Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #727928
Component
kernel
Last affected version
N/A
Executable
unknown
First occurrence
2021-04-08
Last occurrence
2021-04-08
Unique reports
1
Quality
-20

Statistics

Operating system Unique / Total count
Fedora 31 1 / 1
Operating system Count
Fedora 31 1
Architecture Count
x86_64 1

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
pci_pm_suspend
vmlinux 0x74
2
pci_pm_suspend
vmlinux 0x74
3
pci_pm_suspend
vmlinux 0x74
4
pci_pm_suspend
vmlinux 0x74
5
? pci_pm_suspend
vmlinux 0x74
6
? pci_pm_suspend
vmlinux 0x74
7
pci_pm_suspend
vmlinux 0x74
8
pci_pm_suspend
vmlinux 0x74
9
pci_pm_suspend
vmlinux 0x74
WARNING: CPU: 2 PID: 446768 at fs/fs-writeback.c:2330 __mark_inode_dirty+0x17c/0x380
Modules linked in: exfat ses enclosure scsi_transport_sas uas usb_storage snd_hda_codec_hdmi snd_hda_codec_realtek snd_hda_codec_generic rfcomm uhid ccm xt_CHECKSUM xt_MASQUERADE nf_nat_tftp nf_conntrack_tftp nf_conntrack_netbios_ns nf_conntrack_broadcast xt_CT ip6t_REJECT nf_reject_ipv6 ip6t_rpfilter ipt_REJECT nf_reject_ipv4 xt_conntrack tun bridge stp llc ebtable_nat ebtable_broute ip6table_nat ip6table_mangle ip6table_raw ip6table_security iptable_nat nf_nat iptable_mangle iptable_raw iptable_security nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nfnetlink ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter cmac bnep sunrpc vfat fat squashfs loop uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_common videodev btusb mc btrtl btbcm btintel bluetooth ecdh_generic ecc mei_hdcp snd_sof_pci snd_sof_intel_byt snd_sof_intel_ipc snd_sof_intel_hda_common iTCO_wdt intel_pmc_bxt iTCO_vendor_support snd_soc_hdac_hda snd_sof_xtensa_dsp
 snd_sof_intel_hda snd_sof intel_rapl_msr ledtrig_audio snd_soc_skl snd_soc_sst_ipc snd_soc_sst_dsp snd_hda_ext_core snd_soc_acpi_intel_match snd_soc_acpi x86_pkg_temp_thermal intel_powerclamp coretemp snd_soc_core kvm_intel kvm snd_compress ac97_bus snd_pcm_dmaengine snd_hda_intel snd_intel_dspcfg snd_hda_codec snd_hda_core irqbypass rapl intel_cstate snd_hwdep intel_uncore snd_seq snd_seq_device snd_pcm asus_nb_wmi asus_wmi pcspkr wmi_bmof sparse_keymap snd_timer snd i2c_i801 joydev i2c_smbus soundcore iwlmvm int3403_thermal mac80211 libarc4 iwlwifi mei_me acpi_tad cfg80211 spi_pxa2xx_platform acpi_pad int3400_thermal acpi_thermal_rel dw_dmac mei intel_pch_thermal processor_thermal_device intel_rapl_common idma64 rfkill int340x_thermal_zone intel_soc_dts_iosf binfmt_misc ip_tables nouveau i915 hid_multitouch ttm mxm_wmi i2c_algo_bit drm_kms_helper crct10dif_pclmul crc32_pclmul cec crc32c_intel drm ghash_clmulni_intel serio_raw nvme nvme_core i2c_hid wmi pinctrl_cannonlake
 video pinctrl_intel fuse
CPU: 2 PID: 446768 Comm: pool-org.gnome. Not tainted 5.8.18-100.fc31.x86_64 #1
Hardware name: ASUSTeK COMPUTER INC. ZenBook UX433FN_UX433FN/UX433FN, BIOS UX433FN.307 05/22/2019
RIP: 0010:__mark_inode_dirty+0x17c/0x380
Code: ff ff 48 8b 38 49 89 c4 f6 47 54 02 75 1e 48 8b 40 08 a8 01 75 16 e8 b3 e2 f2 ff 48 c7 c7 f0 a7 3e 96 48 89 c6 e8 e6 d8 d8 ff <0f> 0b 48 8b 05 6b 80 6b 01 48 89 85 c8 00 00 00 45 85 ff 74 0e 48
RSP: 0018:ffffb68105203e18 EFLAGS: 00010296
RAX: 000000000000001c RBX: 0000000000000001 RCX: 0000000000000027
RDX: 0000000000000027 RSI: 0000000000000092 RDI: ffff8b531dc98d08
RBP: ffff8b5113328978 R08: ffff8b531dc98d00 R09: 0000000000000003
R10: 0000000000000000 R11: 0000000000000001 R12: ffff8b5303609000
R13: ffff8b5113328a00 R14: 0000000000000000 R15: 0000000000000000
FS:  00007f1551e35700(0000) GS:ffff8b531dc80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f156401ba78 CR3: 00000003699ec005 CR4: 00000000003606e0
Call Trace:
 generic_update_time+0x9d/0xc0
 touch_atime+0x88/0xa0
 iterate_dir+0x112/0x190
 ksys_getdents64+0x69/0xf0
 ? verify_dirent_name+0x30/0x30
 ? __prepare_exit_to_usermode+0xa5/0x1e0
 __x64_sys_getdents64+0x16/0x20
 do_syscall_64+0x4d/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f157b90159b
Code: 0f 1e fa 48 8b 47 20 c3 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 81 fa ff ff ff 7f b8 ff ff ff 7f 48 0f 47 d0 b8 d9 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 05 c3 0f 1f 40 00 48 8b 15 b9 88 0f 00 f7 d8
RSP: 002b:00007f1551e34a38 EFLAGS: 00000293 ORIG_RAX: 00000000000000d9
RAX: ffffffffffffffda RBX: 00007f1564013a40 RCX: 00007f157b90159b
RDX: 0000000000008000 RSI: 00007f1564013a70 RDI: 0000000000000023
RBP: 00007f1564013a70 R08: 0000000000000030 R09: 00007f153c0016f0
R10: 0000000000000000 R11: 0000000000000293 R12: fffffffffffffe98
R13: 00007f1564013a44 R14: 000000000000000b R15: 00007f154c00a5c0