0x1f0 May 03 10:35:22 l kernel: __x64_sys_fsetxattr+0x29/0x40 May 03 10:35:22 l kernel: do_syscall_64+0x7b/0x190 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? __x64_sys_openat+0x1f0/0x220 May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x1d6/0x210 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x10/0x210 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? do_syscall_64+0x87/0x190 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? do_user_addr_fault+0x597/0x8a0 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? exc_page_fault+0x81/0x190 May 03 10:35:22 l kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e May 03 10:35:22 l kernel: RIP: 0033:0x74b8c6b1f02e May 03 10:35:22 l kernel: Code: 48 8b 0d e5 6c 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e> May 03 10:35:22 l kernel: RSP: 002b:00007ffd8b358d18 EFLAGS: 00000246 ORIG_RAX: 00000000000000be May 03 10:35:22 l kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000074b8c6b1f02e May 03 10:35:22 l kernel: RDX: 000061777a35a0cf RSI: 000061777a35a091 RDI: 0000000000000005 May 03 10:35:22 l kernel: RBP: 00007ffd8b358e60 R08: 0000000000000000 R09: 0000000000000000 May 03 10:35:22 l kernel: R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000005 May 03 10:35:22 l kernel: R13: 0000000000000004 R14: 0000000000000001 R15: 000061779d934ae0 May 03 10:35:22 l kernel: </TASK> May 03 10:35:22 l kernel: ---[ end trace 0000000000000000 ]--- May 03 10:35:22 l kernel: ------------[ cut here ]------------ May 03 10:35:22 l kernel: kernel BUG at lib/string_helpers.c:1040! May 03 10:35:22 l kernel: Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI May 03 10:35:22 l kernel: fbcon: Taking over console May 03 10:35:22 l kernel: CPU: 2 UID: 0 PID: 475 Comm: systemd-random- Tainted: G W 6.14.4-zen1-2-zen #1 5eb> May 03 10:35:22 l kernel: Tainted: [W]=WARN May 03 10:35:22 l kernel: Hardware name: ASUSTeK COMPUTER INC. ROG Zephyrus G14 GA402RJ_GA402RJ/GA402RJ, BIOS GA402RJ.319 06> May 03 10:35:22 l kernel: RIP: 0010:__fortify_panic+0xd/0xf May 03 10:35:22 l kernel: Code: bf a3 00 e8 75 02 00 00 e9 e3 cf a3 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f> May 03 10:35:22 l kernel: RSP: 0018:ffffbf584e0175b8 EFLAGS: 00010246 May 03 10:35:22 l kernel: RAX: 0000000000000000 RBX: ffffa0db91e38000 RCX: 0000000000000027 May 03 10:35:22 l kernel: RDX: ffffa0e476121908 RSI: 0000000000000001 RDI: ffffa0e476121900 May 03 10:35:22 l kernel: RBP: ffffbf584e017800 R08: 00000000ffffefff R09: 0000000000000003 May 03 10:35:22 l kernel: R10: ffffffff9be5d700 R11: ffffbf584e017400 R12: ffffa0db8816e5a0 May 03 10:35:22 l kernel: R13: 0000000000000009 R14: 0000000000000000 R15: 0000000000000016 May 03 10:35:22 l kernel: FS: 000074b8c707f880(0000) GS:ffffa0e476100000(0000) knlGS:0000000000000000 May 03 10:35:22 l kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 May 03 10:35:22 l kernel: CR2: 000074b8c6fbccc0 CR3: 0000000110764000 CR4: 0000000000f50ef0 May 03 10:35:22 l kernel: PKRU: 55555554 May 03 10:35:22 l kernel: Call Trace: May 03 10:35:22 l kernel: <TASK> May 03 10:35:22 l kernel: bch2_xattr_set.cold+0x13/0x1d9 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? local_clock_noinstr+0xf/0xf0 May 03 10:35:22 l kernel: ? __bch2_subvolume_get_snapshot+0xc0/0x200 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_btree_path_traverse_one+0x700/0x1270 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? __bch2_time_stats_update+0xe0/0x2b0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_trans_begin+0x6e8/0x7a0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: bch2_xattr_set_handler+0x16e/0x2f0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_path_get+0x188/0x520 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? __bch2_inode_peek+0xd1/0x1e0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_inode_unpack_v3+0x7e7/0x980 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? __bch2_inode_peek+0x128/0x1e0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_printbuf_exit+0x27/0x40 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_get_inode_journal_seq_trans+0x133/0x1d0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? __vfs_setxattr_noperm+0x19c/0x280 May 03 10:35:22 l kernel: __vfs_setxattr_noperm+0x19c/0x280 May 03 10:35:22 l kernel: vfs_setxattr+0x10f/0x200 May 03 10:35:22 l kernel: file_setxattr+0xd5/0xf0 May 03 10:35:22 l kernel: path_setxattrat+0x188/0x1f0 May 03 10:35:22 l kernel: __x64_sys_fsetxattr+0x29/0x40 May 03 10:35:22 l kernel: do_syscall_64+0x7b/0x190 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? __x64_sys_openat+0x1f0/0x220 