1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * 4 * Copyright (C) International Business Machines Corp., 2000,2005 5 * 6 * Modified by Steve French (sfrench@us.ibm.com) 7 */ 8 #include <linux/fs.h> 9 #include <linux/string.h> 10 #include <linux/ctype.h> 11 #include <linux/kstrtox.h> 12 #include <linux/module.h> 13 #include <linux/proc_fs.h> 14 #include <linux/uaccess.h> 15 #include <uapi/linux/ethtool.h> 16 #include "cifspdu.h" 17 #include "cifsglob.h" 18 #include "cifsproto.h" 19 #include "cifs_debug.h" 20 #include "cifsfs.h" 21 #include "fs_context.h" 22 #ifdef CONFIG_CIFS_DFS_UPCALL 23 #include "dfs_cache.h" 24 #endif 25 #ifdef CONFIG_CIFS_SMB_DIRECT 26 #include "smbdirect.h" 27 #endif 28 #include "cifs_swn.h" 29 30 void 31 cifs_dump_mem(char *label, void *data, int length) 32 { 33 pr_debug("%s: dump of %d bytes of data at 0x%p\n", label, length, data); 34 print_hex_dump(KERN_DEBUG, "", DUMP_PREFIX_OFFSET, 16, 4, 35 data, length, true); 36 } 37 38 void cifs_dump_detail(void *buf, struct TCP_Server_Info *server) 39 { 40 #ifdef CONFIG_CIFS_DEBUG2 41 struct smb_hdr *smb = buf; 42 43 cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d Wct: %d\n", 44 smb->Command, smb->Status.CifsError, smb->Flags, 45 smb->Flags2, smb->Mid, smb->Pid, smb->WordCount); 46 if (!server->ops->check_message(buf, server->total_read, server)) { 47 cifs_dbg(VFS, "smb buf %p len %u\n", smb, 48 server->ops->calc_smb_size(smb)); 49 } 50 #endif /* CONFIG_CIFS_DEBUG2 */ 51 } 52 53 void cifs_dump_mids(struct TCP_Server_Info *server) 54 { 55 #ifdef CONFIG_CIFS_DEBUG2 56 struct mid_q_entry *mid_entry; 57 58 if (server == NULL) 59 return; 60 61 cifs_dbg(VFS, "Dump pending requests:\n"); 62 spin_lock(&server->mid_lock); 63 list_for_each_entry(mid_entry, &server->pending_mid_q, qhead) { 64 cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n", 65 mid_entry->mid_state, 66 le16_to_cpu(mid_entry->command), 67 mid_entry->pid, 68 mid_entry->callback_data, 69 mid_entry->mid); 70 #ifdef CONFIG_CIFS_STATS2 71 cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n", 72 mid_entry->large_buf, 73 mid_entry->resp_buf, 74 mid_entry->when_received, 75 jiffies); 76 #endif /* STATS2 */ 77 cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n", 78 mid_entry->multiRsp, mid_entry->multiEnd); 79 if (mid_entry->resp_buf) { 80 cifs_dump_detail(mid_entry->resp_buf, server); 81 cifs_dump_mem("existing buf: ", 82 mid_entry->resp_buf, 62); 83 } 84 } 85 spin_unlock(&server->mid_lock); 86 #endif /* CONFIG_CIFS_DEBUG2 */ 87 } 88 89 #ifdef CONFIG_PROC_FS 90 static void cifs_debug_tcon(struct seq_file *m, struct cifs_tcon *tcon) 91 { 92 __u32 dev_type = le32_to_cpu(tcon->fsDevInfo.DeviceType); 93 94 seq_printf(m, "%s Mounts: %d ", tcon->tree_name, tcon->tc_count); 95 if (tcon->nativeFileSystem) 96 seq_printf(m, "Type: %s ", tcon->nativeFileSystem); 97 seq_printf(m, "DevInfo: 0x%x Attributes: 0x%x\n\tPathComponentMax: %d Status: %d", 98 le32_to_cpu(tcon->fsDevInfo.DeviceCharacteristics), 99 le32_to_cpu(tcon->fsAttrInfo.Attributes), 100 le32_to_cpu(tcon->fsAttrInfo.MaxPathNameComponentLength), 101 tcon->status); 102 if (dev_type == FILE_DEVICE_DISK) 103 seq_puts(m, " type: DISK "); 104 else if (dev_type == FILE_DEVICE_CD_ROM) 105 seq_puts(m, " type: CDROM "); 106 else 107 seq_printf(m, " type: %d ", dev_type); 108 109 seq_printf(m, "Serial Number: 0x%x", tcon->vol_serial_number); 110 111 if ((tcon->seal) || 112 (tcon->ses->session_flags & SMB2_SESSION_FLAG_ENCRYPT_DATA) || 113 (tcon->share_flags & SHI1005_FLAGS_ENCRYPT_DATA)) 114 seq_puts(m, " encrypted"); 115 if (tcon->nocase) 116 seq_printf(m, " nocase"); 117 if (tcon->unix_ext) 118 seq_printf(m, " POSIX Extensions"); 119 if (tcon->ses->server->ops->dump_share_caps) 120 tcon->ses->server->ops->dump_share_caps(m, tcon); 121 if (tcon->use_witness) 122 seq_puts(m, " Witness"); 123 if (tcon->broken_sparse_sup) 124 seq_puts(m, " nosparse"); 125 if (tcon->need_reconnect) 126 seq_puts(m, "\tDISCONNECTED "); 127 spin_lock(&tcon->tc_lock); 128 if (tcon->origin_fullpath) { 129 seq_printf(m, "\n\tDFS origin fullpath: %s", 130 tcon->origin_fullpath); 131 } 132 spin_unlock(&tcon->tc_lock); 133 seq_putc(m, '\n'); 134 } 135 136 static void 137 cifs_dump_channel(struct seq_file *m, int i, struct cifs_chan *chan) 138 { 139 struct TCP_Server_Info *server = chan->server; 140 141 if (!server) { 142 seq_printf(m, "\n\n\t\tChannel: %d DISABLED", i+1); 143 return; 144 } 145 146 seq_printf(m, "\n\n\t\tChannel: %d ConnectionId: 0x%llx" 147 "\n\t\tNumber of credits: %d,%d,%d Dialect 0x%x" 148 "\n\t\tTCP status: %d Instance: %d" 149 "\n\t\tLocal Users To Server: %d SecMode: 0x%x Req On Wire: %d" 150 "\n\t\tIn Send: %d In MaxReq Wait: %d", 151 i+1, server->conn_id, 152 server->credits, 