Loading...
1/*
2 * Process version 3 NFSACL requests.
3 *
4 * Copyright (C) 2002-2003 Andreas Gruenbacher <agruen@suse.de>
5 */
6
7#include "nfsd.h"
8/* FIXME: nfsacl.h is a broken header */
9#include <linux/nfsacl.h>
10#include <linux/gfp.h>
11#include "cache.h"
12#include "xdr3.h"
13#include "vfs.h"
14
15#define RETURN_STATUS(st) { resp->status = (st); return (st); }
16
17/*
18 * NULL call.
19 */
20static __be32
21nfsd3_proc_null(struct svc_rqst *rqstp, void *argp, void *resp)
22{
23 return nfs_ok;
24}
25
26/*
27 * Get the Access and/or Default ACL of a file.
28 */
29static __be32 nfsd3_proc_getacl(struct svc_rqst * rqstp,
30 struct nfsd3_getaclargs *argp, struct nfsd3_getaclres *resp)
31{
32 svc_fh *fh;
33 struct posix_acl *acl;
34 __be32 nfserr = 0;
35
36 fh = fh_copy(&resp->fh, &argp->fh);
37 nfserr = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_NOP);
38 if (nfserr)
39 RETURN_STATUS(nfserr);
40
41 if (argp->mask & ~(NFS_ACL|NFS_ACLCNT|NFS_DFACL|NFS_DFACLCNT))
42 RETURN_STATUS(nfserr_inval);
43 resp->mask = argp->mask;
44
45 if (resp->mask & (NFS_ACL|NFS_ACLCNT)) {
46 acl = nfsd_get_posix_acl(fh, ACL_TYPE_ACCESS);
47 if (IS_ERR(acl)) {
48 int err = PTR_ERR(acl);
49
50 if (err == -ENODATA || err == -EOPNOTSUPP)
51 acl = NULL;
52 else {
53 nfserr = nfserrno(err);
54 goto fail;
55 }
56 }
57 if (acl == NULL) {
58 /* Solaris returns the inode's minimum ACL. */
59
60 struct inode *inode = fh->fh_dentry->d_inode;
61 acl = posix_acl_from_mode(inode->i_mode, GFP_KERNEL);
62 }
63 resp->acl_access = acl;
64 }
65 if (resp->mask & (NFS_DFACL|NFS_DFACLCNT)) {
66 /* Check how Solaris handles requests for the Default ACL
67 of a non-directory! */
68
69 acl = nfsd_get_posix_acl(fh, ACL_TYPE_DEFAULT);
70 if (IS_ERR(acl)) {
71 int err = PTR_ERR(acl);
72
73 if (err == -ENODATA || err == -EOPNOTSUPP)
74 acl = NULL;
75 else {
76 nfserr = nfserrno(err);
77 goto fail;
78 }
79 }
80 resp->acl_default = acl;
81 }
82
83 /* resp->acl_{access,default} are released in nfs3svc_release_getacl. */
84 RETURN_STATUS(0);
85
86fail:
87 posix_acl_release(resp->acl_access);
88 posix_acl_release(resp->acl_default);
89 RETURN_STATUS(nfserr);
90}
91
92/*
93 * Set the Access and/or Default ACL of a file.
94 */
95static __be32 nfsd3_proc_setacl(struct svc_rqst * rqstp,
96 struct nfsd3_setaclargs *argp,
97 struct nfsd3_attrstat *resp)
98{
99 svc_fh *fh;
100 __be32 nfserr = 0;
101
102 fh = fh_copy(&resp->fh, &argp->fh);
103 nfserr = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_SATTR);
104
105 if (!nfserr) {
106 nfserr = nfserrno( nfsd_set_posix_acl(
107 fh, ACL_TYPE_ACCESS, argp->acl_access) );
108 }
109 if (!nfserr) {
110 nfserr = nfserrno( nfsd_set_posix_acl(
111 fh, ACL_TYPE_DEFAULT, argp->acl_default) );
112 }
113
114 /* argp->acl_{access,default} may have been allocated in
115 nfs3svc_decode_setaclargs. */
116 posix_acl_release(argp->acl_access);
117 posix_acl_release(argp->acl_default);
118 RETURN_STATUS(nfserr);
119}
120
121/*
122 * XDR decode functions
123 */
124static int nfs3svc_decode_getaclargs(struct svc_rqst *rqstp, __be32 *p,
125 struct nfsd3_getaclargs *args)
126{
127 if (!(p = nfs3svc_decode_fh(p, &args->fh)))
128 return 0;
129 args->mask = ntohl(*p); p++;
130
131 return xdr_argsize_check(rqstp, p);
132}
133
134
135static int nfs3svc_decode_setaclargs(struct svc_rqst *rqstp, __be32 *p,
136 struct nfsd3_setaclargs *args)
137{
138 struct kvec *head = rqstp->rq_arg.head;
139 unsigned int base;
140 int n;
141
142 if (!(p = nfs3svc_decode_fh(p, &args->fh)))
143 return 0;
144 args->mask = ntohl(*p++);
145 if (args->mask & ~(NFS_ACL|NFS_ACLCNT|NFS_DFACL|NFS_DFACLCNT) ||
146 !xdr_argsize_check(rqstp, p))
147 return 0;
148
149 base = (char *)p - (char *)head->iov_base;
150 n = nfsacl_decode(&rqstp->rq_arg, base, NULL,
151 (args->mask & NFS_ACL) ?
152 &args->acl_access : NULL);
153 if (n > 0)
154 n = nfsacl_decode(&rqstp->rq_arg, base + n, NULL,
155 (args->mask & NFS_DFACL) ?
156 &args->acl_default : NULL);
157 return (n > 0);
158}
159
160/*
161 * XDR encode functions
162 */
163
164/* GETACL */
165static int nfs3svc_encode_getaclres(struct svc_rqst *rqstp, __be32 *p,
166 struct nfsd3_getaclres *resp)
167{
168 struct dentry *dentry = resp->fh.fh_dentry;
169
170 p = nfs3svc_encode_post_op_attr(rqstp, p, &resp->fh);
171 if (resp->status == 0 && dentry && dentry->d_inode) {
172 struct inode *inode = dentry->d_inode;
173 struct kvec *head = rqstp->rq_res.head;
174 unsigned int base;
175 int n;
176 int w;
177
178 *p++ = htonl(resp->mask);
179 if (!xdr_ressize_check(rqstp, p))
180 return 0;
181 base = (char *)p - (char *)head->iov_base;
182
183 rqstp->rq_res.page_len = w = nfsacl_size(
184 (resp->mask & NFS_ACL) ? resp->acl_access : NULL,
185 (resp->mask & NFS_DFACL) ? resp->acl_default : NULL);
186 while (w > 0) {
187 if (!rqstp->rq_respages[rqstp->rq_resused++])
188 return 0;
189 w -= PAGE_SIZE;
190 }
191
192 n = nfsacl_encode(&rqstp->rq_res, base, inode,
193 resp->acl_access,
194 resp->mask & NFS_ACL, 0);
195 if (n > 0)
196 n = nfsacl_encode(&rqstp->rq_res, base + n, inode,
197 resp->acl_default,
198 resp->mask & NFS_DFACL,
199 NFS_ACL_DEFAULT);
200 if (n <= 0)
201 return 0;
202 } else
203 if (!xdr_ressize_check(rqstp, p))
204 return 0;
205
206 return 1;
207}
208
209/* SETACL */
210static int nfs3svc_encode_setaclres(struct svc_rqst *rqstp, __be32 *p,
211 struct nfsd3_attrstat *resp)
212{
213 p = nfs3svc_encode_post_op_attr(rqstp, p, &resp->fh);
214
215 return xdr_ressize_check(rqstp, p);
216}
217
218/*
219 * XDR release functions
220 */
221static int nfs3svc_release_getacl(struct svc_rqst *rqstp, __be32 *p,
