]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - fs/cifs/cifs_debug.c
cifs: Add get_security_type_str function to return sec type.
[mirror_ubuntu-jammy-kernel.git] / fs / cifs / cifs_debug.c
CommitLineData
1a59d1b8 1// SPDX-License-Identifier: GPL-2.0-or-later
1da177e4
LT
2/*
3 * fs/cifs_debug.c
4 *
b8643e1b 5 * Copyright (C) International Business Machines Corp., 2000,2005
1da177e4
LT
6 *
7 * Modified by Steve French (sfrench@us.ibm.com)
1da177e4
LT
8 */
9#include <linux/fs.h>
10#include <linux/string.h>
11#include <linux/ctype.h>
12#include <linux/module.h>
13#include <linux/proc_fs.h>
7c0f6ba6 14#include <linux/uaccess.h>
1da177e4
LT
15#include "cifspdu.h"
16#include "cifsglob.h"
17#include "cifsproto.h"
18#include "cifs_debug.h"
6c91d362 19#include "cifsfs.h"
54be1f6c
PA
20#ifdef CONFIG_CIFS_DFS_UPCALL
21#include "dfs_cache.h"
22#endif
d8ec913b
LL
23#ifdef CONFIG_CIFS_SMB_DIRECT
24#include "smbdirect.h"
25#endif
1da177e4
LT
26
27void
28cifs_dump_mem(char *label, void *data, int length)
29{
0b456f04 30 pr_debug("%s: dump of %d bytes of data at 0x%p\n", label, length, data);
55d83e0d
AS
31 print_hex_dump(KERN_DEBUG, "", DUMP_PREFIX_OFFSET, 16, 4,
32 data, length, true);
1da177e4
LT
33}
34
14547f7d 35void cifs_dump_detail(void *buf, struct TCP_Server_Info *server)
3979877e 36{
8aa26f3e 37#ifdef CONFIG_CIFS_DEBUG2
d4e4854f
PS
38 struct smb_hdr *smb = (struct smb_hdr *)buf;
39
f96637be
JP
40 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n",
41 smb->Command, smb->Status.CifsError,
42 smb->Flags, smb->Flags2, smb->Mid, smb->Pid);
14547f7d 43 cifs_dbg(VFS, "smb buf %p len %u\n", smb,
71992e62 44 server->ops->calc_smb_size(smb, server));
8aa26f3e 45#endif /* CONFIG_CIFS_DEBUG2 */
3979877e
SF
46}
47
ffdd6e4d 48void cifs_dump_mids(struct TCP_Server_Info *server)
3979877e 49{
8aa26f3e 50#ifdef CONFIG_CIFS_DEBUG2
3979877e 51 struct list_head *tmp;
ffdd6e4d 52 struct mid_q_entry *mid_entry;
3979877e 53
221601c3 54 if (server == NULL)
3979877e
SF
55 return;
56
f96637be 57 cifs_dbg(VFS, "Dump pending requests:\n");
3979877e
SF
58 spin_lock(&GlobalMid_Lock);
59 list_for_each(tmp, &server->pending_mid_q) {
60 mid_entry = list_entry(tmp, struct mid_q_entry, qhead);
f96637be
JP
61 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n",
62 mid_entry->mid_state,
63 le16_to_cpu(mid_entry->command),
64 mid_entry->pid,
65 mid_entry->callback_data,
66 mid_entry->mid);
3979877e 67#ifdef CONFIG_CIFS_STATS2
f96637be
JP
68 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n",
69 mid_entry->large_buf,
70 mid_entry->resp_buf,
71 mid_entry->when_received,
72 jiffies);
3979877e 73#endif /* STATS2 */
f96637be
JP
74 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n",
75 mid_entry->multiRsp, mid_entry->multiEnd);
ad8b15f0 76 if (mid_entry->resp_buf) {
71992e62 77 cifs_dump_detail(mid_entry->resp_buf, server);
ad8b15f0
SF
78 cifs_dump_mem("existing buf: ",
79 mid_entry->resp_buf, 62);
3979877e
SF
80 }
81 }
82 spin_unlock(&GlobalMid_Lock);
3979877e 83#endif /* CONFIG_CIFS_DEBUG2 */
8aa26f3e 84}
3979877e 85
1da177e4 86#ifdef CONFIG_PROC_FS
02cf5905
AA
87static void cifs_debug_tcon(struct seq_file *m, struct cifs_tcon *tcon)
88{
89 __u32 dev_type = le32_to_cpu(tcon->fsDevInfo.DeviceType);
90
91 seq_printf(m, "%s Mounts: %d ", tcon->treeName, tcon->tc_count);
92 if (tcon->nativeFileSystem)
93 seq_printf(m, "Type: %s ", tcon->nativeFileSystem);
94 seq_printf(m, "DevInfo: 0x%x Attributes: 0x%x\n\tPathComponentMax: %d Status: %d",
95 le32_to_cpu(tcon->fsDevInfo.DeviceCharacteristics),
96 le32_to_cpu(tcon->fsAttrInfo.Attributes),
97 le32_to_cpu(tcon->fsAttrInfo.MaxPathNameComponentLength),
98 tcon->tidStatus);
99 if (dev_type == FILE_DEVICE_DISK)
100 seq_puts(m, " type: DISK ");
101 else if (dev_type == FILE_DEVICE_CD_ROM)
102 seq_puts(m, " type: CDROM ");
103 else
104 seq_printf(m, " type: %d ", dev_type);
ab7b10cf
SF
105
106 seq_printf(m, "Serial Number: 0x%x", tcon->vol_serial_number);
107
ffd1ef1e
SF
108 if ((tcon->seal) ||
109 (tcon->ses->session_flags & SMB2_SESSION_FLAG_ENCRYPT_DATA) ||
110 (tcon->share_flags & SHI1005_FLAGS_ENCRYPT_DATA))
ede2e520 111 seq_printf(m, " Encrypted");
5c5a41be
SF
112 if (tcon->nocase)
113 seq_printf(m, " nocase");
ede2e520
SF
114 if (tcon->unix_ext)
115 seq_printf(m, " POSIX Extensions");
02cf5905
AA
116 if (tcon->ses->server->ops->dump_share_caps)
117 tcon->ses->server->ops->dump_share_caps(m, tcon);
118
119 if (tcon->need_reconnect)
120 seq_puts(m, "\tDISCONNECTED ");
121 seq_putc(m, '\n');
122}
123
85150929
AA
124static void
125cifs_dump_channel(struct seq_file *m, int i, struct cifs_chan *chan)
126{
127 struct TCP_Server_Info *server = chan->server;
