1 // SPDX-License-Identifier: GPL-2.0 2 /* 3 * Process version 2 NFSACL requests. 4 * 5 * Copyright (C) 2002-2003 Andreas Gruenbacher <agruen@suse.de> 6 */ 7 8 #include "nfsd.h" 9 /* FIXME: nfsacl.h is a broken header */ 10 #include <linux/nfsacl.h> 11 #include <linux/gfp.h> 12 #include "cache.h" 13 #include "xdr3.h" 14 #include "vfs.h" 15 16 #define NFSDDBG_FACILITY NFSDDBG_PROC 17 18 /* 19 * NULL call. 20 */ 21 static __be32 22 nfsacld_proc_null(struct svc_rqst *rqstp) 23 { 24 return rpc_success; 25 } 26 27 /* 28 * Get the Access and/or Default ACL of a file. 29 */ 30 static __be32 nfsacld_proc_getacl(struct svc_rqst *rqstp) 31 { 32 struct nfsd3_getaclargs *argp = rqstp->rq_argp; 33 struct nfsd3_getaclres *resp = rqstp->rq_resp; 34 struct posix_acl *acl; 35 struct inode *inode; 36 svc_fh *fh; 37 38 dprintk("nfsd: GETACL(2acl) %s\n", SVCFH_fmt(&argp->fh)); 39 40 fh = fh_copy(&resp->fh, &argp->fh); 41 resp->status = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_NOP); 42 if (resp->status != nfs_ok) 43 goto out; 44 45 inode = d_inode(fh->fh_dentry); 46 47 if (argp->mask & ~NFS_ACL_MASK) { 48 resp->status = nfserr_inval; 49 goto out; 50 } 51 resp->mask = argp->mask; 52 53 resp->status = fh_getattr(fh, &resp->stat); 54 if (resp->status != nfs_ok) 55 goto out; 56 57 if (resp->mask & (NFS_ACL|NFS_ACLCNT)) { 58 acl = get_acl(inode, ACL_TYPE_ACCESS); 59 if (acl == NULL) { 60 /* Solaris returns the inode's minimum ACL. */ 61 acl = posix_acl_from_mode(inode->i_mode, GFP_KERNEL); 62 } 63 if (IS_ERR(acl)) { 64 resp->status = nfserrno(PTR_ERR(acl)); 65 goto fail; 66 } 67 resp->acl_access = acl; 68 } 69 if (resp->mask & (NFS_DFACL|NFS_DFACLCNT)) { 70 /* Check how Solaris handles requests for the Default ACL 71 of a non-directory! */ 72 acl = get_acl(inode, ACL_TYPE_DEFAULT); 73 if (IS_ERR(acl)) { 74 resp->status = nfserrno(PTR_ERR(acl)); 75 goto fail; 76 } 77 resp->acl_default = acl; 78 } 79 80 /* resp->acl_{access,default} are released in nfssvc_release_getacl. */ 81 out: 82 return rpc_success; 83 84 fail: 85 posix_acl_release(resp->acl_access); 86 posix_acl_release(resp->acl_default); 87 goto out; 88 } 89 90 /* 91 * Set the Access and/or Default ACL of a file. 92 */ 93 static __be32 nfsacld_proc_setacl(struct svc_rqst *rqstp) 94 { 95 struct nfsd3_setaclargs *argp = rqstp->rq_argp; 96 struct nfsd_attrstat *resp = rqstp->rq_resp; 97 struct inode *inode; 98 svc_fh *fh; 99 int error; 100 101 dprintk("nfsd: SETACL(2acl) %s\n", SVCFH_fmt(&argp->fh)); 102 103 fh = fh_copy(&resp->fh, &argp->fh); 104 resp->status = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_SATTR); 105 if (resp->status != nfs_ok) 106 goto out; 107 108 inode = d_inode(fh->fh_dentry); 109 110 error = fh_want_write(fh); 111 if (error) 112 goto out_errno; 113 114 fh_lock(fh); 115 116 error = set_posix_acl(inode, ACL_TYPE_ACCESS, argp->acl_access); 117 if (error) 118 goto out_drop_lock; 119 error = set_posix_acl(inode, ACL_TYPE_DEFAULT, argp->acl_default); 120 if (error) 121 goto out_drop_lock; 122 123 fh_unlock(fh); 124 125 fh_drop_write(fh); 126 127 resp->status = fh_getattr(fh, &resp->stat); 128 129 out: 130 /* argp->acl_{access,default} may have been allocated in 131 nfssvc_decode_setaclargs. */ 132 posix_acl_release(argp->acl_access); 133 posix_acl_release(argp->acl_default); 134 return rpc_success; 135 136 out_drop_lock: 137 fh_unlock(fh); 138 fh_drop_write(fh); 139 out_errno: 140 resp->status = nfserrno(error); 141 goto out; 142 } 143 144 /* 145 * Check file attributes 146 */ 147 static __be32 nfsacld_proc_getattr(struct svc_rqst *rqstp) 148 { 149 struct nfsd_fhandle *argp = rqstp->rq_argp; 150 struct nfsd_attrstat *resp = rqstp->rq_resp; 151 152 dprintk("nfsd: GETATTR %s\n", SVCFH_fmt(&argp->fh)); 153 154 fh_copy(&resp->fh, &argp->fh); 155 resp->status = fh_verify(rqstp, &resp->fh, 0, NFSD_MAY_NOP); 156 if (resp->status != nfs_ok) 157 goto out; 158 resp->status = fh_getattr(&resp->fh, &resp->stat); 159 out: 160 return rpc_success; 161 } 162 163 /* 164 * Check file access 165 */ 166 static __be32 nfsacld_proc_access(struct svc_rqst *rqstp) 167 { 168 struct nfsd3_accessargs *argp = rqstp->rq_argp; 169 struct nfsd3_accessres *resp = rqstp->rq_resp; 170 171 dprintk("nfsd: ACCESS(2acl) %s 0x%x\n", 172 SVCFH_fmt(&argp->fh), 173 argp->access); 174 175 fh_copy(&resp->fh, &argp->fh); 176 resp->access = argp->access; 177 resp->status = nfsd_access(rqstp, &resp->fh, &resp->access, NULL); 178 if (resp->status != nfs_ok) 179 goto out; 180 resp->status = fh_getattr(&resp->fh, &resp->stat); 181 out: 182 return rpc_success; 183 } 184 185 /* 186 * XDR decode functions 187 */ 188 189 static int nfsaclsvc_decode_getaclargs(struct svc_rqst *rqstp, __be32 *p) 190 { 191 struct xdr_stream *xdr = &rqstp->rq_arg_stream; 192 struct nfsd3_getaclargs *argp = rqstp->rq_argp; 193 194 if (!svcxdr_decode_fhandle(xdr, &argp->fh)) 195 return 0; 196 if (xdr_stream_decode_u32(xdr, &argp->mask) < 0) 197 return 0; 198 199 return 1; 200 } 201 202 static int nfsaclsvc_decode_setaclargs(struct svc_rqst *rqstp, __be32 *p) 203 { 204 struct xdr_stream *xdr = &rqstp->rq_arg_stream; 205 struct nfsd3_setaclargs *argp = rqstp->rq_argp; 206 207 if (!svcxdr_decode_fhandle(xdr, &argp->fh)) 208 return 0; 209 if (xdr_stream_decode_u32(xdr, &argp->mask) < 0) 210 return 0; 211 if (argp->mask & ~NFS_ACL_MASK) 212 return 0; 213 if (!nfs_stream_decode_acl(xdr, NULL, (argp->mask & NFS_ACL) ? 214 &argp->acl_access : NULL)) 215 return 0; 216 if (!nfs_stream_decode_acl(xdr, NULL, (argp->mask & NFS_DFACL) ? 217 &argp->acl_default : NULL)) 218 return 0; 219 220 return 1; 221 } 222 223 static int nfsaclsvc_decode_accessargs(struct svc_rqst *rqstp, __be32 *p) 224 { 225 struct xdr_stream *xdr = &rqstp->rq_arg_stream; 226 struct nfsd3_accessargs *args = rqstp->rq_argp; 227 228 if (!svcxdr_decode_fhandle(xdr, &args->fh)) 229 return 0; 230 if (xdr_stream_decode_u32(xdr, &args->access) < 0) 231 return 0; 232 233 return 1; 234 } 235 236 /* 237 * XDR encode functions 238 */ 239 240 /* GETACL */ 241 static int nfsaclsvc_encode_getaclres(struct svc_rqst *rqstp, __be32 *p) 242 { 243 struct nfsd3_getaclres *resp = rqstp->rq_resp; 244 struct dentry *dentry = resp->fh.fh_dentry; 245 struct inode *inode; 246 struct kvec *head = rqstp->rq_res.head; 247 unsigned int base; 248 int n; 249 int w; 250 251 *p++ = resp->status; 252 if (resp->status != nfs_ok) 253 return xdr_ressize_check(rqstp, p); 254 255 /* 256 * Since this is version 2, the check for nfserr in 257 * nfsd_dispatch actually ensures the following cannot happen. 258 * However, it seems fragile to depend on that. 259 */ 260 if (dentry == NULL || d_really_is_negative(dentry)) 261 return 0; 262 inode = d_inode(dentry); 263 264 p = nfs2svc_encode_fattr(rqstp, p, &resp->fh, &resp->stat); 265 *p++ = htonl(resp->mask); 266 if (!xdr_ressize_check(rqstp, p)) 267 return 0; 268 base = (char *)p - (char *)head->iov_base; 269 270 rqstp->rq_res.page_len = w = nfsacl_size( 271 (resp->mask & NFS_ACL) ? resp->acl_access : NULL, 272 (resp->mask & NFS_DFACL) ? resp->acl_default : NULL); 273 while (w > 0) { 274 if (!*(rqstp->rq_next_page++)) 275 return 0; 276 w -= PAGE_SIZE; 277 } 278 279 n = nfsacl_encode(&rqstp->rq_res, base, inode, 280 resp->acl_access, 281 resp->mask & NFS_ACL, 0); 282 if (n > 0) 283 n = nfsacl_encode(&rqstp->rq_res, base + n, inode, 284 resp->acl_default, 285 resp->mask & NFS_DFACL, 286 NFS_ACL_DEFAULT); 287 return (n > 0); 288 } 289 290 static int nfsaclsvc_encode_attrstatres(struct svc_rqst *rqstp, __be32 *p) 291 { 292 struct nfsd_attrstat *resp = rqstp->rq_resp; 293 294 *p++ = resp->status; 295 if (resp->status != nfs_ok) 296 goto out; 297 298 p = nfs2svc_encode_fattr(rqstp, p, &resp->fh, &resp->stat); 299 out: 300 return xdr_ressize_check(rqstp, p); 301 } 302 303 /* ACCESS */ 304 static int nfsaclsvc_encode_accessres(struct svc_rqst *rqstp, __be32 *p) 305 { 306 struct nfsd3_accessres *resp = rqstp->rq_resp; 307 308 *p++ = resp->status; 309 if (resp->status != nfs_ok) 310 goto out; 311 312 p = nfs2svc_encode_fattr(rqstp, p, &resp->fh, &resp->stat); 313 *p++ = htonl(resp->access); 314 out: 315 return xdr_ressize_check(rqstp, p); 316 } 317 318 /* 319 * XDR release functions 320 */ 321 static void nfsaclsvc_release_getacl(struct svc_rqst *rqstp) 322 { 323 struct nfsd3_getaclres *resp = rqstp->rq_resp; 324 325 fh_put(&resp->fh); 326 posix_acl_release(resp->acl_access); 327 posix_acl_release(resp->acl_default); 328 } 329 330 static void