drm: nest modeset locks within fpriv->fbs_lock
[deliverable/linux.git] / fs / cifs / cifs_debug.c
CommitLineData
1da177e4
LT
1/*
2 * fs/cifs_debug.c
3 *
b8643e1b 4 * Copyright (C) International Business Machines Corp., 2000,2005
1da177e4
LT
5 *
6 * Modified by Steve French (sfrench@us.ibm.com)
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
221601c3 10 * the Free Software Foundation; either version 2 of the License, or
1da177e4 11 * (at your option) any later version.
221601c3 12 *
1da177e4
LT
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
16 * the GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
221601c3 19 * along with this program; if not, write to the Free Software
1da177e4
LT
20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21 */
22#include <linux/fs.h>
23#include <linux/string.h>
24#include <linux/ctype.h>
25#include <linux/module.h>
26#include <linux/proc_fs.h>
27#include <asm/uaccess.h>
28#include "cifspdu.h"
29#include "cifsglob.h"
30#include "cifsproto.h"
31#include "cifs_debug.h"
6c91d362 32#include "cifsfs.h"
1da177e4
LT
33
34void
35cifs_dump_mem(char *label, void *data, int length)
36{
37 int i, j;
38 int *intptr = data;
39 char *charptr = data;
40 char buf[10], line[80];
41
221601c3 42 printk(KERN_DEBUG "%s: dump of %d bytes of data at 0x%p\n",
1da177e4
LT
43 label, length, data);
44 for (i = 0; i < length; i += 16) {
45 line[0] = 0;
46 for (j = 0; (j < 4) && (i + j * 4 < length); j++) {
47 sprintf(buf, " %08x", intptr[i / 4 + j]);
48 strcat(line, buf);
49 }
50 buf[0] = ' ';
51 buf[2] = 0;
52 for (j = 0; (j < 16) && (i + j < length); j++) {
53 buf[1] = isprint(charptr[i + j]) ? charptr[i + j] : '.';
54 strcat(line, buf);
55 }
56 printk(KERN_DEBUG "%s\n", line);
57 }
58}
59
d4e4854f 60void cifs_dump_detail(void *buf)
3979877e 61{
8aa26f3e 62#ifdef CONFIG_CIFS_DEBUG2
d4e4854f
PS
63 struct smb_hdr *smb = (struct smb_hdr *)buf;
64
b6b38f70 65 cERROR(1, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d",
3979877e 66 smb->Command, smb->Status.CifsError,
b6b38f70 67 smb->Flags, smb->Flags2, smb->Mid, smb->Pid);
093b2bda 68 cERROR(1, "smb buf %p len %u", smb, smbCalcSize(smb));
8aa26f3e 69#endif /* CONFIG_CIFS_DEBUG2 */
3979877e
SF
70}
71
ffdd6e4d 72void cifs_dump_mids(struct TCP_Server_Info *server)
3979877e 73{
8aa26f3e 74#ifdef CONFIG_CIFS_DEBUG2
3979877e 75 struct list_head *tmp;
ffdd6e4d 76 struct mid_q_entry *mid_entry;
3979877e 77
221601c3 78 if (server == NULL)
3979877e
SF
79 return;
80
b6b38f70 81 cERROR(1, "Dump pending requests:");
3979877e
SF
82 spin_lock(&GlobalMid_Lock);
83 list_for_each(tmp, &server->pending_mid_q) {
84 mid_entry = list_entry(tmp, struct mid_q_entry, qhead);
7c9421e1
PS
85 cERROR(1, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu",
86 mid_entry->mid_state,
87 le16_to_cpu(mid_entry->command),
ad8b15f0 88 mid_entry->pid,
2b84a36c 89 mid_entry->callback_data,
b6b38f70 90 mid_entry->mid);
3979877e 91#ifdef CONFIG_CIFS_STATS2
b6b38f70 92 cERROR(1, "IsLarge: %d buf: %p time rcv: %ld now: %ld",
7c9421e1 93 mid_entry->large_buf,
ad8b15f0
SF
94 mid_entry->resp_buf,
95 mid_entry->when_received,