128
129 seq_printf(m, "\t\tChannel %d Number of credits: %d Dialect 0x%x "
130 "TCP status: %d Instance: %d Local Users To Server: %d "
131 "SecMode: 0x%x Req On Wire: %d In Send: %d "
132 "In MaxReq Wait: %d\n",
133 i+1,
134 server->credits,
135 server->dialect,
136 server->tcpStatus,
137 server->reconnect_instance,
138 server->srv_count,
139 server->sec_mode,
140 in_flight(server),
141 atomic_read(&server->in_send),
142 atomic_read(&server->num_waiters));
143}
144
bc0fe8b2
AA
145static void
146cifs_dump_iface(struct seq_file *m, struct cifs_server_iface *iface)
147{
148 struct sockaddr_in *ipv4 = (struct sockaddr_in *)&iface->sockaddr;
149 struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)&iface->sockaddr;
150
35a90807 151 seq_printf(m, "\tSpeed: %zu bps\n", iface->speed);
bc0fe8b2
AA
152 seq_puts(m, "\t\tCapabilities: ");
153 if (iface->rdma_capable)
154 seq_puts(m, "rdma ");
155 if (iface->rss_capable)
156 seq_puts(m, "rss ");
157 seq_putc(m, '\n');
158 if (iface->sockaddr.ss_family == AF_INET)
159 seq_printf(m, "\t\tIPv4: %pI4\n", &ipv4->sin_addr);
160 else if (iface->sockaddr.ss_family == AF_INET6)
161 seq_printf(m, "\t\tIPv6: %pI6\n", &ipv6->sin6_addr);
162}
163
dfe33f9a
SF
164static int cifs_debug_files_proc_show(struct seq_file *m, void *v)
165{
166 struct list_head *stmp, *tmp, *tmp1, *tmp2;
167 struct TCP_Server_Info *server;
168 struct cifs_ses *ses;
169 struct cifs_tcon *tcon;
170 struct cifsFileInfo *cfile;
171
172 seq_puts(m, "# Version:1\n");
173 seq_puts(m, "# Format:\n");
174 seq_puts(m, "# <tree id> <persistent fid> <flags> <count> <pid> <uid>");
175#ifdef CONFIG_CIFS_DEBUG2
176 seq_printf(m, " <filename> <mid>\n");
177#else
178 seq_printf(m, " <filename>\n");
179#endif /* CIFS_DEBUG2 */
180 spin_lock(&cifs_tcp_ses_lock);
181 list_for_each(stmp, &cifs_tcp_ses_list) {
182 server = list_entry(stmp, struct TCP_Server_Info,
183 tcp_ses_list);
184 list_for_each(tmp, &server->smb_ses_list) {
185 ses = list_entry(tmp, struct cifs_ses, smb_ses_list);
186 list_for_each(tmp1, &ses->tcon_list) {
187 tcon = list_entry(tmp1, struct cifs_tcon, tcon_list);
188 spin_lock(&tcon->open_file_lock);
189 list_for_each(tmp2, &tcon->openFileList) {
190 cfile = list_entry(tmp2, struct cifsFileInfo,
191 tlist);
192 seq_printf(m,
193 "0x%x 0x%llx 0x%x %d %d %d %s",
194 tcon->tid,
195 cfile->fid.persistent_fid,
196 cfile->f_flags,
197 cfile->count,
198 cfile->pid,
199 from_kuid(&init_user_ns, cfile->uid),
200 cfile->dentry->d_name.name);
201#ifdef CONFIG_CIFS_DEBUG2
202 seq_printf(m, " 0x%llx\n", cfile->fid.mid);
203#else
204 seq_printf(m, "\n");
205#endif /* CIFS_DEBUG2 */
206 }
207 spin_unlock(&tcon->open_file_lock);
208 }
209 }
210 }
211 spin_unlock(&cifs_tcp_ses_lock);
212 seq_putc(m, '\n');
213 return 0;
214}
215
f984c7b9 216static int cifs_debug_data_proc_show(struct seq_file *m, void *v)
1da177e4 217{
f1987b44 218 struct list_head *tmp1, *tmp2, *tmp3;
ffdd6e4d 219 struct mid_q_entry *mid_entry;
14fbf50d 220 struct TCP_Server_Info *server;
96daf2b0
SF
221 struct cifs_ses *ses;
222 struct cifs_tcon *tcon;
f1987b44 223 int i, j;
1da177e4 224
f984c7b9 225 seq_puts(m,
1da177e4
LT
226 "Display Internal CIFS Data Structures for Debugging\n"
227 "---------------------------------------------------\n");
f984c7b9 228 seq_printf(m, "CIFS Version %s\n", CIFS_VERSION);
ca40b714 229 seq_printf(m, "Features:");
f579903e 230#ifdef CONFIG_CIFS_DFS_UPCALL
950132af 231 seq_printf(m, " DFS");
f579903e
SJ
232#endif
233#ifdef CONFIG_CIFS_FSCACHE
950132af
SF
234 seq_printf(m, ",FSCACHE");
235#endif
236#ifdef CONFIG_CIFS_SMB_DIRECT
237 seq_printf(m, ",SMB_DIRECT");
238#endif
239#ifdef CONFIG_CIFS_STATS2
240 seq_printf(m, ",STATS2");
d2586500 241#else
950132af
SF
242 seq_printf(m, ",STATS");
243#endif
244#ifdef CONFIG_CIFS_DEBUG2
245 seq_printf(m, ",DEBUG2");
246#elif defined(CONFIG_CIFS_DEBUG)
247 seq_printf(m, ",DEBUG");
248#endif
249#ifdef CONFIG_CIFS_ALLOW_INSECURE_LEGACY
250 seq_printf(m, ",ALLOW_INSECURE_LEGACY");
f579903e
SJ
251#endif
252#ifdef CONFIG_CIFS_WEAK_PW_HASH
950132af 253 seq_printf(m, ",WEAK_PW_HASH");
f579903e
SJ
254#endif
255#ifdef CONFIG_CIFS_POSIX
950132af 256 seq_printf(m, ",CIFS_POSIX");
f579903e
SJ
257#endif
258#ifdef CONFIG_CIFS_UPCALL
950132af 259 seq_printf(m, ",UPCALL(SPNEGO)");
f579903e
SJ
260#endif
261#ifdef CONFIG_CIFS_XATTR
950132af 262 seq_printf(m, ",XATTR");
ca40b714 263#endif
950132af 264 seq_printf(m, ",ACL");
f579903e 265 seq_putc(m, '\n');
a5f1a81f 266 seq_printf(m, "CIFSMaxBufSize: %d\n", CIFSMaxBufSize);
f984c7b9
AD
267 seq_printf(m, "Active VFS Requests: %d\n", GlobalTotalActiveXid);
268 seq_printf(m, "Servers:");
1da177e4
LT
269
270 i = 0;
3f9bcca7 271 spin_lock(&cifs_tcp_ses_lock);
f1987b44
JL
272 list_for_each(tmp1, &cifs_tcp_ses_list) {
273 server = list_entry(tmp1, struct TCP_Server_Info,
14fbf50d 274 tcp_ses_list);
08a3b969
LL
275
276#ifdef CONFIG_CIFS_SMB_DIRECT
277 if (!server->rdma)
278 goto skip_rdma;
279
14cc639c
LL
280 if (!server->smbd_conn) {
281 seq_printf(m, "\nSMBDirect transport not available");
282 goto skip_rdma;
283 }
284
08a3b969
LL
285 seq_printf(m, "\nSMBDirect (in hex) protocol version: %x "
286 "transport status: %x",
287 server->smbd_conn->protocol,
288 server->smbd_conn->transport_status);
289 seq_printf(m, "\nConn receive_credit_max: %x "
290 "send_credit_target: %x max_send_size: %x",
291 server->smbd_conn->receive_credit_max,
292 server->smbd_conn->send_credit_target,
293 server->smbd_conn->max_send_size);
294 seq_printf(m, "\nConn max_fragmented_recv_size: %x "
295 "max_fragmented_send_size: %x max_receive_size:%x",
296 server->smbd_conn->max_fragmented_recv_size,
297 server->smbd_conn->max_fragmented_send_size,
298 server->smbd_conn->max_receive_size);
299 seq_printf(m, "\nConn keep_alive_interval: %x "
300 "max_readwrite_size: %x rdma_readwrite_threshold: %x",
301 server->smbd_conn->keep_alive_interval,
302 server->smbd_conn->max_readwrite_size,
303 server->smbd_conn->rdma_readwrite_threshold);
304 seq_printf(m, "\nDebug count_get_receive_buffer: %x "
305 "count_put_receive_buffer: %x count_send_empty: %x",
306 server->smbd_conn->count_get_receive_buffer,
307 server->smbd_conn->count_put_receive_buffer,
308 server->smbd_conn->count_send_empty);
309 seq_printf(m, "\nRead Queue count_reassembly_queue: %x "
310 "count_enqueue_reassembly_queue: %x "
311 "count_dequeue_reassembly_queue: %x "
312 "fragment_reassembly_remaining: %x "
313 "reassembly_data_length: %x "
314 "reassembly_queue_length: %x",
315 server->smbd_conn->count_reassembly_queue,
316 server->smbd_conn->count_enqueue_reassembly_queue,
317 server->smbd_conn->count_dequeue_reassembly_queue,
318 server->smbd_conn->fragment_reassembly_remaining,
319 server->smbd_conn->reassembly_data_length,
320 server->smbd_conn->reassembly_queue_length);
321 seq_printf(m, "\nCurrent Credits send_credits: %x "
322 "receive_credits: %x receive_credit_target: %x",
323 atomic_read(&server->smbd_conn->send_credits),
324 atomic_read(&server->smbd_conn->receive_credits),
325 server->smbd_conn->receive_credit_target);
072a14ec
LL
326 seq_printf(m, "\nPending send_pending: %x ",
327 atomic_read(&server->smbd_conn->send_pending));
08a3b969
LL
328 seq_printf(m, "\nReceive buffers count_receive_queue: %x "
329 "count_empty_packet_queue: %x",
330 server->smbd_conn->count_receive_queue,
331 server->smbd_conn->count_empty_packet_queue);
332 seq_printf(m, "\nMR responder_resources: %x "
333 "max_frmr_depth: %x mr_type: %x",
334 server->smbd_conn->responder_resources,
335 server->smbd_conn->max_frmr_depth,
336 server->smbd_conn->mr_type);
337 seq_printf(m, "\nMR mr_ready_count: %x mr_used_count: %x",
338 atomic_read(&server->smbd_conn->mr_ready_count),
339 atomic_read(&server->smbd_conn->mr_used_count));
340skip_rdma:
341#endif
ede2e520
SF
342 seq_printf(m, "\nNumber of credits: %d Dialect 0x%x",
343 server->credits, server->dialect);
26ea888f
SF
344 if (server->compress_algorithm == SMB3_COMPRESS_LZNT1)
345 seq_printf(m, " COMPRESS_LZNT1");
346 else if (server->compress_algorithm == SMB3_COMPRESS_LZ77)
347 seq_printf(m, " COMPRESS_LZ77");
348 else if (server->compress_algorithm == SMB3_COMPRESS_LZ77_HUFF)
349 seq_printf(m, " COMPRESS_LZ77_HUFF");
ede2e520
SF
350 if (server->sign)
351 seq_printf(m, " signed");
fcef0db6
SF
352 if (server->posix_ext_supported)
353 seq_printf(m, " posix");
0fdfef9a 354
1da177e4 355 i++;
14fbf50d 356 list_for_each(tmp2, &server->smb_ses_list) {
96daf2b0 357 ses = list_entry(tmp2, struct cifs_ses,
14fbf50d
JL
358 smb_ses_list);
359 if ((ses->serverDomain == NULL) ||
360 (ses->serverOS == NULL) ||
361 (ses->serverNOS == NULL)) {
9e1a37da 362 seq_printf(m, "\n%d) Name: %s Uses: %d Capability: 0x%x\tSession Status: %d ",
1fa089ec
SF
363 i, ses->serverName, ses->ses_count,
364 ses->capabilities, ses->status);
365 if (ses->session_flags & SMB2_SESSION_FLAG_IS_GUEST)
366 seq_printf(m, "Guest\t");
367 else if (ses->session_flags & SMB2_SESSION_FLAG_IS_NULL)
368 seq_printf(m, "Anonymous\t");
14fbf50d
JL
369 } else {
370 seq_printf(m,
f1987b44
JL
371 "\n%d) Name: %s Domain: %s Uses: %d OS:"
372 " %s\n\tNOS: %s\tCapability: 0x%x\n\tSMB"
9e1a37da 373 " session status: %d ",
b8643e1b 374 i, ses->serverName, ses->serverDomain,
14fbf50d 375 ses->ses_count, ses->serverOS, ses->serverNOS,
221601c3 376 ses->capabilities, ses->status);
14fbf50d 377 }
8e84a61a
K
378
379 seq_printf(m,"Security type: %s\n",
0b0430c6 380 get_security_type_str(server->ops->select_sectype(server, ses->sectype)));
8e84a61a 381
8339dd32
LL
382 if (server->rdma)
383 seq_printf(m, "RDMA\n\t");
9e1a37da 384 seq_printf(m, "TCP status: %d Instance: %d\n\tLocal Users To "
14fbf50d 385 "Server: %d SecMode: 0x%x Req On Wire: %d",
9e1a37da
SF
386 server->tcpStatus,
387 server->reconnect_instance,
388 server->srv_count,
fc40f9cf 389 server->sec_mode, in_flight(server));
131afd0b 390
f984c7b9 391 seq_printf(m, " In Send: %d In MaxReq Wait: %d",
789e6661 392 atomic_read(&server->in_send),
14fbf50d 393 atomic_read(&server->num_waiters));
1ae9a5a5 394
b63a9de0
SF
395 /* dump session id helpful for use with network trace */
396 seq_printf(m, " SessionId: 0x%llx", ses->Suid);
ffd1ef1e
SF
397 if (ses->session_flags & SMB2_SESSION_FLAG_ENCRYPT_DATA)
398 seq_puts(m, " encrypted");
399 if (ses->sign)
400 seq_puts(m, " signed");
131afd0b 401
85150929
AA
402 if (ses->chan_count > 1) {
403 seq_printf(m, "\n\n\tExtra Channels: %zu\n",
404 ses->chan_count-1);
405 for (j = 1; j < ses->chan_count; j++)
406 cifs_dump_channel(m, j, &ses->chans[j]);
407 }
408
f1987b44
JL
409 seq_puts(m, "\n\tShares:");
410 j = 0;
02cf5905
AA
411
412 seq_printf(m, "\n\t%d) IPC: ", j);
413 if (ses->tcon_ipc)
414 cifs_debug_tcon(m, ses->tcon_ipc);
415 else
416 seq_puts(m, "none\n");
417
f1987b44 418 list_for_each(tmp3, &ses->tcon_list) {
96daf2b0 419 tcon = list_entry(tmp3, struct cifs_tcon,
f1987b44
JL
420 tcon_list);
421 ++j;
02cf5905
AA
422 seq_printf(m, "\n\t%d) ", j);
423 cifs_debug_tcon(m, tcon);
f1987b44
JL
424 }
425
426 seq_puts(m, "\n\tMIDs:\n");
1da177e4
LT
427
428 spin_lock(&GlobalMid_Lock);
14fbf50d 429 list_for_each(tmp3, &server->pending_mid_q) {
f1987b44 430 mid_entry = list_entry(tmp3, struct mid_q_entry,
1da177e4 431 qhead);
f1987b44 432 seq_printf(m, "\tState: %d com: %d pid:"
7c9421e1
PS
433 " %d cbdata: %p mid %llu\n",
434 mid_entry->mid_state,
435 le16_to_cpu(mid_entry->command),
436 mid_entry->pid,
437 mid_entry->callback_data,
438 mid_entry->mid);
1da177e4 439 }
221601c3 440 spin_unlock(&GlobalMid_Lock);
bc0fe8b2
AA
441
442 spin_lock(&ses->iface_lock);
115d5d28
SF
443 if (ses->iface_count)
444 seq_printf(m, "\n\tServer interfaces: %zu\n",
445 ses->iface_count);
bc0fe8b2 446 for (j = 0; j < ses->iface_count; j++) {
85150929
AA
447 struct cifs_server_iface *iface;
448
449 iface = &ses->iface_list[j];
35a90807 450 seq_printf(m, "\t%d)", j);
85150929
AA
451 cifs_dump_iface(m, iface);
452 if (is_ses_using_iface(ses, iface))
453 seq_puts(m, "\t\t[CONNECTED]\n");
bc0fe8b2
AA
454 }
455 spin_unlock(&ses->iface_lock);
1da177e4 456 }
1da177e4 457 }
3f9bcca7 458 spin_unlock(&cifs_tcp_ses_lock);
f984c7b9 459 seq_putc(m, '\n');
1da177e4 460
1da177e4 461 /* BB add code to dump additional info such as TCP session info now */
f984c7b9
AD
462 return 0;
463}
1da177e4 464
f984c7b9
AD
465static ssize_t cifs_stats_proc_write(struct file *file,
466 const char __user *buffer, size_t count, loff_t *ppos)
1047abc1 467{
28e2aed2 468 bool bv;
221601c3 469 int rc;
f1987b44
JL
470 struct list_head *tmp1, *tmp2, *tmp3;
471 struct TCP_Server_Info *server;
96daf2b0
SF
472 struct cifs_ses *ses;
473 struct cifs_tcon *tcon;
1047abc1 474
1404297e
KC
475 rc = kstrtobool_from_user(buffer, count, &bv);
476 if (rc == 0) {
4498eed5 477#ifdef CONFIG_CIFS_STATS2
468d6779
SF
478 int i;
479
4498eed5
SF
480 atomic_set(&totBufAllocCount, 0);
481 atomic_set(&totSmBufAllocCount, 0);
482#endif /* CONFIG_CIFS_STATS2 */
2c887635
SF
483 atomic_set(&tcpSesReconnectCount, 0);
484 atomic_set(&tconInfoReconnectCount, 0);
485
c281bc0c
SF
486 spin_lock(&GlobalMid_Lock);
487 GlobalMaxActiveXid = 0;
488 GlobalCurrentXid = 0;
489 spin_unlock(&GlobalMid_Lock);
3f9bcca7 490 spin_lock(&cifs_tcp_ses_lock);
f1987b44
JL
491 list_for_each(tmp1, &cifs_tcp_ses_list) {
492 server = list_entry(tmp1, struct TCP_Server_Info,
493 tcp_ses_list);
1b63f184 494 server->max_in_flight = 0;
468d6779 495#ifdef CONFIG_CIFS_STATS2
433b8dd7
SF
496 for (i = 0; i < NUMBER_OF_SMB2_COMMANDS; i++) {
497 atomic_set(&server->num_cmds[i], 0);
468d6779 498 atomic_set(&server->smb2slowcmd[i], 0);
433b8dd7
SF
499 server->time_per_cmd[i] = 0;
500 server->slowest_cmd[i] = 0;
501 server->fastest_cmd[0] = 0;
502 }
468d6779 503#endif /* CONFIG_CIFS_STATS2 */
c2b3382c 504 list_for_each(tmp2, &server->smb_ses_list) {
96daf2b0 505 ses = list_entry(tmp2, struct cifs_ses,
c2b3382c 506 smb_ses_list);
f1987b44
JL
507 list_for_each(tmp3, &ses->tcon_list) {
508 tcon = list_entry(tmp3,
96daf2b0 509 struct cifs_tcon,
f1987b44
JL
510 tcon_list);
