[Secure-testing-team] Bug#886567: lshw: problem with memory access

Karsten Hilbert karsten.hilbert at gmx.net
Sun Jan 7 17:37:03 UTC 2018


Package: lshw
Version: 02.18-0.1
Severity: important
Tags: upstream


Hi,

LSHW suddenly provokes a kernel OOPs.

(Possibly related to #848791 ?)

Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:05:25 hermes kernel: resource sanity check: requesting [mem 0x000c0000-0x000dffff], which spans more than PCI Bus 0000:00 [mem 0x000d0000-0x000dffff window]
Jan 07 18:05:25 hermes kernel: caller pci_map_rom+0x66/0x100 mapping multiple BARs
Jan 07 18:08:03 hermes kernel: Bluetooth: Core ver 2.22
Jan 07 18:08:03 hermes kernel: NET: Registered protocol family 31
Jan 07 18:08:03 hermes kernel: Bluetooth: HCI device and connection manager initialized
Jan 07 18:08:03 hermes kernel: Bluetooth: HCI socket layer initialized
Jan 07 18:08:03 hermes kernel: Bluetooth: L2CAP socket layer initialized
Jan 07 18:08:03 hermes kernel: Bluetooth: SCO socket layer initialized

Jan 07 18:19:01 hermes kernel: memremap attempted on mixed range 0x0000000000097000 size: 0x1000
Jan 07 18:19:01 hermes kernel: ------------[ cut here ]------------
Jan 07 18:19:01 hermes kernel: WARNING: CPU: 0 PID: 529 at /build/linux-nNsivu/linux-4.14.7/kernel/memremap.c:98 memremap+0x13f/0x1a0
Jan 07 18:19:01 hermes kernel: Modules linked in: bluetooth drbg ansi_cprng ecdh_generic msr cpuid nls_ascii nls_cp437 vfat fat fuse uas usb_storage cpufreq_userspace cpufreq_powersave cpufreq_conservative joydev arc4 ath9k ath9k_common iTCO_wdt snd_hda_codec_via ath9k_hw iTCO_vendor_support ath i915 psmouse snd_hda_codec_generic mac80211 uvcvideo snd_hda_intel sr_mod cfg80211 cdrom pcspkr videobuf2_vmalloc videobuf2_memops videobuf2_v4l2 videobuf2_core videodev media snd_hda_codec asus_laptop atl1e sparse_keymap drm_kms_helper rfkill lpc_ich mfd_core input_polldev snd_hda_core sg snd_hwdep snd_pcm_oss snd_mixer_oss snd_pcm drm snd_timer snd i2c_algo_bit video ac soundcore button battery shpchp ehci_pci acpi_cpufreq binfmt_misc coretemp loop ecryptfs parport_pc ppdev lp parport ip_tables x_tables autofs4 ext4 crc16
Jan 07 18:19:01 hermes kernel:  mbcache jbd2 crc32c_generic fscrypto ecb crypto_simd cryptd aes_i586 sd_mod hid_generic usbhid hid serio_raw ahci libahci libata scsi_mod uhci_hcd ehci_hcd usbcore usb_common thermal evdev
Jan 07 18:19:01 hermes kernel: CPU: 0 PID: 529 Comm: lshw Not tainted 4.14.0-2-686-pae #1 Debian 4.14.7-1
Jan 07 18:19:01 hermes kernel: Hardware name: ASUSTeK Computer Inc.         K50IJ               /K50IJ     , BIOS 218     04/09/2010
Jan 07 18:19:01 hermes kernel: task: ed7900c0 task.stack: e7ae0000
Jan 07 18:19:01 hermes kernel: EIP: memremap+0x13f/0x1a0
Jan 07 18:19:01 hermes kernel: EFLAGS: 00010246 CPU: 0
Jan 07 18:19:01 hermes kernel: EAX: 00000041 EBX: 00001000 ECX: f79d9200 EDX: f79d2874
Jan 07 18:19:01 hermes kernel: ESI: 01000200 EDI: 00000000 EBP: e7ae1ef0 ESP: e7ae1ed0
Jan 07 18:19:01 hermes kernel:  DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068
Jan 07 18:19:01 hermes kernel: CR0: 80050033 CR2: bf95ab20 CR3: 2eb8c2c0 CR4: 000406f0
Jan 07 18:19:01 hermes kernel: Call Trace:
Jan 07 18:19:01 hermes kernel:  xlate_dev_mem_ptr+0x24/0x40
Jan 07 18:19:01 hermes kernel:  read_mem+0x69/0x170
Jan 07 18:19:01 hermes kernel:  ? write_port+0xd0/0xd0
Jan 07 18:19:01 hermes kernel:  __vfs_read+0x19/0x50
Jan 07 18:19:01 hermes kernel:  vfs_read+0x7b/0x130
Jan 07 18:19:01 hermes kernel:  SyS_read+0x47/0xb0
Jan 07 18:19:01 hermes kernel:  do_fast_syscall_32+0x71/0x1a0
Jan 07 18:19:01 hermes kernel:  entry_SYSENTER_32+0x4e/0x7c
Jan 07 18:19:01 hermes kernel: EIP: 0xb7fa5cf9
Jan 07 18:19:01 hermes kernel: EFLAGS: 00000246 CPU: 0
Jan 07 18:19:01 hermes kernel: EAX: ffffffda EBX: 00000003 ECX: bf95ab40 EDX: 00000400
Jan 07 18:19:01 hermes kernel: ESI: bf95ab40 EDI: bf95ab38 EBP: 00000000 ESP: bf95aaf8
Jan 07 18:19:01 hermes kernel:  DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b
Jan 07 18:19:01 hermes kernel: Code: 5d c3 8d 76 00 8d bc 27 00 00 00 00 80 3d 77 9c 86 d0 00 75 aa 8d 45 ec 53 c6 05 77 9c 86 d0 01 50 68 70 87 73 d0 e8 4e e9 f4 ff <0f> ff 83 c4 0c eb 8d 8d 76 00 8d bc 27 00 00 00 00 89 d9 89 f0
Jan 07 18:19:01 hermes kernel: ---[ end trace 0d9dd7a0be494d04 ]---

Jan 07 18:19:54 hermes kerneloops[848]: Submitted 1 kernel oopses to oops.kernel.org





-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'stable-updates'), (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: i386 (i686)

Kernel: Linux 4.14.0-2-686-pae (SMP w/2 CPU cores)
Locale: LANG=de_DE.UTF-8, LC_CTYPE=de_DE.UTF-8 (charmap=UTF-8), LANGUAGE=de_DE.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages lshw depends on:
ii  libc6       2.25-5
ii  libgcc1     1:7.2.0-18
ii  libstdc++6  7.2.0-18

Versions of packages lshw recommends:
ii  pciutils  1:3.5.2-1
ii  usbutils  1:007-4+b1

lshw suggests no packages.

-- no debconf information



More information about the Secure-testing-team mailing list