This bug is missing log files that will aid in diagnosing the problem. >From a terminal window please run:
apport-collect 1628686 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1628686 Title: kernel BUG at linux-4.8.0/mm/usercopy.c:75! Status in linux package in Ubuntu: Incomplete Bug description: This kernel warning occurs on Ubuntu 16.10 guests with Linux 4.8 on VMware Fusion. The VM will boot but does not make it a graphical display. usercopy: kernel memory overwrite attempt detected to ffff9bdaf3e00000 (<spans multiple pages>) (4392 bytes) ------------[ cut here ]------------ kernel BUG at /build/linux-FGN3Aj/linux-4.8.0/mm/usercopy.c:75! invalid opcode: 0000 [#1] SMP Modules linked in: intel_powerclamp coretemp crct10dif_pclmul crc32_pclmul ghash_clmulni_intel ipmi_msghandler aesni_intel vmw_balloon aes_x86_64 lrw glue_helper ablk_helper cryptd intel_rapl_perf joydev input_leds serio_raw binfmt_misc snd_ens1371 snd_ac97_codec gameport ac97_bus snd_pcm uvcvideo videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_core snd_seq_midi videodev snd_seq_midi_event media snd_rawmidi snd_seq snd_seq_device btusb btrtl btbcm snd_timer btintel snd bluetooth soundcore i2c_piix4 vmw_vmci shpchp nfit floppy(+) mac_hid parport_pc ppdev lp parport ip_tables x_tables autofs4 hid_generic usbhid hid vmwgfx ttm psmouse drm_kms_helper syscopyarea sysfillrect ahci libahci e1000 mptspi mptscsih mptbase scsi_transport_spi sysimgblt fb_sys_fops drm pata_acpi fjes CPU: 0 PID: 1293 Comm: glxinfo Not tainted 4.8.0-17-generic #19-Ubuntu Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015 task: ffff9bdb74465580 task.stack: ffff9bdb73f00000 RIP: 0010:[<ffffffff9cc2e421>] [<ffffffff9cc2e421>] __check_object_size+0x111/0x49b RSP: 0018:ffff9bdb73f03c58 EFLAGS: 00010282 RAX: 000000000000006c RBX: ffff9bdaf3e00000 RCX: 0000000000000000 RDX: 0000000000000000 RSI: ffff9bdb7a60dc68 RDI: ffff9bdb7a60dc68 RBP: ffff9bdb73f03ca0 R08: 79706f6372657375 R09: 656b203a79706f63 R10: 00003fffc0000000 R11: 00000000000006c1 R12: 0000000000001128 R13: 0000000000000000 R14: ffff9bdaf3e01128 R15: ffff9bdaf3e01127 FS: 00007f22f6d20740(0000) GS:ffff9bdb7a600000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055b6cf2c71c8 CR3: 00000000b3f91000 CR4: 00000000001406f0 Stack: ffff9bdb73f16ce8 ffff9bdb73f03ca0 ffffffffc03df765 00003fffc0000000 ffff9bdaf41c0000 000055b6cf0ca1b0 ffff9bdb73edbc00 ffff9bdaf3e00000 0000000000001128 ffff9bdb73f03d90 ffffffffc03c6f0f ffff9bdb73f03d08 Call Trace: [<ffffffffc03df765>] ? vmw_cmdbuf_alloc+0x175/0x240 [vmwgfx] [<ffffffffc03c6f0f>] vmw_execbuf_process+0x8bf/0x1250 [vmwgfx] [<ffffffff9cc2e43d>] ? __check_object_size+0x12d/0x49b [<ffffffffc0246dd6>] ? drm_ioctl+0x236/0x4f0 [drm] [<ffffffff9cbab015>] ? __alloc_pages_nodemask+0x135/0x300 [<ffffffffc03b0cb4>] ? ttm_read_lock+0x34/0xc0 [ttm] [<ffffffffc03c79c6>] vmw_execbuf_ioctl+0xe6/0x180 [vmwgfx] [<ffffffffc03cb919>] vmw_generic_ioctl+0x249/0x280 [vmwgfx] [<ffffffffc03cb985>] vmw_unlocked_ioctl+0x15/0x20 [vmwgfx] [<ffffffff9cc47843>] do_vfs_ioctl+0xa3/0x610 [<ffffffff9ca6b3b3>] ? __do_page_fault+0x203/0x4d0 [<ffffffff9cc47e29>] SyS_ioctl+0x79/0x90 [<ffffffff9d299c76>] entry_SYSCALL_64_fastpath+0x1e/0xa8 Code: 1f 03 00 00 49 c7 c0 86 36 6a 9d 48 c7 c2 30 0b 68 9d 48 c7 c6 4c 8e 69 9d 4d 89 e1 48 89 d9 48 c7 c7 10 03 6a 9d e8 03 05 f7 ff <0f> 0b 4c 8b 75 b8 48 8b 5d d0 45 89 fd 4c 8b 65 c8 4c 89 e6 48 RIP [<ffffffff9cc2e421>] __check_object_size+0x111/0x49b RSP <ffff9bdb73f03c58> ---[ end trace 48bce713521eb13e ]--- Disabling CONFIG_HARDENED_USERCOPY_PAGESPAN works around this issue. http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e1f74ea02cf4562404c48c6882214821552c13f To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1628686/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp