Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757839AbZCZBlg (ORCPT ); Wed, 25 Mar 2009 21:41:36 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753487AbZCZBl1 (ORCPT ); Wed, 25 Mar 2009 21:41:27 -0400 Received: from tundra.namei.org ([65.99.196.166]:4499 "EHLO tundra.namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752838AbZCZBl0 (ORCPT ); Wed, 25 Mar 2009 21:41:26 -0400 Date: Thu, 26 Mar 2009 12:41:01 +1100 (EST) From: James Morris To: Tetsuo Handa cc: alan@redhat.com, hooanon05@yahoo.co.jp, linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org Subject: Re: current->mm == NULL in security_vm_enough_memory(). In-Reply-To: <200903260130.n2Q1U9EJ040448@www262.sakura.ne.jp> Message-ID: References: <200903260130.n2Q1U9EJ040448@www262.sakura.ne.jp> User-Agent: Alpine 2.00 (LRH 1167 2008-08-23) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2247 Lines: 48 On Thu, 26 Mar 2009, Tetsuo Handa wrote: > [ 28.765817] ------------[ cut here ]------------ > [ 28.768916] WARNING: at security/security.c:217 security_vm_enough_memory+0xa0/0xb0() > [ 28.772484] Hardware name: VMware Virtual Platform > [ 28.774099] Modules linked in: pcnet32 crc32 > [ 28.776920] Pid: 3286, comm: khelper Not tainted 2.6.29-next-20090324-dirty #3 > [ 28.780317] Call Trace: > [ 28.781323] [] ? have_callable_console+0x30/0x50 > [ 28.784171] [] warn_slowpath+0x97/0xf0 > [ 28.785739] [] ? validate_chain+0x3fc/0x540 > [ 28.788402] [] ? validate_chain+0x3fc/0x540 > [ 28.790103] [] ? __lock_acquire+0x29c/0x8a0 > [ 28.792809] [] ? __lock_acquired+0x109/0x1c0 > [ 28.794539] [] security_vm_enough_memory+0xa0/0xb0 > [ 28.797391] [] acct_stack_growth+0xd7/0x160 > [ 28.798842] [] expand_downwards+0x119/0x150 > [ 28.801709] [] expand_stack+0xd/0x10 > [ 28.804171] [] find_extend_vma+0xad/0x110 > [ 28.805806] [] __get_user_pages+0x94/0x610 > [ 28.808557] [] get_user_pages+0x7b/0x90 > [ 28.810483] [] get_arg_page+0x48/0x100 > [ 28.812972] [] copy_strings+0x16c/0x2a0 > [ 28.814552] [] do_execve+0x6b2/0x7e0 > [ 28.817138] [] ? getname+0x6b/0xa0 > [ 28.818622] [] sys_execve+0x5e/0xb0 > [ 28.821006] [] syscall_call+0x7/0xb > [ 28.822469] [] ? kernel_execve+0x24/0x30 > [ 28.825161] [] ? ____call_usermodehelper+0xff/0x170 > [ 28.828052] [] ? ____call_usermodehelper+0x0/0x170 > [ 28.829944] [] ? kernel_thread_helper+0x7/0x10 > [ 28.832802] ---[ end trace 2e6964f14bb57083 ]--- > > May I ignore this warning? khelper is a kernel thread, so it should not have an ->mm, but I wonder why this hasn't shown up before. Odd... - James -- James Morris -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/