222 struct nfsd3_getaclres *resp)
223{
224 fh_put(&resp->fh);
225 posix_acl_release(resp->acl_access);
226 posix_acl_release(resp->acl_default);
227 return 1;
228}
229
230#define nfs3svc_decode_voidargs NULL
231#define nfs3svc_release_void NULL
232#define nfsd3_setaclres nfsd3_attrstat
233#define nfsd3_voidres nfsd3_voidargs
234struct nfsd3_voidargs { int dummy; };
235
236#define PROC(name, argt, rest, relt, cache, respsize) \
237 { (svc_procfunc) nfsd3_proc_##name, \
238 (kxdrproc_t) nfs3svc_decode_##argt##args, \
239 (kxdrproc_t) nfs3svc_encode_##rest##res, \
240 (kxdrproc_t) nfs3svc_release_##relt, \
241 sizeof(struct nfsd3_##argt##args), \
242 sizeof(struct nfsd3_##rest##res), \
243 0, \
244 cache, \
245 respsize, \
246 }
247
248#define ST 1 /* status*/
249#define AT 21 /* attributes */
250#define pAT (1+AT) /* post attributes - conditional */
251#define ACL (1+NFS_ACL_MAX_ENTRIES*3) /* Access Control List */
252
253static struct svc_procedure nfsd_acl_procedures3[] = {
254 PROC(null, void, void, void, RC_NOCACHE, ST),
255 PROC(getacl, getacl, getacl, getacl, RC_NOCACHE, ST+1+2*(1+ACL)),
256 PROC(setacl, setacl, setacl, fhandle, RC_NOCACHE, ST+pAT),
257};
258
259struct svc_version nfsd_acl_version3 = {
260 .vs_vers = 3,
261 .vs_nproc = 3,
262 .vs_proc = nfsd_acl_procedures3,
263 .vs_dispatch = nfsd_dispatch,
264 .vs_xdrsize = NFS3_SVC_XDRSIZE,
265 .vs_hidden = 0,
266};
267
1/*
2 * Process version 3 NFSACL requests.
3 *
4 * Copyright (C) 2002-2003 Andreas Gruenbacher <agruen@suse.de>
5 */
6
7#include "nfsd.h"
8/* FIXME: nfsacl.h is a broken header */
9#include <linux/nfsacl.h>
10#include <linux/gfp.h>
11#include "cache.h"
12#include "xdr3.h"
13#include "vfs.h"
14
15#define RETURN_STATUS(st) { resp->status = (st); return (st); }
16
17/*
18 * NULL call.
19 */
20static __be32
21nfsd3_proc_null(struct svc_rqst *rqstp, void *argp, void *resp)
22{
23 return nfs_ok;
24}
25
26/*
27 * Get the Access and/or Default ACL of a file.
28 */
29static __be32 nfsd3_proc_getacl(struct svc_rqst * rqstp,
30 struct nfsd3_getaclargs *argp, struct nfsd3_getaclres *resp)
31{
32 struct posix_acl *acl;
33 struct inode *inode;
34 svc_fh *fh;
35 __be32 nfserr = 0;
36
37 fh = fh_copy(&resp->fh, &argp->fh);
38 nfserr = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_NOP);
39 if (nfserr)
40 RETURN_STATUS(nfserr);
41
42 inode = d_inode(fh->fh_dentry);
43
44 if (argp->mask & ~NFS_ACL_MASK)
45 RETURN_STATUS(nfserr_inval);
46 resp->mask = argp->mask;
47
48 if (resp->mask & (NFS_ACL|NFS_ACLCNT)) {
49 acl = get_acl(inode, ACL_TYPE_ACCESS);
50 if (acl == NULL) {
51 /* Solaris returns the inode's minimum ACL. */
52 acl = posix_acl_from_mode(inode->i_mode, GFP_KERNEL);
53 }
54 if (IS_ERR(acl)) {
55 nfserr = nfserrno(PTR_ERR(acl));
56 goto fail;
57 }
58 resp->acl_access = acl;
59 }
60 if (resp->mask & (NFS_DFACL|NFS_DFACLCNT)) {
61 /* Check how Solaris handles requests for the Default ACL
62 of a non-directory! */
63 acl = get_acl(inode, ACL_TYPE_DEFAULT);
64 if (IS_ERR(acl)) {
65 nfserr = nfserrno(PTR_ERR(acl));
66 goto fail;
67 }
68 resp->acl_default = acl;
69 }
70
71 /* resp->acl_{access,default} are released in nfs3svc_release_getacl. */
72 RETURN_STATUS(0);
73
74fail:
75 posix_acl_release(resp->acl_access);
76 posix_acl_release(resp->acl_default);
77 RETURN_STATUS(nfserr);
78}
79
80/*
81 * Set the Access and/or Default ACL of a file.
82 */
83static __be32 nfsd3_proc_setacl(struct svc_rqst * rqstp,
84 struct nfsd3_setaclargs *argp,
85 struct nfsd3_attrstat *resp)
86{
87 struct inode *inode;
88 svc_fh *fh;
89 __be32 nfserr = 0;
90 int error;
91
92 fh = fh_copy(&resp->fh, &argp->fh);
93 nfserr = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_SATTR);
94 if (nfserr)
95 goto out;
96
97 inode = d_inode(fh->fh_dentry);
98 if (!IS_POSIXACL(inode) || !inode->i_op->set_acl) {
99 error = -EOPNOTSUPP;
100 goto out_errno;
101 }
102
103 error = fh_want_write(fh);
104 if (error)
105 goto out_errno;
106
107 error = inode->i_op->set_acl(inode, argp->acl_access, ACL_TYPE_ACCESS);
108 if (error)
109 goto out_drop_write;
110 error = inode->i_op->set_acl(inode, argp->acl_default,
111 ACL_TYPE_DEFAULT);
112
113out_drop_write:
114 fh_drop_write(fh);
115out_errno:
116 nfserr = nfserrno(error);
117out:
118 /* argp->acl_{access,default} may have been allocated in
119 nfs3svc_decode_setaclargs. */
120 posix_acl_release(argp->acl_access);
121 posix_acl_release(argp->acl_default);
122 RETURN_STATUS(nfserr);
123}
124
125/*
126 * XDR decode functions
127 */
128static int nfs3svc_decode_getaclargs(struct svc_rqst *rqstp, __be32 *p,
129 struct nfsd3_getaclargs *args)
130{
131 p = nfs3svc_decode_fh(p, &args->fh);
132 if (!p)
133 return 0;
134 args->mask = ntohl(*p); p++;
135
136 return xdr_argsize_check(rqstp, p);
137}
138
139
140static int nfs3svc_decode_setaclargs(struct svc_rqst *rqstp, __be32 *p,
141 struct nfsd3_setaclargs *args)
142{
143 struct kvec *head = rqstp->rq_arg.head;
144 unsigned int base;
145 int n;
146
147 p = nfs3svc_decode_fh(p, &args->fh);
148 if (!p)
149 return 0;
150 args->mask = ntohl(*p++);
151 if (args->mask & ~NFS_ACL_MASK ||
152 !xdr_argsize_check(rqstp, p))
153 return 0;
154
155 base = (char *)p - (char *)head->iov_base;
156 n = nfsacl_decode(&rqstp->rq_arg, base, NULL,
157 (args->mask & NFS_ACL) ?
158 &args->acl_access : NULL);
159 if (n > 0)
160 n = nfsacl_decode(&rqstp->rq_arg, base + n, NULL,
161 (args->mask & NFS_DFACL) ?
