Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Sat, 9 Nov 2002 20:26:52 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Sat, 9 Nov 2002 20:26:52 -0500 Received: from lsanca2-ar27-4-3-067-005.lsanca2.dsl-verizon.net ([4.3.67.5]:32901 "EHLO barbarella.hawaga.org.uk") by vger.kernel.org with ESMTP id ; Sat, 9 Nov 2002 20:26:50 -0500 Date: Sat, 9 Nov 2002 17:33:26 -0800 (PST) From: Ben Clifford To: Olaf Dietsche cc: linux-kernel@vger.kernel.org Subject: Re: [PATCH] 2.5.46: access permission filesystem In-Reply-To: <87adko581z.fsf@goat.bogus.local> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4824 Lines: 129 On Tue, 5 Nov 2002, Olaf Dietsche wrote: > This *untested* patch adds a new permission managing file system. > Furthermore, it adds two modules, which make use of this file system. Hi. I've just applied this to 2.5.46, and I'm building accessfs as modules. During boot (my scripts do a probe for the accessfs modules), I get: ==== Debug: sleeping function called from illegal context at mm/slab.c:1304 Call Trace: [] __might_sleep+0x56/0x60 [] kmem_flagcheck+0x21/0x50 [] .rodata.str1.1+0xc9/0xd8 [userports] [] kmalloc+0x4b/0x130 [] .rodata.str1.1+0xcc/0xd8 [userports] [] kmem_flagcheck+0x21/0x50 [] .rodata.str1.1+0xc9/0xd8 [userports] [] accessfs_rootdir+0x0/0x34 [accessfs] [] accessfs_node_init+0x29/0xc0 [accessfs] [] accessfs_rootdir+0x0/0x34 [accessfs] [] accessfs_rootdir+0x0/0x34 [accessfs] [] .rodata.str1.1+0xcc/0xd8 [userports] [] accessfs_mkdir+0x44/0x80 [accessfs] [] accessfs_rootdir+0x0/0x34 [accessfs] [] .rodata.str1.1+0xc9/0xd8 [userports] [] .rodata.str1.1+0xc9/0xd8 [userports] [] accessfs_rootdir+0x0/0x34 [accessfs] [] accessfs_make_dirpath_Rf12799b4+0x81/0xd0 [accessfs] [] accessfs_rootdir+0x0/0x34 [accessfs] [] .rodata.str1.1+0xc9/0xd8 [userports] [] .rodata.str1.1+0xcc/0xd8 [userports] [] accessfs_rootdir+0x0/0x34 [accessfs] [] init_module+0x11/0xe0 [userports] [] .rodata.str1.1+0xc9/0xd8 [userports] [] accessfs_ip_prot_sock+0x0/0x50 [userports] [] sys_init_module+0x535/0x620 [] .kmodtab+0x0/0xc [userports] [] accessfs_ip_prot_sock+0x0/0x50 [userports] [] syscall_call+0x7/0xb There is already a security framework initialized, register_security failed. ==== The proc/access/net/ip/bind ports appear ok and I can change permissions on them. (although I haven't tested to see if their permissions actually have effect). I also get Debug: sleeping function called from illegal context at mm/slab.c:1304 Call Trace: [] __might_sleep+0x56/0x60 [] kmem_flagcheck+0x21/0x50 [] kmem_cache_alloc+0x15/0xe0 [] ip_local_deliver_finish+0x0/0x150 [] tcp_v4_checksum_init+0x7f/0x110 [] kfree+0x1d0/0x220 [] alloc_inode+0x30/0x170 [] get_new_inode_fast+0x15/0xd0 [] file_read_actor+0x86/0x100 [] iget_locked+0xa2/0xb0 [] kmem_cache_alloc+0x69/0xe0 [] accessfs_rootdir+0x20/0x34 [accessfs] [] accessfs_lookup+0x42/0xa0 [accessfs] [] d_alloc+0x19/0x180 [] real_lookup+0x5a/0xe0 [] do_lookup+0xb0/0x200 [] filemap_nopage+0x115/0x270 [] apic_timer_interrupt+0x1a/0x20 [] link_path_walk+0x5ab/0x8f0 [] getname+0x5e/0xa0 [] __user_walk+0x24/0x40 [] vfs_lstat+0x14/0x50 [] sys_lstat64+0x11/0x30 [] do_page_fault+0x0/0x465 [] error_code+0x2d/0x38 [] syscall_call+0x7/0xb followed by: Debug: sleeping function called from illegal context at mm/slab.c:1304 Call Trace: [] __might_sleep+0x56/0x60 [] kmem_flagcheck+0x21/0x50 [] .rodata.str1.1+0x1e5/0x1f8 [usercaps] [] kmalloc+0x4b/0x130 [] do_no_page+0x39/0x2b0 [] caps+0x0/0x160 [usercaps] [] kmem_flagcheck+0x21/0x50 [] .rodata.str1.1+0x1e5/0x1f8 [usercaps] [] .rodata.str1.1+0x1eb/0x1f8 [usercaps] [] accessfs_node_init+0x29/0xc0 [accessfs] [] .rodata.str1.1+0x1e5/0x1f8 [usercaps] [] .rodata.str1.1+0x1eb/0x1f8 [usercaps] [] caps+0x0/0x160 [usercaps] [] accessfs_mknod+0x57/0x70 [accessfs] [] .rodata.str1.1+0x1e5/0x1f8 [usercaps] [] caps+0x0/0x160 [usercaps] [] init_module+0x70/0xc0 [usercaps] [] .rodata.str1.1+0x1e5/0x1f8 [usercaps] [] caps+0x0/0x160 [usercaps] [] sys_init_module+0x535/0x620 [] .kmodtab+0x0/0xc [usercaps] [] accessfs_capable+0x0/0x40 [usercaps] [] syscall_call+0x7/0xb There is already a security framework initialized, register_security failed. The directory /proc/access/capabilities appears, but it has no contents. Ben -- Ben Clifford benc@hawaga.org.uk GPG: 30F06950 http://www.hawaga.org.uk/ben/ - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/