| 1 | /* | 
|---|
| 2 | * Convert ZFS/NFSv4 acls to NT acls and vice versa. | 
|---|
| 3 | * | 
|---|
| 4 | * Copyright (C) Jiri Sasek, 2007 | 
|---|
| 5 | * based on the foobar.c module which is copyrighted by Volker Lendecke | 
|---|
| 6 | * | 
|---|
| 7 | * Many thanks to Axel Apitz for help to fix the special ace's handling | 
|---|
| 8 | * issues. | 
|---|
| 9 | * | 
|---|
| 10 | * This program is free software; you can redistribute it and/or modify | 
|---|
| 11 | * it under the terms of the GNU General Public License as published by | 
|---|
| 12 | * the Free Software Foundation; either version 3 of the License, or | 
|---|
| 13 | * (at your option) any later version. | 
|---|
| 14 | * | 
|---|
| 15 | * This program is distributed in the hope that it will be useful, | 
|---|
| 16 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|---|
| 17 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the | 
|---|
| 18 | * GNU General Public License for more details. | 
|---|
| 19 | * | 
|---|
| 20 | * You should have received a copy of the GNU General Public License | 
|---|
| 21 | * along with this program; if not, see <http://www.gnu.org/licenses/>. | 
|---|
| 22 | * | 
|---|
| 23 | */ | 
|---|
| 24 |  | 
|---|
| 25 | #include "includes.h" | 
|---|
| 26 | #include "nfs4_acls.h" | 
|---|
| 27 |  | 
|---|
| 28 | #undef DBGC_CLASS | 
|---|
| 29 | #define DBGC_CLASS DBGC_VFS | 
|---|
| 30 |  | 
|---|
| 31 | #define ZFSACL_MODULE_NAME "zfsacl" | 
|---|
| 32 |  | 
|---|
| 33 | /* zfs_get_nt_acl() | 
|---|
| 34 | * read the local file's acls and return it in NT form | 
|---|
| 35 | * using the NFSv4 format conversion | 
|---|
| 36 | */ | 
|---|
| 37 | static NTSTATUS zfs_get_nt_acl_common(const char *name, | 
|---|
| 38 | uint32 security_info, | 
|---|
| 39 | SMB4ACL_T **ppacl) | 
|---|
| 40 | { | 
|---|
| 41 | int naces, i; | 
|---|
| 42 | ace_t *acebuf; | 
|---|
| 43 | SMB4ACL_T *pacl; | 
|---|
| 44 | TALLOC_CTX      *mem_ctx; | 
|---|
| 45 |  | 
|---|
| 46 | /* read the number of file aces */ | 
|---|
| 47 | if((naces = acl(name, ACE_GETACLCNT, 0, NULL)) == -1) { | 
|---|
| 48 | if(errno == ENOSYS) { | 
|---|
| 49 | DEBUG(9, ("acl(ACE_GETACLCNT, %s): Operation is not " | 
|---|
| 50 | "supported on the filesystem where the file " | 
|---|
| 51 | "reside", name)); | 
|---|
| 52 | } else { | 
|---|
| 53 | DEBUG(9, ("acl(ACE_GETACLCNT, %s): %s ", name, | 
|---|
| 54 | strerror(errno))); | 
|---|
| 55 | } | 
|---|
| 56 | return map_nt_error_from_unix(errno); | 
|---|
| 57 | } | 
|---|
| 58 | /* allocate the field of ZFS aces */ | 
|---|
| 59 | mem_ctx = talloc_tos(); | 
|---|
| 60 | acebuf = (ace_t *) talloc_size(mem_ctx, sizeof(ace_t)*naces); | 
|---|
| 61 | if(acebuf == NULL) { | 
|---|
| 62 | return NT_STATUS_NO_MEMORY; | 
|---|
| 63 | } | 
|---|
| 64 | /* read the aces into the field */ | 
|---|
| 65 | if(acl(name, ACE_GETACL, naces, acebuf) < 0) { | 
|---|
| 66 | DEBUG(9, ("acl(ACE_GETACL, %s): %s ", name, | 
|---|
| 67 | strerror(errno))); | 
|---|
| 68 | return map_nt_error_from_unix(errno); | 
|---|
| 69 | } | 
|---|
| 70 | /* create SMB4ACL data */ | 
|---|
| 71 | if((pacl = smb_create_smb4acl()) == NULL) { | 
|---|
| 72 | return NT_STATUS_NO_MEMORY; | 
|---|
| 73 | } | 
|---|
| 74 | for(i=0; i<naces; i++) { | 
|---|
| 75 | SMB_ACE4PROP_T aceprop; | 
|---|
| 76 |  | 
|---|
| 77 | aceprop.aceType  = (uint32) acebuf[i].a_type; | 
|---|
| 78 | aceprop.aceFlags = (uint32) acebuf[i].a_flags; | 
|---|
| 79 | aceprop.aceMask  = (uint32) acebuf[i].a_access_mask; | 
|---|
| 80 | aceprop.who.id   = (uint32) acebuf[i].a_who; | 
|---|
| 81 |  | 
|---|
| 82 | if(aceprop.aceFlags & ACE_OWNER) { | 
|---|
| 83 | aceprop.flags = SMB_ACE4_ID_SPECIAL; | 
|---|
| 84 | aceprop.who.special_id = SMB_ACE4_WHO_OWNER; | 
|---|
| 85 | } else if(aceprop.aceFlags & ACE_GROUP) { | 
|---|
| 86 | aceprop.flags = SMB_ACE4_ID_SPECIAL; | 
|---|
| 87 | aceprop.who.special_id = SMB_ACE4_WHO_GROUP; | 
|---|
| 88 | } else if(aceprop.aceFlags & ACE_EVERYONE) { | 
|---|
| 89 | aceprop.flags = SMB_ACE4_ID_SPECIAL; | 
|---|
| 90 | aceprop.who.special_id = SMB_ACE4_WHO_EVERYONE; | 
|---|
| 91 | } else { | 
|---|
| 92 | aceprop.flags   = 0; | 
|---|
| 93 | } | 
|---|
| 94 | if(smb_add_ace4(pacl, &aceprop) == NULL) | 
|---|
| 95 | return NT_STATUS_NO_MEMORY; | 
|---|
| 96 | } | 
|---|
| 97 |  | 
|---|
| 98 | *ppacl = pacl; | 
|---|
| 99 | return NT_STATUS_OK; | 
|---|
| 100 | } | 
|---|
| 101 |  | 
|---|
| 102 | /* call-back function processing the NT acl -> ZFS acl using NFSv4 conv. */ | 
|---|
| 103 | static bool zfs_process_smbacl(files_struct *fsp, SMB4ACL_T *smbacl) | 
|---|
| 104 | { | 
|---|
| 105 | int naces = smb_get_naces(smbacl), i; | 
|---|
| 106 | ace_t *acebuf; | 
|---|
| 107 | SMB4ACE_T *smbace; | 
|---|
| 108 | TALLOC_CTX      *mem_ctx; | 
|---|
| 109 |  | 
|---|
| 110 | /* allocate the field of ZFS aces */ | 
|---|
| 111 | mem_ctx = talloc_tos(); | 
|---|
| 112 | acebuf = (ace_t *) talloc_size(mem_ctx, sizeof(ace_t)*naces); | 
|---|
| 113 | if(acebuf == NULL) { | 
|---|
| 114 | errno = ENOMEM; | 
|---|
| 115 | return False; | 
|---|
| 116 | } | 
|---|
| 117 | /* handle all aces */ | 
|---|
| 118 | for(smbace = smb_first_ace4(smbacl), i = 0; | 
|---|
| 119 | smbace!=NULL; | 
|---|
| 120 | smbace = smb_next_ace4(smbace), i++) { | 
|---|
| 121 | SMB_ACE4PROP_T *aceprop = smb_get_ace4(smbace); | 
|---|
| 122 |  | 
|---|
| 123 | acebuf[i].a_type        = aceprop->aceType; | 
|---|
| 124 | acebuf[i].a_flags       = aceprop->aceFlags; | 
|---|
| 125 | acebuf[i].a_access_mask = aceprop->aceMask; | 
|---|
| 126 | acebuf[i].a_who         = aceprop->who.id; | 
|---|
| 127 | if(aceprop->flags & SMB_ACE4_ID_SPECIAL) { | 
|---|
| 128 | switch(aceprop->who.special_id) { | 
|---|
| 129 | case SMB_ACE4_WHO_EVERYONE: | 
|---|
| 130 | acebuf[i].a_flags |= ACE_EVERYONE; | 
|---|
| 131 | break; | 
|---|
| 132 | case SMB_ACE4_WHO_OWNER: | 
|---|
| 133 | acebuf[i].a_flags |= ACE_OWNER; | 
|---|
| 134 | break; | 
|---|
| 135 | case SMB_ACE4_WHO_GROUP: | 
|---|
| 136 | acebuf[i].a_flags |= ACE_GROUP; | 
|---|
| 137 | break; | 
|---|
| 138 | default: | 
|---|
| 139 | DEBUG(8, ("unsupported special_id %d\n", \ | 
|---|
| 140 | aceprop->who.special_id)); | 
|---|
| 141 | continue; /* don't add it !!! */ | 
|---|
| 142 | } | 
|---|
| 143 | } | 
|---|
| 144 | } | 
|---|
| 145 | SMB_ASSERT(i == naces); | 
|---|
| 146 |  | 
|---|
| 147 | /* store acl */ | 
|---|
| 148 | if(acl(fsp->fsp_name->base_name, ACE_SETACL, naces, acebuf)) { | 
