The segfault occurs when the utility attempts to open /dev/mem when
running as a user that does not have permissions to read from /dev/mem.

> $ strace /usr/sbin/smbios-get-ut-data
> execve("/usr/sbin/smbios-get-ut-data", ["/usr/sbin/smbios-get-ut-data"], [/* 
> 44 vars */]) = 0
>
> <snip>
>
> write(1, "Libsmbios:    2.2.28\n", 21Libsmbios:    2.2.28
> )  = 21
> open("smbios.dat", O_RDWR|O_CREAT|O_TRUNC, 0666) = 3
> open("/dev/mem", O_RDONLY)              = -1 EACCES (Permission denied)
> open("/usr/share/locale/en_US.utf8/LC_MESSAGES/libc.mo", O_RDONLY) = -1 
> ENOENT (No such file or directory)
> open("/usr/share/locale/en_US/LC_MESSAGES/libc.mo", O_RDONLY) = -1 ENOENT (No 
> such file or directory)
> open("/usr/share/locale/en.utf8/LC_MESSAGES/libc.mo", O_RDONLY) = -1 ENOENT 
> (No such file or directory)
> open("/usr/share/locale/en/LC_MESSAGES/libc.mo", O_RDONLY) = -1 ENOENT (No 
> such file or directory)
> open("/dev/mem", O_RDONLY)              = -1 EACCES (Permission denied)
> open("/dev/mem", O_RDONLY)              = -1 EACCES (Permission denied)
> --- SIGSEGV {si_signo=SIGSEGV, si_code=SEGV_MAPERR, si_addr=0x4} ---
> +++ killed by SIGSEGV +++
> Segmentation fault

And the permissions on /dev/mem:

> $ ls -al /dev/mem
> crw-r----- 1 root kmem 1, 1 Apr  8 22:07 /dev/mem

Therefore, I don't think this warrants severity important.  We could
make it a wishlist bug for the program to fail more gracefully and with
a meaningful error message when it can't open /dev/mem for reading.

tony



Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to