The segfault occurs when the utility attempts to open /dev/mem when running as a user that does not have permissions to read from /dev/mem.
> $ strace /usr/sbin/smbios-get-ut-data > execve("/usr/sbin/smbios-get-ut-data", ["/usr/sbin/smbios-get-ut-data"], [/* > 44 vars */]) = 0 > > <snip> > > write(1, "Libsmbios: 2.2.28\n", 21Libsmbios: 2.2.28 > ) = 21 > open("smbios.dat", O_RDWR|O_CREAT|O_TRUNC, 0666) = 3 > open("/dev/mem", O_RDONLY) = -1 EACCES (Permission denied) > open("/usr/share/locale/en_US.utf8/LC_MESSAGES/libc.mo", O_RDONLY) = -1 > ENOENT (No such file or directory) > open("/usr/share/locale/en_US/LC_MESSAGES/libc.mo", O_RDONLY) = -1 ENOENT (No > such file or directory) > open("/usr/share/locale/en.utf8/LC_MESSAGES/libc.mo", O_RDONLY) = -1 ENOENT > (No such file or directory) > open("/usr/share/locale/en/LC_MESSAGES/libc.mo", O_RDONLY) = -1 ENOENT (No > such file or directory) > open("/dev/mem", O_RDONLY) = -1 EACCES (Permission denied) > open("/dev/mem", O_RDONLY) = -1 EACCES (Permission denied) > --- SIGSEGV {si_signo=SIGSEGV, si_code=SEGV_MAPERR, si_addr=0x4} --- > +++ killed by SIGSEGV +++ > Segmentation fault And the permissions on /dev/mem: > $ ls -al /dev/mem > crw-r----- 1 root kmem 1, 1 Apr 8 22:07 /dev/mem Therefore, I don't think this warrants severity important. We could make it a wishlist bug for the program to fail more gracefully and with a meaningful error message when it can't open /dev/mem for reading. tony
signature.asc
Description: OpenPGP digital signature