Mar 09 03:37:22 MartoBeast kernel: Call Trace: Mar 09 03:37:22 MartoBeast kernel: ? __cpa_addr+0x50/0x50 Mar 09 03:37:22 MartoBeast kernel: on_each_cpu+0x2d/0x60 Mar 09 03:37:22 MartoBeast kernel: cpa_flush+0x106/0x130 Mar 09 03:37:22 MartoBeast kernel: change_page_attr_set_clr+0x16d/0x200 Mar 09 03:37:22 MartoBeast kernel: set_memory_ro+0x29/0x30 Mar 09 03:37:22 MartoBeast kernel: bpf_int_jit_compile+0x2cc/0x333 Mar 09 03:37:22 MartoBeast kernel: bpf_prog_select_runtime+0xd2/0x150 Mar 09 03:37:22 MartoBeast kernel: bpf_prepare_filter+0x44c/0x4b0 Mar 09 03:37:22 MartoBeast kernel: ? hardlockup_detector_perf_cleanup.cold+0x14/0x14 Mar 09 03:37:22 MartoBeast kernel: bpf_prog_create_from_user+0xc7/0x120 Mar 09 03:37:22 MartoBeast kernel: seccomp_set_mode_filter+0x11a/0x4a0 Mar 09 03:37:22 MartoBeast kernel: do_seccomp+0x39/0x200 Mar 09 03:37:22 MartoBeast kernel: prctl_set_seccomp+0x2c/0x40 Mar 09 03:37:22 MartoBeast kernel: __x64_sys_prctl+0x52c/0x60d Mar 09 03:37:22 MartoBeast kernel: do_syscall_64+0x5a/0x130 Mar 09 03:37:22 MartoBeast kernel: entry_SYSCALL_64_after_hwframe+0x44/0xa9
Can you test if no BPF programs are loaded? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1865293 Title: ryzen 5 3600x soft lockups To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1865293/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs