lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.01.0912142025200.3483@bogon.housecafe.de>
Date:	Mon, 14 Dec 2009 20:32:36 -0800 (PST)
From:	Christian Kujau <lists@...dbynature.de>
To:	Tim Blechmann <tim@...ngt.org>
cc:	LKML <linux-kernel@...r.kernel.org>, dieb13 <dieb13@...ngt.org>,
	eparis@...hat.com
Subject: Re: WARNING: at fs/notify/inotify/inotify_fsnotify.c:129

On Thu, 10 Dec 2009 at 21:39, Tim Blechmann wrote:
> Dec  9 00:37:37 es kernel: WARNING: at fs/notify/inotify/inotify_fsnotify.c:129 idr_callback+0x2a/0x4b()

I've got a similar message here too, with 2.6.32-rc8. However, I'm not 
sure how to reproduce this one...

@Eric, should we reopen #14090 or create a new bug?

Thanks,
Christian.

[0] http://bugzilla.kernel.org/show_bug.cgi?id=14090

------------[ cut here ]------------
WARNING: at /data/Scratch/scm/linux-2.6-git/fs/notify/inotify/inotify_fsnotify.c:129 idr_callback+0x36/0x60()
inotify closing but id=0 for entry=ffff88004f8a59a0 in group=ffff880003be0200 still in idr.  Probably leaking memory
Modules linked in: sit tunnel4 xfs sha256_generic aes_x86_64 aes_generic nfsd lockd auth_rpcgss sunrpc exportfs ipv6 tun jfs nls_base reiserfs fuse twofish_x86_64 twofish_common
Pid: 9740, comm: imap Not tainted 2.6.32-rc8 #4
Call Trace:
 [<ffffffff810ce906>] ? idr_callback+0x36/0x60
 [<ffffffff810ce906>] ? idr_callback+0x36/0x60
 [<ffffffff810352c9>] ? warn_slowpath_common+0x79/0xd0
 [<ffffffff81035381>] ? warn_slowpath_fmt+0x51/0x60
 [<ffffffff8120326c>] ? _spin_lock_irq+0xc/0x10
 [<ffffffff81200bcf>] ? wait_for_common+0x15f/0x1a0
 [<ffffffff8100e4b2>] ? check_events+0x12/0x20
 [<ffffffff810cd627>] ? fsnotify_flush_notify+0x97/0xc0
 [<ffffffff8100dd99>] ? xen_force_evtchn_callback+0x9/0x10
 [<ffffffff8100e4b2>] ? check_events+0x12/0x20
 [<ffffffff810ce906>] ? idr_callback+0x36/0x60
 [<ffffffff81138d04>] ? idr_for_each+0x84/0xe0
 [<ffffffff810ce8d0>] ? idr_callback+0x0/0x60
 [<ffffffff8100e49f>] ? xen_restore_fl_direct_end+0x0/0x1
 [<ffffffff81096a77>] ? kmem_cache_free+0x87/0xc0
 [<ffffffff810ce8ba>] ? inotify_free_group_priv+0x1a/0x30
 [<ffffffff810cd6cb>] ? fsnotify_final_destroy_group+0x1b/0x30
 [<ffffffff810ceb4c>] ? inotify_release+0x2c/0x50
 [<ffffffff8109e450>] ? __fput+0xc0/0x1f0
 [<ffffffff8109a9cb>] ? filp_close+0x5b/0x90
 [<ffffffff8109aab3>] ? sys_close+0xb3/0x120
 [<ffffffff81010d42>] ? system_call_fastpath+0x16/0x1b
---[ end trace 50bb54b8ed08a018 ]---
entry->group=(null) inode=(null) wd=4096

-- 
BOFH excuse #119:

evil hackers from Serbia.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