Mar 09 03:37:22 MartoBeast kernel: Call Trace:
Mar 09 03:37:22 MartoBeast kernel:  ? __cpa_addr+0x50/0x50
Mar 09 03:37:22 MartoBeast kernel:  on_each_cpu+0x2d/0x60
Mar 09 03:37:22 MartoBeast kernel:  cpa_flush+0x106/0x130
Mar 09 03:37:22 MartoBeast kernel:  change_page_attr_set_clr+0x16d/0x200
Mar 09 03:37:22 MartoBeast kernel:  set_memory_ro+0x29/0x30
Mar 09 03:37:22 MartoBeast kernel:  bpf_int_jit_compile+0x2cc/0x333
Mar 09 03:37:22 MartoBeast kernel:  bpf_prog_select_runtime+0xd2/0x150
Mar 09 03:37:22 MartoBeast kernel:  bpf_prepare_filter+0x44c/0x4b0
Mar 09 03:37:22 MartoBeast kernel:  ? 
hardlockup_detector_perf_cleanup.cold+0x14/0x14
Mar 09 03:37:22 MartoBeast kernel:  bpf_prog_create_from_user+0xc7/0x120
Mar 09 03:37:22 MartoBeast kernel:  seccomp_set_mode_filter+0x11a/0x4a0
Mar 09 03:37:22 MartoBeast kernel:  do_seccomp+0x39/0x200
Mar 09 03:37:22 MartoBeast kernel:  prctl_set_seccomp+0x2c/0x40
Mar 09 03:37:22 MartoBeast kernel:  __x64_sys_prctl+0x52c/0x60d
Mar 09 03:37:22 MartoBeast kernel:  do_syscall_64+0x5a/0x130
Mar 09 03:37:22 MartoBeast kernel:  entry_SYSCALL_64_after_hwframe+0x44/0xa9

Can you test if no BPF programs are loaded?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1865293

Title:
  ryzen 5 3600x soft lockups

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1865293/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to