[Top] [All Lists]

Re: [PATCH 6/6] ioctl eofblocks: require non-privileged users to specify

To: Dwight Engen <dwight.engen@xxxxxxxxxx>
Subject: Re: [PATCH 6/6] ioctl eofblocks: require non-privileged users to specify uid/gid match
From: Brian Foster <bfoster@xxxxxxxxxx>
Date: Fri, 28 Jun 2013 14:50:24 -0400
Cc: Dave Chinner <david@xxxxxxxxxxxxx>, "Eric W. Biederman" <ebiederm@xxxxxxxxx>, xfs@xxxxxxxxxxx, Serge Hallyn <serge.hallyn@xxxxxxxxxx>
Delivered-to: xfs@xxxxxxxxxxx
In-reply-to: <20130628111138.68d0b486@xxxxxxxxxx>
References: <20130619110948.0bfafa2b@xxxxxxxxxx> <20130620001341.GM29338@dastard> <20130620095410.1917d235@xxxxxxxxxx> <20130620220311.GT29376@dastard> <20130621111420.5592707e@xxxxxxxxxx> <20130624003316.GH29376@dastard> <20130624091035.6274800f@xxxxxxxxxx> <20130626020924.GD29376@dastard> <20130628111138.68d0b486@xxxxxxxxxx>
User-agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130514 Thunderbird/17.0.6
On 06/28/2013 11:11 AM, Dwight Engen wrote:
> Signed-off-by: Dwight Engen <dwight.engen@xxxxxxxxxx>
> ---
>  fs/xfs/xfs_ioctl.c | 17 +++++++++++++++++
>  1 file changed, 17 insertions(+)
> diff --git a/fs/xfs/xfs_ioctl.c b/fs/xfs/xfs_ioctl.c
> index 487dca5..123314e 100644
> --- a/fs/xfs/xfs_ioctl.c
> +++ b/fs/xfs/xfs_ioctl.c
> @@ -1655,6 +1655,23 @@ xfs_file_ioctl(
>               if (error)
>                       return -XFS_ERROR(error);
> +             /* non-privileged users should not be able to trim blocks on
> +              * objects they cannot write to, so require them to specify
> +              * either their own uid, or a group they are a member of
> +              */
> +             if (!capable(CAP_SYS_ADMIN)) {
> +                     if (!(eofb.eof_flags & (XFS_EOF_FLAGS_UID | 
> +                             return -XFS_ERROR(EPERM);
> +
> +                     if ((eofb.eof_flags & XFS_EOF_FLAGS_UID) &&
> +                         !uid_eq(current_fsuid(), keofb.eof_uid))
> +                             return -XFS_ERROR(EPERM);
> +
> +                     if ((eofb.eof_flags & XFS_EOF_FLAGS_GID) &&
> +                         !in_group_p(keofb.eof_gid))
> +                             return -XFS_ERROR(EPERM);
> +             }
> +

This looks reasonable to me.

In thinking more about the other aspect of group management (and I admit
I'm still waffling about this), it seems like we could go in a couple

- Now that we have a separate internal only eofblocks control, be more
flexible and provide an internal only flag (valid only for UID/GID
scans) to instruct the scan to do specific file permission checking
against the inodes. This would be set by xfs_file_ioctl() and do the
write permission enforcement for userspace originated scans. This would
also allow the future EDQUOT work to leave out said flag and do a group
wide scan regardless of the specific permissions of the calling context
(i.e., when the system decides all inodes under a group quota must be

The downsides here are the behavior might be a bit unclear and we'd have
to fork off the flags bits in a manner that's clear and maintainable. I
suppose one could also argue this is overkill for somewhat of a
secondary operation.

- Go the other direction, be less flexible and simply not allow
!capable(CAP_SYS_ADMIN) group scans just as we started doing for project
quotas. This is obviously very simple, but then we disallow regular
users from trimming groups of inodes they should full well have
permission to trim.

I think I'm leaning towards the former approach if it can be implemented
cleanly. Thoughts or ideas?


>               error = xfs_icache_free_eofblocks(mp, &keofb);
>               return -error;
>       }

<Prev in Thread] Current Thread [Next in Thread>