Launchpad has imported 5 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=1373326.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2016-09-06T02:30:37+00:00 Vinson wrote:

Description of problem:
kernel BUG at mm/usercopy.c:75!

Version-Release number of selected component (if applicable):
kernel-4.8.0-0.rc4.git4.1.fc26.x86_64

How reproducible:

Steps to Reproduce:
1. boot
2.
3.

Actual results:

------------[ cut here ]------------
kernel BUG at mm/usercopy.c:75!
invalid opcode: 0000 [#1] SMP
Modules linked in: xt_CHECKSUM ipt_MASQUERADE nf_nat_masquerade_ipv4 tun 
nf_conntrack_netbios_ns nf_conntrack_broadcast ip6t_rpfilter ip6t_REJECT 
nf_reject_ipv6 xt_conntrack ip_set nfnetlink ebtable_nat ebtable_broute bridge 
stp llc ip6table_raw ip6table_nat nf_conntrack_ipv6 nf_defrag_ipv6 nf_nat_ipv6 
ip6table_mangle ip6table_security iptable_raw iptable_nat nf_conntrack_ipv4 
nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_mangle iptable_security 
ebtable_filter ebtables ip6table_filter ip6_tables bnep 
vmw_vsock_vmci_transport vsock snd_seq_midi snd_seq_midi_event intel_powerclamp 
coretemp crct10dif_pclmul crc32_pclmul ppdev ghash_clmulni_intel btusb 
intel_rapl_perf uvcvideo btrtl btbcm btintel vmw_balloon snd_ens1371 gameport 
videobuf2_vmalloc snd_rawmidi videobuf2_memops bluetooth
 videobuf2_v4l2 snd_ac97_codec videobuf2_core ac97_bus videodev snd_seq 
snd_seq_device media snd_pcm rfkill joydev snd_timer snd soundcore vmw_vmci 
shpchp nfit i2c_piix4 parport_pc parport acpi_cpufreq tpm_tis tpm_tis_core tpm 
nfsd auth_rpcgss nfs_acl lockd grace sunrpc crc32c_intel serio_raw vmwgfx 
drm_kms_helper e1000 ttm mptspi scsi_transport_spi drm mptscsih ata_generic 
mptbase pata_acpi fjes
CPU: 0 PID: 1268 Comm: gnome-shell Not tainted 4.8.0-0.rc4.git4.1.fc26.x86_64 #1
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference 
Platform, BIOS 6.00 07/02/2015
task: ffff9394e8568000 task.stack: ffff9394cece8000
RIP: 0010:[<ffffffffa629eea1>]  [<ffffffffa629eea1>] 
__check_object_size+0x111/0x47a
RSP: 0018:ffff9394cecebc10  EFLAGS: 00010282
RAX: 000000000000006c RBX: ffff9394e6800000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: ffff9394ed7ce2a8 RDI: ffff9394ed7ce2a8
RBP: ffff9394cecebc58 R08: 0000000000000001 R09: 0000000000000001
R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000001128
R13: 0000000000000000 R14: ffff9394e6801128 R15: 000003fffff00000
FS:  00007f5a72ac4ac0(0000) GS:ffff9394ed600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000558bcb39db08 CR3: 000000004ee6b000 CR4: 00000000003406f0
Stack:
 ffff9394e8568000 0000558bcb3086e0 ffff9394e72c0000 ffff9394e6801127
 ffff9394e72c0000 0000558bcb3086e0 ffff9394e72c0000 ffff9394e6800000
 0000000000001128 ffff9394cecebd90 ffffffffc0369eec 0000000000000246
Call Trace:
 [<ffffffffc0369eec>] vmw_execbuf_process+0x97c/0x1370 [vmwgfx]
 [<ffffffffc02e9138>] ? __ttm_read_lock+0x48/0x90 [ttm]
 [<ffffffffc02e95a6>] ? ttm_read_lock.part.1+0x46/0xd0 [ttm]
 [<ffffffffa6237283>] ? __might_fault+0x43/0xa0
 [<ffffffffc02e965c>] ? ttm_read_lock+0x2c/0xd0 [ttm]
 [<ffffffffc036aa72>] vmw_execbuf_ioctl+0x142/0x1b0 [vmwgfx]
 [<ffffffffc036e971>] vmw_generic_ioctl+0x251/0x290 [vmwgfx]
 [<ffffffffc036e9e5>] vmw_unlocked_ioctl+0x15/0x20 [vmwgfx]
 [<ffffffffa62ba403>] do_vfs_ioctl+0xa3/0x720
 [<ffffffffa62c7c85>] ? __fget+0x5/0x200
 [<ffffffffa62baaf9>] SyS_ioctl+0x79/0x90
 [<ffffffffa68fadbc>] entry_SYSCALL_64_fastpath+0x1f/0xbd
Code: 36 02 00 00 49 c7 c0 dc f9 c7 a6 48 c7 c2 5b 78 c5 a6 48 c7 c6 4d 20 c7 
a6 4d 89 e1 48 89 d9 48 c7 c7 80 b3 c7 a6 e8 59 71 f5 ff <0f> 0b 4c 8b 75 b8 48 
8b 5d c8 45 89 fd 4c 8b 65 c0 4c 89 e6 48 
RIP  [<ffffffffa629eea1>] __check_object_size+0x111/0x47a
 RSP <ffff9394cecebc10>
---[ end trace 638c903d059d8786 ]---

Expected results:


Additional info:

Reply at:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1627198/comments/0

------------------------------------------------------------------------
On 2016-09-06T16:31:45+00:00 Laura wrote:

Hardened usercopy caught something, can you share the full kernel log

Reply at:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1627198/comments/1

------------------------------------------------------------------------
On 2016-09-06T18:53:31+00:00 Vinson wrote:

Created attachment 1198401
4.8.0-0.rc4.git4.1.fc26.x86_64 kernel log

Reply at:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1627198/comments/2

------------------------------------------------------------------------
On 2016-10-18T14:07:41+00:00 Neil wrote:

Looks like a failure on copy_from_user, specifically vmware tried to
preform a copy_from_user of more thana page worth of data to a heap
allocated space allocated via vmalloc.

Upstream, this shouldn't be a problem as vmalloc addresses shouldn't be
tested page spanning, as per commit
8e1f74ea02cf4562404c48c6882214821552c13f.  Thats not available to
4.8-rc6.  I can backport it if you like, or we can just wait for the
update. Let me know what you would like to do

Reply at:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1627198/comments/64

------------------------------------------------------------------------
On 2016-10-18T14:49:35+00:00 Laura wrote:

This is available in the current rawhide release.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1627198/comments/65


** Changed in: linux
       Status: Unknown => Fix Released

** Changed in: linux
   Importance: Unknown => Undecided

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1627198

Title:
  4.8.0 kernels do not complete boot process on VM

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1627198/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to