May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x1d6/0x210 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x10/0x210 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? do_syscall_64+0x87/0x190 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? do_user_addr_fault+0x597/0x8a0 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? exc_page_fault+0x81/0x190 May 03 10:35:22 l kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e May 03 10:35:22 l kernel: RIP: 0033:0x74b8c6b1f02e May 03 10:35:22 l kernel: Code: 48 8b 0d e5 6c 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e> May 03 10:35:22 l kernel: RSP: 002b:00007ffd8b358d18 EFLAGS: 00000246 ORIG_RAX: 00000000000000be May 03 10:35:22 l kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000074b8c6b1f02e May 03 10:35:22 l kernel: ? bch2_get_inode_journal_seq_trans+0x133/0x1d0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? __vfs_setxattr_noperm+0x19c/0x280 May 03 10:35:22 l kernel: __vfs_setxattr_noperm+0x19c/0x280 May 03 10:35:22 l kernel: vfs_setxattr+0x10f/0x200 May 03 10:35:22 l kernel: file_setxattr+0xd5/0xf0 May 03 10:35:22 l kernel: path_setxattrat+0x188/0x1f0 May 03 10:35:22 l kernel: __x64_sys_fsetxattr+0x29/0x40 May 03 10:35:22 l kernel: do_syscall_64+0x7b/0x190 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? __x64_sys_openat+0x1f0/0x220 May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x1d6/0x210 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x10/0x210 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? do_syscall_64+0x87/0x190 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? do_user_addr_fault+0x597/0x8a0 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? exc_page_fault+0x81/0x190 May 03 10:35:22 l kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e May 03 10:35:22 l kernel: RIP: 0033:0x74b8c6b1f02e May 03 10:35:22 l kernel: Code: 48 8b 0d e5 6c 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e> May 03 10:35:22 l kernel: RSP: 002b:00007ffd8b358d18 EFLAGS: 00000246 ORIG_RAX: 00000000000000be May 03 10:35:22 l kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000074b8c6b1f02e May 03 10:35:22 l kernel: RDX: 000061777a35a0cf RSI: 000061777a35a091 RDI: 0000000000000005 May 03 10:35:22 l kernel: RBP: 00007ffd8b358e60 R08: 0000000000000000 R09: 0000000000000000 May 03 10:35:22 l kernel: R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000005 May 03 10:35:22 l kernel: R13: 0000000000000004 R14: 0000000000000001 R15: 000061779d934ae0 May 03 10:35:22 l kernel: </TASK> May 03 10:35:22 l kernel: Modules linked in: pkcs8_key_parser i2c_dev crypto_user dm_mod loop nfnetlink ip_tables x_tables b> May 03 10:35:22 l kernel: ---[ end trace 0000000000000000 ]--- May 03 10:35:22 l systemd[1]: systemd-random-seed.service: Main process exited, code=killed, status=11/SEGV May 03 10:35:22 l systemd[1]: systemd-random-seed.service: Failed with result 'signal'. May 03 10:35:22 l systemd[1]: Failed to start Load/Save OS Random Seed. May 03 10:35:22 l kernel: RIP: 0010:__fortify_panic+0xd/0xf May 03 10:35:22 l kernel: Code: bf a3 00 e8 75 02 00 00 e9 e3 cf a3 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f> May 03 10:35:22 l kernel: RSP: 0018:ffffbf584e0175b8 EFLAGS: 00010246 May 03 10:35:22 l kernel: RAX: 0000000000000000 RBX: ffffa0db91e38000 RCX: 0000000000000027 May 03 10:35:22 l kernel: RDX: ffffa0e476121908 RSI: 0000000000000001 RDI: ffffa0e476121900 May 03 10:35:22 l kernel: RBP: ffffbf584e017800 R08: 00000000ffffefff R09: 0000000000000003 May 03 10:35:22 l kernel: R10: ffffffff9be5d700 R11: ffffbf584e017400 R12: ffffa0db8816e5a0 May 03 10:35:22 l kernel: R13: 0000000000000009 R14: 0000000000000000 R15: 0000000000000016 May 03 10:35:22 l kernel: FS: 000074b8c707f880(0000) GS:ffffa0e476580000(0000) knlGS:0000000000000000 May 03 10:35:22 l kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 May 03 10:35:22 l kernel: CR2: 00007107b52a2010 CR3: 0000000110764000 CR4: 0000000000f50ef0 May 03 10:35:22 l kernel: PKRU: 55555554 May 03 10:35:22 l kernel: Console: switching to colour frame buffer device 160x50 May 03 10:35:22 l systemd[1]: Starting Flush Journal to Persistent Storage... May 03 10:35:22 l systemd[1]: Finished Create Static Device Nodes in /dev gracefully. May 03 10:35:22 l systemd[1]: Starting Create System Users... May 03 10:35:22 l systemd-journald[447]: Time spent on flushing to /var/log/journal/a0eebd250105450a8336b3dbc0a1d91d is 227.>
Hmmm I think that is a similar but different issue with bcachefs. Take a look at these:
https://lore.kernel.org/all/df99891d-17 … 4bf@op.pl/
