mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-15 23:14:31 +08:00
072a14ec63
As an optimization, SMBD tries to track two types of packets: packets with payload and without payload. There is no obvious benefit or performance gain to separately track two types of packets. Just treat them as pending packets and merge the tracking code. Signed-off-by: Long Li <longli@microsoft.com> Signed-off-by: Steve French <stfrench@microsoft.com>
995 lines
29 KiB
C
995 lines
29 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
/*
|
|
* fs/cifs_debug.c
|
|
*
|
|
* Copyright (C) International Business Machines Corp., 2000,2005
|
|
*
|
|
* Modified by Steve French (sfrench@us.ibm.com)
|
|
*/
|
|
#include <linux/fs.h>
|
|
#include <linux/string.h>
|
|
#include <linux/ctype.h>
|
|
#include <linux/module.h>
|
|
#include <linux/proc_fs.h>
|
|
#include <linux/uaccess.h>
|
|
#include "cifspdu.h"
|
|
#include "cifsglob.h"
|
|
#include "cifsproto.h"
|
|
#include "cifs_debug.h"
|
|
#include "cifsfs.h"
|
|
#ifdef CONFIG_CIFS_DFS_UPCALL
|
|
#include "dfs_cache.h"
|
|
#endif
|
|
#ifdef CONFIG_CIFS_SMB_DIRECT
|
|
#include "smbdirect.h"
|
|
#endif
|
|
|
|
void
|
|
cifs_dump_mem(char *label, void *data, int length)
|
|
{
|
|
pr_debug("%s: dump of %d bytes of data at 0x%p\n", label, length, data);
|
|
print_hex_dump(KERN_DEBUG, "", DUMP_PREFIX_OFFSET, 16, 4,
|
|
data, length, true);
|
|
}
|
|
|
|
void cifs_dump_detail(void *buf, struct TCP_Server_Info *server)
|
|
{
|
|
#ifdef CONFIG_CIFS_DEBUG2
|
|
struct smb_hdr *smb = (struct smb_hdr *)buf;
|
|
|
|
cifs_dbg(VFS, "Cmd: %d Err: 0x%x Flags: 0x%x Flgs2: 0x%x Mid: %d Pid: %d\n",
|
|
smb->Command, smb->Status.CifsError,
|
|
smb->Flags, smb->Flags2, smb->Mid, smb->Pid);
|
|
cifs_dbg(VFS, "smb buf %p len %u\n", smb,
|
|
server->ops->calc_smb_size(smb, server));
|
|
#endif /* CONFIG_CIFS_DEBUG2 */
|
|
}
|
|
|
|
void cifs_dump_mids(struct TCP_Server_Info *server)
|
|
{
|
|
#ifdef CONFIG_CIFS_DEBUG2
|
|
struct list_head *tmp;
|
|
struct mid_q_entry *mid_entry;
|
|
|
|
if (server == NULL)
|
|
return;
|
|
|
|
cifs_dbg(VFS, "Dump pending requests:\n");
|
|
spin_lock(&GlobalMid_Lock);
|
|
list_for_each(tmp, &server->pending_mid_q) {
|
|
mid_entry = list_entry(tmp, struct mid_q_entry, qhead);
|
|
cifs_dbg(VFS, "State: %d Cmd: %d Pid: %d Cbdata: %p Mid %llu\n",
|
|
mid_entry->mid_state,
|
|
le16_to_cpu(mid_entry->command),
|
|
mid_entry->pid,
|
|
mid_entry->callback_data,
|
|
mid_entry->mid);
|
|
#ifdef CONFIG_CIFS_STATS2
|
|
cifs_dbg(VFS, "IsLarge: %d buf: %p time rcv: %ld now: %ld\n",
|
|
mid_entry->large_buf,
|
|
mid_entry->resp_buf,
|
|
mid_entry->when_received,
|
|
jiffies);
|
|
#endif /* STATS2 */
|
|
cifs_dbg(VFS, "IsMult: %d IsEnd: %d\n",
|
|
mid_entry->multiRsp, mid_entry->multiEnd);
|
|
if (mid_entry->resp_buf) {
|
|
cifs_dump_detail(mid_entry->resp_buf, server);
|
|
cifs_dump_mem("existing buf: ",
|
|
mid_entry->resp_buf, 62);
|
|
}
|
|
}
|
|
spin_unlock(&GlobalMid_Lock);
|
|
#endif /* CONFIG_CIFS_DEBUG2 */
|
|
}
|
|
|
|
#ifdef CONFIG_PROC_FS
|
|
static void cifs_debug_tcon(struct seq_file *m, struct cifs_tcon *tcon)
|
|
{
|
|
__u32 dev_type = le32_to_cpu(tcon->fsDevInfo.DeviceType);
|
|
|
|
seq_printf(m, "%s Mounts: %d ", tcon->treeName, tcon->tc_count);
|
|
if (tcon->nativeFileSystem)
|
|
seq_printf(m, "Type: %s ", tcon->nativeFileSystem);
|
|
seq_printf(m, "DevInfo: 0x%x Attributes: 0x%x\n\tPathComponentMax: %d Status: %d",
|
|
le32_to_cpu(tcon->fsDevInfo.DeviceCharacteristics),
|
|
le32_to_cpu(tcon->fsAttrInfo.Attributes),
|
|
le32_to_cpu(tcon->fsAttrInfo.MaxPathNameComponentLength),
|
|
tcon->tidStatus);
|
|
if (dev_type == FILE_DEVICE_DISK)
|
|
seq_puts(m, " type: DISK ");
|
|
else if (dev_type == FILE_DEVICE_CD_ROM)
