David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 2 | /* |
| 3 | * fs/cifs_debug.c |
| 4 | * |
| 5 | * Copyright (C) International Business Machines Corp., 2000,2005 |
| 6 | * |
| 7 | * Modified by Steve French (sfrench@us.ibm.com) |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 8 | */ |
| 9 | #include <linux/fs.h> |
| 10 | #include <linux/string.h> |
| 11 | #include <linux/ctype.h> |
| 12 | #include <linux/module.h> |
| 13 | #include <linux/proc_fs.h> |
| 14 | #include <linux/uaccess.h> |
| 15 | #include "cifspdu.h" |
| 16 | #include "cifsglob.h" |
| 17 | #include "cifsproto.h" |
| 18 | #include "cifs_debug.h" |
| 19 | #include "cifsfs.h" |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 20 | #ifdef CONFIG_CIFS_DFS_UPCALL |
| 21 | #include "dfs_cache.h" |
| 22 | #endif |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 23 | #ifdef CONFIG_CIFS_SMB_DIRECT |
| 24 | #include "smbdirect.h" |
| 25 | #endif |
| 26 | |
| 27 | void |
| 28 | cifs_dump_mem(char *label, void *data, int length) |
| 29 | { |
| 30 | pr_debug("%s: dump of %d bytes of data at 0x%p\n", label, length, data); |
| 31 | print_hex_dump(KERN_DEBUG, "", DUMP_PREFIX_OFFSET, 16, 4, |
| 32 | data, length, true); |
| 33 | } |
| 34 | |
| 35 | void cifs_dump_detail(void *buf, struct TCP_Server_Info *server) |
| 36 | { |
| 37 | #ifdef CONFIG_CIFS_DEBUG2 |
| 38 | struct smb_hdr *smb = (struct smb_hdr *)buf; |
| 39 | |
| 40 | cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n", |
| 41 | smb->Command, smb->Status.CifsError, |
| 42 | smb->Flags, smb->Flags2, smb->Mid, smb->Pid); |
| 43 | cifs_dbg(VFS, "smb buf %p len %u\n", smb, |
| 44 | server->ops->calc_smb_size(smb, server)); |
| 45 | #endif /* CONFIG_CIFS_DEBUG2 */ |
| 46 | } |
| 47 | |
| 48 | void cifs_dump_mids(struct TCP_Server_Info *server) |
| 49 | { |
| 50 | #ifdef CONFIG_CIFS_DEBUG2 |
| 51 | struct list_head *tmp; |
| 52 | struct mid_q_entry *mid_entry; |
| 53 | |
| 54 | if (server == NULL) |
| 55 | return; |
| 56 | |
| 57 | cifs_dbg(VFS, "Dump pending requests:\n"); |
| 58 | spin_lock(&GlobalMid_Lock); |
| 59 | list_for_each(tmp, &server->pending_mid_q) { |
| 60 | mid_entry = list_entry(tmp, struct mid_q_entry, qhead); |
| 61 | cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", |
| 62 | mid_entry->mid_state, |
| 63 | le16_to_cpu(mid_entry->command), |
| 64 | mid_entry->pid, |
| 65 | mid_entry->callback_data, |
| 66 | mid_entry->mid); |
| 67 | #ifdef CONFIG_CIFS_STATS2 |
| 68 | cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", |
| 69 | mid_entry->large_buf, |
| 70 | mid_entry->resp_buf, |
| 71 | mid_entry->when_received, |
| 72 | jiffies); |
| 73 | #endif /* STATS2 */ |
| 74 | cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", |
| 75 | mid_entry->multiRsp, mid_entry->multiEnd); |
| 76 | if (mid_entry->resp_buf) { |
| 77 | cifs_dump_detail(mid_entry->resp_buf, server); |
| 78 | cifs_dump_mem("existing buf: ", |
| 79 | mid_entry->resp_buf, 62); |
| 80 | } |
| 81 | } |
| 82 | spin_unlock(&GlobalMid_Lock); |
| 83 | #endif /* CONFIG_CIFS_DEBUG2 */ |
| 84 | } |
| 85 | |
| 86 | #ifdef CONFIG_PROC_FS |
| 87 | static void cifs_debug_tcon(struct seq_file *m, struct cifs_tcon *tcon) |
| 88 | { |
| 89 | __u32 dev_type = le32_to_cpu(tcon->fsDevInfo.DeviceType); |
| 90 | |
| 91 | seq_printf(m, "%s Mounts: %d ", tcon->treeName, tcon->tc_count); |
| 92 | if (tcon->nativeFileSystem) |
| 93 | seq_printf(m, "Type: %s ", tcon->nativeFileSystem); |
| 94 | seq_printf(m, "DevInfo: 0x%x Attributes: 0x%x\n\tPathComponentMax: %d Status: %d", |
| 95 | le32_to_cpu(tcon->fsDevInfo.DeviceCharacteristics), |
| 96 | le32_to_cpu(tcon->fsAttrInfo.Attributes), |
| 97 | le32_to_cpu(tcon->fsAttrInfo.MaxPathNameComponentLength), |
| 98 | tcon->tidStatus); |
| 99 | if (dev_type == FILE_DEVICE_DISK) |
| 100 | seq_puts(m, " type: DISK "); |
| 101 | else if (dev_type == FILE_DEVICE_CD_ROM) |
| 102 | seq_puts(m, " type: CDROM "); |
| 103 | else |
| 104 | seq_printf(m, " type: %d ", dev_type); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 105 | |
| 106 | seq_printf(m, "Serial Number: 0x%x", tcon->vol_serial_number); |
| 107 | |
| 108 | if ((tcon->seal) || |
| 109 | (tcon->ses->session_flags & SMB2_SESSION_FLAG_ENCRYPT_DATA) || |
| 110 | (tcon->share_flags & SHI1005_FLAGS_ENCRYPT_DATA)) |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 111 | seq_printf(m, " Encrypted"); |
| 112 | if (tcon->nocase) |
| 113 | seq_printf(m, " nocase"); |
| 114 | if (tcon->unix_ext) |
| 115 | seq_printf(m, " POSIX Extensions"); |
| 116 | if (tcon->ses->server->ops->dump_share_caps) |
| 117 | tcon->ses->server->ops->dump_share_caps(m, tcon); |
| 118 | |
| 119 | if (tcon->need_reconnect) |
| 120 | seq_puts(m, "\tDISCONNECTED "); |
| 121 | seq_putc(m, '\n'); |
| 122 | } |
| 123 | |
| 124 | static void |
| 125 | cifs_dump_iface(struct seq_file *m, struct cifs_server_iface *iface) |
| 126 | { |
| 127 | struct sockaddr_in *ipv4 = (struct sockaddr_in *)&iface->sockaddr; |
| 128 | struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)&iface->sockaddr; |
| 129 | |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 130 | seq_printf(m, "\tSpeed: %zu bps\n", iface->speed); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 131 | seq_puts(m, "\t\tCapabilities: "); |
| 132 | if (iface->rdma_capable) |
| 133 | seq_puts(m, "rdma "); |
| 134 | if (iface->rss_capable) |
| 135 | seq_puts(m, "rss "); |
| 136 | seq_putc(m, '\n'); |
| 137 | if (iface->sockaddr.ss_family == AF_INET) |
| 138 | seq_printf(m, "\t\tIPv4: %pI4\n", &ipv4->sin_addr); |
| 139 | else if (iface->sockaddr.ss_family == AF_INET6) |
| 140 | seq_printf(m, "\t\tIPv6: %pI6\n", &ipv6->sin6_addr); |
| 141 | } |
| 142 | |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 143 | static int cifs_debug_files_proc_show(struct seq_file *m, void *v) |
| 144 | { |
| 145 | struct list_head *stmp, *tmp, *tmp1, *tmp2; |
| 146 | struct TCP_Server_Info *server; |
| 147 | struct cifs_ses *ses; |
| 148 | struct cifs_tcon *tcon; |
| 149 | struct cifsFileInfo *cfile; |
| 150 | |
| 151 | seq_puts(m, "# Version:1\n"); |
| 152 | seq_puts(m, "# Format:\n"); |
| 153 | seq_puts(m, "# <tree id> <persistent fid> <flags> <count> <pid> <uid>"); |
| 154 | #ifdef CONFIG_CIFS_DEBUG2 |
| 155 | seq_printf(m, " <filename> <mid>\n"); |
| 156 | #else |
| 157 | seq_printf(m, " <filename>\n"); |
| 158 | #endif /* CIFS_DEBUG2 */ |
| 159 | spin_lock(&cifs_tcp_ses_lock); |
| 160 | list_for_each(stmp, &cifs_tcp_ses_list) { |
| 161 | server = list_entry(stmp, struct TCP_Server_Info, |
| 162 | tcp_ses_list); |
| 163 | list_for_each(tmp, &server->smb_ses_list) { |
| 164 | ses = list_entry(tmp, struct cifs_ses, smb_ses_list); |
| 165 | list_for_each(tmp1, &ses->tcon_list) { |
| 166 | tcon = list_entry(tmp1, struct cifs_tcon, tcon_list); |
| 167 | spin_lock(&tcon->open_file_lock); |
| 168 | list_for_each(tmp2, &tcon->openFileList) { |
| 169 | cfile = list_entry(tmp2, struct cifsFileInfo, |
| 170 | tlist); |
| 171 | seq_printf(m, |
| 172 | "0x%x 0x%llx 0x%x %d %d %d %s", |
| 173 | tcon->tid, |
| 174 | cfile->fid.persistent_fid, |
| 175 | cfile->f_flags, |
| 176 | cfile->count, |
| 177 | cfile->pid, |
| 178 | from_kuid(&init_user_ns, cfile->uid), |
| 179 | cfile->dentry->d_name.name); |
| 180 | #ifdef CONFIG_CIFS_DEBUG2 |
| 181 | seq_printf(m, " 0x%llx\n", cfile->fid.mid); |
| 182 | #else |
| 183 | seq_printf(m, "\n"); |
| 184 | #endif /* CIFS_DEBUG2 */ |
| 185 | } |
| 186 | spin_unlock(&tcon->open_file_lock); |
| 187 | } |
| 188 | } |
| 189 | } |
| 190 | spin_unlock(&cifs_tcp_ses_lock); |
| 191 | seq_putc(m, '\n'); |
| 192 | return 0; |
| 193 | } |
| 194 | |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 195 | static int cifs_debug_data_proc_show(struct seq_file *m, void *v) |
| 196 | { |
| 197 | struct list_head *tmp1, *tmp2, *tmp3; |
| 198 | struct mid_q_entry *mid_entry; |
| 199 | struct TCP_Server_Info *server; |
| 200 | struct cifs_ses *ses; |
| 201 | struct cifs_tcon *tcon; |
| 202 | int i, j; |
| 203 | |
| 204 | seq_puts(m, |
| 205 | "Display Internal CIFS Data Structures for Debugging\n" |
| 206 | "---------------------------------------------------\n"); |
| 207 | seq_printf(m, "CIFS Version %s\n", CIFS_VERSION); |
| 208 | seq_printf(m, "Features:"); |
| 209 | #ifdef CONFIG_CIFS_DFS_UPCALL |
| 210 | seq_printf(m, " DFS"); |
| 211 | #endif |
| 212 | #ifdef CONFIG_CIFS_FSCACHE |
| 213 | seq_printf(m, ",FSCACHE"); |
| 214 | #endif |
| 215 | #ifdef CONFIG_CIFS_SMB_DIRECT |
| 216 | seq_printf(m, ",SMB_DIRECT"); |
| 217 | #endif |
| 218 | #ifdef CONFIG_CIFS_STATS2 |
| 219 | seq_printf(m, ",STATS2"); |
| 220 | #else |
| 221 | seq_printf(m, ",STATS"); |
| 222 | #endif |
| 223 | #ifdef CONFIG_CIFS_DEBUG2 |
| 224 | seq_printf(m, ",DEBUG2"); |
| 225 | #elif defined(CONFIG_CIFS_DEBUG) |
| 226 | seq_printf(m, ",DEBUG"); |
| 227 | #endif |
| 228 | #ifdef CONFIG_CIFS_ALLOW_INSECURE_LEGACY |
| 229 | seq_printf(m, ",ALLOW_INSECURE_LEGACY"); |
| 230 | #endif |
| 231 | #ifdef CONFIG_CIFS_WEAK_PW_HASH |
| 232 | seq_printf(m, ",WEAK_PW_HASH"); |
| 233 | #endif |
| 234 | #ifdef CONFIG_CIFS_POSIX |
| 235 | seq_printf(m, ",CIFS_POSIX"); |
| 236 | #endif |
| 237 | #ifdef CONFIG_CIFS_UPCALL |
| 238 | seq_printf(m, ",UPCALL(SPNEGO)"); |
| 239 | #endif |
| 240 | #ifdef CONFIG_CIFS_XATTR |
| 241 | seq_printf(m, ",XATTR"); |
| 242 | #endif |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 243 | seq_printf(m, ",ACL"); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 244 | seq_putc(m, '\n'); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 245 | seq_printf(m, "CIFSMaxBufSize: %d\n", CIFSMaxBufSize); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 246 | seq_printf(m, "Active VFS Requests: %d\n", GlobalTotalActiveXid); |
| 247 | seq_printf(m, "Servers:"); |
