Kernel Call Trace on Secure Boot

Bug #1942952 reported by js1
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Expired
Undecided
Unassigned

Bug Description

Could the call traces in dmesg be related to UEFI secure boot?

ProblemType: Bug
DistroRelease: Ubuntu 21.04
Package: linux-image-5.11.0-34-generic 5.11.0-34.36
ProcVersionSignature: Ubuntu 5.11.0-34.36-generic 5.11.22
Uname: Linux 5.11.0-34-generic x86_64
ApportVersion: 2.20.11-0ubuntu65.1
Architecture: amd64
AudioDevicesInUse:
 USER PID ACCESS COMMAND
 /dev/snd/controlC0: js1 948 F.... pulseaudio
CasperMD5CheckResult: pass
CurrentDesktop: KDE
Date: Tue Sep 7 21:05:54 2021
InstallationDate: Installed on 2021-09-06 (1 days ago)
InstallationMedia: Kubuntu 21.04 "Hirsute Hippo" - Release amd64 (20210420)
Lsusb:
 Bus 002 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
 Bus 001 Device 002: ID 0bda:b00b Realtek Semiconductor Corp. Realtek Bluetooth 4.2 Adapter
 Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Lsusb-t:
 /: Bus 02.Port 1: Dev 1, Class=root_hub, Driver=xhci_hcd/7p, 5000M
 /: Bus 01.Port 1: Dev 1, Class=root_hub, Driver=xhci_hcd/9p, 480M
     |__ Port 8: Dev 2, If 0, Class=Wireless, Driver=btusb, 12M
     |__ Port 8: Dev 2, If 1, Class=Wireless, Driver=btusb, 12M
ProcFB: 0 i915drmfb
ProcKernelCmdLine: BOOT_IMAGE=/vmlinuz-5.11.0-34-generic root=/dev/mapper/vgkubuntu-root ro ipv6.disable=1 elevator=deadline splash vt.handoff=7
RelatedPackageVersions:
 linux-restricted-modules-5.11.0-34-generic N/A
 linux-backports-modules-5.11.0-34-generic N/A
 linux-firmware 1.197.3
SourcePackage: linux
UpgradeStatus: No upgrade log present (probably fresh install)
dmi.bios.date: 03/25/2021
dmi.bios.release: 15.63
dmi.bios.vendor: Insyde
dmi.bios.version: F.63
dmi.board.name: 84B6
dmi.board.vendor: HP
dmi.board.version: KBC Version 76.32
dmi.chassis.type: 10
dmi.chassis.vendor: HP
dmi.chassis.version: Chassis Version
dmi.ec.firmware.release: 76.32
dmi.modalias: dmi:bvnInsyde:bvrF.63:bd03/25/2021:br15.63:efr76.32:svnHP:pn:pvr:sku:rvnHP:rn84B6:rvrKBCVersion76.32:cvnHP:ct10:cvrChassisVersion:
dmi.sys.vendor: HP

Revision history for this message
js1 (sujiannming) wrote :
Revision history for this message
Ubuntu Kernel Bot (ubuntu-kernel-bot) wrote : Status changed to Confirmed

This change was made by a bot.

Changed in linux (Ubuntu):
status: New → Confirmed
Revision history for this message
js1 (sujiannming) wrote :

I disabled Secure Boot and same problem. Seems to happen reliably on cold boots.

Revision history for this message
Kai-Heng Feng (kaihengfeng) wrote :

Please test latest mainline kernel:
https://kernel.ubuntu.com/~kernel-ppa/mainline/v5.14/amd64/
Headers are not needed.

Changed in linux (Ubuntu):
status: Confirmed → Incomplete
Revision history for this message
Alex Hung (alexhung) wrote :

The slow CPU (N5000 CPU @ 1.10GHz) may play a role in the watchdog soft lockup. You can increase the watchdog time and check whether the messages will go away and pop up less frequently:

  $ echo 20 | sudo tee /proc/sys/kernel/watchdog_thresh

The above command will change the default (10) to 20

Revision history for this message
js1 (sujiannming) wrote :

I downgraded to 20.04 LTS and 5.8 kernel. So far, it seems more reliable than the 5.11 kernel. The watchdog_thresh is default 10.

Revision history for this message
Launchpad Janitor (janitor) wrote :

[Expired for linux (Ubuntu) because there has been no activity for 60 days.]

Changed in linux (Ubuntu):
status: Incomplete → Expired
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.