|
|
seq_puts(m, " type: CDROM ");
|
|
else
|
|
seq_printf(m, " type: %d ", dev_type);
|
|
|
|
seq_printf(m, "Serial Number: 0x%x", tcon->vol_serial_number);
|
|
|
|
if ((tcon->seal) ||
|
|
(tcon->ses->session_flags & SMB2_SESSION_FLAG_ENCRYPT_DATA) ||
|
|
(tcon->share_flags & SHI1005_FLAGS_ENCRYPT_DATA))
|
|
seq_printf(m, " Encrypted");
|
|
if (tcon->nocase)
|
|
seq_printf(m, " nocase");
|
|
if (tcon->unix_ext)
|
|
seq_printf(m, " POSIX Extensions");
|
|
if (tcon->ses->server->ops->dump_share_caps)
|
|
tcon->ses->server->ops->dump_share_caps(m, tcon);
|
|
|
|
if (tcon->need_reconnect)
|
|
seq_puts(m, "\tDISCONNECTED ");
|
|
seq_putc(m, '\n');
|
|
}
|
|
|
|
static void
|
|
cifs_dump_channel(struct seq_file *m, int i, struct cifs_chan *chan)
|
|
{
|
|
struct TCP_Server_Info *server = chan->server;
|
|
|
|
seq_printf(m, "\t\tChannel %d Number of credits: %d Dialect 0x%x "
|
|
"TCP status: %d Instance: %d Local Users To Server: %d "
|
|
"SecMode: 0x%x Req On Wire: %d In Send: %d "
|
|
"In MaxReq Wait: %d\n",
|
|
i+1,
|
|
server->credits,
|
|
server->dialect,
|
|
server->tcpStatus,
|
|
server->reconnect_instance,
|
|
server->srv_count,
|
|
server->sec_mode,
|
|
in_flight(server),
|
|
atomic_read(&server->in_send),
|
|
atomic_read(&server->num_waiters));
|
|
}
|
|
|
|
static void
|
|
cifs_dump_iface(struct seq_file *m, struct cifs_server_iface *iface)
|
|
{
|
|
struct sockaddr_in *ipv4 = (struct sockaddr_in *)&iface->sockaddr;
|
|
struct sockaddr_in6 *ipv6 = (struct sockaddr_in6 *)&iface->sockaddr;
|
|
|
|
seq_printf(m, "\tSpeed: %zu bps\n", iface->speed);
|
|
seq_puts(m, "\t\tCapabilities: ");
|
|
if (iface->rdma_capable)
|
|
seq_puts(m, "rdma ");
|
|
if (iface->rss_capable)
|
|
seq_puts(m, "rss ");
|
|
seq_putc(m, '\n');
|
|
if (iface->sockaddr.ss_family == AF_INET)
|
|
seq_printf(m, "\t\tIPv4: %pI4\n", &ipv4->sin_addr);
|
|
else if (iface->sockaddr.ss_family == AF_INET6)
|
|
seq_printf(m, "\t\tIPv6: %pI6\n", &ipv6->sin6_addr);
|
|
}
|
|
|
|
static int cifs_debug_files_proc_show(struct seq_file *m, void *v)
|
|
{
|
|
struct list_head *stmp, *tmp, *tmp1, *tmp2;
|
|
struct TCP_Server_Info *server;
|
|
struct cifs_ses *ses;
|
|
struct cifs_tcon *tcon;
|
|
struct cifsFileInfo *cfile;
|
|
|
|
seq_puts(m, "# Version:1\n");
|
|
seq_puts(m, "# Format:\n");
|
|
seq_puts(m, "# <tree id> <persistent fid> <flags> <count> <pid> <uid>");
|
|
#ifdef CONFIG_CIFS_DEBUG2
|
|
seq_printf(m, " <filename> <mid>\n");
|
|
#else
|
|
seq_printf(m, " <filename>\n");
|
|
#endif /* CIFS_DEBUG2 */
|
|
spin_lock(&cifs_tcp_ses_lock);
|
|
list_for_each(stmp, &cifs_tcp_ses_list) {
|
|
server = list_entry(stmp, struct TCP_Server_Info,
|
|
tcp_ses_list);
|
|
list_for_each(tmp, &server->smb_ses_list) {
|
|
ses = list_entry(tmp, struct cifs_ses, smb_ses_list);
|
|
list_for_each(tmp1, &ses->tcon_list) {
|
|
tcon = list_entry(tmp1, struct cifs_tcon, tcon_list);
|
|
spin_lock(&tcon->open_file_lock);
|
|
list_for_each(tmp2, &tcon->openFileList) {
|
|
cfile = list_entry(tmp2, struct cifsFileInfo,
|
|
tlist);
|
|
seq_printf(m,
|
|
"0x%x 0x%llx 0x%x %d %d %d %s",
|
|
tcon->tid,
|
|
cfile->fid.persistent_fid,
|
|
cfile->f_flags,
|
|
cfile->count,
|
|
cfile->pid,
|
|
from_kuid(&init_user_ns, cfile->uid),
|
|
cfile->dentry->d_name.name);
|
|
#ifdef CONFIG_CIFS_DEBUG2
|
|
seq_printf(m, " 0x%llx\n", cfile->fid.mid);
|
|
#else
|
|
seq_printf(m, "\n");
|
|
#endif /* CIFS_DEBUG2 */
|
|
}
|
|
spin_unlock(&tcon->open_file_lock);
|
|
}
|
|
}
|
|
}
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
|
seq_putc(m, '\n');
|
|
return 0;
|
|
}
|
|
|
|
static int cifs_debug_data_proc_show(struct seq_file *m, void *v)
|
|
{
|
|
struct list_head *tmp1, *tmp2, *tmp3;
|
|
struct mid_q_entry *mid_entry;