b6b38f70 96 jiffies);
3979877e 97#endif /* STATS2 */
b6b38f70
JP
98 cERROR(1, "IsMult: %d IsEnd: %d", mid_entry->multiRsp,
99 mid_entry->multiEnd);
ad8b15f0
SF
100 if (mid_entry->resp_buf) {
101 cifs_dump_detail(mid_entry->resp_buf);
102 cifs_dump_mem("existing buf: ",
103 mid_entry->resp_buf, 62);
3979877e
SF
104 }
105 }
106 spin_unlock(&GlobalMid_Lock);
3979877e 107#endif /* CONFIG_CIFS_DEBUG2 */
8aa26f3e 108}
3979877e 109
1da177e4 110#ifdef CONFIG_PROC_FS
f984c7b9 111static int cifs_debug_data_proc_show(struct seq_file *m, void *v)
1da177e4 112{
f1987b44 113 struct list_head *tmp1, *tmp2, *tmp3;
ffdd6e4d 114 struct mid_q_entry *mid_entry;
14fbf50d 115 struct TCP_Server_Info *server;
96daf2b0
SF
116 struct cifs_ses *ses;
117 struct cifs_tcon *tcon;
f1987b44
JL
118 int i, j;
119 __u32 dev_type;
1da177e4 120
f984c7b9 121 seq_puts(m,
1da177e4
LT
122 "Display Internal CIFS Data Structures for Debugging\n"
123 "---------------------------------------------------\n");
f984c7b9 124 seq_printf(m, "CIFS Version %s\n", CIFS_VERSION);
ca40b714 125 seq_printf(m, "Features:");
f579903e 126#ifdef CONFIG_CIFS_DFS_UPCALL
ca40b714 127 seq_printf(m, " dfs");
f579903e
SJ
128#endif
129#ifdef CONFIG_CIFS_FSCACHE
ca40b714 130 seq_printf(m, " fscache");
f579903e
SJ
131#endif
132#ifdef CONFIG_CIFS_WEAK_PW_HASH
ca40b714 133 seq_printf(m, " lanman");
f579903e
SJ
134#endif
135#ifdef CONFIG_CIFS_POSIX
ca40b714 136 seq_printf(m, " posix");
f579903e
SJ
137#endif
138#ifdef CONFIG_CIFS_UPCALL
ca40b714 139 seq_printf(m, " spnego");
f579903e
SJ
140#endif
141#ifdef CONFIG_CIFS_XATTR
ca40b714
JL
142 seq_printf(m, " xattr");
143#endif
144#ifdef CONFIG_CIFS_ACL
145 seq_printf(m, " acl");
f579903e
SJ
146#endif
147 seq_putc(m, '\n');
f984c7b9
AD
148 seq_printf(m, "Active VFS Requests: %d\n", GlobalTotalActiveXid);
149 seq_printf(m, "Servers:");
1da177e4
LT
150
151 i = 0;
3f9bcca7 152 spin_lock(&cifs_tcp_ses_lock);
f1987b44
JL
153 list_for_each(tmp1, &cifs_tcp_ses_list) {
154 server = list_entry(tmp1, struct TCP_Server_Info,
14fbf50d 155 tcp_ses_list);
1da177e4 156 i++;
14fbf50d 157 list_for_each(tmp2, &server->smb_ses_list) {
96daf2b0 158 ses = list_entry(tmp2, struct cifs_ses,
14fbf50d
JL
159 smb_ses_list);
160 if ((ses->serverDomain == NULL) ||
161 (ses->serverOS == NULL) ||
162 (ses->serverNOS == NULL)) {
f1987b44
JL
163 seq_printf(m, "\n%d) entry for %s not fully "
164 "displayed\n\t", i, ses->serverName);
14fbf50d
JL
165 } else {
166 seq_printf(m,
f1987b44
JL
167 "\n%d) Name: %s Domain: %s Uses: %d OS:"
168 " %s\n\tNOS: %s\tCapability: 0x%x\n\tSMB"
221601c3 169 " session status: %d\t",
b8643e1b 170 i, ses->serverName, ses->serverDomain,
14fbf50d 171 ses->ses_count, ses->serverOS, ses->serverNOS,
221601c3 172 ses->capabilities, ses->status);
14fbf50d 173 }
f984c7b9 174 seq_printf(m, "TCP status: %d\n\tLocal Users To "
14fbf50d
JL
175 "Server: %d SecMode: 0x%x Req On Wire: %d",
176 server->tcpStatus, server->srv_count,
fc40f9cf 177 server->sec_mode, in_flight(server));
131afd0b
SF
178
179#ifdef CONFIG_CIFS_STATS2
f984c7b9 180 seq_printf(m, " In Send: %d In MaxReq Wait: %d",