https://github.com/koverstreet/bcachefs/issues/874
And good news is that it's also fixed
Offline
trougnouf wrote:Yes,
[...] May 03 10:35:22 l systemd[1]: Starting Load/Save OS Random Seed... May 03 10:35:22 l systemd[1]: TPM SRK Setup was skipped because of an unmet condition check (ConditionSecurity=measured-uki). May 03 10:35:22 l systemd[1]: Started User Database Manager. May 03 10:35:22 l systemd-journald[447]: Journal started May 03 10:35:22 l systemd-journald[447]: Runtime Journal (/run/log/journal/a0eebd250105450a8336b3dbc0a1d91d) is 8M, max 1.9G> May 03 10:35:22 l systemd-modules-load[448]: Inserted module 'crypto_user' May 03 10:35:22 l systemd-modules-load[448]: Inserted module 'i2c_dev' May 03 10:35:22 l systemd-modules-load[448]: Inserted module 'pkcs8_key_parser' May 03 10:35:22 l systemd[1]: Started Journal Service. May 03 10:35:22 l kernel: ------------[ cut here ]------------ May 03 10:35:22 l kernel: memcpy: detected buffer overflow: 1 byte write of buffer size 0 May 03 10:35:22 l kernel: WARNING: CPU: 2 PID: 475 at lib/string_helpers.c:1032 __fortify_report+0x49/0x50 May 03 10:35:22 l kernel: Modules linked in: pkcs8_key_parser i2c_dev crypto_user dm_mod loop nfnetlink ip_tables x_tables b> May 03 10:35:22 l kernel: CPU: 2 UID: 0 PID: 475 Comm: systemd-random- Not tainted 6.14.4-zen1-2-zen #1 5ebf8709a7a4a4d9e2b7> May 03 10:35:22 l kernel: Hardware name: ASUSTeK COMPUTER INC. ROG Zephyrus G14 GA402RJ_GA402RJ/GA402RJ, BIOS GA402RJ.319 06> May 03 10:35:22 l kernel: RIP: 0010:__fortify_report+0x49/0x50 May 03 10:35:22 l kernel: Code: d0 48 0f 47 c2 83 e7 01 4c 89 ca 48 c7 c7 70 ab 5b 9b 48 8b 34 c5 00 ae f0 9a 48 c7 c0 93 ae> May 03 10:35:22 l kernel: RSP: 0018:ffffbf584e0175b0 EFLAGS: 00010246 May 03 10:35:22 l kernel: RAX: 0000000000000000 RBX: ffffa0db91e38000 RCX: 0000000000000027 May 03 10:35:22 l kernel: RDX: ffffa0e476121908 RSI: 0000000000000001 RDI: ffffa0e476121900 May 03 10:35:22 l kernel: RBP: ffffbf584e017800 R08: 00000000ffffefff R09: 0000000000000003 May 03 10:35:22 l kernel: R10: ffffffff9be5d700 R11: ffffbf584e017400 R12: ffffa0db8816e5a0 May 03 10:35:22 l kernel: R13: 0000000000000009 R14: 0000000000000000 R15: 0000000000000016 May 03 10:35:22 l kernel: FS: 000074b8c707f880(0000) GS:ffffa0e476100000(0000) knlGS:0000000000000000 May 03 10:35:22 l kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 May 03 10:35:22 l kernel: CR2: 000074b8c6fbccc0 CR3: 0000000110764000 CR4: 0000000000f50ef0 May 03 10:35:22 l kernel: PKRU: 55555554 May 03 10:35:22 l kernel: Call Trace: May 03 10:35:22 l kernel: <TASK> May 03 10:35:22 l kernel: __fortify_panic+0xd/0xf May 03 10:35:22 l kernel: bch2_xattr_set.cold+0x13/0x1d9 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? local_clock_noinstr+0xf/0xf0 May 03 10:35:22 l kernel: ? __bch2_subvolume_get_snapshot+0xc0/0x200 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_btree_path_traverse_one+0x700/0x1270 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? __bch2_time_stats_update+0xe0/0x2b0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_trans_begin+0x6e8/0x7a0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: bch2_xattr_set_handler+0x16e/0x2f0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_path_get+0x188/0x520 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? __bch2_inode_peek+0xd1/0x1e0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_inode_unpack_v3+0x7e7/0x980 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? __bch2_inode_peek+0x128/0x1e0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_printbuf_exit+0x27/0x40 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_get_inode_journal_seq_trans+0x133/0x1d0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? __vfs_setxattr_noperm+0x19c/0x280 May 03 10:35:22 l kernel: __vfs_setxattr_noperm+0x19c/0x280 May 03 10:35:22 l kernel: vfs_setxattr+0x10f/0x200 May 03 10:35:22 l kernel: file_setxattr+0xd5/0xf0 May 03 10:35:22 l kernel: path_setxattrat+0x188/0x1f0 May 03 10:35:22 l kernel: __x64_sys_fsetxattr+0x29/0x40 May 03 10:35:22 l kernel: do_syscall_64+0x7b/0x190 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? __x64_sys_openat+0x1f0/0x220 May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x1d6/0x210 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x10/0x210 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? do_syscall_64+0x87/0x190 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? do_user_addr_fault+0x597/0x8a0 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? exc_page_fault+0x81/0x190 May 03 10:35:22 l kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e