]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * fs/cifs_debug.c | |
3 | * | |
b8643e1b | 4 | * Copyright (C) International Business Machines Corp., 2000,2005 |
1da177e4 LT |
5 | * |
6 | * Modified by Steve French (sfrench@us.ibm.com) | |
7 | * | |
8 | * This program is free software; you can redistribute it and/or modify | |
9 | * it under the terms of the GNU General Public License as published by | |
221601c3 | 10 | * the Free Software Foundation; either version 2 of the License, or |
1da177e4 | 11 | * (at your option) any later version. |
221601c3 | 12 | * |
1da177e4 LT |
13 | * This program is distributed in the hope that it will be useful, |
14 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
15 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See | |
16 | * the GNU General Public License for more details. | |
17 | * | |
18 | * You should have received a copy of the GNU General Public License | |
221601c3 | 19 | * along with this program; if not, write to the Free Software |
1da177e4 LT |
20 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA |
21 | */ | |
22 | #include <linux/fs.h> | |
23 | #include <linux/string.h> | |
24 | #include <linux/ctype.h> | |
25 | #include <linux/module.h> | |
26 | #include <linux/proc_fs.h> | |
27 | #include <asm/uaccess.h> | |
28 | #include "cifspdu.h" | |
29 | #include "cifsglob.h" | |
30 | #include "cifsproto.h" | |
31 | #include "cifs_debug.h" | |
6c91d362 | 32 | #include "cifsfs.h" |
1da177e4 LT |
33 | |
34 | void | |
35 | cifs_dump_mem(char *label, void *data, int length) | |
36 | { | |
37 | int i, j; | |
38 | int *intptr = data; | |
39 | char *charptr = data; | |
40 | char buf[10], line[80]; | |
41 | ||
221601c3 | 42 | printk(KERN_DEBUG "%s: dump of %d bytes of data at 0x%p\n", |
1da177e4 LT |
43 | label, length, data); |
44 | for (i = 0; i < length; i += 16) { | |
45 | line[0] = 0; | |
46 | for (j = 0; (j < 4) && (i + j * 4 < length); j++) { | |
47 | sprintf(buf, " %08x", intptr[i / 4 + j]); | |
48 | strcat(line, buf); | |
49 | } | |
50 | buf[0] = ' '; | |
51 | buf[2] = 0; | |
52 | for (j = 0; (j < 16) && (i + j < length); j++) { | |
53 | buf[1] = isprint(charptr[i + j]) ? charptr[i + j] : '.'; | |
54 | strcat(line, buf); | |
55 | } | |
56 | printk(KERN_DEBUG "%s\n", line); | |
57 | } | |
58 | } | |
59 | ||
3979877e | 60 | #ifdef CONFIG_CIFS_DEBUG2 |
ffdd6e4d | 61 | void cifs_dump_detail(struct smb_hdr *smb) |
3979877e | 62 | { |
b6b38f70 | 63 | cERROR(1, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d", |
3979877e | 64 | smb->Command, smb->Status.CifsError, |
b6b38f70 JP |
65 | smb->Flags, smb->Flags2, smb->Mid, smb->Pid); |
66 | cERROR(1, "smb buf %p len %d", smb, smbCalcSize_LE(smb)); | |
3979877e SF |
67 | } |
68 | ||
69 | ||
ffdd6e4d | 70 | void cifs_dump_mids(struct TCP_Server_Info *server) |
3979877e SF |
71 | { |
72 | struct list_head *tmp; | |
ffdd6e4d | 73 | struct mid_q_entry *mid_entry; |
3979877e | 74 | |
221601c3 | 75 | if (server == NULL) |
3979877e SF |
76 | return; |
77 | ||
b6b38f70 | 78 | cERROR(1, "Dump pending requests:"); |
3979877e SF |
79 | spin_lock(&GlobalMid_Lock); |
80 | list_for_each(tmp, &server->pending_mid_q) { | |
81 | mid_entry = list_entry(tmp, struct mid_q_entry, qhead); | |
b6b38f70 | 82 | cERROR(1, "State: %d Cmd: %d Pid: %d Tsk: %p Mid %d", |
ad8b15f0 SF |
83 | mid_entry->midState, |
84 | (int)mid_entry->command, | |
85 | mid_entry->pid, | |
86 | mid_entry->tsk, | |
b6b38f70 | 87 | mid_entry->mid); |
3979877e | 88 | #ifdef CONFIG_CIFS_STATS2 |
b6b38f70 | 89 | cERROR(1, "IsLarge: %d buf: %p time rcv: %ld now: %ld", |
ad8b15f0 SF |
90 | mid_entry->largeBuf, |
91 | mid_entry->resp_buf, | |
92 | mid_entry->when_received, | |
b6b38f70 | 93 | jiffies); |
3979877e | 94 | #endif /* STATS2 */ |
b6b38f70 JP |
95 | cERROR(1, "IsMult: %d IsEnd: %d", mid_entry->multiRsp, |
96 | mid_entry->multiEnd); | |
ad8b15f0 SF |
97 | if (mid_entry->resp_buf) { |