789e6661 181 atomic_read(&server->in_send),
14fbf50d 182 atomic_read(&server->num_waiters));
131afd0b
SF
183#endif
184
f1987b44
JL
185 seq_puts(m, "\n\tShares:");
186 j = 0;
187 list_for_each(tmp3, &ses->tcon_list) {
96daf2b0 188 tcon = list_entry(tmp3, struct cifs_tcon,
f1987b44
JL
189 tcon_list);
190 ++j;
191 dev_type = le32_to_cpu(tcon->fsDevInfo.DeviceType);
192 seq_printf(m, "\n\t%d) %s Mounts: %d ", j,
193 tcon->treeName, tcon->tc_count);
194 if (tcon->nativeFileSystem) {
195 seq_printf(m, "Type: %s ",
196 tcon->nativeFileSystem);
197 }
198 seq_printf(m, "DevInfo: 0x%x Attributes: 0x%x"
199 "\nPathComponentMax: %d Status: 0x%d",
200 le32_to_cpu(tcon->fsDevInfo.DeviceCharacteristics),
201 le32_to_cpu(tcon->fsAttrInfo.Attributes),
202 le32_to_cpu(tcon->fsAttrInfo.MaxPathNameComponentLength),
203 tcon->tidStatus);
204 if (dev_type == FILE_DEVICE_DISK)
205 seq_puts(m, " type: DISK ");
206 else if (dev_type == FILE_DEVICE_CD_ROM)
207 seq_puts(m, " type: CDROM ");
208 else
209 seq_printf(m, " type: %d ", dev_type);
210
211 if (tcon->need_reconnect)
212 seq_puts(m, "\tDISCONNECTED ");
213 seq_putc(m, '\n');
214 }
215
216 seq_puts(m, "\n\tMIDs:\n");
1da177e4
LT
217
218 spin_lock(&GlobalMid_Lock);
14fbf50d 219 list_for_each(tmp3, &server->pending_mid_q) {
f1987b44 220 mid_entry = list_entry(tmp3, struct mid_q_entry,
1da177e4 221 qhead);
f1987b44 222 seq_printf(m, "\tState: %d com: %d pid:"
7c9421e1
PS
223 " %d cbdata: %p mid %llu\n",
224 mid_entry->mid_state,
225 le16_to_cpu(mid_entry->command),
226 mid_entry->pid,
227 mid_entry->callback_data,
228 mid_entry->mid);
1da177e4 229 }
221601c3 230 spin_unlock(&GlobalMid_Lock);
1da177e4 231 }
1da177e4 232 }
3f9bcca7 233 spin_unlock(&cifs_tcp_ses_lock);
f984c7b9 234 seq_putc(m, '\n');
1da177e4 235
1da177e4 236 /* BB add code to dump additional info such as TCP session info now */
f984c7b9
AD
237 return 0;
238}
1da177e4 239
f984c7b9
AD
240static int cifs_debug_data_proc_open(struct inode *inode, struct file *file)
241{
242 return single_open(file, cifs_debug_data_proc_show, NULL);
1da177e4
LT
243}
244
f984c7b9
AD
245static const struct file_operations cifs_debug_data_proc_fops = {
246 .owner = THIS_MODULE,
247 .open = cifs_debug_data_proc_open,
248 .read = seq_read,
249 .llseek = seq_lseek,
250 .release = single_release,
251};
1047abc1 252
f984c7b9
AD
253#ifdef CONFIG_CIFS_STATS
254static ssize_t cifs_stats_proc_write(struct file *file,
255 const char __user *buffer, size_t count, loff_t *ppos)
1047abc1 256{
221601c3
SF
257 char c;
258 int rc;
f1987b44
JL
259 struct list_head *tmp1, *tmp2, *tmp3;
260 struct TCP_Server_Info *server;
96daf2b0
SF
261 struct cifs_ses *ses;
262 struct cifs_tcon *tcon;
1047abc1 263
221601c3
SF
264 rc = get_user(c, buffer);
265 if (rc)
266 return rc;
1047abc1 267
221601c3 268 if (c == '1' || c == 'y' || c == 'Y' || c == '0') {
4498eed5
SF
269#ifdef CONFIG_CIFS_STATS2
270 atomic_set(&totBufAllocCount, 0);
271 atomic_set(&totSmBufAllocCount, 0);
272#endif /* CONFIG_CIFS_STATS2 */
3f9bcca7 273 spin_lock(&cifs_tcp_ses_lock);
f1987b44
JL
274 list_for_each(tmp1, &cifs_tcp_ses_list) {
