Bug 1048944

Summary: [abrt] WARNING: CPU: 0 PID: 682 at arch/x86/kernel/rtc.c:92 mach_get_cmos_time+0x1af/0x1c0()
Product: [Fedora] Fedora Reporter: Mitch Davis <mjd+redhat>
Component: kernelAssignee: Kernel Maintainer List <kernel-maint>
Status: CLOSED INSUFFICIENT_DATA QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 19CC: code933k, gansalmon, itamar, jonathan, kernel-maint, madhu.chinakonda
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Unspecified   
URL: https://retrace.fedoraproject.org/faf/reports/bthash/6c80a5367cdbb447507ba86479bbf9cb36abf309
Whiteboard: abrt_hash:fa3cd25c19d79d93094a1eb355485d9543601fd5
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-06-23 14:41:42 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
File: dmesg none

Description Mitch Davis 2014-01-06 15:09:17 UTC
Additional info:
reporter:       libreport-2.1.10
WARNING: CPU: 0 PID: 682 at arch/x86/kernel/rtc.c:92 mach_get_cmos_time+0x1af/0x1c0()
Modules linked in: cdc_ncm usbnet option mii usb_wwan ums_realtek usb_storage rfcomm fuse xt_CHECKSUM nf_conntrack_netbios_ns nf_conntrack_broadcast ipt_MASQUERADE ip6t_REJECT tun bnep bluetooth xt_conntrack ebtable_nat ebtable_broute bridge stp llc ebtable_filter ebtables ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 ip6table_mangle ip6table_security ip6table_raw ip6table_filter ip6_tables iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security iptable_raw arc4 snd_hda_codec_hdmi snd_hda_codec_realtek coretemp kvm_intel kvm snd_hda_intel iTCO_wdt snd_hda_codec iTCO_vendor_support snd_hwdep uvcvideo snd_seq crc32c_intel snd_seq_device ath9k videobuf2_vmalloc snd_pcm ath9k_common ath9k_hw videobuf2_memops microcode broadcom videobuf2_core videodev ath media mac80211 tg3 snd_page_alloc serio_raw ptp intel_ips i2c_i801 pps_core cfg80211 lpc_ich mfd_core mei_me snd_timer shpchp snd mei soundcore acer_wmi sparse_keymap rfkill mxm_wmi wmi acpi_cpufreq uinput i915 i2c_algo_bit drm_kms_helper drm i2c_core video
CPU: 0 PID: 682 Comm: systemd-sleep Not tainted 3.12.5-200.fc19.x86_64 #1
Hardware name: Acer Aspire 5742/Aspire 5742, BIOS V1.16 02/16/2011
 0000000000000009 ffff88011e22bd10 ffffffff8166305a 0000000000000000
 ffff88011e22bd48 ffffffff8106925d ffff88011e22bdc8 0000000000000020
 0000000000000028 0000000000000000 0000000000000000 ffff88011e22bd58
Call Trace:
 [<ffffffff8166305a>] dump_stack+0x45/0x56
 [<ffffffff8106925d>] warn_slowpath_common+0x7d/0xa0
 [<ffffffff8106933a>] warn_slowpath_null+0x1a/0x20
 [<ffffffff8101ae4f>] mach_get_cmos_time+0x1af/0x1c0
 [<ffffffff8101ae9f>] read_persistent_clock+0xf/0x20
 [<ffffffff810c2ca3>] timekeeping_resume+0x23/0x1b0
 [<ffffffff810c04b7>] ? resume_irqs+0x67/0xb0
 [<ffffffff81400084>] syscore_resume+0x44/0xe0
 [<ffffffff810af9f7>] hibernation_snapshot+0x267/0x360
 [<ffffffff810b02f0>] hibernate+0x130/0x1e0
 [<ffffffff810adfb4>] state_store+0xe4/0xf0
 [<ffffffff81305dcf>] kobj_attr_store+0xf/0x20
 [<ffffffff81222506>] sysfs_write_file+0xc6/0x140
 [<ffffffff811ae77d>] vfs_write+0xbd/0x1e0
 [<ffffffff811af1b9>] SyS_write+0x49/0xa0
 [<ffffffff816720a9>] system_call_fastpath+0x16/0x1b