| 248 | |
| 249 | i = 0; |
| 250 | spin_lock(&cifs_tcp_ses_lock); |
| 251 | list_for_each(tmp1, &cifs_tcp_ses_list) { |
| 252 | server = list_entry(tmp1, struct TCP_Server_Info, |
| 253 | tcp_ses_list); |
| 254 | |
| 255 | #ifdef CONFIG_CIFS_SMB_DIRECT |
| 256 | if (!server->rdma) |
| 257 | goto skip_rdma; |
| 258 | |
| 259 | seq_printf(m, "\nSMBDirect (in hex) protocol version: %x " |
| 260 | "transport status: %x", |
| 261 | server->smbd_conn->protocol, |
| 262 | server->smbd_conn->transport_status); |
| 263 | seq_printf(m, "\nConn receive_credit_max: %x " |
| 264 | "send_credit_target: %x max_send_size: %x", |
| 265 | server->smbd_conn->receive_credit_max, |
| 266 | server->smbd_conn->send_credit_target, |
| 267 | server->smbd_conn->max_send_size); |
| 268 | seq_printf(m, "\nConn max_fragmented_recv_size: %x " |
| 269 | "max_fragmented_send_size: %x max_receive_size:%x", |
| 270 | server->smbd_conn->max_fragmented_recv_size, |
| 271 | server->smbd_conn->max_fragmented_send_size, |
| 272 | server->smbd_conn->max_receive_size); |
| 273 | seq_printf(m, "\nConn keep_alive_interval: %x " |
| 274 | "max_readwrite_size: %x rdma_readwrite_threshold: %x", |
| 275 | server->smbd_conn->keep_alive_interval, |
| 276 | server->smbd_conn->max_readwrite_size, |
| 277 | server->smbd_conn->rdma_readwrite_threshold); |
| 278 | seq_printf(m, "\nDebug count_get_receive_buffer: %x " |
| 279 | "count_put_receive_buffer: %x count_send_empty: %x", |
| 280 | server->smbd_conn->count_get_receive_buffer, |
| 281 | server->smbd_conn->count_put_receive_buffer, |
| 282 | server->smbd_conn->count_send_empty); |
| 283 | seq_printf(m, "\nRead Queue count_reassembly_queue: %x " |
| 284 | "count_enqueue_reassembly_queue: %x " |
| 285 | "count_dequeue_reassembly_queue: %x " |
| 286 | "fragment_reassembly_remaining: %x " |
| 287 | "reassembly_data_length: %x " |
| 288 | "reassembly_queue_length: %x", |
| 289 | server->smbd_conn->count_reassembly_queue, |
| 290 | server->smbd_conn->count_enqueue_reassembly_queue, |
| 291 | server->smbd_conn->count_dequeue_reassembly_queue, |
| 292 | server->smbd_conn->fragment_reassembly_remaining, |
| 293 | server->smbd_conn->reassembly_data_length, |
| 294 | server->smbd_conn->reassembly_queue_length); |
| 295 | seq_printf(m, "\nCurrent Credits send_credits: %x " |
| 296 | "receive_credits: %x receive_credit_target: %x", |
| 297 | atomic_read(&server->smbd_conn->send_credits), |
| 298 | atomic_read(&server->smbd_conn->receive_credits), |
| 299 | server->smbd_conn->receive_credit_target); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 300 | seq_printf(m, "\nPending send_pending: %x " |
| 301 | "send_payload_pending: %x", |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 302 | atomic_read(&server->smbd_conn->send_pending), |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 303 | atomic_read(&server->smbd_conn->send_payload_pending)); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 304 | seq_printf(m, "\nReceive buffers count_receive_queue: %x " |
| 305 | "count_empty_packet_queue: %x", |
| 306 | server->smbd_conn->count_receive_queue, |
| 307 | server->smbd_conn->count_empty_packet_queue); |
| 308 | seq_printf(m, "\nMR responder_resources: %x " |
| 309 | "max_frmr_depth: %x mr_type: %x", |
| 310 | server->smbd_conn->responder_resources, |
| 311 | server->smbd_conn->max_frmr_depth, |
| 312 | server->smbd_conn->mr_type); |
| 313 | seq_printf(m, "\nMR mr_ready_count: %x mr_used_count: %x", |
| 314 | atomic_read(&server->smbd_conn->mr_ready_count), |
| 315 | atomic_read(&server->smbd_conn->mr_used_count)); |
| 316 | skip_rdma: |
| 317 | #endif |
| 318 | seq_printf(m, "\nNumber of credits: %d Dialect 0x%x", |
| 319 | server->credits, server->dialect); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 320 | if (server->compress_algorithm == SMB3_COMPRESS_LZNT1) |
| 321 | seq_printf(m, " COMPRESS_LZNT1"); |
| 322 | else if (server->compress_algorithm == SMB3_COMPRESS_LZ77) |
| 323 | seq_printf(m, " COMPRESS_LZ77"); |
| 324 | else if (server->compress_algorithm == SMB3_COMPRESS_LZ77_HUFF) |
| 325 | seq_printf(m, " COMPRESS_LZ77_HUFF"); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 326 | if (server->sign) |
| 327 | seq_printf(m, " signed"); |
| 328 | if (server->posix_ext_supported) |
| 329 | seq_printf(m, " posix"); |
| 330 | |
| 331 | i++; |
| 332 | list_for_each(tmp2, &server->smb_ses_list) { |
| 333 | ses = list_entry(tmp2, struct cifs_ses, |
| 334 | smb_ses_list); |
| 335 | if ((ses->serverDomain == NULL) || |
| 336 | (ses->serverOS == NULL) || |
| 337 | (ses->serverNOS == NULL)) { |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 338 | seq_printf(m, "\n%d) Name: %s Uses: %d Capability: 0x%x\tSession Status: %d ", |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 339 | i, ses->serverName, ses->ses_count, |
| 340 | ses->capabilities, ses->status); |
| 341 | if (ses->session_flags & SMB2_SESSION_FLAG_IS_GUEST) |
| 342 | seq_printf(m, "Guest\t"); |
| 343 | else if (ses->session_flags & SMB2_SESSION_FLAG_IS_NULL) |
| 344 | seq_printf(m, "Anonymous\t"); |
| 345 | } else { |
| 346 | seq_printf(m, |
| 347 | "\n%d) Name: %s Domain: %s Uses: %d OS:" |
| 348 | " %s\n\tNOS: %s\tCapability: 0x%x\n\tSMB" |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 349 | " session status: %d ", |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 350 | i, ses->serverName, ses->serverDomain, |
| 351 | ses->ses_count, ses->serverOS, ses->serverNOS, |
| 352 | ses->capabilities, ses->status); |
| 353 | } |
| 354 | if (server->rdma) |
| 355 | seq_printf(m, "RDMA\n\t"); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 356 | seq_printf(m, "TCP status: %d Instance: %d\n\tLocal Users To " |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 357 | "Server: %d SecMode: 0x%x Req On Wire: %d", |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 358 | server->tcpStatus, |
| 359 | server->reconnect_instance, |
| 360 | server->srv_count, |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 361 | server->sec_mode, in_flight(server)); |
| 362 | |
| 363 | #ifdef CONFIG_CIFS_STATS2 |
| 364 | seq_printf(m, " In Send: %d In MaxReq Wait: %d", |
| 365 | atomic_read(&server->in_send), |
| 366 | atomic_read(&server->num_waiters)); |
| 367 | #endif |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 368 | /* dump session id helpful for use with network trace */ |
| 369 | seq_printf(m, " SessionId: 0x%llx", ses->Suid); |
| 370 | if (ses->session_flags & SMB2_SESSION_FLAG_ENCRYPT_DATA) |
| 371 | seq_puts(m, " encrypted"); |
| 372 | if (ses->sign) |
| 373 | seq_puts(m, " signed"); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 374 | |
| 375 | seq_puts(m, "\n\tShares:"); |
| 376 | j = 0; |
| 377 | |
| 378 | seq_printf(m, "\n\t%d) IPC: ", j); |
| 379 | if (ses->tcon_ipc) |
| 380 | cifs_debug_tcon(m, ses->tcon_ipc); |
| 381 | else |
| 382 | seq_puts(m, "none\n"); |
| 383 | |
| 384 | list_for_each(tmp3, &ses->tcon_list) { |
| 385 | tcon = list_entry(tmp3, struct cifs_tcon, |
| 386 | tcon_list); |
| 387 | ++j; |
| 388 | seq_printf(m, "\n\t%d) ", j); |
| 389 | cifs_debug_tcon(m, tcon); |
| 390 | } |
| 391 | |
| 392 | seq_puts(m, "\n\tMIDs:\n"); |
| 393 | |
| 394 | spin_lock(&GlobalMid_Lock); |
| 395 | list_for_each(tmp3, &server->pending_mid_q) { |
| 396 | mid_entry = list_entry(tmp3, struct mid_q_entry, |
| 397 | qhead); |
| 398 | seq_printf(m, "\tState: %d com: %d pid:" |
| 399 | " %d cbdata: %p mid %llu\n", |
| 400 | mid_entry->mid_state, |
| 401 | le16_to_cpu(mid_entry->command), |
| 402 | mid_entry->pid, |
| 403 | mid_entry->callback_data, |
| 404 | mid_entry->mid); |
| 405 | } |
| 406 | spin_unlock(&GlobalMid_Lock); |
| 407 | |
| 408 | spin_lock(&ses->iface_lock); |
| 409 | if (ses->iface_count) |
| 410 | seq_printf(m, "\n\tServer interfaces: %zu\n", |
| 411 | ses->iface_count); |
| 412 | for (j = 0; j < ses->iface_count; j++) { |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 413 | seq_printf(m, "\t%d)", j); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 414 | cifs_dump_iface(m, &ses->iface_list[j]); |
| 415 | } |
| 416 | spin_unlock(&ses->iface_lock); |
| 417 | } |
| 418 | } |
| 419 | spin_unlock(&cifs_tcp_ses_lock); |
| 420 | seq_putc(m, '\n'); |
| 421 | |
| 422 | /* BB add code to dump additional info such as TCP session info now */ |
| 423 | return 0; |
| 424 | } |
| 425 | |
| 426 | static ssize_t cifs_stats_proc_write(struct file *file, |
| 427 | const char __user *buffer, size_t count, loff_t *ppos) |
| 428 | { |
| 429 | bool bv; |
| 430 | int rc; |
| 431 | struct list_head *tmp1, *tmp2, *tmp3; |
| 432 | struct TCP_Server_Info *server; |
| 433 | struct cifs_ses *ses; |
| 434 | struct cifs_tcon *tcon; |
| 435 | |
| 436 | rc = kstrtobool_from_user(buffer, count, &bv); |
| 437 | if (rc == 0) { |
| 438 | #ifdef CONFIG_CIFS_STATS2 |
| 439 | int i; |
| 440 | |
| 441 | atomic_set(&totBufAllocCount, 0); |
| 442 | atomic_set(&totSmBufAllocCount, 0); |
| 443 | #endif /* CONFIG_CIFS_STATS2 */ |
| 444 | atomic_set(&tcpSesReconnectCount, 0); |
| 445 | atomic_set(&tconInfoReconnectCount, 0); |
| 446 | |
| 447 | spin_lock(&GlobalMid_Lock); |
| 448 | GlobalMaxActiveXid = 0; |
| 449 | GlobalCurrentXid = 0; |
| 450 | spin_unlock(&GlobalMid_Lock); |
| 451 | spin_lock(&cifs_tcp_ses_lock); |
| 452 | list_for_each(tmp1, &cifs_tcp_ses_list) { |
| 453 | server = list_entry(tmp1, struct TCP_Server_Info, |
| 454 | tcp_ses_list); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 455 | server->max_in_flight = 0; |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 456 | #ifdef CONFIG_CIFS_STATS2 |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 457 | for (i = 0; i < NUMBER_OF_SMB2_COMMANDS; i++) { |