275 server = list_entry(tmp1, struct TCP_Server_Info,
276 tcp_ses_list);
c2b3382c 277 list_for_each(tmp2, &server->smb_ses_list) {
96daf2b0 278 ses = list_entry(tmp2, struct cifs_ses,
c2b3382c 279 smb_ses_list);
f1987b44
JL
280 list_for_each(tmp3, &ses->tcon_list) {
281 tcon = list_entry(tmp3,
96daf2b0 282 struct cifs_tcon,
f1987b44
JL
283 tcon_list);
284 atomic_set(&tcon->num_smbs_sent, 0);
44c58186
PS
285 if (server->ops->clear_stats)
286 server->ops->clear_stats(tcon);
f1987b44
JL
287 }
288 }
1047abc1 289 }
3f9bcca7 290 spin_unlock(&cifs_tcp_ses_lock);
1047abc1
SF
291 }
292
221601c3 293 return count;
1047abc1
SF
294}
295
f984c7b9 296static int cifs_stats_proc_show(struct seq_file *m, void *v)
1da177e4 297{
f984c7b9 298 int i;
f1987b44
JL
299 struct list_head *tmp1, *tmp2, *tmp3;
300 struct TCP_Server_Info *server;
96daf2b0
SF
301 struct cifs_ses *ses;
302 struct cifs_tcon *tcon;
1da177e4 303
f984c7b9 304 seq_printf(m,
1da177e4
LT
305 "Resources in use\nCIFS Session: %d\n",
306 sesInfoAllocCount.counter);
f984c7b9 307 seq_printf(m, "Share (unique mount targets): %d\n",
1da177e4 308 tconInfoAllocCount.counter);
f984c7b9 309 seq_printf(m, "SMB Request/Response Buffer: %d Pool size: %d\n",
b8643e1b
SF
310 bufAllocCount.counter,
311 cifs_min_rcv + tcpSesAllocCount.counter);
f984c7b9 312 seq_printf(m, "SMB Small Req/Resp Buffer: %d Pool size: %d\n",
221601c3 313 smBufAllocCount.counter, cifs_min_small);
07475ffb 314#ifdef CONFIG_CIFS_STATS2
f984c7b9 315 seq_printf(m, "Total Large %d Small %d Allocations\n",
07475ffb 316 atomic_read(&totBufAllocCount),
221601c3 317 atomic_read(&totSmBufAllocCount));
07475ffb
SF
318#endif /* CONFIG_CIFS_STATS2 */
319
8097531a 320 seq_printf(m, "Operations (MIDs): %d\n", atomic_read(&midCount));
f984c7b9 321 seq_printf(m,
1da177e4 322 "\n%d session %d share reconnects\n",
221601c3 323 tcpSesReconnectCount.counter, tconInfoReconnectCount.counter);
1da177e4 324
f984c7b9 325 seq_printf(m,
1da177e4 326 "Total vfs operations: %d maximum at one time: %d\n",
221601c3 327 GlobalCurrentXid, GlobalMaxActiveXid);
1da177e4
LT
328
329 i = 0;
3f9bcca7 330 spin_lock(&cifs_tcp_ses_lock);
f1987b44
JL
331 list_for_each(tmp1, &cifs_tcp_ses_list) {
332 server = list_entry(tmp1, struct TCP_Server_Info,
333 tcp_ses_list);
334 list_for_each(tmp2, &server->smb_ses_list) {
96daf2b0 335 ses = list_entry(tmp2, struct cifs_ses,
f1987b44
JL
336 smb_ses_list);
337 list_for_each(tmp3, &ses->tcon_list) {
338 tcon = list_entry(tmp3,
96daf2b0 339 struct cifs_tcon,
f1987b44
JL
340 tcon_list);
341 i++;
342 seq_printf(m, "\n%d) %s", i, tcon->treeName);
343 if (tcon->need_reconnect)
344 seq_puts(m, "\tDISCONNECTED ");
44c58186
PS
345 seq_printf(m, "\nSMBs: %d",
346 atomic_read(&tcon->num_smbs_sent));
347 if (server->ops->print_stats)
348 server->ops->print_stats(m, tcon);
f1987b44
JL
349 }
350 }
1da177e4 351 }
3f9bcca7 352 spin_unlock(&cifs_tcp_ses_lock);
1da177e4 353
f984c7b9
AD
354 seq_putc(m, '\n');
355 return 0;
356}
221601c3 357
f984c7b9
AD
358static int cifs_stats_proc_open(struct inode *inode, struct file *file)
359{
360 return single_open(file, cifs_stats_proc_show, NULL);