98 | cifs_dump_detail(mid_entry->resp_buf); | |
99 | cifs_dump_mem("existing buf: ", | |
100 | mid_entry->resp_buf, 62); | |
3979877e SF |
101 | } |
102 | } | |
103 | spin_unlock(&GlobalMid_Lock); | |
104 | } | |
105 | #endif /* CONFIG_CIFS_DEBUG2 */ | |
106 | ||
1da177e4 | 107 | #ifdef CONFIG_PROC_FS |
f984c7b9 | 108 | static int cifs_debug_data_proc_show(struct seq_file *m, void *v) |
1da177e4 | 109 | { |
f1987b44 | 110 | struct list_head *tmp1, *tmp2, *tmp3; |
ffdd6e4d | 111 | struct mid_q_entry *mid_entry; |
14fbf50d | 112 | struct TCP_Server_Info *server; |
1da177e4 LT |
113 | struct cifsSesInfo *ses; |
114 | struct cifsTconInfo *tcon; | |
f1987b44 JL |
115 | int i, j; |
116 | __u32 dev_type; | |
1da177e4 | 117 | |
f984c7b9 | 118 | seq_puts(m, |
1da177e4 LT |
119 | "Display Internal CIFS Data Structures for Debugging\n" |
120 | "---------------------------------------------------\n"); | |
f984c7b9 AD |
121 | seq_printf(m, "CIFS Version %s\n", CIFS_VERSION); |
122 | seq_printf(m, "Active VFS Requests: %d\n", GlobalTotalActiveXid); | |
123 | seq_printf(m, "Servers:"); | |
1da177e4 LT |
124 | |
125 | i = 0; | |
14fbf50d | 126 | read_lock(&cifs_tcp_ses_lock); |
f1987b44 JL |
127 | list_for_each(tmp1, &cifs_tcp_ses_list) { |
128 | server = list_entry(tmp1, struct TCP_Server_Info, | |
14fbf50d | 129 | tcp_ses_list); |
1da177e4 | 130 | i++; |
14fbf50d JL |
131 | list_for_each(tmp2, &server->smb_ses_list) { |
132 | ses = list_entry(tmp2, struct cifsSesInfo, | |
133 | smb_ses_list); | |
134 | if ((ses->serverDomain == NULL) || | |
135 | (ses->serverOS == NULL) || | |
136 | (ses->serverNOS == NULL)) { | |
f1987b44 JL |
137 | seq_printf(m, "\n%d) entry for %s not fully " |
138 | "displayed\n\t", i, ses->serverName); | |
14fbf50d JL |
139 | } else { |
140 | seq_printf(m, | |
f1987b44 JL |
141 | "\n%d) Name: %s Domain: %s Uses: %d OS:" |
142 | " %s\n\tNOS: %s\tCapability: 0x%x\n\tSMB" | |
221601c3 | 143 | " session status: %d\t", |
b8643e1b | 144 | i, ses->serverName, ses->serverDomain, |
14fbf50d | 145 | ses->ses_count, ses->serverOS, ses->serverNOS, |
221601c3 | 146 | ses->capabilities, ses->status); |
14fbf50d | 147 | } |
f984c7b9 | 148 | seq_printf(m, "TCP status: %d\n\tLocal Users To " |
14fbf50d JL |
149 | "Server: %d SecMode: 0x%x Req On Wire: %d", |
150 | server->tcpStatus, server->srv_count, | |
151 | server->secMode, | |
152 | atomic_read(&server->inFlight)); | |
131afd0b SF |
153 | |
154 | #ifdef CONFIG_CIFS_STATS2 | |
f984c7b9 | 155 | seq_printf(m, " In Send: %d In MaxReq Wait: %d", |
14fbf50d JL |
156 | atomic_read(&server->inSend), |
157 | atomic_read(&server->num_waiters)); | |
131afd0b SF |
158 | #endif |
159 | ||
f1987b44 JL |
160 | seq_puts(m, "\n\tShares:"); |
161 | j = 0; | |
162 | list_for_each(tmp3, &ses->tcon_list) { | |
163 | tcon = list_entry(tmp3, struct cifsTconInfo, | |
164 | tcon_list); | |
165 | ++j; | |
166 | dev_type = le32_to_cpu(tcon->fsDevInfo.DeviceType); | |
167 | seq_printf(m, "\n\t%d) %s Mounts: %d ", j, | |
168 | tcon->treeName, tcon->tc_count); | |
169 | if (tcon->nativeFileSystem) { | |
170 | seq_printf(m, "Type: %s ", | |
171 | tcon->nativeFileSystem); | |
172 | } | |
173 | seq_printf(m, "DevInfo: 0x%x Attributes: 0x%x" | |
174 | "\nPathComponentMax: %d Status: 0x%d", | |
175 | le32_to_cpu(tcon->fsDevInfo.DeviceCharacteristics), | |
176 | le32_to_cpu(tcon->fsAttrInfo.Attributes), | |
177 | le32_to_cpu(tcon->fsAttrInfo.MaxPathNameComponentLength), | |
178 | tcon->tidStatus); | |
179 | if (dev_type == FILE_DEVICE_DISK) | |
180 | seq_puts(m, " type: DISK "); | |
181 | else if (dev_type == FILE_DEVICE_CD_ROM) | |
182 | seq_puts(m, " type: CDROM "); | |
183 | else | |
184 | seq_printf(m, " type: %d ", dev_type); | |
185 | ||
186 | if (tcon->need_reconnect) | |
187 | seq_puts(m, "\tDISCONNECTED "); | |
188 | seq_putc(m, '\n'); | |
189 | } | |
190 | ||
191 | seq_puts(m, "\n\tMIDs:\n"); | |
1da177e4 LT |
192 | |
193 | spin_lock(&GlobalMid_Lock); | |
14fbf50d | 194 | list_for_each(tmp3, &server->pending_mid_q) { |
f1987b44 | 195 | mid_entry = list_entry(tmp3, struct mid_q_entry, |
1da177e4 | 196 | qhead); |
f1987b44 | 197 | seq_printf(m, "\tState: %d com: %d pid:" |
ad8b15f0 SF |
198 | " %d tsk: %p mid %d\n", |
199 | mid_entry->midState, | |
200 | (int)mid_entry->command, | |
201 | mid_entry->pid, | |
202 | mid_entry->tsk, | |
203 | mid_entry->mid); | |
1da177e4 | 204 | } |
221601c3 | 205 | spin_unlock(&GlobalMid_Lock); |
1da177e4 | 206 | } |
1da177e4 | 207 | } |
14fbf50d | 208 | read_unlock(&cifs_tcp_ses_lock); |
f984c7b9 | 209 | seq_putc(m, '\n'); |
1da177e4 | 210 | |
1da177e4 | 211 | /* BB add code to dump additional info such as TCP session info now */ |
f984c7b9 AD |
212 | return 0; |
213 | } | |
1da177e4 | 214 | |
f984c7b9 AD |
215 | static int cifs_debug_data_proc_open(struct inode *inode, struct file *file) |
216 | { | |
217 | return single_open(file, cifs_debug_data_proc_show, NULL); | |
1da177e4 LT |
218 | } |
219 | ||
f984c7b9 AD |
220 | static const struct file_operations cifs_debug_data_proc_fops = { |
221 | .owner = THIS_MODULE, | |
222 | .open = cifs_debug_data_proc_open, | |
223 | .read = seq_read, | |
224 | .llseek = seq_lseek, | |
225 | .release = single_release, | |
226 | }; | |
1047abc1 | 227 | |
f984c7b9 AD |
228 | #ifdef CONFIG_CIFS_STATS |
229 | static ssize_t cifs_stats_proc_write(struct file *file, | |
230 | const char __user *buffer, size_t count, loff_t *ppos) | |
1047abc1 | 231 | { |
221601c3 SF |
232 | char c; |
233 | int rc; | |
f1987b44 JL |
234 | struct list_head *tmp1, *tmp2, *tmp3; |
235 | struct TCP_Server_Info *server; | |
236 | struct cifsSesInfo *ses; | |
1047abc1 SF |
237 | struct cifsTconInfo *tcon; |
238 | ||
221601c3 SF |
239 | rc = get_user(c, buffer); |
240 | if (rc) | |
241 | return rc; | |
1047abc1 | 242 | |
221601c3 | 243 | if (c == '1' || c == 'y' || c == 'Y' || c == '0') { |
4498eed5 SF |
244 | #ifdef CONFIG_CIFS_STATS2 |
245 | atomic_set(&totBufAllocCount, 0); | |
246 | atomic_set(&totSmBufAllocCount, 0); | |
247 | #endif /* CONFIG_CIFS_STATS2 */ | |
f1987b44 JL |
248 | read_lock(&cifs_tcp_ses_lock); |
249 | list_for_each(tmp1, &cifs_tcp_ses_list) { | |
250 | server = list_entry(tmp1, struct TCP_Server_Info, | |
251 | tcp_ses_list); | |
c2b3382c | 252 | list_for_each(tmp2, &server->smb_ses_list) { |
f1987b44 | 253 | ses = list_entry(tmp2, struct cifsSesInfo, |
c2b3382c | 254 | smb_ses_list); |
f1987b44 JL |
255 | list_for_each(tmp3, &ses->tcon_list) { |
256 | tcon = list_entry(tmp3, | |
257 | struct cifsTconInfo, | |
258 | tcon_list); | |
259 | atomic_set(&tcon->num_smbs_sent, 0); | |
260 | atomic_set(&tcon->num_writes, 0); | |
261 | atomic_set(&tcon->num_reads, 0); | |
262 | atomic_set(&tcon->num_oplock_brks, 0); | |
263 | atomic_set(&tcon->num_opens, 0); | |
65bc98b0 SF |
264 | atomic_set(&tcon->num_posixopens, 0); |
265 | atomic_set(&tcon->num_posixmkdirs, 0); | |
f1987b44 JL |
266 | atomic_set(&tcon->num_closes, 0); |
267 | atomic_set(&tcon->num_deletes, 0); | |
268 | atomic_set(&tcon->num_mkdirs, 0); | |
269 | atomic_set(&tcon->num_rmdirs, 0); | |
270 | atomic_set(&tcon->num_renames, 0); | |
271 | atomic_set(&tcon->num_t2renames, 0); | |
272 | atomic_set(&tcon->num_ffirst, 0); | |
273 | atomic_set(&tcon->num_fnext, 0); | |
274 | atomic_set(&tcon->num_fclose, 0); | |
275 | atomic_set(&tcon->num_hardlinks, 0); | |
276 | atomic_set(&tcon->num_symlinks, 0); | |
277 | atomic_set(&tcon->num_locks, 0); | |
278 | } | |
279 | } | |
1047abc1 | 280 | } |
f1987b44 | 281 | read_unlock(&cifs_tcp_ses_lock); |
1047abc1 SF |
282 | } |
283 | ||
221601c3 | 284 | return count; |
1047abc1 SF |
285 | } |
286 | ||
f984c7b9 | 287 | static int cifs_stats_proc_show(struct seq_file *m, void *v) |
1da177e4 | 288 | { |
f984c7b9 | 289 | int i; |
f1987b44 JL |
290 | struct list_head *tmp1, *tmp2, *tmp3; |
291 | struct TCP_Server_Info *server; | |
292 | struct cifsSesInfo *ses; | |
1da177e4 LT |