511 atomic_set(&tcon->num_smbs_sent, 0);
c281bc0c
SF
512 spin_lock(&tcon->stat_lock);
513 tcon->bytes_read = 0;
514 tcon->bytes_written = 0;
515 spin_unlock(&tcon->stat_lock);
44c58186
PS
516 if (server->ops->clear_stats)
517 server->ops->clear_stats(tcon);
f1987b44
JL
518 }
519 }
1047abc1 520 }
3f9bcca7 521 spin_unlock(&cifs_tcp_ses_lock);
1404297e
KC
522 } else {
523 return rc;
1047abc1
SF
524 }
525
221601c3 526 return count;
1047abc1
SF
527}
528
f984c7b9 529static int cifs_stats_proc_show(struct seq_file *m, void *v)
1da177e4 530{
f984c7b9 531 int i;
468d6779
SF
532#ifdef CONFIG_CIFS_STATS2
533 int j;
534#endif /* STATS2 */
f1987b44
JL
535 struct list_head *tmp1, *tmp2, *tmp3;
536 struct TCP_Server_Info *server;
96daf2b0
SF
537 struct cifs_ses *ses;
538 struct cifs_tcon *tcon;
1da177e4 539
468d6779 540 seq_printf(m, "Resources in use\nCIFS Session: %d\n",
1da177e4 541 sesInfoAllocCount.counter);
f984c7b9 542 seq_printf(m, "Share (unique mount targets): %d\n",
1da177e4 543 tconInfoAllocCount.counter);
f984c7b9 544 seq_printf(m, "SMB Request/Response Buffer: %d Pool size: %d\n",
b8643e1b
SF
545 bufAllocCount.counter,
546 cifs_min_rcv + tcpSesAllocCount.counter);
f984c7b9 547 seq_printf(m, "SMB Small Req/Resp Buffer: %d Pool size: %d\n",
221601c3 548 smBufAllocCount.counter, cifs_min_small);
07475ffb 549#ifdef CONFIG_CIFS_STATS2
f984c7b9 550 seq_printf(m, "Total Large %d Small %d Allocations\n",
07475ffb 551 atomic_read(&totBufAllocCount),
221601c3 552 atomic_read(&totSmBufAllocCount));
07475ffb
SF
553#endif /* CONFIG_CIFS_STATS2 */
554
8097531a 555 seq_printf(m, "Operations (MIDs): %d\n", atomic_read(&midCount));
f984c7b9 556 seq_printf(m,
1da177e4 557 "\n%d session %d share reconnects\n",
221601c3 558 tcpSesReconnectCount.counter, tconInfoReconnectCount.counter);
1da177e4 559
f984c7b9 560 seq_printf(m,
1da177e4 561 "Total vfs operations: %d maximum at one time: %d\n",
221601c3 562 GlobalCurrentXid, GlobalMaxActiveXid);
1da177e4
LT
563
564 i = 0;
3f9bcca7 565 spin_lock(&cifs_tcp_ses_lock);
f1987b44
JL
566 list_for_each(tmp1, &cifs_tcp_ses_list) {
567 server = list_entry(tmp1, struct TCP_Server_Info,
568 tcp_ses_list);
1b63f184 569 seq_printf(m, "\nMax requests in flight: %d", server->max_in_flight);
468d6779 570#ifdef CONFIG_CIFS_STATS2
433b8dd7
SF
571 seq_puts(m, "\nTotal time spent processing by command. Time ");
572 seq_printf(m, "units are jiffies (%d per second)\n", HZ);
573 seq_puts(m, " SMB3 CMD\tNumber\tTotal Time\tFastest\tSlowest\n");
574 seq_puts(m, " --------\t------\t----------\t-------\t-------\n");
575 for (j = 0; j < NUMBER_OF_SMB2_COMMANDS; j++)
576 seq_printf(m, " %d\t\t%d\t%llu\t\t%u\t%u\n", j,
577 atomic_read(&server->num_cmds[j]),
578 server->time_per_cmd[j],
579 server->fastest_cmd[j],
580 server->slowest_cmd[j]);
468d6779
SF
581 for (j = 0; j < NUMBER_OF_SMB2_COMMANDS; j++)
582 if (atomic_read(&server->smb2slowcmd[j]))
433b8dd7 583 seq_printf(m, " %d slow responses from %s for command %d\n",
468d6779
SF
584 atomic_read(&server->smb2slowcmd[j]),
585 server->hostname, j);
586#endif /* STATS2 */
f1987b44 587 list_for_each(tmp2, &server->smb_ses_list) {
96daf2b0 588 ses = list_entry(tmp2, struct cifs_ses,
f1987b44
JL
589 smb_ses_list);
590 list_for_each(tmp3, &ses->tcon_list) {
591 tcon = list_entry(tmp3,
96daf2b0 592 struct cifs_tcon,
f1987b44
JL
593 tcon_list);
594 i++;
595 seq_printf(m, "\n%d) %s", i, tcon->treeName);
596 if (tcon->need_reconnect)
597 seq_puts(m, "\tDISCONNECTED ");
44c58186
PS
598 seq_printf(m, "\nSMBs: %d",
599 atomic_read(&tcon->num_smbs_sent));
600 if (server->ops->print_stats)
601 server->ops->print_stats(m, tcon);
f1987b44
JL
602 }
603 }
1da177e4 604 }
3f9bcca7 605 spin_unlock(&cifs_tcp_ses_lock);
1da177e4 606
f984c7b9
AD
607 seq_putc(m, '\n');
608 return 0;
609}
221601c3 610
f984c7b9
AD
611static int cifs_stats_proc_open(struct inode *inode, struct file *file)
612{
613 return single_open(file, cifs_stats_proc_show, NULL);
1da177e4 614}
f984c7b9 615
97a32539
AD
616static const struct proc_ops cifs_stats_proc_ops = {
617 .proc_open = cifs_stats_proc_open,
618 .proc_read = seq_read,
619 .proc_lseek = seq_lseek,
620 .proc_release = single_release,
621 .proc_write = cifs_stats_proc_write,
f984c7b9 622};
1da177e4 623
d8ec913b
LL
624#ifdef CONFIG_CIFS_SMB_DIRECT
625#define PROC_FILE_DEFINE(name) \
626static ssize_t name##_write(struct file *file, const char __user *buffer, \
627 size_t count, loff_t *ppos) \
628{ \
629 int rc; \
630 rc = kstrtoint_from_user(buffer, count, 10, & name); \
631 if (rc) \
632 return rc; \
633 return count; \
634} \
635static int name##_proc_show(struct seq_file *m, void *v) \
636{ \
637 seq_printf(m, "%d\n", name ); \