1da177e4 361}
f984c7b9
AD
362
363static const struct file_operations cifs_stats_proc_fops = {
364 .owner = THIS_MODULE,
365 .open = cifs_stats_proc_open,
366 .read = seq_read,
367 .llseek = seq_lseek,
368 .release = single_release,
369 .write = cifs_stats_proc_write,
370};
90c81e0b 371#endif /* STATS */
1da177e4
LT
372
373static struct proc_dir_entry *proc_fs_cifs;
f984c7b9 374static const struct file_operations cifsFYI_proc_fops;
f984c7b9
AD
375static const struct file_operations cifs_lookup_cache_proc_fops;
376static const struct file_operations traceSMB_proc_fops;
f984c7b9 377static const struct file_operations cifs_security_flags_proc_fops;
f984c7b9 378static const struct file_operations cifs_linux_ext_proc_fops;
1da177e4
LT
379
380void
381cifs_proc_init(void)
382{
36a5aeb8 383 proc_fs_cifs = proc_mkdir("fs/cifs", NULL);
1da177e4
LT
384 if (proc_fs_cifs == NULL)
385 return;
386
f984c7b9 387 proc_create("DebugData", 0, proc_fs_cifs, &cifs_debug_data_proc_fops);
1da177e4
LT
388
389#ifdef CONFIG_CIFS_STATS
f984c7b9 390 proc_create("Stats", 0, proc_fs_cifs, &cifs_stats_proc_fops);
90c81e0b 391#endif /* STATS */
f984c7b9
AD
392 proc_create("cifsFYI", 0, proc_fs_cifs, &cifsFYI_proc_fops);
393 proc_create("traceSMB", 0, proc_fs_cifs, &traceSMB_proc_fops);
99b1f5b2
SF
394 proc_create("LinuxExtensionsEnabled", 0, proc_fs_cifs,
395 &cifs_linux_ext_proc_fops);
99b1f5b2
SF
396 proc_create("SecurityFlags", 0, proc_fs_cifs,
397 &cifs_security_flags_proc_fops);
398 proc_create("LookupCacheEnabled", 0, proc_fs_cifs,
399 &cifs_lookup_cache_proc_fops);
1da177e4
LT
400}
401
402void
403cifs_proc_clean(void)
404{
405 if (proc_fs_cifs == NULL)
406 return;
407
408 remove_proc_entry("DebugData", proc_fs_cifs);
409 remove_proc_entry("cifsFYI", proc_fs_cifs);
410 remove_proc_entry("traceSMB", proc_fs_cifs);
411#ifdef CONFIG_CIFS_STATS
412 remove_proc_entry("Stats", proc_fs_cifs);
413#endif
221601c3 414 remove_proc_entry("SecurityFlags", proc_fs_cifs);
221601c3 415 remove_proc_entry("LinuxExtensionsEnabled", proc_fs_cifs);
221601c3 416 remove_proc_entry("LookupCacheEnabled", proc_fs_cifs);
36a5aeb8 417 remove_proc_entry("fs/cifs", NULL);
1da177e4
LT
418}
419
f984c7b9 420static int cifsFYI_proc_show(struct seq_file *m, void *v)
1da177e4 421{
f984c7b9
AD
422 seq_printf(m, "%d\n", cifsFYI);
423 return 0;
424}
1da177e4 425
f984c7b9
AD
426static int cifsFYI_proc_open(struct inode *inode, struct file *file)
427{
428 return single_open(file, cifsFYI_proc_show, NULL);
1da177e4 429}
f984c7b9
AD
430
431static ssize_t cifsFYI_proc_write(struct file *file, const char __user *buffer,
432 size_t count, loff_t *ppos)
1da177e4
LT
433{
434 char c;
435 int rc;
436
437 rc = get_user(c, buffer);
438 if (rc)
439 return rc;
440 if (c == '0' || c == 'n' || c == 'N')
441 cifsFYI = 0;
442 else if (c == '1' || c == 'y' || c == 'Y')
443 cifsFYI = 1;
221601c3 444 else if ((c > '1') && (c <= '9'))
1047abc1 445 cifsFYI = (int) (c - '0'); /* see cifs_debug.h for meanings */
1da177e4
LT
446
447 return count;
448}
449
f984c7b9
AD
450static const struct file_operations cifsFYI_proc_fops = {
451 .owner = THIS_MODULE,
