This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:
apport-collect 1716483 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete ** Tags added: zesty -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1716483 Title: [SRU][Zesty] Fix lscpu segfault on ARM64 with SMBIOS v2.0 Status in linux package in Ubuntu: Incomplete Bug description: [Impact] On ARM64 systems with smbios v2.0, lscpu segfaults. This is caused by the fact that lspci issues a read() on /dev/mem at the offset where it expects to find the SMBIOS structure array. However, this region is classified as EFI_RUNTIME_SERVICE_DATA (as per the UEFI spec), and so it is omitted from the linear mapping. [Test] The issue was observed with kexec/kdump usecases when a FPDT ACPI table is presented to HLOS from the firmware. [Fix] Fixed upstream: 1151f838cb62 arm64: kernel: restrict /dev/mem read() calls to linear region [Regression Potential] The patch is confined to ARM64 arch, and applies only to systems with SMBIOS v2.0. Risk is low. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1716483/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp