lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 9 Nov 2007 21:12:47 -0500
From:	Erez Zadok <ezk@...sunysb.edu>
To:	linux-kernel@...r.kernel.org
Subject: WARNING: at lib/kref.c:33 kref_get() (-mm 2007-11-06-02-32++)

Setup: FC6 system with MM snapshot broken-out-2007-11-06-02-32 and these two
patches added:

r-o-bind-mounts-track-number-of-mount-writer-fix-buggy-loop.patch
r-o-bind-mounts-track-number-of-mount-writer-fix-buggy-loop-checkpatch-fixes.patch

Booting the machine, waiting a few minutes (not logging in or doing anything
else).  I get:

WARNING: at lib/kref.c:33 kref_get()
 [<c020282a>] show_trace_log_lvl+0x12/0x25
 [<c0203024>] show_trace+0xd/0x10
 [<c0203120>] dump_stack+0x15/0x17
 [<c02c7f85>] kref_get+0x26/0x30
 [<c02c731b>] kobject_get+0x12/0x17
 [<c02c7770>] kobject_add+0x97/0x162
 [<c02164e5>] uids_user_create+0x41/0x5d
 [<c0216850>] alloc_uid+0xc9/0x171
 [<c0219b50>] set_user+0x1f/0x93
 [<c021b445>] sys_setuid+0x4b/0xcb
 [<c02021fe>] sysenter_past_esp+0x5f/0x91
 =======================

There's no other indication where the setuid(2) came from, perhaps cron?

Erez.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