This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1716483

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
       Status: New => Incomplete

** Tags added: zesty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1716483

Title:
  [SRU][Zesty] Fix lscpu segfault on ARM64 with SMBIOS v2.0

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  [Impact]
  On ARM64 systems with smbios v2.0, lscpu segfaults. This is caused by the 
fact that lspci issues a read() on /dev/mem at the offset where it expects to 
find the SMBIOS structure array. However, this
  region is classified as EFI_RUNTIME_SERVICE_DATA (as per the UEFI spec), and 
so it is omitted from the linear mapping.

  [Test]
  The issue was observed with kexec/kdump usecases when a FPDT ACPI table is 
presented to HLOS from the firmware.

  [Fix]
  Fixed upstream:
  1151f838cb62 arm64: kernel: restrict /dev/mem read() calls to linear region

  [Regression Potential]
  The patch is confined to ARM64 arch, and applies only to systems with SMBIOS 
v2.0. Risk is low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1716483/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to