293 | struct cifsTconInfo *tcon; |
294 | ||
f984c7b9 | 295 | seq_printf(m, |
1da177e4 LT |
296 | "Resources in use\nCIFS Session: %d\n", |
297 | sesInfoAllocCount.counter); | |
f984c7b9 | 298 | seq_printf(m, "Share (unique mount targets): %d\n", |
1da177e4 | 299 | tconInfoAllocCount.counter); |
f984c7b9 | 300 | seq_printf(m, "SMB Request/Response Buffer: %d Pool size: %d\n", |
b8643e1b SF |
301 | bufAllocCount.counter, |
302 | cifs_min_rcv + tcpSesAllocCount.counter); | |
f984c7b9 | 303 | seq_printf(m, "SMB Small Req/Resp Buffer: %d Pool size: %d\n", |
221601c3 | 304 | smBufAllocCount.counter, cifs_min_small); |
07475ffb | 305 | #ifdef CONFIG_CIFS_STATS2 |
f984c7b9 | 306 | seq_printf(m, "Total Large %d Small %d Allocations\n", |
07475ffb | 307 | atomic_read(&totBufAllocCount), |
221601c3 | 308 | atomic_read(&totSmBufAllocCount)); |
07475ffb SF |
309 | #endif /* CONFIG_CIFS_STATS2 */ |
310 | ||
f984c7b9 AD |
311 | seq_printf(m, "Operations (MIDs): %d\n", midCount.counter); |
312 | seq_printf(m, | |
1da177e4 | 313 | "\n%d session %d share reconnects\n", |
221601c3 | 314 | tcpSesReconnectCount.counter, tconInfoReconnectCount.counter); |
1da177e4 | 315 | |
f984c7b9 | 316 | seq_printf(m, |
1da177e4 | 317 | "Total vfs operations: %d maximum at one time: %d\n", |
221601c3 | 318 | GlobalCurrentXid, GlobalMaxActiveXid); |
1da177e4 LT |
319 | |
320 | i = 0; | |
f1987b44 JL |
321 | read_lock(&cifs_tcp_ses_lock); |
322 | list_for_each(tmp1, &cifs_tcp_ses_list) { | |
323 | server = list_entry(tmp1, struct TCP_Server_Info, | |
324 | tcp_ses_list); | |
325 | list_for_each(tmp2, &server->smb_ses_list) { | |
326 | ses = list_entry(tmp2, struct cifsSesInfo, | |
327 | smb_ses_list); | |
328 | list_for_each(tmp3, &ses->tcon_list) { | |
329 | tcon = list_entry(tmp3, | |
330 | struct cifsTconInfo, | |
331 | tcon_list); | |
332 | i++; | |
333 | seq_printf(m, "\n%d) %s", i, tcon->treeName); | |
334 | if (tcon->need_reconnect) | |
335 | seq_puts(m, "\tDISCONNECTED "); | |
336 | seq_printf(m, "\nSMBs: %d Oplock Breaks: %d", | |
337 | atomic_read(&tcon->num_smbs_sent), | |
338 | atomic_read(&tcon->num_oplock_brks)); | |
339 | seq_printf(m, "\nReads: %d Bytes: %lld", | |
340 | atomic_read(&tcon->num_reads), | |
341 | (long long)(tcon->bytes_read)); | |
342 | seq_printf(m, "\nWrites: %d Bytes: %lld", | |
343 | atomic_read(&tcon->num_writes), | |
344 | (long long)(tcon->bytes_written)); | |
b298f223 SF |
345 | seq_printf(m, "\nFlushes: %d", |
346 | atomic_read(&tcon->num_flushes)); | |
f1987b44 JL |
347 | seq_printf(m, "\nLocks: %d HardLinks: %d " |
348 | "Symlinks: %d", | |
349 | atomic_read(&tcon->num_locks), | |
350 | atomic_read(&tcon->num_hardlinks), | |
351 | atomic_read(&tcon->num_symlinks)); | |
65bc98b0 | 352 | seq_printf(m, "\nOpens: %d Closes: %d " |
f1987b44 JL |
353 | "Deletes: %d", |
354 | atomic_read(&tcon->num_opens), | |
355 | atomic_read(&tcon->num_closes), | |
356 | atomic_read(&tcon->num_deletes)); | |
65bc98b0 SF |
357 | seq_printf(m, "\nPosix Opens: %d " |
358 | "Posix Mkdirs: %d", | |
359 | atomic_read(&tcon->num_posixopens), | |
360 | atomic_read(&tcon->num_posixmkdirs)); | |
f1987b44 JL |
361 | seq_printf(m, "\nMkdirs: %d Rmdirs: %d", |
362 | atomic_read(&tcon->num_mkdirs), | |
363 | atomic_read(&tcon->num_rmdirs)); | |
364 | seq_printf(m, "\nRenames: %d T2 Renames %d", | |
365 | atomic_read(&tcon->num_renames), | |
366 | atomic_read(&tcon->num_t2renames)); | |
367 | seq_printf(m, "\nFindFirst: %d FNext %d " | |
368 | "FClose %d", | |
369 | atomic_read(&tcon->num_ffirst), | |
370 | atomic_read(&tcon->num_fnext), | |
371 | atomic_read(&tcon->num_fclose)); | |
372 | } | |
373 | } | |
1da177e4 | 374 | } |
f1987b44 | 375 | read_unlock(&cifs_tcp_ses_lock); |
1da177e4 | 376 | |
f984c7b9 AD |
377 | seq_putc(m, '\n'); |
378 | return 0; | |
379 | } | |
221601c3 | 380 | |
f984c7b9 AD |
381 | static int cifs_stats_proc_open(struct inode *inode, struct file *file) |
382 | { | |