638 return 0; \
639} \
640static int name##_open(struct inode *inode, struct file *file) \
641{ \
642 return single_open(file, name##_proc_show, NULL); \
643} \
644\
97a32539
AD
645static const struct proc_ops cifs_##name##_proc_fops = { \
646 .proc_open = name##_open, \
647 .proc_read = seq_read, \
648 .proc_lseek = seq_lseek, \
649 .proc_release = single_release, \
650 .proc_write = name##_write, \
d8ec913b
LL
651}
652
d8ec913b
LL
653PROC_FILE_DEFINE(rdma_readwrite_threshold);
654PROC_FILE_DEFINE(smbd_max_frmr_depth);
655PROC_FILE_DEFINE(smbd_keep_alive_interval);
656PROC_FILE_DEFINE(smbd_max_receive_size);
657PROC_FILE_DEFINE(smbd_max_fragmented_recv_size);
658PROC_FILE_DEFINE(smbd_max_send_size);
659PROC_FILE_DEFINE(smbd_send_credit_target);
660PROC_FILE_DEFINE(smbd_receive_credit_max);
661#endif
662
1da177e4 663static struct proc_dir_entry *proc_fs_cifs;
97a32539
AD
664static const struct proc_ops cifsFYI_proc_ops;
665static const struct proc_ops cifs_lookup_cache_proc_ops;
666static const struct proc_ops traceSMB_proc_ops;
667static const struct proc_ops cifs_security_flags_proc_ops;
668static const struct proc_ops cifs_linux_ext_proc_ops;
1da177e4
LT
669
670void
671cifs_proc_init(void)
672{
36a5aeb8 673 proc_fs_cifs = proc_mkdir("fs/cifs", NULL);
1da177e4
LT
674 if (proc_fs_cifs == NULL)
675 return;
676
3f3942ac
CH
677 proc_create_single("DebugData", 0, proc_fs_cifs,
678 cifs_debug_data_proc_show);
1da177e4 679
dfe33f9a
SF
680 proc_create_single("open_files", 0400, proc_fs_cifs,
681 cifs_debug_files_proc_show);
682
97a32539
AD
683 proc_create("Stats", 0644, proc_fs_cifs, &cifs_stats_proc_ops);
684 proc_create("cifsFYI", 0644, proc_fs_cifs, &cifsFYI_proc_ops);
685 proc_create("traceSMB", 0644, proc_fs_cifs, &traceSMB_proc_ops);
6539e7f3 686 proc_create("LinuxExtensionsEnabled", 0644, proc_fs_cifs,
97a32539 687 &cifs_linux_ext_proc_ops);
6539e7f3 688 proc_create("SecurityFlags", 0644, proc_fs_cifs,
97a32539 689 &cifs_security_flags_proc_ops);
6539e7f3 690 proc_create("LookupCacheEnabled", 0644, proc_fs_cifs,
97a32539 691 &cifs_lookup_cache_proc_ops);
54be1f6c
PA
692
693#ifdef CONFIG_CIFS_DFS_UPCALL
97a32539 694 proc_create("dfscache", 0644, proc_fs_cifs, &dfscache_proc_ops);
54be1f6c
PA
695#endif
696
d8ec913b 697#ifdef CONFIG_CIFS_SMB_DIRECT
6539e7f3 698 proc_create("rdma_readwrite_threshold", 0644, proc_fs_cifs,
d8ec913b 699 &cifs_rdma_readwrite_threshold_proc_fops);
6539e7f3 700 proc_create("smbd_max_frmr_depth", 0644, proc_fs_cifs,
d8ec913b 701 &cifs_smbd_max_frmr_depth_proc_fops);
6539e7f3 702 proc_create("smbd_keep_alive_interval", 0644, proc_fs_cifs,
d8ec913b 703 &cifs_smbd_keep_alive_interval_proc_fops);
6539e7f3 704 proc_create("smbd_max_receive_size", 0644, proc_fs_cifs,
d8ec913b 705 &cifs_smbd_max_receive_size_proc_fops);
6539e7f3 706 proc_create("smbd_max_fragmented_recv_size", 0644, proc_fs_cifs,
d8ec913b 707 &cifs_smbd_max_fragmented_recv_size_proc_fops);
6539e7f3 708 proc_create("smbd_max_send_size", 0644, proc_fs_cifs,
d8ec913b 709 &cifs_smbd_max_send_size_proc_fops);
6539e7f3 710 proc_create("smbd_send_credit_target", 0644, proc_fs_cifs,
d8ec913b 711 &cifs_smbd_send_credit_target_proc_fops);
6539e7f3 712 proc_create("smbd_receive_credit_max", 0644, proc_fs_cifs,
d8ec913b
LL
713 &cifs_smbd_receive_credit_max_proc_fops);
714#endif
1da177e4
LT
715}
716
717void
718cifs_proc_clean(void)
719{
720 if (proc_fs_cifs == NULL)
721 return;
722
723 remove_proc_entry("DebugData", proc_fs_cifs);
dfe33f9a 724 remove_proc_entry("open_files", proc_fs_cifs);
1da177e4
LT
725 remove_proc_entry("cifsFYI", proc_fs_cifs);
726 remove_proc_entry("traceSMB", proc_fs_cifs);
1da177e4 727 remove_proc_entry("Stats", proc_fs_cifs);
221601c3 728 remove_proc_entry("SecurityFlags", proc_fs_cifs);
221601c3 729 remove_proc_entry("LinuxExtensionsEnabled", proc_fs_cifs);
221601c3 730 remove_proc_entry("LookupCacheEnabled", proc_fs_cifs);
54be1f6c
PA
731
732#ifdef CONFIG_CIFS_DFS_UPCALL
733 remove_proc_entry("dfscache", proc_fs_cifs);
734#endif
d8ec913b
LL
735#ifdef CONFIG_CIFS_SMB_DIRECT
736 remove_proc_entry("rdma_readwrite_threshold", proc_fs_cifs);
737 remove_proc_entry("smbd_max_frmr_depth", proc_fs_cifs);
738 remove_proc_entry("smbd_keep_alive_interval", proc_fs_cifs);
739 remove_proc_entry("smbd_max_receive_size", proc_fs_cifs);
740 remove_proc_entry("smbd_max_fragmented_recv_size", proc_fs_cifs);
741 remove_proc_entry("smbd_max_send_size", proc_fs_cifs);
742 remove_proc_entry("smbd_send_credit_target", proc_fs_cifs);
743 remove_proc_entry("smbd_receive_credit_max", proc_fs_cifs);
744#endif
36a5aeb8 745 remove_proc_entry("fs/cifs", NULL);
1da177e4
LT
746}
747
