Loading...
1/*
2 * Process version 3 NFSACL requests.
3 *
4 * Copyright (C) 2002-2003 Andreas Gruenbacher <agruen@suse.de>
5 */
6
7#include "nfsd.h"
8/* FIXME: nfsacl.h is a broken header */
9#include <linux/nfsacl.h>
10#include <linux/gfp.h>
11#include "cache.h"
12#include "xdr3.h"
13#include "vfs.h"
14
15#define RETURN_STATUS(st) { resp->status = (st); return (st); }
16
17/*
18 * NULL call.
19 */
20static __be32
21nfsd3_proc_null(struct svc_rqst *rqstp, void *argp, void *resp)
22{
23 return nfs_ok;
24}
25
26/*
27 * Get the Access and/or Default ACL of a file.
28 */
29static __be32 nfsd3_proc_getacl(struct svc_rqst * rqstp,
30 struct nfsd3_getaclargs *argp, struct nfsd3_getaclres *resp)
31{
32 svc_fh *fh;
33 struct posix_acl *acl;
34 __be32 nfserr = 0;
35
36 fh = fh_copy(&resp->fh, &argp->fh);
37 nfserr = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_NOP);
38 if (nfserr)
39 RETURN_STATUS(nfserr);
40
41 if (argp->mask & ~(NFS_ACL|NFS_ACLCNT|NFS_DFACL|NFS_DFACLCNT))
42 RETURN_STATUS(nfserr_inval);
43 resp->mask = argp->mask;
44
45 if (resp->mask & (NFS_ACL|NFS_ACLCNT)) {
46 acl = nfsd_get_posix_acl(fh, ACL_TYPE_ACCESS);
47 if (IS_ERR(acl)) {
48 int err = PTR_ERR(acl);
49
50 if (err == -ENODATA || err == -EOPNOTSUPP)
51 acl = NULL;
52 else {
53 nfserr = nfserrno(err);
54 goto fail;
55 }
56 }
57 if (acl == NULL) {
58 /* Solaris returns the inode's minimum ACL. */
59
60 struct inode *inode = fh->fh_dentry->d_inode;
61 acl = posix_acl_from_mode(inode->i_mode, GFP_KERNEL);
62 }
63 resp->acl_access = acl;
64 }
65 if (resp->mask & (NFS_DFACL|NFS_DFACLCNT)) {
66 /* Check how Solaris handles requests for the Default ACL
67 of a non-directory! */
68
69 acl = nfsd_get_posix_acl(fh, ACL_TYPE_DEFAULT);
70 if (IS_ERR(acl)) {
71 int err = PTR_ERR(acl);
72
73 if (err == -ENODATA || err == -EOPNOTSUPP)
74 acl = NULL;
75 else {
76 nfserr = nfserrno(err);
77 goto fail;
78 }
79 }
80 resp->acl_default = acl;
81 }
82
83 /* resp->acl_{access,default} are released in nfs3svc_release_getacl. */
84 RETURN_STATUS(0);
85
86fail:
87 posix_acl_release(resp->acl_access);
88 posix_acl_release(resp->acl_default);
89 RETURN_STATUS(nfserr);
90}
91
92/*
93 * Set the Access and/or Default ACL of a file.
94 */
95static __be32 nfsd3_proc_setacl(struct svc_rqst * rqstp,
96 struct nfsd3_setaclargs *argp,
97 struct nfsd3_attrstat *resp)
98{
99 svc_fh *fh;
100 __be32 nfserr = 0;
101
102 fh = fh_copy(&resp->fh, &argp->fh);
103 nfserr = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_SATTR);
104
105 if (!nfserr) {
106 nfserr = nfserrno( nfsd_set_posix_acl(
107 fh, ACL_TYPE_ACCESS, argp->acl_access) );
108 }
109 if (!nfserr) {
110 nfserr = nfserrno( nfsd_set_posix_acl(
111 fh, ACL_TYPE_DEFAULT, argp->acl_default) );
112 }
113
114 /* argp->acl_{access,default} may have been allocated in
115 nfs3svc_decode_setaclargs. */
116 posix_acl_release(argp->acl_access);
117 posix_acl_release(argp->acl_default);
118 RETURN_STATUS(nfserr);
119}
120
121/*
122 * XDR decode functions
123 */
124static int nfs3svc_decode_getaclargs(struct svc_rqst *rqstp, __be32 *p,
125 struct nfsd3_getaclargs *args)
126{
127 if (!(p = nfs3svc_decode_fh(p, &args->fh)))
128 return 0;
129 args->mask = ntohl(*p); p++;
130
131 return xdr_argsize_check(rqstp, p);
132}
133
134
135static int nfs3svc_decode_setaclargs(struct svc_rqst *rqstp, __be32 *p,
136 struct nfsd3_setaclargs *args)
137{
138 struct kvec *head = rqstp->rq_arg.head;
139 unsigned int base;
140 int n;
141
142 if (!(p = nfs3svc_decode_fh(p, &args->fh)))
143 return 0;
144 args->mask = ntohl(*p++);
145 if (args->mask & ~(NFS_ACL|NFS_ACLCNT|NFS_DFACL|NFS_DFACLCNT) ||
146 !xdr_argsize_check(rqstp, p))
147 return 0;
148
149 base = (char *)p - (char *)head->iov_base;
150 n = nfsacl_decode(&rqstp->rq_arg, base, NULL,
151 (args->mask & NFS_ACL) ?
152 &args->acl_access : NULL);
153 if (n > 0)
154 n = nfsacl_decode(&rqstp->rq_arg, base + n, NULL,
155 (args->mask & NFS_DFACL) ?
156 &args->acl_default : NULL);
157 return (n > 0);
158}
159
160/*
161 * XDR encode functions
162 */
163
164/* GETACL */
165static int nfs3svc_encode_getaclres(struct svc_rqst *rqstp, __be32 *p,
166 struct nfsd3_getaclres *resp)
167{
168 struct dentry *dentry = resp->fh.fh_dentry;
169
170 p = nfs3svc_encode_post_op_attr(rqstp, p, &resp->fh);
171 if (resp->status == 0 && dentry && dentry->d_inode) {
172 struct inode *inode = dentry->d_inode;
173 struct kvec *head = rqstp->rq_res.head;
174 unsigned int base;
175 int n;
176 int w;
177
178 *p++ = htonl(resp->mask);
179 if (!xdr_ressize_check(rqstp, p))
180 return 0;
181 base = (char *)p - (char *)head->iov_base;
182
183 rqstp->rq_res.page_len = w = nfsacl_size(
184 (resp->mask & NFS_ACL) ? resp->acl_access : NULL,
185 (resp->mask & NFS_DFACL) ? resp->acl_default : NULL);
186 while (w > 0) {
187 if (!rqstp->rq_respages[rqstp->rq_resused++])
188 return 0;
189 w -= PAGE_SIZE;
190 }
191
192 n = nfsacl_encode(&rqstp->rq_res, base, inode,
193 resp->acl_access,
194 resp->mask & NFS_ACL, 0);
195 if (n > 0)
196 n = nfsacl_encode(&rqstp->rq_res, base + n, inode,
197 resp->acl_default,
198 resp->mask & NFS_DFACL,
199 NFS_ACL_DEFAULT);
200 if (n <= 0)
201 return 0;
202 } else
203 if (!xdr_ressize_check(rqstp, p))
204 return 0;
205
206 return 1;
207}
208
209/* SETACL */
210static int nfs3svc_encode_setaclres(struct svc_rqst *rqstp, __be32 *p,
211 struct nfsd3_attrstat *resp)
212{
213 p = nfs3svc_encode_post_op_attr(rqstp, p, &resp->fh);
214
215 return xdr_ressize_check(rqstp, p);
216}
217
218/*
219 * XDR release functions
220 */
221static int nfs3svc_release_getacl(struct svc_rqst *rqstp, __be32 *p,
222 struct nfsd3_getaclres *resp)
223{
224 fh_put(&resp->fh);
225 posix_acl_release(resp->acl_access);
226 posix_acl_release(resp->acl_default);
227 return 1;
228}
229
230#define nfs3svc_decode_voidargs NULL
231#define nfs3svc_release_void NULL
232#define nfsd3_setaclres nfsd3_attrstat
233#define nfsd3_voidres nfsd3_voidargs
234struct nfsd3_voidargs { int dummy; };
235
236#define PROC(name, argt, rest, relt, cache, respsize) \
237 { (svc_procfunc) nfsd3_proc_##name, \
238 (kxdrproc_t) nfs3svc_decode_##argt##args, \
239 (kxdrproc_t) nfs3svc_encode_##rest##res, \
240 (kxdrproc_t) nfs3svc_release_##relt, \
241 sizeof(struct nfsd3_##argt##args), \
242 sizeof(struct nfsd3_##rest##res), \
243 0, \
244 cache, \
245 respsize, \
246 }
247
248#define ST 1 /* status*/
249#define AT 21 /* attributes */
250#define pAT (1+AT) /* post attributes - conditional */
251#define ACL (1+NFS_ACL_MAX_ENTRIES*3) /* Access Control List */
252
253static struct svc_procedure nfsd_acl_procedures3[] = {
254 PROC(null, void, void, void, RC_NOCACHE, ST),
255 PROC(getacl, getacl, getacl, getacl, RC_NOCACHE, ST+1+2*(1+ACL)),
256 PROC(setacl, setacl, setacl, fhandle, RC_NOCACHE, ST+pAT),
257};
258
259struct svc_version nfsd_acl_version3 = {
260 .vs_vers = 3,
261 .vs_nproc = 3,
262 .vs_proc = nfsd_acl_procedures3,
263 .vs_dispatch = nfsd_dispatch,
264 .vs_xdrsize = NFS3_SVC_XDRSIZE,
265 .vs_hidden = 0,
266};
267
1/*
2 * Process version 3 NFSACL requests.
3 *
4 * Copyright (C) 2002-2003 Andreas Gruenbacher <agruen@suse.de>
5 */
6
7#include "nfsd.h"
8/* FIXME: nfsacl.h is a broken header */
9#include <linux/nfsacl.h>
10#include <linux/gfp.h>
11#include "cache.h"
12#include "xdr3.h"
13#include "vfs.h"
14
15#define RETURN_STATUS(st) { resp->status = (st); return (st); }
16
17/*
18 * NULL call.
19 */
20static __be32
21nfsd3_proc_null(struct svc_rqst *rqstp, void *argp, void *resp)
22{
23 return nfs_ok;
24}
25
26/*
27 * Get the Access and/or Default ACL of a file.
28 */
29static __be32 nfsd3_proc_getacl(struct svc_rqst * rqstp,
30 struct nfsd3_getaclargs *argp, struct nfsd3_getaclres *resp)
31{
32 struct posix_acl *acl;
33 struct inode *inode;
34 svc_fh *fh;
35 __be32 nfserr = 0;
36
37 fh = fh_copy(&resp->fh, &argp->fh);
38 nfserr = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_NOP);
39 if (nfserr)
40 RETURN_STATUS(nfserr);
41
42 inode = d_inode(fh->fh_dentry);
43
44 if (argp->mask & ~NFS_ACL_MASK)
45 RETURN_STATUS(nfserr_inval);
46 resp->mask = argp->mask;
47
48 if (resp->mask & (NFS_ACL|NFS_ACLCNT)) {
49 acl = get_acl(inode, ACL_TYPE_ACCESS);
50 if (acl == NULL) {
51 /* Solaris returns the inode's minimum ACL. */
52 acl = posix_acl_from_mode(inode->i_mode, GFP_KERNEL);
53 }
54 if (IS_ERR(acl)) {
55 nfserr = nfserrno(PTR_ERR(acl));
56 goto fail;
57 }
58 resp->acl_access = acl;
59 }
60 if (resp->mask & (NFS_DFACL|NFS_DFACLCNT)) {
61 /* Check how Solaris handles requests for the Default ACL
62 of a non-directory! */
63 acl = get_acl(inode, ACL_TYPE_DEFAULT);
64 if (IS_ERR(acl)) {
65 nfserr = nfserrno(PTR_ERR(acl));
66 goto fail;
67 }
68 resp->acl_default = acl;
69 }
70
71 /* resp->acl_{access,default} are released in nfs3svc_release_getacl. */
72 RETURN_STATUS(0);
73
74fail:
75 posix_acl_release(resp->acl_access);
76 posix_acl_release(resp->acl_default);
77 RETURN_STATUS(nfserr);
78}
79
80/*
81 * Set the Access and/or Default ACL of a file.
82 */
83static __be32 nfsd3_proc_setacl(struct svc_rqst * rqstp,
84 struct nfsd3_setaclargs *argp,
85 struct nfsd3_attrstat *resp)
86{
87 struct inode *inode;
88 svc_fh *fh;
89 __be32 nfserr = 0;
90 int error;
91
92 fh = fh_copy(&resp->fh, &argp->fh);
93 nfserr = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_SATTR);
94 if (nfserr)
95 goto out;
96
97 inode = d_inode(fh->fh_dentry);
98
99 error = fh_want_write(fh);
100 if (error)
101 goto out_errno;
102
103 fh_lock(fh);
104
105 error = set_posix_acl(inode, ACL_TYPE_ACCESS, argp->acl_access);
106 if (error)
107 goto out_drop_lock;
108 error = set_posix_acl(inode, ACL_TYPE_DEFAULT, argp->acl_default);
109
110out_drop_lock:
111 fh_unlock(fh);
112 fh_drop_write(fh);
113out_errno:
114 nfserr = nfserrno(error);
115out:
116 /* argp->acl_{access,default} may have been allocated in
117 nfs3svc_decode_setaclargs. */
118 posix_acl_release(argp->acl_access);
119 posix_acl_release(argp->acl_default);
120 RETURN_STATUS(nfserr);
121}
122
123/*
124 * XDR decode functions
125 */
126static int nfs3svc_decode_getaclargs(struct svc_rqst *rqstp, __be32 *p,
127 struct nfsd3_getaclargs *args)
128{
129 p = nfs3svc_decode_fh(p, &args->fh);
130 if (!p)
131 return 0;
132 args->mask = ntohl(*p); p++;
133
134 return xdr_argsize_check(rqstp, p);
135}
136
137
138static int nfs3svc_decode_setaclargs(struct svc_rqst *rqstp, __be32 *p,
139 struct nfsd3_setaclargs *args)
140{
141 struct kvec *head = rqstp->rq_arg.head;
142 unsigned int base;
143 int n;
144
145 p = nfs3svc_decode_fh(p, &args->fh);
146 if (!p)
147 return 0;
148 args->mask = ntohl(*p++);
149 if (args->mask & ~NFS_ACL_MASK ||
150 !xdr_argsize_check(rqstp, p))
151 return 0;
152
153 base = (char *)p - (char *)head->iov_base;
154 n = nfsacl_decode(&rqstp->rq_arg, base, NULL,
155 (args->mask & NFS_ACL) ?
156 &args->acl_access : NULL);
157 if (n > 0)
158 n = nfsacl_decode(&rqstp->rq_arg, base + n, NULL,
159 (args->mask & NFS_DFACL) ?