383 | return single_open(file, cifs_stats_proc_show, NULL); | |
1da177e4 | 384 | } |
f984c7b9 AD |
385 | |
386 | static const struct file_operations cifs_stats_proc_fops = { | |
387 | .owner = THIS_MODULE, | |
388 | .open = cifs_stats_proc_open, | |
389 | .read = seq_read, | |
390 | .llseek = seq_lseek, | |
391 | .release = single_release, | |
392 | .write = cifs_stats_proc_write, | |
393 | }; | |
90c81e0b | 394 | #endif /* STATS */ |
1da177e4 LT |
395 | |
396 | static struct proc_dir_entry *proc_fs_cifs; | |
f984c7b9 AD |
397 | static const struct file_operations cifsFYI_proc_fops; |
398 | static const struct file_operations cifs_oplock_proc_fops; | |
399 | static const struct file_operations cifs_lookup_cache_proc_fops; | |
400 | static const struct file_operations traceSMB_proc_fops; | |
401 | static const struct file_operations cifs_multiuser_mount_proc_fops; | |
402 | static const struct file_operations cifs_security_flags_proc_fops; | |
403 | static const struct file_operations cifs_experimental_proc_fops; | |
404 | static const struct file_operations cifs_linux_ext_proc_fops; | |
1da177e4 LT |
405 | |
406 | void | |
407 | cifs_proc_init(void) | |
408 | { | |
36a5aeb8 | 409 | proc_fs_cifs = proc_mkdir("fs/cifs", NULL); |
1da177e4 LT |
410 | if (proc_fs_cifs == NULL) |
411 | return; | |
412 | ||
f984c7b9 | 413 | proc_create("DebugData", 0, proc_fs_cifs, &cifs_debug_data_proc_fops); |
1da177e4 LT |
414 | |
415 | #ifdef CONFIG_CIFS_STATS | |
f984c7b9 | 416 | proc_create("Stats", 0, proc_fs_cifs, &cifs_stats_proc_fops); |
90c81e0b | 417 | #endif /* STATS */ |
f984c7b9 AD |
418 | proc_create("cifsFYI", 0, proc_fs_cifs, &cifsFYI_proc_fops); |
419 | proc_create("traceSMB", 0, proc_fs_cifs, &traceSMB_proc_fops); | |
420 | proc_create("OplockEnabled", 0, proc_fs_cifs, &cifs_oplock_proc_fops); | |
99b1f5b2 SF |
421 | proc_create("Experimental", 0, proc_fs_cifs, |
422 | &cifs_experimental_proc_fops); | |
423 | proc_create("LinuxExtensionsEnabled", 0, proc_fs_cifs, | |
424 | &cifs_linux_ext_proc_fops); | |
425 | proc_create("MultiuserMount", 0, proc_fs_cifs, | |
426 | &cifs_multiuser_mount_proc_fops); | |
427 | proc_create("SecurityFlags", 0, proc_fs_cifs, | |
428 | &cifs_security_flags_proc_fops); | |
429 | proc_create("LookupCacheEnabled", 0, proc_fs_cifs, | |
430 | &cifs_lookup_cache_proc_fops); | |
1da177e4 LT |
431 | } |
432 | ||
433 | void | |
434 | cifs_proc_clean(void) | |
435 | { | |
436 | if (proc_fs_cifs == NULL) | |
437 | return; | |
438 | ||
439 | remove_proc_entry("DebugData", proc_fs_cifs); | |
440 | remove_proc_entry("cifsFYI", proc_fs_cifs); | |
441 | remove_proc_entry("traceSMB", proc_fs_cifs); | |
442 | #ifdef CONFIG_CIFS_STATS | |
443 | remove_proc_entry("Stats", proc_fs_cifs); | |
444 | #endif | |
445 | remove_proc_entry("MultiuserMount", proc_fs_cifs); | |
446 | remove_proc_entry("OplockEnabled", proc_fs_cifs); | |
221601c3 | 447 | remove_proc_entry("SecurityFlags", proc_fs_cifs); |
221601c3 SF |
448 | remove_proc_entry("LinuxExtensionsEnabled", proc_fs_cifs); |
449 | remove_proc_entry("Experimental", proc_fs_cifs); | |
450 | remove_proc_entry("LookupCacheEnabled", proc_fs_cifs); | |
36a5aeb8 | 451 | remove_proc_entry("fs/cifs", NULL); |
1da177e4 LT |
452 | } |
453 | ||
f984c7b9 | 454 | static int cifsFYI_proc_show(struct seq_file *m, void *v) |
1da177e4 | 455 | { |
f984c7b9 AD |
456 | seq_printf(m, "%d\n", cifsFYI); |
457 | return 0; | |
458 | } | |
1da177e4 | 459 | |
f984c7b9 AD |
460 | static int cifsFYI_proc_open(struct inode *inode, struct file *file) |
461 | { | |
462 | return single_open(file, cifsFYI_proc_show, NULL); | |
1da177e4 | 463 | } |
f984c7b9 AD |
464 | |
465 | static ssize_t cifsFYI_proc_write(struct file *file, const char __user *buffer, | |
466 | size_t count, loff_t *ppos) | |
1da177e4 LT |
467 | { |
468 | char c; | |
469 | int rc; | |
470 | ||
471 | rc = get_user(c, buffer); | |
472 | if (rc) | |
473 | return rc; | |
474 | if (c == '0' || c == 'n' || c == 'N') | |
475 | cifsFYI = 0; | |
476 | else if (c == '1' || c == 'y' || c == 'Y') | |
477 | cifsFYI = 1; | |
221601c3 | 478 | else if ((c > '1') && (c <= '9')) |
1047abc1 | 479 | cifsFYI = (int) (c - '0'); /* see cifs_debug.h for meanings */ |
1da177e4 LT |
480 | |
481 | return count; | |
482 | } | |
483 | ||
f984c7b9 AD |
484 | static const struct file_operations cifsFYI_proc_fops = { |
485 | .owner = THIS_MODULE, | |
486 | .open = cifsFYI_proc_open, | |
487 | .read = seq_read, | |
488 | .llseek = seq_lseek, | |
489 | .release = single_release, | |
490 | .write = cifsFYI_proc_write, | |
491 | }; | |
1da177e4 | 492 | |
f984c7b9 AD |
493 | static int cifs_oplock_proc_show(struct seq_file *m, void *v) |
494 | { | |
495 | seq_printf(m, "%d\n", oplockEnabled); | |
496 | return 0; | |
497 | } | |
1da177e4 | 498 | |
f984c7b9 AD |
499 | static int cifs_oplock_proc_open(struct inode *inode, struct file *file) |
500 | { | |
501 | return single_open(file, cifs_oplock_proc_show, NULL); | |
1da177e4 | 502 | } |
f984c7b9 AD |
503 | |
504 | static ssize_t cifs_oplock_proc_write(struct file *file, | |
505 | const char __user *buffer, size_t count, loff_t *ppos) | |
1da177e4 LT |
506 | { |
507 | char c; | |
508 | int rc; | |
509 | ||
510 | rc = get_user(c, buffer); | |
511 | if (rc) | |
512 | return rc; | |
513 | if (c == '0' || c == 'n' || c == 'N') | |
514 | oplockEnabled = 0; | |
515 | else if (c == '1' || c == 'y' || c == 'Y') | |
516 | oplockEnabled = 1; | |
517 | ||
518 | return count; | |
519 | } | |
520 | ||
f984c7b9 AD |
521 | static const struct file_operations cifs_oplock_proc_fops = { |
522 | .owner = THIS_MODULE, | |
523 | .open = cifs_oplock_proc_open, | |
524 | .read = seq_read, | |
525 | .llseek = seq_lseek, | |
526 | .release = single_release, | |
527 | .write = cifs_oplock_proc_write, | |
528 | }; | |
1da177e4 | 529 | |
f984c7b9 AD |
530 | static int cifs_experimental_proc_show(struct seq_file *m, void *v) |
531 | { | |
532 | seq_printf(m, "%d\n", experimEnabled); | |
533 | return 0; | |
534 | } | |
1da177e4 | 535 | |
f984c7b9 AD |
536 | static int cifs_experimental_proc_open(struct inode *inode, struct file *file) |
537 | { | |
538 | return single_open(file, cifs_experimental_proc_show, NULL); | |
1da177e4 | 539 | } |
f984c7b9 AD |
540 | |
541 | static ssize_t cifs_experimental_proc_write(struct file *file, | |
542 | const char __user *buffer, size_t count, loff_t *ppos) | |
1da177e4 | 543 | { |
ec637e3f SF |
544 | char c; |
545 | int rc; | |
1da177e4 | 546 | |
ec637e3f SF |
547 | rc = get_user(c, buffer); |
548 | if (rc) | |
549 | return rc; | |
550 | if (c == '0' || c == 'n' || c == 'N') | |
551 | experimEnabled = 0; | |
552 | else if (c == '1' || c == 'y' || c == 'Y') | |
553 | experimEnabled = 1; | |
554 | else if (c == '2') | |
555 | experimEnabled = 2; | |
1da177e4 | 556 | |
ec637e3f | 557 | return count; |
1da177e4 LT |
558 | } |
559 | ||
f984c7b9 AD |
560 | static const struct file_operations cifs_experimental_proc_fops = { |
561 | .owner = THIS_MODULE, | |
562 | .open = cifs_experimental_proc_open, | |
563 | .read = seq_read, | |
564 | .llseek = seq_lseek, | |
565 | .release = single_release, | |
566 | .write = cifs_experimental_proc_write, | |
567 | }; | |
1da177e4 | 568 | |
f984c7b9 AD |
569 | static int cifs_linux_ext_proc_show(struct seq_file *m, void *v) |
570 | { | |
571 | seq_printf(m, "%d\n", linuxExtEnabled); | |
572 | return 0; | |
573 | } | |
1da177e4 | 574 | |
f984c7b9 AD |
575 | static int cifs_linux_ext_proc_open(struct inode *inode, struct file *file) |
576 | { | |
577 | return single_open(file, cifs_linux_ext_proc_show, NULL); | |
1da177e4 | 578 | } |
f984c7b9 AD |
579 | |
580 | static ssize_t cifs_linux_ext_proc_write(struct file *file, | |
581 | const char __user *buffer, size_t count, loff_t *ppos) | |
1da177e4 | 582 | { |
221601c3 SF |
583 | char c; |
584 | int rc; | |
585 | ||
586 | rc = get_user(c, buffer); | |
