Remove the need for having CAP_SYS_RAWIO when doing a FIBMAP call on an open 
file descriptor.

It would be nice to allow users to have permission to see where their data is 
landing on disk, and there really isn't a good reason to keep them from getting 
at this information.

Signed-off-by: Mike Waychison <[EMAIL PROTECTED]>
 fs/ioctl.c |    2 --
 1 file changed, 2 deletions(-)

Index: linux-2.6.23/fs/ioctl.c
===================================================================
--- linux-2.6.23.orig/fs/ioctl.c        2007-10-09 13:31:38.000000000 -0700
+++ linux-2.6.23/fs/ioctl.c     2007-10-25 15:48:24.000000000 -0700
@@ -56,8 +56,6 @@ static int file_ioctl(struct file *filp,
                        /* do we support this mess? */
                        if (!mapping->a_ops->bmap)
                                return -EINVAL;
-                       if (!capable(CAP_SYS_RAWIO))
-                               return -EPERM;
                        if ((error = get_user(block, p)) != 0)
                                return error;
 

--

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to