153 server->echo_credits, 154 server->oplock_credits, 155 server->dialect, 156 server->tcpStatus, 157 server->reconnect_instance, 158 server->srv_count, 159 server->sec_mode, 160 in_flight(server), 161 atomic_read(&server->in_send), 162 atomic_read(&server->num_waiters)); 163 #ifdef CONFIG_NET_NS 164 if (server->net) 165 seq_printf(m, " Net namespace: %u ", server->net->ns.inum); 166 #endif /* NET_NS */ 167 168 } 169 170 static inline const char *smb_speed_to_str(size_t bps) 171 { 172 size_t mbps = bps / 1000 / 1000; 173 174 switch (mbps) { 175 case SPEED_10: 176 return "10Mbps"; 177 case SPEED_100: 178 return "100Mbps"; 179 case SPEED_1000: 180 return "1Gbps"; 181 case SPEED_2500: 182 return "2.5Gbps"; 183 case SPEED_5000: 184 return "5Gbps"; 185 case SPEED_10000: 186 return "10Gbps"; 187 case SPEED_14000: 188 return "14Gbps"; 189 case SPEED_20000: 190 return "20Gbps"; 191 case SPEED_25000: 192 return "25Gbps"; 193 case SPEED_40000: 194 return "40Gbps"; 195 case SPEED_50000: 196 return "50Gbps"; 197 case SPEED_56000: 198 return "56Gbps"; 199 case SPEED_100000: 200 return "100Gbps"; 201 case SPEED_200000: 202 return "200Gbps"; 203 case SPEED_400000: 204 return "400Gbps"; 205 case SPEED_800000: 206 return "800Gbps"; 207 default: 208 return "Unknown"; 209 } 210 } 211 212 static void 213 cifs_dump_iface(struct seq_file *m, struct cifs_server_iface *iface) 214 { 215 struct sockaddr_in *ipv4 = (struct sockaddr_in *)&iface->sockaddr; 216 struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)&iface->sockaddr; 217 218 seq_printf(m, "\tSpeed: %s\n", smb_speed_to_str(iface->speed)); 219 seq_puts(m, "\t\tCapabilities: "); 220 if (iface->rdma_capable) 221 seq_puts(m, "rdma "); 222 if (iface->rss_capable) 223 seq_puts(m, "rss "); 224 if (!iface->rdma_capable && !iface->rss_capable) 225 seq_puts(m, "None"); 226 seq_putc(m, '\n'); 227 if (iface->sockaddr.ss_family == AF_INET) 228 seq_printf(m, "\t\tIPv4: %pI4\n", &ipv4->sin_addr); 229 else if (iface->sockaddr.ss_family == AF_INET6) 230 seq_printf(m, "\t\tIPv6: %pI6\n", &ipv6->sin6_addr); 231 if (!iface->is_active) 232 seq_puts(m, "\t\t[for-cleanup]\n"); 233 } 234 235 static int cifs_debug_files_proc_show(struct seq_file *m, void *v) 236 { 237 struct TCP_Server_Info *server; 238 struct cifs_ses *ses; 239 struct cifs_tcon *tcon; 240 struct cifsFileInfo *cfile; 241 242 seq_puts(m, "# Version:1\n"); 243 seq_puts(m, "# Format:\n"); 244 seq_puts(m, "# <tree id> <ses id> <persistent fid> <flags> <count> <pid> <uid>"); 245 #ifdef CONFIG_CIFS_DEBUG2 246 seq_printf(m, " <filename> <mid>\n"); 247 #else 248 seq_printf(m, " <filename>\n"); 249 #endif /* CIFS_DEBUG2 */ 250 spin_lock(&cifs_tcp_ses_lock); 251 list_for_each_entry(server, &cifs_tcp_ses_list, tcp_ses_list) { 252 list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) { 253 if (cifs_ses_exiting(ses)) 254 continue; 255 list_for_each_entry(tcon, &ses->tcon_list, tcon_list) { 256 spin_lock(&tcon->open_file_lock); 257 list_for_each_entry(cfile, &tcon->openFileList, tlist) { 258 seq_printf(m, 259 "0x%x 0x%llx 0x%llx 0x%x %d %d %d %pd", 260 tcon->tid, 261 ses->Suid, 262 cfile->fid.persistent_fid, 263 cfile->f_flags, 264 cfile->count, 265 cfile->pid, 266 from_kuid(&init_user_ns, cfile->uid), 267 cfile->dentry); 268 #ifdef CONFIG_CIFS_DEBUG2 269 seq_printf(m, " %llu\n", cfile->fid.mid); 270 #else 271 seq_printf(m, "\n"); 272 #endif /* CIFS_DEBUG2 */ 273 } 274 spin_unlock(&tcon->open_file_lock); 275 } 276 } 277 } 278 spin_unlock(&cifs_tcp_ses_lock); 279 seq_putc(m, '\n'); 280 return 0; 281 } 282 283 static __always_inline const char *compression_alg_str(__le16 alg) 284 { 285 switch (alg) { 286 case SMB3_COMPRESS_NONE: 287 return "NONE"; 288 case SMB3_COMPRESS_LZNT1: 289 return "LZNT1"; 290 case SMB3_COMPRESS_LZ77: 291 return "LZ77"; 292 case SMB3_COMPRESS_LZ77_HUFF: 293 return "LZ77-Huffman"; 294 case SMB3_COMPRESS_PATTERN: 295 return "Pattern_V1"; 296 default: 297 return "invalid"; 298 } 299 } 300 301 static int cifs_debug_data_proc_show(struct seq_file *m, void *v) 302 { 303 struct mid_q_entry *mid_entry; 304 struct TCP_Server_Info *server; 305 struct TCP_Server_Info *chan_server; 306 struct cifs_ses *ses; 307 struct cifs_tcon *tcon; 308 struct cifs_server_iface *iface; 309 size_t iface_weight = 0, iface_min_speed = 0; 310 struct cifs_server_iface *last_iface = NULL; 311 int c, i, j; 312 313 seq_puts(m, 314 "Display Internal CIFS Data Structures for Debugging\n" 315 "---------------------------------------------------\n"); 316 seq_printf(m, "CIFS Version %s\n", CIFS_VERSION); 317 seq_printf(m, "Features:"); 318 #ifdef CONFIG_CIFS_DFS_UPCALL 319 seq_printf(m, " DFS"); 320 #endif 321 #ifdef CONFIG_CIFS_FSCACHE 322 seq_printf(m, ",FSCACHE"); 323 #endif 324 #ifdef