Ok, null pointer dereferencing has nothing to do with the original bug,
it was UML way to probe for address space setting up a custom segv
handler.

So further investigation led me to the following:
522             addr.sun_family = AF_UNIX;
(gdb) bt
#0  os_create_unix_socket (file=0xb45be30 "/home/rtg/.uml/fYodC2/mconsole", 
len=256, close_on_exec=1) at arch/um/os-Linux/file.c:522
#1  0x0804c0b8 in mconsole_init () at arch/um/drivers/mconsole_kern.c:794
#2  0x08064505 in do_one_initcall (fn=0x804c02a <mconsole_init>) at 
init/main.c:715
#3  0x080492a9 in kernel_init (unused=0x0) at init/main.c:754
#4  0x0808184c in run_kernel_thread (fn=0x80491b0 <kernel_init>, arg=0x0, 
jmp_ptr=0xb45ae80) at arch/um/os-Linux/process.c:267
#5  0x080670cb in new_thread_handler () at arch/um/kernel/process.c:151
#6  0x00000000 in ?? ()
(gdb) s
65        return __builtin___snprintf_chk (__s, __n, __USE_FORTIFY_LEVEL - 1,
(gdb) s
*** buffer overflow detected ***: 
/home/rtg/Downloads/Linux/linux-2.6.27.1/linux-intrepid terminated

__builtin___snprintf_chk is not called on kernel built with Hardy
toolchain, it goes directly to vsnprintf.

I guess this bug should go to glibc package now

-- 
UML kernel built in Intrepid SEGFAULTs immediately
https://bugs.launchpad.net/bugs/284631
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to