| 458 | atomic_set(&server->num_cmds[i], 0); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 459 | atomic_set(&server->smb2slowcmd[i], 0); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 460 | server->time_per_cmd[i] = 0; |
| 461 | server->slowest_cmd[i] = 0; |
| 462 | server->fastest_cmd[0] = 0; |
| 463 | } |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 464 | #endif /* CONFIG_CIFS_STATS2 */ |
| 465 | list_for_each(tmp2, &server->smb_ses_list) { |
| 466 | ses = list_entry(tmp2, struct cifs_ses, |
| 467 | smb_ses_list); |
| 468 | list_for_each(tmp3, &ses->tcon_list) { |
| 469 | tcon = list_entry(tmp3, |
| 470 | struct cifs_tcon, |
| 471 | tcon_list); |
| 472 | atomic_set(&tcon->num_smbs_sent, 0); |
| 473 | spin_lock(&tcon->stat_lock); |
| 474 | tcon->bytes_read = 0; |
| 475 | tcon->bytes_written = 0; |
| 476 | spin_unlock(&tcon->stat_lock); |
| 477 | if (server->ops->clear_stats) |
| 478 | server->ops->clear_stats(tcon); |
| 479 | } |
| 480 | } |
| 481 | } |
| 482 | spin_unlock(&cifs_tcp_ses_lock); |
| 483 | } else { |
| 484 | return rc; |
| 485 | } |
| 486 | |
| 487 | return count; |
| 488 | } |
| 489 | |
| 490 | static int cifs_stats_proc_show(struct seq_file *m, void *v) |
| 491 | { |
| 492 | int i; |
| 493 | #ifdef CONFIG_CIFS_STATS2 |
| 494 | int j; |
| 495 | #endif /* STATS2 */ |
| 496 | struct list_head *tmp1, *tmp2, *tmp3; |
| 497 | struct TCP_Server_Info *server; |
| 498 | struct cifs_ses *ses; |
| 499 | struct cifs_tcon *tcon; |
| 500 | |
| 501 | seq_printf(m, "Resources in use\nCIFS Session: %d\n", |
| 502 | sesInfoAllocCount.counter); |
| 503 | seq_printf(m, "Share (unique mount targets): %d\n", |
| 504 | tconInfoAllocCount.counter); |
| 505 | seq_printf(m, "SMB Request/Response Buffer: %d Pool size: %d\n", |
| 506 | bufAllocCount.counter, |
| 507 | cifs_min_rcv + tcpSesAllocCount.counter); |
| 508 | seq_printf(m, "SMB Small Req/Resp Buffer: %d Pool size: %d\n", |
| 509 | smBufAllocCount.counter, cifs_min_small); |
| 510 | #ifdef CONFIG_CIFS_STATS2 |
| 511 | seq_printf(m, "Total Large %d Small %d Allocations\n", |
| 512 | atomic_read(&totBufAllocCount), |
| 513 | atomic_read(&totSmBufAllocCount)); |
| 514 | #endif /* CONFIG_CIFS_STATS2 */ |
| 515 | |
| 516 | seq_printf(m, "Operations (MIDs): %d\n", atomic_read(&midCount)); |
| 517 | seq_printf(m, |
| 518 | "\n%d session %d share reconnects\n", |
| 519 | tcpSesReconnectCount.counter, tconInfoReconnectCount.counter); |
| 520 | |
| 521 | seq_printf(m, |
| 522 | "Total vfs operations: %d maximum at one time: %d\n", |
| 523 | GlobalCurrentXid, GlobalMaxActiveXid); |
| 524 | |
| 525 | i = 0; |
| 526 | spin_lock(&cifs_tcp_ses_lock); |
| 527 | list_for_each(tmp1, &cifs_tcp_ses_list) { |
| 528 | server = list_entry(tmp1, struct TCP_Server_Info, |
| 529 | tcp_ses_list); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 530 | seq_printf(m, "\nMax requests in flight: %d", server->max_in_flight); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 531 | #ifdef CONFIG_CIFS_STATS2 |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 532 | seq_puts(m, "\nTotal time spent processing by command. Time "); |
| 533 | seq_printf(m, "units are jiffies (%d per second)\n", HZ); |
| 534 | seq_puts(m, " SMB3 CMD\tNumber\tTotal Time\tFastest\tSlowest\n"); |
| 535 | seq_puts(m, " --------\t------\t----------\t-------\t-------\n"); |
| 536 | for (j = 0; j < NUMBER_OF_SMB2_COMMANDS; j++) |
| 537 | seq_printf(m, " %d\t\t%d\t%llu\t\t%u\t%u\n", j, |
| 538 | atomic_read(&server->num_cmds[j]), |
| 539 | server->time_per_cmd[j], |
| 540 | server->fastest_cmd[j], |
| 541 | server->slowest_cmd[j]); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 542 | for (j = 0; j < NUMBER_OF_SMB2_COMMANDS; j++) |
| 543 | if (atomic_read(&server->smb2slowcmd[j])) |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 544 | seq_printf(m, " %d slow responses from %s for command %d\n", |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 545 | atomic_read(&server->smb2slowcmd[j]), |
| 546 | server->hostname, j); |
| 547 | #endif /* STATS2 */ |
| 548 | list_for_each(tmp2, &server->smb_ses_list) { |
| 549 | ses = list_entry(tmp2, struct cifs_ses, |
| 550 | smb_ses_list); |
| 551 | list_for_each(tmp3, &ses->tcon_list) { |
| 552 | tcon = list_entry(tmp3, |
| 553 | struct cifs_tcon, |
| 554 | tcon_list); |
| 555 | i++; |
| 556 | seq_printf(m, "\n%d) %s", i, tcon->treeName); |
| 557 | if (tcon->need_reconnect) |
| 558 | seq_puts(m, "\tDISCONNECTED "); |
| 559 | seq_printf(m, "\nSMBs: %d", |
| 560 | atomic_read(&tcon->num_smbs_sent)); |
| 561 | if (server->ops->print_stats) |
| 562 | server->ops->print_stats(m, tcon); |
| 563 | } |
| 564 | } |
| 565 | } |
| 566 | spin_unlock(&cifs_tcp_ses_lock); |
| 567 | |
| 568 | seq_putc(m, '\n'); |
| 569 | return 0; |
| 570 | } |
| 571 | |
| 572 | static int cifs_stats_proc_open(struct inode *inode, struct file *file) |
| 573 | { |
