Package: libpam-mount Version: 0.28-1 Severity: normal
Hi, when logging in as root and then su-ing to a user account everything works fine. But at logout the su-command seems to have dropped root privileges, so umount fails. The login count is not decremented. pam_mount(pam_mount.c:586) received order to close things pam_mount(misc.c:55) Session close: (uid=1000, euid=1000, gid=1000, egid=1000) pam_mount(misc.c:284) command: /usr/sbin/pmvarrun [-u] [ingo] [-o] [-1] pam_mount(misc.c:55) set_myuid<pre>: (uid=1000, euid=1000, gid=1000, egid=1000) pam_mount(misc.c:357) error setting uid to 0 pam_mount(pam_mount.c:424) pmvarrun says login count is 0 pam_mount(pam_mount.c:618) going to unmount pam_mount(mount.c:413) information for mount: pam_mount(mount.c:414) ---------------------- pam_mount(mount.c:415) (defined by globalconf) pam_mount(mount.c:416) user: ingo pam_mount(mount.c:417) server: pam_mount(mount.c:418) volume: /home/ingo:crypt.img pam_mount(mount.c:419) mountpoint: /home/ingo/crypt pam_mount(mount.c:420) options: fsck,loop,nodev,nosuid, pam_mount(mount.c:421) fs_key_cipher: pam_mount(mount.c:422) fs_key_path: pam_mount(mount.c:423) use_fstab: 0 pam_mount(mount.c:424) ---------------------- pam_mount(misc.c:284) command: lsof [/home/ingo/crypt] lsof: WARNING: can't stat() ext3 file system /dev/.static/dev Output information may be incomplete. pam_mount(mount.c:103) pam_mount(mount.c:135) waiting for lsof pam_mount(misc.c:284) command: /sbin/umount.crypt [/home/ingo/crypt] pam_mount(misc.c:55) set_myuid<pre>: (uid=1000, euid=1000, gid=1000, egid=1000) pam_mount(misc.c:357) error setting uid to 0 pam_mount(mount.c:100) umount errors: pam_mount(mount.c:103) You have to be root to use cryptsetup! pam_mount(mount.c:103) umount: /home/ingo/crypt is not in the fstab (and you are not root) pam_mount(mount.c:103) umount.crypt: error unmounting /home/ingo/crypt pam_mount(mount.c:598) waiting for umount pam_mount(pam_mount.c:621) unmount of /home/ingo:crypt.img failed pam_mount(pam_mount.c:632) pam_mount execution complete pam_mount(pam_mount.c:115) Clean global config (0) The decrement of the login count does work if 'su' is not the last session to go away (and thus no umount attempted). I suppose this is most often the case. Ah, and i noticed that when the mounting of the crypto loop device fails (such as when root is guessing the wrong password when su-ing to the user account) a loop device is leaked. Anyway this setup is rather useless so i only would make another detailed bug report if you want me to. Regards, ingo -- System Information: Debian Release: lenny/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: i386 (i686) Kernel: Linux 2.6.22.9-cfs-v22 Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968) Shell: /bin/sh linked to /bin/bash Versions of packages libpam-mount depends on: ii libc6 2.6.1-5 GNU C Library: Shared libraries ii libhx10 1.10.1-1 A library providing queue, tree, I ii libpam0g 0.99.7.1-4 Pluggable Authentication Modules l ii libssl0.9.8 0.9.8e-8 SSL shared libraries ii libxml-writer-perl 0.603-1 Perl module for writing XML docume ii libxml2 2.6.30.dfsg-2 GNOME XML library ii mount 2.13-7 Tools for mounting and manipulatin libpam-mount recommends no packages. -- debconf-show failed -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]