Blame view
fs/nfsd/nfs2acl.c
8.59 KB
a257cdd0e [PATCH] NFSD: Add... |
1 |
/* |
a257cdd0e [PATCH] NFSD: Add... |
2 3 4 5 |
* Process version 2 NFSACL requests. * * Copyright (C) 2002-2003 Andreas Gruenbacher <agruen@suse.de> */ |
9a74af213 nfsd: Move privat... |
6 7 |
#include "nfsd.h" /* FIXME: nfsacl.h is a broken header */ |
a257cdd0e [PATCH] NFSD: Add... |
8 |
#include <linux/nfsacl.h> |
5a0e3ad6a include cleanup: ... |
9 |
#include <linux/gfp.h> |
9a74af213 nfsd: Move privat... |
10 11 |
#include "cache.h" #include "xdr3.h" |
0a3adadee nfsd: make fs/nfs... |
12 |
#include "vfs.h" |
a257cdd0e [PATCH] NFSD: Add... |
13 14 15 16 17 18 19 |
#define NFSDDBG_FACILITY NFSDDBG_PROC #define RETURN_STATUS(st) { resp->status = (st); return (st); } /* * NULL call. */ |
7111c66e4 [PATCH] fix svc_p... |
20 |
static __be32 |
a257cdd0e [PATCH] NFSD: Add... |
21 22 23 24 25 26 27 28 |
nfsacld_proc_null(struct svc_rqst *rqstp, void *argp, void *resp) { return nfs_ok; } /* * Get the Access and/or Default ACL of a file. */ |
7111c66e4 [PATCH] fix svc_p... |
29 |
static __be32 nfsacld_proc_getacl(struct svc_rqst * rqstp, |
a257cdd0e [PATCH] NFSD: Add... |
30 31 32 33 |
struct nfsd3_getaclargs *argp, struct nfsd3_getaclres *resp) { svc_fh *fh; struct posix_acl *acl; |
c4d987ba8 [PATCH] nfsd: NFS... |
34 |
__be32 nfserr = 0; |
a257cdd0e [PATCH] NFSD: Add... |
35 36 37 38 39 |
dprintk("nfsd: GETACL(2acl) %s ", SVCFH_fmt(&argp->fh)); fh = fh_copy(&resp->fh, &argp->fh); |
8837abcab nfsd: rename MAY_... |
40 41 |
nfserr = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_NOP); if (nfserr) |
ac8587dcb knfsd: fix spurio... |
42 |
RETURN_STATUS(nfserr); |
a257cdd0e [PATCH] NFSD: Add... |
43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 |
if (argp->mask & ~(NFS_ACL|NFS_ACLCNT|NFS_DFACL|NFS_DFACLCNT)) RETURN_STATUS(nfserr_inval); resp->mask = argp->mask; if (resp->mask & (NFS_ACL|NFS_ACLCNT)) { acl = nfsd_get_posix_acl(fh, ACL_TYPE_ACCESS); if (IS_ERR(acl)) { int err = PTR_ERR(acl); if (err == -ENODATA || err == -EOPNOTSUPP) acl = NULL; else { nfserr = nfserrno(err); goto fail; } } if (acl == NULL) { /* Solaris returns the inode's minimum ACL. */ struct inode *inode = fh->fh_dentry->d_inode; acl = posix_acl_from_mode(inode->i_mode, GFP_KERNEL); } resp->acl_access = acl; } if (resp->mask & (NFS_DFACL|NFS_DFACLCNT)) { /* Check how Solaris handles requests for the Default ACL of a non-directory! */ acl = nfsd_get_posix_acl(fh, ACL_TYPE_DEFAULT); if (IS_ERR(acl)) { int err = PTR_ERR(acl); if (err == -ENODATA || err == -EOPNOTSUPP) acl = NULL; else { nfserr = nfserrno(err); goto fail; } } resp->acl_default = acl; } /* resp->acl_{access,default} are released in nfssvc_release_getacl. */ RETURN_STATUS(0); fail: posix_acl_release(resp->acl_access); posix_acl_release(resp->acl_default); RETURN_STATUS(nfserr); } /* * Set the Access and/or Default ACL of a file. */ |
7111c66e4 [PATCH] fix svc_p... |
98 |
static __be32 nfsacld_proc_setacl(struct svc_rqst * rqstp, |
a257cdd0e [PATCH] NFSD: Add... |
99 100 101 102 |
struct nfsd3_setaclargs *argp, struct nfsd_attrstat *resp) { svc_fh *fh; |
c4d987ba8 [PATCH] nfsd: NFS... |
103 |
__be32 nfserr = 0; |
a257cdd0e [PATCH] NFSD: Add... |
104 105 106 107 108 |
dprintk("nfsd: SETACL(2acl) %s ", SVCFH_fmt(&argp->fh)); fh = fh_copy(&resp->fh, &argp->fh); |
8837abcab nfsd: rename MAY_... |
109 |
nfserr = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_SATTR); |
a257cdd0e [PATCH] NFSD: Add... |
110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 |
if (!nfserr) { nfserr = nfserrno( nfsd_set_posix_acl( fh, ACL_TYPE_ACCESS, argp->acl_access) ); } if (!nfserr) { nfserr = nfserrno( nfsd_set_posix_acl( fh, ACL_TYPE_DEFAULT, argp->acl_default) ); } /* argp->acl_{access,default} may have been allocated in nfssvc_decode_setaclargs. */ posix_acl_release(argp->acl_access); posix_acl_release(argp->acl_default); return nfserr; } /* * Check file attributes */ |
7111c66e4 [PATCH] fix svc_p... |
130 |
static __be32 nfsacld_proc_getattr(struct svc_rqst * rqstp, |
a257cdd0e [PATCH] NFSD: Add... |
131 132 133 134 135 136 |
struct nfsd_fhandle *argp, struct nfsd_attrstat *resp) { dprintk("nfsd: GETATTR %s ", SVCFH_fmt(&argp->fh)); fh_copy(&resp->fh, &argp->fh); |
8837abcab nfsd: rename MAY_... |
137 |
return fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_NOP); |
a257cdd0e [PATCH] NFSD: Add... |
138 139 140 141 142 |
} /* * Check file access */ |
7111c66e4 [PATCH] fix svc_p... |
143 |
static __be32 nfsacld_proc_access(struct svc_rqst *rqstp, struct nfsd3_accessargs *argp, |
a257cdd0e [PATCH] NFSD: Add... |
144 145 |
struct nfsd3_accessres *resp) { |
c4d987ba8 [PATCH] nfsd: NFS... |
146 |
__be32 nfserr; |
a257cdd0e [PATCH] NFSD: Add... |
147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 |
dprintk("nfsd: ACCESS(2acl) %s 0x%x ", SVCFH_fmt(&argp->fh), argp->access); fh_copy(&resp->fh, &argp->fh); resp->access = argp->access; nfserr = nfsd_access(rqstp, &resp->fh, &resp->access, NULL); return nfserr; } /* * XDR decode functions */ |
131a21c21 [PATCH] xdr annot... |
162 |
static int nfsaclsvc_decode_getaclargs(struct svc_rqst *rqstp, __be32 *p, |
a257cdd0e [PATCH] NFSD: Add... |
163 164 165 166 167 168 169 170 |
struct nfsd3_getaclargs *argp) { if (!(p = nfs2svc_decode_fh(p, &argp->fh))) return 0; argp->mask = ntohl(*p); p++; return xdr_argsize_check(rqstp, p); } |
131a21c21 [PATCH] xdr annot... |
171 |
static int nfsaclsvc_decode_setaclargs(struct svc_rqst *rqstp, __be32 *p, |
a257cdd0e [PATCH] NFSD: Add... |
172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 |
struct nfsd3_setaclargs *argp) { struct kvec *head = rqstp->rq_arg.head; unsigned int base; int n; if (!(p = nfs2svc_decode_fh(p, &argp->fh))) return 0; argp->mask = ntohl(*p++); if (argp->mask & ~(NFS_ACL|NFS_ACLCNT|NFS_DFACL|NFS_DFACLCNT) || !xdr_argsize_check(rqstp, p)) return 0; base = (char *)p - (char *)head->iov_base; n = nfsacl_decode(&rqstp->rq_arg, base, NULL, (argp->mask & NFS_ACL) ? &argp->acl_access : NULL); if (n > 0) n = nfsacl_decode(&rqstp->rq_arg, base + n, NULL, (argp->mask & NFS_DFACL) ? &argp->acl_default : NULL); return (n > 0); } |
