2019-06-12 17:52:41 +00:00
|
|
|
===========================
|
2008-04-29 08:00:10 +00:00
|
|
|
Device Whitelist Controller
|
2019-06-12 17:52:41 +00:00
|
|
|
===========================
|
2008-04-29 08:00:10 +00:00
|
|
|
|
2019-06-12 17:52:41 +00:00
|
|
|
1. Description
|
|
|
|
==============
|
2008-04-29 08:00:10 +00:00
|
|
|
|
|
|
|
Implement a cgroup to track and enforce open and mknod restrictions
|
|
|
|
on device files. A device cgroup associates a device access
|
|
|
|
whitelist with each cgroup. A whitelist entry has 4 fields.
|
|
|
|
'type' is a (all), c (char), or b (block). 'all' means it applies
|
|
|
|
to all types and all major and minor numbers. Major and minor are
|
|
|
|
either an integer or * for all. Access is a composition of r
|
|
|
|
(read), w (write), and m (mknod).
|
|
|
|
|
|
|
|
The root device cgroup starts with rwm to 'all'. A child device
|
|
|
|
cgroup gets a copy of the parent. Administrators can then remove
|
|
|
|
devices from the whitelist or add new entries. A child cgroup can
|
2013-02-15 16:55:47 +00:00
|
|
|
never receive a device access which is denied by its parent.
|
2008-04-29 08:00:10 +00:00
|
|
|
|
|
|
|
2. User Interface
|
2019-06-12 17:52:41 +00:00
|
|
|
=================
|
2008-04-29 08:00:10 +00:00
|
|
|
|
|
|
|
An entry is added using devices.allow, and removed using
|
2019-06-12 17:52:41 +00:00
|
|
|
devices.deny. For instance::
|
2008-04-29 08:00:10 +00:00
|
|
|
|
2011-06-15 19:59:45 +00:00
|
|
|
echo 'c 1:3 mr' > /sys/fs/cgroup/1/devices.allow
|
2008-04-29 08:00:10 +00:00
|
|
|
|
|
|
|
allows cgroup 1 to read and mknod the device usually known as
|
2019-06-12 17:52:41 +00:00
|
|
|
/dev/null. Doing::
|
2008-04-29 08:00:10 +00:00
|
|
|
|
2011-06-15 19:59:45 +00:00
|
|
|
echo a > /sys/fs/cgroup/1/devices.deny
|
2008-04-29 08:00:10 +00:00
|
|
|
|
2019-06-12 17:52:41 +00:00
|
|
|
will remove the default 'a *:* rwm' entry. Doing::
|
2008-07-04 17:00:07 +00:00
|
|
|
|
2011-06-15 19:59:45 +00:00
|
|
|
echo a > /sys/fs/cgroup/1/devices.allow
|
2008-07-04 17:00:07 +00:00
|
|
|
|
|
|
|
will add the 'a *:* rwm' entry to the whitelist.
|
2008-04-29 08:00:10 +00:00
|
|
|
|
|
|
|
3. Security
|
2019-06-12 17:52:41 +00:00
|
|
|
===========
|
2008-04-29 08:00:10 +00:00
|
|
|
|
|
|
|
Any task can move itself between cgroups. This clearly won't
|
|
|
|
suffice, but we can decide the best way to adequately restrict
|
|
|
|
movement as people get some experience with this. We may just want
|
|
|
|
to require CAP_SYS_ADMIN, which at least is a separate bit from
|
|
|
|
CAP_MKNOD. We may want to just refuse moving to a cgroup which
|
2009-01-16 13:01:18 +00:00
|
|
|
isn't a descendant of the current one. Or we may want to use
|
2008-04-29 08:00:10 +00:00
|
|
|
CAP_MAC_ADMIN, since we really are trying to lock down root.
|
|
|
|
|
|
|
|
CAP_SYS_ADMIN is needed to modify the whitelist or move another
|
|
|
|
task to a new cgroup. (Again we'll probably want to change that).
|
|
|
|
|
|
|
|
A cgroup may not be granted more permissions than the cgroup's
|
|
|
|
parent has.
|
2013-02-15 16:55:47 +00:00
|
|
|
|
|
|
|
4. Hierarchy
|
2019-06-12 17:52:41 +00:00
|
|
|
============
|
2013-02-15 16:55:47 +00:00
|
|
|
|
|
|
|
device cgroups maintain hierarchy by making sure a cgroup never has more
|
|
|
|
access permissions than its parent. Every time an entry is written to
|
|
|
|
a cgroup's devices.deny file, all its children will have that entry removed
|
|
|
|
from their whitelist and all the locally set whitelist entries will be
|
|
|
|
re-evaluated. In case one of the locally set whitelist entries would provide
|
|
|
|
more access than the cgroup's parent, it'll be removed from the whitelist.