452 .open = cifsFYI_proc_open,
453 .read = seq_read,
454 .llseek = seq_lseek,
455 .release = single_release,
456 .write = cifsFYI_proc_write,
457};
1da177e4 458
f984c7b9
AD
459static int cifs_linux_ext_proc_show(struct seq_file *m, void *v)
460{
461 seq_printf(m, "%d\n", linuxExtEnabled);
462 return 0;
463}
1da177e4 464
f984c7b9
AD
465static int cifs_linux_ext_proc_open(struct inode *inode, struct file *file)
466{
467 return single_open(file, cifs_linux_ext_proc_show, NULL);
1da177e4 468}
f984c7b9
AD
469
470static ssize_t cifs_linux_ext_proc_write(struct file *file,
471 const char __user *buffer, size_t count, loff_t *ppos)
1da177e4 472{
221601c3
SF
473 char c;
474 int rc;
475
476 rc = get_user(c, buffer);
477 if (rc)
478 return rc;
479 if (c == '0' || c == 'n' || c == 'N')
480 linuxExtEnabled = 0;
481 else if (c == '1' || c == 'y' || c == 'Y')
482 linuxExtEnabled = 1;
483
484 return count;
1da177e4
LT
485}
486
f984c7b9
AD
487static const struct file_operations cifs_linux_ext_proc_fops = {
488 .owner = THIS_MODULE,
489 .open = cifs_linux_ext_proc_open,
490 .read = seq_read,
491 .llseek = seq_lseek,
492 .release = single_release,
493 .write = cifs_linux_ext_proc_write,
494};
1da177e4 495
f984c7b9 496static int cifs_lookup_cache_proc_show(struct seq_file *m, void *v)
1da177e4 497{
f984c7b9
AD
498 seq_printf(m, "%d\n", lookupCacheEnabled);
499 return 0;
500}
1da177e4 501
f984c7b9
AD
502static int cifs_lookup_cache_proc_open(struct inode *inode, struct file *file)
503{
504 return single_open(file, cifs_lookup_cache_proc_show, NULL);
1da177e4 505}
f984c7b9
AD
506
507static ssize_t cifs_lookup_cache_proc_write(struct file *file,
508 const char __user *buffer, size_t count, loff_t *ppos)
1da177e4
LT
509{
510 char c;
511 int rc;
512
513 rc = get_user(c, buffer);
514 if (rc)
515 return rc;
516 if (c == '0' || c == 'n' || c == 'N')
517 lookupCacheEnabled = 0;
518 else if (c == '1' || c == 'y' || c == 'Y')
519 lookupCacheEnabled = 1;
520
521 return count;
522}
1da177e4 523
f984c7b9
AD
524static const struct file_operations cifs_lookup_cache_proc_fops = {
525 .owner = THIS_MODULE,
526 .open = cifs_lookup_cache_proc_open,
527 .read = seq_read,
528 .llseek = seq_lseek,
529 .release = single_release,
530 .write = cifs_lookup_cache_proc_write,
531};
1da177e4 532
f984c7b9
AD
533static int traceSMB_proc_show(struct seq_file *m, void *v)
534{
535 seq_printf(m, "%d\n", traceSMB);
536 return 0;
537}
1da177e4 538
f984c7b9
AD
539static int traceSMB_proc_open(struct inode *inode, struct file *file)
540{
541 return single_open(file, traceSMB_proc_show, NULL);
1da177e4 542}
f984c7b9
AD
543
544static ssize_t traceSMB_proc_write(struct file *file, const char __user *buffer,
545 size_t count, loff_t *ppos)
1da177e4
LT
546{
547 char c;
548 int rc;
549
550 rc = get_user(c, buffer);
551 if (rc)
552 return rc;
553 if (c == '0' || c == 'n' || c == 'N')
554 traceSMB = 0;
555 else if (c == '1' || c == 'y' || c == 'Y')
556 traceSMB = 1;
557
558 return count;
559}
560
f984c7b9
AD
561static const struct file_operations traceSMB_proc_fops = {
562 .owner = THIS_MODULE,
563 .open = traceSMB_proc_open,
