On 06/28/2013 11:11 AM, Dwight Engen wrote: > Signed-off-by: Dwight Engen <dwight.engen@xxxxxxxxxx> > --- > fs/xfs/xfs_ioctl.c | 17 +++++++++++++++++ > 1 file changed, 17 insertions(+) > > diff --git a/fs/xfs/xfs_ioctl.c b/fs/xfs/xfs_ioctl.c > index 487dca5..123314e 100644 > --- a/fs/xfs/xfs_ioctl.c > +++ b/fs/xfs/xfs_ioctl.c > @@ -1655,6 +1655,23 @@ xfs_file_ioctl( > if (error) > return -XFS_ERROR(error); > > + /* non-privileged users should not be able to trim blocks on > + * objects they cannot write to, so require them to specify > + * either their own uid, or a group they are a member of > + */ > + if (!capable(CAP_SYS_ADMIN)) { > + if (!(eofb.eof_flags & (XFS_EOF_FLAGS_UID | XFS_EOF_FLAGS_GID))) > + return -XFS_ERROR(EPERM); > + > + if ((eofb.eof_flags & XFS_EOF_FLAGS_UID) && > + !uid_eq(current_fsuid(), keofb.eof_uid)) > + return -XFS_ERROR(EPERM); > + > + if ((eofb.eof_flags & XFS_EOF_FLAGS_GID) && > + !in_group_p(keofb.eof_gid)) > + return -XFS_ERROR(EPERM); > + } > + This looks reasonable to me. In thinking more about the other aspect of group management (and I admit I'm still waffling about this), it seems like we could go in a couple directions: - Now that we have a separate internal only eofblocks control, be more flexible and provide an internal only flag (valid only for UID/GID scans) to instruct the scan to do specific file permission checking against the inodes. This would be set by xfs_file_ioctl() and do the write permission enforcement for userspace originated scans. This would also allow the future EDQUOT work to leave out said flag and do a group wide scan regardless of the specific permissions of the calling context (i.e., when the system decides all inodes under a group quota must be trimmed). The downsides here are the behavior might be a bit unclear and we'd have to fork off the flags bits in a manner that's clear and maintainable. I suppose one could also argue this is overkill for somewhat of a secondary operation. - Go the other direction, be less flexible and simply not allow !capable(CAP_SYS_ADMIN) group scans just as we started doing for project quotas. This is obviously very simple, but then we disallow regular users from trimming groups of inodes they should full well have permission to trim. I think I'm leaning towards the former approach if it can be implemented cleanly. Thoughts or ideas? Brian > error = xfs_icache_free_eofblocks(mp, &keofb); > return -error; > } > _______________________________________________ xfs mailing list xfs@xxxxxxxxxxx http://oss.sgi.com/mailman/listinfo/xfs