587 | if (rc) | |
588 | return rc; | |
589 | if (c == '0' || c == 'n' || c == 'N') | |
590 | linuxExtEnabled = 0; | |
591 | else if (c == '1' || c == 'y' || c == 'Y') | |
592 | linuxExtEnabled = 1; | |
593 | ||
594 | return count; | |
1da177e4 LT |
595 | } |
596 | ||
f984c7b9 AD |
597 | static const struct file_operations cifs_linux_ext_proc_fops = { |
598 | .owner = THIS_MODULE, | |
599 | .open = cifs_linux_ext_proc_open, | |
600 | .read = seq_read, | |
601 | .llseek = seq_lseek, | |
602 | .release = single_release, | |
603 | .write = cifs_linux_ext_proc_write, | |
604 | }; | |
1da177e4 | 605 | |
f984c7b9 | 606 | static int cifs_lookup_cache_proc_show(struct seq_file *m, void *v) |
1da177e4 | 607 | { |
f984c7b9 AD |
608 | seq_printf(m, "%d\n", lookupCacheEnabled); |
609 | return 0; | |
610 | } | |
1da177e4 | 611 | |
f984c7b9 AD |
612 | static int cifs_lookup_cache_proc_open(struct inode *inode, struct file *file) |
613 | { | |
614 | return single_open(file, cifs_lookup_cache_proc_show, NULL); | |
1da177e4 | 615 | } |
f984c7b9 AD |
616 | |
617 | static ssize_t cifs_lookup_cache_proc_write(struct file *file, | |
618 | const char __user *buffer, size_t count, loff_t *ppos) | |
1da177e4 LT |
619 | { |
620 | char c; | |
621 | int rc; | |
622 | ||
623 | rc = get_user(c, buffer); | |
624 | if (rc) | |
625 | return rc; | |
626 | if (c == '0' || c == 'n' || c == 'N') | |
627 | lookupCacheEnabled = 0; | |
628 | else if (c == '1' || c == 'y' || c == 'Y') | |
629 | lookupCacheEnabled = 1; | |
630 | ||
631 | return count; | |
632 | } | |
1da177e4 | 633 | |
f984c7b9 AD |
634 | static const struct file_operations cifs_lookup_cache_proc_fops = { |
635 | .owner = THIS_MODULE, | |
636 | .open = cifs_lookup_cache_proc_open, | |
637 | .read = seq_read, | |
638 | .llseek = seq_lseek, | |
639 | .release = single_release, | |
640 | .write = cifs_lookup_cache_proc_write, | |
641 | }; | |
1da177e4 | 642 | |
f984c7b9 AD |
643 | static int traceSMB_proc_show(struct seq_file *m, void *v) |
644 | { | |
645 | seq_printf(m, "%d\n", traceSMB); | |
646 | return 0; | |
647 | } | |
1da177e4 | 648 | |
f984c7b9 AD |
649 | static int traceSMB_proc_open(struct inode *inode, struct file *file) |
650 | { | |
651 | return single_open(file, traceSMB_proc_show, NULL); | |
1da177e4 | 652 | } |
f984c7b9 AD |
653 | |
654 | static ssize_t traceSMB_proc_write(struct file *file, const char __user *buffer, | |
655 | size_t count, loff_t *ppos) | |
1da177e4 LT |
656 | { |
657 | char c; | |
658 | int rc; | |
659 | ||
660 | rc = get_user(c, buffer); | |
661 | if (rc) | |
662 | return rc; | |
663 | if (c == '0' || c == 'n' || c == 'N') | |
664 | traceSMB = 0; | |
665 | else if (c == '1' || c == 'y' || c == 'Y') | |
666 | traceSMB = 1; | |
667 | ||
668 | return count; | |
669 | } | |
670 | ||
f984c7b9 AD |
671 | static const struct file_operations traceSMB_proc_fops = { |
672 | .owner = THIS_MODULE, | |
673 | .open = traceSMB_proc_open, | |
674 | .read = seq_read, | |
675 | .llseek = seq_lseek, | |
676 | .release = single_release, | |
677 | .write = traceSMB_proc_write, | |
678 | }; | |
1da177e4 | 679 | |
f984c7b9 AD |
680 | static int cifs_multiuser_mount_proc_show(struct seq_file *m, void *v) |
681 | { | |
682 | seq_printf(m, "%d\n", multiuser_mount); | |
683 | return 0; | |
684 | } | |
1da177e4 | 685 | |
99b1f5b2 | 686 | static int cifs_multiuser_mount_proc_open(struct inode *inode, struct file *fh) |
f984c7b9 | 687 | { |
99b1f5b2 | 688 | return single_open(fh, cifs_multiuser_mount_proc_show, NULL); |
1da177e4 | 689 | } |
f984c7b9 AD |
690 | |
691 | static ssize_t cifs_multiuser_mount_proc_write(struct file *file, | |
692 | const char __user *buffer, size_t count, loff_t *ppos) | |
1da177e4 LT |
693 | { |
694 | char c; | |
695 | int rc; | |
696 | ||
697 | rc = get_user(c, buffer); | |
698 | if (rc) | |
699 | return rc; | |
700 | if (c == '0' || c == 'n' || c == 'N') | |
701 | multiuser_mount = 0; | |