131a21c21 [PATCH] xdr annot... |
195 |
static int nfsaclsvc_decode_fhandleargs(struct svc_rqst *rqstp, __be32 *p, |
a257cdd0e [PATCH] NFSD: Add... |
196 197 198 199 200 201 |
struct nfsd_fhandle *argp) { if (!(p = nfs2svc_decode_fh(p, &argp->fh))) return 0; return xdr_argsize_check(rqstp, p); } |
131a21c21 [PATCH] xdr annot... |
202 |
static int nfsaclsvc_decode_accessargs(struct svc_rqst *rqstp, __be32 *p, |
a257cdd0e [PATCH] NFSD: Add... |
203 204 205 206 207 208 209 210 211 212 213 214 |
struct nfsd3_accessargs *argp) { if (!(p = nfs2svc_decode_fh(p, &argp->fh))) return 0; argp->access = ntohl(*p++); return xdr_argsize_check(rqstp, p); } /* * XDR encode functions */ |
1b7e0403c nfsd: register NF... |
215 216 217 218 219 220 221 222 223 |
/* * There must be an encoding function for void results so svc_process * will work properly. */ int nfsaclsvc_encode_voidres(struct svc_rqst *rqstp, __be32 *p, void *dummy) { return xdr_ressize_check(rqstp, p); } |
a257cdd0e [PATCH] NFSD: Add... |
224 |
/* GETACL */ |
131a21c21 [PATCH] xdr annot... |
225 |
static int nfsaclsvc_encode_getaclres(struct svc_rqst *rqstp, __be32 *p, |
a257cdd0e [PATCH] NFSD: Add... |
226 227 228 |
struct nfsd3_getaclres *resp) { struct dentry *dentry = resp->fh.fh_dentry; |
aefa89d17 nfsd: Fix inconsi... |
229 |
struct inode *inode; |
a257cdd0e [PATCH] NFSD: Add... |
230 231 232 |
struct kvec *head = rqstp->rq_res.head; unsigned int base; int n; |
cb65a5ba3 [PATCH] NFS2: Cal... |
233 |
int w; |
a257cdd0e [PATCH] NFSD: Add... |
234 |
|
aefa89d17 nfsd: Fix inconsi... |
235 236 237 238 239 |
/* * Since this is version 2, the check for nfserr in * nfsd_dispatch actually ensures the following cannot happen. * However, it seems fragile to depend on that. */ |
a257cdd0e [PATCH] NFSD: Add... |
240 241 242 243 244 245 246 247 248 |
if (dentry == NULL || dentry->d_inode == NULL) return 0; inode = dentry->d_inode; p = nfs2svc_encode_fattr(rqstp, p, &resp->fh); *p++ = htonl(resp->mask); if (!xdr_ressize_check(rqstp, p)) return 0; base = (char *)p - (char *)head->iov_base; |
cb65a5ba3 [PATCH] NFS2: Cal... |
249 250 251 |
rqstp->rq_res.page_len = w = nfsacl_size( (resp->mask & NFS_ACL) ? resp->acl_access : NULL, (resp->mask & NFS_DFACL) ? resp->acl_default : NULL); |
a257cdd0e [PATCH] NFSD: Add... |
252 |
while (w > 0) { |
445243594 [PATCH] knfsd: Re... |
253 |
if (!rqstp->rq_respages[rqstp->rq_resused++]) |
a257cdd0e [PATCH] NFSD: Add... |
254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 |
return 0; w -= PAGE_SIZE; } n = nfsacl_encode(&rqstp->rq_res, base, inode, resp->acl_access, resp->mask & NFS_ACL, 0); if (n > 0) n = nfsacl_encode(&rqstp->rq_res, base + n, inode, resp->acl_default, resp->mask & NFS_DFACL, NFS_ACL_DEFAULT); if (n <= 0) return 0; return 1; } |
131a21c21 [PATCH] xdr annot... |
270 |
static int nfsaclsvc_encode_attrstatres(struct svc_rqst *rqstp, __be32 *p, |
a257cdd0e [PATCH] NFSD: Add... |
271 272 273 274 275 276 277 |
struct nfsd_attrstat *resp) { p = nfs2svc_encode_fattr(rqstp, p, &resp->fh); return xdr_ressize_check(rqstp, p); } /* ACCESS */ |
131a21c21 [PATCH] xdr annot... |
278 |
static int nfsaclsvc_encode_accessres(struct svc_rqst *rqstp, __be32 *p, |
a257cdd0e [PATCH] NFSD: Add... |
279 280 281 282 283 284 285 286 287 288 |
struct nfsd3_accessres *resp) { p = nfs2svc_encode_fattr(rqstp, p, &resp->fh); *p++ = htonl(resp->access); return xdr_ressize_check(rqstp, p); } /* * XDR release functions */ |
131a21c21 [PATCH] xdr annot... |
289 |
static int nfsaclsvc_release_getacl(struct svc_rqst *rqstp, __be32 *p, |
a257cdd0e [PATCH] NFSD: Add... |
290 291 292 293 294 295 296 |
struct nfsd3_getaclres *resp) { fh_put(&resp->fh); posix_acl_release(resp->acl_access); posix_acl_release(resp->acl_default); return 1; } |
c9ce22830 [PATCH] Fix a fre... |
297 298 |
static int nfsaclsvc_release_attrstat(struct svc_rqst *rqstp, __be32 *p, struct nfsd_attrstat *resp) |
a257cdd0e [PATCH] NFSD: Add... |
299 300 301 302 |
{ fh_put(&resp->fh); return 1; } |
c9ce22830 [PATCH] Fix a fre... |
303 304 305 306 307 308 |
static int nfsaclsvc_release_access(struct svc_rqst *rqstp, __be32 *p, struct nfsd3_accessres *resp) { fh_put(&resp->fh); return 1; } |
a257cdd0e [PATCH] NFSD: Add... |
309 |
#define nfsaclsvc_decode_voidargs NULL |
a257cdd0e [PATCH] NFSD: Add... |
310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 |
#define nfsaclsvc_release_void NULL #define nfsd3_fhandleargs nfsd_fhandle #define nfsd3_attrstatres nfsd_attrstat #define nfsd3_voidres nfsd3_voidargs struct nfsd3_voidargs { int dummy; }; #define PROC(name, argt, rest, relt, cache, respsize) \ { (svc_procfunc) nfsacld_proc_##name, \ (kxdrproc_t) nfsaclsvc_decode_##argt##args, \ (kxdrproc_t) nfsaclsvc_encode_##rest##res, \ (kxdrproc_t) nfsaclsvc_release_##relt, \ sizeof(struct nfsd3_##argt##args), \ sizeof(struct nfsd3_##rest##res), \ 0, \ cache, \ respsize, \ } #define ST 1 /* status*/ #define AT 21 /* attributes */ #define pAT (1+AT) /* post attributes - conditional */ #define ACL (1+NFS_ACL_MAX_ENTRIES*3) /* Access Control List */ static struct svc_procedure nfsd_acl_procedures2[] = { PROC(null, void, void, void, RC_NOCACHE, ST), PROC(getacl, getacl, getacl, getacl, RC_NOCACHE, ST+1+2*(1+ACL)), |
c9ce22830 [PATCH] Fix a fre... |
336 337 338 |
PROC(setacl, setacl, attrstat, attrstat, RC_NOCACHE, ST+AT), PROC(getattr, fhandle, attrstat, attrstat, RC_NOCACHE, ST+AT), PROC(access, access, access, access, RC_NOCACHE, ST+AT+1), |
a257cdd0e [PATCH] NFSD: Add... |
339 340 341 342 343 344 345 346 |
}; struct svc_version nfsd_acl_version2 = { .vs_vers = 2, .vs_nproc = 5, .vs_proc = nfsd_acl_procedures2, .vs_dispatch = nfsd_dispatch, .vs_xdrsize = NFS3_SVC_XDRSIZE, |
1b7e0403c nfsd: register NF... |
347 |
.vs_hidden = 0, |
a257cdd0e [PATCH] NFSD: Add... |
348 |
}; |