<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<?rfc docmapping="yes"?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-cel-nfsv4-nfs-acl-01" category="info" submissionType="IETF" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.30.0 -->
  <front>
    <title abbrev="NFS ACL Protocol">The Network File System Access Control List Protocol</title>
    <seriesInfo name="Internet-Draft" value="draft-cel-nfsv4-nfs-acl-01"/>
    <author fullname="Chuck Lever" role="editor">
      <organization abbrev="Oracle">Oracle Corporation</organization>
      <address>
        <postal>
          <country>United States of America</country>
        </postal>
        <email>chuck.lever@oracle.com</email>
      </address>
    </author>
    <date year="2025" month="August" day="27"/>
    <area>Web and Internet Transport</area>
    <workgroup>Network File System Version 4</workgroup>
    <keyword>NFS</keyword>
    <keyword>ACL</keyword>
    <abstract>
      <?line 90?>

<t>This Informational document describes the NFS_ACL protocol.
NFS_ACL is a legacy member of the Network File System family
of protocols that NFS clients use to view and update Access
Control Lists stored on an NFS version 2 or version 3 server.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://chucklever.github.io/i-d-nfs-acl/draft-cel-nfsv4-nfs-acl.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-cel-nfsv4-nfs-acl/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Network File System Version 4 Working Group mailing list (<eref target="mailto:nfsv4@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/nfsv4/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/nfsv4/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/chucklever/i-d-nfs-acl"/>.</t>
    </note>
  </front>
  <middle>
    <?line 98?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>The Network File System protocol (NFS) was introduced by Sun
Microsystems in the 1980s. This protocol enabled applications
to access and modify files, via local POSIX system interfaces,
that reside on a remote host <xref target="RFC1094"/>.</t>
      <t>Traditionally, permission to access files stored in NFS file
systems is granted by permission bits, mimicking <xref target="POSIX"/>.
Permission bits provide coarse-grained access control. The
file owner can control only whether members of her group can
read, write, or execute the file contents, or whether anyone
else (without exception) has those rights.</t>
      <t>An Access Control List, or ACL, is a mechanism that enables
file owners to grant specific users fine-grained access
rights to file content <xref target="IEEE"/>.</t>
      <t>Version 2 of NFS is described in <xref target="RFC1094"/>, and version 3
in <xref target="RFC1813"/>. Neither of these protocols include a method
for managing ACLs associated with files shared via the NFS
protocol, even though the local file systems shared via NFS
often implemented ACLs and gave local users mechanisms to
read and update them.</t>
      <t>Sun created the NFS_ACL protocol to provide that mechanism
for files accessed remotely via NFS. Later, other operating
systems, including Linux, implemented NFS_ACL for similar
reasons.</t>
      <t>This document describes the protocol based on the nfs_acl.x
file that is publicly available in the OpenSolaris
code base <xref target="OpenSolaris"/>. The editor has attempted to
introduce no changes to the protocol as it is implemented
in those operating systems and in Linux.</t>
      <t>The document assumes readers are already familiar with the
NFS version 2 or 3 protocols and at least one implementation
of them.</t>
      <t>Issues of compatibility between the protocol described in
this document and NFSv4 ACLs (as described by <xref target="RFC8881"/>)
are considered out of scope. More information on this topic
is available in Section 6 of draft-rmacklem-nfsv4-posix-acls.</t>
      <t>Local file systems on NFSv2 and NFSv3 servers determine the
particular semantics of each Access Control List -- in other
words, how the server uses each Access Control List to
authorize access to file content. This document serves only
as a description of the network protocol used to exchange
ACLs between NFS clients and servers.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

<t>As with most publications by standards bodies, this document
has been published so that people may continue to create
compatible implementations. However, note that, as an
Informational document, this RFC does not make any compliance
mandates on implementations of the protocol described herein.</t>
    </section>
    <section anchor="general-concepts">
      <name>General Concepts</name>
      <section anchor="a-glossary-of-useful-terms">
        <name>A Glossary of Useful Terms</name>
        <t>The following are a set of foundational terms used throughout
this document.</t>
        <dl>
          <dt>application:</dt>
          <dd>
            <t>A program that executes on a client system.</t>
          </dd>
          <dt>client:</dt>
          <dd>
            <t>A computer system that utilizes compute resources provided by one or
more servers.</t>
          </dd>
          <dt>file:</dt>
          <dd>
            <t>A unit of data storage consisting of an ordered stream of
bytes and a set of metadata attributes.</t>
          </dd>
          <dt>gid:</dt>
          <dd>
            <t>A 32-bit unsigned integer that represents a group of users.</t>
          </dd>
          <dt>server:</dt>
          <dd>
            <t>A computer system that provides compute resources to network peers.</t>
          </dd>
          <dt>uid:</dt>
          <dd>
            <t>A 32-bit unsigned integer that represents a specific user.</t>
          </dd>
          <dt>user:</dt>
          <dd>
            <t>A person logged in on a client system.</t>
          </dd>
        </dl>
      </section>
      <section anchor="remote-procedure-call">
        <name>Remote Procedure Call</name>
        <t>The Sun Remote Procedure Call (SunRPC) protocol provides a
procedure-oriented interface to remote services. Each server
supplies a program, which is a set of procedures. The NFS
service is one such program. The combination of host address,
program number, version number, and procedure number specify one
remote service procedure.  Servers can support multiple versions
of a program that are accessed using different protocol version
numbers.</t>
        <t>The NFS and NFS_ACL protocols are both based on SunRPC. The
remainder of this document assumes an NFS environment that is
implemented on top of SunRPC, as it is specified in <xref target="RFC5531"/>.</t>
      </section>
      <section anchor="external-data-representation">
        <name>External Data Representation</name>
        <t>The eXternal Data Representation (XDR) specification provides a
standard way of representing a set of data types on a network.
XDR addresses the problem of communication between network
peers with different byte orders, structure alignment, and data
type representation.</t>
        <t>This document utilizes the RPC Data Description Language to
specify the XDR format arguments and results to each of the RPC
service procedures that an NFS_ACL server provides.</t>
        <t>Readers can find a full guide to XDR and the RPC Data Description
Language in <xref target="RFC4506"/>.</t>
      </section>
      <section anchor="authentication-and-authorization">
        <name>Authentication and Authorization</name>
        <t>The RPC protocol includes fields in every procedure call for
user authentication parameters. The specific content of the
authentication parameters is determined by the type of
authentication used by the server and client. A discussion
of the mechanics of RPC user authentication appears in
<xref target="RFC5531"/>, in particular Sections 9 and 10.</t>
        <t>For NFS ACLs, the user ID carried in RPC calls is used
for two purposes:</t>
        <ul spacing="normal">
          <li>
            <t>When setting an ACL via the SETACL procedure or retrieving
an ACL via the GETACL procedure, the NFS_ACL service verifies
that the calling user has been granted permission to perform
the procedure.</t>
          </li>
          <li>
            <t>Each Access Control Entry (see below) contains an element
that identifies the user to which the ACE applies. That
user is represented by a 32-bit user ID. The value of the
user ID in each ACE has the same meaning and mapping as
the value of incoming RPC calls.</t>
          </li>
        </ul>
        <t>Using user ids and group ids implies that the client and
server either share the same ID list or do local user and
group ID mapping. Servers and clients must agree on the
mapping from user to uid and from group to gid, for those
sites that do not implement a consistent user ID and group
ID number space. In practice, such mapping is typically
performed on the server, following a static mapping scheme
or a mapping established by the user from a client at
mount time.</t>
        <t>RPCSEC_GSS authentication provides stronger
security through the use of cryptographic authentication.
The server and client must agree on the mapping of the
user's GSS principal to a local UID on the server, but
the name to identity mapping is more operating system
independent than the uid and gid mapping in AUTH_UNIX.</t>
      </section>
      <section anchor="file-access-control">
        <name>File Access Control</name>
        <t>This section describes the abstractions that an NFS server
uses to determine whether an access or modification
to a file is permitted. The exact behavior of a server
implementation may vary.</t>
        <section anchor="file-ownership">
          <name>File Ownership</name>
          <t>A file’s "owner" is the designated user that is always granted
permission to update that file’s security attributes. As part of
creating a file, the NFS server assigns the file’s owner. Under
normal circumstances the initial file owner is the RPC user who
issued the NFS CREATE procedure. However, server security policies
can mandate replacement of that user (also known as user squashing)
as part of processing a CREATE procedure.</t>
          <t>An existing file’s designated owner can subsequently be changed by
an NFS SETATTR procedure. After that change, the new owner is
granted permission to update the file’s security attributes and
the old owner is no longer treated specially.</t>
          <t>A file’s "owner group" is a short list of users that have
similar privileges as the file’s owner, but are treated as a
separate category for the purpose of permission checking.</t>
          <t>Any user who is not a file's owner or a member of its owner
group falls into the third category, known as "everyone" or
"other".</t>
          <section anchor="superuser-access">
            <name>Superuser Access</name>
            <t>On most operating systems, there is a category of users known as
privileged users or superusers. These users can bypass most or
all access controls on files.</t>
          </section>
        </section>
        <section anchor="categories-of-access">
          <name>Categories of Access</name>
          <t>In NFS versions 2 and 3, there are three rudimentary categories
of access:</t>
          <dl>
            <dt>Read access:</dt>
            <dd>
              <t>Read access grants permission for a user to read a file or
directory.</t>
            </dd>
            <dt>Write access:</dt>
            <dd>
              <t>Write access grants permission for a user to modify a file
or directory.</t>
            </dd>
            <dt>Execute access:</dt>
            <dd>
              <t>For a file, execute access grants permission for the user to
treat the file content as executable. For a directory object,
execute access grants permission for the user to perform a
lookup in that directory.</t>
            </dd>
          </dl>
        </section>
        <section anchor="traditional-permission-bits">
          <name>Traditional Permission Bits</name>
          <t>Permission bits, or mode bits, are the simplest and perhaps
oldest form of access control. Each file object has a set
of mode bits <xref target="POSIX"/>.</t>
          <t>Each of the user categories is given a set of three access
type bits. Altogether there are then nine bit flags for
every file object.</t>
        </section>
        <section anchor="access-control-lists">
          <name>Access Control Lists</name>
          <t>An Access Control Entry, or ACE, represents a set of access categories
and a specific user or group. An Access Control List is a list of ACEs.</t>
          <t>Mode bits, as explained in the previous section, are essentially an
ACL that always contains exactly three ACEs: one for the file's owner,
one for the file's owner group, and one for everyone else.</t>
          <section anchor="interpreting-access-control-lists">
            <name>Interpreting Access Control Lists</name>
            <t>NFS clients do not perform access checks based on their
interpretation of an ACL read from the server. NFS servers
are solely responsible for authorizing and restricting
access to file content via the NFS protocol.</t>
            <t>An NFS Access Control List is a list of three or more
Access Control Entries (ACEs) associated with one file
system object. Each Access Control Entry in this list
specifies a user and a set of access types granted to
that user.</t>
            <t>Only ACEs that match the requester are considered. Each
ACE is processed until all of the bits of the requester's
access have been ALLOWED. Once a bit has been ALLOWED,
that bit is no longer considered in the processing
of subsequent ACEs in the list.</t>
            <t>When the ACL has been fully processed, if there are bits
in the requester's mask that have not been ALLOWED,
access of that type is denied.</t>
            <t>Note that an ACL might not be the sole determiner of access. For example:</t>
            <ul spacing="normal">
              <li>
                <t>In the case of a file system exported as read-only,
the server may deny write access even though an object's
ACL grants it.</t>
              </li>
              <li>
                <t>Server implementations can grant some limited permission
to update an ACL in order to prevent a situation from
rising in which there is no valid way to ever modify the ACL.</t>
              </li>
              <li>
                <t>All servers will allow a user the ability to read the
data of the file when only the execute permission is granted
(i.e., if the ACL denies the user the NA_READ access and
allows the user NA_EXEC, the server will allow the user to
read the data of the file).</t>
              </li>
              <li>
                <t>Some server implementations have the notion of
owner-override, in which the owner of the object is allowed
to override accesses that are denied by the ACL. This can be
helpful, for example, to allow users continued access to
open files on which the permissions have changed.</t>
              </li>
              <li>
                <t>Some server implementations have the notion of a
"superuser" that has privileges beyond an ordinary user.