May 03 10:35:22 l kernel: RIP: 0033:0x74b8c6b1f02e May 03 10:35:22 l kernel: Code: 48 8b 0d e5 6c 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e> May 03 10:35:22 l kernel: RSP: 002b:00007ffd8b358d18 EFLAGS: 00000246 ORIG_RAX: 00000000000000be May 03 10:35:22 l kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000074b8c6b1f02e May 03 10:35:22 l kernel: RDX: 000061777a35a0cf RSI: 000061777a35a091 RDI: 0000000000000005 May 03 10:35:22 l kernel: RBP: 00007ffd8b358e60 R08: 0000000000000000 R09: 0000000000000000 May 03 10:35:22 l kernel: R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000005 May 03 10:35:22 l kernel: R13: 0000000000000004 R14: 0000000000000001 R15: 000061779d934ae0 May 03 10:35:22 l kernel: </TASK> May 03 10:35:22 l kernel: ---[ end trace 0000000000000000 ]--- May 03 10:35:22 l kernel: ------------[ cut here ]------------ May 03 10:35:22 l kernel: kernel BUG at lib/string_helpers.c:1040! May 03 10:35:22 l kernel: Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI May 03 10:35:22 l kernel: fbcon: Taking over console May 03 10:35:22 l kernel: CPU: 2 UID: 0 PID: 475 Comm: systemd-random- Tainted: G W 6.14.4-zen1-2-zen #1 5eb> May 03 10:35:22 l kernel: Tainted: [W]=WARN May 03 10:35:22 l kernel: Hardware name: ASUSTeK COMPUTER INC. ROG Zephyrus G14 GA402RJ_GA402RJ/GA402RJ, BIOS GA402RJ.319 06> May 03 10:35:22 l kernel: RIP: 0010:__fortify_panic+0xd/0xf May 03 10:35:22 l kernel: Code: bf a3 00 e8 75 02 00 00 e9 e3 cf a3 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f> May 03 10:35:22 l kernel: RSP: 0018:ffffbf584e0175b8 EFLAGS: 00010246 May 03 10:35:22 l kernel: RAX: 0000000000000000 RBX: ffffa0db91e38000 RCX: 0000000000000027 May 03 10:35:22 l kernel: RDX: ffffa0e476121908 RSI: 0000000000000001 RDI: ffffa0e476121900 May 03 10:35:22 l kernel: RBP: ffffbf584e017800 R08: 00000000ffffefff R09: 0000000000000003 May 03 10:35:22 l kernel: R10: ffffffff9be5d700 R11: ffffbf584e017400 R12: ffffa0db8816e5a0 May 03 10:35:22 l kernel: R13: 0000000000000009 R14: 0000000000000000 R15: 0000000000000016 May 03 10:35:22 l kernel: FS: 000074b8c707f880(0000) GS:ffffa0e476100000(0000) knlGS:0000000000000000 May 03 10:35:22 l kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 May 03 10:35:22 l kernel: CR2: 000074b8c6fbccc0 CR3: 0000000110764000 CR4: 0000000000f50ef0 May 03 10:35:22 l kernel: PKRU: 55555554 May 03 10:35:22 l kernel: Call Trace: May 03 10:35:22 l kernel: <TASK> May 03 10:35:22 l kernel: bch2_xattr_set.cold+0x13/0x1d9 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? local_clock_noinstr+0xf/0xf0 May 03 10:35:22 l kernel: ? __bch2_subvolume_get_snapshot+0xc0/0x200 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_btree_path_traverse_one+0x700/0x1270 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? __bch2_time_stats_update+0xe0/0x2b0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_trans_begin+0x6e8/0x7a0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: bch2_xattr_set_handler+0x16e/0x2f0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_path_get+0x188/0x520 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? __bch2_inode_peek+0xd1/0x1e0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_inode_unpack_v3+0x7e7/0x980 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? __bch2_inode_peek+0x128/0x1e0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_printbuf_exit+0x27/0x40 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? bch2_get_inode_journal_seq_trans+0x133/0x1d0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? __vfs_setxattr_noperm+0x19c/0x280 May 03 10:35:22 l kernel: __vfs_setxattr_noperm+0x19c/0x280 May 03 10:35:22 l kernel: vfs_setxattr+0x10f/0x200 May 03 10:35:22 l kernel: file_setxattr+0xd5/0xf0 May 03 10:35:22 l kernel: path_setxattrat+0x188/0x1f0 May 03 10:35:22 l kernel: __x64_sys_fsetxattr+0x29/0x40 May 03 10:35:22 l kernel: do_syscall_64+0x7b/0x190 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? __x64_sys_openat+0x1f0/0x220 May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x1d6/0x210 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x10/0x210 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? do_syscall_64+0x87/0x190 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? do_user_addr_fault+0x597/0x8a0 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? exc_page_fault+0x81/0x190 May 03 10:35:22 l kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e May 03 10:35:22 l kernel: RIP: 0033:0x74b8c6b1f02e May 03 10:35:22 l kernel: Code: 48 8b 0d e5 6c 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e> May 03 10:35:22 l kernel: RSP: 002b:00007ffd8b358d18 EFLAGS: 00000246 ORIG_RAX: 00000000000000be May 03 10:35:22 l kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000074b8c6b1f02e May 03 10:35:22 l kernel: ? bch2_get_inode_journal_seq_trans+0x133/0x1d0 [bcachefs 2b88b1aab051f48ec6704ead0ae01ba8992c306c] May 03 10:35:22 l kernel: ? __vfs_setxattr_noperm+0x19c/0x280 May 03 10:35:22 l kernel: __vfs_setxattr_noperm+0x19c/0x280 May 03 10:35:22 l kernel: vfs_setxattr+0x10f/0x200 May 03 10:35:22 l kernel: file_setxattr+0xd5/0xf0 May 03 10:35:22 l kernel: path_setxattrat+0x188/0x1f0 May 03 10:35:22 l kernel: __x64_sys_fsetxattr+0x29/0x40 May 03 10:35:22 l kernel: do_syscall_64+0x7b/0x190 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? __x64_sys_openat+0x1f0/0x220 May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x1d6/0x210 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? syscall_exit_to_user_mode+0x10/0x210 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? do_syscall_64+0x87/0x190 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? do_user_addr_fault+0x597/0x8a0 May 03 10:35:22 l kernel: ? srso_alias_return_thunk+0x5/0xfbef5 May 03 10:35:22 l kernel: ? exc_page_fault+0x81/0x190 May 03 10:35:22 l kernel: entry_SYSCALL_64_after_hwframe+0x76/0x7e May 03 10:35:22 l kernel: RIP: 0033:0x74b8c6b1f02e May 03 10:35:22 l kernel: Code: 48 8b 0d e5 6c 0d 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e> May 03 10:35:22 l kernel: RSP: 002b:00007ffd8b358d18 EFLAGS: 00000246 ORIG_RAX: 00000000000000be May 03 10:35:22 l kernel: RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000074b8c6b1f02e May 03 10:35:22 l kernel: RDX: 000061777a35a0cf RSI: 000061777a35a091 RDI: 0000000000000005 May 03 10:35:22 l kernel: RBP: 00007ffd8b358e60 R08: 0000000000000000 R09: 0000000000000000 May 03 10:35:22 l kernel: R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000005 May 03 10:35:22 l kernel: R13: 0000000000000004 R14: 0000000000000001 R15: 000061779d934ae0 May 03 10:35:22 l kernel: </TASK> May 03 10:35:22 l kernel: Modules linked in: pkcs8_key_parser i2c_dev crypto_user dm_mod loop nfnetlink ip_tables x_tables b> May 03 10:35:22 l kernel: ---[ end trace 0000000000000000 ]--- May 03 10:35:22 l systemd[1]: systemd-random-seed.service: Main process exited, code=killed, status=11/SEGV May 03 10:35:22 l systemd[1]: systemd-random-seed.service: Failed with result 'signal'. May 03 10:35:22 l systemd[1]: Failed to start Load/Save OS Random Seed. May 03 10:35:22 l kernel: RIP: 0010:__fortify_panic+0xd/0xf May 03 10:35:22 l kernel: Code: bf a3 00 e8 75 02 00 00 e9 e3 cf a3 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f> May 03 10:35:22 l kernel: RSP: 0018:ffffbf584e0175b8 EFLAGS: 00010246 May 03 10:35:22 l kernel: RAX: 0000000000000000 RBX: ffffa0db91e38000 RCX: 0000000000000027 May 03 10:35:22 l kernel: RDX: ffffa0e476121908 RSI: 0000000000000001 RDI: ffffa0e476121900 May 03 10:35:22 l kernel: RBP: ffffbf584e017800 R08: 00000000ffffefff R09: 0000000000000003 May 03 10:35:22 l kernel: R10: ffffffff9be5d700 R11: ffffbf584e017400 R12: ffffa0db8816e5a0 May 03 10:35:22 l kernel: R13: 0000000000000009 R14: 0000000000000000 R15: 0000000000000016 May 03 10:35:22 l kernel: FS: 000074b8c707f880(0000) GS:ffffa0e476580000(0000) knlGS:0000000000000000 May 03 10:35:22 l kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 May 03 10:35:22 l kernel: CR2: 00007107b52a2010 CR3: 0000000110764000 CR4: 0000000000f50ef0 May 03 10:35:22 l kernel: PKRU: 55555554 May 03 10:35:22 l kernel: Console: switching to colour frame buffer device 160x50 May 03 10:35:22 l systemd[1]: Starting Flush Journal to Persistent Storage... May 03 10:35:22 l systemd[1]: Finished Create Static Device Nodes in /dev gracefully. May 03 10:35:22 l systemd[1]: Starting Create System Users... May 03 10:35:22 l systemd-journald[447]: Time spent on flushing to /var/log/journal/a0eebd250105450a8336b3dbc0a1d91d is 227.>Hmmm I think that is a similar but different issue with bcachefs. Take a look at these:
https://lore.kernel.org/all/df99891d-17 … 4bf@op.pl/
https://github.com/koverstreet/bcachefs/issues/874And good news is that it's also fixed
Indeed, thank you! 6.14.5 doesn't include the fix for bcachefs but it should be resolved with this patch https://git.kernel.org/pub/scm/linux/ke … 821d849e78
Offline
Also could you test the latest mainline kernel?
sudo pacman -U https://pkgbuild.com/\~gromit/linux-bisection-kernels/linux-mainline-6.15rc4-1-x86_64.pkg.tar.zstDepending on your system's boot mechanism you need to manually add an entry for linux-mainline.