CONFIG_CIFS_SMB_DIRECT 325 seq_printf(m, ",SMB_DIRECT"); 326 #endif 327 #ifdef CONFIG_CIFS_STATS2 328 seq_printf(m, ",STATS2"); 329 #else 330 seq_printf(m, ",STATS"); 331 #endif 332 #ifdef CONFIG_CIFS_DEBUG2 333 seq_printf(m, ",DEBUG2"); 334 #elif defined(CONFIG_CIFS_DEBUG) 335 seq_printf(m, ",DEBUG"); 336 #endif 337 #ifdef CONFIG_CIFS_ALLOW_INSECURE_LEGACY 338 seq_printf(m, ",ALLOW_INSECURE_LEGACY"); 339 #endif 340 #ifdef CONFIG_CIFS_POSIX 341 seq_printf(m, ",CIFS_POSIX"); 342 #endif 343 #ifdef CONFIG_CIFS_UPCALL 344 seq_printf(m, ",UPCALL(SPNEGO)"); 345 #endif 346 #ifdef CONFIG_CIFS_XATTR 347 seq_printf(m, ",XATTR"); 348 #endif 349 seq_printf(m, ",ACL"); 350 #ifdef CONFIG_CIFS_SWN_UPCALL 351 seq_puts(m, ",WITNESS"); 352 #endif 353 seq_putc(m, '\n'); 354 seq_printf(m, "CIFSMaxBufSize: %d\n", CIFSMaxBufSize); 355 seq_printf(m, "Active VFS Requests: %d\n", GlobalTotalActiveXid); 356 357 seq_printf(m, "\nServers: "); 358 359 c = 0; 360 spin_lock(&cifs_tcp_ses_lock); 361 list_for_each_entry(server, &cifs_tcp_ses_list, tcp_ses_list) { 362 /* channel info will be printed as a part of sessions below */ 363 if (SERVER_IS_CHAN(server)) 364 continue; 365 366 c++; 367 seq_printf(m, "\n%d) ConnectionId: 0x%llx ", 368 c, server->conn_id); 369 370 spin_lock(&server->srv_lock); 371 if (server->hostname) 372 seq_printf(m, "Hostname: %s ", server->hostname); 373 seq_printf(m, "\nClientGUID: %pUL", server->client_guid); 374 spin_unlock(&server->srv_lock); 375 #ifdef CONFIG_CIFS_SMB_DIRECT 376 if (!server->rdma) 377 goto skip_rdma; 378 379 if (!server->smbd_conn) { 380 seq_printf(m, "\nSMBDirect transport not available"); 381 goto skip_rdma; 382 } 383 384 seq_printf(m, "\nSMBDirect (in hex) protocol version: %x " 385 "transport status: %x", 386 server->smbd_conn->protocol, 387 server->smbd_conn->transport_status); 388 seq_printf(m, "\nConn receive_credit_max: %x " 389 "send_credit_target: %x max_send_size: %x", 390 server->smbd_conn->receive_credit_max, 391 server->smbd_conn->send_credit_target, 392 server->smbd_conn->max_send_size); 393 seq_printf(m, "\nConn max_fragmented_recv_size: %x " 394 "max_fragmented_send_size: %x max_receive_size:%x", 395 server->smbd_conn->max_fragmented_recv_size, 396 server->smbd_conn->max_fragmented_send_size, 397 server->smbd_conn->max_receive_size); 398 seq_printf(m, "\nConn keep_alive_interval: %x " 399 "max_readwrite_size: %x rdma_readwrite_threshold: %x", 400 server->smbd_conn->keep_alive_interval, 401 server->smbd_conn->max_readwrite_size, 402 server->smbd_conn->rdma_readwrite_threshold); 403 seq_printf(m, "\nDebug count_get_receive_buffer: %x " 404 "count_put_receive_buffer: %x count_send_empty: %x", 405 server->smbd_conn->count_get_receive_buffer, 406 server->smbd_conn->count_put_receive_buffer, 407 server->smbd_conn->count_send_empty); 408 seq_printf(m, "\nRead Queue count_reassembly_queue: %x " 409 "count_enqueue_reassembly_queue: %x " 410 "count_dequeue_reassembly_queue: %x " 411 "fragment_reassembly_remaining: %x " 412 "reassembly_data_length: %x " 413 "reassembly_queue_length: %x", 414 server->smbd_conn->count_reassembly_queue, 415 server->smbd_conn->count_enqueue_reassembly_queue, 416 server->smbd_conn->count_dequeue_reassembly_queue, 417 server->smbd_conn->fragment_reassembly_remaining, 418 server->smbd_conn->reassembly_data_length, 419 server->smbd_conn->reassembly_queue_length); 420 seq_printf(m, "\nCurrent Credits send_credits: %x " 421 "receive_credits: %x receive_credit_target: %x", 422 atomic_read(&server->smbd_conn->send_credits), 423 atomic_read(&server->smbd_conn->receive_credits), 424 server->smbd_conn->receive_credit_target); 425 seq_printf(m, "\nPending send_pending: %x ", 426 atomic_read(&server->smbd_conn->send_pending)); 427 seq_printf(m, "\nReceive buffers count_receive_queue: %x " 428 "count_empty_packet_queue: %x", 429 server->smbd_conn->count_receive_queue, 430 server->smbd_conn->count_empty_packet_queue); 431 seq_printf(m, "\nMR responder_resources: %x " 432 "max_frmr_depth: %x mr_type: %x", 433 server->smbd_conn->responder_resources, 434 server->smbd_conn->max_frmr_depth, 435 server->smbd_conn->mr_type); 436 seq_printf(m, "\nMR mr_ready_count: %x mr_used_count: %x", 437 atomic_read(&server->smbd_conn->mr_ready_count), 438 atomic_read(&server->smbd_conn->mr_used_count)); 439 skip_rdma: 440 #endif 441 seq_printf(m, "\nNumber of credits: %d,%d,%d Dialect 0x%x", 442 server->credits, 443 server->echo_credits, 444 server->oplock_credits, 445 server->dialect); 446 if (server->sign) 447 seq_printf(m, " signed"); 448 if (server->posix_ext_supported) 449 seq_printf(m, " posix"); 450 if (server->nosharesock) 451 seq_printf(m, " nosharesock"); 452 453 seq_printf(m, "\nServer capabilities: 0x%x", server->capabilities); 454 455 if (server->rdma) 456 seq_printf(m, "\nRDMA "); 457 seq_printf(m, "\nTCP status: %d Instance: %d" 458 "\nLocal Users To Server: %d SecMode: 0x%x Req On Wire: %d", 459 server->tcpStatus, 460 server->reconnect_instance, 461 server->srv_count, 462 server->sec_mode, in_flight(server)); 463 #ifdef CONFIG_NET_NS 464 if (server->net) 465 seq_printf(m, " Net namespace: %u ", server->net->ns.inum); 466 #endif /* NET_NS */ 467 468 seq_printf(m, "\nIn Send: %d In MaxReq Wait: %d", 469 atomic_read(&server->in_send), 470 atomic_read(&server->num_waiters)); 471 472 if (server->leaf_fullpath) { 473 seq_printf(m, "\nDFS leaf full path: %s", 474 server->leaf_fullpath); 475 } 476 477 seq_puts(m, "\nCompression: "); 478 if (!server->compression.requested) 479 seq_puts(m, "disabled on mount"); 480 else if (server->compression.enabled) 481 seq_printf(m, "enabled (%s)", compression_alg_str(server->compression.alg)); 482 else 483 seq_puts(m, "disabled (not supported by this server)"); 484 485 seq_printf(m, "\n\n\tSessions: "); 486 i = 0; 487 list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) { 488 spin_lock(&ses->ses_lock); 489 if (ses->ses_status == SES_EXITING) { 490 spin_unlock(&ses->ses_lock); 491 continue; 492 } 493 i++; 494 if ((ses->serverDomain == NULL) || 495 (ses->serverOS == NULL) || 496 (ses->serverNOS == NULL)) { 497 seq_printf(m, "\n\t%d) Address: %s Uses: %d Capability: 0x%x\tSession Status: %d ", 498 i, ses->ip_addr, ses->ses_count, 499 ses->capabilities, ses->ses_status); 500 if (ses->session_flags & SMB2_SESSION_FLAG_IS_GUEST) 501 seq_printf(m, "Guest "); 502 else if (ses->session_flags & SMB2_SESSION_FLAG_IS_NULL) 503 seq_printf(m, "Anonymous "); 504 } else { 505 seq_printf(m, 506 "\n\t%d) Name: %s Domain: %s Uses: %d OS: %s " 507 "\n\tNOS: %s\tCapability: 0x%x" 508 "\n\tSMB session status: %d ", 509 i, ses->ip_addr, ses->serverDomain, 510 ses->ses_count, ses->serverOS, ses->serverNOS, 511 ses->capabilities, ses->ses_status); 512 } 513 if (ses->expired_pwd) 514 seq_puts(m, "password no longer valid "); 515 spin_unlock(&ses->ses_lock); 516 517 seq_printf(m, "\n\tSecurity type: %s ", 518 get_security_type_str(server->ops->select_sectype(server, ses->sectype))); 519 520 /* dump session id helpful for use with network trace */ 521 seq_printf(m, " SessionId: 0x%llx", ses->Suid); 522 if (ses->session_flags & SMB2_SESSION_FLAG_ENCRYPT_DATA) { 523 seq_puts(m, " encrypted"); 524 /* can help in debugging to show encryption type */ 525 if (server->cipher_type == SMB2_ENCRYPTION_AES256_GCM) 526 seq_puts(m, "(gcm256)"); 527 } 528 if (ses->sign) 529 seq_puts(m, " signed"); 530 531 seq_printf(m, "\n\tUser: %d Cred User: %d", 532 from_kuid(&init_user_ns, ses->linux_uid), 533 from_kuid(&init_user_ns, ses->cred_uid)); 534 535 if (ses->dfs_root_ses) { 536 seq_printf(m, "\n\tDFS root session id: 0x%llx", 537 ses->dfs_root_ses->Suid); 538 } 539 540 spin_lock(&ses->chan_lock); 541 if (CIFS_CHAN_NEEDS_RECONNECT(ses, 0)) 542 seq_puts(m, "\tPrimary channel: DISCONNECTED "); 543 if (CIFS_CHAN_IN_RECONNECT(ses, 0)) 544 seq_puts(m, "\t[RECONNECTING] "); 545 546 if (ses->chan_count > 1) { 547 seq_printf(m, "\n\n\tExtra Channels: %zu ", 548 ses->chan_count-1); 549 for (j = 1; j < ses->chan_count; j++) { 550 cifs_dump_channel(m, j, &ses->chans[j]); 551 if (CIFS_CHAN_NEEDS_RECONNECT(ses, j)) 552 seq_puts(m, "\tDISCONNECTED "); 553 if (CIFS_CHAN_IN_RECONNECT(ses, j)) 554 seq_puts(m, "\t[RECONNECTING] "); 555 } 556 } 557 spin_unlock(&ses->chan_lock); 558 559 seq_puts(m, "\n\n\tShares: "); 560 j = 0; 561 562 seq_printf(m, "\n\t%d) IPC: ", j); 563 if (ses->tcon_ipc) 564 cifs_debug_tcon(m, ses->tcon_ipc); 565 else 566 seq_puts(m, "none\n"); 567 568 list_for_each_entry(tcon, &ses->tcon_list, tcon_list) { 569 ++j; 570 seq_printf(m, "\n\t%d) ", j); 571 cifs_debug_tcon(m, tcon); 572 } 573 574 spin_lock(&ses->iface_lock); 575 if (ses->iface_count) 576 seq_printf(m, "\n\n\tServer interfaces: %zu" 577 "\tLast updated: %lu seconds ago", 578 ses->iface_count, 579 (jiffies - ses->iface_last_update) / HZ); 580 581 last_iface = list_last_entry(&ses->iface_list, 582 struct cifs_server_iface, 583 iface_head); 584 iface_min_speed = last_iface->speed; 585 586 j = 0; 587 list_for_each_entry(iface, &ses->iface_list, 588 iface_head) { 589 seq_printf(m, "\n\t%d)", ++j); 590 cifs_dump_iface(m, iface); 591 592 iface_weight = iface->speed / iface_min_speed; 593 seq_printf(m, "\t\tWeight (cur,total): (%zu,%zu)" 594 "\n\t\tAllocated channels: %u\n", 595 iface->weight_fulfilled, 596 iface_weight, 597 iface->num_channels); 598 599 if (is_ses_using_iface(ses, iface)) 600 seq_puts(m, "\t\t[CONNECTED]\n"); 601 } 602 spin_unlock(&ses->iface_lock); 603 604 seq_puts(m, "\n\n\tMIDs: "); 605 spin_lock(&ses->chan_lock); 606 for (j = 0; j < ses->chan_count; j++) { 607 chan_server = ses->chans[j].server; 608 if (!chan_server) 609 continue; 610 611 if (list_empty(&chan_server->pending_mid_q)) 612 continue; 613 614 seq_printf(m, "\n\tServer ConnectionId: 0x%llx", 615 chan_server->conn_id); 616 spin_lock(&chan_server->mid_lock); 617 list_for_each_entry(mid_entry, &chan_server->pending_mid_q, qhead) { 618 seq_printf(m, "\n\t\tState: %d com: %d pid: %d cbdata: %p mid %llu", 619 mid_entry->mid_state, 620 le16_to_cpu(mid_entry->command), 621 mid_entry->pid, 622 mid_entry->callback_data, 623 mid_entry->mid); 624 } 625 spin_unlock(&chan_server->mid_lock); 626 } 627 spin_unlock(&ses->chan_lock); 628 seq_puts(m, "\n--\n"); 629 } 630 if (i == 0) 631 seq_printf(m, "\n\t\t[NONE]"); 632 } 633 if (c == 0) 634 seq_printf(m, "\n\t[NONE]"); 635 636 spin_unlock(&cifs_tcp_ses_lock); 637 seq_putc(m, '\n'); 638 cifs_swn_dump(m); 639 640 /* BB add code to dump additional info such as TCP session info now */ 641 return 0; 642 } 643 644 static ssize_t cifs_stats_proc_write(struct file *file, 645 const char __user *buffer, size_t count, loff_t *ppos) 646 { 647 bool bv; 648 int rc; 649 struct TCP_Server_Info *server; 650 struct cifs_ses *ses; 651 struct cifs_tcon *tcon; 652 653 rc = kstrtobool_from_user(buffer, count, &bv); 654 if (rc == 0) { 655 #ifdef CONFIG_CIFS_STATS2 656 int i; 657 658 atomic_set(&total_buf_alloc_count, 0); 659 atomic_set(&total_small_buf_alloc_count, 0); 660 #endif /* CONFIG_CIFS_STATS2 */ 661 atomic_set(&tcpSesReconnectCount, 0); 662 atomic_set(&tconInfoReconnectCount, 0); 663 664 spin_lock(&GlobalMid_Lock); 665 GlobalMaxActiveXid = 0; 666 GlobalCurrentXid = 0; 667 spin_unlock(&GlobalMid_Lock); 668 spin_lock(&cifs_tcp_ses_lock); 669 list_for_each_entry(server, &cifs_tcp_ses_list, tcp_ses_list) { 670 server->max_in_flight = 0; 671 #ifdef CONFIG_CIFS_STATS2 672 for (i = 0; i < NUMBER_OF_SMB2_COMMANDS; i++) { 673 atomic_set(&server->num_cmds[i], 0); 674 atomic_set(&server->smb2slowcmd[i], 0); 675 server->time_per_cmd[i] = 0; 676 server->slowest_cmd[i] = 0; 677 server->fastest_cmd[0] = 0; 678 } 679 #endif /* CONFIG_CIFS_STATS2 */ 680 list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) { 681 if (cifs_ses_exiting(ses)) 682 continue; 683 list_for_each_entry(tcon, &ses->tcon_list, tcon_list) { 684 atomic_set(&tcon->num_smbs_sent, 0); 685 spin_lock(&tcon->stat_lock); 686 tcon->bytes_read = 0; 687 tcon->bytes_written = 0; 688 tcon->stats_from_time = ktime_get_real_seconds(); 689 spin_unlock(&tcon->stat_lock); 690 if (server->ops->clear_stats) 691 server->ops->clear_stats(tcon); 692 } 693 } 694 } 695 spin_unlock(&cifs_tcp_ses_lock); 696 } else { 697 return rc; 698 } 699 700 return count; 701 } 702 703 static int cifs_stats_proc_show(struct seq_file *m, void *v) 704 { 705 int i; 706 #ifdef CONFIG_CIFS_STATS2 707 int j; 708 #endif /* STATS2 */ 709 struct TCP_Server_Info *server; 710 struct cifs_ses *ses; 711 struct cifs_tcon *tcon; 712 713 seq_printf(m, "Resources in use\nCIFS Session: %d\n", 714 sesInfoAllocCount.counter); 715 seq_printf(m, "Share (unique mount targets): %d\n", 716 tconInfoAllocCount.counter); 717 seq_printf(m, "SMB Request/Response Buffer: %d Pool size: %d\n", 718 buf_alloc_count.counter, 719 cifs_min_rcv + tcpSesAllocCount.counter); 720 seq_printf(m, "SMB Small Req/Resp Buffer: %d Pool size: %d\n", 721 small_buf_alloc_count.counter, cifs_min_small); 722 #ifdef CONFIG_CIFS_STATS2 723 seq_printf(m, "Total Large %d Small %d Allocations\n", 724 atomic_read(&total_buf_alloc_count), 725 atomic_read(&total_small_buf_alloc_count)); 726 #endif /* CONFIG_CIFS_STATS2 */ 727 728 seq_printf(m, "Operations (MIDs): %d\n", atomic_read(&mid_count)); 729 seq_printf(m, 730 "\n%d session %d share reconnects\n", 731 tcpSesReconnectCount.counter, tconInfoReconnectCount.counter); 732 733 seq_printf(m, 734 "Total vfs operations: %d maximum at one time: %d\n", 735 GlobalCurrentXid, GlobalMaxActiveXid); 736 737 i = 0; 738 spin_lock(&cifs_tcp_ses_lock); 739 list_for_each_entry(server, &cifs_tcp_ses_list, tcp_ses_list) { 740 seq_printf(m, "\nMax requests in flight: %d", server->max_in_flight); 741 #ifdef CONFIG_CIFS_STATS2 742 seq_puts(m, "\nTotal time spent processing by command. Time "); 743 seq_printf(m, "units are jiffies (%d per second)\n", HZ); 744 seq_puts(m, " SMB3 CMD\tNumber\tTotal Time\tFastest\tSlowest\n"); 745 seq_puts(m, " --------\t------\t----------\t-------\t-------\n"); 746 for (j = 0; j < NUMBER_OF_SMB2_COMMANDS; j++) 747 seq_printf(m, " %d\t\t%d\t%llu\t\t%u\t%u\n", j, 748 atomic_read(&server->num_cmds[j]), 749 server->time_per_cmd[j], 750 server->fastest_cmd[j], 751 server->slowest_cmd[j]); 752 for (j = 0; j < NUMBER_OF_SMB2_COMMANDS; j++) 753 if (atomic_read(&server->smb2slowcmd[j])) { 754 spin_lock(&server->srv_lock); 755 seq_printf(m, " %d slow responses from %s for command %d\n", 756 atomic_read(&server->smb2slowcmd[j]), 757 server->hostname, j); 758 spin_unlock(&server->srv_lock); 759 } 760 #endif /* STATS2 */ 761 list_for_each_entry(ses, &server->smb_ses_list, smb_ses_list) { 762 if (cifs_ses_exiting(ses)) 763 continue; 764 list_for_each_entry(tcon, &ses->tcon_list, tcon_list) { 765 i++; 766 seq_printf(m, "\n%d) %s", i, tcon->tree_name); 767 if (tcon->need_reconnect) 768 seq_puts(m, "\tDISCONNECTED "); 769 seq_printf(m, "\nSMBs: %d since %ptTs UTC", 770 atomic_read(&tcon->num_smbs_sent), 771 &tcon->stats_from_time); 772 if (server->ops->print_stats) 773 server->ops->print_stats(m, tcon); 774 } 775 } 776 } 777 spin_unlock(&cifs_tcp_ses_lock); 778 779 seq_putc(m, '\n'); 780 return 0; 781 } 782 783 static int cifs_stats_proc_open(struct inode *inode, struct file *file) 784 { 785 return single_open(file, cifs_stats_proc_show, NULL); 786 } 787 788 static const struct proc_ops cifs_stats_proc_ops = { 789 .proc_open = cifs_stats_proc_open, 790 .proc_read = seq_read, 791 .proc_lseek = seq_lseek, 792 .proc_release = single_release, 793 .proc_write = cifs_stats_proc_write, 794 }; 795 796 #ifdef CONFIG_CIFS_SMB_DIRECT 797 #define PROC_FILE_DEFINE(name) \ 798 static ssize_t name##_write(struct file *file, const char __user *buffer, \ 799 size_t count, loff_t *ppos) \ 800 { \ 801 int rc; \ 802 rc = kstrtoint_from_user(buffer, count, 10, &name); \ 803 if (rc) \ 804 return rc; \ 805 return count; \ 806 } \ 807 static int name##_proc_show(struct seq_file *m, void *v) \ 808 { \ 809 seq_printf(m, "%d\n", name); \ 810 return 0; \ 811 } \ 812 static int name##_open(struct inode *inode, struct file *file) \ 813 { \ 814 return single_open(file, name##_proc_show, NULL); \ 815 } \ 816 \ 817 static const struct proc_ops cifs_##name##_proc_fops = { \ 818 .proc_open = name##_open, \ 819 .proc_read = seq_read, \ 820 .proc_lseek = seq_lseek, \ 821 .proc_release = single_release, \ 822 .proc_write = name##_write, \ 823 } 824 825 PROC_FILE_DEFINE(rdma_readwrite_threshold); 826 PROC_FILE_DEFINE(smbd_max_frmr_depth); 827 PROC_FILE_DEFINE(smbd_keep_alive_interval); 828 PROC_FILE_DEFINE(smbd_max_receive_size); 829 PROC_FILE_DEFINE(smbd_max_fragmented_recv_size); 830 PROC_FILE_DEFINE(smbd_max_send_size); 831 PROC_FILE_DEFINE(smbd_send_credit_target); 832 PROC_FILE_DEFINE(smbd_receive_credit_max); 833 #endif 834 835 static struct proc_dir_entry *proc_fs_cifs; 836 static const struct proc_ops cifsFYI_proc_ops; 837 static const struct proc_ops cifs_lookup_cache_proc_ops; 838 static const struct proc_ops traceSMB_proc_ops; 839 static const struct proc_ops cifs_security_flags_proc_ops; 840 static const struct proc_ops cifs_linux_ext_proc_ops; 841 static const struct proc_ops cifs_mount_params_proc_ops; 842 843 void 844 cifs_proc_init(void) 845 { 846 proc_fs_cifs = proc_mkdir("fs/cifs", NULL); 847 if (proc_fs_cifs == NULL) 848 return; 849 850 proc_create_single("DebugData", 0, proc_fs_cifs, 851 cifs_debug_data_proc_show); 852 853 proc_create_single("open_files", 0400, proc_fs_cifs, 854 cifs_debug_files_proc_show); 855 856 proc_create("Stats", 0644, proc_fs_cifs, &cifs_stats_proc_ops); 857 proc_create("cifsFYI", 0644, proc_fs_cifs, &cifsFYI_proc_ops); 858 proc_create("traceSMB", 0644, proc_fs_cifs, &traceSMB_proc_ops); 859 proc_create("LinuxExtensionsEnabled", 0644, proc_fs_cifs, 860 &cifs_linux_ext_proc_ops); 861 proc_create("SecurityFlags", 0644, proc_fs_cifs, 862 &cifs_security_flags_proc_ops); 863 proc_create("LookupCacheEnabled", 0644, proc_fs_cifs, 864 &cifs_lookup_cache_proc_ops); 865 866 proc_create("mount_params", 0444, proc_fs_cifs, &cifs_mount_params_proc_ops); 867 868 #ifdef CONFIG_CIFS_DFS_UPCALL 869 proc_create("dfscache", 0644, proc_fs_cifs, &dfscache_proc_ops); 870 #endif 871 872 #ifdef CONFIG_CIFS_SMB_DIRECT 873 proc_create("rdma_readwrite_threshold", 0644, proc_fs_cifs, 874 &cifs_rdma_readwrite_threshold_proc_fops); 875 proc_create("smbd_max_frmr_depth", 0644, proc_fs_cifs, 876 &cifs_smbd_max_frmr_depth_proc_fops); 877 proc_create("smbd_keep_alive_interval", 0644, proc_fs_cifs, 878 &cifs_smbd_keep_alive_interval_proc_fops); 879 proc_create("smbd_max_receive_size", 0644, proc_fs_cifs, 880 &cifs_smbd_max_receive_size_proc_fops); 881 proc_create("smbd_max_fragmented_recv_size", 0644, proc_fs_cifs, 882 &cifs_smbd_max_fragmented_recv_size_proc_fops); 883 proc_create("smbd_max_send_size", 0644, proc_fs_cifs, 884 &cifs_smbd_max_send_size_proc_fops); 885 proc_create("smbd_send_credit_target", 0644, proc_fs_cifs, 886 &cifs_smbd_send_credit_target_proc_fops); 887 proc_create("smbd_receive_credit_max", 0644, proc_fs_cifs, 888 &cifs_smbd_receive_credit_max_proc_fops); 889 #endif 890 } 891 892 void 893 cifs_proc_clean(void) 894 { 895 if (proc_fs_cifs == NULL) 896 return; 897 898 remove_proc_entry("DebugData", proc_fs_cifs); 899 remove_proc_entry("open_files", proc_fs_cifs); 900 remove_proc_entry("cifsFYI", proc_fs_cifs); 901 remove_proc_entry("traceSMB", proc_fs_cifs); 902 remove_proc_entry("Stats", proc_fs_cifs); 903 remove_proc_entry("SecurityFlags", proc_fs_cifs); 904 remove_proc_entry("LinuxExtensionsEnabled", proc_fs_cifs); 905 remove_proc_entry("LookupCacheEnabled", proc_fs_cifs); 906 remove_proc_entry("mount_params", proc_fs_cifs); 907 908 #ifdef CONFIG_CIFS_DFS_UPCALL 909 remove_proc_entry("dfscache", proc_fs_cifs); 910 #endif 911 #ifdef CONFIG_CIFS_SMB_DIRECT 912 remove_proc_entry("rdma_readwrite_threshold", proc_fs_cifs); 913 remove_proc_entry("smbd_max_frmr_depth", proc_fs_cifs); 914 remove_proc_entry("smbd_keep_alive_interval", proc_fs_cifs); 915 remove_proc_entry("smbd_max_receive_size", proc_fs_cifs); 916 remove_proc_entry("smbd_max_fragmented_recv_size", proc_fs_cifs); 917 remove_proc_entry("smbd_max_send_size", proc_fs_cifs); 918 remove_proc_entry("smbd_send_credit_target", proc_fs_cifs); 919 remove_proc_entry("smbd_receive_credit_max", proc_fs_cifs); 920 #endif 921 remove_proc_entry("fs/cifs", NULL); 922 } 923 924 static int cifsFYI_proc_show(struct seq_file *m, void *v) 925 { 926 seq_printf(m, "%d\n", cifsFYI); 927 return 0; 928 } 929 930 static int cifsFYI_proc_open(struct inode *inode, struct file *file) 931 { 932 return single_open(file, cifsFYI_proc_show, NULL); 933 } 934 935 static ssize_t cifsFYI_proc_write(struct file *file, const char __user *buffer, 936 size_t count, loff_t *ppos) 937 { 938 char c[2] = { '\0' }; 939 bool bv; 940 int rc; 941 942 rc = get_user(c[0], buffer); 943 if (rc) 944 return rc; 945 if (kstrtobool(c, &bv) == 0) 946 cifsFYI = bv; 947 else if ((c[0] > '1') && (c[0] <= '9')) 948 cifsFYI = (int) (c[0] - ''); /* see cifs_debug.h for meanings */ 949 else 950 return -EINVAL; 951 952 return count; 953 } 954 955 static const struct proc_ops cifsFYI_proc_ops = { 956 .proc_open = cifsFYI_proc_open, 957 .proc_read = seq_read, 958 .proc_lseek = seq_lseek, 959 .proc_release = single_release, 960 .proc_write = cifsFYI_proc_write, 961 }; 962 963 static int cifs_linux_ext_proc_show(struct seq_file *m, void *v) 964 { 965 seq_printf(m, "%d\n", linuxExtEnabled); 966 return 0; 967 } 968 969 static int cifs_linux_ext_proc_open(struct inode *inode, struct file *file) 970 { 971 return single_open(file, cifs_linux_ext_proc_show, NULL); 972 } 973 974 static ssize_t cifs_linux_ext_proc_write(struct file *file, 975 const char __user *buffer, size_t count, loff_t *ppos) 976 { 977 int rc; 978 979 rc = kstrtobool_from_user(buffer, count, &linuxExtEnabled); 980 if (rc) 981 return rc; 982 983 return count; 984 } 985 986 static const struct proc_ops cifs_linux_ext_proc_ops = { 987 .proc_open = cifs_linux_ext_proc_open, 988 .proc_read = seq_read, 989 .proc_lseek = seq_lseek, 990 .proc_release = single_release, 991 .proc_write = cifs_linux_ext_proc_write, 992 }; 993 994 static int cifs_lookup_cache_proc_show(struct seq_file *m, void *v) 995 { 996 seq_printf(m, "%d\n", lookupCacheEnabled); 997 return 0; 998 } 999 1000 static int cifs_lookup_cache_proc_open(struct inode *inode, struct file *file) 1001 { 1002 return single_open(file, cifs_lookup_cache_proc_show, NULL); 1003 } 1004 1005 static ssize_t cifs_lookup_cache_proc_write(struct file *file, 1006 const char __user *buffer, size_t count, loff_t *ppos) 1007 { 1008 int rc; 1009 1010 rc = kstrtobool_from_user(buffer, count, &lookupCacheEnabled); 1011 if (rc) 1012 return rc; 1013 1014 return count; 1015 } 1016 1017 static const struct proc_ops cifs_lookup_cache_proc_ops = { 1018 .proc_open = cifs_lookup_cache_proc_open, 1019 .proc_read = seq_read, 1020 .proc_lseek = seq_lseek, 1021 .proc_release = single_release, 1022 .proc_write = cifs_lookup_cache_proc_write, 1023 }; 1024 1025 static int traceSMB_proc_show(struct seq_file *m, void *v) 1026 { 1027 seq_printf(m, "%d\n", traceSMB); 1028 return 0; 1029 } 1030 1031 static int traceSMB_proc_open(struct inode *inode, struct file *file) 1032 { 1033 return single_open(file, traceSMB_proc_show, NULL); 1034 } 1035 1036 static ssize_t traceSMB_proc_write(struct file *file, const char __user *buffer, 1037 size_t count, loff_t *ppos) 1038 { 1039 int rc; 1040 1041 rc = kstrtobool_from_user(buffer, count, &traceSMB); 1042 if (rc) 1043 return rc; 1044 1045 return count; 1046 } 1047 1048 static const struct proc_ops traceSMB_proc_ops = { 1049 .proc_open = traceSMB_proc_open, 1050 .proc_read = seq_read, 1051 .proc_lseek = seq_lseek, 1052 .proc_release = single_release, 1053 .proc_write = traceSMB_proc_write, 1054 }; 