| 574 | return single_open(file, cifs_stats_proc_show, NULL); |
| 575 | } |
| 576 | |
| 577 | static const struct file_operations cifs_stats_proc_fops = { |
| 578 | .open = cifs_stats_proc_open, |
| 579 | .read = seq_read, |
| 580 | .llseek = seq_lseek, |
| 581 | .release = single_release, |
| 582 | .write = cifs_stats_proc_write, |
| 583 | }; |
| 584 | |
| 585 | #ifdef CONFIG_CIFS_SMB_DIRECT |
| 586 | #define PROC_FILE_DEFINE(name) \ |
| 587 | static ssize_t name##_write(struct file *file, const char __user *buffer, \ |
| 588 | size_t count, loff_t *ppos) \ |
| 589 | { \ |
| 590 | int rc; \ |
| 591 | rc = kstrtoint_from_user(buffer, count, 10, & name); \ |
| 592 | if (rc) \ |
| 593 | return rc; \ |
| 594 | return count; \ |
| 595 | } \ |
| 596 | static int name##_proc_show(struct seq_file *m, void *v) \ |
| 597 | { \ |
| 598 | seq_printf(m, "%d\n", name ); \ |
| 599 | return 0; \ |
| 600 | } \ |
| 601 | static int name##_open(struct inode *inode, struct file *file) \ |
| 602 | { \ |
| 603 | return single_open(file, name##_proc_show, NULL); \ |
| 604 | } \ |
| 605 | \ |
| 606 | static const struct file_operations cifs_##name##_proc_fops = { \ |
| 607 | .open = name##_open, \ |
| 608 | .read = seq_read, \ |
| 609 | .llseek = seq_lseek, \ |
| 610 | .release = single_release, \ |
| 611 | .write = name##_write, \ |
| 612 | } |
| 613 | |
| 614 | PROC_FILE_DEFINE(rdma_readwrite_threshold); |
| 615 | PROC_FILE_DEFINE(smbd_max_frmr_depth); |
| 616 | PROC_FILE_DEFINE(smbd_keep_alive_interval); |
| 617 | PROC_FILE_DEFINE(smbd_max_receive_size); |
| 618 | PROC_FILE_DEFINE(smbd_max_fragmented_recv_size); |
| 619 | PROC_FILE_DEFINE(smbd_max_send_size); |
| 620 | PROC_FILE_DEFINE(smbd_send_credit_target); |
| 621 | PROC_FILE_DEFINE(smbd_receive_credit_max); |
| 622 | #endif |
| 623 | |
| 624 | static struct proc_dir_entry *proc_fs_cifs; |
| 625 | static const struct file_operations cifsFYI_proc_fops; |
| 626 | static const struct file_operations cifs_lookup_cache_proc_fops; |
| 627 | static const struct file_operations traceSMB_proc_fops; |
| 628 | static const struct file_operations cifs_security_flags_proc_fops; |
| 629 | static const struct file_operations cifs_linux_ext_proc_fops; |
| 630 | |
| 631 | void |
| 632 | cifs_proc_init(void) |
| 633 | { |
| 634 | proc_fs_cifs = proc_mkdir("fs/cifs", NULL); |
| 635 | if (proc_fs_cifs == NULL) |
| 636 | return; |
| 637 | |
| 638 | proc_create_single("DebugData", 0, proc_fs_cifs, |
| 639 | cifs_debug_data_proc_show); |
| 640 | |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 641 | proc_create_single("open_files", 0400, proc_fs_cifs, |
| 642 | cifs_debug_files_proc_show); |
| 643 | |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 644 | proc_create("Stats", 0644, proc_fs_cifs, &cifs_stats_proc_fops); |
| 645 | proc_create("cifsFYI", 0644, proc_fs_cifs, &cifsFYI_proc_fops); |
| 646 | proc_create("traceSMB", 0644, proc_fs_cifs, &traceSMB_proc_fops); |
| 647 | proc_create("LinuxExtensionsEnabled", 0644, proc_fs_cifs, |
| 648 | &cifs_linux_ext_proc_fops); |
| 649 | proc_create("SecurityFlags", 0644, proc_fs_cifs, |
| 650 | &cifs_security_flags_proc_fops); |
| 651 | proc_create("LookupCacheEnabled", 0644, proc_fs_cifs, |
| 652 | &cifs_lookup_cache_proc_fops); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 653 | |
| 654 | #ifdef CONFIG_CIFS_DFS_UPCALL |
| 655 | proc_create("dfscache", 0644, proc_fs_cifs, &dfscache_proc_fops); |
| 656 | #endif |
| 657 | |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 658 | #ifdef CONFIG_CIFS_SMB_DIRECT |
| 659 | proc_create("rdma_readwrite_threshold", 0644, proc_fs_cifs, |
| 660 | &cifs_rdma_readwrite_threshold_proc_fops); |
| 661 | proc_create("smbd_max_frmr_depth", 0644, proc_fs_cifs, |
| 662 | &cifs_smbd_max_frmr_depth_proc_fops); |
| 663 | proc_create("smbd_keep_alive_interval", 0644, proc_fs_cifs, |
| 664 | &cifs_smbd_keep_alive_interval_proc_fops); |
| 665 | proc_create("smbd_max_receive_size", 0644, proc_fs_cifs, |
| 666 | &cifs_smbd_max_receive_size_proc_fops); |
| 667 | proc_create("smbd_max_fragmented_recv_size", 0644, proc_fs_cifs, |
| 668 | &cifs_smbd_max_fragmented_recv_size_proc_fops); |
| 669 | proc_create("smbd_max_send_size", 0644, proc_fs_cifs, |
| 670 | &cifs_smbd_max_send_size_proc_fops); |
| 671 | proc_create("smbd_send_credit_target", 0644, proc_fs_cifs, |
| 672 | &cifs_smbd_send_credit_target_proc_fops); |
| 673 | proc_create("smbd_receive_credit_max", 0644, proc_fs_cifs, |
| 674 | &cifs_smbd_receive_credit_max_proc_fops); |
| 675 | #endif |
| 676 | } |
| 677 | |
| 678 | void |
| 679 | cifs_proc_clean(void) |
| 680 | { |
| 681 | if (proc_fs_cifs == NULL) |
| 682 | return; |
| 683 | |
| 684 | remove_proc_entry("DebugData", proc_fs_cifs); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 685 | remove_proc_entry("open_files", proc_fs_cifs); |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 686 | remove_proc_entry("cifsFYI", proc_fs_cifs); |
| 687 | remove_proc_entry("traceSMB", proc_fs_cifs); |
| 688 | remove_proc_entry("Stats", proc_fs_cifs); |
| 689 | remove_proc_entry("SecurityFlags", proc_fs_cifs); |
| 690 | remove_proc_entry("LinuxExtensionsEnabled", proc_fs_cifs); |
| 691 | remove_proc_entry("LookupCacheEnabled", proc_fs_cifs); |
David Brazdil | 0f672f6 | 2019-12-10 10:32:29 +0000 | [diff] [blame^] | 692 | |
| 693 | #ifdef CONFIG_CIFS_DFS_UPCALL |
| 694 | remove_proc_entry("dfscache", proc_fs_cifs); |
| 695 | #endif |
Andrew Scull | b4b6d4a | 2019-01-02 15:54:55 +0000 | [diff] [blame] | 696 | #ifdef CONFIG_CIFS_SMB_DIRECT |
| 697 | remove_proc_entry("rdma_readwrite_threshold", proc_fs_cifs); |
| 698 | remove_proc_entry("smbd_max_frmr_depth", proc_fs_cifs); |
| 699 | remove_proc_entry("smbd_keep_alive_interval", proc_fs_cifs); |
| 700 | remove_proc_entry("smbd_max_receive_size", proc_fs_cifs); |
| 701 | remove_proc_entry("smbd_max_fragmented_recv_size", proc_fs_cifs); |
| 702 | remove_proc_entry("smbd_max_send_size", proc_fs_cifs); |
| 703 | remove_proc_entry("smbd_send_credit_target", proc_fs_cifs); |
| 704 | remove_proc_entry("smbd_receive_credit_max", proc_fs_cifs); |
| 705 | #endif |
| 706 | remove_proc_entry("fs/cifs", NULL); |
| 707 | } |
| 708 | |
| 709 | static int cifsFYI_proc_show(struct seq_file *m, void *v) |
| 710 | { |
| 711 | seq_printf(m, "%d\n", cifsFYI); |
| 712 | return 0; |
| 713 | } |
| 714 | |
| 715 | static int cifsFYI_proc_open(struct inode *inode, struct file *file) |
| 716 | { |
| 717 | return single_open(file, cifsFYI_proc_show, NULL); |
| 718 | } |
| 719 | |
| 720 | static ssize_t cifsFYI_proc_write(struct file *file, const char __user *buffer, |
| 721 | size_t count, loff_t *ppos) |
| 722 | { |
| 723 | char c[2] = { '\0' }; |
| 724 | bool bv; |
| 725 | int rc; |
| 726 | |
| 727 | rc = get_user(c[0], buffer); |
| 728 | if (rc) |
| 729 | return rc; |
| 730 | if (strtobool(c, &bv) == 0) |
| 731 | cifsFYI = bv; |
| 732 | else if ((c[0] > '1') && (c[0] <= '9')) |
| 733 | cifsFYI = (int) (c[0] - '0'); /* see cifs_debug.h for meanings */ |
| 734 | else |
| 735 | return -EINVAL; |
| 736 | |
| 737 | return count; |
| 738 | } |
| 739 | |
| 740 | static const struct file_operations cifsFYI_proc_fops = { |
| 741 | .open = cifsFYI_proc_open, |
| 742 | .read = seq_read, |
| 743 | .llseek = seq_lseek, |
| 744 | .release = single_release, |
| 745 | .write = cifsFYI_proc_write, |
| 746 | }; |
| 747 | |
| 748 | static int cifs_linux_ext_proc_show(struct seq_file *m, void *v) |
| 749 | { |
| 750 | seq_printf(m, "%d\n", linuxExtEnabled); |
| 751 | return 0; |
| 752 | } |
| 753 | |
| 754 | static int cifs_linux_ext_proc_open(struct inode *inode, struct file *file) |
| 755 | { |
| 756 | return single_open(file, cifs_linux_ext_proc_show, NULL); |
| 757 | } |
| 758 | |
| 759 | static ssize_t cifs_linux_ext_proc_write(struct file *file, |
| 760 | const char __user *buffer, size_t count, loff_t *ppos) |
| 761 | { |
| 762 | int rc; |
| 763 | |
| 764 | rc = kstrtobool_from_user(buffer, count, &linuxExtEnabled); |
| 765 | if (rc) |
| 766 | return rc; |
| 767 | |
| 768 | return count; |
| 769 | } |
| 770 | |
| 771 | static const struct file_operations cifs_linux_ext_proc_fops = { |
| 772 | .open = cifs_linux_ext_proc_open, |
| 773 | .read = seq_read, |
| 774 | .llseek = seq_lseek, |
| 775 | .release = single_release, |
| 776 | .write = cifs_linux_ext_proc_write, |
| 777 | }; |
| 778 | |
| 779 | static int cifs_lookup_cache_proc_show(struct seq_file *m, void *v) |
| 780 | { |
| 781 | seq_printf(m, "%d\n", lookupCacheEnabled); |
| 782 | return 0; |
| 783 | } |
| 784 | |
| 785 | static int cifs_lookup_cache_proc_open(struct inode *inode, struct file *file) |
| 786 | { |
| 787 | return single_open(file, cifs_lookup_cache_proc_show, NULL); |
| 788 | } |
| 789 | |
| 790 | static ssize_t cifs_lookup_cache_proc_write(struct file *file, |
| 791 | const char __user *buffer, size_t count, loff_t *ppos) |
| 792 | { |
| 793 | int rc; |
| 794 | |
| 795 | rc = kstrtobool_from_user(buffer, count, &lookupCacheEnabled); |
| 796 | if (rc) |
| 797 | return rc; |
| 798 | |
| 799 | return count; |
| 800 | } |
| 801 | |
| 802 | static const struct file_operations cifs_lookup_cache_proc_fops = { |
| 803 | .open = cifs_lookup_cache_proc_open, |
| 804 | .read = seq_read, |
| 805 | .llseek = seq_lseek, |
| 806 | .release = single_release, |
| 807 | .write = cifs_lookup_cache_proc_write, |
| 808 | }; |
| 809 | |
| 810 | static int traceSMB_proc_show(struct seq_file *m, void *v) |
| 811 | { |
| 812 | seq_printf(m, "%d\n", traceSMB); |
| 813 | return 0; |
| 814 | } |
| 815 | |
| 816 | static int traceSMB_proc_open(struct inode *inode, struct file *file) |
| 817 | { |
| 818 | return single_open(file, traceSMB_proc_show, NULL); |
| 819 | } |
| 820 | |