|
|
|
|
|
2019-06-12 17:52:41 +00:00
|
|
|
Example::
|
|
|
|
|
2013-02-15 16:55:47 +00:00
|
|
|
A
|
|
|
|
/ \
|
|
|
|
B
|
|
|
|
|
|
|
|
group behavior exceptions
|
|
|
|
A allow "b 8:* rwm", "c 116:1 rw"
|
|
|
|
B deny "c 1:3 rwm", "c 116:2 rwm", "b 3:* rwm"
|
|
|
|
|
2019-06-12 17:52:41 +00:00
|
|
|
If a device is denied in group A::
|
|
|
|
|
2013-02-15 16:55:47 +00:00
|
|
|
# echo "c 116:* r" > A/devices.deny
|
2019-06-12 17:52:41 +00:00
|
|
|
|
2013-02-15 16:55:47 +00:00
|
|
|
it'll propagate down and after revalidating B's entries, the whitelist entry
|
2019-06-12 17:52:41 +00:00
|
|
|
"c 116:2 rwm" will be removed::
|
2013-02-15 16:55:47 +00:00
|
|
|
|
|
|
|
group whitelist entries denied devices
|
|
|
|
A all "b 8:* rwm", "c 116:* rw"
|
|
|
|
B "c 1:3 rwm", "b 3:* rwm" all the rest
|
|
|
|
|
|
|
|
In case parent's exceptions change and local exceptions are not allowed
|
|
|
|
anymore, they'll be deleted.
|
|
|
|
|
2019-06-12 17:52:41 +00:00
|
|
|
Notice that new whitelist entries will not be propagated::
|
|
|
|
|
2013-02-15 16:55:47 +00:00
|
|
|
A
|
|
|
|
/ \
|
|
|
|
B
|
|
|
|
|
|
|
|
group whitelist entries denied devices
|
|
|
|
A "c 1:3 rwm", "c 1:5 r" all the rest
|
|
|
|
B "c 1:3 rwm", "c 1:5 r" all the rest
|
|
|
|
|
2019-06-12 17:52:41 +00:00
|
|
|
when adding ``c *:3 rwm``::
|
|
|
|
|
2013-02-15 16:55:47 +00:00
|
|
|
# echo "c *:3 rwm" >A/devices.allow
|
|
|
|
|
2019-06-12 17:52:41 +00:00
|
|
|
the result::
|
|
|
|
|
2013-02-15 16:55:47 +00:00
|
|
|
group whitelist entries denied devices
|
|
|
|
A "c *:3 rwm", "c 1:5 r" all the rest
|
|
|
|
B "c 1:3 rwm", "c 1:5 r" all the rest
|
|
|
|
|
2019-06-12 17:52:41 +00:00
|
|
|
but now it'll be possible to add new entries to B::
|
|
|
|
|
2013-02-15 16:55:47 +00:00
|
|
|
# echo "c 2:3 rwm" >B/devices.allow
|
|
|
|
# echo "c 50:3 r" >B/devices.allow
|
2019-06-12 17:52:41 +00:00
|
|
|
|
|
|
|
or even::
|
|
|
|
|
2013-02-15 16:55:47 +00:00
|
|
|
# echo "c *:3 rwm" >B/devices.allow
|
|
|
|
|
|
|
|
Allowing or denying all by writing 'a' to devices.allow or devices.deny will
|
|
|
|
not be possible once the device cgroups has children.
|
|
|
|
|
|
|
|
4.1 Hierarchy (internal implementation)
|
2019-06-12 17:52:41 +00:00
|
|
|
---------------------------------------
|
2013-02-15 16:55:47 +00:00
|
|
|
|
|
|
|
device cgroups is implemented internally using a behavior (ALLOW, DENY) and a
|
|
|
|
list of exceptions. The internal state is controlled using the same user
|
|
|
|
interface to preserve compatibility with the previous whitelist-only
|
|
|
|
implementation. Removal or addition of exceptions that will reduce the access
|
|
|
|
to devices will be propagated down the hierarchy.
|
|
|
|
For every propagated exception, the effective rules will be re-evaluated based
|
|
|
|
on current parent's access rules.
|