|
|
struct TCP_Server_Info *server;
|
|
struct cifs_ses *ses;
|
|
struct cifs_tcon *tcon;
|
|
int i, j;
|
|
|
|
seq_puts(m,
|
|
"Display Internal CIFS Data Structures for Debugging\n"
|
|
"---------------------------------------------------\n");
|
|
seq_printf(m, "CIFS Version %s\n", CIFS_VERSION);
|
|
seq_printf(m, "Features:");
|
|
#ifdef CONFIG_CIFS_DFS_UPCALL
|
|
seq_printf(m, " DFS");
|
|
#endif
|
|
#ifdef CONFIG_CIFS_FSCACHE
|
|
seq_printf(m, ",FSCACHE");
|
|
#endif
|
|
#ifdef CONFIG_CIFS_SMB_DIRECT
|
|
seq_printf(m, ",SMB_DIRECT");
|
|
#endif
|
|
#ifdef CONFIG_CIFS_STATS2
|
|
seq_printf(m, ",STATS2");
|
|
#else
|
|
seq_printf(m, ",STATS");
|
|
#endif
|
|
#ifdef CONFIG_CIFS_DEBUG2
|
|
seq_printf(m, ",DEBUG2");
|
|
#elif defined(CONFIG_CIFS_DEBUG)
|
|
seq_printf(m, ",DEBUG");
|
|
#endif
|
|
#ifdef CONFIG_CIFS_ALLOW_INSECURE_LEGACY
|
|
seq_printf(m, ",ALLOW_INSECURE_LEGACY");
|
|
#endif
|
|
#ifdef CONFIG_CIFS_WEAK_PW_HASH
|
|
seq_printf(m, ",WEAK_PW_HASH");
|
|
#endif
|
|
#ifdef CONFIG_CIFS_POSIX
|
|
seq_printf(m, ",CIFS_POSIX");
|
|
#endif
|
|
#ifdef CONFIG_CIFS_UPCALL
|
|
seq_printf(m, ",UPCALL(SPNEGO)");
|
|
#endif
|
|
#ifdef CONFIG_CIFS_XATTR
|
|
seq_printf(m, ",XATTR");
|
|
#endif
|
|
seq_printf(m, ",ACL");
|
|
seq_putc(m, '\n');
|
|
seq_printf(m, "CIFSMaxBufSize: %d\n", CIFSMaxBufSize);
|
|
seq_printf(m, "Active VFS Requests: %d\n", GlobalTotalActiveXid);
|
|
seq_printf(m, "Servers:");
|
|
|
|
i = 0;
|
|
spin_lock(&cifs_tcp_ses_lock);
|
|
list_for_each(tmp1, &cifs_tcp_ses_list) {
|
|
server = list_entry(tmp1, struct TCP_Server_Info,
|
|
tcp_ses_list);
|
|
|
|
#ifdef CONFIG_CIFS_SMB_DIRECT
|
|
if (!server->rdma)
|
|
goto skip_rdma;
|
|
|
|
if (!server->smbd_conn) {
|
|
seq_printf(m, "\nSMBDirect transport not available");
|
|
goto skip_rdma;
|
|
}
|
|
|
|
seq_printf(m, "\nSMBDirect (in hex) protocol version: %x "
|
|
"transport status: %x",
|
|
server->smbd_conn->protocol,
|
|
server->smbd_conn->transport_status);
|
|
seq_printf(m, "\nConn receive_credit_max: %x "
|
|
"send_credit_target: %x max_send_size: %x",
|
|
server->smbd_conn->receive_credit_max,
|
|
server->smbd_conn->send_credit_target,
|
|
server->smbd_conn->max_send_size);
|
|
seq_printf(m, "\nConn max_fragmented_recv_size: %x "
|
|
"max_fragmented_send_size: %x max_receive_size:%x",
|
|
server->smbd_conn->max_fragmented_recv_size,
|
|
server->smbd_conn->max_fragmented_send_size,
|
|
server->smbd_conn->max_receive_size);
|
|
seq_printf(m, "\nConn keep_alive_interval: %x "
|
|
"max_readwrite_size: %x rdma_readwrite_threshold: %x",
|
|
server->smbd_conn->keep_alive_interval,
|
|
server->smbd_conn->max_readwrite_size,
|
|
server->smbd_conn->rdma_readwrite_threshold);
|
|
seq_printf(m, "\nDebug count_get_receive_buffer: %x "
|
|
"count_put_receive_buffer: %x count_send_empty: %x",
|
|
server->smbd_conn->count_get_receive_buffer,
|
|
server->smbd_conn->count_put_receive_buffer,
|
|
server->smbd_conn->count_send_empty);
|
|
seq_printf(m, "\nRead Queue count_reassembly_queue: %x "
|
|
"count_enqueue_reassembly_queue: %x "
|
|
"count_dequeue_reassembly_queue: %x "
|
|
"fragment_reassembly_remaining: %x "
|
|
"reassembly_data_length: %x "
|
|
"reassembly_queue_length: %x",
|
|
server->smbd_conn->count_reassembly_queue,
|
|
server->smbd_conn->count_enqueue_reassembly_queue,
|
|
server->smbd_conn->count_dequeue_reassembly_queue,
|
|
server->smbd_conn->fragment_reassembly_remaining,
|
|
server->smbd_conn->reassembly_data_length,
|
|
server->smbd_conn->reassembly_queue_length);
|
|
seq_printf(m, "\nCurrent Credits send_credits: %x "
|
|
"receive_credits: %x receive_credit_target: %x",
|
|
atomic_read(&server->smbd_conn->send_credits),
|
|
atomic_read(&server->smbd_conn->receive_credits),
|
|
server->smbd_conn->receive_credit_target);
|
|
seq_printf(m, "\nPending send_pending: %x ",
|
|
atomic_read(&server->smbd_conn->send_pending));
|
|
seq_printf(m, "\nReceive buffers count_receive_queue: %x "
|
|
"count_empty_packet_queue: %x",
|
|
server->smbd_conn->count_receive_queue,
|
|
server->smbd_conn->count_empty_packet_queue);
|
|
seq_printf(m, "\nMR responder_resources: %x "
|
|
"max_frmr_depth: %x mr_type: %x",
|
|
server->smbd_conn->responder_resources,
|
|
server->smbd_conn->max_frmr_depth,
|
|
server->smbd_conn->mr_type);
|
|
seq_printf(m, "\nMR mr_ready_count: %x mr_used_count: %x",
|
|
atomic_read(&server->smbd_conn->mr_ready_count),
|
|
atomic_read(&server->smbd_conn->mr_used_count));
|
|
skip_rdma:
|
|
#endif
|
|
seq_printf(m, "\nNumber of credits: %d Dialect 0x%x",
|
|
server->credits, server->dialect);
|
|
if (server->compress_algorithm == SMB3_COMPRESS_LZNT1)
|
|
seq_printf(m, " COMPRESS_LZNT1");
|
|
else if (server->compress_algorithm == SMB3_COMPRESS_LZ77)
|
|
seq_printf(m, " COMPRESS_LZ77");
|
|
else if (server->compress_algorithm == SMB3_COMPRESS_LZ77_HUFF)
|
|
seq_printf(m, " COMPRESS_LZ77_HUFF");
|
|
if (server->sign)
|
|
seq_printf(m, " signed");
|
|
if (server->posix_ext_supported)
|
|
seq_printf(m, " posix");
|
|
|
|
i++;
|
|
list_for_each(tmp2, &server->smb_ses_list) {
|
|
ses = list_entry(tmp2, struct cifs_ses,
|
|
smb_ses_list);
|
|
if ((ses->serverDomain == NULL) ||
|
|
(ses->serverOS == NULL) ||
|
|
(ses->serverNOS == NULL)) {
|
|
seq_printf(m, "\n%d) Name: %s Uses: %d Capability: 0x%x\tSession Status: %d ",
|
|
i, ses->serverName, ses->ses_count,
|
|
ses->capabilities, ses->status);
|
|
if (ses->session_flags & SMB2_SESSION_FLAG_IS_GUEST)
|
|
seq_printf(m, "Guest\t");
|
|
else if (ses->session_flags & SMB2_SESSION_FLAG_IS_NULL)
|
|
seq_printf(m, "Anonymous\t");
|
|
} else {
|
|
seq_printf(m,
|
|
"\n%d) Name: %s Domain: %s Uses: %d OS:"
|
|
" %s\n\tNOS: %s\tCapability: 0x%x\n\tSMB"
|
|
" session status: %d ",
|
|
i, ses->serverName, ses->serverDomain,
|
|
ses->ses_count, ses->serverOS, ses->serverNOS,
|
|
ses->capabilities, ses->status);
|
|
}
|
|
if (server->rdma)
|
|
seq_printf(m, "RDMA\n\t");
|
|
seq_printf(m, "TCP status: %d Instance: %d\n\tLocal Users To "
|
|
"Server: %d SecMode: 0x%x Req On Wire: %d",
|
|
server->tcpStatus,
|
|
server->reconnect_instance,
|
|
server->srv_count,
|
|
server->sec_mode, in_flight(server));
|
|
|
|
seq_printf(m, " In Send: %d In MaxReq Wait: %d",
|
|
atomic_read(&server->in_send),
|
|
atomic_read(&server->num_waiters));
|
|
|
|
/* dump session id helpful for use with network trace */
|
|
seq_printf(m, " SessionId: 0x%llx", ses->Suid);
|
|
if (ses->session_flags & SMB2_SESSION_FLAG_ENCRYPT_DATA)
|
|
seq_puts(m, " encrypted");
|
|
if (ses->sign)
|
|
seq_puts(m, " signed");
|
|
|
|
if (ses->chan_count > 1) {
|
|
seq_printf(m, "\n\n\tExtra Channels: %zu\n",
|
|
ses->chan_count-1);
|
|
for (j = 1; j < ses->chan_count; j++)
|
|
cifs_dump_channel(m, j, &ses->chans[j]);
|
|
}
|
|
|
|
seq_puts(m, "\n\tShares:");
|
|
j = 0;
|
|
|
|
seq_printf(m, "\n\t%d) IPC: ", j);
|
|
if (ses->tcon_ipc)
|
|
cifs_debug_tcon(m, ses->tcon_ipc);
|
|
else
|
|
seq_puts(m, "none\n");
|
|
|
|
list_for_each(tmp3, &ses->tcon_list) {
|
|
tcon = list_entry(tmp3, struct cifs_tcon,
|
|
tcon_list);
|
|
++j;
|
|
seq_printf(m, "\n\t%d) ", j);
|
|
cifs_debug_tcon(m, tcon);
|
|
}
|
|
|
|
seq_puts(m, "\n\tMIDs:\n");
|
|
|
|
spin_lock(&GlobalMid_Lock);
|
|
list_for_each(tmp3, &server->pending_mid_q) {
|
|
mid_entry = list_entry(tmp3, struct mid_q_entry,
|
|
qhead);
|
|
seq_printf(m, "\tState: %d com: %d pid:"
|
|
" %d cbdata: %p mid %llu\n",
|
|
mid_entry->mid_state,
|
|
le16_to_cpu(mid_entry->command),
|
|
mid_entry->pid,
|
|
mid_entry->callback_data,
|
|
mid_entry->mid);
|
|
}
|
|
spin_unlock(&GlobalMid_Lock);
|
|
|
|
spin_lock(&ses->iface_lock);
|
|
if (ses->iface_count)
|
|
seq_printf(m, "\n\tServer interfaces: %zu\n",
|
|
ses->iface_count);
|
|
for (j = 0; j < ses->iface_count; j++) {
|
|
struct cifs_server_iface *iface;
|
|
|
|
iface = &ses->iface_list[j];
|
|
seq_printf(m, "\t%d)", j);
|
|
cifs_dump_iface(m, iface);
|
|
if (is_ses_using_iface(ses, iface))
|
|
seq_puts(m, "\t\t[CONNECTED]\n");
|
|
}
|
|
spin_unlock(&ses->iface_lock);
|
|
}
|
|
}
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
|
seq_putc(m, '\n');
|
|
|
|
/* BB add code to dump additional info such as TCP session info now */
|
|
return 0;
|
|
}
|
|
|
|
static ssize_t cifs_stats_proc_write(struct file *file,
|
|
const char __user *buffer, size_t count, loff_t *ppos)
|
|
{
|
|
bool bv;
|
|
int rc;
|
|
struct list_head *tmp1, *tmp2, *tmp3;
|
|
struct TCP_Server_Info *server;
|
|
struct cifs_ses *ses;
|
|
struct cifs_tcon *tcon;
|
|
|
|
rc = kstrtobool_from_user(buffer, count, &bv);
|
|
if (rc == 0) {
|
|
#ifdef CONFIG_CIFS_STATS2
|
|
int i;
|
|
|
|
atomic_set(&totBufAllocCount, 0);
|
|
atomic_set(&totSmBufAllocCount, 0);
|
|
#endif /* CONFIG_CIFS_STATS2 */
|
|
atomic_set(&tcpSesReconnectCount, 0);
|
|
atomic_set(&tconInfoReconnectCount, 0);
|
|
|
|
spin_lock(&GlobalMid_Lock);
|
|
GlobalMaxActiveXid = 0;
|
|
GlobalCurrentXid = 0;
|
|
spin_unlock(&GlobalMid_Lock);
|
|
spin_lock(&cifs_tcp_ses_lock);
|
|
list_for_each(tmp1, &cifs_tcp_ses_list) {
|
|
server = list_entry(tmp1, struct TCP_Server_Info,
|
|
tcp_ses_list);
|
|
server->max_in_flight = 0;
|
|
#ifdef CONFIG_CIFS_STATS2
|
|
for (i = 0; i < NUMBER_OF_SMB2_COMMANDS; i++) {
|
|
atomic_set(&server->num_cmds[i], 0);
|
|
atomic_set(&server->smb2slowcmd[i], 0);
|
|
server->time_per_cmd[i] = 0;
|
|
server->slowest_cmd[i] = 0;
|
|
server->fastest_cmd[0] = 0;
|
|
}
|
|
#endif /* CONFIG_CIFS_STATS2 */
|
|
list_for_each(tmp2, &server->smb_ses_list) {
|
|
ses = list_entry(tmp2, struct cifs_ses,
|
|
smb_ses_list);
|
|
list_for_each(tmp3, &ses->tcon_list) {
|
|
tcon = list_entry(tmp3,
|
|
struct cifs_tcon,
|
|
tcon_list);
|
|
atomic_set(&tcon->num_smbs_sent, 0);
|
|
spin_lock(&tcon->stat_lock);
|
|
tcon->bytes_read = 0;
|
|
tcon->bytes_written = 0;
|
|
spin_unlock(&tcon->stat_lock);
|
|
if (server->ops->clear_stats)
|
|
server->ops->clear_stats(tcon);
|
|
}
|
|
}
|
|
}
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
|
} else {
|
|
return rc;
|
|
}
|
|
|
|
return count;
|
|
}
|
|
|
|
static int cifs_stats_proc_show(struct seq_file *m, void *v)
|
|
{
|
|
int i;
|
|
#ifdef CONFIG_CIFS_STATS2
|
|
int j;
|
|
#endif /* STATS2 */
|
|
struct list_head *tmp1, *tmp2, *tmp3;
|
|
struct TCP_Server_Info *server;
|
|
struct cifs_ses *ses;
|
|
struct cifs_tcon *tcon;
|
|
|
|
seq_printf(m, "Resources in use\nCIFS Session: %d\n",
|
|
sesInfoAllocCount.counter);
|
|
seq_printf(m, "Share (unique mount targets): %d\n",
|
|
tconInfoAllocCount.counter);
|
|
seq_printf(m, "SMB Request/Response Buffer: %d Pool size: %d\n",
|
|
bufAllocCount.counter,
|
|
cifs_min_rcv + tcpSesAllocCount.counter);
|
|
seq_printf(m, "SMB Small Req/Resp Buffer: %d Pool size: %d\n",
|
|
smBufAllocCount.counter, cifs_min_small);
|
|
#ifdef CONFIG_CIFS_STATS2
|
|
seq_printf(m, "Total Large %d Small %d Allocations\n",
|
|
atomic_read(&totBufAllocCount),
|
|
atomic_read(&totSmBufAllocCount));
|
|
#endif /* CONFIG_CIFS_STATS2 */
|
|
|
|
seq_printf(m, "Operations (MIDs): %d\n", atomic_read(&midCount));
|
|
seq_printf(m,
|
|
"\n%d session %d share reconnects\n",
|
|
tcpSesReconnectCount.counter, tconInfoReconnectCount.counter);
|
|
|
|
seq_printf(m,
|
|
"Total vfs operations: %d maximum at one time: %d\n",
|
|
GlobalCurrentXid, GlobalMaxActiveXid);
|
|
|
|
i = 0;
|
|
spin_lock(&cifs_tcp_ses_lock);
|
|
list_for_each(tmp1, &cifs_tcp_ses_list) {
|
|
server = list_entry(tmp1, struct TCP_Server_Info,
|
|
tcp_ses_list);
|
|
seq_printf(m, "\nMax requests in flight: %d", server->max_in_flight);
|
|
#ifdef CONFIG_CIFS_STATS2
|
|
seq_puts(m, "\nTotal time spent processing by command. Time ");
|
|
seq_printf(m, "units are jiffies (%d per second)\n", HZ);
|
|
seq_puts(m, " SMB3 CMD\tNumber\tTotal Time\tFastest\tSlowest\n");
|
|
seq_puts(m, " --------\t------\t----------\t-------\t-------\n");
|
|
for (j = 0; j < NUMBER_OF_SMB2_COMMANDS; j++)
|
|
seq_printf(m, " %d\t\t%d\t%llu\t\t%u\t%u\n", j,
|
|
atomic_read(&server->num_cmds[j]),
|
|
server->time_per_cmd[j],
|
|
server->fastest_cmd[j],
|
|
server->slowest_cmd[j]);
|
|
for (j = 0; j < NUMBER_OF_SMB2_COMMANDS; j++)
|
|
if (atomic_read(&server->smb2slowcmd[j]))
|
|
seq_printf(m, " %d slow responses from %s for command %d\n",
|
|
atomic_read(&server->smb2slowcmd[j]),
|
|
server->hostname, j);
|
|
#endif /* STATS2 */
|
|
list_for_each(tmp2, &server->smb_ses_list) {
|
|
ses = list_entry(tmp2, struct cifs_ses,
|
|
smb_ses_list);
|
|
list_for_each(tmp3, &ses->tcon_list) {
|
|
tcon = list_entry(tmp3,
|
|
struct cifs_tcon,
|
|
tcon_list);
|
|
i++;
|
|
seq_printf(m, "\n%d) %s", i, tcon->treeName);
|
|
if (tcon->need_reconnect)
|
|
seq_puts(m, "\tDISCONNECTED ");
|
|
seq_printf(m, "\nSMBs: %d",
|
|
atomic_read(&tcon->num_smbs_sent));
|
|
if (server->ops->print_stats)
|
|
server->ops->print_stats(m, tcon);
|
|
}
|
|
}
|
|
}
|
|
spin_unlock(&cifs_tcp_ses_lock);
|
|
|
|
seq_putc(m, '\n');
|
|
return 0;
|
|
}
|
|
|
|
static int cifs_stats_proc_open(struct inode *inode, struct file *file)
|
|
{
|
|
return single_open(file, cifs_stats_proc_show, NULL);
|
|
}
|
|
|
|
static const struct proc_ops cifs_stats_proc_ops = {
|
|
.proc_open = cifs_stats_proc_open,
|
|
.proc_read = seq_read,
|
|
.proc_lseek = seq_lseek,
|
|
.proc_release = single_release,
|
|
.proc_write = cifs_stats_proc_write,
|
|
};
|
|
|
|
#ifdef CONFIG_CIFS_SMB_DIRECT
|
|
#define PROC_FILE_DEFINE(name) \
|
|
static ssize_t name##_write(struct file *file, const char __user *buffer, \
|
|
size_t count, loff_t *ppos) \
|
|
{ \
|
|
int rc; \
|
|
rc = kstrtoint_from_user(buffer, count, 10, & name); \
|
|
if (rc) \
|
|
return rc; \
|
|
return count; \
|
|
} \
|
|
static int name##_proc_show(struct seq_file *m, void *v) \
|
|
{ \
|
|
seq_printf(m, "%d\n", name ); \
|
|
return 0; \
|
|
} \
|
|
static int name##_open(struct inode *inode, struct file *file) \
|
|
{ \
|
|
return single_open(file, name##_proc_show, NULL); \
|
|
} \
|
|
\
|
|
static const struct proc_ops cifs_##name##_proc_fops = { \
|
|
.proc_open = name##_open, \
|
|
.proc_read = seq_read, \
|
|
.proc_lseek = seq_lseek, \
|
|
.proc_release = single_release, \
|
|
.proc_write = name##_write, \
|
|
}
|
|
|
|
PROC_FILE_DEFINE(rdma_readwrite_threshold);
|
|
PROC_FILE_DEFINE(smbd_max_frmr_depth);
|
|
PROC_FILE_DEFINE(smbd_keep_alive_interval);
|
|
PROC_FILE_DEFINE(smbd_max_receive_size);
|
|
PROC_FILE_DEFINE(smbd_max_fragmented_recv_size);
|
|
PROC_FILE_DEFINE(smbd_max_send_size);
|
|
PROC_FILE_DEFINE(smbd_send_credit_target);
|
|
PROC_FILE_DEFINE(smbd_receive_credit_max);
|
|
#endif
|
|
|
|
static struct proc_dir_entry *proc_fs_cifs;
|
|
static const struct proc_ops cifsFYI_proc_ops;
|
|
static const struct proc_ops cifs_lookup_cache_proc_ops;
|
|
static const struct proc_ops traceSMB_proc_ops;
|
|
static const struct proc_ops cifs_security_flags_proc_ops;
|
|
static const struct proc_ops cifs_linux_ext_proc_ops;
|
|
|
|
void
|
|
cifs_proc_init(void)
|
