Quoting Aristeu Rozanski (aris@xxxxxxxxxx): > Internally device_cgroup now uses a default rule (behavior) and an exception > list and this interface reflects it. > > The new files, devices.behavior ('allow' or 'deny') and devices.exceptions map > directly to the internal state. > > Also, update documentation about the new interface. > > Cc: Tejun Heo <tj@xxxxxxxxxx> > Cc: Li Zefan <lizefan@xxxxxxxxxx> > Cc: James Morris <jmorris@xxxxxxxxx> > Cc: Pavel Emelyanov <xemul@xxxxxxxxxx> > Cc: Serge Hallyn <serge.hallyn@xxxxxxxxxxxxx> Acked-by: Serge Hallyn <serge.hallyn@xxxxxxxxxxxxx> > Signed-off-by: Aristeu Rozanski <aris@xxxxxxxxxx> > > --- > Documentation/cgroups/devices.txt | 73 ++++++++++++++++++++++++++++---------- > security/device_cgroup.c | 63 +++++++++++++++++++++++++++----- > 2 files changed, 107 insertions(+), 29 deletions(-) > > --- a/security/device_cgroup.c 2012-08-30 11:53:54.214675713 -0400 > +++ b/security/device_cgroup.c 2012-08-30 11:53:54.227682064 -0400 > @@ -214,6 +214,8 @@ static void devcgroup_destroy(struct cgr > #define DEVCG_ALLOW 1 > #define DEVCG_DENY 2 > #define DEVCG_LIST 3 > +#define DEVCG_BEHAVIOR 4 > +#define DEVCG_EXCEPTIONS 5 > > #define MAJMINLEN 13 > #define ACCLEN 4 > @@ -249,11 +251,25 @@ static void set_majmin(char *str, unsign > sprintf(str, "%u", m); > } > > +static void __devcg_seq_list_exceptions(struct dev_cgroup *devcg, > + struct seq_file *m) > +{ > + struct dev_exception_item *ex; > + char maj[MAJMINLEN], min[MAJMINLEN], acc[ACCLEN]; > + > + list_for_each_entry_rcu(ex, &devcg->exceptions, list) { > + set_access(acc, ex->access); > + set_majmin(maj, ex->major); > + set_majmin(min, ex->minor); > + seq_printf(m, "%c %s:%s %s\n", type_to_char(ex->type), > + maj, min, acc); > + } > +} > + > static int devcgroup_seq_read(struct cgroup *cgroup, struct cftype *cft, > struct seq_file *m) > { > struct dev_cgroup *devcgroup = cgroup_to_devcgroup(cgroup); > - struct dev_exception_item *ex; > char maj[MAJMINLEN], min[MAJMINLEN], acc[ACCLEN]; > > rcu_read_lock(); > @@ -269,20 +285,37 @@ static int devcgroup_seq_read(struct cgr > set_majmin(min, ~0); > seq_printf(m, "%c %s:%s %s\n", type_to_char(DEV_ALL), > maj, min, acc); > - } else { > - list_for_each_entry_rcu(ex, &devcgroup->exceptions, list) { > - set_access(acc, ex->access); > - set_majmin(maj, ex->major); > - set_majmin(min, ex->minor); > - seq_printf(m, "%c %s:%s %s\n", type_to_char(ex->type), > - maj, min, acc); > - } > - } > + } else > + __devcg_seq_list_exceptions(devcgroup, m); > + > rcu_read_unlock(); > > return 0; > } > > +static int devcg_seq_read_behavior(struct cgroup *cgroup, > + struct cftype *cft, struct seq_file *m) > +{ > + struct dev_cgroup *devcgroup = cgroup_to_devcgroup(cgroup); > + > + if (devcgroup->behavior == DEVCG_DEFAULT_ALLOW) > + seq_printf(m, "allow\n"); > + else > + seq_printf(m, "deny\n"); > + > + return 0; > +} > + > +static int devcg_seq_read_exceptions(struct cgroup *cgroup, > + struct cftype *cft, struct seq_file *m) > +{ > + struct dev_cgroup *devcgroup = cgroup_to_devcgroup(cgroup); > + > + __devcg_seq_list_exceptions(devcgroup, m); > + > + return 0; > +} > + > /** > * may_access - verifies if a new exception is part of what is allowed > * by a dev cgroup based on the default policy + > @@ -521,6 +554,16 @@ static struct cftype dev_cgroup_files[] > .read_seq_string = devcgroup_seq_read, > .private = DEVCG_LIST, > }, > + { > + .name = "behavior", > + .read_seq_string = devcg_seq_read_behavior, > + .private = DEVCG_BEHAVIOR, > + }, > + { > + .name = "exceptions", > + .read_seq_string = devcg_seq_read_exceptions, > + .private = DEVCG_EXCEPTIONS, > + }, > { } /* terminate */ > }; > > --- a/Documentation/cgroups/devices.txt 2012-06-18 14:33:03.913651049 -0400 > +++ b/Documentation/cgroups/devices.txt 2012-08-30 12:20:46.258720000 -0400 > @@ -3,37 +3,65 @@ Device Whitelist Controller > 1. Description: > > Implement a cgroup to track and enforce open and mknod restrictions > -on device files. A device cgroup associates a device access > -whitelist with each cgroup. A whitelist entry has 4 fields. > -'type' is a (all), c (char), or b (block). 