f984c7b9 748static int cifsFYI_proc_show(struct seq_file *m, void *v)
1da177e4 749{
f984c7b9
AD
750 seq_printf(m, "%d\n", cifsFYI);
751 return 0;
752}
1da177e4 753
f984c7b9
AD
754static int cifsFYI_proc_open(struct inode *inode, struct file *file)
755{
756 return single_open(file, cifsFYI_proc_show, NULL);
1da177e4 757}
f984c7b9
AD
758
759static ssize_t cifsFYI_proc_write(struct file *file, const char __user *buffer,
760 size_t count, loff_t *ppos)
1da177e4 761{
1404297e 762 char c[2] = { '\0' };
28e2aed2 763 bool bv;
1da177e4
LT
764 int rc;
765
1404297e 766 rc = get_user(c[0], buffer);
1da177e4
LT
767 if (rc)
768 return rc;
1404297e 769 if (strtobool(c, &bv) == 0)
28e2aed2 770 cifsFYI = bv;
1404297e
KC
771 else if ((c[0] > '1') && (c[0] <= '9'))
772 cifsFYI = (int) (c[0] - '0'); /* see cifs_debug.h for meanings */
25ad1cbd
RS
773 else
774 return -EINVAL;
1da177e4
LT
775
776 return count;
777}
778
97a32539
AD
779static const struct proc_ops cifsFYI_proc_ops = {
780 .proc_open = cifsFYI_proc_open,
781 .proc_read = seq_read,
782 .proc_lseek = seq_lseek,
783 .proc_release = single_release,
784 .proc_write = cifsFYI_proc_write,
f984c7b9 785};
1da177e4 786
f984c7b9
AD
787static int cifs_linux_ext_proc_show(struct seq_file *m, void *v)
788{
789 seq_printf(m, "%d\n", linuxExtEnabled);
790 return 0;
791}
1da177e4 792
f984c7b9
AD
793static int cifs_linux_ext_proc_open(struct inode *inode, struct file *file)
794{
795 return single_open(file, cifs_linux_ext_proc_show, NULL);
1da177e4 796}
f984c7b9
AD
797
798static ssize_t cifs_linux_ext_proc_write(struct file *file,
799 const char __user *buffer, size_t count, loff_t *ppos)
1da177e4 800{
221601c3
SF
801 int rc;
802
1404297e 803 rc = kstrtobool_from_user(buffer, count, &linuxExtEnabled);
221601c3
SF
804 if (rc)
805 return rc;
28e2aed2 806
221601c3 807 return count;
1da177e4
LT
808}
809
97a32539
AD
810static const struct proc_ops cifs_linux_ext_proc_ops = {
811 .proc_open = cifs_linux_ext_proc_open,
812 .proc_read = seq_read,
813 .proc_lseek = seq_lseek,
814 .proc_release = single_release,
815 .proc_write = cifs_linux_ext_proc_write,
f984c7b9 816};
1da177e4 817
f984c7b9 818static int cifs_lookup_cache_proc_show(struct seq_file *m, void *v)
1da177e4 819{
f984c7b9
AD
820 seq_printf(m, "%d\n", lookupCacheEnabled);
821 return 0;
822}
1da177e4 823
f984c7b9
AD
824static int cifs_lookup_cache_proc_open(struct inode *inode, struct file *file)
825{
826 return single_open(file, cifs_lookup_cache_proc_show, NULL);
1da177e4 827}
f984c7b9
AD
828
829static ssize_t cifs_lookup_cache_proc_write(struct file *file,
830 const char __user *buffer, size_t count, loff_t *ppos)
1da177e4 831{
1da177e4
LT
832 int rc;
833
1404297e 834 rc = kstrtobool_from_user(buffer, count, &lookupCacheEnabled);
1da177e4
LT
835 if (rc)
836 return rc;
28e2aed2 837
1da177e4
LT
838 return count;
839}
1da177e4 840
97a32539
AD
841static const struct proc_ops cifs_lookup_cache_proc_ops = {
842 .proc_open = cifs_lookup_cache_proc_open,
843 .proc_read = seq_read,
844 .proc_lseek = seq_lseek,
845 .proc_release = single_release,
846 .proc_write = cifs_lookup_cache_proc_write,
f984c7b9 847};
1da177e4 848
f984c7b9
AD
849static int traceSMB_proc_show(struct seq_file *m, void *v)
850{
851 seq_printf(m, "%d\n", traceSMB);
852 return 0;
853}
1da177e4 854
f984c7b9
AD
855static int traceSMB_proc_open(struct inode *inode, struct file *file)
856{
857 return single_open(file, traceSMB_proc_show, NULL);
1da177e4 858}
f984c7b9
AD
859
860static ssize_t traceSMB_proc_write(struct file *file, const char __user *buffer,
861 size_t count, loff_t *ppos)
1da177e4 862{
1da177e4
LT
863 int rc;
864
1404297e 865 rc = kstrtobool_from_user(buffer, count, &traceSMB);
1da177e4
LT
866 if (rc)
867 return rc;
28e2aed2 868
1da177e4
LT
869 return count;
870}
871
97a32539
AD
872static const struct proc_ops traceSMB_proc_ops = {
873 .proc_open = traceSMB_proc_open,
874 .proc_read = seq_read,
875 .proc_lseek = seq_lseek,
876 .proc_release = single_release,
877 .proc_write = traceSMB_proc_write,
f984c7b9 878};
1da177e4 879
f984c7b9
AD
880static int cifs_security_flags_proc_show(struct seq_file *m, void *v)
881{
04912d6a 882 seq_printf(m, "0x%x\n", global_secflags);
f984c7b9
AD
883 return 0;
884}
1da177e4 885
f984c7b9
AD
886static int cifs_security_flags_proc_open(struct inode *inode, struct file *file)
887{
888 return single_open(file, cifs_security_flags_proc_show, NULL);
1da177e4 889}
f984c7b9 890
52dfb446
JL
891/*
892 * Ensure that if someone sets a MUST flag, that we disable all other MAY
893 * flags except for the ones corresponding to the given MUST flag. If there are
894 * multiple MUST flags, then try to prefer more secure ones.