|
{
|
|
proc_fs_cifs = proc_mkdir("fs/cifs", NULL);
|
|
if (proc_fs_cifs == NULL)
|
|
return;
|
|
|
|
proc_create_single("DebugData", 0, proc_fs_cifs,
|
|
cifs_debug_data_proc_show);
|
|
|
|
proc_create_single("open_files", 0400, proc_fs_cifs,
|
|
cifs_debug_files_proc_show);
|
|
|
|
proc_create("Stats", 0644, proc_fs_cifs, &cifs_stats_proc_ops);
|
|
proc_create("cifsFYI", 0644, proc_fs_cifs, &cifsFYI_proc_ops);
|
|
proc_create("traceSMB", 0644, proc_fs_cifs, &traceSMB_proc_ops);
|
|
proc_create("LinuxExtensionsEnabled", 0644, proc_fs_cifs,
|
|
&cifs_linux_ext_proc_ops);
|
|
proc_create("SecurityFlags", 0644, proc_fs_cifs,
|
|
&cifs_security_flags_proc_ops);
|
|
proc_create("LookupCacheEnabled", 0644, proc_fs_cifs,
|
|
&cifs_lookup_cache_proc_ops);
|
|
|
|
#ifdef CONFIG_CIFS_DFS_UPCALL
|
|
proc_create("dfscache", 0644, proc_fs_cifs, &dfscache_proc_ops);
|
|
#endif
|
|
|
|
#ifdef CONFIG_CIFS_SMB_DIRECT
|
|
proc_create("rdma_readwrite_threshold", 0644, proc_fs_cifs,
|
|
&cifs_rdma_readwrite_threshold_proc_fops);
|
|
proc_create("smbd_max_frmr_depth", 0644, proc_fs_cifs,
|
|
&cifs_smbd_max_frmr_depth_proc_fops);
|
|
proc_create("smbd_keep_alive_interval", 0644, proc_fs_cifs,
|
|
&cifs_smbd_keep_alive_interval_proc_fops);
|
|
proc_create("smbd_max_receive_size", 0644, proc_fs_cifs,
|
|
&cifs_smbd_max_receive_size_proc_fops);
|
|
proc_create("smbd_max_fragmented_recv_size", 0644, proc_fs_cifs,
|
|
&cifs_smbd_max_fragmented_recv_size_proc_fops);
|
|
proc_create("smbd_max_send_size", 0644, proc_fs_cifs,
|
|
&cifs_smbd_max_send_size_proc_fops);
|
|
proc_create("smbd_send_credit_target", 0644, proc_fs_cifs,
|
|
&cifs_smbd_send_credit_target_proc_fops);
|
|
proc_create("smbd_receive_credit_max", 0644, proc_fs_cifs,
|
|
&cifs_smbd_receive_credit_max_proc_fops);
|
|
#endif
|
|
}
|
|
|
|
void
|
|
cifs_proc_clean(void)
|
|
{
|
|
if (proc_fs_cifs == NULL)
|
|
return;
|
|
|
|
remove_proc_entry("DebugData", proc_fs_cifs);
|
|
remove_proc_entry("open_files", proc_fs_cifs);
|
|
remove_proc_entry("cifsFYI", proc_fs_cifs);
|
|
remove_proc_entry("traceSMB", proc_fs_cifs);
|
|
remove_proc_entry("Stats", proc_fs_cifs);
|
|
remove_proc_entry("SecurityFlags", proc_fs_cifs);
|
|
remove_proc_entry("LinuxExtensionsEnabled", proc_fs_cifs);
|
|
remove_proc_entry("LookupCacheEnabled", proc_fs_cifs);
|
|
|
|
#ifdef CONFIG_CIFS_DFS_UPCALL
|
|
remove_proc_entry("dfscache", proc_fs_cifs);
|
|
#endif
|
|
#ifdef CONFIG_CIFS_SMB_DIRECT
|
|
remove_proc_entry("rdma_readwrite_threshold", proc_fs_cifs);
|
|
remove_proc_entry("smbd_max_frmr_depth", proc_fs_cifs);
|
|
remove_proc_entry("smbd_keep_alive_interval", proc_fs_cifs);
|
|
remove_proc_entry("smbd_max_receive_size", proc_fs_cifs);
|
|
remove_proc_entry("smbd_max_fragmented_recv_size", proc_fs_cifs);
|
|
remove_proc_entry("smbd_max_send_size", proc_fs_cifs);
|
|
remove_proc_entry("smbd_send_credit_target", proc_fs_cifs);
|
|
remove_proc_entry("smbd_receive_credit_max", proc_fs_cifs);
|
|
#endif
|
|
remove_proc_entry("fs/cifs", NULL);
|
|
}
|
|
|
|
static int cifsFYI_proc_show(struct seq_file *m, void *v)
|
|
{
|
|
seq_printf(m, "%d\n", cifsFYI);
|
|
return 0;
|
|
}
|
|
|
|
static int cifsFYI_proc_open(struct inode *inode, struct file *file)
|
|
{
|
|
return single_open(file, cifsFYI_proc_show, NULL);
|
|
}
|
|
|
|
static ssize_t cifsFYI_proc_write(struct file *file, const char __user *buffer,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
char c[2] = { '\0' };
|
|
bool bv;
|
|
int rc;
|
|
|
|
rc = get_user(c[0], buffer);
|
|
if (rc)
|
|
return rc;
|
|
if (strtobool(c, &bv) == 0)
|
|
cifsFYI = bv;
|
|
else if ((c[0] > '1') && (c[0] <= '9'))
|
|
cifsFYI = (int) (c[0] - '0'); /* see cifs_debug.h for meanings */
|
|
else
|
