Downstream bug may be found at: https://bugs.launchpad.net/ubuntu/+source/lshw/+bug/614008 What happens is when one types in a terminal: sudo lshw the kernel has an oops and the OS locks up. However, if one just runs lshw not under sudo, the kernel does not have an oops. This has occurred from kernel version 2.6.35-14.19-generic through 2.6.35-19.28-generic.
This is the oops I'm getting from this; I've not tried it on a generic kernel yet though: Sep 10 12:26:58 major kernel: [ 1724.099559] PGD 1ed737067 PUD 1ed454067 PMD 0 Sep 10 12:26:58 major kernel: [ 1724.099573] CPU 7 Sep 10 12:26:58 major kernel: [ 1724.099575] Modules linked in: ip6table_filter ip6_tables binfmt_misc dm_crypt ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT xt_tcpudp iptable_filter ip_tables x_tables bridge stp kvm_intel kvm snd_hda_codec_atihdmi snd_hda_codec_via snd_hda_intel snd_hda_codec snd_hwdep snd_pcm snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device ppdev parport_pc snd soundcore snd_page_alloc lp parport radeon ttm usbhid r8169 firewire_ohci usb_storage hid firewire_core mii drm_kms_helper pata_via crc_itu_t drm i2c_algo_bit configfs Sep 10 12:26:58 major kernel: [ 1724.099633] Sep 10 12:26:58 major kernel: [ 1724.099638] Pid: 3168, comm: lshw Not tainted 2.6.35-20-generic #29-Ubuntu P55M Pro/To Be Filled By O.E.M. Sep 10 12:26:58 major kernel: [ 1724.099643] RIP: 0010:[<ffffffff812f32ae>] [<ffffffff812f32ae>] fb_open+0x6e/0x1f0 Sep 10 12:26:58 major kernel: [ 1724.099650] RSP: 0018:ffff8801ed671bf8 EFLAGS: 00010246 Sep 10 12:26:58 major kernel: [ 1724.099654] RAX: 0000000000000505 RBX: 0000000000000001 RCX: ffffffffffffffff Sep 10 12:26:58 major kernel: [ 1724.099658] RDX: ffff8801ed4c9900 RSI: ffff8801ed4c9900 RDI: ffffffff81cf33e8 Sep 10 12:26:58 major kernel: [ 1724.099661] RBP: ffff8801ed671c48 R08: ffff8801ed4c9240 R09: ffff8801ff285900 Sep 10 12:26:58 major kernel: [ 1724.099665] R10: ffff880237c043e0 R11: 0000000000000000 R12: ffff88020ff7f2d0 Sep 10 12:26:58 major kernel: [ 1724.099669] R13: ffff8801ed4c9900 R14: 0000000000000000 R15: 0000000000000001 Sep 10 12:26:58 major kernel: [ 1724.099673] FS: 00007f4a6512d720(0000) GS:ffff880001fc0000(0000) knlGS:0000000000000000 Sep 10 12:26:58 major kernel: [ 1724.099678] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Sep 10 12:26:58 major kernel: [ 1724.099681] CR2: 0000000000000008 CR3: 00000001fd861000 CR4: 00000000000006e0 Sep 10 12:26:58 major kernel: [ 1724.099685] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 Sep 10 12:26:58 major kernel: [ 1724.099689] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400 Sep 10 12:26:58 major kernel: [ 1724.099693] Process lshw (pid: 3168, threadinfo ffff8801ed670000, task ffff8801ed570000) Sep 10 12:26:58 major kernel: [ 1724.099698] 000000000000001d ffff8801ed671c74 ffff88022ed9b280 ffff88022ec40000 Sep 10 12:26:58 major kernel: [ 1724.099704] <0> 0000000000000000 0000000000000000 ffff88022ed9b280 0000000000000000 Sep 10 12:26:58 major kernel: [ 1724.099710] <0> ffffffff81ce6340 ffff88020ff7f2d0 ffff8801ed671ca8 ffffffff8115685a Sep 10 12:26:58 major kernel: [ 1724.099725] [<ffffffff8115685a>] chrdev_open+0x10a/0x200 Sep 10 12:26:58 major kernel: [ 1724.099731] [<ffffffff81156750>] ? chrdev_open+0x0/0x200 Sep 10 12:26:58 major kernel: [ 1724.099737] [<ffffffff81150cb5>] __dentry_open+0xe5/0x330 Sep 10 12:26:58 major kernel: [ 1724.099745] [<ffffffff8126066f>] ? security_inode_permission+0x1f/0x30 Sep 10 12:26:58 major kernel: [ 1724.099752] [<ffffffff81151014>] nameidata_to_filp+0x54/0x70 Sep 10 12:26:58 major kernel: [ 1724.099758] [<ffffffff8115dbc8>] finish_open+0xe8/0x1d0 Sep 10 12:26:58 major kernel: [ 1724.099764] [<ffffffff8116684f>] ? dput+0xdf/0x1b0 Sep 10 12:26:58 major kernel: [ 1724.099768] [<ffffffff8115f026>] do_last+0x86/0x460 Sep 10 12:26:58 major kernel: [ 1724.099773] [<ffffffff8116135b>] do_filp_open+0x21b/0x660 Sep 10 12:26:58 major kernel: [ 1724.099779] [<ffffffff8115d515>] ? putname+0x35/0x50 Sep 10 12:26:58 major kernel: [ 1724.099783] [<ffffffff81160c7b>] ? sys_mknodat+0x12b/0x250 Sep 10 12:26:58 major kernel: [ 1724.099790] [<ffffffff8116cb6a>] ? alloc_fd+0x10a/0x150 Sep 10 12:26:58 major kernel: [ 1724.099795] [<ffffffff81150a59>] do_sys_open+0x69/0x170 Sep 10 12:26:58 major kernel: [ 1724.099801] [<ffffffff81150ba0>] sys_open+0x20/0x30 Sep 10 12:26:58 major kernel: [ 1724.099808] [<ffffffff8100a0f2>] system_call_fastpath+0x16/0x1b Sep 10 12:26:58 major kernel: [ 1724.099864] RSP <ffff8801ed671bf8> Sep 10 12:26:58 major kernel: [ 1724.099870] ---[ end trace 7e917f8bebefbcac ]---
This is an ubuntu Maverick kernel issue, not upstream. There is a missing NULL check in the code that seems to have come from: http://old.nabble.com/-PATCH-0-2---Maverick--boot-frambuffer-crash-fixes-td29297713.html Dave
As per downstream bug fixed released.