Comment 1 Mitch Davis 2014-01-06 15:09:24 UTC
Created attachment 846141 [details]
File: dmesg

Comment 2 Justin M. Forbes 2014-03-10 14:52:16 UTC
*********** MASS BUG UPDATE **************

We apologize for the inconvenience.  There is a large number of bugs to go through and several of them have gone stale.  Due to this, we are doing a mass bug update across all of the Fedora 19 kernel bugs.

Fedora 19 has now been rebased to 3.13.5-100.fc19.  Please test this kernel update and let us know if you issue has been resolved or if it is still present with the newer kernel.

If you experience different issues, please open a new bug report for those.

Comment 3 Justin M. Forbes 2014-06-23 14:41:42 UTC
*********** MASS BUG UPDATE **************
This bug is being closed with INSUFFICIENT_DATA as there has not been a response in 4 weeks. If you are still experiencing this issue, please reopen and attach the relevant data from the latest kernel you are running and any data that might have been requested previously.

Comment 4 Mario GarcĂ­a H. 2014-09-21 16:56:52 UTC
I'm getting exactly the same warning from Fedora 20 (stable and updates-testing). Linux 3.16.3-200.fc20.x86_64 #1 SMP Wed Sep 17 22:34:21 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux

Also I have many problems trying to get a stable clock source whenever the laptop goes to sleep. Time jumps even years ahead (eg. 2019). 

I really want to stick with Fedora, so ask me for whatever info you need in order to resolve this bug.

[    0.000000] WARNING: CPU: 0 PID: 0 at arch/x86/kernel/rtc.c:92 mach_get_cmos_time+0x1af/0x1c0()
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G          I   3.16.3-200.fc20.x86_64 #1
[    0.000000] Hardware name: Sony Corporation SVF14N23CLB/VAIO, BIOS T1080DD_MP_PXE_01 12/02/2013
[    0.000000]  0000000000000000 fd159ac29950d5e8 ffffffff81c03e38 ffffffff81707091
[    0.000000]  0000000000000000 ffffffff81c03e70 ffffffff8108d0ad ffffffff81c03ef0
[    0.000000]  0000000000000000 0000000000000031 0000000000000000 0000000000000004
[    0.000000] Call Trace:
[    0.000000]  [<ffffffff81707091>] dump_stack+0x45/0x56
[    0.000000]  [<ffffffff8108d0ad>] warn_slowpath_common+0x7d/0xa0
[    0.000000]  [<ffffffff8108d1da>] warn_slowpath_null+0x1a/0x20
[    0.000000]  [<ffffffff8101df8f>] mach_get_cmos_time+0x1af/0x1c0
[    0.000000]  [<ffffffff8101dfdf>] read_persistent_clock+0xf/0x20
[    0.000000]  [<ffffffff81d54bfc>] timekeeping_init+0x23/0x1e0
[    0.000000]  [<ffffffff8170af55>] ? _cond_resched+0x5/0x40
[    0.000000]  [<ffffffff8170cd72>] ? mutex_lock+0x12/0x2f
[    0.000000]  [<ffffffff8170cb15>] ? mutex_unlock+0x5/0x20
[    0.000000]  [<ffffffff81d31f2d>] start_kernel+0x2b1/0x491
[    0.000000]  [<ffffffff81d31a85>] ? set_init_arg+0x53/0x53
[    0.000000]  [<ffffffff81d31120>] ? early_idt_handlers+0x120/0x120
[    0.000000]  [<ffffffff81d315ee>] x86_64_start_reservations+0x2a/0x2c
[    0.000000]  [<ffffffff81d3173d>] x86_64_start_kernel+0x14d/0x170