cifs: dump Security Type info in DebugData
authorKenneth D'souza <kdsouza@redhat.com>
Thu, 4 Jun 2020 15:44:41 +0000 (21:14 +0530)
committerSteve French <stfrench@microsoft.com>
Thu, 4 Jun 2020 18:50:38 +0000 (13:50 -0500)
Currently the end user is unaware with what sec type the
cifs share is mounted if no sec=<type> option is parsed.
With this patch one can easily check from DebugData.

Example:
1) Name: x.x.x.x Uses: 1 Capability: 0x8001f3fc Session Status: 1 Security type: RawNTLMSSP

Signed-off-by: Kenneth D'souza <kdsouza@redhat.com>
Signed-off-by: Roberto Bergantinos Corpas <rbergant@redhat.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
Acked-by: Aurelien Aptel <aaptel@suse.com>
fs/cifs/cifs_debug.c

index 916567d..3ad1a98 100644 (file)
@@ -221,6 +221,8 @@ static int cifs_debug_data_proc_show(struct seq_file *m, void *v)
        struct cifs_ses *ses;
        struct cifs_tcon *tcon;
        int i, j;
+       const char *security_types[] = {"Unspecified", "LANMAN", "NTLM",
+                                       "NTLMv2", "RawNTLMSSP", "Kerberos"};
 
        seq_puts(m,
                    "Display Internal CIFS Data Structures for Debugging\n"
@@ -375,6 +377,10 @@ skip_rdma:
                                ses->ses_count, ses->serverOS, ses->serverNOS,
                                ses->capabilities, ses->status);
                        }
+
+                       seq_printf(m,"Security type: %s\n",
+                                      security_types[server->ops->select_sectype(server, ses->sectype)]);
+
                        if (server->rdma)
                                seq_printf(m, "RDMA\n\t");
                        seq_printf(m, "TCP status: %d Instance: %d\n\tLocal Users To "