Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754588AbYGGRZ5 (ORCPT ); Mon, 7 Jul 2008 13:25:57 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1754113AbYGGRZt (ORCPT ); Mon, 7 Jul 2008 13:25:49 -0400 Received: from e32.co.us.ibm.com ([32.97.110.150]:52087 "EHLO e32.co.us.ibm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753475AbYGGRZs (ORCPT ); Mon, 7 Jul 2008 13:25:48 -0400 Date: Mon, 7 Jul 2008 12:25:46 -0500 From: "Serge E. Hallyn" To: Li Zefan Cc: Andrew Morton , LKML Subject: Re: [PATCH] devcgroup: fix odd behaviour when writing 'a' to devices.allow Message-ID: <20080707172546.GQ11250@us.ibm.com> References: <486DBB07.5050104@cn.fujitsu.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <486DBB07.5050104@cn.fujitsu.com> User-Agent: Mutt/1.5.17+20080114 (2008-01-14) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2411 Lines: 71 Quoting Li Zefan (lizf@cn.fujitsu.com): > # cat /devcg/devices.list > a *:* rwm > # echo a > devices.allow > # cat /devcg/devices.list > a *:* rwm > a 0:0 rwm > > This is odd and maybe confusing. With this patch, writing 'a' > to devices.allow will add 'a *:* rwm' to the whitelist. > > Also a few fixes and updates to the document. > > Signed-off-by: Li Zefan Acked-by: Serge Hallyn thanks, -serge > --- > Documentation/controllers/devices.txt | 8 ++++++-- > security/device_cgroup.c | 2 ++ > 2 files changed, 8 insertions(+), 2 deletions(-) > > diff --git a/Documentation/controllers/devices.txt b/Documentation/controllers/devices.txt > index 4dcea42..7cc6e6a 100644 > --- a/Documentation/controllers/devices.txt > +++ b/Documentation/controllers/devices.txt > @@ -13,7 +13,7 @@ either an integer or * for all. Access is a composition of r > The root device cgroup starts with rwm to 'all'. A child device > cgroup gets a copy of the parent. Administrators can then remove > devices from the whitelist or add new entries. A child cgroup can > -never receive a device access which is denied its parent. However > +never receive a device access which is denied by its parent. However > when a device access is removed from a parent it will not also be > removed from the child(ren). > > @@ -29,7 +29,11 @@ allows cgroup 1 to read and mknod the device usually known as > > echo a > /cgroups/1/devices.deny > > -will remove the default 'a *:* mrw' entry. > +will remove the default 'a *:* rwm' entry. Doing > + > + echo a > /cgroups/1/devices.allow > + > +will add the 'a *:* rwm' entry to the whitelist. > > 3. Security > > diff --git a/security/device_cgroup.c b/security/device_cgroup.c > index baf3488..fd764a0 100644 > --- a/security/device_cgroup.c > +++ b/security/device_cgroup.c > @@ -382,6 +382,8 @@ static ssize_t devcgroup_access_write(struct cgroup *cgroup, struct cftype *cft, > case 'a': > wh.type = DEV_ALL; > wh.access = ACC_MASK; > + wh.major = ~0; > + wh.minor = ~0; > goto handle; > case 'b': > wh.type = DEV_BLOCK; > -- > 1.5.4.rc3 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/