564 .read = seq_read,
565 .llseek = seq_lseek,
566 .release = single_release,
567 .write = traceSMB_proc_write,
568};
1da177e4 569
f984c7b9
AD
570static int cifs_security_flags_proc_show(struct seq_file *m, void *v)
571{
04912d6a 572 seq_printf(m, "0x%x\n", global_secflags);
f984c7b9
AD
573 return 0;
574}
1da177e4 575
f984c7b9
AD
576static int cifs_security_flags_proc_open(struct inode *inode, struct file *file)
577{
578 return single_open(file, cifs_security_flags_proc_show, NULL);
1da177e4 579}
f984c7b9
AD
580
581static ssize_t cifs_security_flags_proc_write(struct file *file,
582 const char __user *buffer, size_t count, loff_t *ppos)
1da177e4 583{
bdc4bf6e
SF
584 unsigned int flags;
585 char flags_string[12];
1da177e4 586 char c;
bdc4bf6e 587
221601c3 588 if ((count < 1) || (count > 11))
3979877e 589 return -EINVAL;
1da177e4 590
bdc4bf6e 591 memset(flags_string, 0, 12);
3979877e 592
221601c3 593 if (copy_from_user(flags_string, buffer, count))
bdc4bf6e 594 return -EFAULT;
3979877e 595
221601c3 596 if (count < 3) {
bdc4bf6e
SF
597 /* single char or single char followed by null */
598 c = flags_string[0];
a013689d 599 if (c == '0' || c == 'n' || c == 'N') {
04912d6a 600 global_secflags = CIFSSEC_DEF; /* default */
a013689d
SF
601 return count;
602 } else if (c == '1' || c == 'y' || c == 'Y') {
04912d6a 603 global_secflags = CIFSSEC_MAX;
a013689d
SF
604 return count;
605 } else if (!isdigit(c)) {
b6b38f70 606 cERROR(1, "invalid flag %c", c);
a013689d
SF
607 return -EINVAL;
608 }
bdc4bf6e
SF
609 }
610 /* else we have a number */
611
612 flags = simple_strtoul(flags_string, NULL, 0);
613
b6b38f70 614 cFYI(1, "sec flags 0x%x", flags);
bdc4bf6e 615
221601c3 616 if (flags <= 0) {
b6b38f70 617 cERROR(1, "invalid security flags %s", flags_string);
bdc4bf6e
SF
618 return -EINVAL;
619 }
1da177e4 620
221601c3 621 if (flags & ~CIFSSEC_MASK) {
b6b38f70
JP
622 cERROR(1, "attempt to set unsupported security flags 0x%x",
623 flags & ~CIFSSEC_MASK);
bdc4bf6e
SF
624 return -EINVAL;
625 }
626 /* flags look ok - update the global security flags for cifs module */
04912d6a
JL
627 global_secflags = flags;
628 if (global_secflags & CIFSSEC_MUST_SIGN) {
762e5ab7 629 /* requiring signing implies signing is allowed */
04912d6a 630 global_secflags |= CIFSSEC_MAY_SIGN;
b6b38f70 631 cFYI(1, "packet signing now required");
04912d6a 632 } else if ((global_secflags & CIFSSEC_MAY_SIGN) == 0) {
b6b38f70 633 cFYI(1, "packet signing disabled");
762e5ab7
SF
634 }
635 /* BB should we turn on MAY flags for other MUST options? */
1da177e4
LT
636 return count;
637}
f984c7b9
AD
638
639static const struct file_operations cifs_security_flags_proc_fops = {
640 .owner = THIS_MODULE,
641 .open = cifs_security_flags_proc_open,
642 .read = seq_read,
643 .llseek = seq_lseek,
644 .release = single_release,
645 .write = cifs_security_flags_proc_write,
646};
90c81e0b 647#else
e086fcea 648inline void cifs_proc_init(void)
90c81e0b
SF
649{
650}
651
e086fcea 652inline void cifs_proc_clean(void)
90c81e0b
SF
653{
654}
655#endif /* PROC_FS */
This page took 1.457041 seconds and 5 git commands to generate.