The superuser may be able to read or write data or metadata
in ways that would otherwise not be permitted by the object's
ACL.</t>
              </li>
            </ul>
            <t>NFS clients can use either the NFS_ACL version 2 ACCESS
procedure or the NFS version 3 ACCESS procedure to ask the
server to perform an access check based on the requesting
user and the ACL present on a file system object. Clients are
also free to simply try an operation to see what works, then
recover it the server denies access.</t>
          </section>
          <section anchor="acls-in-operation">
            <name>ACLs in Operation</name>
            <t>The SETACL procedure sets two types of Access Control Lists:</t>
            <dl>
              <dt>Access:</dt>
              <dd>
                <t>An NFS access ACL specifies the access permission
for a file object. Access Control Entries in an ACL's
"aclent" field comprise the object's access ACL.</t>
              </dd>
              <dt>Default:</dt>
              <dd>
                <t>An NFS default ACL specifies the default ACL that
is set on objects that are children of a directory.
Access Control Entries in an ACL's "dfaclent" comprise
an object's default ACL. The default ACL does not affect
access to the object on which it is set.</t>
              </dd>
            </dl>
            <t>Each NFS ACL must have one ACE for each of
NA_USER_OBJ, NA_GROUP_OBJ, and NA_OTHER_OBJ.
An NFS ACL that consists only of these
three ACEs is referred to as a minimal NFS ACL.</t>
            <t>An NFS ACL may zero or more NA_USER and/or NA_GROUP
ACEs.</t>
            <t>When a client presents a SETACL operation that a server
finds is invalid or it cannot process, the server responds
with ACL2ERR_IO or ACL3ERR_INVAL, depending on the version
of NFS_ACL that is in use. ACLs that are not valid include:</t>
            <ul spacing="normal">
              <li>
                <t>The presented ACL does not contain one ACE for each of
NA_USER_OBJ, NA_GROUP_OBJ, and NA_OTHER_OBJ</t>
              </li>
              <li>
                <t>The presented ACL is a default ACL but the target object
is not a directory</t>
              </li>
              <li>
                <t>The presented ACL contains too many ACEs</t>
              </li>
              <li>
                <t>The presented ACL's type field contains more than one
set bit</t>
              </li>
            </ul>
            <aside>
              <t>cel: What does the NA_ACL_DEFAULT bit do?</t>
            </aside>
            <aside>
              <t>rthurlow: In the Solaris acl(2)/facl(2) system calls, the
equivalently-defined ACL_DEFAULT is used after aclent
sorting to note where regular entries end and where default
entries start in a single list.  So perhaps it would be
normal for the dfaclent entries to all be so marked.</t>
            </aside>
            <t>The "id" field in an Access Control Entry is interpreted as follows:</t>
            <ul spacing="normal">
              <li>
                <t>For an ACE that specifies an NA_USER_OBJ, NA_USER,
NA_GROUP, and NA_GROUP_OBJ, the "id" field contains
a UID or GID value that identifies the user on the
server whose access permission is being set.</t>
              </li>
              <li>
                <t>For an ACE that specifies other types of permission,
the "id" field is ignored.</t>
              </li>
            </ul>
          </section>
          <section anchor="relationship-between-acls-and-other-file-attributes">
            <name>Relationship Between ACLs and Other File Attributes</name>
            <t>When an ACL is present on a file, the ACL controls the
requesting user's access to the file. Typically the NFS
server ignores the file's mode bits.</t>
            <t>Depending on the behavior of the local file system
implementation, changing the file's ACL via the SETACL
procedure may alter the file's mode bits, and changing
the mode bits via the SETATTR procedure may alter the
content of the ACL in any way. NFS clients should
refresh cached ACLs or file modes after one of these
operations.</t>
            <t>When an ACL is present on a file, changing the file's owner
(say, via the SETATTR operation) may alter the server's
interpretation of any ACE that targets @OWNER.</t>
            <t>When an ACL is present on a file, changing the file's group
(say, via the SETATTR operation) may alter the server's
interpretation of any ACE that targets @GROUP.</t>
            <t>If an NFS client observes that a file's ctime attribute
has changed, it should assume that any ACLs that are
present might have been modified.</t>
          </section>
          <section anchor="acl-inheritance">
            <name>ACL Inheritance</name>
            <aside>
              <t>Section needs to explain how default ACLs work and what
impact they may have on the mode bits of the new file.</t>
            </aside>
            <t>A client uses one of the NFS CREATE, MKDIR, or MKNOD procedures
to request instantiatiation of a new file object. The server uses
the default ACL from the parent directory as the initial access
ACL on the new object.</t>
          </section>
          <section anchor="historical-references">
            <name>Historical References</name>
            <t>The section entitled "The POSIX 1003.1e/1003.2c Working Group"
in <xref target="Gruenbacher"/> details the history of POSIX standards efforts
with regard to file access control. The editor recommends that
readers familiarize themselves with the extent to which POSIX
specifies the content and behavior of ACLs.</t>
          </section>
        </section>
      </section>
    </section>
    <section anchor="protocol-elements-common-to-both-versions">
      <name>Protocol Elements Common to Both Versions</name>
      <section anchor="rpc-authentication">
        <name>RPC Authentication</name>
        <t>The NFS_ACL service uses AUTH_NONE in the NULL procedure.
All RPC authentication flavors may be used for other procedures.</t>
      </section>
      <section anchor="constants">
        <name>Constants</name>
        <t>These are the RPC constants needed to call the NFS Version 3
service.  They are given in decimal.</t>
        <dl>
          <dt>100227</dt>
          <dd>
            <t>The RPC program number for the NFS_ACL protocol</t>
          </dd>
        </dl>
        <t>Only versions 2 and 3 of this RPC program are valid.</t>
      </section>
      <section anchor="transport-address">
        <name>Transport address</name>
        <t>The NFS_ACL protocol can operate over the TCP, UDP, and RDMA
transport protocols.
For TCP and UDP, it uses port 2049, and for RDMA, it uses 20049.
In both cases, this is the same as the base NFS protocol.</t>
      </section>
      <section anchor="sizes">
        <name>Sizes</name>
        <sourcecode type="xdr"><![CDATA[
NFS_ACL_MAX_ENTRIES 1024
]]></sourcecode>
        <t>The maximum number of Access Control Entries allowed in one Access Control List array.</t>
      </section>
      <section anchor="basic-data-types">
        <name>Basic Data Types</name>
        <t>The following XDR definitions are basic scalar types that are used in other structures.</t>
        <sourcecode type="xdr"><![CDATA[
typedef int uid;
]]></sourcecode>
        <sourcecode type="xdr"><![CDATA[
typedef unsigned short o_mode;
]]></sourcecode>
      </section>
      <section anchor="structured-data-types">
        <name>Structured Data types</name>
        <t>The following XDR definitions are common structured data types
that are used in all versions of the NFS_ACL protocol.</t>
        <section anchor="aclent">
          <name>aclent</name>
          <t>This structure represents a single entry in an Access Control List.</t>
          <sourcecode type="xdr"><![CDATA[
struct aclent {
    int type;
    uid id;
    o_mode perm;
};
]]></sourcecode>
          <t>The "type" element in an Access Control Entry is a bit mask.
The bit field values in this mask are defined as follows:</t>
          <sourcecode type="xdr"><![CDATA[
const NA_USER_OBJ = 0x1;        /* object owner */
const NA_USER = 0x2;            /* additional users */
const NA_GROUP_OBJ = 0x4;       /* owning group of the object */
const NA_GROUP = 0x8;           /* additional groups */
const NA_CLASS_OBJ = 0x10;      /* file group class and mask entry */
const NA_OTHER_OBJ = 0x20;      /* other entry for the object */
const NA_ACL_DEFAULT = 0x1000;  /* default flag */
]]></sourcecode>
          <t>The "perm" element in an Access Control Entry is also a bit mask.
The bit field values in this mask are defined as follows:</t>
          <sourcecode type="xdr"><![CDATA[
const NA_READ = 0x4;            /* read permission */
const NA_WRITE = 0x2;           /* write permission */
const NA_EXEC = 0x1;            /* exec permission */
]]></sourcecode>
        </section>
        <section anchor="secattr">
          <name>secattr</name>
          <t>The secattr structure represents, on the wire, the full Access Control
List for one file system object. This list contains an array of
Access Control Entries that apply to the object, plus an array of
default Access Control Entries that are inherited by the object's
children.</t>
          <sourcecode type="xdr"><![CDATA[
struct secattr {
    u_int mask;
    int aclcnt;
    aclent aclent<NFS_ACL_MAX_ENTRIES>;
    int dfaclcnt;
    aclent dfaclent<NFS_ACL_MAX_ENTRIES>;
};
]]></sourcecode>
          <t>The "mask" element of the secattr structure is a bit mask. The
bit field vvalues in this mask are defined as follows:</t>
          <sourcecode type="xdr"><![CDATA[
const NA_ACL = 0x1;         /* aclent contains a valid list */
const NA_ACLCNT = 0x2;      /* number of entries in the aclent list */
const NA_DFACL = 0x4;       /* dfaclent contains a valid list */
const NA_DFACLCNT = 0x8;    /* number of entries in the dfaclent list */
]]></sourcecode>
          <t>These bit field values are also used in the "mask" element of the
GETACL2args and GETACL3args structures.</t>
        </section>
        <section anchor="interoperability-considerations">
          <name>Interoperability Considerations</name>
          <t>Interoperability between NFS peers that do not implement
the NFS_ACL protocol is what we already have today.
Interoperability between peers that both implement the NFS_ACL
protocol is described in the rest of this document.</t>
          <t>The following subsections briefly discuss three new
interoperability scenarios.</t>
          <section anchor="client-implements-nfsacl-server-does-not">
            <name>Client Implements NFS_ACL, Server Does Not</name>
            <t>Typically an NFS server that implements the NFS_ACL program will
advertise the presence of NFS_ACL via an rpcbind registration.
An NFS client that implements NFS_ACL should perform an rpcbind
query before attempting any NFS_ACL procedure <xref target="RFC1833"/>.</t>
            <t>If the client sends any NFS_ACL procedure without sending an
rpcbind query first, and the server does not implement the
NFS_ACL program, the server responds with an RPC access_stat
of PROG_UNAVAIL.</t>
          </section>
          <section anchor="server-implements-nfsacl-client-does-not">
            <name>Server Implements NFS_ACL, Client Does Not</name>
            <t>An NFS server that implements advanced access control can
deny requests made by a client by responding with
NFS2ERR_ACCESS or NFS3ERR_ACCESS status codes, and an
NFS client has no visibility as to why the denial occurred.
Neither can that client send operations to update
the access control on file objects.</t>
            <t>This is a quality of implementation issue for the client.</t>
          </section>
          <section anchor="client-implements-exported-file-system-does-not">
            <name>Client Implements, Exported File System Does Not</name>
            <t>An NFS server that implements the NFS_ACL protocol might
share both file systems that implement ACLs and
file systems that do not. In this case, NFS clients
detect the presence of an NFS_ACL service on the NFS
server.</t>
            <t>For file objects that do not implement ACL support:</t>
            <ul spacing="normal">
              <li>
                <t>The server responds to a GETACL procedure by returning
a manufactured minimal ACL (ie., only three ACEs) that
reflects the current mode bits of the object.</t>
              </li>
              <li>
                <t>The server responds to a SETACL version 3 procedure by
returning ACL3ERR_NOTSUPP.</t>
              </li>
            </ul>
            <aside>
              <t>Linux returns NFS3ERR_NOTSUPP even for NFS_ACLv2. Check Solaris.</t>
            </aside>
          </section>
        </section>
      </section>
    </section>
    <section anchor="nfsacl-version-2">
      <name>NFS_ACL Version 2</name>
      <t>Version 2 of the NFS_ACL protocol is used in conjunction only with
version 2 of the NFS protocol.</t>
      <section anchor="data-types-inherited-from-nfs-version-2">
        <name>Data types inherited from NFS version 2</name>
        <section anchor="ftype">
          <name>ftype</name>
          <t>The enumeration "ftype" gives the type of an NFS version 3 file.
This definition comes from <xref section="2.3.2" sectionFormat="of" target="RFC1094"/>:</t>
          <sourcecode type="xdr"><![CDATA[
enum ftype {
    NFNON = 0,
    NFREG = 1,
    NFDIR = 2,
    NFBLK = 3,
    NFCHR = 4,
    NFLNK = 5,
};
]]></sourcecode>
        </section>
        <section anchor="fhandlet">
          <name>fhandle_t</name>
          <t>NFS version 2 uses a fixed-size file handle. The following definition
comes from <xref section="2.3.3" sectionFormat="of" target="RFC1094"/>:</t>
          <sourcecode type="xdr"><![CDATA[
typedef opaque fhandle[FHSIZE];
]]></sourcecode>
        </section>
        <section anchor="timeval">
          <name>timeval</name>
          <t>NFS version 2's "timeval" structure represents the number of seconds
and microseconds since midnight January 1, 1970, Greenwich Mean Time.
This definition comes from <xref section="2.3.4" sectionFormat="of" target="RFC1094"/>:</t>
          <sourcecode type="xdr"><![CDATA[
struct timeval {
    unsigned int seconds;
    unsigned int useconds;
};
]]></sourcecode>
        </section>
        <section anchor="nfsfattr">
          <name>nfsfattr</name>
          <t>This document refers to NFS version 2's file attribute structure
as "nfsfattr". This is the same as the fattr structure described
in <xref section="2.3.5" sectionFormat="of" target="RFC1094"/>:</t>
          <sourcecode type="xdr"><![CDATA[
struct fattr {
    ftype        type;
    unsigned int mode;
    unsigned int nlink;
    unsigned int uid;
    unsigned int gid;
    unsigned int size;
    unsigned int blocksize;
    unsigned int rdev;
    unsigned int blocks;
    unsigned int fsid;
    unsigned int fileid;
    timeval      atime;
    timeval      mtime;
    timeval      ctime;
};
]]></sourcecode>
        </section>
        <section anchor="defined-error-numbers">
          <name>Defined Error Numbers</name>
          <t><xref section="2.3.1" sectionFormat="of" target="RFC1094"/> describes an enumerated type called
"stat" which provides a status code for NFS version 2 results.
A matching type called "aclstat2" is defined in this document
for the similar purpose of returning NFS_ACL version 2 procedure
status codes. The numeric values of these two types match up,
though aclstat2 omits some codes that are not relevant to the
NFS_ACL protocol.</t>
          <sourcecode type="xdr"><![CDATA[
enum aclstat2 {
    ACL2_OK = 0,
    ACL2ERR_PERM = 1,
    ACL2ERR_IO = 5,
    ACL2ERR_ACCES = 13,
    ACL2ERR_NOSPC = 28,
    ACL2ERR_ROFS = 30,
    ACL2ERR_DQUOT = 69,
    ACL2ERR_STALE = 70,
};
]]></sourcecode>
          <t>These status codes carry the following meanings:</t>
          <dl>
            <dt>ACL2ERR_PERM</dt>
            <dd>
              <t>Not owner. The caller does not have correct ownership to perform the requested operation.</t>
            </dd>
            <dt>ACL2ERR_IO</dt>
            <dd>
              <t>Some sort of hard error occurred when the operation was in progress.  This could be a disk error, for example.</t>
            </dd>
            <dt>ACL2ERR_ACCES</dt>
            <dd>
              <t>Permission denied.  The caller does not have the correct permission to perform the requested operation.</t>
            </dd>
            <dt>ACL2ERR_NOSPC</dt>
            <dd>
              <t>No space left on device.  The operation caused the server's file system to reach its limit.</t>
            </dd>
            <dt>ACL2ERR_ROFS</dt>
            <dd>
              <t>Read-only file system.  Write attempted on a read-only file system.</t>
            </dd>
            <dt>ACL2ERR_DQUOT</dt>
            <dd>
              <t>Disk quota exceeded.  The client's disk quota on the server has been exceeded.</t>
            </dd>
            <dt>ACL2ERR_STALE</dt>
            <dd>
              <t>The "fhandle" given in the arguments was invalid.  That is, the file referred to by that file handle no longer exists, or access to it has been revoked.</t>
            </dd>
          </dl>
        </section>
      </section>
      <section anchor="server-procedures">
        <name>Server Procedures</name>
        <section anchor="procedure-0-null-no-operation">
          <name>Procedure 0: NULL - No Operation</name>
          <section anchor="arguments">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
void;
]]></sourcecode>
          </section>
          <section anchor="results">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
void;
]]></sourcecode>
          </section>
          <section anchor="description">
            <name>DESCRIPTION</name>
            <t>This is the usual NULL procedure with a void argument and void result.</t>
          </section>
          <section anchor="implementation">
            <name>IMPLEMENTATION</name>
            <t>It is important that this procedure do no work at all so that clients
can use it to measure the overhead of processing a service request.
By convention, the NULL procedure should never require any
authentication.
A server implementation may choose to ignore this convention, if
responding to the NULL procedure call acknowledges the existence
of a resource to an unauthenticated client.</t>
          </section>
          <section anchor="errors">
            <name>ERRORS</name>
            <t>Since the NULL procedure returns no result, it can not return an
NFS_ACL error status code. However, some server implementations may
return RPC-level errors based on security or authentication policy
settings.</t>
          </section>
        </section>
        <section anchor="procedure-1-getacl-retrieve-an-access-control-list">
          <name>Procedure 1: GETACL - Retrieve an Access Control List</name>
          <section anchor="arguments-1">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETACL2args {
    fhandle_t fh;
    u_int mask;
};
]]></sourcecode>
          </section>
          <section anchor="results-1">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETACL2resok {
    struct nfsfattr attr;
    secattr acl;
};

union GETACL2res switch (enum nfsstat status) {
case ACL2_OK:
    GETACL2resok resok;
default:
    void;
};
]]></sourcecode>
          </section>
          <section anchor="description-1">
            <name>DESCRIPTION</name>
            <t>The GETACL procedure retrieves Access Control List
information associated with the file system object
specified by the GETACL2args.fh field. The client
obtains this file handle using one of the NFS
version 2 LOOKUP, CREATE, MKDIR, or SYMLINK procedures,
or the MOUNT service, as described in <xref target="RFC1094"/>.</t>
            <t>The GETACL2args.mask field specifies which information
is to be returned in the response:</t>
            <ul spacing="normal">
              <li>
                <t>If the NA_ACL bit is set, the server fills in the
object's access ACL.</t>
              </li>
              <li>
                <t>If the NA_ACLCNT bit is set, the server fills in
the number of ACEs that are in the object's access ACL.</t>
              </li>
              <li>
                <t>If the NA_DFACL bit is set, the server fills in
the object's default ACL.</t>
              </li>
              <li>
                <t>if the NA_DFACLCNT bit is set, the server fills in
the number of ACEs that are in the object's default ACL.</t>
              </li>
            </ul>
            <t>If the GETACL procedure is successful, the server sets the
GETACL2res.status field to ACL2_OK. It fills in the
GETACL2resok.attr field with the file object's current
file attributes, as detailed in <xref target="RFC1094"/>. Lastly,
it fills in the GETACL2res.acl field with two counted
arrays of Access Control Entries (ACEs).</t>
            <t>Otherwise, GETACL2res.status contains an error status
on failure and no other results are returned.</t>
          </section>
          <section anchor="implementation-1">
            <name>IMPLEMENTATION</name>
            <t>When GETACL2args.fh represents a file object that does not currently
have an ACL associated with it or does not implement support
for ACLs, the server responds by returning a manufactured
minimal NFS ACL that reflects the current owner, group, and
mode bits of the object (see <xref target="acls-in-operation"/>).</t>
          </section>
          <section anchor="errors-1">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL2ERR_IO</t>
              </li>
              <li>
                <t>ACL2ERR_STALE</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="procedure-2-setacl-set-or-replace-an-access-control-list">
          <name>Procedure 2: SETACL - Set or replace an Access Control List</name>
          <section anchor="arguments-2">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct SETACL2args {
    fhandle_t fh;
    secattr acl;
};
]]></sourcecode>
          </section>
          <section anchor="results-2">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
struct SETACL2resok {
    struct nfsfattr attr;
};

union SETACL2res switch (enum nfsstat status) {
case ACL2_OK:
    SETACL2resok resok;
default:
    void;
};
]]></sourcecode>
          </section>
          <section anchor="description-2">
            <name>DESCRIPTION</name>
            <t>The SETACL procedure replaces the Access Control Lists
associated with the file system object specified by the
SETACL2args.fh field with the ACLs specified by the
SETACL2args.acl field.  The client obtains the file
handle using one of the NFS version 2 LOOKUP, CREATE,
MKDIR, SYMLINK procedures, or the MOUNT service, as
described in <xref target="RFC1094"/>.</t>
            <aside>
              <t>How are ACLs removed?</t>
            </aside>
            <t>If the SETACL procedure is successful, the server sets the
SETACL2res.status field to ACL2_OK and fills in the
SETACL2resok.attr field with the file object's new
file attributes, as detailed in <xref target="RFC1094"/>.</t>
            <t>Otherwise, SETACL2res.status contains an error status
on failure and no other results are returned.</t>
          </section>
          <section anchor="implementation-2">
            <name>IMPLEMENTATION</name>
            <t>On success, the server does not send the reply until
the ACL change is durable locally.</t>
            <t>Changing a file object's ACL changes the object's mtime.
The mtime change is reflected in the attributes returned
in the SETACL response.</t>
            <t>A high-quality server implementation ensures that a
GETACL procedure running concurrently with a SETACL
procedure does not return partially updated (torn)
ACL contents. However, a failed SETACL may partially
change a file's ACLs.</t>
            <t>When SETACL2args.fh represents a file object that does
not implement support for ACLs, or the new ACL does not
contain at least the minimal set of ACEs (as described
in <xref target="acls-in-operation"/>), the server responds by
setting SETACL2res.status to ACL2ERR_IO.</t>
          </section>
          <section anchor="errors-2">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL2ERR_ROFS</t>
              </li>
              <li>
                <t>ACL2ERR_PERM</t>
              </li>
              <li>
                <t>ACL2ERR_IO</t>
              </li>
              <li>
                <t>ACL2ERR_ACCES</t>
              </li>
              <li>
                <t>ACL2ERR_NOSPC</t>
              </li>
              <li>
                <t>ACL2ERR_DQUOT</t>
              </li>
              <li>
                <t>ACL2ERR_STALE</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="procedure-3-getattr-get-file-attributes">
          <name>Procedure 3: GETATTR - Get file attributes</name>
          <section anchor="arguments-3">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETATTR2args {
    fhandle_t fh;
};
]]></sourcecode>
          </section>
          <section anchor="results-3">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETATTR2resok {
    struct nfsfattr attr;
};

union GETATTR2res switch (enum nfsstat status) {
case ACL2_OK:
    GETATTR2resok resok;
default:
    void;
};
]]></sourcecode>
          </section>
          <section anchor="description-3">
            <name>DESCRIPTION</name>
            <t>The GETATTR procedure retrieves the current file
attributes associated with the file system object
specified by the GETATTR2args.fh field. The client
obtains this file handle using one of the NFS
version 2 LOOKUP, CREATE, MKDIR, SYMLINK procedures,
or the MOUNT service, as described in <xref target="RFC1094"/>.</t>
            <t>If the GETATTR procedure is successful, the server
sets the GETATTR2res.status field to ACL2_OK, and
fills in the GETATTR2resok.attr field with the file
object's current file attributes, as detailed in
<xref target="RFC1094"/>.</t>
            <t>Otherwise, GETATTR2res.status contains an error
status on failure and no other results are returned.</t>
          </section>
          <section anchor="implementation-3">
            <name>IMPLEMENTATION</name>
            <t>Refer to <xref section="2.3.5" sectionFormat="of" target="RFC1094"/> for details
about the content of the returned file attributes.</t>
          </section>
          <section anchor="errors-3">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL2ERR_IO</t>
              </li>
              <li>
                <t>ACL2ERR_STALE</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="procedure-4-access-check-access-permission">
          <name>Procedure 4: ACCESS - Check access permission</name>
          <section anchor="arguments-4">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct ACCESS2args {
    fhandle_t fh;
    uint32 access;
};
]]></sourcecode>
          </section>
          <section anchor="results-4">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
const ACCESS2_READ = 0x1;       /* read data or readdir a directory */
const ACCESS2_LOOKUP = 0x2;     /* lookup a name in a directory */
const ACCESS2_MODIFY = 0x4;     /* rewrite existing file data or */
                                /* modify existing directory entries */
const ACCESS2_EXTEND = 0x8;     /* write new data or add directory entries */
const ACCESS2_DELETE = 0x10;    /* delete existing directory entry */
const ACCESS2_EXECUTE = 0x20;   /* execute file (no meaning for a directory) */

struct ACCESS2resok {
    struct nfsfattr attr;
    uint32 access;
};

union ACCESS2res switch (enum nfsstat status) {
case ACL2_OK:
    ACCESS2resok resok;
default:
    void;
};
]]></sourcecode>
          </section>
          <section anchor="description-4">
            <name>DESCRIPTION</name>
            <t>The ACCESS procedure determines the access rights
that a user, as identified by the RPC credentials
in the request, has with respect to the file system
specified by the ACCESS2args.fh field. The client
obtains this file handle using one of the NFS
version 2 LOOKUP, CREATE, MKDIR, SYMLINK procedures,
or the MOUNT service, as described in <xref target="RFC1094"/>.
The client encodes the set of permissions that are
to be checked in the ACCESS2args.access field.</t>
            <t>The following access permissions may be requested:</t>
            <dl>
              <dt>ACCESS2_READ</dt>
              <dd>
                <t>Read data from file or read a directory.
ACCESS2_LOOKUP</t>
              </dd>
              <dt/>
              <dd>
                <t>Look up a name in a directory (no meaning for non-directory objects).
ACCESS2_MODIFY</t>
              </dd>
              <dt/>
              <dd>
                <t>Rewrite existing file data or modify existing directory entries.
ACCESS2_EXTEND</t>
              </dd>
              <dt/>
              <dd>
                <t>Write new data or add directory entries.
ACCESS2_DELETE</t>
              </dd>
              <dt/>
              <dd>
                <t>Delete an existing directory entry.
ACCESS2_EXECUTE</t>
              </dd>
              <dt/>
              <dd>
                <t>Execute file (no meaning for a directory).</t>
              </dd>
            </dl>
            <t>If the ACCESS procedure is successful, the server
sets the ACCESS2res.status field to ACL2_OK. It
fills in the ACCESS2resok.attr field with the file
object's current file attributes, as detailed in
<xref target="RFC1094"/>. Lastly, it encodes the set of
permissions that the requesting user is granted
in the ACCESS2resok.access field.</t>
          </section>
          <section anchor="implementation-4">
            <name>IMPLEMENTATION</name>
            <t>In the NFS version 2 protocol, the only reliable way to
determine whether an operation is allowed is to try it
and see if it succeeded or failed. Using the ACCESS
procedure in the NFS_ACL version 2 protocol, a client can
ask the server to indicate whether or not one or more
classes of operations are permitted.</t>
            <t>In general, it is not sufficient for a client to attempt
to deduce access permissions by inspecting the uid, gid,
and mode fields in the file attributes, since the server
may perform uid or gid mapping or enforce additional
access control restrictions. It is also possible that the
NFS version 2 protocol server may not be in the same ID
space as the NFS version 2 protocol client. In these cases,
the NFS version 2 protocol client can not reliably perform
an access check with only current file attributes.</t>
            <t>The information returned by the server in response to an
ACCESS call is advisory only. It was correct at the exact
time that the server performed the checks, but not
necessarily afterwards. The server can revoke access
permission to a file object at any time.</t>
            <t>The NFS_ACL version 2 protocol client should use the
effective credentials of the user to build the
authentication information in the ACCESS request used
to determine access rights. It is the effective user
and group credentials that are used in subsequent read
and write operations.</t>
            <t>Many implementations do not directly support the
ACCESS2_DELETE permission. Operating systems like UNIX
may ignore the ACCESS2_DELETE bit if set on an access
request on a non-directory object. In these systems,
delete permission on a file is determined by the access
permissions on the directory in which the file resides,
instead of being determined by the permissions of the file
itself.  Thus, the bit mask returned for such a request
will have the ACCESS3_DELETE bit set to 0, indicating that
the client does not have this permission.</t>
            <t>The server should return a status of ACL2_OK if no
errors occurred that prevented the server from making
the required access checks.</t>
          </section>
          <section anchor="errors-4">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL2ERR_IO</t>
              </li>
              <li>
                <t>ACL2ERR_STALE</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="procedure-5-getxattrdir-get-named-attribute-directory">
          <name>Procedure 5: GETXATTRDIR - Get named attribute directory</name>
          <section anchor="arguments-5">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETXATTRDIR2args {
    fhandle_t fh;
    bool create;
};
]]></sourcecode>
          </section>
          <section anchor="results-5">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETXATTRDIR2resok {
    fhandle_t fh;
    struct nfsfattr attr;
};

union GETXATTRDIR2res switch (enum nfsstat status) {
case ACL2_OK:
    GETXATTRDIR2resok resok;
default:
    void;
};
]]></sourcecode>
          </section>
          <section anchor="description-5">
            <name>DESCRIPTION</name>
            <t>The GETXATTRDIR procedure obtains the file handle of the named attribute
directory associated with the file handle in the GETXATTRDIR2args.fh
field.</t>
            <t>If the GETXATTRDIR procedure is successful, the server sets the
GETXATTRDIR2res.status field to ACL2_OK.
It fills in the GETXATTRDIR2resok.fh field with a file handle that
the client may use to look up the target file's named attributes.
It fills in the GETXATTRDIR2resok.attr field with the name attribute
directory's current file attributes, as detailed in <xref target="RFC1094"/>.</t>
            <t>Using the file handle returned in GETXATTRDIR2resok.fh, a client
can utilize the READDIR and LOOKUP procedures to obtain file handles
for the named attributes associated with the target file system object.</t>
            <t>If the target file object does not currently have a named attribute
directory associated with it and the GETXATTRDIR2args.create boolean
field is set to false, the server returns ACL2ERR_NOENT.
If the target file object does not currently have a named attribute
directory associated with it and the GETXATTRDIR2args.create boolean
field is set to true, the server attempts to create the named attribute
directory before returning a result.
If the target file currently has a named attribute directory
associated with it and the GETXATTRDIR2args.create boolean is set
to true, the server returns the file handle of that named attribute
directory.</t>
            <t>If the RPC user does not have read access to the target file, or
if the GETXATTRDIR operation is to create a named attribute directory
and the RPC user does not have permission to do so, the server returns
ACL2_ACCES in the GETXATTRDIR2.status field.</t>
            <t>If the target file handle designates an object not of type NFREG or
NFDIR, the server returns the value ACL2ERR_IO in the GETXATTRDIR2.status
field. Neither named attributes nor named attribute directories have
their own named attributes.</t>
            <t>Note: This operation is equivalent to the NFSv4 OPENATTR operation as
specified in <xref section="16.17" sectionFormat="of" target="RFC7530"/> and <xref section="18.17" sectionFormat="of" target="RFC8881"/>.</t>
          </section>
          <section anchor="implementation-5">
            <name>IMPLEMENTATION</name>
            <t>Server implementers are free to choose not to implement this procedure.
In this case, the server returns the RPC-level error PROC_UNAVAIL.</t>
            <t>If the server implementation does implement the GETXATTRDIR procedure
but the shared file system containing the target file object does not
support named attributes, the server returns ACL2ERR_IO in the
GETXATTRDIR2.status field.</t>
          </section>
          <section anchor="errors-5">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL2ERR_PERM</t>
              </li>
              <li>
                <t>ACL2ERR_NOENT</t>
              </li>
              <li>
                <t>ACL2ERR_IO</t>
              </li>
              <li>
                <t>ACL2ERR_ACCES</t>
              </li>
              <li>
                <t>ACL2ERR_NOSPC</t>
              </li>
              <li>
                <t>ACL2ERR_ROFS</t>
              </li>
              <li>
                <t>ACL2ERR_STALE</t>
              </li>
            </ul>
          </section>
        </section>
      </section>
    </section>
    <section anchor="nfsacl-version-3">
      <name>NFS_ACL Version 3</name>
      <t>Version 3 of the NFS_ACL protocol is used in conjunction only with
version 3 of the NFS protocol.</t>
      <section anchor="data-types-inherited-from-nfs-version-3">
        <name>Data types inherited from NFS version 3</name>
        <section anchor="scalar-data-types">
          <name>Scalar Data types</name>
          <t>These are defined in <xref section="2.5" sectionFormat="of" target="RFC1813"/>.</t>
          <sourcecode type="xdr"><![CDATA[
typedef unsigned hyper uint64;
]]></sourcecode>
          <sourcecode type="xdr"><![CDATA[
typedef unsigned long uint32;
]]></sourcecode>
          <sourcecode type="xdr"><![CDATA[
typedef uint64 fileid3;
]]></sourcecode>
          <sourcecode type="xdr"><![CDATA[
typedef uint32 uid3;
]]></sourcecode>
          <sourcecode type="xdr"><![CDATA[
typedef uint32 gid3;
]]></sourcecode>
          <sourcecode type="xdr"><![CDATA[
typedef uint64 size3;
]]></sourcecode>
          <sourcecode type="xdr"><![CDATA[
typedef uint32 mode3;
]]></sourcecode>
        </section>
        <section anchor="ftype3">
          <name>ftype3</name>
          <t>The enumeration "ftype3" represents the type of a file object.
This definition is further explained in <xref section="2.6" sectionFormat="of" target="RFC1813"/>.</t>
          <sourcecode type="xdr"><![CDATA[
enum ftype3 {
    NF3REG    = 1,
    NF3DIR    = 2,
    NF3BLK    = 3,
    NF3CHR    = 4,
    NF3LNK    = 5,
    NF3SOCK   = 6,
    NF3FIFO   = 7
};
]]></sourcecode>
        </section>
        <section anchor="specdata3">
          <name>specdata3</name>
          <sourcecode type="xdr"><![CDATA[
struct specdata3 {
    uint32     specdata1;
    uint32     specdata2;
};
]]></sourcecode>
          <t>The interpretation of the two words depends on the type of file
system object. For a block special (NF3BLK) or character special
(NF3CHR) file, specdata1 and specdata2 are the major and minor
device numbers, respectively. For all other file types, these
two elements should either be set to 0 or the values should be
agreed upon by the client and server.</t>
          <t>Further detail is available in <xref section="2.6" sectionFormat="of" target="RFC1813"/>.</t>
        </section>
        <section anchor="nfsfh3">
          <name>nfs_fh3</name>
          <t>The nfs_fh3 data type is a variable-length opaque object returned
by the NFS version 3 LOOKUP, CREATE, SYMLINK, MKNOD, LINK,
or READDIRPLUS procedures.
A client uses this handle during subsequent NFS operations
to reference the file. This definition comes from
<xref section="2.6" sectionFormat="of" target="RFC1813"/>.</t>
          <sourcecode type="xdr"><![CDATA[
NFS3_FHSIZE 64
]]></sourcecode>
          <t>The maximum size in bytes of the opaque file handle.</t>
          <sourcecode type="xdr"><![CDATA[
struct nfs_fh3 {
    opaque       data<NFS3_FHSIZE>;
};
]]></sourcecode>
          <t>To the client, a file handle is opaque. The client stores file
handles for use in a later request and can compare two file
handles from the same server for equality by doing a
byte-by-byte comparison, but cannot otherwise interpret the
contents of file handles. Further, if two file handles from the
same server are equal, they must refer to the same file, but if
they are not equal, no conclusions can be drawn.</t>
          <t>Servers may revoke access provided by a file handle at any
time. If the file handle passed in a call refers to a file
system object that no longer exists on the server or access for
that file handle has been revoked, the error, ACL3ERR_STALE,
is returned.</t>
        </section>
        <section anchor="nfstime3">
          <name>nfstime3</name>
          <t>NFS version 3's "nfstime3" structure represents the number of
seconds and nanoseconds since midnight January 1, 1970 Greenwich
Mean Time. Further details are in <xref section="2.6" sectionFormat="of" target="RFC1813"/>.</t>
          <sourcecode type="xdr"><![CDATA[
struct nfstime3 {
    uint32   seconds;
    uint32   nseconds;
};
]]></sourcecode>
        </section>
        <section anchor="nfsfattr3">
          <name>nfsfattr3</name>
          <t>This document refers to NFS version 3's file attribute structure
as "nfsfattr3". This is the same as the fattr3 structure described
in <xref section="2.6" sectionFormat="of" target="RFC1813"/>. A definition of the bit fields in
the "mode" element, which relate to traditional file system access
permissions, can also be found there.</t>
          <sourcecode type="xdr"><![CDATA[
struct fattr3 {
    ftype3     type;
    mode3      mode;
    uint32     nlink;
    uid3       uid;
    gid3       gid;
    size3      size;
    size3      used;
    specdata3  rdev;
    uint64     fsid;
    fileid3    fileid;
    nfstime3   atime;
    nfstime3   mtime;
    nfstime3   ctime;
};
]]></sourcecode>
        </section>
        <section anchor="postopattr">
          <name>post_op_attr</name>
          <t>The NFS version 3 "post_op_attr" data type returns file
attributes that are not directly involved in the requested
procedure. See <xref section="2.6" sectionFormat="of" target="RFC1813"/> for more
information.</t>
          <sourcecode type="xdr"><![CDATA[
union post_op_attr switch (bool attributes_follow) {
case TRUE:
    fattr3   attributes;
case FALSE:
    void;
};
]]></sourcecode>
          <t>The format of this data type appears to make returning file
attributes optional. However, server implementers are strongly
encouraged to make a best effort to return attributes whenever
possible, even when returning an error.</t>
        </section>
      </section>
      <section anchor="error-values">
        <name>Error Values</name>
        <t><xref section="2.5" sectionFormat="of" target="RFC1813"/> describes an enumerated type called
"nfsstat3" which provides a status code for NFS version 3 procedure
results.
A matching type called "aclstat3" is defined in this document
for the similar purpose of returning NFS_ACL version 3 procedure
status codes. The numeric values of these two types match up,
although aclstat3 omits some codes that are not relevant to the
NFS_ACL protocol.</t>
        <sourcecode type="xdr"><![CDATA[
enum aclstat3 {
    ACL3_OK             = 0,
    ACL3ERR_PERM        = 1,
    ACL3ERR_IO          = 5,
    ACL3ERR_ACCES       = 13,
    ACL3ERR_INVAL       = 22,
    ACL3ERR_NOSPC       = 28,
    ACL3ERR_ROFS        = 30,
    ACL3ERR_DQUOT       = 69,
    ACL3ERR_STALE       = 70,
    ACL3ERR_BADHANDLE   = 10001,
    ACL3ERR_NOTSUPP     = 10004,
    ACL3ERR_SERVERFAULT = 10006,
    ACL3ERR_JUKEBOX     = 10008
};
]]></sourcecode>
        <t>These status codes carry the following meanings:</t>
        <dl>
          <dt>ACL3_OK</dt>
          <dd>
            <t>Indicates the call completed successfully.</t>
          </dd>
          <dt>ACL3ERR_PERM</dt>
          <dd>
            <t>Not owner. The operation was not allowed because the caller is either not a privileged user (root) or not the owner of the target of the operation.</t>
          </dd>
          <dt>ACL3ERR_IO</dt>
          <dd>
            <t>I/O error. A hard error (for example, a disk error) occurred while processing the requested operation.</t>
          </dd>
          <dt>ACL3ERR_ACCES</dt>
          <dd>
            <t>Permission denied. The caller does not have the correct permission to perform the requested operation. Contrast this with NFS3ERR_PERM, which restricts itself to owner or privileged user permission failures.</t>
          </dd>
          <dt>ACL3ERR_INVAL</dt>
          <dd>
            <t>An invalid or unsupported argument was specified for procedure.</t>
          </dd>
          <dt>ACL3ERR_NOSPC</dt>
          <dd>
            <t>No space left on device. The operation would have caused the server's file system to exceed its limit.</t>
          </dd>
          <dt>ACL3ERR_ROFS</dt>
          <dd>
            <t>Read-only file system. A modifying operation was attempted on a read-only file system.</t>
          </dd>
          <dt>ACL3ERR_DQUOT</dt>
          <dd>
            <t>Resource (quota) hard limit exceeded. The user's resource limit on the server has been exceeded.</t>
          </dd>
          <dt>ACL3ERR_STALE</dt>
          <dd>
            <t>Invalid file handle. The file handle given in the arguments was invalid. The file referred to by that file handle no longer exists or access to it has been revoked.</t>
          </dd>
          <dt>ACL3ERR_BADHANDLE</dt>
          <dd>
            <t>Illegal NFS file handle. The file handle failed internal consistency checks.</t>
          </dd>
          <dt>ACL3ERR_NOTSUPP</dt>
          <dd>
            <t>Operation is not supported.</t>
          </dd>
          <dt>ACL3ERR_SERVERFAULT</dt>
          <dd>
            <t>An error occurred on the server which does not map to any of the legal NFS version 3 protocol error values.  The client should translate this into an appropriate error. UNIX clients may choose to translate this to EIO.</t>
          </dd>
          <dt>ACL3ERR_JUKEBOX</dt>
          <dd>
            <t>The server initiated the request, but was not able to complete it in a timely fashion. The client should wait and then try the request with a new RPC transaction ID. For example, this error should be returned from a server that supports hierarchical storage and receives a request to process a file that has been migrated. In this case, the server should start the immigration process and respond to client with this error.</t>
          </dd>
        </dl>
      </section>
      <section anchor="server-procedures-1">
        <name>Server Procedures</name>
        <section anchor="procedure-0-null-no-operation-1">
          <name>Procedure 0: NULL - No Operation</name>
          <section anchor="arguments-6">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
void;
]]></sourcecode>
          </section>
          <section anchor="results-6">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
void;
]]></sourcecode>
          </section>
          <section anchor="description-6">
            <name>DESCRIPTION</name>
            <t>This is the usual NULL procedure with a void argument and void result.</t>
          </section>
          <section anchor="implementation-6">
            <name>IMPLEMENTATION</name>
            <t>It is important that this procedure do no work at all so that clients
can use it to measure the overhead of processing a service request.
By convention, the NULL procedure should never require any
authentication.
A server implmentation may choose to ignore this convention, if
responding to the NULL procedure call acknowledges the existence
of a resource to an unauthenticated client.</t>
          </section>
          <section anchor="errors-6">
            <name>ERRORS</name>
            <t>Since the NULL procedure takes no argument and returns no
result, it can not return an NFS or NFS_ACL error status code.
However, some server implementations may return RPC errors
based on security or authentication policy settings.</t>
          </section>
        </section>
        <section anchor="procedure-1-getacl-retrieve-an-access-control-list-1">
          <name>Procedure 1: GETACL - Retrieve an Access Control List</name>
          <section anchor="arguments-7">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETACL3args {
    nfs_fh3 fh;
    u_int mask;
};
]]></sourcecode>
          </section>
          <section anchor="results-7">
            <name>RESULTS</name>
            <sourcecode type="xde"><![CDATA[
struct GETACL3resok {
    post_op_attr attr;
    secattr acl;
};

struct GETACL3resfail {
    post_op_attr attr;
};

union GETACL3res switch (nfsstat3 status) {
case ACL3_OK:
    GETACL3resok resok;
default:
    GETACL3resfail resfail;
};
]]></sourcecode>
          </section>
          <section anchor="description-7">
            <name>DESCRIPTION</name>
            <t>The GETACL procedure retrieves Access Control List
information associated with the file system object
specified by the GETACL3args.fh field. The client
obtains this file handle using one of the NFS
version 2 LOOKUP, CREATE, MKDIR, SYMLINK, MKNOD,
or READDIRPLUS procedures, or the MOUNT service,
as described in <xref target="RFC1813"/>.</t>
            <t>The GETACL3args.mask field specifies which information
is to be returned in the response:</t>
            <ul spacing="normal">
              <li>
                <t>If the NA_ACL bit is set, the server fills in the
object's access ACL.</t>
              </li>
              <li>
                <t>If the NA_ACLCNT bit is set, the server fills in
the number of ACEs that are in the object's access ACL.</t>
              </li>
              <li>
                <t>If the NA_DFACL bit is set, the server fills in
the object's default ACL.</t>
              </li>
              <li>
                <t>if the NA_DFACLCNT bit is set, the server fills in
the number of ACEs that are in the object's default ACL.</t>
              </li>
            </ul>
            <t>If the GETACL procedure is successful, the server sets the
GETACL3res.status field to ACL3_OK. It fills in the
GETACL3resok.attr field with the file object's post
operation file attributes, as detailed in <xref target="RFC1813"/>.
Lastly, it fills in the GETACL3res.acl field with two
counted arrays of Access Control Entries (ACEs).</t>
            <t>Otherwise, GETACL3res.status contains an error status
on failure and no other results are returned.</t>
          </section>
          <section anchor="implementation-7">
            <name>IMPLEMENTATION</name>
            <t>When GETACL3args.fh represents a file object that does
not currently have an ACL associated with it or does not
implement support for ACLs, the server responds by
returning a manufactured minimal NFS ACL that reflects
the current owner, group, and mode bits of the object
(see <xref target="acls-in-operation"/>).</t>
          </section>
          <section anchor="errors-7">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL3ERR_IO</t>
              </li>
              <li>
                <t>ACL3ERR_STALE</t>
              </li>
              <li>
                <t>ACL3ERR_BADHANDLE</t>
              </li>
              <li>
                <t>ACL3ERR_SERVERFAULT</t>
              </li>
              <li>
                <t>ACL3ERR_JUKEBOX</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="setacl-procedure">
          <name>SETACL Procedure</name>
          <section anchor="arguments-8">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct SETACL3args {
    nfs_fh3 fh;
    secattr acl;
};
]]></sourcecode>
          </section>
          <section anchor="results-8">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
struct SETACL3resok {
    post_op_attr attr;
};

struct SETACL3resfail {
    post_op_attr attr;
};

union SETACL3res switch (nfsstat3 status) {
case ACL3_OK:
    SETACL3resok resok;
default:
    SETACL3resfail resfail;
};
]]></sourcecode>
          </section>
          <section anchor="description-8">
            <name>DESCRIPTION</name>
            <t>The SETACL procedure replaces the Access Control Lists
associated with the file system object specified by the
SETACL3args.fh field with the ACLs specified by the
SETACL3args.acl field.  The client obtains the file
handle using one of the NFS version 3 LOOKUP, CREATE,
MKDIR, MKNOD, SYMLINK, or READDIRPLUS procedures, or
the MOUNT service, as described in <xref target="RFC1813"/>.</t>
            <aside>
              <t>How are ACLs removed?</t>
            </aside>
            <t>If the SETACL procedure is successful, the server sets
the SETACL3res.status field to ACL3_OK and fills in the
SETACL3resok.attr field with the file object's post
operation file attributes, as detailed in <xref target="RFC1813"/>.</t>
            <t>Otherwise, SETACL3res.status contains an error status
on failure and no other results are returned.</t>
          </section>
          <section anchor="implementation-8">
            <name>IMPLEMENTATION</name>
            <t>On success, the server does not send the reply until
the ACL change is durable locally.</t>
            <t>Changing a file object's ACL changes the object's mtime.
The mtime change is reflected in the attributes returned
in the SETACL response.</t>
            <t>A high-quality server implementation ensures that a
GETACL procedure running concurrently with a SETACL
procedure does not return partially updated (torn)
ACL contents. However, a failed SETACL may partially
change a file's ACLs.</t>
            <t>When SETACL3args.fh represents a file object that does
not implement support for ACLs, the server responds
by setting SETACL3res.status to ACL3ERR_NOTSUPP.</t>
            <t>When SETACL3args.acl does not contain at least the
minimal set of ACEs (as described in
<xref target="acls-in-operation"/>), the server responds by setting
SETACL3res.status to ACL3ERR_INVAL.</t>
          </section>
          <section anchor="errors-8">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL3ERR_PERM</t>
              </li>
              <li>
                <t>ACL3ERR_IO</t>
              </li>
              <li>
                <t>ACL3ERR_ACCES</t>
              </li>
              <li>
                <t>ACL3ERR_INVAL</t>
              </li>
              <li>
                <t>ACL3ERR_NOSPC</t>
              </li>
              <li>
                <t>ACL3ERR_ROFS</t>
              </li>
              <li>
                <t>ACL3ERR_DQUOT</t>
              </li>
              <li>
                <t>ACL3ERR_STALE</t>
              </li>
              <li>
                <t>ACL3ERR_BADHANDLE</t>
              </li>
              <li>
                <t>ACL3ERR_SERVERFAULT</t>
              </li>
              <li>
                <t>ACL3ERR_JUKEBOX</t>
              </li>
            </ul>
          </section>
        </section>
        <section anchor="procedure-3-getxattrdir-get-named-attribute-directory">
          <name>Procedure 3: GETXATTRDIR - Get named attribute directory</name>
          <section anchor="arguments-9">
            <name>ARGUMENTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETXATTRDIR3args {
    nfs_fh3 fh;
    bool create;
};
]]></sourcecode>
          </section>
          <section anchor="results-9">
            <name>RESULTS</name>
            <sourcecode type="xdr"><![CDATA[
struct GETXATTRDIR3resok {
    nfs_fh3 fh;
    post_op_attr attr;
};

union GETXATTRDIR3res switch (nfsstat3 status) {
case ACL3_OK:
    GETXATTRDIR3resok resok;
default:
    void;
};
]]></sourcecode>
          </section>
          <section anchor="description-9">
            <name>DESCRIPTION</name>
            <t>The GETXATTRDIR procedure obtains the file handle of the named attribute
directory associated with the file handle in the GETXATTRDIR3args.fh
field.</t>
            <t>If the GETXATTRDIR procedure is successful, the server sets the
GETXATTRDIR3res.status field to ACL3_OK.
It fills in the GETXATTRDIR3resok.fh field with a file handle that
the client may use to look up the target file's named attributes.
It fills in the GETXATTRDIR3resok.attr field with the name attribute
directory's current file attributes, as detailed in <xref target="RFC1813"/>.</t>
            <t>Using the file handle returned in GETXATTRDIR3resok.fh, a client
can utilize the READDIR and LOOKUP procedures to obtain file handles
for the named attributes associated with the target file system object.</t>
            <t>If the target file object does not currently have a named attribute
directory associated with it and the GETXATTRDIR3args.create boolean
field is set to false, the server returns ACL3ERR_NOENT.
If the target file object does not currently have a named attribute
directory associated with it and the GETXATTRDIR3args.create boolean
field is set to true, the server attempts to create the named attribute
directory before returning a result.
If the target file currently has a named attribute directory
associated with it and the GETXATTRDIR3args.create boolean is set
to true, the server returns the file handle of that named attribute
directory.</t>
            <t>If the RPC user does not have read access to the target file, or
if the GETXATTRDIR operation is to create a named attribute directory
and the RPC user does not have permission to do so, the server returns
ACL3_ACCES in the GETXATTRDIR3.status field.</t>
            <t>If the target file handle designates an object not of type NF3REG or
NF3DIR, the server returns the value ACL3ERR_INVAL in the
GETXATTRDIR3.status field. Neither named attributes nor named attribute
directories have their own named attributes.</t>
            <t>Note: This operation is equivalent to the NFSv4 OPENATTR operation as
specified in <xref section="16.17" sectionFormat="of" target="RFC7530"/> and <xref section="18.17" sectionFormat="of" target="RFC8881"/>.</t>
          </section>
          <section anchor="implementation-9">
            <name>IMPLEMENTATION</name>
            <t>Server implementers are free to choose not to implement this procedure.
In this case, the server returns the RPC-level error PROC_UNAVAIL.</t>
            <t>If the server implementation does implement the GETXATTRDIR procedure
but the shared file system containing the target file object does not
support named attributes, the server returns ACL3ERR_NOTSUPP in the
GETXATTRDIR3.status field.</t>
          </section>
          <section anchor="errors-9">
            <name>ERRORS</name>
            <ul spacing="normal">
              <li>
                <t>ACL3ERR_PERM</t>
              </li>
              <li>
                <t>ACL3ERR_NOENT</t>
              </li>
              <li>
                <t>ACL3ERR_IO</t>
              </li>
              <li>
                <t>ACL3ERR_ACCES</t>
              </li>
              <li>
                <t>ACL3ERR_INVAL</t>
              </li>
              <li>
                <t>ACL3ERR_NOSPC</t>
              </li>
              <li>
                <t>ACL3ERR_ROFS</t>
              </li>
              <li>
                <t>ACL3ERR_STALE</t>
              </li>
              <li>
                <t>ACL3ERR_NOTSUPP</t>
              </li>
              <li>
                <t>ACL3ERR_SERVERFAULT</t>
              </li>
              <li>
                <t>ACL3ERR_JUKEBOX</t>
              </li>
            </ul>
          </section>
        </section>
      </section>
    </section>
    <section anchor="implementation-issues">
      <name>Implementation Issues</name>
      <section anchor="permission-issues">
        <name>Permission issues</name>
        <t>The NFS protocol, strictly speaking, does not
define the permission checking used by NFS servers. However, it
is expected that an NFS server will do normal operating system
permission checking using AUTH_UNIX style authentication as
the basis of its protection mechanism, or another stronger
form of authentication such as RPCSEC_GSS. With
AUTH_UNIX authentication, the server gets the client's
effective uid, effective gid, and groups on each call and
uses them to check permission. These are the so-called UNIX
credentials.</t>
        <t>Using uid and gid implies that the client and server share
the same uid list. Every server and client pair must have the
same mapping from user to uid and from group to gid. Since
every client can also be a server, this tends to imply that
the whole network shares the same uid/gid space. If this is
not the case, then it usually falls upon the server to
perform some custom mapping of credentials from one
authentication domain into another. A discussion of
techniques for managing a shared user space or for providing
mechanisms for user ID mapping is beyond the scope of this
specification.</t>
        <t>In POSIX-based operating systems, a particular user (on UNIX, the
uid 0) has access to all files, no matter what permission and
ownership they have. This superuser permission may not be
allowed on the server, since anyone who can become superuser
on their client could gain access to all remote files. A
POSIX-based NFS server by default maps uid 0 to a distinguished
value (for instance, UID_NOBODY), as well as mapping the groups
list, before doing its access checking. A server implementation
may provide a mechanism to change this mapping.</t>
      </section>
      <section anchor="duplicate-request-cache">
        <name>Duplicate Request Cache</name>
        <t>The typical NFS protocol failure recovery model
uses client time-out and retry to handle server crashes,
network partitions, and lost server replies. A retried
request is referred to as a duplicate of the original.</t>
        <t>When used in a file server context, the term idempotent can
be used to distinguish between operation types. An idempotent
request is one that a server can perform more than once with
equivalent results (though it may in fact change, as a side
effect, the access time on a file, say for READ). Some NFS
operations are obviously non-idempotent. They cannot be
reprocessed without special attention simply because they may
fail if tried a second time. A CREATE request, for example,
can be used to create a file for which the owner does not
have write permission. A duplicate of this request cannot
succeed if the original succeeded. Likewise, a file can be
removed only once.</t>
        <t>The side effects caused by performing a duplicate
non-idempotent request can be destructive. A duplicate
file truncation can result in lost writes. It is the
inherent stateless design of the NFS protocol on top
of an unreliable RPC transport that yields the
possibility of destructive replays of non-idempotent
requests. Even in an implementation of the NFS protocol
over a reliable connection-oriented transport,
a connection break with automatic reestablishment
requires duplicate request processing: the client
retransmits requests that were pending before the
connection loss, and the server needs to recognize
and deal with potential duplicate non-idempotent requests.</t>
        <t>Most NFS server implementations maintain a cache of
recent requests, called the duplicate request cache,
for recognizing duplicate non-idempotent requests. If
the server receives a request and recognizes it as a
duplicate of a recently completed request, the server
returns the original completion status instead of
processing the duplicate request again.</t>
        <t>A description of an early implementation of a
duplicate request cache can be found in <xref target="Juszczak"/>.</t>
        <t>For all versions of the NFS_ACL protocol, the SETACL
procedure is considered to be non-idempotent.</t>
      </section>
      <section anchor="caching-policies">
        <name>Caching Policies</name>
        <t>The NFS protocol does not define a policy for
caching on the client or server. In particular, there is no
support for strict cache consistency between a client and
server, nor between different clients.</t>
        <t>The NFS_ACL protocol does not mandate a specific caching
policy for ACLs or information retrieved via the ACCESS
procedure. However, a high-quality client implementation
that seeks good performance might choose to revalidate
cached access control information with the same regularity
that it invalidates normal file attributes.</t>
      </section>
    </section>
    <section anchor="xdr-protocol-definition">
      <name>XDR Protocol Definition</name>
      <t>This section contains a description of the core features of the
NFS_ACL protocol, version 2 and 3, expressed in the XDR language
<xref target="RFC4506"/>.</t>
      <t>This description is provided in a way that makes it simple to
extract into ready-to-compile form.  The reader can apply the
following shell script to this document to produce a
machine-readable XDR description of the NFS_ACL protocol.</t>
      <sourcecode type="sh"><![CDATA[
#!/bin/sh
grep '^ *///' | sed 's?^ /// ??' | sed 's?^ *///$??'
]]></sourcecode>
      <t>That is, if the above script is stored in a file called
"extract.sh" and this document is in a file called "spec.txt",
then the reader can do the following to extract an XDR
description file:</t>
      <sourcecode type="sh"><![CDATA[
sh extract.sh < spec.txt > nfs_acl.x
]]></sourcecode>
      <section anchor="code-component-license">
        <name>Code Component License</name>
        <t>Code components extracted from this document must include
the following license text.  When the extracted XDR code
is combined with other complementary XDR code which itself
has an identical license, only a single copy of the license
text need be preserved.</t>
        <sourcecode type="xdr"><![CDATA[
/// /*
///  * Copyright (c) 2024 IETF Trust and the persons
///  * identified as authors of the code.  All rights reserved.
///  *
///  * The authors of the code are:
///  * Oracle
///  *
///  * Redistribution and use in source and binary forms, with
///  * or without modification, are permitted provided that the
///  * following conditions are met:
///  *
///  * - Redistributions of source code must retain the above
///  *   copyright notice, this list of conditions and the
///  *   following disclaimer.
///  *
///  * - Redistributions in binary form must reproduce the above
///  *   copyright notice, this list of conditions and the
///  *   following disclaimer in the documentation and/or other
///  *   materials provided with the distribution.
///  *
///  * - Neither the name of Internet Society, IETF or IETF
///  *   Trust, nor the names of specific contributors, may be
///  *   used to endorse or promote products derived from this
///  *   software without specific prior written permission.
///  *
///  *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS
///  *   AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED
///  *   WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
///  *   IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
///  *   FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO
///  *   EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
///  *   LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
///  *   EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
///  *   NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
///  *   SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
///  *   INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
///  *   LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
///  *   OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
///  *   IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
///  *   ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
///  */
///
/// const NFS_ACL_MAX_ENTRIES = 1024;
///
/// typedef int uid;
/// typedef unsigned short o_mode;
///
/// /*
///  * This is the format of an ACL which is passed over the network.
///  */
/// struct aclent {
///     int type;
///     uid id;
///     o_mode perm;
/// };
///
/// /*
///  * The values for the type element of the aclent structure.
///  */
/// const NA_USER_OBJ = 0x1;            /* object owner */
/// const NA_USER = 0x2;                /* additional users */
/// const NA_GROUP_OBJ = 0x4;           /* owning group of the object */
/// const NA_GROUP = 0x8;               /* additional groups */
/// const NA_CLASS_OBJ = 0x10;          /* file group class and mask entry */
/// const NA_OTHER_OBJ = 0x20;          /* other entry for the object */
/// const NA_ACL_DEFAULT = 0x1000;      /* default flag */
///
/// /*
///  * The bit field values for the perm element of the aclent
///  * structure.  The three values can be combined to form any
///  * of the 8 combinations.
///  */
/// const NA_READ = 0x4;                /* read permission */
/// const NA_WRITE = 0x2;               /* write permission */
/// const NA_EXEC = 0x1;                /* exec permission */
///
/// /*
///  * This is the structure which contains the ACL entries for a
///  * particular entity.  It contains the ACL entries which apply
///  * to this object plus any default ACL entries which are
///  * inherited by its children.
///  *
///  * The values for the mask field are defined below.
///  */
/// struct secattr {
///     u_int mask;
///     int aclcnt;
///     aclent aclent<NFS_ACL_MAX_ENTRIES>;
///     int dfaclcnt;
///     aclent dfaclent<NFS_ACL_MAX_ENTRIES>;
/// };
///
/// /*
///  * The values for the mask element of the secattr struct as well
///  * as for the mask element in the arguments in the GETACL2 and
///  * GETACL3 procedures.
///  */
/// const NA_ACL = 0x1;                 /* aclent contains a valid list */
/// const NA_ACLCNT = 0x2;              /* number of entries in the aclent list */
/// const NA_DFACL = 0x4;               /* dfaclent contains a valid list */
/// const NA_DFACLCNT = 0x8;            /* number of entries in the dfaclent list */
///
/// /*
///  * XDR data types inherited from the NFS version 2 protocol
///  */
///
/// enum ftype {
///     NFNON = 0,
///     NFREG = 1,
///     NFDIR = 2,
///     NFBLK = 3,
///     NFCHR = 4,
///     NFLNK = 5,
/// };
///
/// typedef opaque fhandle[FHSIZE];
///
/// struct timeval {
///     unsigned int seconds;
///     unsigned int useconds;
/// };
///
/// struct fattr {
///     ftype        type;
///     unsigned int mode;
///     unsigned int nlink;
///     unsigned int uid;
///     unsigned int gid;
///     unsigned int size;
///     unsigned int blocksize;
///     unsigned int rdev;
///     unsigned int blocks;
///     unsigned int fsid;
///     unsigned int fileid;
///     timeval      atime;
///     timeval      mtime;
///     timeval      ctime;
/// };
///
/// /*
///  * ACL error codes; the numeric values match codes with the same
///  * name used in NFS version 2.
///  */
/// enum aclstat2 {
///     ACL2_OK = 0,
///     ACL2ERR_PERM = 1,
///     ACL2ERR_NOENT = 2,
///     ACL2ERR_IO = 5,
///     ACL2ERR_ACCES = 13,
///     ACL2ERR_NOSPC = 28,
///     ACL2ERR_ROFS = 30,
///     ACL2ERR_DQUOT = 69,
///     ACL2ERR_STALE = 70,
/// };
///
/// /*
///  * NFS_ACL version 2 procedure arguments and results
///  */
///
/// struct GETACL2args {
///     fhandle_t fh;
///     u_int mask;
/// };
///
/// struct GETACL2resok {
///     struct nfsfattr attr;
///     secattr acl;
/// };
///
/// union GETACL2res switch (enum nfsstat status) {
/// case ACL2_OK:
///     GETACL2resok resok;
/// default:
///     void;
/// };
///
/// struct SETACL2args {
///     fhandle_t fh;
///     secattr acl;
/// };
///
/// struct SETACL2resok {
///     struct nfsfattr attr;
/// };
///
/// union SETACL2res switch (enum nfsstat status) {
/// case ACL2_OK:
///     SETACL2resok resok;
/// default:
///     void;
/// };
///
/// struct GETATTR2args {
///     fhandle_t fh;
/// };
///
/// struct GETATTR2resok {
///     struct nfsfattr attr;
/// };
///
/// union GETATTR2res switch (enum nfsstat status) {
/// case ACL2_OK:
///     GETATTR2resok resok;
/// default:
///     void;
/// };
///
/// struct ACCESS2args {
///     fhandle_t fh;
///     uint32 access;
/// };
///
/// const ACCESS2_READ = 0x1;           /* read data or readdir a directory */
/// const ACCESS2_LOOKUP = 0x2;         /* lookup a name in a directory */
/// const ACCESS2_MODIFY = 0x4;         /* rewrite existing file data or */
///                                     /* modify existing directory entries */
/// const ACCESS2_EXTEND = 0x8;         /* write new data or add directory entries */
/// const ACCESS2_DELETE = 0x10;        /* delete existing directory entry */
/// const ACCESS2_EXECUTE = 0x20;       /* execute file (no meaning for a directory) */
///
/// struct ACCESS2resok {
///     struct nfsfattr attr;
///     uint32 access;
/// };
///
/// union ACCESS2res switch (enum nfsstat status) {
/// case ACL2_OK:
///     ACCESS2resok resok;
/// default:
///     void;
/// };
///
/// /*
///  * This is the definition for the GETXATTRDIR procedure which applies
///  * to NFS Version 2 files.
///  */
/// struct GETXATTRDIR2args {
///     fhandle_t fh;
///     bool create;
/// };
///
/// struct GETXATTRDIR2resok {
///     fhandle_t fh;
///     struct nfsfattr attr;
/// };
///
/// union GETXATTRDIR2res switch (enum nfsstat status) {
/// case ACL2_OK:
///     GETXATTRDIR2resok resok;
/// default:
///     void;
/// };
///
/// /*
///  * XDR data types inherited from the NFS version 3 protocol
///  */
///
/// typedef unsigned hyper uint64;
/// typedef unsigned long uint32;
/// typedef uint64 fileid3;
/// typedef uint32 uid3;
/// typedef uint32 gid3;
/// typedef uint64 size3;
/// typedef uint32 mode3;
///
/// enum ftype3 {
///     NF3REG    = 1,
///     NF3DIR    = 2,
///     NF3BLK    = 3,
///     NF3CHR    = 4,
///     NF3LNK    = 5,
///     NF3SOCK   = 6,
///     NF3FIFO   = 7
/// };
///
/// struct specdata3 {
///     uint32     specdata1;
///     uint32     specdata2;
/// };
///
/// const NFS3_FHSIZE = 64;
///
/// struct nfs_fh3 {
///     opaque       data<NFS3_FHSIZE>;
/// };
///
/// struct nfstime3 {
///     uint32   seconds;
///     uint32   nseconds;
/// };
///
/// struct fattr3 {
///     ftype3     type;
///     mode3      mode;
///     uint32     nlink;
///     uid3       uid;
///     gid3       gid;
///     size3      size;
///     size3      used;
///     specdata3  rdev;
///     uint64     fsid;
///     fileid3    fileid;
///     nfstime3   atime;
///     nfstime3   mtime;
///     nfstime3   ctime;
/// };
///
/// union post_op_attr switch (bool attributes_follow) {
/// case TRUE:
///     fattr3   attributes;
/// case FALSE:
///     void;
/// };
///
/// /*
///  * ACL error codes; the numeric values match codes with the same
///  * name used in NFS version 3.
///  */
/// enum aclstat3 {
///     ACL3_OK = 0,
///     ACL3ERR_PERM = 1,
///     ACL33ERR_NOENT = 2,
///     ACL3ERR_IO = 5,
///     ACL3ERR_ACCES = 13,
///     ACL3ERR_INVAL = 22,
///     ACL3ERR_NOSPC = 28,
///     ACL3ERR_ROFS = 30,
///     ACL3ERR_DQUOT = 69,
///     ACL3ERR_STALE = 70,
///     ACL3ERR_BADHANDLE = 10001,
///     ACL3ERR_NOTSUPP = 10004,
///     ACL3ERR_SERVERFAULT = 10006,
///     ACL3ERR_JUKEBOX = 10008,
/// };
///
/// /*
///  * NFS_ACL version 3 procedure arguments and results
///  */
///
/// struct GETACL3args {
///     nfs_fh3 fh;
///     u_int mask;
/// };
///
/// struct GETACL3resok {
///     post_op_attr attr;
///     secattr acl;
/// };
///
/// struct GETACL3resfail {
///     post_op_attr attr;
/// };
///
/// union GETACL3res switch (nfsstat3 status) {
/// case ACL3_OK:
///     GETACL3resok resok;
/// default:
///     GETACL3resfail resfail;
/// };
///
/// struct SETACL3args {
///     nfs_fh3 fh;
///     secattr acl;
/// };
///
/// struct SETACL3resok {
///     post_op_attr attr;
/// };
///
/// struct SETACL3resfail {
///     post_op_attr attr;
/// };
///
/// union SETACL3res switch (nfsstat3 status) {
/// case ACL3_OK:
///     SETACL3resok resok;
/// default:
///     SETACL3resfail resfail;
/// };
///
/// /*
///  * This is the definition for the GETXATTRDIR procedure which
///  * applies to NFS Version 3 files.
///  */
/// struct GETXATTRDIR3args {
///     nfs_fh3 fh;
///     bool create;
/// };
///
/// struct GETXATTRDIR3resok {
///     nfs_fh3 fh;
///     post_op_attr attr;
/// };
///
/// union GETXATTRDIR3res switch (nfsstat3 status) {
/// case ACL3_OK:
///     GETXATTRDIR3resok resok;
/// default:
///     void;
/// };
///
/// /*
///  * Share the port with the NFS service.
///  */
/// const NFS_ACL_PORT = 2049;
///
/// program NFS_ACL_PROGRAM {
///     version NFS_ACL_V2 {
///         void
///             ACLPROC2_NULL(void) = 0;
///         GETACL2res
///             ACLPROC2_GETACL(GETACL2args) = 1;
///         SETACL2res
///             ACLPROC2_SETACL(SETACL2args) = 2;
///         GETATTR2res
///             ACLPROC2_GETATTR(GETATTR2args) = 3;
///         ACCESS2res
///             ACLPROC2_ACCESS(ACCESS2args) = 4;
///         GETXATTRDIR2res
///             ACLPROC2_GETXATTRDIR(GETXATTRDIR2args) = 5;
///     } = 2;
///     version NFS_ACL_V3 {
///         void
///             ACLPROC3_NULL(void) = 0;
///         GETACL3res
///             ACLPROC3_GETACL(GETACL3args) = 1;
///         SETACL3res
///             ACLPROC3_SETACL(SETACL3args) = 2;
///         GETXATTRDIR3res
///             ACLPROC3_GETXATTRDIR(GETXATTRDIR3args) = 3;
///     } = 3;
/// } = 100227;
]]></sourcecode>
      </section>
    </section>
    <section anchor="implementation-status">
      <name>Implementation Status</name>
      <aside>
        <t>This section is to be removed before publishing this document as an RFC.</t>
      </aside>
      <t>This section records the status of known implementations of the
protocol defined by this specification at the time of posting of this
Internet-Draft, and is based on a proposal described in
<xref target="RFC7942"/>. The description of implementations in this section is
intended to assist the IETF in its decision processes in progressing
drafts to RFCs.</t>
      <t>Please note that the listing of any individual implementation here
does not imply endorsement by the IETF. Furthermore, no effort has
been spent to verify the information presented here that was supplied
by IETF contributors. This is not intended as, and must not be
construed to be, a catalog of available implementations or their
features. Readers are advised to note that other implementations may
exist.</t>
      <section anchor="solaris-nfs-server-and-client">
        <name>Solaris NFS server and client</name>
        <t>Organization: Oracle</t>
        <t>URL:       <eref target="https://www.oracle.com">https://www.oracle.com</eref></t>
        <t>Maturity:  Complete.</t>
        <t>Coverage:  All procedures are implemented.</t>
        <t>Licensing: CDDL</t>
        <t>Implementation experience:</t>
      </section>
      <section anchor="linux-nfs-server-and-client">
        <name>Linux NFS server and client</name>
        <t>Organization:  The Linux Foundation</t>
        <t>URL:       <eref target="https://www.kernel.org">https://www.kernel.org</eref></t>
        <t>Maturity:  Complete.</t>
        <t>Coverage:  All procedures except GETXATTRDIR are implemented in
           both versions of the protocol.</t>
        <t>Licensing: GPLv2</t>
        <t>Implementation experience:  The initial Linux implementation
of the NFS_ACL protocol is described in <xref target="Gruenbacher"/>, and
subsequent modifications can be found in the Linux kernel
source code repository <xref target="Linux"/>.</t>
        <t><xref target="Gruenbacher"/> notes several minor differences between the
Linux and Solaris implementations of ACLs, and remarks that:
&gt; Solaris ACLs are based on an earlier draft of POSIX 1003.1e,
&gt; so its handling of the mask ACL entry is slightly different
&gt; than in draft 17 for ACLs with only four ACL entries. This
&gt; is a corner case that occurs only rarely, so the semantic
&gt; differences may not be noticeable.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>An attacker can alter the content of an ACL as it transits
an open network, giving the attacker access to file content
that the ACL is supposed to protect.</t>
      <t>Therefore, implementations of NFS_ACL should protect the
integrity of ACL content when it transits a network. The
use of an integrity-preserving transport layer security
service, such as the GSS Kerberos integrity service, is
strongly recommended.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>In accordance with <xref section="13" sectionFormat="of" target="RFC5531"/>, the editor
requests that IANA update the entry for the NFS ACL
service in the RPC Program Numbers registry to add
the current document as a Reference.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4506">
          <front>
            <title>XDR: External Data Representation Standard</title>
            <author fullname="M. Eisler" initials="M." role="editor" surname="Eisler"/>
            <date month="May" year="2006"/>
            <abstract>
              <t>This document describes the External Data Representation Standard (XDR) protocol as it is currently deployed and accepted. This document obsoletes RFC 1832. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="STD" value="67"/>
          <seriesInfo name="RFC" value="4506"/>
          <seriesInfo name="DOI" value="10.17487/RFC4506"/>
        </reference>
        <reference anchor="RFC5531">
          <front>
            <title>RPC: Remote Procedure Call Protocol Specification Version 2</title>
            <author fullname="R. Thurlow" initials="R." surname="Thurlow"/>
            <date month="May" year="2009"/>
            <abstract>
              <t>This document describes the Open Network Computing (ONC) Remote Procedure Call (RPC) version 2 protocol as it is currently deployed and accepted. This document obsoletes RFC 1831. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5531"/>
          <seriesInfo name="DOI" value="10.17487/RFC5531"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7942">
          <front>
            <title>Improving Awareness of Running Code: The Implementation Status Section</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="A. Farrel" initials="A." surname="Farrel"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>This document describes a simple process that allows authors of Internet-Drafts to record the status of known implementations by including an Implementation Status section. This will allow reviewers and working groups to assign due consideration to documents that have the benefit of running code, which may serve as evidence of valuable experimentation and feedback that have made the implemented protocols more mature.</t>
              <t>This process is not mandatory. Authors of Internet-Drafts are encouraged to consider using the process for their documents, and working groups are invited to think about applying the process to all of their protocol specifications. This document obsoletes RFC 6982, advancing it to a Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="205"/>
          <seriesInfo name="RFC" value="7942"/>
          <seriesInfo name="DOI" value="10.17487/RFC7942"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC1094">
          <front>
            <title>NFS: Network File System Protocol specification</title>
            <author fullname="B. Nowicki" initials="B." surname="Nowicki"/>
            <date month="March" year="1989"/>
            <abstract>
              <t>This RFC describes a protocol that Sun Microsystems, Inc., and others are using. A new version of the protocol is under development, but others may benefit from the descriptions of the current protocol, and discussion of some of the design issues.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1094"/>
          <seriesInfo name="DOI" value="10.17487/RFC1094"/>
        </reference>
        <reference anchor="RFC1813">
          <front>
            <title>NFS Version 3 Protocol Specification</title>
            <author fullname="B. Callaghan" initials="B." surname="Callaghan"/>
            <author fullname="B. Pawlowski" initials="B." surname="Pawlowski"/>
            <author fullname="P. Staubach" initials="P." surname="Staubach"/>
            <date month="June" year="1995"/>
            <abstract>
              <t>This paper describes the NFS version 3 protocol. This paper is provided so that people can write compatible implementations. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1813"/>
          <seriesInfo name="DOI" value="10.17487/RFC1813"/>
        </reference>
        <reference anchor="RFC7530">
          <front>
            <title>Network File System (NFS) Version 4 Protocol</title>
            <author fullname="T. Haynes" initials="T." role="editor" surname="Haynes"/>
            <author fullname="D. Noveck" initials="D." role="editor" surname="Noveck"/>
            <date month="March" year="2015"/>
            <abstract>
              <t>The Network File System (NFS) version 4 protocol is a distributed file system protocol that builds on the heritage of NFS protocol version 2 (RFC 1094) and version 3 (RFC 1813). Unlike earlier versions, the NFS version 4 protocol supports traditional file access while integrating support for file locking and the MOUNT protocol. In addition, support for strong security (and its negotiation), COMPOUND operations, client caching, and internationalization has been added. Of course, attention has been applied to making NFS version 4 operate well in an Internet environment.</t>
              <t>This document, together with the companion External Data Representation (XDR) description document, RFC 7531, obsoletes RFC 3530 as the definition of the NFS version 4 protocol.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7530"/>
          <seriesInfo name="DOI" value="10.17487/RFC7530"/>
        </reference>
        <reference anchor="RFC8881">
          <front>
            <title>Network File System (NFS) Version 4 Minor Version 1 Protocol</title>
            <author fullname="D. Noveck" initials="D." role="editor" surname="Noveck"/>
            <author fullname="C. Lever" initials="C." surname="Lever"/>
            <date month="August" year="2020"/>
            <abstract>
              <t>This document describes the Network File System (NFS) version 4 minor version 1, including features retained from the base protocol (NFS version 4 minor version 0, which is specified in RFC 7530) and protocol extensions made subsequently. The later minor version has no dependencies on NFS version 4 minor version 0, and is considered a separate protocol.</t>
              <t>This document obsoletes RFC 5661. It substantially revises the treatment of features relating to multi-server namespace, superseding the description of those features appearing in RFC 5661.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8881"/>
          <seriesInfo name="DOI" value="10.17487/RFC8881"/>
        </reference>
        <reference anchor="Gruenbacher">
          <front>
            <title>POSIX Access Control Lists on Linux</title>
            <author initials="A." surname="Grünbacher" fullname="Andreas Grünbacher">
              <organization>SuSE Labs</organization>
            </author>
            <date year="2003" month="January"/>
          </front>
          <seriesInfo name="Proceedings" value="of the FREENIX Track: 2003 USENIX Annual Technical Conference, pp. 259-272"/>
          <seriesInfo name="ISBN" value="1-931971-11-0"/>
        </reference>
        <reference anchor="Juszczak">
          <front>
            <title>Improving the Performance and Correctness of an NFS Server</title>
            <author initials="C." surname="Juszcak" fullname="Chet Juszcak">
              <organization>Digital Equipment Corporation</organization>
            </author>
            <date year="1989" month="January"/>
          </front>
          <seriesInfo name="USENIX" value="Conference Proceedings, USENIX Association, Berkeley, CA, pp. 53-63"/>
        </reference>
        <reference anchor="IEEE">
          <front>
            <title>IEEE 1003.1e and 1003.2c: Draft Standard for Information Technology-- Portable Operating System Interface (POSIX)-- Part 1: System Application Program Interface (API) and Part 2: Shell and Utilities, draft 17</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="1997" month="January"/>
          </front>
        </reference>
        <reference anchor="POSIX">
          <front>
            <title>IEEE Std 1003.1-2001 (Open Group Technical Standard, Issue 6), Standard for Information Technology-- Portable Operating System Interface (POSIX)</title>
            <author>
              <organization>Institute of Electrical and Electronics Engineers</organization>
            </author>
            <date year="2001"/>
          </front>
          <seriesInfo name="ISBN" value="0-7381-3010-9"/>
        </reference>
        <reference anchor="Linux" target="https://www.kernel.org">
          <front>
            <title>Linux kernel source code</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="OpenSolaris" target="https://github.com/kofemann/opensolaris">
          <front>
            <title>Archived OpenSolaris source code</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC1833">
          <front>
            <title>Binding Protocols for ONC RPC Version 2</title>
            <author fullname="R. Srinivasan" initials="R." surname="Srinivasan"/>
            <date month="August" year="1995"/>
            <abstract>
              <t>This document describes the binding protocols used in conjunction with the ONC Remote Procedure Call (ONC RPC Version 2) protocols. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="1833"/>
          <seriesInfo name="DOI" value="10.17487/RFC1833"/>
        </reference>
      </references>
    </references>
    <?line 2427?>

<section anchor="source-material">
      <name>Source Material</name>
      <t>The on-the-wire protocol described here is intended to
match existing de factor implementations of NFS_ACL.</t>
      <t>The source for the XDR specification provided in this
document is the nfs_acl.x file as found in published
versions of the OpenSolaris source code base <xref target="OpenSolaris"/>,
an open source descendant of Solaris.</t>
      <t>However, there are a few changes to the protocol as it
was originally described in the OpenSolaris source code
base.</t>
      <section anchor="redaction-of-nfsacl-version-4">
        <name>Redaction of NFS_ACL Version 4</name>
        <t>Version 4 of NFS_ACL is described in the original nfs_acl.x source
file is described this way:</t>
        <ul empty="true">
          <li>
            <t>This is a transitional interface to enable Solaris NFSv4
clients to manipulate ACLs on Solaris servers until the
spec is complete enough to implement this inside the
NFSv4 protocol itself.  NFSv4 does handle extended
attributes in-band.</t>
          </li>
        </ul>
        <t>Because the two non-NULL procedures in this version of the NFS_ACL
protocol were used only as part of a Solaris a prototype and there
are no other implementations of NFS_ACL version 4, it is not included
in the protocol description appearing in this document.</t>
      </section>
      <section anchor="extension-of-nfsacl">
        <name>Extension of NFS_ACL</name>
        <aside>
          <t>Perhaps this document should provide rules for extending the
NFS_ACL protocol, in case some other implementation wishes to
provide additional operations.</t>
        </aside>
      </section>
      <section anchor="code-compilation-requirements">
        <name>Code Compilation Requirements</name>
        <t>The original nfs_acl.x file that appears in the OpenSolaris code
base did not compile using the widely-available rpcgen tool).</t>
        <ul spacing="normal">
          <li>
            <t>The file does not include a definition of the ACL2_OK or
ACL3_OK constants used in definitions of result unions.</t>
          </li>
          <li>
            <t>The file does not include definitions of NFS protocol elements
that are shared with the NFS_ACL protocol, such as fhandle_t and
post_op_attr.</t>
          </li>
        </ul>
        <t>The XDR specification provided in this document rectifies those
omissions to provide a complete and compilable XDR language
description of the NFS_ACL protocol.</t>
      </section>
    </section>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The editor is grateful to
Bill Baker,
Wim Coekaerts,
Andreas Gruenbacher,
Rick Macklem,
Greg Marsden,
Martin Thomson,
Rob Thurlow,
and
Jim Wright
for their input and support.</t>
      <t>Special thanks to
Area Director
Gorry Fairhurst,
NFSV4 Working Group Chairs
Brian Pawlowski
and
Christopher Inacio,
and
NFSV4 Working Group Secretary
Thomas Haynes
for their patience, guidance, and oversight.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