|---|
| 149 | if(errno == ENOSYS) { | 
|---|
| 150 | DEBUG(9, ("acl(ACE_SETACL, %s): Operation is not " | 
|---|
| 151 | "supported on the filesystem where the file " | 
|---|
| 152 | "reside", fsp_str_dbg(fsp))); | 
|---|
| 153 | } else { | 
|---|
| 154 | DEBUG(9, ("acl(ACE_SETACL, %s): %s ", fsp_str_dbg(fsp), | 
|---|
| 155 | strerror(errno))); | 
|---|
| 156 | } | 
|---|
| 157 | return 0; | 
|---|
| 158 | } | 
|---|
| 159 |  | 
|---|
| 160 | return True; | 
|---|
| 161 | } | 
|---|
| 162 |  | 
|---|
| 163 | /* zfs_set_nt_acl() | 
|---|
| 164 | * set the local file's acls obtaining it in NT form | 
|---|
| 165 | * using the NFSv4 format conversion | 
|---|
| 166 | */ | 
|---|
| 167 | static NTSTATUS zfs_set_nt_acl(vfs_handle_struct *handle, files_struct *fsp, | 
|---|
| 168 | uint32 security_info_sent, | 
|---|
| 169 | const struct security_descriptor *psd) | 
|---|
| 170 | { | 
|---|
| 171 | return smb_set_nt_acl_nfs4(fsp, security_info_sent, psd, | 
|---|
| 172 | zfs_process_smbacl); | 
|---|
| 173 | } | 
|---|
| 174 |  | 
|---|
| 175 | static NTSTATUS zfsacl_fget_nt_acl(struct vfs_handle_struct *handle, | 
|---|
| 176 | struct files_struct *fsp, | 
|---|
| 177 | uint32 security_info, | 
|---|
| 178 | struct security_descriptor **ppdesc) | 
|---|
| 179 | { | 
|---|
| 180 | SMB4ACL_T *pacl; | 
|---|
| 181 | NTSTATUS status; | 
|---|
| 182 |  | 
|---|
| 183 | status = zfs_get_nt_acl_common(fsp->fsp_name->base_name, security_info, | 
|---|
| 184 | &pacl); | 
|---|
| 185 | if (!NT_STATUS_IS_OK(status)) { | 
|---|
| 186 | return status; | 
|---|
| 187 | } | 
|---|
| 188 |  | 
|---|
| 189 | return smb_fget_nt_acl_nfs4(fsp, security_info, ppdesc, pacl); | 
|---|
| 190 | } | 
|---|
| 191 |  | 
|---|
| 192 | static NTSTATUS zfsacl_get_nt_acl(struct vfs_handle_struct *handle, | 
|---|
| 193 | const char *name,  uint32 security_info, | 
|---|
| 194 | struct security_descriptor **ppdesc) | 
|---|
| 195 | { | 
|---|
| 196 | SMB4ACL_T *pacl; | 
|---|
| 197 | NTSTATUS status; | 
|---|
| 198 |  | 
|---|
| 199 | status = zfs_get_nt_acl_common(name, security_info, &pacl); | 
|---|
| 200 | if (!NT_STATUS_IS_OK(status)) { | 
|---|
| 201 | return status; | 
|---|
| 202 | } | 
|---|
| 203 |  | 
|---|
| 204 | return smb_get_nt_acl_nfs4(handle->conn, name, security_info, ppdesc, | 
|---|
| 205 | pacl); | 
|---|
| 206 | } | 
|---|
| 207 |  | 
|---|
| 208 | static NTSTATUS zfsacl_fset_nt_acl(vfs_handle_struct *handle, | 
|---|
| 209 | files_struct *fsp, | 
|---|
| 210 | uint32 security_info_sent, | 
|---|
| 211 | const SEC_DESC *psd) | 
|---|
| 212 | { | 
|---|
| 213 | return zfs_set_nt_acl(handle, fsp, security_info_sent, psd); | 
|---|
| 214 | } | 
|---|
| 215 |  | 
|---|
| 216 | /* nils.goroll@hamburg.de 2008-06-16 : | 
|---|
| 217 |  | 
|---|
| 218 | See also | 
|---|
| 219 | - https://bugzilla.samba.org/show_bug.cgi?id=5446 | 
|---|
| 220 | - http://bugs.opensolaris.org/view_bug.do?bug_id=6688240 | 
|---|
| 221 |  | 
|---|
| 222 | Solaris supports NFSv4 and ZFS ACLs through a common system call, acl(2) | 
|---|
| 223 | with ACE_SETACL / ACE_GETACL / ACE_GETACLCNT, which is being wrapped for | 
|---|
| 224 | use by samba in this module. | 
|---|
| 225 |  | 
|---|
