This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
zesty' to 'verification-done-zesty'. If the problem still exists, change
the tag 'verification-needed-zesty' to 'verification-failed-zesty'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-zesty

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1716483

Title:
  [SRU][Zesty] Fix lscpu segfault on ARM64 with SMBIOS v2.0

Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Zesty:
  Fix Committed

Bug description:
  [Impact]
  On ARM64 systems with smbios v2.0, lscpu segfaults. This is caused by the 
fact that lspci issues a read() on /dev/mem at the offset where it expects to 
find the SMBIOS structure array. However, this
  region is classified as EFI_RUNTIME_SERVICE_DATA (as per the UEFI spec), and 
so it is omitted from the linear mapping.

  [Test]
  The issue was observed with kexec/kdump usecases when a FPDT ACPI table is 
presented to HLOS from the firmware.

  [Fix]
  Fixed upstream:
  1151f838cb62 arm64: kernel: restrict /dev/mem read() calls to linear region

  [Regression Potential]
  The patch is confined to ARM64 arch, and applies only to systems with SMBIOS 
v2.0. Risk is low.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1716483/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to