702 | else if (c == '1' || c == 'y' || c == 'Y') | |
703 | multiuser_mount = 1; | |
704 | ||
705 | return count; | |
706 | } | |
707 | ||
f984c7b9 AD |
708 | static const struct file_operations cifs_multiuser_mount_proc_fops = { |
709 | .owner = THIS_MODULE, | |
710 | .open = cifs_multiuser_mount_proc_open, | |
711 | .read = seq_read, | |
712 | .llseek = seq_lseek, | |
713 | .release = single_release, | |
714 | .write = cifs_multiuser_mount_proc_write, | |
715 | }; | |
1da177e4 | 716 | |
f984c7b9 AD |
717 | static int cifs_security_flags_proc_show(struct seq_file *m, void *v) |
718 | { | |
04912d6a | 719 | seq_printf(m, "0x%x\n", global_secflags); |
f984c7b9 AD |
720 | return 0; |
721 | } | |
1da177e4 | 722 | |
f984c7b9 AD |
723 | static int cifs_security_flags_proc_open(struct inode *inode, struct file *file) |
724 | { | |
725 | return single_open(file, cifs_security_flags_proc_show, NULL); | |
1da177e4 | 726 | } |
f984c7b9 AD |
727 | |
728 | static ssize_t cifs_security_flags_proc_write(struct file *file, | |
729 | const char __user *buffer, size_t count, loff_t *ppos) | |
1da177e4 | 730 | { |
bdc4bf6e SF |
731 | unsigned int flags; |
732 | char flags_string[12]; | |
1da177e4 | 733 | char c; |
bdc4bf6e | 734 | |
221601c3 | 735 | if ((count < 1) || (count > 11)) |
3979877e | 736 | return -EINVAL; |
1da177e4 | 737 | |
bdc4bf6e | 738 | memset(flags_string, 0, 12); |
3979877e | 739 | |
221601c3 | 740 | if (copy_from_user(flags_string, buffer, count)) |
bdc4bf6e | 741 | return -EFAULT; |
3979877e | 742 | |
221601c3 | 743 | if (count < 3) { |
bdc4bf6e SF |
744 | /* single char or single char followed by null */ |
745 | c = flags_string[0]; | |
a013689d | 746 | if (c == '0' || c == 'n' || c == 'N') { |
04912d6a | 747 | global_secflags = CIFSSEC_DEF; /* default */ |
a013689d SF |
748 | return count; |
749 | } else if (c == '1' || c == 'y' || c == 'Y') { | |
04912d6a | 750 | global_secflags = CIFSSEC_MAX; |
a013689d SF |
751 | return count; |
752 | } else if (!isdigit(c)) { | |
b6b38f70 | 753 | cERROR(1, "invalid flag %c", c); |
a013689d SF |
754 | return -EINVAL; |
755 | } | |
bdc4bf6e SF |
756 | } |
757 | /* else we have a number */ | |
758 | ||
759 | flags = simple_strtoul(flags_string, NULL, 0); | |
760 | ||
b6b38f70 | 761 | cFYI(1, "sec flags 0x%x", flags); |
bdc4bf6e | 762 | |
221601c3 | 763 | if (flags <= 0) { |
b6b38f70 | 764 | cERROR(1, "invalid security flags %s", flags_string); |
bdc4bf6e SF |
765 | return -EINVAL; |
766 | } | |
1da177e4 | 767 | |
221601c3 | 768 | if (flags & ~CIFSSEC_MASK) { |
b6b38f70 JP |
769 | cERROR(1, "attempt to set unsupported security flags 0x%x", |
770 | flags & ~CIFSSEC_MASK); | |
bdc4bf6e SF |
771 | return -EINVAL; |
772 | } | |
773 | /* flags look ok - update the global security flags for cifs module */ | |
04912d6a JL |
774 | global_secflags = flags; |
775 | if (global_secflags & CIFSSEC_MUST_SIGN) { | |
762e5ab7 | 776 | /* requiring signing implies signing is allowed */ |
04912d6a | 777 | global_secflags |= CIFSSEC_MAY_SIGN; |
b6b38f70 | 778 | cFYI(1, "packet signing now required"); |
04912d6a | 779 | } else if ((global_secflags & CIFSSEC_MAY_SIGN) == 0) { |
b6b38f70 | 780 | cFYI(1, "packet signing disabled"); |
762e5ab7 SF |
781 | } |
782 | /* BB should we turn on MAY flags for other MUST options? */ | |
1da177e4 LT |
783 | return count; |
784 | } | |
f984c7b9 AD |
785 | |
786 | static const struct file_operations cifs_security_flags_proc_fops = { | |
787 | .owner = THIS_MODULE, | |
788 | .open = cifs_security_flags_proc_open, | |
789 | .read = seq_read, | |
790 | .llseek = seq_lseek, | |
791 | .release = single_release, | |
792 | .write = cifs_security_flags_proc_write, | |
793 | }; | |
90c81e0b | 794 | #else |
e086fcea | 795 | inline void cifs_proc_init(void) |
90c81e0b SF |
796 | { |
797 | } | |
798 | ||
e086fcea | 799 | inline void cifs_proc_clean(void) |
90c81e0b SF |
800 | { |
801 | } | |
802 | #endif /* PROC_FS */ |