| 226 | As the acl(2) interface is identical for ZFS and for NFS, this module, | 
|---|
| 227 | vfs_zfsacl, can not only be used for ZFS, but also for sharing NFSv4 | 
|---|
| 228 | mounts on Solaris. | 
|---|
| 229 |  | 
|---|
| 230 | But while "traditional" POSIX DRAFT ACLs (using acl(2) with SETACL | 
|---|
| 231 | / GETACL / GETACLCNT) fail for ZFS, the Solaris NFS client | 
|---|
| 232 | implemets a compatibility wrapper, which will make calls to | 
|---|
| 233 | traditional ACL calls though vfs_solarisacl succeed. As the | 
|---|
| 234 | compatibility wrapper's implementation is (by design) incomplete, | 
|---|
| 235 | we want to make sure that it is never being called. | 
|---|
| 236 |  | 
|---|
| 237 | As long as Samba does not support an exiplicit method for a module | 
|---|
| 238 | to define conflicting vfs methods, we should override all conflicting | 
|---|
| 239 | methods here. | 
|---|
| 240 |  | 
|---|
| 241 | For this to work, we need to make sure that this module is initialised | 
|---|
| 242 | *after* vfs_solarisacl | 
|---|
| 243 |  | 
|---|
| 244 | Function declarations taken from vfs_solarisacl | 
|---|
| 245 | */ | 
|---|
| 246 |  | 
|---|
| 247 | SMB_ACL_T zfsacl_fail__sys_acl_get_file(vfs_handle_struct *handle, | 
|---|
| 248 | const char *path_p, | 
|---|
| 249 | SMB_ACL_TYPE_T type) | 
|---|
| 250 | { | 
|---|
| 251 | return (SMB_ACL_T)NULL; | 
|---|
| 252 | } | 
|---|
| 253 | SMB_ACL_T zfsacl_fail__sys_acl_get_fd(vfs_handle_struct *handle, | 
|---|
| 254 | files_struct *fsp, | 
|---|
| 255 | int fd) | 
|---|
| 256 | { | 
|---|
| 257 | return (SMB_ACL_T)NULL; | 
|---|
| 258 | } | 
|---|
| 259 |  | 
|---|
| 260 | int zfsacl_fail__sys_acl_set_file(vfs_handle_struct *handle, | 
|---|
| 261 | const char *name, | 
|---|
| 262 | SMB_ACL_TYPE_T type, | 
|---|
| 263 | SMB_ACL_T theacl) | 
|---|
| 264 | { | 
|---|
| 265 | return -1; | 
|---|
| 266 | } | 
|---|
| 267 |  | 
|---|
| 268 | int zfsacl_fail__sys_acl_set_fd(vfs_handle_struct *handle, | 
|---|
| 269 | files_struct *fsp, | 
|---|
| 270 | int fd, SMB_ACL_T theacl) | 
|---|
| 271 | { | 
|---|
| 272 | return -1; | 
|---|
| 273 | } | 
|---|
| 274 |  | 
|---|
| 275 | int zfsacl_fail__sys_acl_delete_def_file(vfs_handle_struct *handle, | 
|---|
| 276 | const char *path) | 
|---|
| 277 | { | 
|---|
| 278 | return -1; | 
|---|
| 279 | } | 
|---|
| 280 |  | 
|---|
| 281 | /* VFS operations structure */ | 
|---|
| 282 |  | 
|---|
| 283 | static struct vfs_fn_pointers zfsacl_fns = { | 
|---|
| 284 | .sys_acl_get_file = zfsacl_fail__sys_acl_get_file, | 
|---|
| 285 | .sys_acl_get_fd = zfsacl_fail__sys_acl_get_fd, | 
|---|
| 286 | .sys_acl_set_file = zfsacl_fail__sys_acl_set_file, | 
|---|
| 287 | .sys_acl_set_fd = zfsacl_fail__sys_acl_set_fd, | 
|---|
| 288 | .sys_acl_delete_def_file = zfsacl_fail__sys_acl_delete_def_file, | 
|---|
| 289 | .fget_nt_acl = zfsacl_fget_nt_acl, | 
|---|
| 290 | .get_nt_acl = zfsacl_get_nt_acl, | 
|---|
| 291 | .fset_nt_acl = zfsacl_fset_nt_acl, | 
|---|
| 292 | }; | 
|---|
| 293 |  | 
|---|
| 294 | NTSTATUS vfs_zfsacl_init(void); | 
|---|
| 295 | NTSTATUS vfs_zfsacl_init(void) | 
|---|
| 296 | { | 
|---|
| 297 | return smb_register_vfs(SMB_VFS_INTERFACE_VERSION, "zfsacl", | 
|---|
| 298 | &zfsacl_fns); | 
|---|
| 299 | } | 
|---|