162 &args->acl_default : NULL);
163 return (n > 0);
164}
165
166/*
167 * XDR encode functions
168 */
169
170/* GETACL */
171static int nfs3svc_encode_getaclres(struct svc_rqst *rqstp, __be32 *p,
172 struct nfsd3_getaclres *resp)
173{
174 struct dentry *dentry = resp->fh.fh_dentry;
175
176 p = nfs3svc_encode_post_op_attr(rqstp, p, &resp->fh);
177 if (resp->status == 0 && dentry && d_really_is_positive(dentry)) {
178 struct inode *inode = d_inode(dentry);
179 struct kvec *head = rqstp->rq_res.head;
180 unsigned int base;
181 int n;
182 int w;
183
184 *p++ = htonl(resp->mask);
185 if (!xdr_ressize_check(rqstp, p))
186 return 0;
187 base = (char *)p - (char *)head->iov_base;
188
189 rqstp->rq_res.page_len = w = nfsacl_size(
190 (resp->mask & NFS_ACL) ? resp->acl_access : NULL,
191 (resp->mask & NFS_DFACL) ? resp->acl_default : NULL);
192 while (w > 0) {
193 if (!*(rqstp->rq_next_page++))
194 return 0;
195 w -= PAGE_SIZE;
196 }
197
198 n = nfsacl_encode(&rqstp->rq_res, base, inode,
199 resp->acl_access,
200 resp->mask & NFS_ACL, 0);
201 if (n > 0)
202 n = nfsacl_encode(&rqstp->rq_res, base + n, inode,
203 resp->acl_default,
204 resp->mask & NFS_DFACL,
205 NFS_ACL_DEFAULT);
206 if (n <= 0)
207 return 0;
208 } else
209 if (!xdr_ressize_check(rqstp, p))
210 return 0;
211
212 return 1;
213}
214
215/* SETACL */
216static int nfs3svc_encode_setaclres(struct svc_rqst *rqstp, __be32 *p,
217 struct nfsd3_attrstat *resp)
218{
219 p = nfs3svc_encode_post_op_attr(rqstp, p, &resp->fh);
220
221 return xdr_ressize_check(rqstp, p);
222}
223
224/*
225 * XDR release functions
226 */
227static int nfs3svc_release_getacl(struct svc_rqst *rqstp, __be32 *p,
228 struct nfsd3_getaclres *resp)
229{
230 fh_put(&resp->fh);
231 posix_acl_release(resp->acl_access);
232 posix_acl_release(resp->acl_default);
233 return 1;
234}
235
236#define nfs3svc_decode_voidargs NULL
237#define nfs3svc_release_void NULL
238#define nfsd3_setaclres nfsd3_attrstat
239#define nfsd3_voidres nfsd3_voidargs
240struct nfsd3_voidargs { int dummy; };
241
242#define PROC(name, argt, rest, relt, cache, respsize) \
243 { (svc_procfunc) nfsd3_proc_##name, \
244 (kxdrproc_t) nfs3svc_decode_##argt##args, \
245 (kxdrproc_t) nfs3svc_encode_##rest##res, \
246 (kxdrproc_t) nfs3svc_release_##relt, \
247 sizeof(struct nfsd3_##argt##args), \
248 sizeof(struct nfsd3_##rest##res), \
249 0, \
250 cache, \
251 respsize, \
252 }
253
254#define ST 1 /* status*/
255#define AT 21 /* attributes */
256#define pAT (1+AT) /* post attributes - conditional */
257#define ACL (1+NFS_ACL_MAX_ENTRIES*3) /* Access Control List */
258
259static struct svc_procedure nfsd_acl_procedures3[] = {
260 PROC(null, void, void, void, RC_NOCACHE, ST),
261 PROC(getacl, getacl, getacl, getacl, RC_NOCACHE, ST+1+2*(1+ACL)),
262 PROC(setacl, setacl, setacl, fhandle, RC_NOCACHE, ST+pAT),
263};
264
265struct svc_version nfsd_acl_version3 = {
266 .vs_vers = 3,
267 .vs_nproc = 3,
268 .vs_proc = nfsd_acl_procedures3,
269 .vs_dispatch = nfsd_dispatch,
270 .vs_xdrsize = NFS3_SVC_XDRSIZE,
271 .vs_hidden = 0,
272};
273