160 &args->acl_default : NULL);
161 return (n > 0);
162}
163
164/*
165 * XDR encode functions
166 */
167
168/* GETACL */
169static int nfs3svc_encode_getaclres(struct svc_rqst *rqstp, __be32 *p,
170 struct nfsd3_getaclres *resp)
171{
172 struct dentry *dentry = resp->fh.fh_dentry;
173
174 p = nfs3svc_encode_post_op_attr(rqstp, p, &resp->fh);
175 if (resp->status == 0 && dentry && d_really_is_positive(dentry)) {
176 struct inode *inode = d_inode(dentry);
177 struct kvec *head = rqstp->rq_res.head;
178 unsigned int base;
179 int n;
180 int w;
181
182 *p++ = htonl(resp->mask);
183 if (!xdr_ressize_check(rqstp, p))
184 return 0;
185 base = (char *)p - (char *)head->iov_base;
186
187 rqstp->rq_res.page_len = w = nfsacl_size(
188 (resp->mask & NFS_ACL) ? resp->acl_access : NULL,
189 (resp->mask & NFS_DFACL) ? resp->acl_default : NULL);
190 while (w > 0) {
191 if (!*(rqstp->rq_next_page++))
192 return 0;
193 w -= PAGE_SIZE;
194 }
195
196 n = nfsacl_encode(&rqstp->rq_res, base, inode,
197 resp->acl_access,
198 resp->mask & NFS_ACL, 0);
199 if (n > 0)
200 n = nfsacl_encode(&rqstp->rq_res, base + n, inode,
201 resp->acl_default,
202 resp->mask & NFS_DFACL,
203 NFS_ACL_DEFAULT);
204 if (n <= 0)
205 return 0;
206 } else
207 if (!xdr_ressize_check(rqstp, p))
208 return 0;
209
210 return 1;
211}
212
213/* SETACL */
214static int nfs3svc_encode_setaclres(struct svc_rqst *rqstp, __be32 *p,
215 struct nfsd3_attrstat *resp)
216{
217 p = nfs3svc_encode_post_op_attr(rqstp, p, &resp->fh);
218
219 return xdr_ressize_check(rqstp, p);
220}
221
222/*
223 * XDR release functions
224 */
225static int nfs3svc_release_getacl(struct svc_rqst *rqstp, __be32 *p,
226 struct nfsd3_getaclres *resp)
227{
228 fh_put(&resp->fh);
229 posix_acl_release(resp->acl_access);
230 posix_acl_release(resp->acl_default);
231 return 1;
232}
233
234#define nfs3svc_decode_voidargs NULL
235#define nfs3svc_release_void NULL
236#define nfsd3_setaclres nfsd3_attrstat
237#define nfsd3_voidres nfsd3_voidargs
238struct nfsd3_voidargs { int dummy; };
239
240#define PROC(name, argt, rest, relt, cache, respsize) \
241 { (svc_procfunc) nfsd3_proc_##name, \
242 (kxdrproc_t) nfs3svc_decode_##argt##args, \
243 (kxdrproc_t) nfs3svc_encode_##rest##res, \
244 (kxdrproc_t) nfs3svc_release_##relt, \
245 sizeof(struct nfsd3_##argt##args), \
246 sizeof(struct nfsd3_##rest##res), \
247 0, \
248 cache, \
249 respsize, \
250 }
251
252#define ST 1 /* status*/
253#define AT 21 /* attributes */
254#define pAT (1+AT) /* post attributes - conditional */
255#define ACL (1+NFS_ACL_MAX_ENTRIES*3) /* Access Control List */
256
257static struct svc_procedure nfsd_acl_procedures3[] = {
258 PROC(null, void, void, void, RC_NOCACHE, ST),
259 PROC(getacl, getacl, getacl, getacl, RC_NOCACHE, ST+1+2*(1+ACL)),
260 PROC(setacl, setacl, setacl, fhandle, RC_NOCACHE, ST+pAT),
261};
262
263struct svc_version nfsd_acl_version3 = {
264 .vs_vers = 3,
265 .vs_nproc = 3,
266 .vs_proc = nfsd_acl_procedures3,
267 .vs_dispatch = nfsd_dispatch,
268 .vs_xdrsize = NFS3_SVC_XDRSIZE,
269 .vs_hidden = 0,
270};
271