895 */
896static void
897cifs_security_flags_handle_must_flags(unsigned int *flags)
898{
899 unsigned int signflags = *flags & CIFSSEC_MUST_SIGN;
900
901 if ((*flags & CIFSSEC_MUST_KRB5) == CIFSSEC_MUST_KRB5)
902 *flags = CIFSSEC_MUST_KRB5;
903 else if ((*flags & CIFSSEC_MUST_NTLMSSP) == CIFSSEC_MUST_NTLMSSP)
904 *flags = CIFSSEC_MUST_NTLMSSP;
905 else if ((*flags & CIFSSEC_MUST_NTLMV2) == CIFSSEC_MUST_NTLMV2)
906 *flags = CIFSSEC_MUST_NTLMV2;
907 else if ((*flags & CIFSSEC_MUST_NTLM) == CIFSSEC_MUST_NTLM)
908 *flags = CIFSSEC_MUST_NTLM;
7a1ceba0
NC
909 else if (CIFSSEC_MUST_LANMAN &&
910 (*flags & CIFSSEC_MUST_LANMAN) == CIFSSEC_MUST_LANMAN)
52dfb446 911 *flags = CIFSSEC_MUST_LANMAN;
7a1ceba0
NC
912 else if (CIFSSEC_MUST_PLNTXT &&
913 (*flags & CIFSSEC_MUST_PLNTXT) == CIFSSEC_MUST_PLNTXT)
52dfb446
JL
914 *flags = CIFSSEC_MUST_PLNTXT;
915
916 *flags |= signflags;
917}
918
f984c7b9
AD
919static ssize_t cifs_security_flags_proc_write(struct file *file,
920 const char __user *buffer, size_t count, loff_t *ppos)
1da177e4 921{
7715dad8 922 int rc;
bdc4bf6e
SF
923 unsigned int flags;
924 char flags_string[12];
28e2aed2 925 bool bv;
bdc4bf6e 926
221601c3 927 if ((count < 1) || (count > 11))
3979877e 928 return -EINVAL;
1da177e4 929
bdc4bf6e 930 memset(flags_string, 0, 12);
3979877e 931
221601c3 932 if (copy_from_user(flags_string, buffer, count))
bdc4bf6e 933 return -EFAULT;
3979877e 934
221601c3 935 if (count < 3) {
bdc4bf6e 936 /* single char or single char followed by null */
1404297e 937 if (strtobool(flags_string, &bv) == 0) {
28e2aed2 938 global_secflags = bv ? CIFSSEC_MAX : CIFSSEC_DEF;
a013689d 939 return count;
1404297e 940 } else if (!isdigit(flags_string[0])) {
7715dad8
JL
941 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n",
942 flags_string);
a013689d
SF
943 return -EINVAL;
944 }
bdc4bf6e 945 }
bdc4bf6e 946
7715dad8
JL
947 /* else we have a number */
948 rc = kstrtouint(flags_string, 0, &flags);
949 if (rc) {
950 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n",
951 flags_string);
952 return rc;
953 }
bdc4bf6e 954
f96637be 955 cifs_dbg(FYI, "sec flags 0x%x\n", flags);
bdc4bf6e 956
7715dad8
JL
957 if (flags == 0) {
958 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string);
bdc4bf6e
SF
959 return -EINVAL;
960 }
1da177e4 961
221601c3 962 if (flags & ~CIFSSEC_MASK) {
7715dad8 963 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n",
f96637be 964 flags & ~CIFSSEC_MASK);
bdc4bf6e
SF
965 return -EINVAL;
966 }
7715dad8 967
52dfb446
JL
968 cifs_security_flags_handle_must_flags(&flags);
969
bdc4bf6e 970 /* flags look ok - update the global security flags for cifs module */
04912d6a
JL
971 global_secflags = flags;
972 if (global_secflags & CIFSSEC_MUST_SIGN) {
762e5ab7 973 /* requiring signing implies signing is allowed */
04912d6a 974 global_secflags |= CIFSSEC_MAY_SIGN;
f96637be 975 cifs_dbg(FYI, "packet signing now required\n");
04912d6a 976 } else if ((global_secflags & CIFSSEC_MAY_SIGN) == 0) {
f96637be 977 cifs_dbg(FYI, "packet signing disabled\n");
762e5ab7
SF
978 }
979 /* BB should we turn on MAY flags for other MUST options? */
1da177e4
LT
980 return count;
981}
f984c7b9 982
97a32539
AD
983static const struct proc_ops cifs_security_flags_proc_ops = {
984 .proc_open = cifs_security_flags_proc_open,
985 .proc_read = seq_read,
986 .proc_lseek = seq_lseek,
987 .proc_release = single_release,
988 .proc_write = cifs_security_flags_proc_write,
f984c7b9 989};
90c81e0b 990#else
e086fcea 991inline void cifs_proc_init(void)
90c81e0b
SF
992{
993}
994
e086fcea 995inline void cifs_proc_clean(void)
90c81e0b
SF
996{
997}
998#endif /* PROC_FS */