add function to convert access flags to legacy open mode
[GitHub/mt8127/android_kernel_alcatel_ttab.git] / fs / cifs / dir.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs/dir.c
3 *
4 * vfs operations that deal with dentries
5fdae1f6 5 *
ad7a2926 6 * Copyright (C) International Business Machines Corp., 2002,2008
1da177e4
LT
7 * Author(s): Steve French (sfrench@us.ibm.com)
8 *
9 * This library is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU Lesser General Public License as published
11 * by the Free Software Foundation; either version 2.1 of the License, or
12 * (at your option) any later version.
13 *
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
17 * the GNU Lesser General Public License for more details.
18 *
19 * You should have received a copy of the GNU Lesser General Public License
20 * along with this library; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
22 */
23#include <linux/fs.h>
24#include <linux/stat.h>
25#include <linux/slab.h>
26#include <linux/namei.h>
27#include "cifsfs.h"
28#include "cifspdu.h"
29#include "cifsglob.h"
30#include "cifsproto.h"
31#include "cifs_debug.h"
32#include "cifs_fs_sb.h"
33
99ee4dbd 34static void
1da177e4
LT
35renew_parental_timestamps(struct dentry *direntry)
36{
5fdae1f6
SF
37 /* BB check if there is a way to get the kernel to do this or if we
38 really need this */
1da177e4
LT
39 do {
40 direntry->d_time = jiffies;
41 direntry = direntry->d_parent;
5fdae1f6 42 } while (!IS_ROOT(direntry));
1da177e4
LT
43}
44
45/* Note: caller must free return buffer */
46char *
47build_path_from_dentry(struct dentry *direntry)
48{
49 struct dentry *temp;
2fe87f02
SF
50 int namelen;
51 int pplen;
1da177e4 52 char *full_path;
88274815 53 char dirsep;
1da177e4 54
5fdae1f6 55 if (direntry == NULL)
1da177e4
LT
56 return NULL; /* not much we can do if dentry is freed and
57 we need to reopen the file after it was closed implicitly
58 when the server crashed */
59
88274815 60 dirsep = CIFS_DIR_SEP(CIFS_SB(direntry->d_sb));
2fe87f02 61 pplen = CIFS_SB(direntry->d_sb)->prepathlen;
1da177e4 62cifs_bp_rename_retry:
5fdae1f6 63 namelen = pplen;
1da177e4
LT
64 for (temp = direntry; !IS_ROOT(temp);) {
65 namelen += (1 + temp->d_name.len);
66 temp = temp->d_parent;
5fdae1f6
SF
67 if (temp == NULL) {
68 cERROR(1, ("corrupt dentry"));
1da177e4
LT
69 return NULL;
70 }
71 }
72
73 full_path = kmalloc(namelen+1, GFP_KERNEL);
5fdae1f6 74 if (full_path == NULL)
1da177e4
LT
75 return full_path;
76 full_path[namelen] = 0; /* trailing null */
1da177e4
LT
77 for (temp = direntry; !IS_ROOT(temp);) {
78 namelen -= 1 + temp->d_name.len;
79 if (namelen < 0) {
80 break;
81 } else {
7f57356b 82 full_path[namelen] = dirsep;
1da177e4
LT
83 strncpy(full_path + namelen + 1, temp->d_name.name,
84 temp->d_name.len);
2fe87f02 85 cFYI(0, ("name: %s", full_path + namelen));
1da177e4
LT
86 }
87 temp = temp->d_parent;
5fdae1f6
SF
88 if (temp == NULL) {
89 cERROR(1, ("corrupt dentry"));
1da177e4
LT
90 kfree(full_path);
91 return NULL;
92 }
93 }
2fe87f02 94 if (namelen != pplen) {
1da177e4 95 cERROR(1,
2fe87f02 96 ("did not end path lookup where expected namelen is %d",
1da177e4 97 namelen));
5fdae1f6 98 /* presumably this is only possible if racing with a rename
1da177e4
LT
99 of one of the parent directories (we can not lock the dentries
100 above us to prevent this, but retrying should be harmless) */
101 kfree(full_path);
1da177e4
LT
102 goto cifs_bp_rename_retry;
103 }
2fe87f02
SF
104 /* DIR_SEP already set for byte 0 / vs \ but not for
105 subsequent slashes in prepath which currently must
106 be entered the right way - not sure if there is an alternative
107 since the '\' is a valid posix character so we can not switch
108 those safely to '/' if any are found in the middle of the prepath */
109 /* BB test paths to Windows with '/' in the midst of prepath */
5fdae1f6 110 strncpy(full_path, CIFS_SB(direntry->d_sb)->prepath, pplen);
1da177e4
LT
111 return full_path;
112}
113
3979877e 114/* Inode operations in similar order to how they appear in Linux file fs.h */
1da177e4
LT
115
116int
117cifs_create(struct inode *inode, struct dentry *direntry, int mode,
118 struct nameidata *nd)
119{
120 int rc = -ENOENT;
121 int xid;
67750fb9 122 int create_options = CREATE_NOT_DIR;
1da177e4
LT
123 int oplock = 0;
124 int desiredAccess = GENERIC_READ | GENERIC_WRITE;
125 __u16 fileHandle;
126 struct cifs_sb_info *cifs_sb;
127 struct cifsTconInfo *pTcon;
128 char *full_path = NULL;
fb8c4b14 129 FILE_ALL_INFO *buf = NULL;
1da177e4 130 struct inode *newinode = NULL;
fb8c4b14
SF
131 struct cifsFileInfo *pCifsFile = NULL;
132 struct cifsInodeInfo *pCifsInode;
1da177e4 133 int disposition = FILE_OVERWRITE_IF;
4b18f2a9 134 bool write_only = false;
1da177e4
LT
135
136 xid = GetXid();
137
138 cifs_sb = CIFS_SB(inode->i_sb);
139 pTcon = cifs_sb->tcon;
140
1da177e4 141 full_path = build_path_from_dentry(direntry);
5fdae1f6 142 if (full_path == NULL) {
1da177e4
LT
143 FreeXid(xid);
144 return -ENOMEM;
145 }
146
5fdae1f6 147 if (nd && (nd->flags & LOOKUP_OPEN)) {
e08fc045
MS
148 int oflags = nd->intent.open.flags;
149
150 desiredAccess = 0;
151 if (oflags & FMODE_READ)
152 desiredAccess |= GENERIC_READ;
153 if (oflags & FMODE_WRITE) {
154 desiredAccess |= GENERIC_WRITE;
155 if (!(oflags & FMODE_READ))
4b18f2a9 156 write_only = true;
1da177e4
LT
157 }
158
5fdae1f6 159 if ((oflags & (O_CREAT | O_EXCL)) == (O_CREAT | O_EXCL))
1da177e4 160 disposition = FILE_CREATE;
5fdae1f6 161 else if ((oflags & (O_CREAT | O_TRUNC)) == (O_CREAT | O_TRUNC))
1da177e4 162 disposition = FILE_OVERWRITE_IF;
5fdae1f6 163 else if ((oflags & O_CREAT) == O_CREAT)
1da177e4 164 disposition = FILE_OPEN_IF;
ad7a2926 165 else
5fdae1f6 166 cFYI(1, ("Create flag not set in create function"));
1da177e4
LT
167 }
168
5fdae1f6
SF
169 /* BB add processing to set equivalent of mode - e.g. via CreateX with
170 ACLs */
1da177e4
LT
171 if (oplockEnabled)
172 oplock = REQ_OPLOCK;
173
5fdae1f6
SF
174 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
175 if (buf == NULL) {
1da177e4
LT
176 kfree(full_path);
177 FreeXid(xid);
178 return -ENOMEM;
179 }
67750fb9
JL
180
181 mode &= ~current->fs->umask;
182
183 /*
184 * if we're not using unix extensions, see if we need to set
185 * ATTR_READONLY on the create call
186 */
187 if (!pTcon->unix_ext && (mode & S_IWUGO) == 0)
188 create_options |= CREATE_OPTION_READONLY;
189
5fdae1f6 190 if (cifs_sb->tcon->ses->capabilities & CAP_NT_SMBS)
5bafd765 191 rc = CIFSSMBOpen(xid, pTcon, full_path, disposition,
67750fb9 192 desiredAccess, create_options,
737b758c
SF
193 &fileHandle, &oplock, buf, cifs_sb->local_nls,
194 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
5bafd765
SF
195 else
196 rc = -EIO; /* no NT SMB support fall into legacy open below */
197
5fdae1f6 198 if (rc == -EIO) {
a9d02ad4
SF
199 /* old server, retry the open legacy style */
200 rc = SMBLegacyOpen(xid, pTcon, full_path, disposition,
67750fb9 201 desiredAccess, create_options,
a9d02ad4
SF
202 &fileHandle, &oplock, buf, cifs_sb->local_nls,
203 cifs_sb->mnt_cifs_flags & CIFS_MOUNT_MAP_SPECIAL_CHR);
5fdae1f6 204 }
1da177e4 205 if (rc) {
26a21b98 206 cFYI(1, ("cifs_create returned 0x%x", rc));
1da177e4
LT
207 } else {
208 /* If Open reported that we actually created a file
209 then we now have to set the mode if possible */
c18c842b 210 if ((pTcon->unix_ext) && (oplock & CIFS_CREATE_ACTION)) {
5fdae1f6 211 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1da177e4 212 CIFSSMBUnixSetPerms(xid, pTcon, full_path, mode,
83451879
SF
213 (__u64)current->fsuid,
214 (__u64)current->fsgid,
1da177e4 215 0 /* dev */,
5fdae1f6
SF
216 cifs_sb->local_nls,
217 cifs_sb->mnt_cifs_flags &
737b758c 218 CIFS_MOUNT_MAP_SPECIAL_CHR);
1da177e4
LT
219 } else {
220 CIFSSMBUnixSetPerms(xid, pTcon, full_path, mode,
221 (__u64)-1,
222 (__u64)-1,
223 0 /* dev */,
737b758c 224 cifs_sb->local_nls,
5fdae1f6 225 cifs_sb->mnt_cifs_flags &
737b758c 226 CIFS_MOUNT_MAP_SPECIAL_CHR);
1da177e4 227 }
3ce53fc4 228 } else {
5fdae1f6
SF
229 /* BB implement mode setting via Windows security
230 descriptors e.g. */
231 /* CIFSSMBWinSetPerms(xid,pTcon,path,mode,-1,-1,nls);*/
232
233 /* Could set r/o dos attribute if mode & 0222 == 0 */
1da177e4
LT
234 }
235
c18c842b
SF
236 /* server might mask mode so we have to query for it */
237 if (pTcon->unix_ext)
1da177e4 238 rc = cifs_get_inode_info_unix(&newinode, full_path,
5fdae1f6 239 inode->i_sb, xid);
1da177e4
LT
240 else {
241 rc = cifs_get_inode_info(&newinode, full_path,
8b1327f6
SF
242 buf, inode->i_sb, xid,
243 &fileHandle);
5fdae1f6 244 if (newinode) {
1da177e4 245 newinode->i_mode = mode;
5fdae1f6
SF
246 if ((oplock & CIFS_CREATE_ACTION) &&
247 (cifs_sb->mnt_cifs_flags &
6473a559
SF
248 CIFS_MOUNT_SET_UID)) {
249 newinode->i_uid = current->fsuid;
250 newinode->i_gid = current->fsgid;
251 }
252 }
1da177e4
LT
253 }
254
255 if (rc != 0) {
4a6d87f1
SF
256 cFYI(1,
257 ("Create worked but get_inode_info failed rc = %d",
1da177e4
LT
258 rc));
259 } else {
b92327fe
SF
260 if (pTcon->nocase)
261 direntry->d_op = &cifs_ci_dentry_ops;
262 else
263 direntry->d_op = &cifs_dentry_ops;
1da177e4
LT
264 d_instantiate(direntry, newinode);
265 }
7521a3c5 266 if ((nd == NULL /* nfsd case - nfs srv does not set nd */) ||
4b18f2a9 267 (!(nd->flags & LOOKUP_OPEN))) {
1da177e4
LT
268 /* mknod case - do not leave file open */
269 CIFSSMBClose(xid, pTcon, fileHandle);
5fdae1f6 270 } else if (newinode) {
d14537f1 271 pCifsFile =
92ad9b93 272 kzalloc(sizeof(struct cifsFileInfo), GFP_KERNEL);
221601c3 273
5fdae1f6 274 if (pCifsFile == NULL)
d14537f1 275 goto cifs_create_out;
d14537f1
SF
276 pCifsFile->netfid = fileHandle;
277 pCifsFile->pid = current->tgid;
278 pCifsFile->pInode = newinode;
4b18f2a9
SF
279 pCifsFile->invalidHandle = false;
280 pCifsFile->closePend = false;
d14537f1 281 init_MUTEX(&pCifsFile->fh_sem);
796e5661 282 mutex_init(&pCifsFile->lock_mutex);
e466e487 283 INIT_LIST_HEAD(&pCifsFile->llist);
5fdae1f6 284 atomic_set(&pCifsFile->wrtPending, 0);
e466e487 285
5fdae1f6 286 /* set the following in open now
d14537f1
SF
287 pCifsFile->pfile = file; */
288 write_lock(&GlobalSMBSeslock);
5fdae1f6 289 list_add(&pCifsFile->tlist, &pTcon->openFileList);
d14537f1 290 pCifsInode = CIFS_I(newinode);
5fdae1f6 291 if (pCifsInode) {
1da177e4 292 /* if readable file instance put first in list*/
4b18f2a9 293 if (write_only) {
5fdae1f6 294 list_add_tail(&pCifsFile->flist,
d14537f1
SF
295 &pCifsInode->openFileList);
296 } else {
297 list_add(&pCifsFile->flist,
298 &pCifsInode->openFileList);
1da177e4 299 }
5fdae1f6 300 if ((oplock & 0xF) == OPLOCK_EXCLUSIVE) {
4b18f2a9
SF
301 pCifsInode->clientCanCacheAll = true;
302 pCifsInode->clientCanCacheRead = true;
221601c3 303 cFYI(1, ("Exclusive Oplock inode %p",
d14537f1 304 newinode));
5fdae1f6 305 } else if ((oplock & 0xF) == OPLOCK_READ)
4b18f2a9 306 pCifsInode->clientCanCacheRead = true;
1da177e4 307 }
d14537f1 308 write_unlock(&GlobalSMBSeslock);
1da177e4 309 }
5fdae1f6 310 }
d14537f1
SF
311cifs_create_out:
312 kfree(buf);
313 kfree(full_path);
1da177e4 314 FreeXid(xid);
1da177e4
LT
315 return rc;
316}
317
5fdae1f6
SF
318int cifs_mknod(struct inode *inode, struct dentry *direntry, int mode,
319 dev_t device_number)
1da177e4
LT
320{
321 int rc = -EPERM;
322 int xid;
323 struct cifs_sb_info *cifs_sb;
324 struct cifsTconInfo *pTcon;
325 char *full_path = NULL;
fb8c4b14 326 struct inode *newinode = NULL;
1da177e4
LT
327
328 if (!old_valid_dev(device_number))
329 return -EINVAL;
330
331 xid = GetXid();
332
333 cifs_sb = CIFS_SB(inode->i_sb);
334 pTcon = cifs_sb->tcon;
335
1da177e4 336 full_path = build_path_from_dentry(direntry);
5fdae1f6 337 if (full_path == NULL)
1da177e4 338 rc = -ENOMEM;
c18c842b 339 else if (pTcon->unix_ext) {
3ce53fc4 340 mode &= ~current->fs->umask;
5fdae1f6 341 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_SET_UID) {
1da177e4 342 rc = CIFSSMBUnixSetPerms(xid, pTcon, full_path,
5fdae1f6
SF
343 mode, (__u64)current->fsuid,
344 (__u64)current->fsgid,
737b758c 345 device_number, cifs_sb->local_nls,
5fdae1f6 346 cifs_sb->mnt_cifs_flags &
737b758c 347 CIFS_MOUNT_MAP_SPECIAL_CHR);
1da177e4
LT
348 } else {
349 rc = CIFSSMBUnixSetPerms(xid, pTcon,
350 full_path, mode, (__u64)-1, (__u64)-1,
737b758c 351 device_number, cifs_sb->local_nls,
5fdae1f6 352 cifs_sb->mnt_cifs_flags &
737b758c 353 CIFS_MOUNT_MAP_SPECIAL_CHR);
1da177e4
LT
354 }
355
5fdae1f6 356 if (!rc) {
1da177e4 357 rc = cifs_get_inode_info_unix(&newinode, full_path,
5fdae1f6 358 inode->i_sb, xid);
b92327fe
SF
359 if (pTcon->nocase)
360 direntry->d_op = &cifs_ci_dentry_ops;
361 else
362 direntry->d_op = &cifs_dentry_ops;
5fdae1f6 363 if (rc == 0)
1da177e4
LT
364 d_instantiate(direntry, newinode);
365 }
d7245c2c 366 } else {
5fdae1f6 367 if (cifs_sb->mnt_cifs_flags & CIFS_MOUNT_UNX_EMUL) {
eda3c029
SF
368 int oplock = 0;
369 u16 fileHandle;
ad7a2926 370 FILE_ALL_INFO *buf;
d7245c2c 371
5fdae1f6 372 cFYI(1, ("sfu compat create special file"));
d7245c2c 373
5fdae1f6
SF
374 buf = kmalloc(sizeof(FILE_ALL_INFO), GFP_KERNEL);
375 if (buf == NULL) {
eda3c029
SF
376 kfree(full_path);
377 FreeXid(xid);
378 return -ENOMEM;
379 }
380
381 rc = CIFSSMBOpen(xid, pTcon, full_path,
382 FILE_CREATE, /* fail if exists */
5fdae1f6 383 GENERIC_WRITE /* BB would
eda3c029
SF
384 WRITE_OWNER | WRITE_DAC be better? */,
385 /* Create a file and set the
386 file attribute to SYSTEM */
387 CREATE_NOT_DIR | CREATE_OPTION_SPECIAL,
388 &fileHandle, &oplock, buf,
389 cifs_sb->local_nls,
5fdae1f6 390 cifs_sb->mnt_cifs_flags &
eda3c029
SF
391 CIFS_MOUNT_MAP_SPECIAL_CHR);
392
5bafd765
SF
393 /* BB FIXME - add handling for backlevel servers
394 which need legacy open and check for all
5fdae1f6
SF
395 calls to SMBOpen for fallback to SMBLeagcyOpen */
396 if (!rc) {
eda3c029 397 /* BB Do not bother to decode buf since no
86c96b4b
SF
398 local inode yet to put timestamps in,
399 but we can reuse it safely */
77159b4d 400 unsigned int bytes_written;
86c96b4b
SF
401 struct win_dev *pdev;
402 pdev = (struct win_dev *)buf;
5fdae1f6 403 if (S_ISCHR(mode)) {
86c96b4b
SF
404 memcpy(pdev->type, "IntxCHR", 8);
405 pdev->major =
406 cpu_to_le64(MAJOR(device_number));
5fdae1f6 407 pdev->minor =
86c96b4b
SF
408 cpu_to_le64(MINOR(device_number));
409 rc = CIFSSMBWrite(xid, pTcon,
410 fileHandle,
411 sizeof(struct win_dev),
412 0, &bytes_written, (char *)pdev,
413 NULL, 0);
5fdae1f6 414 } else if (S_ISBLK(mode)) {
86c96b4b
SF
415 memcpy(pdev->type, "IntxBLK", 8);
416 pdev->major =
417 cpu_to_le64(MAJOR(device_number));
418 pdev->minor =
419 cpu_to_le64(MINOR(device_number));
420 rc = CIFSSMBWrite(xid, pTcon,
421 fileHandle,
422 sizeof(struct win_dev),
423 0, &bytes_written, (char *)pdev,
424 NULL, 0);
425 } /* else if(S_ISFIFO */
eda3c029
SF
426 CIFSSMBClose(xid, pTcon, fileHandle);
427 d_drop(direntry);
428 }
429 kfree(buf);
d7245c2c
SF
430 /* add code here to set EAs */
431 }
1da177e4
LT
432 }
433
d14537f1 434 kfree(full_path);
1da177e4 435 FreeXid(xid);
1da177e4
LT
436 return rc;
437}
438
439
440struct dentry *
5fdae1f6
SF
441cifs_lookup(struct inode *parent_dir_inode, struct dentry *direntry,
442 struct nameidata *nd)
1da177e4
LT
443{
444 int xid;
445 int rc = 0; /* to get around spurious gcc warning, set to zero here */
446 struct cifs_sb_info *cifs_sb;
447 struct cifsTconInfo *pTcon;
448 struct inode *newInode = NULL;
449 char *full_path = NULL;
450
451 xid = GetXid();
452
92ad9b93 453 cFYI(1, (" parent inode = 0x%p name is: %s and dentry = 0x%p",
1da177e4
LT
454 parent_dir_inode, direntry->d_name.name, direntry));
455
1da177e4
LT
456 /* check whether path exists */
457
458 cifs_sb = CIFS_SB(parent_dir_inode->i_sb);
459 pTcon = cifs_sb->tcon;
460
296034f7
SF
461 /*
462 * Don't allow the separator character in a path component.
463 * The VFS will not allow "/", but "\" is allowed by posix.
464 */
465 if (!(cifs_sb->mnt_cifs_flags & CIFS_MOUNT_POSIX_PATHS)) {
466 int i;
467 for (i = 0; i < direntry->d_name.len; i++)
468 if (direntry->d_name.name[i] == '\\') {
469 cFYI(1, ("Invalid file name"));
470 FreeXid(xid);
471 return ERR_PTR(-EINVAL);
472 }
473 }
474
1da177e4
LT
475 /* can not grab the rename sem here since it would
476 deadlock in the cases (beginning of sys_rename itself)
477 in which we already have the sb rename sem */
478 full_path = build_path_from_dentry(direntry);
5fdae1f6 479 if (full_path == NULL) {
1da177e4
LT
480 FreeXid(xid);
481 return ERR_PTR(-ENOMEM);
482 }
483
484 if (direntry->d_inode != NULL) {
485 cFYI(1, (" non-NULL inode in lookup"));
486 } else {
487 cFYI(1, (" NULL inode in lookup"));
488 }
489 cFYI(1,
490 (" Full path: %s inode = 0x%p", full_path, direntry->d_inode));
491
c18c842b 492 if (pTcon->unix_ext)
1da177e4 493 rc = cifs_get_inode_info_unix(&newInode, full_path,
5fdae1f6 494 parent_dir_inode->i_sb, xid);
1da177e4
LT
495 else
496 rc = cifs_get_inode_info(&newInode, full_path, NULL,
8b1327f6 497 parent_dir_inode->i_sb, xid, NULL);
1da177e4
LT
498
499 if ((rc == 0) && (newInode != NULL)) {
b92327fe
SF
500 if (pTcon->nocase)
501 direntry->d_op = &cifs_ci_dentry_ops;
502 else
503 direntry->d_op = &cifs_dentry_ops;
1da177e4
LT
504 d_add(direntry, newInode);
505
5fdae1f6 506 /* since paths are not looked up by component - the parent
3abb9272 507 directories are presumed to be good here */
1da177e4
LT
508 renew_parental_timestamps(direntry);
509
510 } else if (rc == -ENOENT) {
511 rc = 0;
3abb9272
SF
512 direntry->d_time = jiffies;
513 if (pTcon->nocase)
514 direntry->d_op = &cifs_ci_dentry_ops;
515 else
516 direntry->d_op = &cifs_dentry_ops;
1da177e4 517 d_add(direntry, NULL);
5fdae1f6
SF
518 /* if it was once a directory (but how can we tell?) we could do
519 shrink_dcache_parent(direntry); */
ed2b9170
SF
520 } else if (rc != -EACCES) {
521 cERROR(1, ("Unexpected lookup error %d", rc));
522 /* We special case check for Access Denied - since that
523 is a common return code */
1da177e4
LT
524 }
525
d14537f1 526 kfree(full_path);
1da177e4
LT
527 FreeXid(xid);
528 return ERR_PTR(rc);
529}
530
1da177e4
LT
531static int
532cifs_d_revalidate(struct dentry *direntry, struct nameidata *nd)
533{
534 int isValid = 1;
535
1da177e4 536 if (direntry->d_inode) {
ad7a2926 537 if (cifs_revalidate(direntry))
1da177e4 538 return 0;
1da177e4 539 } else {
3abb9272
SF
540 cFYI(1, ("neg dentry 0x%p name = %s",
541 direntry, direntry->d_name.name));
5fdae1f6 542 if (time_after(jiffies, direntry->d_time + HZ) ||
3abb9272
SF
543 !lookupCacheEnabled) {
544 d_drop(direntry);
545 isValid = 0;
5fdae1f6 546 }
1da177e4
LT
547 }
548
1da177e4
LT
549 return isValid;
550}
551
552/* static int cifs_d_delete(struct dentry *direntry)
553{
554 int rc = 0;
555
556 cFYI(1, ("In cifs d_delete, name = %s", direntry->d_name.name));
557
558 return rc;
559} */
560
561struct dentry_operations cifs_dentry_ops = {
562 .d_revalidate = cifs_d_revalidate,
5fdae1f6 563/* d_delete: cifs_d_delete, */ /* not needed except for debugging */
1da177e4 564};
b92327fe
SF
565
566static int cifs_ci_hash(struct dentry *dentry, struct qstr *q)
567{
568 struct nls_table *codepage = CIFS_SB(dentry->d_inode->i_sb)->local_nls;
569 unsigned long hash;
570 int i;
571
572 hash = init_name_hash();
573 for (i = 0; i < q->len; i++)
574 hash = partial_name_hash(nls_tolower(codepage, q->name[i]),
575 hash);
576 q->hash = end_name_hash(hash);
577
578 return 0;
579}
580
581static int cifs_ci_compare(struct dentry *dentry, struct qstr *a,
582 struct qstr *b)
583{
584 struct nls_table *codepage = CIFS_SB(dentry->d_inode->i_sb)->local_nls;
585
586 if ((a->len == b->len) &&
587 (nls_strnicmp(codepage, a->name, b->name, a->len) == 0)) {
588 /*
589 * To preserve case, don't let an existing negative dentry's
590 * case take precedence. If a is not a negative dentry, this
591 * should have no side effects
592 */
44093ca2 593 memcpy(a->name, b->name, a->len);
b92327fe
SF
594 return 0;
595 }
596 return 1;
597}
598
599struct dentry_operations cifs_ci_dentry_ops = {
600 .d_revalidate = cifs_d_revalidate,
601 .d_hash = cifs_ci_hash,
602 .d_compare = cifs_ci_compare,
603};