I've just tested the pending linux-6.14.5.arch1-1-x86_64 kernel & headers from core-testing as suggested in GitLab ticket #136 and the issue is resolved on my Dell Precision 5680. I don't have a GitLab account to submit my feedback
Offline
Xwang wrote:Isn't it strange that only dell laptops have this issue?
Is it unique hardware? I know the IPU6 hardware modules seem to be a bit of a basketcase. I still don't have a clear understanding of the hardware stack. Would this be a Dell issue, or an Intel issue, or kernel issue? I'm pretty green at interpreting kernel oops messages and still have a lot to learn.
Anyway Dell Precision 5680 here, rolling back the kernel got me running again. I'm glad I found this post because I thought it was a "me" problem!
Disabling the Webcam in the BIOS settings fixed the issue for me. So definitely related to that absolute basketcase that are the IPU6 drivers.
EDIT: However the internal sound card stopped working. Amazing.
Last edited by azertyfun (2025-05-05 13:27:44)
Offline
I had exactly the same issue (kernel BUG at lib/string_helpers.c:1040! Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI (.......).) in a Dell Latitude 7440. For those of you using this laptop, simply using linux-lts works fine. Waiting for https://lore.kernel.org/all/20250429161 … ation.org/.
Offline
anyone try the `linux 6.14.5.arch1-1` ?
Offline
anyone try the `linux 6.14.5.arch1-1` ?
I just upgraded to it and it's working fine for me ![]()
Offline
==> ERROR: Missing 6.14.5-arch1-1 kernel headers for module v4l2loopback/0.14.0.
not sure if it good for the webcam
Offline
@tuxtax just install the headers then ![]()
Offline
I can confirm that 6.14.5 works just fine
Offline
@tuxtax just install the headers then
thanks, it's fine now. but this one is still persist in the latest kernel
https://bbs.archlinux.org/viewtopic.php?id=305065.
i guess i will close this ticket and move to that one
Offline
I still have the same issue - on my desktop however and with 6.15.9-arch1-1. This happens occasionally while gaming and locks up my entire Xorg. I can still ssh in, no kernel panic, but it is prone to further freezing.
There is no webcam present. My boot process is entirely unaffected so that other linked thread is not applicable here.
Aug 11 14:53:37 archlinux kernel: ------------[ cut here ]------------
Aug 11 14:53:38 archlinux kernel: memcpy: detected buffer overflow: 60 byte write of buffer size 0
Aug 11 14:53:38 archlinux kernel: WARNING: CPU: 12 PID: 6233 at lib/string_helpers.c:1032 __fortify_report+0x49/0x50
Aug 11 14:53:38 archlinux kernel: Modules linked in: ip6t_REJECT nf_reject_ipv6 ip6table_nat ip6table_filter ip6_tables ipt_REJECT rfkill nf_reject_ipv4 xt_tcpudp xt_conntrack xt_comment iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_de>
Aug 11 14:53:38 archlinux kernel: sha1_ssse3 nvme aesni_intel crypto_simd nvme_core cryptd ccp nvme_keyring nvme_auth
Aug 11 14:53:38 archlinux kernel: CPU: 12 UID: 0 PID: 6233 Comm: kworker/u97:0 Not tainted 6.15.9-arch1-1 #1 PREEMPT(full) 5d7d087b004993dc5eb96b1083476b75f6c1054b
Aug 11 14:53:38 archlinux kernel: Hardware name: To Be Filled By O.E.M. B550M Phantom Gaming 4/B550M Phantom Gaming 4, BIOS P3.40 01/18/2024
Aug 11 14:53:38 archlinux kernel: Workqueue: events_unbound commit_work
Aug 11 14:53:38 archlinux kernel: RIP: 0010:__fortify_report+0x49/0x50
Aug 11 14:53:38 archlinux kernel: Code: d0 48 0f 47 c2 83 e7 01 4c 89 ca 48 c7 c7 00 60 3f b6 48 8b 34 c5 60 c6 d0 b5 48 c7 c0 9f a7 4c b6 48 0f 44 c8 e8 97 ea 80 ff <0f> 0b e9 c0 75 7e 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90
Aug 11 14:53:38 archlinux kernel: RSP: 0018:ffffd24f05cd7808 EFLAGS: 00010246
Aug 11 14:53:38 archlinux kernel: RAX: 0000000000000000 RBX: ffff8df1fda80000 RCX: 0000000000000027
Aug 11 14:53:38 archlinux kernel: RDX: ffff8df71ef1cbc8 RSI: 0000000000000001 RDI: ffff8df71ef1cbc0
Aug 11 14:53:38 archlinux kernel: RBP: 0000000000000344 R08: 0000000000000000 R09: 00000000ffffdfff
Aug 11 14:53:38 archlinux kernel: R10: ffffffffb7b77b40 R11: ffffd24f05cd76a0 R12: ffff8df046edf000
Aug 11 14:53:38 archlinux kernel: R13: ffff8df1fda841e8 R14: ffff8df004df7000 R15: ffff8df383f1ae00
Aug 11 14:53:38 archlinux kernel: FS: 0000000000000000(0000) GS:ffff8df76742c000(0000) knlGS:0000000000000000
Aug 11 14:53:38 archlinux kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Aug 11 14:53:38 archlinux kernel: CR2: 000000008bebd000 CR3: 0000000106961000 CR4: 0000000000350ef0
Aug 11 14:53:38 archlinux kernel: Call Trace:
Aug 11 14:53:38 archlinux kernel: <TASK>
Aug 11 14:53:38 archlinux kernel: __fortify_panic+0xd/0xf
Aug 11 14:53:38 archlinux kernel: dc_dmub_srv_fams2_update_config.cold+0x12/0x12 [amdgpu 9fc8de92c60fabc6e82f0acbd131317c12b1eb7b]
Aug 11 14:53:38 archlinux kernel: ? schedule_timeout+0xbd/0x100
Aug 11 14:53:38 archlinux kernel: ? srso_return_thunk+0x5/0x5f
Aug 11 14:53:38 archlinux kernel: ? dma_fence_default_wait+0x8a/0x280
Aug 11 14:53:38 archlinux kernel: ? __pfx_dma_fence_default_wait_cb+0x10/0x10
Aug 11 14:53:38 archlinux kernel: ? srso_return_thunk+0x5/0x5f
Aug 11 14:53:38 archlinux kernel: ? wait_for_completion_timeout+0x14e/0x1a0
Aug 11 14:53:38 archlinux kernel: ? srso_return_thunk+0x5/0x5f
Aug 11 14:53:38 archlinux kernel: ? commit_tail+0xa1/0x130
Aug 11 14:53:38 archlinux kernel: ? process_one_work+0x193/0x350
Aug 11 14:53:38 archlinux kernel: ? worker_thread+0x2d7/0x410
Aug 11 14:53:38 archlinux kernel: ? __pfx_worker_thread+0x10/0x10
Aug 11 14:53:38 archlinux kernel: ? kthread+0xfc/0x240
Aug 11 14:53:38 archlinux kernel: ? __pfx_kthread+0x10/0x10
Aug 11 14:53:38 archlinux kernel: ? ret_from_fork+0x34/0x50
Aug 11 14:53:38 archlinux kernel: ? __pfx_kthread+0x10/0x10
Aug 11 14:53:38 archlinux kernel: ? ret_from_fork_asm+0x1a/0x30
Aug 11 14:53:38 archlinux kernel: </TASK>
Aug 11 14:53:38 archlinux kernel: ---[ end trace 0000000000000000 ]---
Aug 11 14:53:38 archlinux kernel: ------------[ cut here ]------------
Aug 11 14:53:38 archlinux kernel: kernel BUG at lib/string_helpers.c:1040!
Aug 11 14:53:38 archlinux kernel: Oops: invalid opcode: 0000 [#1] SMP NOPTI
Aug 11 14:53:38 archlinux kernel: CPU: 4 UID: 0 PID: 6233 Comm: kworker/u97:0 Tainted: G W 6.15.9-arch1-1 #1 PREEMPT(full) 5d7d087b004993dc5eb96b1083476b75f6c1054b
Aug 11 14:53:38 archlinux kernel: Tainted: [W]=WARN
Aug 11 14:53:38 archlinux kernel: Hardware name: To Be Filled By O.E.M. B550M Phantom Gaming 4/B550M Phantom Gaming 4, BIOS P3.40 01/18/2024
Aug 11 14:53:38 archlinux kernel: Workqueue: events_unbound commit_work
Aug 11 14:53:38 archlinux kernel: RIP: 0010:__fortify_panic+0xd/0xf
Aug 11 14:53:38 archlinux kernel: Code: 90 00 e8 d6 01 00 00 e9 74 27 90 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 40 0f b6 ff e8 93 55 90 00 <0f> 0b 48 8b 54 24 10 48 8b 74 24 08 4c 89 e1 48 c7 c7 45 b9 49 b6
Aug 11 14:53:38 archlinux kernel: RSP: 0018:ffffd24f05cd7810 EFLAGS: 00010246
Aug 11 14:53:38 archlinux kernel: RAX: 0000000000000000 RBX: ffff8df1fda80000 RCX: 0000000000000027
Aug 11 14:53:38 archlinux kernel: RDX: ffff8df71ef1cbc8 RSI: 0000000000000001 RDI: ffff8df71ef1cbc0
Aug 11 14:53:38 archlinux kernel: RBP: 0000000000000344 R08: 0000000000000000 R09: 00000000ffffdfff
Aug 11 14:53:38 archlinux kernel: R10: ffffffffb7b77b40 R11: ffffd24f05cd76a0 R12: ffff8df046edf000
Aug 11 14:53:38 archlinux kernel: R13: ffff8df1fda841e8 R14: ffff8df004df7000 R15: ffff8df383f1ae00
Aug 11 14:53:38 archlinux kernel: FS: 0000000000000000(0000) GS:ffff8df76722c000(0000) knlGS:0000000000000000
Aug 11 14:53:38 archlinux kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Aug 11 14:53:38 archlinux kernel: CR2: 00007f052a200010 CR3: 0000000105a50000 CR4: 0000000000350ef0
Aug 11 14:53:38 archlinux kernel: Call Trace:
Aug 11 14:53:38 archlinux kernel: <TASK>
Aug 11 14:53:38 archlinux kernel: dc_dmub_srv_fams2_update_config.cold+0x12/0x12 [amdgpu 9fc8de92c60fabc6e82f0acbd131317c12b1eb7b]
Aug 11 14:53:38 archlinux kernel: ? schedule_timeout+0xbd/0x100
Aug 11 14:53:38 archlinux kernel: ? srso_return_thunk+0x5/0x5f
Aug 11 14:53:38 archlinux kernel: ? dma_fence_default_wait+0x8a/0x280
Aug 11 14:53:38 archlinux kernel: ? __pfx_dma_fence_default_wait_cb+0x10/0x10
Aug 11 14:53:38 archlinux kernel: ? srso_return_thunk+0x5/0x5f
Aug 11 14:53:38 archlinux kernel: ? wait_for_completion_timeout+0x14e/0x1a0
Aug 11 14:53:38 archlinux kernel: ? srso_return_thunk+0x5/0x5f
Aug 11 14:53:38 archlinux kernel: ? commit_tail+0xa1/0x130
Aug 11 14:53:38 archlinux kernel: ? process_one_work+0x193/0x350
Aug 11 14:53:38 archlinux kernel: ? worker_thread+0x2d7/0x410
Aug 11 14:53:38 archlinux kernel: ? __pfx_worker_thread+0x10/0x10
Aug 11 14:53:38 archlinux kernel: ? kthread+0xfc/0x240
Aug 11 14:53:38 archlinux kernel: ? __pfx_kthread+0x10/0x10
Aug 11 14:53:38 archlinux kernel: ? ret_from_fork+0x34/0x50
Aug 11 14:53:38 archlinux kernel: ? __pfx_kthread+0x10/0x10
Aug 11 14:53:38 archlinux kernel: ? ret_from_fork_asm+0x1a/0x30
Aug 11 14:53:38 archlinux kernel: </TASK>
Aug 11 14:53:38 archlinux kernel: Modules linked in: ip6t_REJECT nf_reject_ipv6 ip6table_nat ip6table_filter ip6_tables ipt_REJECT rfkill nf_reject_ipv4 xt_tcpudp xt_conntrack xt_comment iptable_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_de>
Aug 11 14:53:38 archlinux kernel: sha1_ssse3 nvme aesni_intel crypto_simd nvme_core cryptd ccp nvme_keyring nvme_auth
Aug 11 14:53:38 archlinux kernel: ---[ end trace 0000000000000000 ]---
Aug 11 14:53:38 archlinux kernel: RIP: 0010:__fortify_panic+0xd/0xf
Aug 11 14:53:38 archlinux kernel: Code: 90 00 e8 d6 01 00 00 e9 74 27 90 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 40 0f b6 ff e8 93 55 90 00 <0f> 0b 48 8b 54 24 10 48 8b 74 24 08 4c 89 e1 48 c7 c7 45 b9 49 b6
Aug 11 14:53:38 archlinux kernel: RSP: 0018:ffffd24f05cd7810 EFLAGS: 00010246
Aug 11 14:53:38 archlinux kernel: RAX: 0000000000000000 RBX: ffff8df1fda80000 RCX: 0000000000000027
Aug 11 14:53:38 archlinux kernel: RDX: ffff8df71ef1cbc8 RSI: 0000000000000001 RDI: ffff8df71ef1cbc0
Aug 11 14:53:38 archlinux kernel: RBP: 0000000000000344 R08: 0000000000000000 R09: 00000000ffffdfff
Aug 11 14:53:38 archlinux kernel: R10: ffffffffb7b77b40 R11: ffffd24f05cd76a0 R12: ffff8df046edf000
Aug 11 14:53:38 archlinux kernel: R13: ffff8df1fda841e8 R14: ffff8df004df7000 R15: ffff8df383f1ae00
Aug 11 14:53:38 archlinux kernel: FS: 0000000000000000(0000) GS:ffff8df76722c000(0000) knlGS:0000000000000000
Aug 11 14:53:38 archlinux kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
Aug 11 14:53:38 archlinux kernel: CR2: 00007f052a200010 CR3: 0000000105a50000 CR4: 0000000000350ef0Offline