Public bug reported:

To read and scan SMBIOS in /dev/mem is dangerous and for DMI information
it will be better to read from /sys/firmware/dmi/tables/DMI if it
exists.

[278063.180820] Process lscpu (pid: 22668, stack limit = 0xffff842fb2a0c000)
[278063.187593] Stack: (0xffff842fb2a0fd90 to 0xffff842fb2a10000)
[278063.193412] fd80:                                   ffff842fb2a0fe00 
ffff00000829bf00
[278063.201315] fda0: ffff801fae2a9a00 0000000025ccb150 0000000000000020 
ffff842fb2a0feb0
[278063.209217] fdc0: 0000000000000020 0000000000000015 0000000000000123 
000000000000003f
[278063.217120] fde0: ffff000008a22000 ffff842faf449c00 ffff842fb2a0feb0 
ffff842faf449c00
[278063.225022] fe00: ffff842fb2a0fe30 ffff00000829d484 0000000000000020 
ffff801fae2a9a00
[278063.232925] fe20: 0000000025ccb150 ffff842fb2a0feb0 ffff842fb2a0fe70 
ffff00000829ebbc
[278063.240827] fe40: ffff000009208000 ffff801fae2a9a00 ffff801fae2a9a00 
0000000025ccb150
[278063.248730] fe60: 0000000000000020 ffffffffffffffea 0000000000000000 
ffff0000080838f0
[278063.256632] fe80: 0000000000000000 0000801ff2faa000 ffffffffffffffff 
0000ffffa7e06fe8
[278063.264535] fea0: 0000000080000000 0000ffffa7e13128 00000000398a0000 
0000000000040a01
[278063.272437] fec0: 0000000000000003 0000000025ccb150 0000000000000020 
0000000000000020
[278063.280340] fee0: 0000000025ccb150 0000fffffe1023d8 00000000398a0000 
0000000000000000
[278063.288243] ff00: 000000000000003f 0000ffffa7e8e9a8 0101010101010101 
0000000000000010
[278063.296145] ff20: 000000000000000f ffffffffffffffff 0000000000000000 
0000ffffa7eefcc0
[278063.304048] ff40: 0000000000000000 000000000041c240 0000000000000a03 
0000000000000020
[278063.311950] ff60: 0000000025ccb150 0000000000000003 0000000000000000 
0000000025ccb150
[278063.319853] ff80: 000000000041c000 0000000000000000 000000000ee6b280 
00000000000000fc
[278063.327755] ffa0: 0000000000000040 0000fffffe102410 000000000040622c 
0000fffffe102410
[278063.335658] ffc0: 0000ffffa7e06fe8 0000000080000000 0000000000000003 
000000000000003f
[278063.343560] ffe0: 0000000000000000 0000000000000000 0000000000000000 
0000000000000000
[278063.351462] Call trace:
[278063.353982] Exception stack(0xffff842fb2a0fba0 to 0xffff842fb2a0fcd0)
[278063.360496] fba0: 0000000000000020 0001000000000000 000000000144d000 
ffff0000084ce02c
[278063.368399] fbc0: 0000000060000145 ffff0000082b7600 ffff842fb3008540 
ffff842faf449c00
[278063.376301] fbe0: ffff842fb2a0fc10 ffff0000082c3f74 ffff842fb0131ca0 
00000000ffffffff
[278063.384204] fc00: ffff842fb2a0fd30 0000000000000030 ffff842fb2a0fc30 
ffff0000082a9b60
[278063.392106] fc20: 0000000000000000 0000000000000038 ffff842fb2a0fc70 
ffff0000082af37c
[278063.400008] fc40: 0000000000000000 ffff842fb2a0fd30 ffff842fb2a0fc70 
0000000000040a01
[278063.407911] fc60: 0000000025ccb150 ffff8000398a0000 0000000000000020 
0000000000000020
[278063.415813] fc80: 0000000000000000 0000000025ccb170 0000000025ccb150 
0000000000000000
[278063.423716] fca0: 000000000000003f 0000ffffa7e8e9a8 0101010101010101 
0000000000000010
[278063.431617] fcc0: 000000000000000f ffffffffffffffff
[278063.436568] [<ffff0000084ce02c>] __arch_copy_to_user+0xac/0x230
[278063.442563] [<ffff00000829bf00>] __vfs_read+0x48/0x90
[278063.447687] [<ffff00000829d484>] vfs_read+0x8c/0x148
[278063.452725] [<ffff00000829ebbc>] SyS_read+0x6c/0xd8
[278063.457677] [<ffff0000080838f0>] el0_svc_naked+0x24/0x28
[278063.463063] Code: a8c12027 a88120c7 d503201f d503201f (a8c12027) 
[278063.471015] systemd-journald[937]: Compressed data object 806 -> 576 using 
XZ
[278063.474566] ---[ end trace 69a9c073d1c44e35 ]---
Segmentation fault (core dumped)

** Affects: util-linux (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to util-linux in Ubuntu.
https://bugs.launchpad.net/bugs/1674258

Title:
  lscpu crashs when /dev/mem is not stable to read

Status in util-linux package in Ubuntu:
  New

Bug description:
  To read and scan SMBIOS in /dev/mem is dangerous and for DMI
  information it will be better to read from
  /sys/firmware/dmi/tables/DMI if it exists.

