Comment 2 for bug 1641403

Revision history for this message
Pehr Söderman (pehrs-7) wrote :

Here is the complete Ooops:

[134346.139427] BUG: unable to handle kernel NULL pointer dereference at 00000104
[134346.139570] IP: [<f8c71e63>] vmballoon_work+0x283/0x767 [vmw_balloon]
[134346.139715] *pdpt = 0000000035347001 *pde = 0000000000000000
[134346.139804] Oops: 0002 [#1] SMP
[134346.139857] Modules linked in: vmw_vsock_vmci_transport vsock binfmt_misc ppdev vmw_balloon joydev input_leds serio_raw 8250_fintek shpchp i2c_piix4 parport_pc vmw_vmci mac_hid quota_v2 quota_tree ib_iser rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi lp parport autofs4 btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear vmwgfx psmouse ttm pcnet32 mptspi drm_kms_helper mptscsih syscopyarea sysfillrect mptbase sysimgblt fb_sys_fops mii drm scsi_transport_spi pata_acpi floppy fjes
[134346.140778] CPU: 0 PID: 13294 Comm: kworker/0:1 Not tainted 4.4.0-43-generic #63-Ubuntu
[134346.140879] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 09/17/2015
[134346.141047] Workqueue: events_freezable vmballoon_work [vmw_balloon]
[134346.141146] task: f1ee9180 ti: ed3be000 task.ti: ed3be000
[134346.141239] EIP: 0060:[<f8c71e63>] EFLAGS: 00010246 CPU: 0
[134346.141315] EIP is at vmballoon_work+0x283/0x767 [vmw_balloon]
[134346.141497] EAX: f76e4a3c EBX: 00000100 ECX: f76f8000 EDX: 000001bb
[134346.141713] ESI: 000001bb EDI: f8c74410 EBP: ed3bfefc ESP: ed3bfeb8
[134346.141769] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
[134346.141818] CR0: 8005003b CR2: 00000104 CR3: 35a57d00 CR4: 000006f0
[134346.141938] Stack:
[134346.141962] f8c74330 ed3bfed4 00000286 000000fa f2826d00 ed3bfee4 00000286 f8c74330
[134346.142050] 00000000 00000001 f8c74300 f8c74300 00000100 000000ec f8c74410 f1694c00
[134346.142153] f5dbb8c0 ed3bff34 c1087751 aa510bc3 00007a2f aa4e1e10 00007a2f f5dbbdc0
[134346.142240] Call Trace:
[134346.142272] [<c1087751>] process_one_work+0x121/0x3f0
[134346.142321] [<c1087a57>] worker_thread+0x37/0x490
[134346.142444] [<c1087a20>] ? process_one_work+0x3f0/0x3f0
[134346.142496] [<c108cf06>] kthread+0xa6/0xc0
[134346.142547] [<c17b3309>] ret_from_kernel_thread+0x21/0x38
[134346.142600] [<c108ce60>] ? kthread_create_on_node+0x170/0x170
[134346.142653] Code: ff ff ff 85 c0 74 1c 8b 5c 24 24 8b 97 1c ff ff ff 05 00 02 00 00 0f af de 29 da 39 c2 0f 82 95 01 00 00 8b 59 14 8b 41 18 89 f2 <89> 43 04 89 18 8d 5e 01 c7 41 14 00 01 00 00 c7 41 18 00 02 00
[134346.148533] EIP: [<f8c71e63>] vmballoon_work+0x283/0x767 [vmw_balloon] SS:ESP 0068:ed3bfeb8
[134346.150469] CR2: 0000000000000104