Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #673760
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2022-08-21
Last occurrence
2022-09-04
Unique reports
2
Quality
-36

Statistics

Operating system Unique / Total count
Fedora 36 2 / 2
Operating system Count
Fedora 36 2
Architecture Count
x86_64 2

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
ktime_get
vmlinux 0x38
2
ktime_get
vmlinux 0x38
3
ktime_get
vmlinux 0x38
4
ktime_get
vmlinux 0x38
5
ktime_get
vmlinux 0x38
6
ktime_get
vmlinux 0x38
7
ktime_get
vmlinux 0x38
8
ktime_get
vmlinux 0x38
9
? ktime_get
vmlinux 0x38
10
? ktime_get
vmlinux 0x38
11
? ktime_get
vmlinux 0x38
12
? ktime_get
vmlinux 0x38
13
? ktime_get
vmlinux 0x38
14
ktime_get
vmlinux 0x38
WARNING: CPU: 0 PID: 13606 at kernel/power/suspend_test.c:53 suspend_test_finish+0x70/0x80
Modules linked in: tls uinput ntfs3 nvidia_drm(POE) nvidia_modeset(POE) nvidia_uvm(POE) nvidia(POE) nft_objref nf_conntrack_netbios_ns nf_conntrack_broadcast nft_fib_inet nft_fib_ipv4 nft_fib_ipv6 nft_fib nft_reject_inet nf_reject_ipv4 nf_reject_ipv6 nft_reject nft_ct nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables nfnetlink qrtr sunrpc vfat fat intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm mei_pxp mei_hdcp at24 irqbypass rapl intel_cstate intel_uncore mei_me i2c_i801 mei i2c_smbus joydev acpi_pad video zram crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel e1000e uas usb_storage ip6_tables ip_tables fuse
CPU: 0 PID: 13606 Comm: systemd-sleep Tainted: P           OE     5.18.18-200.fc36.x86_64 #1
Hardware name: MSI MS-7915/Z97 MPOWER (MS-7915), BIOS V1.11 02/23/2016
RIP: 0010:suspend_test_finish+0x70/0x80
Code: 03 00 00 29 c1 e8 03 c9 ba 00 81 fb 10 27 00 00 77 07 5b 5d c3 cc cc cc cc 89 da 48 89 ee 48 c7 c7 20 6b 61 93 e8 b4 69 ba 00 <0f> 0b 5b 5d c3 cc cc cc cc cc cc cc cc cc cc cc 0f 1f 44 00 00 0f
RSP: 0018:ffffa2af040a7ce0 EFLAGS: 00010282
RAX: 0000000000000026 RBX: 000000000000315a RCX: 0000000000000000
RDX: 0000000000000001 RSI: ffffffff9366edec RDI: 00000000ffffffff
RBP: ffffffff93616a69 R08: ffffffff93e653a0 R09: 0000000000000004
R10: ffffffffffffffff R11: ffffffff94a57026 R12: 0000000000000000
R13: 0000000000000000 R14: 0000000000000004 R15: ffff979026a10ce0
FS:  00007f8a07a11b40(0000) GS:ffff9795cec00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fad5dc79088 CR3: 000000026dfce004 CR4: 00000000001706f0
Call Trace:
 <TASK>
 suspend_devices_and_enter+0x192/0x830
 pm_suspend.cold+0x2fa/0x343
 state_store+0x68/0xd0
 kernfs_fop_write_iter+0x11e/0x1f0
 new_sync_write+0xed/0x160
 vfs_write+0x209/0x290
 ksys_write+0x53/0xd0
 do_syscall_64+0x5b/0x80
 ? handle_mm_fault+0xae/0x280
 ? do_user_addr_fault+0x1e2/0x670
 ? syscall_exit_to_user_mode+0x17/0x40
 ? do_syscall_64+0x67/0x80
 ? exc_page_fault+0x70/0x170
 entry_SYSCALL_64_after_hwframe+0x61/0xcb
RIP: 0033:0x7f8a086188f7
Code: 0f 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b7 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 48 89 54 24 18 48 89 74 24
RSP: 002b:00007ffcace74638 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00007f8a086188f7
RDX: 0000000000000004 RSI: 00007ffcace74720 RDI: 0000000000000004
RBP: 00007ffcace74720 R08: 00005561fca4c8b0 R09: 0000000000000000
R10: 00005561fc23d158 R11: 0000000000000246 R12: 0000000000000004
R13: 00005561fca483e0 R14: 0000000000000004 R15: 00007f8a0870b9e0
 </TASK>