  [278063.180820] Process lscpu (pid: 22668, stack limit = 0xffff842fb2a0c000)
  [278063.187593] Stack: (0xffff842fb2a0fd90 to 0xffff842fb2a10000)
  [278063.193412] fd80:                                   ffff842fb2a0fe00 
ffff00000829bf00
  [278063.201315] fda0: ffff801fae2a9a00 0000000025ccb150 0000000000000020 
ffff842fb2a0feb0
  [278063.209217] fdc0: 0000000000000020 0000000000000015 0000000000000123 
000000000000003f
  [278063.217120] fde0: ffff000008a22000 ffff842faf449c00 ffff842fb2a0feb0 
ffff842faf449c00
  [278063.225022] fe00: ffff842fb2a0fe30 ffff00000829d484 0000000000000020 
ffff801fae2a9a00
  [278063.232925] fe20: 0000000025ccb150 ffff842fb2a0feb0 ffff842fb2a0fe70 
ffff00000829ebbc
  [278063.240827] fe40: ffff000009208000 ffff801fae2a9a00 ffff801fae2a9a00 
0000000025ccb150
  [278063.248730] fe60: 0000000000000020 ffffffffffffffea 0000000000000000 
ffff0000080838f0
  [278063.256632] fe80: 0000000000000000 0000801ff2faa000 ffffffffffffffff 
0000ffffa7e06fe8
  [278063.264535] fea0: 0000000080000000 0000ffffa7e13128 00000000398a0000 
0000000000040a01
  [278063.272437] fec0: 0000000000000003 0000000025ccb150 0000000000000020 
0000000000000020
  [278063.280340] fee0: 0000000025ccb150 0000fffffe1023d8 00000000398a0000 
0000000000000000
  [278063.288243] ff00: 000000000000003f 0000ffffa7e8e9a8 0101010101010101 
0000000000000010
  [278063.296145] ff20: 000000000000000f ffffffffffffffff 0000000000000000 
0000ffffa7eefcc0
  [278063.304048] ff40: 0000000000000000 000000000041c240 0000000000000a03 
0000000000000020
  [278063.311950] ff60: 0000000025ccb150 0000000000000003 0000000000000000 
0000000025ccb150
  [278063.319853] ff80: 000000000041c000 0000000000000000 000000000ee6b280 
00000000000000fc
  [278063.327755] ffa0: 0000000000000040 0000fffffe102410 000000000040622c 
0000fffffe102410
  [278063.335658] ffc0: 0000ffffa7e06fe8 0000000080000000 0000000000000003 
000000000000003f
  [278063.343560] ffe0: 0000000000000000 0000000000000000 0000000000000000 
0000000000000000
  [278063.351462] Call trace:
  [278063.353982] Exception stack(0xffff842fb2a0fba0 to 0xffff842fb2a0fcd0)
  [278063.360496] fba0: 0000000000000020 0001000000000000 000000000144d000 
ffff0000084ce02c
  [278063.368399] fbc0: 0000000060000145 ffff0000082b7600 ffff842fb3008540 
ffff842faf449c00
  [278063.376301] fbe0: ffff842fb2a0fc10 ffff0000082c3f74 ffff842fb0131ca0 
00000000ffffffff
  [278063.384204] fc00: ffff842fb2a0fd30 0000000000000030 ffff842fb2a0fc30 
ffff0000082a9b60
  [278063.392106] fc20: 0000000000000000 0000000000000038 ffff842fb2a0fc70 
ffff0000082af37c
  [278063.400008] fc40: 0000000000000000 ffff842fb2a0fd30 ffff842fb2a0fc70 
0000000000040a01
  [278063.407911] fc60: 0000000025ccb150 ffff8000398a0000 0000000000000020 
0000000000000020
  [278063.415813] fc80: 0000000000000000 0000000025ccb170 0000000025ccb150 
0000000000000000
  [278063.423716] fca0: 000000000000003f 0000ffffa7e8e9a8 0101010101010101 
0000000000000010
  [278063.431617] fcc0: 000000000000000f ffffffffffffffff
  [278063.436568] [<ffff0000084ce02c>] __arch_copy_to_user+0xac/0x230
  [278063.442563] [<ffff00000829bf00>] __vfs_read+0x48/0x90
  [278063.447687] [<ffff00000829d484>] vfs_read+0x8c/0x148
  [278063.452725] [<ffff00000829ebbc>] SyS_read+0x6c/0xd8
  [278063.457677] [<ffff0000080838f0>] el0_svc_naked+0x24/0x28
  [278063.463063] Code: a8c12027 a88120c7 d503201f d503201f (a8c12027) 
  [278063.471015] systemd-journald[937]: Compressed data object 806 -> 576 
using XZ
  [278063.474566] ---[ end trace 69a9c073d1c44e35 ]---
  Segmentation fault (core dumped)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/util-linux/+bug/1674258/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to