Blob Blame History Raw
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_nfs4_get_who.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,103 @@
+/*
+ *  NFSv4 ACL Code
+ *  Read the who value from the ace and return its type and optionally
+ *  its value.
+ *
+ *  Ace is a reference to the ace to extract the who value from.
+ *  Type is a reference where the value of the whotype will be stored.
+ *  Who is a double reference that should either be passed as NULL
+ *  (and thus no who string will be returned) or as a pointer to a
+ *  char* where the who string will be allocated. This string must be
+ *  freed by the caller.
+ *
+ *  Copyright (c) 2002, 2003 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions and the following disclaimer.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include "libacl_nfs4.h"
+
+int acl_nfs4_get_who(struct nfs4_ace* ace, int* type, char** who)
+{
+	int itype;
+	char* iwho = NULL;
+	int wholen;
+
+	if(ace == NULL || ace->who == NULL)
+		goto inval_failed;
+
+	itype = acl_nfs4_get_whotype(ace->who);
+
+	if(type != NULL) {
+		*type = itype;
+	}
+
+
+	if(who == NULL)
+		return 0;
+
+	switch(itype)
+	{
+		case NFS4_ACL_WHO_NAMED:
+			iwho = ace->who;
+			break;
+		case NFS4_ACL_WHO_OWNER:
+			iwho = NFS4_ACL_WHO_OWNER_STRING;
+			break;
+		case NFS4_ACL_WHO_GROUP:
+			iwho = NFS4_ACL_WHO_GROUP_STRING;
+			break;
+		case NFS4_ACL_WHO_EVERYONE:
+			iwho = NFS4_ACL_WHO_EVERYONE_STRING;
+			break;
+		default:
+			goto inval_failed;
+	}
+
+	wholen = strlen(iwho);
+	if(wholen < 0)
+		goto inval_failed;
+
+	(*who) = (char *) malloc(sizeof(char) * (wholen + 1));
+	if((*who) == NULL) {
+		errno = ENOMEM;
+		goto failed;
+	}
+
+	strcpy((*who), iwho);
+
+	return 0;
+
+inval_failed:
+	errno = EINVAL;
+
+failed:
+	return -1;
+}
+
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_nfs4_add_ace.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,83 @@
+/*
+ *  NFSv4 ACL Code
+ *  Add an ace to the acl
+ *
+ *  Copyright (c) 2002, 2003 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Marius Aamodt Eriksen <marius@umich.edu>
+ *  J. Bruce Fields <bfields@umich.edu>
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *  Jeff Sedlak <jsedlak@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions and the following disclaimer.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include "libacl_nfs4.h"
+
+int
+acl_nfs4_add_ace(struct nfs4_acl *acl, u32 type, u32 flag, u32 access_mask,
+		int whotype, char* who)
+{
+	struct nfs4_ace *ace;
+	int result;
+
+	if(acl == NULL)
+	{
+		errno = EINVAL;
+		return -1;
+	}
+
+	if ((ace = malloc(sizeof(*ace))) == NULL)
+	{
+		errno = ENOMEM;
+		return -1;
+	}
+
+	ace->type = type;
+	ace->flag = flag;
+
+	if( type == NFS4_ACE_ACCESS_DENIED_ACE_TYPE )
+		access_mask = access_mask & ~(NFS4_ACE_MASK_IGNORE);
+
+
+	/* Castrate delete_child if we aren't a directory */
+	if (!acl->is_directory)
+		access_mask &= ~NFS4_ACE_DELETE_CHILD;
+
+
+	ace->access_mask = access_mask & NFS4_ACE_MASK_ALL;
+
+	result = acl_nfs4_set_who(ace, whotype, who);
+	if(result < 0)
+		return -1;
+
+	TAILQ_INSERT_TAIL(&acl->ace_head, ace, l_ace);
+	acl->naces++;
+
+	return 0;
+}
+
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_nfs4_get_whotype.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,60 @@
+/*
+ *  NFSv4 ACL Code
+ *  Get the whotype of the who string passed
+ *
+ *  Copyright (c) 2002, 2003 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Marius Aamodt Eriksen <marius@umich.edu>
+ *  J. Bruce Fields <bfields@umich.edu>
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *  Jeff Sedlak <jsedlak@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions and the following disclaimer.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include "libacl_nfs4.h"
+
+inline int
+acl_nfs4_get_whotype(char *p)
+{
+	if(0 == strcmp(p, NFS4_ACL_WHO_OWNER_STRING) &&
+			strlen(p) == strlen(NFS4_ACL_WHO_OWNER_STRING)) {
+		return NFS4_ACL_WHO_OWNER;
+	}
+	if(0 == strcmp(p, NFS4_ACL_WHO_GROUP_STRING) &&
+			strlen(p) == strlen(NFS4_ACL_WHO_GROUP_STRING)) {
+		return NFS4_ACL_WHO_GROUP;
+	}
+	if(0 == strcmp(p, NFS4_ACL_WHO_EVERYONE_STRING) &&
+			strlen(p) == strlen(NFS4_ACL_WHO_EVERYONE_STRING)) {
+		return NFS4_ACL_WHO_EVERYONE;
+	}
+
+	return NFS4_ACL_WHO_NAMED;
+}
+
+
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_nfs4_free.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,61 @@
+/*
+ *  Copyright (c) 2004 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Marius Aamodt Eriksen <marius@umich.edu>
+ *  J. Bruce Fields <bfields@umich.edu>
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *  Jeff Sedlak <jsedlak@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions, the following disclaimer, and
+ *     any and all other licensing or copyright notices included in
+ *     any files in this distribution.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ *
+ */
+
+#include "libacl_nfs4.h"
+
+void
+acl_nfs4_free(struct nfs4_acl *acl)
+{
+	struct nfs4_ace *ace;
+
+	if (!acl)
+		return;
+
+	while (!TAILQ_IS_EMPTY(acl->ace_head)) {
+		ace = (acl)->ace_head.tqh_first;
+
+		TAILQ_REMOVE( &(acl->ace_head), ace, l_ace);
+		free(ace->who);
+		free(ace);
+	}
+
+	free(acl);
+
+	return;
+}
+
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_n4tp_acl_trans.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,439 @@
+/*
+ *  NFSv4 ACL Code
+ *  Convert NFSv4 ACL to a POSIX ACL
+ *
+ *  Copyright (c) 2002, 2003 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions and the following disclaimer.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <acl/libacl.h>
+#include <nfsidmap.h>
+#include "libacl_nfs4.h"
+
+
+/*
+ * While processing the NFSv4 ACE, this maintains bitmasks representing
+ * which permission bits have been allowed and which denied to a given
+ * entity: */
+struct posix_ace_state {
+	u_int32_t allow;
+	u_int32_t deny;
+};
+
+struct posix_user_ace_state {
+	uid_t uid;
+	struct posix_ace_state perms;
+};
+
+struct posix_ace_state_array {
+	int n;
+	struct posix_user_ace_state aces[];
+};
+
+/*
+ * While processing the NFSv4 ACE, this maintains the partial permissions
+ * calculated so far: */
+
+struct posix_acl_state {
+	struct posix_ace_state owner;
+	struct posix_ace_state group;
+	struct posix_ace_state other;
+	struct posix_ace_state everyone;
+	struct posix_ace_state mask; /* Deny unused in this case */
+	struct posix_ace_state_array *users;
+	struct posix_ace_state_array *groups;
+};
+
+static int
+init_state(struct posix_acl_state *state, int cnt)
+{
+	int alloc;
+
+	memset(state, 0, sizeof(struct posix_acl_state));
+	/*
+	 * In the worst case, each individual acl could be for a distinct
+	 * named user or group, but we don't know which, so we allocate
+	 * enough space for either:
+	 */
+	alloc = sizeof(struct posix_ace_state_array)
+		+ cnt*sizeof(struct posix_user_ace_state);
+	state->users = calloc(1, alloc);
+	if (!state->users)
+		return -ENOMEM;
+	state->groups = calloc(1, alloc);
+	if (!state->groups) {
+		free(state->users);
+		return -ENOMEM;
+	}
+	return 0;
+}
+
+static void
+free_state(struct posix_acl_state *state) {
+	free(state->users);
+	free(state->groups);
+}
+
+static inline void add_to_mask(struct posix_acl_state *state, struct posix_ace_state *astate)
+{
+	state->mask.allow |= astate->allow;
+}
+
+/*
+ * We only map from NFSv4 to POSIX ACLs when getting ACLs, when we err on the
+ * side of permissiveness (so as not to make the file appear more secure than
+ * it really is), so the mode bit mapping below is optimistic.
+ */
+static void
+set_mode_from_nfs4(acl_entry_t pace, u_int32_t perm, int is_dir)
+{
+	u32 write_mode = NFS4_WRITE_MODE;
+	acl_permset_t perms;
+
+	acl_get_permset(pace, &perms);
+	acl_clear_perms(perms);
+	if (is_dir)
+		write_mode |= NFS4_ACE_DELETE_CHILD;
+	if (perm & NFS4_READ_MODE)
+		acl_add_perm(perms, ACL_READ);
+	if (perm & write_mode)
+		acl_add_perm(perms, ACL_WRITE);
+	if (perm & NFS4_EXECUTE_MODE)
+		acl_add_perm(perms, ACL_EXECUTE);
+	acl_set_permset(pace, perms);
+}
+
+/* XXX: add a "check allow" that can warn on e.g. allows of WRITE_ACL
+ * to non-owner? */
+
+/* XXX: replace error returns by errno sets all over.  Ugh. */
+
+static acl_t
+posix_state_to_acl(struct posix_acl_state *state, int is_dir)
+{
+	acl_entry_t pace;
+	acl_t pacl;
+	int nace;
+	int i, error = 0;
+
+	if (state->users->n || state->groups->n)
+		nace = 4 + state->users->n + state->groups->n;
+	else
+		nace = 3;
+	pacl = acl_init(nace);
+	if (!pacl)
+		return NULL;
+
+	error = acl_create_entry(&pacl, &pace);
+	if (error)
+		goto out_err;
+	acl_set_tag_type(pace, ACL_USER_OBJ);
+	set_mode_from_nfs4(pace, state->owner.allow, is_dir);
+
+	for (i=0; i < state->users->n; i++) {
+		error = acl_create_entry(&pacl, &pace);
+		if (error)
+			goto out_err;
+		acl_set_tag_type(pace, ACL_USER);
+		set_mode_from_nfs4(pace, state->users->aces[i].perms.allow,
+					is_dir);
+		acl_set_qualifier(pace, &state->users->aces[i].uid);
+		add_to_mask(state, &state->users->aces[i].perms);
+	}
+
+	error = acl_create_entry(&pacl, &pace);
+	if (error)
+		goto out_err;
+	acl_set_tag_type(pace, ACL_GROUP_OBJ);
+	set_mode_from_nfs4(pace, state->group.allow, is_dir);
+	add_to_mask(state, &state->group);
+
+	for (i=0; i < state->groups->n; i++) {
+		error = acl_create_entry(&pacl, &pace);
+		if (error)
+			goto out_err;
+		acl_set_tag_type(pace, ACL_GROUP);
+		set_mode_from_nfs4(pace, state->groups->aces[i].perms.allow,
+					is_dir);
+		acl_set_qualifier(pace, &state->groups->aces[i].uid);
+		add_to_mask(state, &state->groups->aces[i].perms);
+	}
+
+	if (nace > 3) {
+		error = acl_create_entry(&pacl, &pace);
+		if (error)
+			goto out_err;
+		acl_set_tag_type(pace, ACL_MASK);
+		set_mode_from_nfs4(pace, state->mask.allow, is_dir);
+	}
+
+	error = acl_create_entry(&pacl, &pace);
+	if (error)
+		goto out_err;
+	acl_set_tag_type(pace, ACL_OTHER);
+	set_mode_from_nfs4(pace, state->other.allow, is_dir);
+
+	return pacl;
+out_err:
+	acl_free(pacl);
+	return NULL;
+}
+
+static inline void allow_bits(struct posix_ace_state *astate, u32 mask)
+{
+	/* Allow all bits in the mask not already denied: */
+	astate->allow |= mask & ~astate->deny;
+}
+
+static inline void deny_bits(struct posix_ace_state *astate, u32 mask)
+{
+	/* Deny all bits in the mask not already allowed: */
+	astate->deny |= mask & ~astate->allow;
+}
+
+static int find_uid(struct posix_acl_state *state, struct posix_ace_state_array *a, uid_t uid)
+{
+	int i;
+
+	for (i = 0; i < a->n; i++)
+		if (a->aces[i].uid == uid)
+			return i;
+	/* Not found: */
+	a->n++;
+	a->aces[i].uid = uid;
+	a->aces[i].perms.allow = state->everyone.allow;
+	a->aces[i].perms.deny  = state->everyone.deny;
+
+	return i;
+}
+
+static void deny_bits_array(struct posix_ace_state_array *a, u32 mask)
+{
+	int i;
+
+	for (i=0; i < a->n; i++)
+		deny_bits(&a->aces[i].perms, mask);
+}
+
+static void allow_bits_array(struct posix_ace_state_array *a, u32 mask)
+{
+	int i;
+
+	for (i=0; i < a->n; i++)
+		allow_bits(&a->aces[i].perms, mask);
+}
+
+static acl_tag_t acl_n4tp_get_whotype(struct nfs4_ace *ace)
+{
+	int nfs4type;
+	int result;
+
+	result = acl_nfs4_get_who(ace, &nfs4type, NULL);
+	if (result < 0)
+		return -1;
+
+	switch (nfs4type) {
+		case NFS4_ACL_WHO_NAMED:
+			return (ace->flag & NFS4_ACE_IDENTIFIER_GROUP ?
+					ACL_GROUP : ACL_USER);
+		case NFS4_ACL_WHO_OWNER:
+			return ACL_USER_OBJ;
+		case NFS4_ACL_WHO_GROUP:
+			return ACL_GROUP_OBJ;
+		case NFS4_ACL_WHO_EVERYONE:
+			return ACL_OTHER;
+	}
+	errno = EINVAL;
+	return -1;
+}
+
+static int process_one_v4_ace(struct posix_acl_state *state,
+				struct nfs4_ace *ace)
+{
+	u32 mask = ace->access_mask;
+	uid_t id;
+	int i;
+
+	if (nfs4_init_name_mapping(NULL))
+		return -1;
+
+	switch (acl_n4tp_get_whotype(ace)) {
+	case ACL_USER_OBJ:
+		if (ace->type == NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE) {
+			allow_bits(&state->owner, mask);
+		} else {
+			deny_bits(&state->owner, mask);
+		}
+		break;
+	case ACL_USER:
+		if (nfs4_name_to_uid(ace->who, &id))
+			return -1;
+		i = find_uid(state, state->users, id);
+		if (ace->type == NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE) {
+			allow_bits(&state->users->aces[i].perms, mask);
+			mask = state->users->aces[i].perms.allow;
+			allow_bits(&state->owner, mask);
+		} else {
+			deny_bits(&state->users->aces[i].perms, mask);
+		}
+		break;
+	case ACL_GROUP_OBJ:
+		if (ace->type == NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE) {
+			allow_bits(&state->group, mask);
+			mask = state->group.allow;
+			allow_bits(&state->owner, mask);
+			allow_bits(&state->everyone, mask);
+			allow_bits_array(state->users, mask);
+			allow_bits_array(state->groups, mask);
+		} else {
+			deny_bits(&state->group, mask);
+		}
+		break;
+	case ACL_GROUP:
+		if (nfs4_name_to_gid(ace->who, &id))
+			return -1;
+		i = find_uid(state, state->groups, id);
+		if (ace->type == NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE) {
+			allow_bits(&state->groups->aces[i].perms, mask);
+			mask = state->groups->aces[i].perms.allow;
+			allow_bits(&state->owner, mask);
+			allow_bits(&state->group, mask);
+			allow_bits(&state->everyone, mask);
+			allow_bits_array(state->users, mask);
+			allow_bits_array(state->groups, mask);
+		} else {
+			deny_bits(&state->groups->aces[i].perms, mask);
+		}
+		break;
+	case ACL_OTHER:
+		if (ace->type == NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE) {
+			allow_bits(&state->owner, mask);
+			allow_bits(&state->group, mask);
+			allow_bits(&state->other, mask);
+			allow_bits(&state->everyone, mask);
+			allow_bits_array(state->users, mask);
+			allow_bits_array(state->groups, mask);
+		} else {
+			deny_bits(&state->owner, mask);
+			deny_bits(&state->group, mask);
+			deny_bits(&state->other, mask);
+			deny_bits(&state->everyone, mask);
+			deny_bits_array(state->users, mask);
+			deny_bits_array(state->groups, mask);
+		}
+	}
+	return 0;
+}
+
+#define FILE_OR_DIR_INHERIT (NFS4_ACE_FILE_INHERIT_ACE \
+				| NFS4_ACE_DIRECTORY_INHERIT_ACE)
+
+/* Strip or keep inheritance aces depending on type of posix acl requested */
+static void acl_nfs4_check_inheritance(struct nfs4_acl *acl, u32 iflags)
+{
+	struct nfs4_ace * cur_ace;
+	struct nfs4_ace * temp_ace;
+
+	cur_ace = acl->ace_head.tqh_first;
+
+	while (cur_ace) {
+		/* get the next ace now in case we free the current ace */
+		temp_ace = cur_ace;
+		cur_ace = cur_ace->l_ace.tqe_next;
+
+		if (iflags & NFS4_ACL_REQUEST_DEFAULT) {
+			if (!(temp_ace->flag & FILE_OR_DIR_INHERIT))
+				acl_nfs4_remove_ace(acl, temp_ace);
+		} else {
+			if (temp_ace->flag & NFS4_ACE_INHERIT_ONLY_ACE)
+				acl_nfs4_remove_ace(acl, temp_ace);
+		}
+	}
+}
+
+acl_t acl_n4tp_acl_trans(struct nfs4_acl * nacl_p, acl_type_t ptype)
+{
+	struct posix_acl_state state;
+	acl_t pacl;
+	struct nfs4_acl * temp_acl;
+	struct nfs4_ace * cur_ace;
+	int ret;
+	u32 iflags = NFS4_ACL_NOFLAGS;
+
+	if (ptype == ACL_TYPE_DEFAULT) {
+		if (nacl_p->is_directory)
+			iflags |= NFS4_ACL_REQUEST_DEFAULT;
+		else {
+			errno = EINVAL;
+			return NULL;
+		}
+	}
+
+	/* Copy so we can delete bits without borking the original */
+	temp_acl = acl_nfs4_copy_acl(nacl_p);
+	if (temp_acl == NULL)
+		return NULL;
+
+	acl_nfs4_check_inheritance(temp_acl, iflags);
+
+	if (ptype == ACL_TYPE_DEFAULT && temp_acl->naces == 0) {
+		acl_nfs4_free(temp_acl);
+		return acl_init(0);
+	}
+
+	ret = init_state(&state, temp_acl->naces);
+	if (ret)
+		goto free_failed;
+
+	cur_ace = temp_acl->ace_head.tqh_first;
+	while (cur_ace) {
+		if (process_one_v4_ace(&state, cur_ace)) {
+			free_state(&state);
+			goto free_failed;
+		}
+		cur_ace = cur_ace->l_ace.tqe_next;
+	}
+
+	acl_nfs4_free(temp_acl);
+
+	pacl = posix_state_to_acl(&state, nacl_p->is_directory);
+
+	free_state(&state);
+
+	ret = acl_valid(pacl);
+	if (ret < 0)
+		goto free_failed;
+
+	return pacl;
+
+free_failed:
+	acl_nfs4_free(temp_acl);
+	return NULL;
+}
--- acl-2.2.39/libacl/acl_set_fd.c.orig	2006-06-20 02:51:25.000000000 -0400
+++ acl-2.2.39/libacl/acl_set_fd.c	2007-08-22 12:02:13.000000000 -0400
@@ -24,6 +24,11 @@
 #include "libacl.h"
 #include "__acl_to_xattr.h"
 
+#ifdef USE_NFSV4_TRANS
+ #include "libacl_nfs4.h"
+ #include <nfsidmap.h>
+#endif
+
 #include "byteorder.h"
 #include "acl_ea.h"
 
@@ -37,10 +42,42 @@ acl_set_fd(int fd, acl_t acl)
 	const char *name = ACL_EA_ACCESS;
 	size_t size;
 	int error;
+#ifdef USE_NFSV4_TRANS
+	int retval;
+	struct nfs4_acl * nacl;
+#endif
 
 	if (!acl_obj_p)
 		return -1;
+
+#ifdef USE_NFSV4_TRANS
+	retval = fgetxattr(fd, ACL_NFS4_XATTR, NULL, 0);
+
+	if(retval == -1 && (errno == ENOATTR || errno == EOPNOTSUPP)) {
+		ext_acl_p = __acl_to_xattr(acl_obj_p, &size);
+	} else {
+		char domain[NFS4_MAX_DOMAIN_LEN];
+		nfs4_init_name_mapping(NULL);
+		error = nfs4_get_default_domain(NULL, domain, sizeof(domain));
+		if (error)
+			return -1;
+		nacl = acl_nfs4_new(0);
+		if (acl == NULL) {
+			errno = ENOMEM;
+			return -1;
+		}
+		error = acl_ptn4_acl_trans(acl, nacl, ACL_TYPE_ACCESS, 0, domain);
+		if (error)
+			return -1;
+
+		size = acl_nfs4_xattr_pack(nacl, &ext_acl_p);
+		name = ACL_NFS4_XATTR;
+		acl_nfs4_free(nacl);
+	}
+#else
 	ext_acl_p = __acl_to_xattr(acl_obj_p, &size);
+#endif
+
 	if (!ext_acl_p)
 		return -1;
 	error = fsetxattr(fd, name, (char *)ext_acl_p, size, 0);
--- acl-2.2.39/libacl/Makefile.orig	2006-06-20 02:51:25.000000000 -0400
+++ acl-2.2.39/libacl/Makefile	2007-08-22 12:02:13.000000000 -0400
@@ -8,19 +8,35 @@ LTLDFLAGS += -Wl,--version-script,$(TOPD
 include $(TOPDIR)/include/builddefs
 
 LTLIBRARY = libacl.la
-LTLIBS = -lattr $(LIBMISC)
+LTLIBS = -lattr -lnfsidmap $(LIBMISC)
 LTDEPENDENCIES = $(LIBMISC)
-LT_CURRENT = 2
+LT_CURRENT = 3
 LT_REVISION = 0
-LT_AGE = 1
+LT_AGE = 2
+
+CFILES = $(POSIX_CFILES) $(LIBACL_CFILES) $(LIBACL_NFS4_CFILES) \
+	$(INTERNAL_CFILES) perm_copy_fd.c perm_copy_file.c
 
-CFILES = $(POSIX_CFILES) $(LIBACL_CFILES) $(INTERNAL_CFILES) \
-	 perm_copy_fd.c perm_copy_file.c
 HFILES = libobj.h libacl.h byteorder.h __acl_from_xattr.h __acl_to_xattr.h \
-	 perm_copy.h
+	 perm_copy.h $(LIBACL_NFS4_HFILES)
 
 LCFLAGS = -include perm_copy.h
 
+LIBACL_NFS4_CFILES = \
+	acl_nfs4_get_who.c \
+	acl_n4tp_acl_trans.c       acl_nfs4_get_whotype.c \
+	acl_nfs4_new.c \
+	acl_nfs4_add_ace.c         acl_nfs4_remove_ace.c \
+	acl_nfs4_add_pair.c \
+	acl_nfs4_copy_acl.c        acl_nfs4_set_who.c \
+	acl_nfs4_free.c            acl_nfs4_xattr_load.c \
+	acl_nfs4_xattr_pack.c      acl_nfs4_xattr_size.c \
+	acl_ptn4_acl_trans.c \
+	acl_ptn4_get_mask.c        __posix_acl_from_nfs4_xattr.c \
+
+
+LIBACL_NFS4_HFILES = ../include/libacl_nfs4.h ../include/nfs4.h
+
 POSIX_CFILES = \
 	acl_add_perm.c acl_calc_mask.c acl_clear_perms.c acl_copy_entry.c \
 	acl_copy_ext.c acl_copy_int.c acl_create_entry.c acl_delete_def_file.c \
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_nfs4_remove_ace.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,48 @@
+/*
+ *  NFSv4 ACL Code
+ *  Remove an ace from an NFS4 ACL
+ *
+ *  Copyright (c) 2004 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions, the following disclaimer, and
+ *     any and all other licensing or copyright notices included in
+ *     any files in this distribution.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ *
+ */
+
+#include "libacl_nfs4.h"
+
+void acl_nfs4_remove_ace(struct nfs4_acl * acl, struct nfs4_ace * ace)
+{
+	TAILQ_REMOVE(&acl->ace_head, ace, l_ace);
+	free(ace->who);
+	free(ace);
+	acl->naces--;
+}
+
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_nfs4_set_who.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,92 @@
+/*
+ *  NFSv4 ACL Code
+ *  Write the who entry in the nfs4 ace. Who is a user supplied buffer
+ *  containing a named who entry (null terminated string) if type is
+ *  set to NFS4_ACL_WHO_NAMED. Otherwise, the who buffer is not used.
+ *  The user supplied who buffer must be freed by the caller.
+ *
+ *  This code allocates the who buffer used in the ace. This must be freed
+ *  upon ace removal by the ace_remove or acl_free.
+ *
+ *  Copyright (c) 2002, 2003 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions and the following disclaimer.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include "libacl_nfs4.h"
+
+int acl_nfs4_set_who(struct nfs4_ace* ace, int type, char* who)
+{
+	char* iwho = NULL;
+	int wholen;
+
+	if(ace == NULL)
+		goto inval_failed;
+
+	switch(type)
+	{
+		case NFS4_ACL_WHO_NAMED:
+			if(who == NULL)
+				goto inval_failed;
+			iwho = who;
+			break;
+		case NFS4_ACL_WHO_OWNER:
+			iwho = NFS4_ACL_WHO_OWNER_STRING;
+			break;
+		case NFS4_ACL_WHO_GROUP:
+			iwho = NFS4_ACL_WHO_GROUP_STRING;
+			break;
+		case NFS4_ACL_WHO_EVERYONE:
+			iwho = NFS4_ACL_WHO_EVERYONE_STRING;
+			break;
+		default:
+			goto inval_failed;
+	}
+
+	wholen = strlen(iwho);
+	if(wholen < 1)
+		goto inval_failed;
+
+	ace->who = (char *) malloc(sizeof(char) * (wholen + 1));
+	if(ace->who == NULL) {
+		errno = ENOMEM;
+		goto failed;
+	}
+
+	strcpy(ace->who, iwho);
+
+	return 0;
+
+inval_failed:
+	errno = EINVAL;
+
+failed:
+	return -1;
+}
+
--- acl-2.2.39/libacl/acl_set_file.c.orig	2006-06-20 02:51:25.000000000 -0400
+++ acl-2.2.39/libacl/acl_set_file.c	2007-08-22 12:02:13.000000000 -0400
@@ -26,9 +26,38 @@
 #include "libacl.h"
 #include "__acl_to_xattr.h"
 
+#ifdef USE_NFSV4_TRANS
+ #include "libacl_nfs4.h"
+ #include <nfsidmap.h>
+#endif
+
 #include "byteorder.h"
 #include "acl_ea.h"
 
+#ifdef USE_NFSV4_TRANS
+static struct nfs4_acl *get_nfs4_acl(const char *path_p, int is_dir)
+{
+	struct nfs4_acl * acl = NULL;
+	ssize_t ret;
+	char *buf;
+
+	ret = getxattr(path_p, ACL_NFS4_XATTR, NULL, 0);
+	if (ret < 0)
+		return NULL;
+	buf = malloc(ret);
+	if (buf == NULL)
+		return NULL;
+	ret = getxattr(path_p, ACL_NFS4_XATTR, buf, ret);
+	if (ret < 0)
+		goto out_free;
+	acl = acl_nfs4_xattr_load(buf, ret, is_dir);
+
+out_free:
+	free(buf);
+	return acl;
+}
+
+#endif
 
 /* 23.4.22 */
 int
@@ -39,9 +68,15 @@ acl_set_file(const char *path_p, acl_typ
 	const char *name;
 	size_t size;
 	int error;
+	struct stat st;
+#ifdef USE_NFSV4_TRANS
+	struct nfs4_acl * nacl;
+	int is_dir = NFS4_ACL_ISFILE;
+#endif
 
 	if (!acl_obj_p)
 		return -1;
+
 	switch (type) {
 		case ACL_TYPE_ACCESS:
 			name = ACL_EA_ACCESS;
@@ -54,8 +89,41 @@ acl_set_file(const char *path_p, acl_typ
 			return -1;
 	}
 
+
+#ifdef USE_NFSV4_TRANS
+	if (stat(path_p, &st) != 0)
+		return -1;
+	if (S_ISDIR(st.st_mode))
+		is_dir = NFS4_ACL_ISDIR;
+	if (type == ACL_TYPE_DEFAULT && !is_dir) {
+		errno = EACCES;
+		return -1;
+	}
+	nacl = get_nfs4_acl(path_p, is_dir);
+	if (nacl == NULL && (errno == ENOATTR || errno == EOPNOTSUPP))
+		ext_acl_p = __acl_to_xattr(acl_obj_p, &size);
+	else {
+		char domain[NFS4_MAX_DOMAIN_LEN];
+
+		nfs4_init_name_mapping(NULL);
+		error = nfs4_get_default_domain(NULL, domain, sizeof(domain));
+		if (error) {
+			acl_nfs4_free(nacl);
+			return -1;
+		}
+		error = acl_ptn4_acl_trans(acl, nacl, type, is_dir, domain);
+		if (error) {
+			acl_nfs4_free(nacl);
+			return -1;
+		}
+
+		size = acl_nfs4_xattr_pack(nacl, &ext_acl_p);
+		name = ACL_NFS4_XATTR;
+		acl_nfs4_free(nacl);
+	}
+#else
+
 	if (type == ACL_TYPE_DEFAULT) {
-		struct stat st;
 
 		if (stat(path_p, &st) != 0)
 			return -1;
@@ -68,6 +136,8 @@ acl_set_file(const char *path_p, acl_typ
 	}
 
 	ext_acl_p = __acl_to_xattr(acl_obj_p, &size);
+#endif
+
 	if (!ext_acl_p)
 		return -1;
 	error = setxattr(path_p, name, (char *)ext_acl_p, size, 0);
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/__posix_acl_from_nfs4_xattr.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,60 @@
+/*
+ *  NFSv4 ACL Code
+ *  Convert NFSv4 xattr values to a posix ACL
+ *
+ *  Copyright (c) 2002, 2003 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions and the following disclaimer.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <acl/libacl.h>
+#include "libacl_nfs4.h"
+
+/* xattr_v is a char buffer filled with the nfsv4 xattr value.
+ * xattr_size should be the byte count of the length of the xattr_v
+ * data size. xattr_v may be larger than <xattr_size> bytes, but only
+ * the first <xattr_size> bytes will be read. <type> is the posix acl
+ * type requested. Currently either default, or access */
+
+acl_t __posix_acl_from_nfs4_xattr(char* xattr_v,
+		int xattr_size, acl_type_t ptype, u32 is_dir)
+{
+	struct nfs4_acl *	nfsacl = NULL;
+	acl_t pacl;
+
+	nfsacl = acl_nfs4_xattr_load(xattr_v, xattr_size, is_dir);
+	if(nfsacl == NULL) {
+		return NULL;
+	}
+
+	pacl = acl_n4tp_acl_trans(nfsacl, ptype);
+
+	return pacl;
+}
+
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_nfs4_xattr_load.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,191 @@
+/*
+ *  NFSv4 ACL Code
+ *  Convert NFSv4 xattr values to a posix ACL
+ *
+ *  Copyright (c) 2002, 2003 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions and the following disclaimer.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+
+#include <acl/libacl.h>
+#include <netinet/in.h>
+#include "libacl_nfs4.h"
+
+
+struct nfs4_acl * acl_nfs4_xattr_load(
+		char *	xattr_v,
+		int		xattr_size,
+		u32		is_dir)
+{
+	struct nfs4_acl *	nacl_p;
+	char* bufp = xattr_v;
+	int bufs = xattr_size;
+	u32 ace_n;
+	u32	wholen;
+	char* who;
+	int d_ptr;
+	u32 num_aces;
+
+	u32 type, flag, access_mask;
+
+	if(xattr_size < sizeof(u32)) {
+		errno = EINVAL;
+		return NULL;
+	}
+
+	if((nacl_p = acl_nfs4_new(is_dir)) == NULL) {
+		errno = ENOMEM;
+		return NULL;
+	}
+
+	/* Grab the number of aces in the acl */
+	num_aces = (u32)ntohl(*((u32*)(bufp)));
+
+#ifdef LIBACL_NFS4_DEBUG
+	printf(" Got number of aces: %d\n", nacl_p->naces);
+#endif
+
+
+	d_ptr = sizeof(u32);
+	bufp += d_ptr;
+	bufs -= d_ptr;
+
+	for(ace_n = 0; num_aces > ace_n ; ace_n++)
+	{
+#ifdef LIBACL_NFS4_DEBUG
+		printf(" Getting Ace #%d of %d\n", ace_n, num_aces);
+#endif
+		/* Get the acl type */
+		if(bufs <= 0) {
+			errno = EINVAL;
+			goto bad_xattr_val;
+		}
+
+		type = (u32)ntohl(*((u32*)bufp));
+#ifdef LIBACL_NFS4_DEBUG
+		printf("  Type: %x\n", type);
+#endif
+
+		d_ptr = sizeof(u32);
+		bufp += d_ptr;
+		bufs -= d_ptr;
+
+		/* Get the acl flag */
+		if(bufs <= 0) {
+			errno = EINVAL;
+			goto bad_xattr_val;
+		}
+
+		flag = (u32)ntohl(*((u32*)bufp));
+#ifdef LIBACL_NFS4_DEBUG
+		printf("  Flag: %x\n", flag);
+#endif
+
+		bufp += d_ptr;
+		bufs -= d_ptr;
+
+		/* Get the access mask */
+
+		if(bufs <= 0) {
+			errno = EINVAL;
+			goto bad_xattr_val;
+		}
+
+		access_mask = (u32)ntohl(*((u32*)bufp));
+#ifdef LIBACL_NFS4_DEBUG
+		printf("  Access Mask: %x\n", access_mask);
+#endif
+
+		bufp += d_ptr;
+		bufs -= d_ptr;
+
+		/* Get the who string length*/
+		if(bufs <= 0) {
+			errno = EINVAL;
+			goto bad_xattr_val;
+		}
+
+		wholen = (u32)ntohl(*((u32*)bufp));
+#ifdef LIBACL_NFS4_DEBUG
+		printf("  Wholen: %d\n", wholen);
+#endif
+
+		bufp += d_ptr;
+		bufs -= d_ptr;
+
+		/* Get the who string */
+		if(bufs <= 0) {
+			errno = EINVAL;
+			goto bad_xattr_val;
+		}
+
+		who = (char *) malloc((wholen+1) * sizeof(char));
+		if(who == NULL)
+		{
+			errno = ENOMEM;
+			goto bad_xattr_val;
+		}
+
+		memcpy(who, bufp, wholen);
+
+		who[wholen] = '\0';
+
+#ifdef LIBACL_NFS4_DEBUG
+		printf("  Who: %s\n", who);
+#endif
+
+		d_ptr = ((wholen / sizeof(u32))*sizeof(u32));
+		if(wholen % sizeof(u32) != 0)
+			d_ptr += sizeof(u32);
+
+		bufp += d_ptr;
+		bufs -= d_ptr;
+
+		/* Make sure we aren't outside our domain */
+		if(bufs < 0) {
+			free(who);
+			goto bad_xattr_val;
+		}
+
+		if(acl_nfs4_add_ace(nacl_p, type, flag, access_mask, acl_nfs4_get_whotype(who), who) < 0) {
+			free(who);
+			goto bad_xattr_val;
+		}
+
+		free(who);
+	}
+
+	return nacl_p;
+
+bad_xattr_val:
+	/* We bailed for some reason */
+	acl_nfs4_free(nacl_p);
+	return NULL;
+}
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_nfs4_xattr_pack.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,148 @@
+/*
+ *  NFSv4 ACL Code
+ *  Pack an NFS4 ACL into an XDR encoded buffer.
+ *
+ *  Copyright (c) 2002, 2003 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions and the following disclaimer.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <libacl_nfs4.h>
+#include <netinet/in.h>
+
+int acl_nfs4_xattr_pack(struct nfs4_acl * acl, char** bufp)
+{
+	struct nfs4_ace * ace;
+	int buflen;
+	int rbuflen;
+	int num_aces;
+	int ace_num;
+	int wholen;
+	int result;
+	char* p;
+	char* who;
+
+	if(acl == NULL || bufp == NULL)
+	{
+		errno = EINVAL;
+		goto failed;
+	}
+
+	buflen = acl_nfs4_xattr_size(acl);
+	if(buflen < 0)
+	{
+		goto failed;
+	}
+
+	*bufp = (char*) malloc(buflen);
+	if(*bufp == NULL) {
+		errno = ENOMEM;
+		goto failed;
+	}
+
+	p = *bufp;
+
+	num_aces = acl->naces;
+
+	*((u32*)p) = htonl(num_aces);
+
+	rbuflen = sizeof(u32);
+	p += sizeof(u32);
+
+	ace = acl->ace_head.tqh_first;
+	ace_num = 1;
+
+	while(1)
+	{
+		if(ace == NULL)
+		{
+			if(ace_num > num_aces) {
+				break;
+			} else {
+				errno = ENODATA;
+				goto failed;
+			}
+		}
+
+		*((u32*)p) = htonl(ace->type);
+		p += sizeof(u32);
+		rbuflen += sizeof(u32);
+
+		*((u32*)p) = htonl(ace->flag);
+		p += sizeof(u32);
+		rbuflen += sizeof(u32);
+
+		*((u32*)p) = htonl(ace->access_mask);
+		p += sizeof(u32);
+		rbuflen += sizeof(u32);
+
+		result = acl_nfs4_get_who(ace, NULL, &who);
+		if(result < 0) {
+			goto free_failed;
+		}
+
+		wholen = strlen(who);
+		*((u32*)p) = htonl(wholen);
+		rbuflen += sizeof(u32);
+
+		p += sizeof(u32);
+
+		memcpy(p, who, wholen);
+		free(who);
+
+		p += (wholen / NFS4_XDR_MOD) * NFS4_XDR_MOD;
+		if(wholen % NFS4_XDR_MOD) {
+			p += NFS4_XDR_MOD;
+		}
+
+		rbuflen += (wholen / NFS4_XDR_MOD) * NFS4_XDR_MOD;
+		if(wholen % NFS4_XDR_MOD) {
+			rbuflen += NFS4_XDR_MOD;
+		}
+
+		ace = ace->l_ace.tqe_next;
+		ace_num++;
+	}
+
+	if (buflen != rbuflen)
+	{
+		goto free_failed;
+	}
+	return buflen;
+
+free_failed:
+	free(*bufp);
+	*bufp = NULL;
+
+failed:
+	return -1;
+}
+
+
+
--- acl-2.2.39/libacl/acl_extended_file.c.orig	2006-06-20 02:51:25.000000000 -0400
+++ acl-2.2.39/libacl/acl_extended_file.c	2007-08-22 12:02:13.000000000 -0400
@@ -22,6 +22,7 @@
 #include <unistd.h>
 #include <attr/xattr.h>
 #include "libacl.h"
+#include "libacl_nfs4.h"
 
 #include "byteorder.h"
 #include "acl_ea.h"
@@ -33,6 +34,34 @@ acl_extended_file(const char *path_p)
 	int base_size = sizeof(acl_ea_header) + 3 * sizeof(acl_ea_entry);
 	int retval;
 
+	/* XXX: Ugh: what's the easiest way to do this, taking
+	 * into account default acl's, and that length alone won't do this?
+	 * Also I'm a little uncomfortable with the amount of #ifdef
+	 * NFS4 stuff that's going on.  We need a cleaner separation. */
+#ifdef USE_NFSV4_TRANS
+	retval = getxattr(path_p, ACL_NFS4_XATTR, NULL, 0);
+	if (retval < 0 && errno != ENOATTR && errno != EOPNOTSUPP)
+		return -1;
+	if (retval >= 0) {
+		struct nfs4_acl *nfsacl;
+		char *ext_acl_p = alloca(retval);
+		if (!ext_acl_p)
+			return -1;
+
+		retval = getxattr(path_p, ACL_NFS4_XATTR, ext_acl_p, retval);
+		if (retval == -1)
+			return -1;
+
+		nfsacl = acl_nfs4_xattr_load(ext_acl_p, retval, NFS4_ACL_ISFILE);
+		if (nfsacl) {
+			int count = nfsacl->naces;
+			acl_nfs4_free(nfsacl);
+			return count > 6;
+		}
+		return 0;
+	}
+#endif
+
 	retval = getxattr(path_p, ACL_EA_ACCESS, NULL, 0);
 	if (retval < 0 && errno != ENOATTR && errno != ENODATA)
 		return -1;
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_ptn4_acl_trans.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,509 @@
+/*
+ *  NFSv4 ACL Code
+ *  Convert a posix ACL to an NFSv4 ACL
+ *
+ *  Copyright (c) 2002, 2003 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *  J. Bruce Fields <bfields@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions and the following disclaimer.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <acl/libacl.h>
+#include <nfsidmap.h>
+#include "libacl_nfs4.h"
+
+
+#define FILE_OR_DIR_INHERIT (NFS4_ACE_FILE_INHERIT_ACE \
+		| NFS4_ACE_DIRECTORY_INHERIT_ACE)
+#define NFS4_INHERITANCE_FLAGS (FILE_OR_DIR_INHERIT | NFS4_ACE_INHERIT_ONLY_ACE)
+
+/* Plan:
+ * 1: if setting default, remove all purely inherited aces, and replace
+ *    all dual-use aces by purely effective aces
+ * 2: if setting effective, remove all purely effective aces, and replace
+ *    all dual-use aces by purely inherited ones
+ */
+static void purge_aces(struct nfs4_acl *nacl, acl_type_t type)
+{
+	struct nfs4_ace *p, *next;
+
+	for (p = nacl->ace_head.tqh_first; p != NULL; p = next) {
+		next = p->l_ace.tqe_next;
+
+		if (!(p->flag & FILE_OR_DIR_INHERIT)) {
+			/* purely effective */
+			if (type == ACL_TYPE_ACCESS)
+				acl_nfs4_remove_ace(nacl, p);
+		} else if (p->flag & NFS4_ACE_INHERIT_ONLY_ACE) {
+			/* purely inherited */
+			if (type == ACL_TYPE_DEFAULT)
+				acl_nfs4_remove_ace(nacl, p);
+		} else {
+			/* both effective and inherited */
+			if (type == ACL_TYPE_DEFAULT) {
+				/* Change to purely effective */
+				p->flag &= ~NFS4_INHERITANCE_FLAGS;
+			} else { /* ACL_TYPE_ACCESS */
+				/* Change to purely inherited */
+				p->flag |= NFS4_INHERITANCE_FLAGS;
+			}
+		}
+
+	}
+}
+ 
+int
+acl_ptn4_acl_trans(acl_t pacl, struct nfs4_acl *acl, acl_type_t type, u32 is_dir, char *nfs_domain)
+{
+	int eflag;
+	u32 mask, mask_mask = 0;
+	int num_aces;
+	int result, result2;
+	u32 iflags = NFS4_ACL_NOFLAGS;
+	int allocated = 0;
+
+	acl_entry_t pace_p;
+	acl_tag_t ace_type;
+	acl_permset_t perms;
+
+	char who_buf_static[NFS4_ACL_WHO_BUFFER_LEN_GUESS];
+	char *who_buf = NULL;
+	int who_buflen;
+	int who_buflen_static = NFS4_ACL_WHO_BUFFER_LEN_GUESS;
+	uid_t * uid_p;
+	gid_t * gid_p;
+
+	eflag = 0;
+
+	if (type == ACL_TYPE_DEFAULT) {
+		eflag = NFS4_INHERITANCE_FLAGS;
+		iflags |= NFS4_ACL_REQUEST_DEFAULT;
+	}
+
+	purge_aces(acl, type);
+
+	if (is_dir & NFS4_ACL_ISDIR)
+		iflags |= NFS4_ACL_ISDIR;
+
+
+	if (pacl == NULL || (acl_valid(pacl) < 0 || acl_entries(pacl) == 0)) {
+		errno = EINVAL;
+		goto out;
+	}
+
+	/* Start Conversion */
+
+	/* 3 aces minimum (mode bits) */
+	num_aces = acl_entries(pacl);
+	if (num_aces < 3) {
+		errno = EINVAL;
+		goto out;
+	}
+
+	/* Get the mask entry */
+
+	result = acl_get_entry(pacl, ACL_FIRST_ENTRY, &pace_p);
+	if (result < 0)
+		goto out;
+
+	while (result > 0 && mask_mask == 0) {
+		result = acl_get_tag_type(pace_p, &ace_type);
+		if (result < 0)
+			goto out;
+
+		if (ace_type == ACL_MASK) {
+			result = acl_get_permset(pace_p, &perms);
+			if(result < 0)
+				goto out;
+
+			result = acl_ptn4_get_mask(&mask_mask, perms, iflags);
+			if(result < 0)
+				goto out;
+
+			mask_mask = ~mask_mask;
+		}
+
+		result = acl_get_entry(pacl, ACL_NEXT_ENTRY, &pace_p);
+		if (result < 0)
+			goto out;
+	}
+
+	/* Get the file owner entry */
+	result = acl_get_entry(pacl, ACL_FIRST_ENTRY, &pace_p);
+	if (result < 0)
+		goto out;
+
+	result = acl_get_tag_type(pace_p, &ace_type);
+	if (result < 0)
+		goto out;
+
+	if (ace_type != ACL_USER_OBJ) {
+		errno = EINVAL;
+		goto out;
+	}
+
+	result = acl_get_permset(pace_p, &perms);
+	if (result < 0)
+		goto out;
+
+	result = acl_ptn4_get_mask(&mask, perms, iflags | NFS4_ACL_OWNER);
+	if (result < 0)
+		goto out;
+
+	result = acl_nfs4_add_pair(acl, eflag, mask, NFS4_ACL_WHO_OWNER, NULL);
+
+	if (result < 0)
+		goto out;
+
+	result = acl_get_entry(pacl, ACL_NEXT_ENTRY, &pace_p);
+	if (result < 0)
+		goto out;
+
+	result2 = acl_get_tag_type(pace_p, &ace_type);
+	if (result2 < 0)
+		goto out;
+
+	while (ace_type == ACL_USER && result > 0) {
+		result = acl_get_permset(pace_p, &perms);
+		if (result < 0)
+			goto out;
+
+		result = acl_ptn4_get_mask(&mask, perms, iflags);
+		if (result < 0)
+			goto out;
+
+		uid_p = acl_get_qualifier(pace_p);
+
+		who_buf = who_buf_static;
+		who_buflen = who_buflen_static;
+
+		result = nfs4_init_name_mapping(NULL);
+		result = nfs4_uid_to_name(*uid_p, nfs_domain, who_buf, who_buflen);
+
+
+		while (result == -ENOBUFS) {
+			if (who_buf != who_buf_static)
+				free(who_buf);
+
+			/* Increase the size by a full buflen unit */
+			who_buflen += who_buflen_static;
+			who_buf = malloc(who_buflen);
+
+			if (who_buf == NULL) {
+				result = -ENOMEM;
+				break;
+			}
+
+			result = nfs4_init_name_mapping(NULL);
+			result = nfs4_uid_to_name(*uid_p, nfs_domain, who_buf, who_buflen);
+
+		}
+		acl_free(uid_p);
+		if (result < 0) {
+			errno = -result;
+			goto out;
+		}
+
+		if (who_buf == NULL)
+			goto out;
+
+		result = acl_nfs4_add_ace(acl, NFS4_ACE_ACCESS_DENIED_ACE_TYPE,
+				eflag,  mask_mask, NFS4_ACL_WHO_NAMED, who_buf);
+		if (result < 0) {
+			if(who_buf != who_buf_static)
+				free(who_buf);
+			goto out;
+		}
+
+		result = acl_nfs4_add_pair(acl, eflag, mask, NFS4_ACL_WHO_NAMED,
+				who_buf);
+		if (who_buf != who_buf_static)
+			free(who_buf);
+		if (result < 0)
+			goto out;
+
+		result = acl_get_entry(pacl, ACL_NEXT_ENTRY, &pace_p);
+		if (result <= 0)
+			goto out;
+
+		result2 = acl_get_tag_type(pace_p, &ace_type);
+		if (result2 < 0)
+			goto out;
+
+	}
+
+	/* In the case of groups, we apply allow ACEs first, then deny ACEs,
+	 * since a user can be in more than one group.  */
+
+	/* allow ACEs */
+
+	if (num_aces > 3) {
+		result2 = acl_get_tag_type(pace_p, &ace_type);
+		if (result2 < 0)
+			goto out;
+
+		if (ace_type != ACL_GROUP_OBJ) {
+			errno = EINVAL;
+			goto out;
+		}
+
+		result = acl_nfs4_add_ace(acl, NFS4_ACE_ACCESS_DENIED_ACE_TYPE,
+				NFS4_ACE_IDENTIFIER_GROUP | eflag, mask_mask,
+				NFS4_ACL_WHO_GROUP, NULL);
+
+		if (result < 0)
+			goto out;
+	}
+
+	result = acl_get_permset(pace_p, &perms);
+	if (result < 0)
+		goto out;
+
+	result = acl_ptn4_get_mask(&mask, perms, iflags);
+	if (result < 0)
+		goto out;
+
+	result = acl_nfs4_add_ace(acl, NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE,
+			NFS4_ACE_IDENTIFIER_GROUP | eflag, mask, NFS4_ACL_WHO_GROUP, NULL);
+
+	if (result < 0)
+		goto out;
+
+	result = acl_get_entry(pacl, ACL_NEXT_ENTRY, &pace_p);
+	if (result <= 0)
+		goto out;
+
+	result2 = acl_get_tag_type(pace_p, &ace_type);
+	if (result2 < 0)
+		goto out;
+
+	while (ace_type == ACL_GROUP && result > 0) {
+		result = acl_get_permset(pace_p, &perms);
+		if (result < 0)
+			goto out;
+
+		result = acl_ptn4_get_mask(&mask, perms, iflags);
+		if (result < 0)
+			goto out;
+
+		gid_p = acl_get_qualifier(pace_p);
+
+		who_buf = who_buf_static;
+		who_buflen = who_buflen_static;
+
+		result = nfs4_gid_to_name(*gid_p, nfs_domain, who_buf, who_buflen);
+
+
+		while (result == -ENOBUFS) {
+			if (who_buf != who_buf_static)
+				free(who_buf);
+
+			/* Increase the size by a full buflen unit */
+			who_buflen += who_buflen_static;
+			who_buf = malloc(who_buflen);
+
+			if (who_buf == NULL) {
+				result = -ENOMEM;
+				break;
+			}
+
+			result = nfs4_gid_to_name(*gid_p, nfs_domain, who_buf, who_buflen);
+		}
+
+		acl_free(gid_p);
+
+		if (result < 0) {
+			errno = -result;
+			goto out;
+		}
+
+		if (who_buf == NULL)
+			goto out;
+
+		result = acl_nfs4_add_ace(acl, NFS4_ACE_ACCESS_DENIED_ACE_TYPE,
+				NFS4_ACE_IDENTIFIER_GROUP | eflag, mask_mask,
+				NFS4_ACL_WHO_NAMED, who_buf);
+		if (result < 0) {
+			if(who_buf != who_buf_static)
+				free(who_buf);
+			goto out;
+		}
+
+		result = acl_nfs4_add_ace(acl, NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE,
+		    	NFS4_ACE_IDENTIFIER_GROUP | eflag, mask,
+				NFS4_ACL_WHO_NAMED, who_buf);
+
+		if (who_buf != who_buf_static)
+			free(who_buf);
+
+		if (result < 0)
+			goto out;
+		result = acl_get_entry(pacl, ACL_NEXT_ENTRY, &pace_p);
+		if (result <= 0)
+			goto out;
+
+		result2 = acl_get_tag_type(pace_p, &ace_type);
+		if (result2 < 0)
+			goto out;
+	}
+
+	/* deny ACEs */
+
+	result = acl_get_entry(pacl, ACL_FIRST_ENTRY, &pace_p);
+	if (result <= 0)
+		goto out;
+
+	result2 = acl_get_tag_type(pace_p, &ace_type);
+	if (result2 < 0)
+		goto out;
+
+	while (ace_type != ACL_GROUP_OBJ && result > 0) {
+		result = acl_get_entry(pacl, ACL_NEXT_ENTRY, &pace_p);
+		if(result <= 0)
+			goto out;
+
+		result2 = acl_get_tag_type(pace_p, &ace_type);
+		if(result2 < 0)
+			goto out;
+	}
+
+	result = acl_get_permset(pace_p, &perms);
+	if (result < 0)
+		goto out;
+
+	result = acl_ptn4_get_mask(&mask, perms, iflags);
+	if (result < 0)
+		goto out;
+
+	result = acl_nfs4_add_ace(acl, NFS4_ACE_ACCESS_DENIED_ACE_TYPE,
+			NFS4_ACE_IDENTIFIER_GROUP | eflag, ~mask, NFS4_ACL_WHO_GROUP,
+			NULL);
+
+	if (result < 0)
+		goto out;
+
+	result = acl_get_entry(pacl, ACL_NEXT_ENTRY, &pace_p);
+	if (result <= 0)
+		goto out;
+
+	result2 = acl_get_tag_type(pace_p, &ace_type);
+	if (result2 < 0)
+		goto out;
+
+	while (ace_type == ACL_GROUP && result > 0) {
+		result = acl_get_permset(pace_p, &perms);
+		if (result < 0)
+			goto out;
+
+		result = acl_ptn4_get_mask(&mask, perms, iflags);
+		if (result < 0)
+			goto out;
+
+		gid_p = acl_get_qualifier(pace_p);
+
+		who_buf = who_buf_static;
+		who_buflen = who_buflen_static;
+
+		result = nfs4_gid_to_name(*gid_p, nfs_domain, who_buf, who_buflen);
+
+
+		while (result == -ENOBUFS) {
+			if (who_buf != who_buf_static)
+				free(who_buf);
+
+			/* Increase the size by a full buflen unit */
+			who_buflen += who_buflen_static;
+			who_buf = malloc(who_buflen);
+
+			if (who_buf == NULL) {
+				result = -ENOMEM;
+				break;
+			}
+
+			result = nfs4_gid_to_name(*gid_p, nfs_domain, who_buf, who_buflen);
+		}
+
+		acl_free(gid_p);
+
+		if (result < 0) {
+			errno = -result;
+			goto out;
+		}
+
+		if (who_buf == NULL)
+			goto out;
+
+		result = acl_nfs4_add_ace(acl, NFS4_ACE_ACCESS_DENIED_ACE_TYPE,
+		    		NFS4_ACE_IDENTIFIER_GROUP | eflag, ~mask,
+					NFS4_ACL_WHO_NAMED, who_buf);
+		if (who_buf != who_buf_static)
+			free(who_buf);
+		if (result < 0)
+			goto out;
+
+		result = acl_get_entry(pacl, ACL_NEXT_ENTRY, &pace_p);
+		if (result <= 0)
+			goto out;
+
+		result2 = acl_get_tag_type(pace_p, &ace_type);
+		if (result2 < 0)
+			goto out;
+	}
+
+	if (ace_type == ACL_MASK) {
+		result = acl_get_entry(pacl, ACL_NEXT_ENTRY, &pace_p);
+		if (result <= 0)
+			goto out;
+
+		result2 = acl_get_tag_type(pace_p, &ace_type);
+		if (result2 < 0)
+			goto out;
+	}
+
+	if (ace_type != ACL_OTHER) {
+		errno = EINVAL;
+		goto out;
+	}
+
+	result = acl_get_permset(pace_p, &perms);
+	if (result < 0)
+		goto out;
+
+	result = acl_ptn4_get_mask(&mask, perms, iflags);
+	if (result < 0)
+		goto out;
+
+	result = acl_nfs4_add_pair(acl, eflag, mask, NFS4_ACL_WHO_EVERYONE, NULL);
+
+	return result;
+out:
+	if (allocated)
+		acl_nfs4_free(acl);
+	return -1;
+}
--- acl-2.2.39/libacl/acl_get_fd.c.orig	2006-06-20 02:51:25.000000000 -0400
+++ acl-2.2.39/libacl/acl_get_fd.c	2007-08-22 12:02:13.000000000 -0400
@@ -28,6 +28,10 @@
 #include "libacl.h"
 #include "__acl_from_xattr.h"
 
+#ifdef USE_NFSV4_TRANS
+ #include "libacl_nfs4.h"
+#endif
+
 #include "byteorder.h"
 #include "acl_ea.h"
 
@@ -38,31 +42,59 @@ acl_get_fd(int fd)
 {
 	const size_t size_guess = acl_ea_size(16);
 	char *ext_acl_p = alloca(size_guess);
+	char *name = ACL_EA_ACCESS;
 	int retval;
+	int nfsv4acls;
 
 	if (!ext_acl_p)
 		return NULL;
-	retval = fgetxattr(fd, ACL_EA_ACCESS, ext_acl_p, size_guess);
+
+#ifdef USE_NFSV4_TRANS
+	retval = fgetxattr(fd, ACL_NFS4_XATTR, ext_acl_p, size_guess);
+	if(retval == -1 && (errno == ENOATTR || errno == EOPNOTSUPP)) {
+		nfsv4acls = ACL_NFS4_NOT_USED;
+		retval = fgetxattr(fd, name, ext_acl_p, size_guess);
+	} else {
+		nfsv4acls = ACL_NFS4_USED;
+		name = ACL_NFS4_XATTR;
+	}
+#else
+	retval = fgetxattr(fd, name, ext_acl_p, size_guess);
+#endif
+
 	if (retval == -1 && errno == ERANGE) {
-		retval = fgetxattr(fd, ACL_EA_ACCESS, NULL, 0);
+		retval = fgetxattr(fd, name, NULL, 0);
 		if (retval > 0) {
 			ext_acl_p = alloca(retval);
 			if (!ext_acl_p)
 				return NULL;
-			retval = fgetxattr(fd, ACL_EA_ACCESS, ext_acl_p,retval);
+			retval = fgetxattr(fd, name, ext_acl_p, retval);
 		}
 	}
 	if (retval > 0) {
-		acl_t acl = __acl_from_xattr(ext_acl_p, retval);
-		return acl;
+#ifdef USE_NFSV4_TRANS
+		if(nfsv4acls == ACL_NFS4_USED) {
+			acl_t acl = __posix_acl_from_nfs4_xattr(ext_acl_p, retval,
+					ACL_TYPE_ACCESS, NFS4_ACL_ISFILE);
+
+			return acl;
+		}
+		else
+#endif
+		{
+			acl_t acl = __acl_from_xattr(ext_acl_p, retval);
+			return acl;
+		}
 	} else if (retval == 0 || errno == ENOATTR || errno == ENODATA) {
 		struct stat st;
 
-		if (fstat(fd, &st) == 0)
-			return acl_from_mode(st.st_mode);
-		else
+		if (fstat(fd, &st) != 0) {
 			return NULL;
-	} else
+		}
+
+		return acl_from_mode(st.st_mode);
+	} else {
 		return NULL;
+	}
 }
 
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_nfs4_xattr_size.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,91 @@
+/*
+ *  NFSv4 ACL Code
+ *  Return the expected xattr XDR encoded size of the nfs acl. Used for
+ *  figuring the size of the xattr buffer.
+ *
+ *  Copyright (c) 2002, 2003 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions and the following disclaimer.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <libacl_nfs4.h>
+
+int acl_nfs4_xattr_size(struct nfs4_acl * acl)
+{
+	int size = 0;
+	struct nfs4_ace * ace;
+	int ace_num;
+	int num_aces;
+
+	if(acl == NULL) {
+		errno = EINVAL;
+		goto failed;
+	}
+
+	/* Space for number of aces */
+	size += sizeof(u32);
+
+	ace = acl->ace_head.tqh_first;
+	ace_num = 1;
+
+	num_aces = acl->naces;
+
+	while(1)
+	{
+		if(ace == NULL) {
+			if(ace_num > num_aces) {
+				break;
+			} else {
+				errno = ENODATA;
+				goto failed;
+			}
+		}
+
+		/* space for type, flag, and mask */
+		size += (3 * sizeof(u32));
+
+		/* space for strlen */
+		size += sizeof(u32);
+
+		/* space for the who string... xdr encoded */
+		size += (strlen(ace->who) / NFS4_XDR_MOD) * NFS4_XDR_MOD * sizeof(char);
+		if(strlen(ace->who) % NFS4_XDR_MOD) {
+			size += NFS4_XDR_MOD;
+		}
+
+		ace = ace->l_ace.tqe_next;
+		ace_num++;
+	}
+
+	return size;
+
+failed:
+	return -1;
+}
+
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_ptn4_get_mask.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,81 @@
+/*
+ *  NFSv4 ACL Code
+ *  Translate POSIX permissions to an NFSv4 mask
+ *
+ *  Copyright (c) 2002, 2003 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions and the following disclaimer.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <acl/libacl.h>
+#include <libacl_nfs4.h>
+
+int acl_ptn4_get_mask(u32* mask, acl_permset_t perms, int iflags)
+{
+	int result;
+
+	*mask = NFS4_ANYONE_MODE;
+
+	if (perms == NULL) {
+		errno = EINVAL;
+		goto failed;
+	}
+
+	if (iflags & NFS4_ACL_OWNER)
+		*mask |= NFS4_OWNER_MODE;
+
+	result = acl_get_perm(perms, ACL_READ);
+	if (result < 0)
+		goto failed;
+	else if(result == 1)
+		*mask |= NFS4_READ_MODE;
+
+	result = acl_get_perm(perms, ACL_WRITE);
+	if (result < 0)
+		goto failed;
+	else if (result == 1) {
+		*mask |= NFS4_WRITE_MODE;
+		if (iflags & NFS4_ACL_ISDIR)
+			*mask |= NFS4_ACE_DELETE_CHILD;
+	}
+
+	result = acl_get_perm(perms, ACL_EXECUTE);
+	if (result < 0)
+		goto failed;
+	else if (result == 1)
+		*mask |= NFS4_EXECUTE_MODE;
+
+	return 0;
+
+failed:
+	return -1;
+}
+
+
+
--- acl-2.2.39/libacl/acl_get_file.c.orig	2006-06-20 02:51:25.000000000 -0400
+++ acl-2.2.39/libacl/acl_get_file.c	2007-08-22 12:02:13.000000000 -0400
@@ -28,6 +28,10 @@
 #include "libacl.h"
 #include "__acl_from_xattr.h"
 
+#ifdef USE_NFSV4_TRANS
+ #include "libacl_nfs4.h"
+#endif
+
 #include "byteorder.h"
 #include "acl_ea.h"
 
@@ -40,6 +44,8 @@ acl_get_file(const char *path_p, acl_typ
 	char *ext_acl_p = alloca(size_guess);
 	const char *name;
 	int retval;
+	int nfsv4acls;
+	int iflags;
 
 	switch(type) {
 		case ACL_TYPE_ACCESS:
@@ -55,8 +61,20 @@ acl_get_file(const char *path_p, acl_typ
 
 	if (!ext_acl_p)
 		return NULL;
+#ifdef USE_NFSV4_TRANS
+	retval = getxattr(path_p, ACL_NFS4_XATTR, ext_acl_p, size_guess);
+	if((retval == -1) && (errno == ENOATTR || errno == EOPNOTSUPP)) {
+		nfsv4acls = ACL_NFS4_NOT_USED;
+		retval = getxattr(path_p, name, ext_acl_p, size_guess);
+	} else {
+		nfsv4acls = ACL_NFS4_USED;
+		name = ACL_NFS4_XATTR;
+	}
+#else
 	retval = getxattr(path_p, name, ext_acl_p, size_guess);
-	if (retval == -1 && errno == ERANGE) {
+#endif
+
+	if ((retval == -1) && (errno == ERANGE)) {
 		retval = getxattr(path_p, name, NULL, 0);
 		if (retval > 0) {
 			ext_acl_p = alloca(retval);
@@ -66,9 +84,29 @@ acl_get_file(const char *path_p, acl_typ
 		}
 	}
 	if (retval > 0) {
-		acl_t acl = __acl_from_xattr(ext_acl_p, retval);
-		return acl;
-	} else if (retval == 0 || errno == ENOATTR || errno == ENODATA) {
+#ifdef USE_NFSV4_TRANS
+		if(nfsv4acls == ACL_NFS4_USED) {
+			struct stat st;
+
+			iflags = NFS4_ACL_ISFILE;
+
+			if (stat(path_p, &st) != 0)
+				return NULL;
+
+			if (S_ISDIR(st.st_mode))
+				iflags = NFS4_ACL_ISDIR;
+
+			acl_t acl = __posix_acl_from_nfs4_xattr(ext_acl_p, retval, type,
+					iflags);
+			return acl;
+		}
+		else
+#endif
+		{
+			acl_t acl = __acl_from_xattr(ext_acl_p, retval);
+			return acl;
+		}
+	} else if ((retval == 0) || (errno == ENOATTR) || (errno == ENODATA)) {
 		struct stat st;
 
 		if (stat(path_p, &st) != 0)
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/libacl_nfs4.h	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,97 @@
+#include <sys/types.h>
+#include <pwd.h>
+#include <grp.h>
+#include <sys/acl.h>
+#include <stdlib.h>
+#include <sys/queue.h>
+#include <nfs4.h>
+#include <sys/errno.h>
+#include <string.h>
+
+/* mode bit translations: */
+#define NFS4_READ_MODE NFS4_ACE_READ_DATA
+#define NFS4_WRITE_MODE (NFS4_ACE_WRITE_DATA | NFS4_ACE_APPEND_DATA)
+#define NFS4_EXECUTE_MODE NFS4_ACE_EXECUTE
+#define NFS4_ANYONE_MODE (NFS4_ACE_READ_ATTRIBUTES | NFS4_ACE_READ_ACL | \
+		NFS4_ACE_SYNCHRONIZE)
+#define NFS4_OWNER_MODE (NFS4_ACE_WRITE_ATTRIBUTES | NFS4_ACE_WRITE_ACL)
+
+#define NFS4_ACE_MASK_IGNORE (NFS4_ACE_DELETE | NFS4_ACE_WRITE_OWNER \
+		| NFS4_ACE_READ_NAMED_ATTRS | NFS4_ACE_WRITE_NAMED_ATTRS)
+/* XXX not sure about the following.  Note that e.g. DELETE_CHILD is wrong in
+ * general (should only be ignored on files). */
+#define MASK_EQUAL(mask1, mask2) \
+	(((mask1) & NFS4_ACE_MASK_ALL & ~NFS4_ACE_MASK_IGNORE & \
+	  					~NFS4_ACE_DELETE_CHILD) \
+	 == ((mask2) & NFS4_ACE_MASK_ALL & ~NFS4_ACE_MASK_IGNORE & \
+		 				~NFS4_ACE_DELETE_CHILD))
+
+/* Maximum length of the ace->who attribute */
+#define NFS4_ACL_WHO_LENGTH_MAX		2048
+#define NFS4_ACL_WHO_BUFFER_LEN_GUESS	255
+
+/* NFS4 acl xattr name */
+#define ACL_NFS4_XATTR "system.nfs4_acl"
+
+/* Macro for finding empty tailqs */
+#define TAILQ_IS_EMPTY(head) (head.tqh_first == NULL)
+
+/* Flags to pass certain properties around */
+#define NFS4_ACL_NOFLAGS			0x00
+#define NFS4_ACL_ISFILE				0x00
+#define NFS4_ACL_ISDIR				0x01
+#define NFS4_ACL_OWNER				0x02
+#define NFS4_ACL_REQUEST_DEFAULT	0x04
+#define NFS4_ACL_RAW				0x01
+
+#define NFS4_XDR_MOD				4
+
+typedef u_int32_t u32;
+
+enum {	ACL_NFS4_NOT_USED = 0,
+		ACL_NFS4_USED
+};
+
+struct ace_container {
+	struct nfs4_ace *ace;
+	TAILQ_ENTRY(ace_container) l_ace;
+};
+
+TAILQ_HEAD(ace_container_list_head, ace_container);
+
+/**** Public functions ****/
+
+/** Manipulation functions **/
+extern int				acl_nfs4_add_ace(struct nfs4_acl *, u32, u32, u32, int, char*);
+extern int				acl_nfs4_add_pair(struct nfs4_acl *, int, u32, int, char*);
+extern void				acl_nfs4_free(struct nfs4_acl *);
+extern struct nfs4_acl *acl_nfs4_new(u32);
+extern int				acl_nfs4_set_who(struct nfs4_ace*, int, char*);
+extern struct nfs4_acl *acl_nfs4_copy_acl(struct nfs4_acl *);
+extern struct nfs4_acl *acl_nfs4_xattr_load(char *, int, u32);
+extern int				acl_nfs4_xattr_pack(struct nfs4_acl *, char**);
+extern int				acl_nfs4_xattr_size(struct nfs4_acl *);
+extern void				acl_nfs4_remove_ace(struct nfs4_acl * acl, struct nfs4_ace * ace);
+
+/** Conversion functions **/
+
+/* nfs4 -> posix */
+extern acl_t		acl_n4tp_acl_trans(struct nfs4_acl *, acl_type_t);
+
+/* posix -> nfs4 */
+extern int				acl_ptn4_get_mask(u32* mask, acl_permset_t perms,
+								int iflags);
+extern int acl_ptn4_acl_trans(acl_t, struct nfs4_acl *, acl_type_t, u32, char*);
+
+
+/** Access Functions **/
+extern inline int	acl_nfs4_get_whotype(char*);
+extern int			acl_nfs4_get_who(struct nfs4_ace*, int*, char**);
+
+/**** Private(?) functions ****/
+acl_t		__posix_acl_from_nfs4_xattr(char*, int, acl_type_t, u32);
+
+/* These will change */
+char * nfs4_get_who_from_uid(uid_t);
+char * nfs4_get_who_from_gid(gid_t);
+/* End change */
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_nfs4_new.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,58 @@
+/*
+ *  Common NFSv4 ACL handling code.
+ *  Create a new NFSv4 ACL
+ *
+ *  Copyright (c) 2002, 2003 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Marius Aamodt Eriksen <marius@umich.edu>
+ *  J. Bruce Fields <bfields@umich.edu>
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *  Jeff Sedlak <jsedlak@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions and the following disclaimer.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+
+
+#include "libacl_nfs4.h"
+
+struct nfs4_acl *
+acl_nfs4_new(u32 is_dir)
+{
+	struct nfs4_acl *acl;
+
+	if ((acl = malloc(sizeof(*acl))) == NULL)
+		return NULL;
+
+	acl->naces = 0;
+	acl->is_directory = is_dir;
+
+	TAILQ_INIT(&acl->ace_head);
+
+	return acl;
+}
+
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_nfs4_copy_acl.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,85 @@
+/*
+ *  NFSv4 ACL Code
+ *  Deep copy an NFS4 ACL
+ *
+ *  Copyright (c) 2002, 2003 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions and the following disclaimer.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include "libacl_nfs4.h"
+
+struct nfs4_acl * acl_nfs4_copy_acl(struct nfs4_acl * nacl)
+{
+	struct nfs4_acl * new_acl;
+	struct nfs4_ace * ace;
+	u32 nace;
+	u32 num_aces;
+	int result;
+
+	if(nacl == NULL) {
+		errno = EINVAL;
+		goto failed;
+	}
+
+	num_aces = nacl->naces;
+
+	new_acl = acl_nfs4_new(nacl->is_directory);
+	if(new_acl == NULL)
+		goto failed;
+
+	ace = nacl->ace_head.tqh_first;
+	nace = 1;
+
+	while(1)
+	{
+		if(ace == NULL) {
+			if(nace > num_aces)
+				break;
+			else
+				goto free_failed;
+		}
+
+		result = acl_nfs4_add_ace(new_acl, ace->type, ace->flag,
+				ace->access_mask, acl_nfs4_get_whotype(ace->who), ace->who);
+		if(result < 0)
+			goto free_failed;
+
+		ace = ace->l_ace.tqe_next;
+		nace++;
+	}
+
+	return new_acl;
+
+free_failed:
+	acl_nfs4_free(new_acl);
+
+failed:
+	return NULL;
+}
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/libacl/acl_nfs4_add_pair.c	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,60 @@
+/*
+ *  Add a pair of aces to the acl. The ace masks are complements of each other
+ *  This keeps us from walking off the end of the acl
+ *
+ *  Copyright (c) 2004 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Marius Aamodt Eriksen <marius@umich.edu>
+ *  J. Bruce Fields <bfields@umich.edu>
+ *  Nathaniel Gallaher <ngallahe@umich.edu>
+ *  Jeff Sedlak <jsedlak@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions, the following disclaimer, and
+ *     any and all other licensing or copyright notices included in
+ *     any files in this distribution.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ *
+ */
+
+
+#include "libacl_nfs4.h"
+
+int
+acl_nfs4_add_pair(struct nfs4_acl *acl, int eflag, u32 mask, int ownertype,
+		char* owner)
+{
+	int error;
+
+	error = acl_nfs4_add_ace(acl, NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE,
+				 eflag, mask, ownertype, owner);
+	if (error < 0)
+		return error;
+	error = acl_nfs4_add_ace(acl, NFS4_ACE_ACCESS_DENIED_ACE_TYPE,
+				eflag, ~mask, ownertype, owner);
+	return error;
+}
+
+
--- acl-2.2.39/exports.orig	2006-06-20 02:51:25.000000000 -0400
+++ acl-2.2.39/exports	2007-08-22 12:02:13.000000000 -0400
@@ -67,3 +67,33 @@ ACL_1.1 {
 	perm_copy_fd;
 	perm_copy_file;
 } ACL_1.0;
+
+ACL_1.2 {
+	global:
+	acl_nfs4_add_ace;
+	acl_nfs4_add_pair;
+	acl_nfs4_free;
+	acl_nfs4_new;
+	acl_nfs4_set_dir;
+	acl_nfs4_set_who;
+	acl_nfs4_copy_acl;
+	acl_nfs4_xattr_load;
+	acl_nfs4_xattr_pack;
+	acl_nfs4_xattr_size;
+	acl_nfs4_remove_ace;
+
+	acl_n4tp_acl_trans;
+
+	acl_ptn4_get_mask;
+	acl_ptn4_acl_trans;
+
+	acl_nfs4_get_whotype;
+	acl_nfs4_get_who;
+	acl_nfs4_entries;
+
+	local:
+	__posix_acl_from_nfs4_xattr;
+	nfs4_get_who_from_uid;
+	nfs4_get_who_from_gid;
+
+} ACL_1.1;
--- acl-2.2.39/include/builddefs.in.orig	2007-08-22 11:59:37.000000000 -0400
+++ acl-2.2.39/include/builddefs.in	2007-08-22 12:02:13.000000000 -0400
@@ -65,7 +65,7 @@ endif
 
 GCFLAGS = $(OPTIMIZER) $(DEBUG) -funsigned-char -fno-strict-aliasing -Wall \
 	  -DVERSION=\"$(PKG_VERSION)\" -DLOCALEDIR=\"$(PKG_LOCALE_DIR)\"  \
-	  -DPACKAGE=\"$(PKG_NAME)\" -I$(TOPDIR)/include
+	  -DPACKAGE=\"$(PKG_NAME)\" -I$(TOPDIR)/include -DUSE_NFSV4_TRANS
 
 # Global, Platform, Local CFLAGS
 CFLAGS += $(GCFLAGS) $(PCFLAGS) $(LCFLAGS)
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/include/nfs4.h	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,397 @@
+/*
+ *  NFSv4 protocol definitions.
+ *
+ *  Copyright (c) 2002 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Kendrick Smith <kmsmith@umich.edu>
+ *  Andy Adamson   <andros@umich.edu>
+ */
+
+#include<sys/types.h>
+#include<sys/queue.h>
+
+#ifndef _LINUX_NFS4_H
+#define _LINUX_NFS4_H
+
+#define NFS4_VERIFIER_SIZE	8
+#define NFS4_FHSIZE		128
+#define NFS4_MAXNAMLEN		NAME_MAX
+
+#define NFS4_ACCESS_READ        0x0001
+#define NFS4_ACCESS_LOOKUP      0x0002
+#define NFS4_ACCESS_MODIFY      0x0004
+#define NFS4_ACCESS_EXTEND      0x0008
+#define NFS4_ACCESS_DELETE      0x0010
+#define NFS4_ACCESS_EXECUTE     0x0020
+
+#define NFS4_FH_PERISTENT		0x0000
+#define NFS4_FH_NOEXPIRE_WITH_OPEN	0x0001
+#define NFS4_FH_VOLATILE_ANY		0x0002
+#define NFS4_FH_VOL_MIGRATION		0x0004
+#define NFS4_FH_VOL_RENAME		0x0008
+
+#define NFS4_OPEN_RESULT_CONFIRM 0x0002
+
+#define NFS4_SHARE_ACCESS_READ	0x0001
+#define NFS4_SHARE_ACCESS_WRITE	0x0002
+#define NFS4_SHARE_ACCESS_BOTH	0x0003
+#define NFS4_SHARE_DENY_READ	0x0001
+#define NFS4_SHARE_DENY_WRITE	0x0002
+#define NFS4_SHARE_DENY_BOTH	0x0003
+
+#define NFS4_SET_TO_SERVER_TIME	0
+#define NFS4_SET_TO_CLIENT_TIME	1
+
+#define NFS4_ACE_ACCESS_ALLOWED_ACE_TYPE 0
+#define NFS4_ACE_ACCESS_DENIED_ACE_TYPE  1
+#define NFS4_ACE_SYSTEM_AUDIT_ACE_TYPE   2
+#define NFS4_ACE_SYSTEM_ALARM_ACE_TYPE   3
+
+#define ACL4_SUPPORT_ALLOW_ACL 0x01
+#define ACL4_SUPPORT_DENY_ACL  0x02
+#define ACL4_SUPPORT_AUDIT_ACL 0x04
+#define ACL4_SUPPORT_ALARM_ACL 0x08
+
+#define NFS4_ACE_FILE_INHERIT_ACE             0x00000001
+#define NFS4_ACE_DIRECTORY_INHERIT_ACE        0x00000002
+#define NFS4_ACE_NO_PROPAGATE_INHERIT_ACE     0x00000004
+#define NFS4_ACE_INHERIT_ONLY_ACE             0x00000008
+#define NFS4_ACE_SUCCESSFUL_ACCESS_ACE_FLAG   0x00000010
+#define NFS4_ACE_FAILED_ACCESS_ACE_FLAG       0x00000020
+#define NFS4_ACE_IDENTIFIER_GROUP             0x00000040
+#define NFS4_ACE_OWNER                        0x00000080
+#define NFS4_ACE_GROUP                        0x00000100
+#define NFS4_ACE_EVERYONE                     0x00000200
+
+#define NFS4_ACE_READ_DATA                    0x00000001
+#define NFS4_ACE_LIST_DIRECTORY               0x00000001
+#define NFS4_ACE_WRITE_DATA                   0x00000002
+#define NFS4_ACE_ADD_FILE                     0x00000002
+#define NFS4_ACE_APPEND_DATA                  0x00000004
+#define NFS4_ACE_ADD_SUBDIRECTORY             0x00000004
+#define NFS4_ACE_READ_NAMED_ATTRS             0x00000008
+#define NFS4_ACE_WRITE_NAMED_ATTRS            0x00000010
+#define NFS4_ACE_EXECUTE                      0x00000020
+#define NFS4_ACE_DELETE_CHILD                 0x00000040
+#define NFS4_ACE_READ_ATTRIBUTES              0x00000080
+#define NFS4_ACE_WRITE_ATTRIBUTES             0x00000100
+#define NFS4_ACE_DELETE                       0x00010000
+#define NFS4_ACE_READ_ACL                     0x00020000
+#define NFS4_ACE_WRITE_ACL                    0x00040000
+#define NFS4_ACE_WRITE_OWNER                  0x00080000
+#define NFS4_ACE_SYNCHRONIZE                  0x00100000
+#define NFS4_ACE_GENERIC_READ                 0x00120081
+#define NFS4_ACE_GENERIC_WRITE                0x00160106
+#define NFS4_ACE_GENERIC_EXECUTE              0x001200A0
+#define NFS4_ACE_MASK_ALL                     0x001F01FF
+
+enum nfs4_acl_whotype {
+	NFS4_ACL_WHO_NAMED = 0,
+	NFS4_ACL_WHO_OWNER,
+	NFS4_ACL_WHO_GROUP,
+	NFS4_ACL_WHO_EVERYONE,
+};
+
+#define NFS4_ACL_WHO_OWNER_STRING		"OWNER@"
+#define NFS4_ACL_WHO_GROUP_STRING		"GROUP@"
+#define NFS4_ACL_WHO_EVERYONE_STRING	"EVERYONE@"
+
+struct nfs4_ace {
+	u_int32_t	type;
+	u_int32_t	flag;
+	u_int32_t	access_mask;
+	char*	who;
+	TAILQ_ENTRY(nfs4_ace) l_ace;
+};
+
+TAILQ_HEAD(ace_list_head, nfs4_ace);
+
+struct nfs4_acl {
+	u_int32_t		naces;
+	u_int32_t		is_directory;
+	struct ace_list_head	ace_head;
+};
+
+typedef struct { char data[NFS4_VERIFIER_SIZE]; } nfs4_verifier;
+typedef struct { char data[16]; } nfs4_stateid;
+
+enum nfs_opnum4 {
+	OP_ACCESS = 3,
+	OP_CLOSE = 4,
+	OP_COMMIT = 5,
+	OP_CREATE = 6,
+	OP_DELEGPURGE = 7,
+	OP_DELEGRETURN = 8,
+	OP_GETATTR = 9,
+	OP_GETFH = 10,
+	OP_LINK = 11,
+	OP_LOCK = 12,
+	OP_LOCKT = 13,
+	OP_LOCKU = 14,
+	OP_LOOKUP = 15,
+	OP_LOOKUPP = 16,
+	OP_NVERIFY = 17,
+	OP_OPEN = 18,
+	OP_OPENATTR = 19,
+	OP_OPEN_CONFIRM = 20,
+	OP_OPEN_DOWNGRADE = 21,
+	OP_PUTFH = 22,
+	OP_PUTPUBFH = 23,
+	OP_PUTROOTFH = 24,
+	OP_READ = 25,
+	OP_READDIR = 26,
+	OP_READLINK = 27,
+	OP_REMOVE = 28,
+	OP_RENAME = 29,
+	OP_RENEW = 30,
+	OP_RESTOREFH = 31,
+	OP_SAVEFH = 32,
+	OP_SECINFO = 33,
+	OP_SETATTR = 34,
+	OP_SETCLIENTID = 35,
+	OP_SETCLIENTID_CONFIRM = 36,
+	OP_VERIFY = 37,
+	OP_WRITE = 38,
+	OP_RELEASE_LOCKOWNER = 39,
+	OP_ILLEGAL = 10044,
+};
+
+enum nfsstat4 {
+	NFS4_OK = 0,
+	NFS4ERR_PERM = 1,
+	NFS4ERR_NOENT = 2,
+	NFS4ERR_IO = 5,
+	NFS4ERR_NXIO = 6,
+	NFS4ERR_ACCESS = 13,
+	NFS4ERR_EXIST = 17,
+	NFS4ERR_XDEV = 18,
+	/* Unused/reserved 19 */
+	NFS4ERR_NOTDIR = 20,
+	NFS4ERR_ISDIR = 21,
+	NFS4ERR_INVAL = 22,
+	NFS4ERR_FBIG = 27,
+	NFS4ERR_NOSPC = 28,
+	NFS4ERR_ROFS = 30,
+	NFS4ERR_MLINK = 31,
+	NFS4ERR_NAMETOOLONG = 63,
+	NFS4ERR_NOTEMPTY = 66,
+	NFS4ERR_DQUOT = 69,
+	NFS4ERR_STALE = 70,
+	NFS4ERR_BADHANDLE = 10001,
+	NFS4ERR_BAD_COOKIE = 10003,
+	NFS4ERR_NOTSUPP = 10004,
+	NFS4ERR_TOOSMALL = 10005,
+	NFS4ERR_SERVERFAULT = 10006,
+	NFS4ERR_BADTYPE = 10007,
+	NFS4ERR_DELAY = 10008,
+	NFS4ERR_SAME = 10009,
+	NFS4ERR_DENIED = 10010,
+	NFS4ERR_EXPIRED = 10011,
+	NFS4ERR_LOCKED = 10012,
+	NFS4ERR_GRACE = 10013,
+	NFS4ERR_FHEXPIRED = 10014,
+	NFS4ERR_SHARE_DENIED = 10015,
+	NFS4ERR_WRONGSEC = 10016,
+	NFS4ERR_CLID_INUSE = 10017,
+	NFS4ERR_RESOURCE = 10018,
+	NFS4ERR_MOVED = 10019,
+	NFS4ERR_NOFILEHANDLE = 10020,
+	NFS4ERR_MINOR_VERS_MISMATCH = 10021,
+	NFS4ERR_STALE_CLIENTID = 10022,
+	NFS4ERR_STALE_STATEID = 10023,
+	NFS4ERR_OLD_STATEID = 10024,
+	NFS4ERR_BAD_STATEID = 10025,
+	NFS4ERR_BAD_SEQID = 10026,
+	NFS4ERR_NOT_SAME = 10027,
+	NFS4ERR_LOCK_RANGE = 10028,
+	NFS4ERR_SYMLINK = 10029,
+	NFS4ERR_RESTOREFH = 10030,
+	NFS4ERR_LEASE_MOVED = 10031,
+	NFS4ERR_ATTRNOTSUPP = 10032,
+	NFS4ERR_NO_GRACE = 10033,
+	NFS4ERR_RECLAIM_BAD = 10034,
+	NFS4ERR_RECLAIM_CONFLICT = 10035,
+	NFS4ERR_BADXDR = 10036,
+	NFS4ERR_LOCKS_HELD = 10037,
+	NFS4ERR_OPENMODE = 10038,
+	NFS4ERR_BADOWNER = 10039,
+	NFS4ERR_BADCHAR = 10040,
+	NFS4ERR_BADNAME = 10041,
+	NFS4ERR_BAD_RANGE = 10042,
+	NFS4ERR_LOCK_NOTSUPP = 10043,
+	NFS4ERR_OP_ILLEGAL = 10044,
+	NFS4ERR_DEADLOCK = 10045,
+	NFS4ERR_FILE_OPEN = 10046,
+	NFS4ERR_ADMIN_REVOKED = 10047,
+	NFS4ERR_CB_PATH_DOWN = 10048
+};
+
+/*
+ * Note: NF4BAD is not actually part of the protocol; it is just used
+ * internally by nfsd.
+ */
+enum nfs_ftype4 {
+	NF4BAD		= 0,
+        NF4REG          = 1,    /* Regular File */
+        NF4DIR          = 2,    /* Directory */
+        NF4BLK          = 3,    /* Special File - block device */
+        NF4CHR          = 4,    /* Special File - character device */
+        NF4LNK          = 5,    /* Symbolic Link */
+        NF4SOCK         = 6,    /* Special File - socket */
+        NF4FIFO         = 7,    /* Special File - fifo */
+        NF4ATTRDIR      = 8,    /* Attribute Directory */
+        NF4NAMEDATTR    = 9     /* Named Attribute */
+};
+
+enum open_claim_type4 {
+	NFS4_OPEN_CLAIM_NULL = 0,
+	NFS4_OPEN_CLAIM_PREVIOUS = 1,
+	NFS4_OPEN_CLAIM_DELEGATE_CUR = 2,
+	NFS4_OPEN_CLAIM_DELEGATE_PREV = 3
+};
+
+enum opentype4 {
+	NFS4_OPEN_NOCREATE = 0,
+	NFS4_OPEN_CREATE = 1
+};
+
+enum createmode4 {
+	NFS4_CREATE_UNCHECKED = 0,
+	NFS4_CREATE_GUARDED = 1,
+	NFS4_CREATE_EXCLUSIVE = 2
+};
+
+enum limit_by4 {
+	NFS4_LIMIT_SIZE = 1,
+	NFS4_LIMIT_BLOCKS = 2
+};
+
+enum open_delegation_type4 {
+	NFS4_OPEN_DELEGATE_NONE = 0,
+	NFS4_OPEN_DELEGATE_READ = 1,
+	NFS4_OPEN_DELEGATE_WRITE = 2
+};
+
+enum lock_type4 {
+	NFS4_UNLOCK_LT = 0,
+	NFS4_READ_LT = 1,
+	NFS4_WRITE_LT = 2,
+	NFS4_READW_LT = 3,
+	NFS4_WRITEW_LT = 4
+};
+
+
+/* Mandatory Attributes */
+#define FATTR4_WORD0_SUPPORTED_ATTRS    (1UL << 0)
+#define FATTR4_WORD0_TYPE               (1UL << 1)
+#define FATTR4_WORD0_FH_EXPIRE_TYPE     (1UL << 2)
+#define FATTR4_WORD0_CHANGE             (1UL << 3)
+#define FATTR4_WORD0_SIZE               (1UL << 4)
+#define FATTR4_WORD0_LINK_SUPPORT       (1UL << 5)
+#define FATTR4_WORD0_SYMLINK_SUPPORT    (1UL << 6)
+#define FATTR4_WORD0_NAMED_ATTR         (1UL << 7)
+#define FATTR4_WORD0_FSID               (1UL << 8)
+#define FATTR4_WORD0_UNIQUE_HANDLES     (1UL << 9)
+#define FATTR4_WORD0_LEASE_TIME         (1UL << 10)
+#define FATTR4_WORD0_RDATTR_ERROR       (1UL << 11)
+
+/* Recommended Attributes */
+#define FATTR4_WORD0_ACL                (1UL << 12)
+#define FATTR4_WORD0_ACLSUPPORT         (1UL << 13)
+#define FATTR4_WORD0_ARCHIVE            (1UL << 14)
+#define FATTR4_WORD0_CANSETTIME         (1UL << 15)
+#define FATTR4_WORD0_CASE_INSENSITIVE   (1UL << 16)
+#define FATTR4_WORD0_CASE_PRESERVING    (1UL << 17)
+#define FATTR4_WORD0_CHOWN_RESTRICTED   (1UL << 18)
+#define FATTR4_WORD0_FILEHANDLE         (1UL << 19)
+#define FATTR4_WORD0_FILEID             (1UL << 20)
+#define FATTR4_WORD0_FILES_AVAIL        (1UL << 21)
+#define FATTR4_WORD0_FILES_FREE         (1UL << 22)
+#define FATTR4_WORD0_FILES_TOTAL        (1UL << 23)
+#define FATTR4_WORD0_FS_LOCATIONS       (1UL << 24)
+#define FATTR4_WORD0_HIDDEN             (1UL << 25)
+#define FATTR4_WORD0_HOMOGENEOUS        (1UL << 26)
+#define FATTR4_WORD0_MAXFILESIZE        (1UL << 27)
+#define FATTR4_WORD0_MAXLINK            (1UL << 28)
+#define FATTR4_WORD0_MAXNAME            (1UL << 29)
+#define FATTR4_WORD0_MAXREAD            (1UL << 30)
+#define FATTR4_WORD0_MAXWRITE           (1UL << 31)
+#define FATTR4_WORD1_MIMETYPE           (1UL << 0)
+#define FATTR4_WORD1_MODE               (1UL << 1)
+#define FATTR4_WORD1_NO_TRUNC           (1UL << 2)
+#define FATTR4_WORD1_NUMLINKS           (1UL << 3)
+#define FATTR4_WORD1_OWNER              (1UL << 4)
+#define FATTR4_WORD1_OWNER_GROUP        (1UL << 5)
+#define FATTR4_WORD1_QUOTA_HARD         (1UL << 6)
+#define FATTR4_WORD1_QUOTA_SOFT         (1UL << 7)
+#define FATTR4_WORD1_QUOTA_USED         (1UL << 8)
+#define FATTR4_WORD1_RAWDEV             (1UL << 9)
+#define FATTR4_WORD1_SPACE_AVAIL        (1UL << 10)
+#define FATTR4_WORD1_SPACE_FREE         (1UL << 11)
+#define FATTR4_WORD1_SPACE_TOTAL        (1UL << 12)
+#define FATTR4_WORD1_SPACE_USED         (1UL << 13)
+#define FATTR4_WORD1_SYSTEM             (1UL << 14)
+#define FATTR4_WORD1_TIME_ACCESS        (1UL << 15)
+#define FATTR4_WORD1_TIME_ACCESS_SET    (1UL << 16)
+#define FATTR4_WORD1_TIME_BACKUP        (1UL << 17)
+#define FATTR4_WORD1_TIME_CREATE        (1UL << 18)
+#define FATTR4_WORD1_TIME_DELTA         (1UL << 19)
+#define FATTR4_WORD1_TIME_METADATA      (1UL << 20)
+#define FATTR4_WORD1_TIME_MODIFY        (1UL << 21)
+#define FATTR4_WORD1_TIME_MODIFY_SET    (1UL << 22)
+#define FATTR4_WORD1_MOUNTED_ON_FILEID  (1UL << 23)
+
+#define NFSPROC4_NULL 0
+#define NFSPROC4_COMPOUND 1
+#define NFS4_MINOR_VERSION 0
+#define NFS4_DEBUG 1
+
+#ifdef __KERNEL__
+
+/* Index of predefined Linux client operations */
+
+enum {
+	NFSPROC4_CLNT_NULL = 0,		/* Unused */
+	NFSPROC4_CLNT_READ,
+	NFSPROC4_CLNT_WRITE,
+	NFSPROC4_CLNT_COMMIT,
+	NFSPROC4_CLNT_OPEN,
+	NFSPROC4_CLNT_OPEN_CONFIRM,
+	NFSPROC4_CLNT_OPEN_RECLAIM,
+	NFSPROC4_CLNT_OPEN_DOWNGRADE,
+	NFSPROC4_CLNT_CLOSE,
+	NFSPROC4_CLNT_SETATTR,
+	NFSPROC4_CLNT_FSINFO,
+	NFSPROC4_CLNT_RENEW,
+	NFSPROC4_CLNT_SETCLIENTID,
+	NFSPROC4_CLNT_SETCLIENTID_CONFIRM,
+	NFSPROC4_CLNT_LOCK,
+	NFSPROC4_CLNT_LOCKT,
+	NFSPROC4_CLNT_LOCKU,
+	NFSPROC4_CLNT_ACCESS,
+	NFSPROC4_CLNT_GETATTR,
+	NFSPROC4_CLNT_LOOKUP,
+	NFSPROC4_CLNT_LOOKUP_ROOT,
+	NFSPROC4_CLNT_REMOVE,
+	NFSPROC4_CLNT_RENAME,
+	NFSPROC4_CLNT_LINK,
+	NFSPROC4_CLNT_CREATE,
+	NFSPROC4_CLNT_PATHCONF,
+	NFSPROC4_CLNT_STATFS,
+	NFSPROC4_CLNT_READLINK,
+	NFSPROC4_CLNT_READDIR,
+	NFSPROC4_CLNT_SERVER_CAPS,
+	NFSPROC4_CLNT_DELEGRETURN,
+	NFSPROC4_CLNT_GETACL,
+	NFSPROC4_CLNT_SETACL,
+};
+
+#endif
+#endif
+
+/*
+ * Local variables:
+ *  c-basic-offset: 8
+ * End:
+ */
--- /dev/null	2007-08-22 11:21:03.626521839 -0400
+++ acl-2.2.39/include/libacl_nfs4.h	2007-08-22 12:02:13.000000000 -0400
@@ -0,0 +1,97 @@
+#include <sys/types.h>
+#include <pwd.h>
+#include <grp.h>
+#include <sys/acl.h>
+#include <stdlib.h>
+#include <sys/queue.h>
+#include <nfs4.h>
+#include <sys/errno.h>
+#include <string.h>
+
+/* mode bit translations: */
+#define NFS4_READ_MODE NFS4_ACE_READ_DATA
+#define NFS4_WRITE_MODE (NFS4_ACE_WRITE_DATA | NFS4_ACE_APPEND_DATA)
+#define NFS4_EXECUTE_MODE NFS4_ACE_EXECUTE
+#define NFS4_ANYONE_MODE (NFS4_ACE_READ_ATTRIBUTES | NFS4_ACE_READ_ACL | \
+		NFS4_ACE_SYNCHRONIZE)
+#define NFS4_OWNER_MODE (NFS4_ACE_WRITE_ATTRIBUTES | NFS4_ACE_WRITE_ACL)
+
+#define NFS4_ACE_MASK_IGNORE (NFS4_ACE_DELETE | NFS4_ACE_WRITE_OWNER \
+		| NFS4_ACE_READ_NAMED_ATTRS | NFS4_ACE_WRITE_NAMED_ATTRS)
+/* XXX not sure about the following.  Note that e.g. DELETE_CHILD is wrong in
+ * general (should only be ignored on files). */
+#define MASK_EQUAL(mask1, mask2) \
+	(((mask1) & NFS4_ACE_MASK_ALL & ~NFS4_ACE_MASK_IGNORE & \
+	  					~NFS4_ACE_DELETE_CHILD) \
+	 == ((mask2) & NFS4_ACE_MASK_ALL & ~NFS4_ACE_MASK_IGNORE & \
+		 				~NFS4_ACE_DELETE_CHILD))
+
+/* Maximum length of the ace->who attribute */
+#define NFS4_ACL_WHO_LENGTH_MAX		2048
+#define NFS4_ACL_WHO_BUFFER_LEN_GUESS	255
+
+/* NFS4 acl xattr name */
+#define ACL_NFS4_XATTR "system.nfs4_acl"
+
+/* Macro for finding empty tailqs */
+#define TAILQ_IS_EMPTY(head) (head.tqh_first == NULL)
+
+/* Flags to pass certain properties around */
+#define NFS4_ACL_NOFLAGS			0x00
+#define NFS4_ACL_ISFILE				0x00
+#define NFS4_ACL_ISDIR				0x01
+#define NFS4_ACL_OWNER				0x02
+#define NFS4_ACL_REQUEST_DEFAULT	0x04
+#define NFS4_ACL_RAW				0x01
+
+#define NFS4_XDR_MOD				4
+
+typedef u_int32_t u32;
+
+enum {	ACL_NFS4_NOT_USED = 0,
+		ACL_NFS4_USED
+};
+
+struct ace_container {
+	struct nfs4_ace *ace;
+	TAILQ_ENTRY(ace_container) l_ace;
+};
+
+TAILQ_HEAD(ace_container_list_head, ace_container);
+
+/**** Public functions ****/
+
+/** Manipulation functions **/
+extern int				acl_nfs4_add_ace(struct nfs4_acl *, u32, u32, u32, int, char*);
+extern int				acl_nfs4_add_pair(struct nfs4_acl *, int, u32, int, char*);
+extern void				acl_nfs4_free(struct nfs4_acl *);
+extern struct nfs4_acl *acl_nfs4_new(u32);
+extern int				acl_nfs4_set_who(struct nfs4_ace*, int, char*);
+extern struct nfs4_acl *acl_nfs4_copy_acl(struct nfs4_acl *);
+extern struct nfs4_acl *acl_nfs4_xattr_load(char *, int, u32);
+extern int				acl_nfs4_xattr_pack(struct nfs4_acl *, char**);
+extern int				acl_nfs4_xattr_size(struct nfs4_acl *);
+extern void				acl_nfs4_remove_ace(struct nfs4_acl * acl, struct nfs4_ace * ace);
+
+/** Conversion functions **/
+
+/* nfs4 -> posix */
+extern acl_t		acl_n4tp_acl_trans(struct nfs4_acl *, acl_type_t);
+
+/* posix -> nfs4 */
+extern int				acl_ptn4_get_mask(u32* mask, acl_permset_t perms,
+								int iflags);
+extern int acl_ptn4_acl_trans(acl_t, struct nfs4_acl *, acl_type_t, u32, char*);
+
+
+/** Access Functions **/
+extern inline int	acl_nfs4_get_whotype(char*);
+extern int			acl_nfs4_get_who(struct nfs4_ace*, int*, char**);
+
+/**** Private(?) functions ****/
+acl_t		__posix_acl_from_nfs4_xattr(char*, int, acl_type_t, u32);
+
+/* These will change */
+char * nfs4_get_who_from_uid(uid_t);
+char * nfs4_get_who_from_gid(gid_t);
+/* End change */