Ok, null pointer dereferencing has nothing to do with the original bug, it was UML way to probe for address space setting up a custom segv handler.
So further investigation led me to the following: 522 addr.sun_family = AF_UNIX; (gdb) bt #0 os_create_unix_socket (file=0xb45be30 "/home/rtg/.uml/fYodC2/mconsole", len=256, close_on_exec=1) at arch/um/os-Linux/file.c:522 #1 0x0804c0b8 in mconsole_init () at arch/um/drivers/mconsole_kern.c:794 #2 0x08064505 in do_one_initcall (fn=0x804c02a <mconsole_init>) at init/main.c:715 #3 0x080492a9 in kernel_init (unused=0x0) at init/main.c:754 #4 0x0808184c in run_kernel_thread (fn=0x80491b0 <kernel_init>, arg=0x0, jmp_ptr=0xb45ae80) at arch/um/os-Linux/process.c:267 #5 0x080670cb in new_thread_handler () at arch/um/kernel/process.c:151 #6 0x00000000 in ?? () (gdb) s 65 return __builtin___snprintf_chk (__s, __n, __USE_FORTIFY_LEVEL - 1, (gdb) s *** buffer overflow detected ***: /home/rtg/Downloads/Linux/linux-2.6.27.1/linux-intrepid terminated __builtin___snprintf_chk is not called on kernel built with Hardy toolchain, it goes directly to vsnprintf. I guess this bug should go to glibc package now -- UML kernel built in Intrepid SEGFAULTs immediately https://bugs.launchpad.net/bugs/284631 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