1055 1056 static int cifs_security_flags_proc_show(struct seq_file *m, void *v) 1057 { 1058 seq_printf(m, "0x%x\n", global_secflags); 1059 return 0; 1060 } 1061 1062 static int cifs_security_flags_proc_open(struct inode *inode, struct file *file) 1063 { 1064 return single_open(file, cifs_security_flags_proc_show, NULL); 1065 } 1066 1067 /* 1068 * Ensure that if someone sets a MUST flag, that we disable all other MAY 1069 * flags except for the ones corresponding to the given MUST flag. If there are 1070 * multiple MUST flags, then try to prefer more secure ones. 1071 */ 1072 static void 1073 cifs_security_flags_handle_must_flags(unsigned int *flags) 1074 { 1075 unsigned int signflags = *flags & (CIFSSEC_MUST_SIGN | CIFSSEC_MUST_SEAL); 1076 1077 if ((*flags & CIFSSEC_MUST_KRB5) == CIFSSEC_MUST_KRB5) 1078 *flags = CIFSSEC_MUST_KRB5; 1079 else if ((*flags & CIFSSEC_MUST_NTLMSSP) == CIFSSEC_MUST_NTLMSSP) 1080 *flags = CIFSSEC_MUST_NTLMSSP; 1081 else if ((*flags & CIFSSEC_MUST_NTLMV2) == CIFSSEC_MUST_NTLMV2) 1082 *flags = CIFSSEC_MUST_NTLMV2; 1083 1084 *flags |= signflags; 1085 } 1086 1087 static ssize_t cifs_security_flags_proc_write(struct file *file, 1088 const char __user *buffer, size_t count, loff_t *ppos) 1089 { 1090 int rc; 1091 unsigned int flags; 1092 char flags_string[12]; 1093 bool bv; 1094 1095 if ((count < 1) || (count > 11)) 1096 return -EINVAL; 1097 1098 memset(flags_string, 0, 12); 1099 1100 if (copy_from_user(flags_string, buffer, count)) 1101 return -EFAULT; 1102 1103 if (count < 3) { 1104 /* single char or single char followed by null */ 1105 if (kstrtobool(flags_string, &bv) == 0) { 1106 global_secflags = bv ? CIFSSEC_MAX : CIFSSEC_DEF; 1107 return count; 1108 } else if (!isdigit(flags_string[0])) { 1109 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", 1110 flags_string); 1111 return -EINVAL; 1112 } 1113 } 1114 1115 /* else we have a number */ 1116 rc = kstrtouint(flags_string, 0, &flags); 1117 if (rc) { 1118 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", 1119 flags_string); 1120 return rc; 1121 } 1122 1123 cifs_dbg(FYI, "sec flags 0x%x\n", flags); 1124 1125 if (flags == 0) { 1126 cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string); 1127 return -EINVAL; 1128 } 1129 1130 if (flags & ~CIFSSEC_MASK) { 1131 cifs_dbg(VFS, "Unsupported security flags: 0x%x\n", 1132 flags & ~CIFSSEC_MASK); 1133 return -EINVAL; 1134 } 1135 1136 cifs_security_flags_handle_must_flags(&flags); 1137 1138 /* flags look ok - update the global security flags for cifs module */ 1139 global_secflags = flags; 1140 if (global_secflags & CIFSSEC_MUST_SIGN) { 1141 /* requiring signing implies signing is allowed */ 1142 global_secflags |= CIFSSEC_MAY_SIGN; 1143 cifs_dbg(FYI, "packet signing now required\n"); 1144 } else if ((global_secflags & CIFSSEC_MAY_SIGN) == 0) { 1145 cifs_dbg(FYI, "packet signing disabled\n"); 1146 } 1147 /* BB should we turn on MAY flags for other MUST options? */ 1148 return count; 1149 } 1150 1151 static const struct proc_ops cifs_security_flags_proc_ops = { 1152 .proc_open = cifs_security_flags_proc_open, 1153 .proc_read = seq_read, 1154 .proc_lseek = seq_lseek, 1155 .proc_release = single_release, 1156 .proc_write = cifs_security_flags_proc_write, 1157 }; 1158 1159 /* To make it easier to debug, can help to show mount params */ 1160 static int cifs_mount_params_proc_show(struct seq_file *m, void *v) 1161 { 1162 const struct fs_parameter_spec *p; 1163 const char *type; 1164 1165 for (p = smb3_fs_parameters; p->name; p++) { 1166 /* cannot use switch with pointers... */ 1167 if (!p->type) { 1168 if (p->flags == fs_param_neg_with_no) 1169 type = "noflag"; 1170 else 1171 type = "flag"; 1172 } else if (p->type == fs_param_is_bool) 1173 type = "bool"; 1174 else if (p->type == fs_param_is_u32) 1175 type = "u32"; 1176 else if (p->type == fs_param_is_u64) 1177 type = "u64"; 1178 else if (p->type == fs_param_is_string) 1179 type = "string"; 1180 else 1181 type = "unknown"; 1182 1183 seq_printf(m, "%s:%s\n", p->name, type); 1184 } 1185 1186 return 0; 1187 } 1188 1189 static int cifs_mount_params_proc_open(struct inode *inode, struct file *file) 1190 { 1191 return single_open(file, cifs_mount_params_proc_show, NULL); 1192 } 1193 1194 static const struct proc_ops cifs_mount_params_proc_ops = { 1195 .proc_open = cifs_mount_params_proc_open, 1196 .proc_read = seq_read, 1197 .proc_lseek = seq_lseek, 1198 .proc_release = single_release, 1199 /* No need for write for now */ 1200 /* .proc_write = cifs_mount_params_proc_write, */ 1201 }; 1202 1203 #else 1204 inline void cifs_proc_init(void) 1205 { 1206 } 1207 1208 inline void cifs_proc_clean(void) 1209 { 1210 } 1211 #endif /* PROC_FS */ 1212
Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.