| 821 | static ssize_t traceSMB_proc_write(struct file *file, const char __user *buffer, |
| 822 | size_t count, loff_t *ppos) |
| 823 | { |
| 824 | int rc; |
| 825 | |
| 826 | rc = kstrtobool_from_user(buffer, count, &traceSMB); |
| 827 | if (rc) |
| 828 | return rc; |
| 829 | |
| 830 | return count; |
| 831 | } |
| 832 | |
| 833 | static const struct file_operations traceSMB_proc_fops = { |
| 834 | .open = traceSMB_proc_open, |
| 835 | .read = seq_read, |
| 836 | .llseek = seq_lseek, |
| 837 | .release = single_release, |
| 838 | .write = traceSMB_proc_write, |
| 839 | }; |
| 840 | |
| 841 | static int cifs_security_flags_proc_show(struct seq_file *m, void *v) |
| 842 | { |
| 843 | seq_printf(m, "0x%x\n", global_secflags); |
| 844 | return 0; |
| 845 | } |
| 846 | |
| 847 | static int cifs_security_flags_proc_open(struct inode *inode, struct file *file) |
| 848 | { |
| 849 | return single_open(file, cifs_security_flags_proc_show, NULL); |
| 850 | } |
| 851 | |
| 852 | /* |
| 853 | * Ensure that if someone sets a MUST flag, that we disable all other MAY |
| 854 | * flags except for the ones corresponding to the given MUST flag. If there are |
| 855 | * multiple MUST flags, then try to prefer more secure ones. |
| 856 | */ |
| 857 | static void |
| 858 | cifs_security_flags_handle_must_flags(unsigned int *flags) |
| 859 | { |
| 860 | unsigned int signflags = *flags & CIFSSEC_MUST_SIGN; |
| 861 | |
| 862 | if ((*flags & CIFSSEC_MUST_KRB5) == CIFSSEC_MUST_KRB5) |
| 863 | *flags = CIFSSEC_MUST_KRB5; |
| 864 | else if ((*flags & CIFSSEC_MUST_NTLMSSP) == CIFSSEC_MUST_NTLMSSP) |
| 865 | *flags = CIFSSEC_MUST_NTLMSSP; |
| 866 | else if ((*flags & CIFSSEC_MUST_NTLMV2) == CIFSSEC_MUST_NTLMV2) |
| 867 | *flags = CIFSSEC_MUST_NTLMV2; |
| 868 | else if ((*flags & CIFSSEC_MUST_NTLM) == CIFSSEC_MUST_NTLM) |
| 869 | *flags = CIFSSEC_MUST_NTLM; |
| 870 | else if (CIFSSEC_MUST_LANMAN && |
| 871 | (*flags & CIFSSEC_MUST_LANMAN) == CIFSSEC_MUST_LANMAN) |
| 872 | *flags = CIFSSEC_MUST_LANMAN; |
| 873 | else if (CIFSSEC_MUST_PLNTXT && |
| 874 | (*flags & CIFSSEC_MUST_PLNTXT) == CIFSSEC_MUST_PLNTXT) |
| 875 | *flags = CIFSSEC_MUST_PLNTXT; |
| 876 | |
| 877 | *flags |= signflags; |
| 878 | } |
| 879 | |
| 880 | static ssize_t cifs_security_flags_proc_write(struct file *file, |
| 881 | const char __user *buffer, size_t count, loff_t *ppos) |
| 882 | { |
| 883 | int rc; |
| 884 | unsigned int flags; |
| 885 | char flags_string[12]; |
| 886 | bool bv; |
| 887 | |
| 888 | if ((count < 1) || (count > 11)) |
| 889 | return -EINVAL; |
| 890 | |
| 891 | memset(flags_string, 0, 12); |
| 892 | |
| 893 | if (copy_from_user(flags_string, buffer, count)) |
| 894 | return -EFAULT; |
| 895 | |
| 896 | if (count < 3) { |
| 897 | /* single char or single char followed by null */ |
| 898 | if (strtobool(flags_string, &bv) == 0) { |
| 899 | global_secflags = bv ? CIFSSEC_MAX : CIFSSEC_DEF; |
| 900 | return count; |
| 901 | } else if (!isdigit(flags_string[0])) { |
| 902 | cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", |
| 903 | flags_string); |
| 904 | return -EINVAL; |
| 905 | } |
| 906 | } |
| 907 | |
| 908 | /* else we have a number */ |
| 909 | rc = kstrtouint(flags_string, 0, &flags); |
| 910 | if (rc) { |
| 911 | cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", |
| 912 | flags_string); |
| 913 | return rc; |
| 914 | } |
| 915 | |
| 916 | cifs_dbg(FYI, "sec flags 0x%x\n", flags); |
| 917 | |
| 918 | if (flags == 0) { |
| 919 | cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); |
| 920 | return -EINVAL; |
| 921 | } |
| 922 | |
| 923 | if (flags & ~CIFSSEC_MASK) { |
| 924 | cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", |
| 925 | flags & ~CIFSSEC_MASK); |
| 926 | return -EINVAL; |
| 927 | } |
| 928 | |
| 929 | cifs_security_flags_handle_must_flags(&flags); |
| 930 | |
| 931 | /* flags look ok - update the global security flags for cifs module */ |
| 932 | global_secflags = flags; |
| 933 | if (global_secflags & CIFSSEC_MUST_SIGN) { |
| 934 | /* requiring signing implies signing is allowed */ |
| 935 | global_secflags |= CIFSSEC_MAY_SIGN; |
| 936 | cifs_dbg(FYI, "packet signing now required\n"); |
| 937 | } else if ((global_secflags & CIFSSEC_MAY_SIGN) == 0) { |
| 938 | cifs_dbg(FYI, "packet signing disabled\n"); |
| 939 | } |
| 940 | /* BB should we turn on MAY flags for other MUST options? */ |
| 941 | return count; |
| 942 | } |
| 943 | |
| 944 | static const struct file_operations cifs_security_flags_proc_fops = { |
| 945 | .open = cifs_security_flags_proc_open, |
| 946 | .read = seq_read, |
| 947 | .llseek = seq_lseek, |
| 948 | .release = single_release, |
| 949 | .write = cifs_security_flags_proc_write, |
| 950 | }; |
| 951 | #else |
| 952 | inline void cifs_proc_init(void) |
| 953 | { |
| 954 | } |
| 955 | |
| 956 | inline void cifs_proc_clean(void) |
| 957 | { |
| 958 | } |
| 959 | #endif /* PROC_FS */ |