nfsaclsvc_release_attrstat(struct svc_rqst *rqstp) 331 { 332 struct nfsd_attrstat *resp = rqstp->rq_resp; 333 334 fh_put(&resp->fh); 335 } 336 337 static void nfsaclsvc_release_access(struct svc_rqst *rqstp) 338 { 339 struct nfsd3_accessres *resp = rqstp->rq_resp; 340 341 fh_put(&resp->fh); 342 } 343 344 struct nfsd3_voidargs { int dummy; }; 345 346 #define ST 1 /* status*/ 347 #define AT 21 /* attributes */ 348 #define pAT (1+AT) /* post attributes - conditional */ 349 #define ACL (1+NFS_ACL_MAX_ENTRIES*3) /* Access Control List */ 350 351 static const struct svc_procedure nfsd_acl_procedures2[5] = { 352 [ACLPROC2_NULL] = { 353 .pc_func = nfsacld_proc_null, 354 .pc_decode = nfssvc_decode_voidarg, 355 .pc_encode = nfssvc_encode_voidres, 356 .pc_argsize = sizeof(struct nfsd_voidargs), 357 .pc_ressize = sizeof(struct nfsd_voidres), 358 .pc_cachetype = RC_NOCACHE, 359 .pc_xdrressize = ST, 360 .pc_name = "NULL", 361 }, 362 [ACLPROC2_GETACL] = { 363 .pc_func = nfsacld_proc_getacl, 364 .pc_decode = nfsaclsvc_decode_getaclargs, 365 .pc_encode = nfsaclsvc_encode_getaclres, 366 .pc_release = nfsaclsvc_release_getacl, 367 .pc_argsize = sizeof(struct nfsd3_getaclargs), 368 .pc_ressize = sizeof(struct nfsd3_getaclres), 369 .pc_cachetype = RC_NOCACHE, 370 .pc_xdrressize = ST+1+2*(1+ACL), 371 .pc_name = "GETACL", 372 }, 373 [ACLPROC2_SETACL] = { 374 .pc_func = nfsacld_proc_setacl, 375 .pc_decode = nfsaclsvc_decode_setaclargs, 376 .pc_encode = nfsaclsvc_encode_attrstatres, 377 .pc_release = nfsaclsvc_release_attrstat, 378 .pc_argsize = sizeof(struct nfsd3_setaclargs), 379 .pc_ressize = sizeof(struct nfsd_attrstat), 380 .pc_cachetype = RC_NOCACHE, 381 .pc_xdrressize = ST+AT, 382 .pc_name = "SETACL", 383 }, 384 [ACLPROC2_GETATTR] = { 385 .pc_func = nfsacld_proc_getattr, 386 .pc_decode = nfssvc_decode_fhandleargs, 387 .pc_encode = nfsaclsvc_encode_attrstatres, 388 .pc_release = nfsaclsvc_release_attrstat, 389 .pc_argsize = sizeof(struct nfsd_fhandle), 390 .pc_ressize = sizeof(struct nfsd_attrstat), 391 .pc_cachetype = RC_NOCACHE, 392 .pc_xdrressize = ST+AT, 393 .pc_name = "GETATTR", 394 }, 395 [ACLPROC2_ACCESS] = { 396 .pc_func = nfsacld_proc_access, 397 .pc_decode = nfsaclsvc_decode_accessargs, 398 .pc_encode = nfsaclsvc_encode_accessres, 399 .pc_release = nfsaclsvc_release_access, 400 .pc_argsize = sizeof(struct nfsd3_accessargs), 401 .pc_ressize = sizeof(struct nfsd3_accessres), 402 .pc_cachetype = RC_NOCACHE, 403 .pc_xdrressize = ST+AT+1, 404 .pc_name = "SETATTR", 405 }, 406 }; 407 408 static unsigned int nfsd_acl_count2[ARRAY_SIZE(nfsd_acl_procedures2)]; 409 const struct svc_version nfsd_acl_version2 = { 410 .vs_vers = 2, 411 .vs_nproc = 5, 412 .vs_proc = nfsd_acl_procedures2, 413 .vs_count = nfsd_acl_count2, 414 .vs_dispatch = nfsd_dispatch, 415 .vs_xdrsize = NFS3_SVC_XDRSIZE, 416 }; 417