From: Chuck Lever <cel@kernel.org>
To: Calum Mackay <calum.mackay@oracle.com>
Cc: <linux-nfs@vger.kernel.org>, Chuck Lever <chuck.lever@oracle.com>
Subject: [RFC PATCH 02/10] Add helper to format ACE access masks
Date: Sun, 23 Nov 2025 10:56:10 -0500 [thread overview]
Message-ID: <20251123155623.514129-3-cel@kernel.org> (raw)
In-Reply-To: <20251123155623.514129-1-cel@kernel.org>
From: Chuck Lever <chuck.lever@oracle.com>
I'm about to add new ACL-related tests. Introduce
access_mask_to_str() to convert ACE access_mask values to human-
readable symbolic strings for the display output in these new
tests.
Signed-off-by: Chuck Lever <chuck.lever@oracle.com>
---
nfs4.1/nfs4acl.py | 85 +++++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 85 insertions(+)
create mode 100644 nfs4.1/nfs4acl.py
diff --git a/nfs4.1/nfs4acl.py b/nfs4.1/nfs4acl.py
new file mode 100644
index 000000000000..44f01de0d513
--- /dev/null
+++ b/nfs4.1/nfs4acl.py
@@ -0,0 +1,85 @@
+#
+# nfs4acl.py - ACL utility functions for NFSv4.1
+#
+
+from xdrdef.nfs4_const import *
+
+def acl2mode_rfc8881(acl):
+ """
+ Compute mode from ACL according to RFC 8881 Section 6.3.2.
+
+ For each special identifier (OWNER@, GROUP@, EVERYONE@), evaluate the
+ ACL in order considering only ALLOW and DENY ACEs for EVERYONE@ and
+ the identifier under consideration. Then translate to mode bits:
+ - Read bit: Set if ACE4_READ_DATA is permitted
+ - Write bit: Set if BOTH ACE4_WRITE_DATA AND ACE4_APPEND_DATA are permitted
+ - Execute bit: Set if ACE4_EXECUTE is permitted
+
+ Returns the low-order 9 bits of the mode (user/group/other permissions).
+ """
+ identifiers = [
+ (b"OWNER@", MODE4_RUSR, MODE4_WUSR, MODE4_XUSR),
+ (b"GROUP@", MODE4_RGRP, MODE4_WGRP, MODE4_XGRP),
+ (b"EVERYONE@", MODE4_ROTH, MODE4_WOTH, MODE4_XOTH)
+ ]
+
+ mode = 0
+
+ for who, read_bit, write_bit, exec_bit in identifiers:
+ # Start with no permissions
+ allowed_mask = 0
+ denied_mask = 0
+
+ # Evaluate ACL in order, considering only ALLOW/DENY for this
+ # identifier and EVERYONE@
+ for ace in acl:
+ # Skip non-relevant ACEs
+ if ace.who not in (who, b"EVERYONE@"):
+ continue
+ if ace.type not in (ACE4_ACCESS_ALLOWED_ACE_TYPE, ACE4_ACCESS_DENIED_ACE_TYPE):
+ continue
+ # Skip inherit-only ACEs (they don't affect current permissions)
+ if ace.flag & ACE4_INHERIT_ONLY_ACE:
+ continue
+
+ if ace.type == ACE4_ACCESS_ALLOWED_ACE_TYPE:
+ # Add allowed permissions not already denied
+ allowed_mask |= (ace.access_mask & ~denied_mask)
+ elif ace.type == ACE4_ACCESS_DENIED_ACE_TYPE:
+ # Add denied permissions not already allowed
+ denied_mask |= (ace.access_mask & ~allowed_mask)
+
+ # Translate permitted mask to mode bits per RFC 8881 §6.3.2
+ # Read bit: ACE4_READ_DATA must be set
+ if allowed_mask & ACE4_READ_DATA:
+ mode |= read_bit
+
+ # Write bit: BOTH ACE4_WRITE_DATA and ACE4_APPEND_DATA must be set
+ if (allowed_mask & ACE4_WRITE_DATA) and (allowed_mask & ACE4_APPEND_DATA):
+ mode |= write_bit
+
+ # Execute bit: ACE4_EXECUTE must be set
+ if allowed_mask & ACE4_EXECUTE:
+ mode |= exec_bit
+
+ return mode
+
+def access_mask_to_str(mask):
+ """Convert an ACE access_mask to a symbolic string representation"""
+ perms = [
+ (ACE4_READ_DATA, "READ_DATA"),
+ (ACE4_WRITE_DATA, "WRITE_DATA"),
+ (ACE4_APPEND_DATA, "APPEND_DATA"),
+ (ACE4_READ_NAMED_ATTRS, "READ_NAMED_ATTRS"),
+ (ACE4_WRITE_NAMED_ATTRS, "WRITE_NAMED_ATTRS"),
+ (ACE4_EXECUTE, "EXECUTE"),
+ (ACE4_DELETE_CHILD, "DELETE_CHILD"),
+ (ACE4_READ_ATTRIBUTES, "READ_ATTRIBUTES"),
+ (ACE4_WRITE_ATTRIBUTES, "WRITE_ATTRIBUTES"),
+ (ACE4_DELETE, "DELETE"),
+ (ACE4_READ_ACL, "READ_ACL"),
+ (ACE4_WRITE_ACL, "WRITE_ACL"),
+ (ACE4_WRITE_OWNER, "WRITE_OWNER"),
+ (ACE4_SYNCHRONIZE, "SYNCHRONIZE"),
+ ]
+ return " | ".join(name for bit, name in perms if mask & bit) or "(none)"
--
2.51.1
next prev parent reply other threads:[~2025-11-23 15:56 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-11-23 15:56 [RFC PATCH 00/10] pynfs tests for setting ACL+MODE Chuck Lever
2025-11-23 15:56 ` [RFC PATCH 01/10] Add helper to report unsupported protocol features Chuck Lever
2025-11-23 15:56 ` Chuck Lever [this message]
2025-11-23 15:56 ` [RFC PATCH 03/10] Add helper to format attribute bitmaps Chuck Lever
2025-11-23 15:56 ` [RFC PATCH 04/10] Add a helper to compute POSIX mode bits from NFSv4 ACLs Chuck Lever
2025-11-23 15:56 ` [RFC PATCH 05/10] Add make_test_acl() helper to nfs4acl modules Chuck Lever
2025-11-23 16:04 ` Chuck Lever
2025-11-23 15:56 ` [RFC PATCH 06/10] Add access_mask_to_str() helper to nfs4.0/nfs4acl.py Chuck Lever
2025-11-23 15:56 ` [RFC PATCH 07/10] Add verify_acl() helper to nfs4acl modules Chuck Lever
2025-11-23 15:56 ` [RFC PATCH 08/10] Add verify_mode_and_acl() " Chuck Lever
2025-11-23 15:56 ` [RFC PATCH 09/10] Add tests for SETATTR with MODE and ACL Chuck Lever
2025-11-23 15:56 ` [RFC PATCH 10/10] Add tests for OPEN(create) with ACLs Chuck Lever
2025-11-23 17:20 ` [RFC PATCH 00/10] pynfs tests for setting ACL+MODE Calum Mackay
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20251123155623.514129-3-cel@kernel.org \
--to=cel@kernel.org \
--cc=calum.mackay@oracle.com \
--cc=chuck.lever@oracle.com \
--cc=linux-nfs@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox