Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v4.11 kernel[0].
If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'. If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'. Once testing of the upstream kernel is complete, please mark this bug as "Confirmed". Thanks in advance. [0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.11-rc7 ** Changed in: linux (Ubuntu) Importance: Undecided => Medium ** Tags added: kernel-da-key xenial -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1683510 Title: WARNING: CPU: 0 PID: 0 at /build/linux- 1hW8mg/linux-4.4.0/arch/x86/kernel/rtc.c:92 mach_get_cmos_time+0x186/0x1a0() Status in linux package in Ubuntu: Confirmed Bug description: ------------[ cut here ]------------ WARNING: CPU: 0 PID: 0 at /build/linux-1hW8mg/linux-4.4.0/arch/x86/kernel/rtc.c:92 mach_get_cmos_time+0x186/0x1a0() Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.4.0-64-generic #85-Ubuntu 0000000000000086 394369744a471514 ffffffff81e03e10 ffffffff813f8083 0000000000000000 ffffffff81ca9210 ffffffff81e03e48 ffffffff810812d2 0000000000000020 ffffffff81e03ec8 0000000000000001 000000000000002b Call Trace: [<ffffffff813f8083>] dump_stack+0x63/0x90 [<ffffffff810812d2>] warn_slowpath_common+0x82/0xc0 [<ffffffff8108141a>] warn_slowpath_null+0x1a/0x20 [<ffffffff81038c66>] mach_get_cmos_time+0x186/0x1a0 [<ffffffff81038cbf>] read_persistent_clock+0xf/0x20 [<ffffffff810f6629>] read_persistent_clock64+0x29/0x60 [<ffffffff8107cf2a>] ? _set_gate.isra.2.constprop.5+0x74/0x91 [<ffffffff81f84703>] timekeeping_init+0x23/0x1c4 [<ffffffff818386f5>] ? _cond_resched+0x5/0x30 [<ffffffff818386f5>] ? _cond_resched+0x5/0x30 [<ffffffff8183a442>] ? mutex_lock+0x12/0x30 [<ffffffff8140ce05>] ? find_next_bit+0x15/0x20 [<ffffffff81f5de64>] start_kernel+0x2d4/0x4a2 [<ffffffff81f5d120>] ? early_idt_handler_array+0x120/0x120 [<ffffffff81f5d339>] x86_64_start_reservations+0x2a/0x2c [<ffffffff81f5d485>] x86_64_start_kernel+0x14a/0x16d ---[ end trace 73a280b8d116bceb ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1683510/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp