]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - fs/cifs/cifs_debug.c
cifs: mask off top byte in get_rfc1002_length()
[mirror_ubuntu-artful-kernel.git] / fs / cifs / cifs_debug.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs_debug.c
3 *
b8643e1b 4 * Copyright (C) International Business Machines Corp., 2000,2005
1da177e4
LT
5 *
6 * Modified by Steve French (sfrench@us.ibm.com)
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
221601c3 10 * the Free Software Foundation; either version 2 of the License, or
1da177e4 11 * (at your option) any later version.
221601c3 12 *
1da177e4
LT
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
16 * the GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
221601c3 19 * along with this program; if not, write to the Free Software
1da177e4
LT
20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21 */
22#include <linux/fs.h>
23#include <linux/string.h>
24#include <linux/ctype.h>
25#include <linux/module.h>
26#include <linux/proc_fs.h>
27#include <asm/uaccess.h>
28#include "cifspdu.h"
29#include "cifsglob.h"
30#include "cifsproto.h"
31#include "cifs_debug.h"
6c91d362 32#include "cifsfs.h"
1da177e4
LT
33
34void
35cifs_dump_mem(char *label, void *data, int length)
36{
37 int i, j;
38 int *intptr = data;
39 char *charptr = data;
40 char buf[10], line[80];
41
221601c3 42 printk(KERN_DEBUG "%s: dump of %d bytes of data at 0x%p\n",
1da177e4
LT
43 label, length, data);
44 for (i = 0; i < length; i += 16) {
45 line[0] = 0;
46 for (j = 0; (j < 4) && (i + j * 4 < length); j++) {
47 sprintf(buf, " %08x", intptr[i / 4 + j]);
48 strcat(line, buf);
49 }
50 buf[0] = ' ';
51 buf[2] = 0;
52 for (j = 0; (j < 16) && (i + j < length); j++) {
53 buf[1] = isprint(charptr[i + j]) ? charptr[i + j] : '.';
54 strcat(line, buf);
55 }
56 printk(KERN_DEBUG "%s\n", line);
57 }
58}
59
f96637be
JP
60#ifdef CONFIG_CIFS_DEBUG
61void cifs_vfs_err(const char *fmt, ...)
62{
63 struct va_format vaf;
64 va_list args;
65
66 va_start(args, fmt);
67
68 vaf.fmt = fmt;
69 vaf.va = &args;
70
71 printk(KERN_ERR "CIFS VFS: %pV", &vaf);
72
73 va_end(args);
74}
75#endif
76
d4e4854f 77void cifs_dump_detail(void *buf)
3979877e 78{
8aa26f3e 79#ifdef CONFIG_CIFS_DEBUG2
d4e4854f
PS
80 struct smb_hdr *smb = (struct smb_hdr *)buf;
81
f96637be
JP
82 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n",
83 smb->Command, smb->Status.CifsError,
84 smb->Flags, smb->Flags2, smb->Mid, smb->Pid);
85 cifs_dbg(VFS, "smb buf %p len %u\n", smb, smbCalcSize(smb));
8aa26f3e 86#endif /* CONFIG_CIFS_DEBUG2 */
3979877e
SF
87}
88
ffdd6e4d 89void cifs_dump_mids(struct TCP_Server_Info *server)
3979877e 90{
8aa26f3e 91#ifdef CONFIG_CIFS_DEBUG2
3979877e 92 struct list_head *tmp;
ffdd6e4d 93 struct mid_q_entry *mid_entry;
3979877e 94
221601c3 95 if (server == NULL)
3979877e
SF
96 return;
97
f96637be 98 cifs_dbg(VFS, "Dump pending requests:\n");
3979877e
SF
99 spin_lock(&GlobalMid_Lock);
100 list_for_each(tmp, &server->pending_mid_q) {
101 mid_entry = list_entry(tmp, struct mid_q_entry, qhead);
f96637be
JP
102 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n",
103 mid_entry->mid_state,
104 le16_to_cpu(mid_entry->command),
105 mid_entry->pid,
106 mid_entry->callback_data,
107 mid_entry->mid);
3979877e 108#ifdef CONFIG_CIFS_STATS2
f96637be
JP
109 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n",
110 mid_entry->large_buf,
111 mid_entry->resp_buf,
112 mid_entry->when_received,
113 jiffies);
3979877e 114#endif /* STATS2 */
f96637be
JP
115 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n",
116 mid_entry->multiRsp, mid_entry->multiEnd);
ad8b15f0
SF
117 if (mid_entry->resp_buf) {
118 cifs_dump_detail(mid_entry->resp_buf);
119 cifs_dump_mem("existing buf: ",
120 mid_entry->resp_buf, 62);
3979877e
SF
121 }
122 }
123 spin_unlock(&GlobalMid_Lock);
3979877e 124#endif /* CONFIG_CIFS_DEBUG2 */
8aa26f3e 125}
3979877e 126
1da177e4 127#ifdef CONFIG_PROC_FS
f984c7b9 128static int cifs_debug_data_proc_show(struct seq_file *m, void *v)
1da177e4 129{
f1987b44 130 struct list_head *tmp1, *tmp2, *tmp3;
ffdd6e4d 131 struct mid_q_entry *mid_entry;
14fbf50d 132 struct TCP_Server_Info *server;
96daf2b0
SF
133 struct cifs_ses *ses;
134 struct cifs_tcon *tcon;
f1987b44
JL
135 int i, j;
136 __u32 dev_type;
1da177e4 137
f984c7b9 138 seq_puts(m,
1da177e4
LT
139 "Display Internal CIFS Data Structures for Debugging\n"
140 "---------------------------------------------------\n");
f984c7b9 141 seq_printf(m, "CIFS Version %s\n", CIFS_VERSION);
ca40b714 142 seq_printf(m, "Features:");
f579903e 143#ifdef CONFIG_CIFS_DFS_UPCALL
ca40b714 144 seq_printf(m, " dfs");
f579903e
SJ
145#endif
146#ifdef CONFIG_CIFS_FSCACHE
ca40b714 147 seq_printf(m, " fscache");
f579903e
SJ
148#endif
149#ifdef CONFIG_CIFS_WEAK_PW_HASH
ca40b714 150 seq_printf(m, " lanman");
f579903e
SJ
151#endif
152#ifdef CONFIG_CIFS_POSIX
ca40b714 153 seq_printf(m, " posix");
f579903e
SJ
154#endif
155#ifdef CONFIG_CIFS_UPCALL
ca40b714 156 seq_printf(m, " spnego");
f579903e
SJ
157#endif
158#ifdef CONFIG_CIFS_XATTR
ca40b714
JL
159 seq_printf(m, " xattr");
160#endif
161#ifdef CONFIG_CIFS_ACL
162 seq_printf(m, " acl");
f579903e
SJ
163#endif
164 seq_putc(m, '\n');
f984c7b9
AD
165 seq_printf(m, "Active VFS Requests: %d\n", GlobalTotalActiveXid);
166 seq_printf(m, "Servers:");
1da177e4
LT
167
168 i = 0;
3f9bcca7 169 spin_lock(&cifs_tcp_ses_lock);
f1987b44
JL
170 list_for_each(tmp1, &cifs_tcp_ses_list) {
171 server = list_entry(tmp1, struct TCP_Server_Info,
14fbf50d 172 tcp_ses_list);
1da177e4 173 i++;
14fbf50d 174 list_for_each(tmp2, &server->smb_ses_list) {
96daf2b0 175 ses = list_entry(tmp2, struct cifs_ses,
14fbf50d
JL
176 smb_ses_list);
177 if ((ses->serverDomain == NULL) ||
178 (ses->serverOS == NULL) ||
179 (ses->serverNOS == NULL)) {
f1987b44
JL
180 seq_printf(m, "\n%d) entry for %s not fully "
181 "displayed\n\t", i, ses->serverName);
14fbf50d
JL
182 } else {
183 seq_printf(m,
f1987b44
JL
184 "\n%d) Name: %s Domain: %s Uses: %d OS:"
185 " %s\n\tNOS: %s\tCapability: 0x%x\n\tSMB"
221601c3 186 " session status: %d\t",
b8643e1b 187 i, ses->serverName, ses->serverDomain,
14fbf50d 188 ses->ses_count, ses->serverOS, ses->serverNOS,
221601c3 189 ses->capabilities, ses->status);
14fbf50d 190 }
f984c7b9 191 seq_printf(m, "TCP status: %d\n\tLocal Users To "
14fbf50d
JL
192 "Server: %d SecMode: 0x%x Req On Wire: %d",
193 server->tcpStatus, server->srv_count,
fc40f9cf 194 server->sec_mode, in_flight(server));
131afd0b
SF
195
196#ifdef CONFIG_CIFS_STATS2
f984c7b9 197 seq_printf(m, " In Send: %d In MaxReq Wait: %d",
789e6661 198 atomic_read(&server->in_send),
14fbf50d 199 atomic_read(&server->num_waiters));
131afd0b
SF
200#endif
201
f1987b44
JL
202 seq_puts(m, "\n\tShares:");
203 j = 0;
204 list_for_each(tmp3, &ses->tcon_list) {
96daf2b0 205 tcon = list_entry(tmp3, struct cifs_tcon,
f1987b44
JL
206 tcon_list);
207 ++j;
208 dev_type = le32_to_cpu(tcon->fsDevInfo.DeviceType);
209 seq_printf(m, "\n\t%d) %s Mounts: %d ", j,
210 tcon->treeName, tcon->tc_count);
211 if (tcon->nativeFileSystem) {
212 seq_printf(m, "Type: %s ",
213 tcon->nativeFileSystem);
214 }
215 seq_printf(m, "DevInfo: 0x%x Attributes: 0x%x"
769ee6a4 216 "\n\tPathComponentMax: %d Status: 0x%d",
f1987b44
JL
217 le32_to_cpu(tcon->fsDevInfo.DeviceCharacteristics),
218 le32_to_cpu(tcon->fsAttrInfo.Attributes),
219 le32_to_cpu(tcon->fsAttrInfo.MaxPathNameComponentLength),
220 tcon->tidStatus);
221 if (dev_type == FILE_DEVICE_DISK)
222 seq_puts(m, " type: DISK ");
223 else if (dev_type == FILE_DEVICE_CD_ROM)
224 seq_puts(m, " type: CDROM ");
225 else
226 seq_printf(m, " type: %d ", dev_type);
769ee6a4
SF
227 if (server->ops->dump_share_caps)
228 server->ops->dump_share_caps(m, tcon);
f1987b44
JL
229
230 if (tcon->need_reconnect)
231 seq_puts(m, "\tDISCONNECTED ");
232 seq_putc(m, '\n');
233 }
234
235 seq_puts(m, "\n\tMIDs:\n");
1da177e4
LT
236
237 spin_lock(&GlobalMid_Lock);
14fbf50d 238 list_for_each(tmp3, &server->pending_mid_q) {
f1987b44 239 mid_entry = list_entry(tmp3, struct mid_q_entry,
1da177e4 240 qhead);
f1987b44 241 seq_printf(m, "\tState: %d com: %d pid:"
7c9421e1
PS
242 " %d cbdata: %p mid %llu\n",
243 mid_entry->mid_state,
244 le16_to_cpu(mid_entry->command),
245 mid_entry->pid,
246 mid_entry->callback_data,
247 mid_entry->mid);
1da177e4 248 }
221601c3 249 spin_unlock(&GlobalMid_Lock);
1da177e4 250 }
1da177e4 251 }
3f9bcca7 252 spin_unlock(&cifs_tcp_ses_lock);
f984c7b9 253 seq_putc(m, '\n');
1da177e4 254
1da177e4 255 /* BB add code to dump additional info such as TCP session info now */
f984c7b9
AD
256 return 0;
257}
1da177e4 258
f984c7b9
AD
259static int cifs_debug_data_proc_open(struct inode *inode, struct file *file)
260{
261 return single_open(file, cifs_debug_data_proc_show, NULL);
1da177e4
LT
262}
263
f984c7b9
AD
264static const struct file_operations cifs_debug_data_proc_fops = {
265 .owner = THIS_MODULE,
266 .open = cifs_debug_data_proc_open,
267 .read = seq_read,
268 .llseek = seq_lseek,
269 .release = single_release,
270};
1047abc1 271
f984c7b9
AD
272#ifdef CONFIG_CIFS_STATS
273static ssize_t cifs_stats_proc_write(struct file *file,
274 const char __user *buffer, size_t count, loff_t *ppos)
1047abc1 275{
221601c3
SF
276 char c;
277 int rc;
f1987b44
JL
278 struct list_head *tmp1, *tmp2, *tmp3;
279 struct TCP_Server_Info *server;
96daf2b0
SF
280 struct cifs_ses *ses;
281 struct cifs_tcon *tcon;
1047abc1 282
221601c3
SF
283 rc = get_user(c, buffer);
284 if (rc)
285 return rc;
1047abc1 286
221601c3 287 if (c == '1' || c == 'y' || c == 'Y' || c == '0') {
4498eed5
SF
288#ifdef CONFIG_CIFS_STATS2
289 atomic_set(&totBufAllocCount, 0);
290 atomic_set(&totSmBufAllocCount, 0);
291#endif /* CONFIG_CIFS_STATS2 */
3f9bcca7 292 spin_lock(&cifs_tcp_ses_lock);
f1987b44
JL
293 list_for_each(tmp1, &cifs_tcp_ses_list) {
294 server = list_entry(tmp1, struct TCP_Server_Info,
295 tcp_ses_list);
c2b3382c 296 list_for_each(tmp2, &server->smb_ses_list) {
96daf2b0 297 ses = list_entry(tmp2, struct cifs_ses,
c2b3382c 298 smb_ses_list);
f1987b44
JL
299 list_for_each(tmp3, &ses->tcon_list) {
300 tcon = list_entry(tmp3,
96daf2b0 301 struct cifs_tcon,
f1987b44
JL
302 tcon_list);
303 atomic_set(&tcon->num_smbs_sent, 0);
44c58186
PS
304 if (server->ops->clear_stats)
305 server->ops->clear_stats(tcon);
f1987b44
JL
306 }
307 }
1047abc1 308 }
3f9bcca7 309 spin_unlock(&cifs_tcp_ses_lock);
1047abc1
SF
310 }
311
221601c3 312 return count;
1047abc1
SF
313}
314
f984c7b9 315static int cifs_stats_proc_show(struct seq_file *m, void *v)
1da177e4 316{
f984c7b9 317 int i;
f1987b44
JL
318 struct list_head *tmp1, *tmp2, *tmp3;
319 struct TCP_Server_Info *server;
96daf2b0
SF
320 struct cifs_ses *ses;
321 struct cifs_tcon *tcon;
1da177e4 322
f984c7b9 323 seq_printf(m,
1da177e4
LT
324 "Resources in use\nCIFS Session: %d\n",
325 sesInfoAllocCount.counter);
f984c7b9 326 seq_printf(m, "Share (unique mount targets): %d\n",
1da177e4 327 tconInfoAllocCount.counter);
f984c7b9 328 seq_printf(m, "SMB Request/Response Buffer: %d Pool size: %d\n",
b8643e1b
SF
329 bufAllocCount.counter,
330 cifs_min_rcv + tcpSesAllocCount.counter);
f984c7b9 331 seq_printf(m, "SMB Small Req/Resp Buffer: %d Pool size: %d\n",
221601c3 332 smBufAllocCount.counter, cifs_min_small);
07475ffb 333#ifdef CONFIG_CIFS_STATS2
f984c7b9 334 seq_printf(m, "Total Large %d Small %d Allocations\n",
07475ffb 335 atomic_read(&totBufAllocCount),
221601c3 336 atomic_read(&totSmBufAllocCount));
07475ffb
SF
337#endif /* CONFIG_CIFS_STATS2 */
338
8097531a 339 seq_printf(m, "Operations (MIDs): %d\n", atomic_read(&midCount));
f984c7b9 340 seq_printf(m,
1da177e4 341 "\n%d session %d share reconnects\n",
221601c3 342 tcpSesReconnectCount.counter, tconInfoReconnectCount.counter);
1da177e4 343
f984c7b9 344 seq_printf(m,
1da177e4 345 "Total vfs operations: %d maximum at one time: %d\n",
221601c3 346 GlobalCurrentXid, GlobalMaxActiveXid);
1da177e4
LT
347
348 i = 0;
3f9bcca7 349 spin_lock(&cifs_tcp_ses_lock);
f1987b44
JL
350 list_for_each(tmp1, &cifs_tcp_ses_list) {
351 server = list_entry(tmp1, struct TCP_Server_Info,
352 tcp_ses_list);
353 list_for_each(tmp2, &server->smb_ses_list) {
96daf2b0 354 ses = list_entry(tmp2, struct cifs_ses,
f1987b44
JL
355 smb_ses_list);
356 list_for_each(tmp3, &ses->tcon_list) {
357 tcon = list_entry(tmp3,
96daf2b0 358 struct cifs_tcon,
f1987b44
JL
359 tcon_list);
360 i++;
361 seq_printf(m, "\n%d) %s", i, tcon->treeName);
362 if (tcon->need_reconnect)
363 seq_puts(m, "\tDISCONNECTED ");
44c58186
PS
364 seq_printf(m, "\nSMBs: %d",
365 atomic_read(&tcon->num_smbs_sent));
366 if (server->ops->print_stats)
367 server->ops->print_stats(m, tcon);
f1987b44
JL
368 }
369 }
1da177e4 370 }
3f9bcca7 371 spin_unlock(&cifs_tcp_ses_lock);
1da177e4 372
f984c7b9
AD
373 seq_putc(m, '\n');
374 return 0;
375}
221601c3 376
f984c7b9
AD
377static int cifs_stats_proc_open(struct inode *inode, struct file *file)
378{
379 return single_open(file, cifs_stats_proc_show, NULL);
1da177e4 380}
f984c7b9
AD
381
382static const struct file_operations cifs_stats_proc_fops = {
383 .owner = THIS_MODULE,
384 .open = cifs_stats_proc_open,
385 .read = seq_read,
386 .llseek = seq_lseek,
387 .release = single_release,
388 .write = cifs_stats_proc_write,
389};
90c81e0b 390#endif /* STATS */
1da177e4
LT
391
392static struct proc_dir_entry *proc_fs_cifs;
f984c7b9 393static const struct file_operations cifsFYI_proc_fops;
f984c7b9
AD
394static const struct file_operations cifs_lookup_cache_proc_fops;
395static const struct file_operations traceSMB_proc_fops;
f984c7b9 396static const struct file_operations cifs_security_flags_proc_fops;
f984c7b9 397static const struct file_operations cifs_linux_ext_proc_fops;
1da177e4
LT
398
399void
400cifs_proc_init(void)
401{
36a5aeb8 402 proc_fs_cifs = proc_mkdir("fs/cifs", NULL);
1da177e4
LT
403 if (proc_fs_cifs == NULL)
404 return;
405
f984c7b9 406 proc_create("DebugData", 0, proc_fs_cifs, &cifs_debug_data_proc_fops);
1da177e4
LT
407
408#ifdef CONFIG_CIFS_STATS
f984c7b9 409 proc_create("Stats", 0, proc_fs_cifs, &cifs_stats_proc_fops);
90c81e0b 410#endif /* STATS */
f984c7b9
AD
411 proc_create("cifsFYI", 0, proc_fs_cifs, &cifsFYI_proc_fops);
412 proc_create("traceSMB", 0, proc_fs_cifs, &traceSMB_proc_fops);
99b1f5b2
SF
413 proc_create("LinuxExtensionsEnabled", 0, proc_fs_cifs,
414 &cifs_linux_ext_proc_fops);
99b1f5b2
SF
415 proc_create("SecurityFlags", 0, proc_fs_cifs,
416 &cifs_security_flags_proc_fops);
417 proc_create("LookupCacheEnabled", 0, proc_fs_cifs,
418 &cifs_lookup_cache_proc_fops);
1da177e4
LT
419}
420
421void
422cifs_proc_clean(void)
423{
424 if (proc_fs_cifs == NULL)
425 return;
426
427 remove_proc_entry("DebugData", proc_fs_cifs);
428 remove_proc_entry("cifsFYI", proc_fs_cifs);
429 remove_proc_entry("traceSMB", proc_fs_cifs);
430#ifdef CONFIG_CIFS_STATS
431 remove_proc_entry("Stats", proc_fs_cifs);
432#endif
221601c3 433 remove_proc_entry("SecurityFlags", proc_fs_cifs);
221601c3 434 remove_proc_entry("LinuxExtensionsEnabled", proc_fs_cifs);
221601c3 435 remove_proc_entry("LookupCacheEnabled", proc_fs_cifs);
36a5aeb8 436 remove_proc_entry("fs/cifs", NULL);
1da177e4
LT
437}
438
f984c7b9 439static int cifsFYI_proc_show(struct seq_file *m, void *v)
1da177e4 440{
f984c7b9
AD
441 seq_printf(m, "%d\n", cifsFYI);
442 return 0;
443}
1da177e4 444
f984c7b9
AD
445static int cifsFYI_proc_open(struct inode *inode, struct file *file)
446{
447 return single_open(file, cifsFYI_proc_show, NULL);
1da177e4 448}
f984c7b9
AD
449
450static ssize_t cifsFYI_proc_write(struct file *file, const char __user *buffer,
451 size_t count, loff_t *ppos)
1da177e4
LT
452{
453 char c;
454 int rc;
455
456 rc = get_user(c, buffer);
457 if (rc)
458 return rc;
459 if (c == '0' || c == 'n' || c == 'N')
460 cifsFYI = 0;
461 else if (c == '1' || c == 'y' || c == 'Y')
462 cifsFYI = 1;
221601c3 463 else if ((c > '1') && (c <= '9'))
1047abc1 464 cifsFYI = (int) (c - '0'); /* see cifs_debug.h for meanings */
1da177e4
LT
465
466 return count;
467}
468
f984c7b9
AD
469static const struct file_operations cifsFYI_proc_fops = {
470 .owner = THIS_MODULE,
471 .open = cifsFYI_proc_open,
472 .read = seq_read,
473 .llseek = seq_lseek,
474 .release = single_release,
475 .write = cifsFYI_proc_write,
476};
1da177e4 477
f984c7b9
AD
478static int cifs_linux_ext_proc_show(struct seq_file *m, void *v)
479{
480 seq_printf(m, "%d\n", linuxExtEnabled);
481 return 0;
482}
1da177e4 483
f984c7b9
AD
484static int cifs_linux_ext_proc_open(struct inode *inode, struct file *file)
485{
486 return single_open(file, cifs_linux_ext_proc_show, NULL);
1da177e4 487}
f984c7b9
AD
488
489static ssize_t cifs_linux_ext_proc_write(struct file *file,
490 const char __user *buffer, size_t count, loff_t *ppos)
1da177e4 491{
221601c3
SF
492 char c;
493 int rc;
494
495 rc = get_user(c, buffer);
496 if (rc)
497 return rc;
498 if (c == '0' || c == 'n' || c == 'N')
499 linuxExtEnabled = 0;
500 else if (c == '1' || c == 'y' || c == 'Y')
501 linuxExtEnabled = 1;
502
503 return count;
1da177e4
LT
504}
505
f984c7b9
AD
506static const struct file_operations cifs_linux_ext_proc_fops = {
507 .owner = THIS_MODULE,
508 .open = cifs_linux_ext_proc_open,
509 .read = seq_read,
510 .llseek = seq_lseek,
511 .release = single_release,
512 .write = cifs_linux_ext_proc_write,
513};
1da177e4 514
f984c7b9 515static int cifs_lookup_cache_proc_show(struct seq_file *m, void *v)
1da177e4 516{
f984c7b9
AD
517 seq_printf(m, "%d\n", lookupCacheEnabled);
518 return 0;
519}
1da177e4 520
f984c7b9
AD
521static int cifs_lookup_cache_proc_open(struct inode *inode, struct file *file)
522{
523 return single_open(file, cifs_lookup_cache_proc_show, NULL);
1da177e4 524}
f984c7b9
AD
525
526static ssize_t cifs_lookup_cache_proc_write(struct file *file,
527 const char __user *buffer, size_t count, loff_t *ppos)
1da177e4
LT
528{
529 char c;
530 int rc;
531
532 rc = get_user(c, buffer);
533 if (rc)
534 return rc;
535 if (c == '0' || c == 'n' || c == 'N')
536 lookupCacheEnabled = 0;
537 else if (c == '1' || c == 'y' || c == 'Y')
538 lookupCacheEnabled = 1;
539
540 return count;
541}
1da177e4 542
f984c7b9
AD
543static const struct file_operations cifs_lookup_cache_proc_fops = {
544 .owner = THIS_MODULE,
545 .open = cifs_lookup_cache_proc_open,
546 .read = seq_read,
547 .llseek = seq_lseek,
548 .release = single_release,
549 .write = cifs_lookup_cache_proc_write,
550};
1da177e4 551
f984c7b9
AD
552static int traceSMB_proc_show(struct seq_file *m, void *v)
553{
554 seq_printf(m, "%d\n", traceSMB);
555 return 0;
556}
1da177e4 557
f984c7b9
AD
558static int traceSMB_proc_open(struct inode *inode, struct file *file)
559{
560 return single_open(file, traceSMB_proc_show, NULL);
1da177e4 561}
f984c7b9
AD
562
563static ssize_t traceSMB_proc_write(struct file *file, const char __user *buffer,
564 size_t count, loff_t *ppos)
1da177e4
LT
565{
566 char c;
567 int rc;
568
569 rc = get_user(c, buffer);
570 if (rc)
571 return rc;
572 if (c == '0' || c == 'n' || c == 'N')
573 traceSMB = 0;
574 else if (c == '1' || c == 'y' || c == 'Y')
575 traceSMB = 1;
576
577 return count;
578}
579
f984c7b9
AD
580static const struct file_operations traceSMB_proc_fops = {
581 .owner = THIS_MODULE,
582 .open = traceSMB_proc_open,
583 .read = seq_read,
584 .llseek = seq_lseek,
585 .release = single_release,
586 .write = traceSMB_proc_write,
587};
1da177e4 588
f984c7b9
AD
589static int cifs_security_flags_proc_show(struct seq_file *m, void *v)
590{
04912d6a 591 seq_printf(m, "0x%x\n", global_secflags);
f984c7b9
AD
592 return 0;
593}
1da177e4 594
f984c7b9
AD
595static int cifs_security_flags_proc_open(struct inode *inode, struct file *file)
596{
597 return single_open(file, cifs_security_flags_proc_show, NULL);
1da177e4 598}
f984c7b9 599
52dfb446
JL
600/*
601 * Ensure that if someone sets a MUST flag, that we disable all other MAY
602 * flags except for the ones corresponding to the given MUST flag. If there are
603 * multiple MUST flags, then try to prefer more secure ones.
604 */
605static void
606cifs_security_flags_handle_must_flags(unsigned int *flags)
607{
608 unsigned int signflags = *flags & CIFSSEC_MUST_SIGN;
609
610 if ((*flags & CIFSSEC_MUST_KRB5) == CIFSSEC_MUST_KRB5)
611 *flags = CIFSSEC_MUST_KRB5;
612 else if ((*flags & CIFSSEC_MUST_NTLMSSP) == CIFSSEC_MUST_NTLMSSP)
613 *flags = CIFSSEC_MUST_NTLMSSP;
614 else if ((*flags & CIFSSEC_MUST_NTLMV2) == CIFSSEC_MUST_NTLMV2)
615 *flags = CIFSSEC_MUST_NTLMV2;
616 else if ((*flags & CIFSSEC_MUST_NTLM) == CIFSSEC_MUST_NTLM)
617 *flags = CIFSSEC_MUST_NTLM;
618 else if ((*flags & CIFSSEC_MUST_LANMAN) == CIFSSEC_MUST_LANMAN)
619 *flags = CIFSSEC_MUST_LANMAN;
620 else if ((*flags & CIFSSEC_MUST_PLNTXT) == CIFSSEC_MUST_PLNTXT)
621 *flags = CIFSSEC_MUST_PLNTXT;
622
623 *flags |= signflags;
624}
625
f984c7b9
AD
626static ssize_t cifs_security_flags_proc_write(struct file *file,
627 const char __user *buffer, size_t count, loff_t *ppos)
1da177e4 628{
7715dad8 629 int rc;
bdc4bf6e
SF
630 unsigned int flags;
631 char flags_string[12];
1da177e4 632 char c;
bdc4bf6e 633
221601c3 634 if ((count < 1) || (count > 11))
3979877e 635 return -EINVAL;
1da177e4 636
bdc4bf6e 637 memset(flags_string, 0, 12);
3979877e 638
221601c3 639 if (copy_from_user(flags_string, buffer, count))
bdc4bf6e 640 return -EFAULT;
3979877e 641
221601c3 642 if (count < 3) {
bdc4bf6e
SF
643 /* single char or single char followed by null */
644 c = flags_string[0];
a013689d 645 if (c == '0' || c == 'n' || c == 'N') {
04912d6a 646 global_secflags = CIFSSEC_DEF; /* default */
a013689d
SF
647 return count;
648 } else if (c == '1' || c == 'y' || c == 'Y') {
04912d6a 649 global_secflags = CIFSSEC_MAX;
a013689d
SF
650 return count;
651 } else if (!isdigit(c)) {
7715dad8
JL
652 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n",
653 flags_string);
a013689d
SF
654 return -EINVAL;
655 }
bdc4bf6e 656 }
bdc4bf6e 657
7715dad8
JL
658 /* else we have a number */
659 rc = kstrtouint(flags_string, 0, &flags);
660 if (rc) {
661 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n",
662 flags_string);
663 return rc;
664 }
bdc4bf6e 665
f96637be 666 cifs_dbg(FYI, "sec flags 0x%x\n", flags);
bdc4bf6e 667
7715dad8
JL
668 if (flags == 0) {
669 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string);
bdc4bf6e
SF
670 return -EINVAL;
671 }
1da177e4 672
221601c3 673 if (flags & ~CIFSSEC_MASK) {
7715dad8 674 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n",
f96637be 675 flags & ~CIFSSEC_MASK);
bdc4bf6e
SF
676 return -EINVAL;
677 }
7715dad8 678
52dfb446
JL
679 cifs_security_flags_handle_must_flags(&flags);
680
bdc4bf6e 681 /* flags look ok - update the global security flags for cifs module */
04912d6a
JL
682 global_secflags = flags;
683 if (global_secflags & CIFSSEC_MUST_SIGN) {
762e5ab7 684 /* requiring signing implies signing is allowed */
04912d6a 685 global_secflags |= CIFSSEC_MAY_SIGN;
f96637be 686 cifs_dbg(FYI, "packet signing now required\n");
04912d6a 687 } else if ((global_secflags & CIFSSEC_MAY_SIGN) == 0) {
f96637be 688 cifs_dbg(FYI, "packet signing disabled\n");
762e5ab7
SF
689 }
690 /* BB should we turn on MAY flags for other MUST options? */
1da177e4
LT
691 return count;
692}
f984c7b9
AD
693
694static const struct file_operations cifs_security_flags_proc_fops = {
695 .owner = THIS_MODULE,
696 .open = cifs_security_flags_proc_open,
697 .read = seq_read,
698 .llseek = seq_lseek,
699 .release = single_release,
700 .write = cifs_security_flags_proc_write,
701};
90c81e0b 702#else
e086fcea 703inline void cifs_proc_init(void)
90c81e0b
SF
704{
705}
706
e086fcea 707inline void cifs_proc_clean(void)
90c81e0b
SF
708{
709}
710#endif /* PROC_FS */