'all' means it applies > -to all types and all major and minor numbers. Major and minor are > -either an integer or * for all. Access is a composition of r > -(read), w (write), and m (mknod). > - > -The root device cgroup starts with rwm to 'all'. A child device > -cgroup gets a copy of the parent. Administrators can then remove > -devices from the whitelist or add new entries. A child cgroup can > +on device files. A device cgroup associates a device access default > +behavior and a exception list with each cgroup. A exception entry > +has 4 fields. 'type' is a (all), c (char), or b (block). 'all' > +means it applies to all types and all major and minor numbers. > +Major and minor are either an integer or * for all. Access is a > +composition of r (read), w (write), and m (mknod). The behavior > +can be set to 'allow' or 'deny' and determines what's the default > +action if a matching exception is not found. > + > +The root device cgroup starts with default behavior 'allow'. A > +child device cgroup gets a copy of the parent. Administrators can > +then add exceptions or change the behavior. A child cgroup can > never receive a device access which is denied by its parent. However > when a device access is removed from a parent it will not also be > removed from the child(ren). > > 2. User Interface > > -An entry is added using devices.allow, and removed using > -devices.deny. For instance > +First determine what's the current behavior by reading > +'devices.behavior': > > - echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow > + # cat /sys/fs/cgroup/1/devices.behavior > + allow > > -allows cgroup 1 to read and mknod the device usually known as > -/dev/null. Doing > +This means the default action is to allow everything. You can switch > +the behavior by writing 'a' on the opposite file: > > - echo a > /sys/fs/cgroup/1/devices.deny > + # echo 'a' > /sys/fs/cgroup/1/devices.deny > + # cat /sys/fs/cgroup/1/behavior > + deny > + # echo 'a' > /sys/fs/cgroup/1/devices.allow > + # cat /sys/fs/cgroup/1/behavior > + allow > > -will remove the default 'a *:* rwm' entry. Doing > +Every time the behavior changes, the exception list is cleared. > +To add an exception, write a rule on the opposite file: > > - echo a > /sys/fs/cgroup/1/devices.allow > + # echo 'a' > /sys/fs/cgroup/1/devices.allow > + # echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.deny > > -will add the 'a *:* rwm' entry to the whitelist. > +So the default behavior is to allow everything but mknod and read > +on /dev/null file. The file 'devices.exceptions' contains the > +current list of exceptions: > + > + # cat /sys/fs/cgroup/1/devices.exceptions > + c 1:3 mr > + > +To remove an exception, write the same rule in the opposite file: > + > + # echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow > + > +Now the exceptions list will be empty. It's also possible to change > +an exception entry:: > + > + # cat /sys/fs/cgroup/1/devices.exceptions > + c 1:3 rm > + # echo 'c 1:3 m' > /sys/fs/cgroup/1/devices.allow > + # cat /sys/fs/cgroup/1/devices.exceptions > + c 1:3 r > > 3. Security > > @@ -50,3 +78,10 @@ task to a new cgroup. (Again we'll prob > > A cgroup may not be granted more permissions than the cgroup's > parent has. > + > +4. Compatibility > + > +Previous versions of device cgroup operated using a whitelist. The > +old interface (devices.allow, devices.deny and devices.list) is still > +supported but users are advised to replace devices.list usage by > +devices.behavior and devices.exceptions. > > -- > To unsubscribe from this list: send the line "unsubscribe linux-kernel" in > the body of a message to majordomo@xxxxxxxxxxxxxxx > More majordomo info at http://vger.kernel.org/majordomo-info.html > Please read the FAQ at http://www.tux.org/lkml/ -- To unsubscribe from this list: send the line "unsubscribe cgroups" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html