|
return -EINVAL;
|
|
|
|
return count;
|
|
}
|
|
|
|
static const struct proc_ops cifsFYI_proc_ops = {
|
|
.proc_open = cifsFYI_proc_open,
|
|
.proc_read = seq_read,
|
|
.proc_lseek = seq_lseek,
|
|
.proc_release = single_release,
|
|
.proc_write = cifsFYI_proc_write,
|
|
};
|
|
|
|
static int cifs_linux_ext_proc_show(struct seq_file *m, void *v)
|
|
{
|
|
seq_printf(m, "%d\n", linuxExtEnabled);
|
|
return 0;
|
|
}
|
|
|
|
static int cifs_linux_ext_proc_open(struct inode *inode, struct file *file)
|
|
{
|
|
return single_open(file, cifs_linux_ext_proc_show, NULL);
|
|
}
|
|
|
|
static ssize_t cifs_linux_ext_proc_write(struct file *file,
|
|
const char __user *buffer, size_t count, loff_t *ppos)
|
|
{
|
|
int rc;
|
|
|
|
rc = kstrtobool_from_user(buffer, count, &linuxExtEnabled);
|
|
if (rc)
|
|
return rc;
|
|
|
|
return count;
|
|
}
|
|
|
|
static const struct proc_ops cifs_linux_ext_proc_ops = {
|
|
.proc_open = cifs_linux_ext_proc_open,
|
|
.proc_read = seq_read,
|
|
.proc_lseek = seq_lseek,
|
|
.proc_release = single_release,
|
|
.proc_write = cifs_linux_ext_proc_write,
|
|
};
|
|
|
|
static int cifs_lookup_cache_proc_show(struct seq_file *m, void *v)
|
|
{
|
|
seq_printf(m, "%d\n", lookupCacheEnabled);
|
|
return 0;
|
|
}
|
|
|
|
static int cifs_lookup_cache_proc_open(struct inode *inode, struct file *file)
|
|
{
|
|
return single_open(file, cifs_lookup_cache_proc_show, NULL);
|
|
}
|
|
|
|
static ssize_t cifs_lookup_cache_proc_write(struct file *file,
|
|
const char __user *buffer, size_t count, loff_t *ppos)
|
|
{
|
|
int rc;
|
|
|
|
rc = kstrtobool_from_user(buffer, count, &lookupCacheEnabled);
|
|
if (rc)
|
|
return rc;
|
|
|
|
return count;
|
|
}
|
|
|
|
static const struct proc_ops cifs_lookup_cache_proc_ops = {
|
|
.proc_open = cifs_lookup_cache_proc_open,
|
|
.proc_read = seq_read,
|
|
.proc_lseek = seq_lseek,
|
|
.proc_release = single_release,
|
|
.proc_write = cifs_lookup_cache_proc_write,
|
|
};
|
|
|
|
static int traceSMB_proc_show(struct seq_file *m, void *v)
|
|
{
|
|
seq_printf(m, "%d\n", traceSMB);
|
|
return 0;
|
|
}
|
|
|
|
static int traceSMB_proc_open(struct inode *inode, struct file *file)
|
|
{
|
|
return single_open(file, traceSMB_proc_show, NULL);
|
|
}
|
|
|
|
static ssize_t traceSMB_proc_write(struct file *file, const char __user *buffer,
|
|
size_t count, loff_t *ppos)
|
|
{
|
|
int rc;
|
|
|
|
rc = kstrtobool_from_user(buffer, count, &traceSMB);
|
|
if (rc)
|
|
return rc;
|
|
|
|
return count;
|
|
}
|
|
|
|
static const struct proc_ops traceSMB_proc_ops = {
|
|
.proc_open = traceSMB_proc_open,
|
|
.proc_read = seq_read,
|
|
.proc_lseek = seq_lseek,
|
|
.proc_release = single_release,
|
|
.proc_write = traceSMB_proc_write,
|
|
};
|
|
|
|
static int cifs_security_flags_proc_show(struct seq_file *m, void *v)
|
|
{
|
|
seq_printf(m, "0x%x\n", global_secflags);
|
|
return 0;
|
|
}
|
|
|
|
static int cifs_security_flags_proc_open(struct inode *inode, struct file *file)
|
|
{
|
|
return single_open(file, cifs_security_flags_proc_show, NULL);
|
|
}
|
|
|
|
/*
|
|
* Ensure that if someone sets a MUST flag, that we disable all other MAY
|
|
* flags except for the ones corresponding to the given MUST flag. If there are
|
|
* multiple MUST flags, then try to prefer more secure ones.
|
|
*/
|
|
static void
|
|
cifs_security_flags_handle_must_flags(unsigned int *flags)
|
|
{
|
|
unsigned int signflags = *flags & CIFSSEC_MUST_SIGN;
|
|
|
|
if ((*flags & CIFSSEC_MUST_KRB5) == CIFSSEC_MUST_KRB5)
|
|
*flags = CIFSSEC_MUST_KRB5;
|
|
else if ((*flags & CIFSSEC_MUST_NTLMSSP) == CIFSSEC_MUST_NTLMSSP)
|
|
*flags = CIFSSEC_MUST_NTLMSSP;
|
|
else if ((*flags & CIFSSEC_MUST_NTLMV2) == CIFSSEC_MUST_NTLMV2)
|
|
*flags = CIFSSEC_MUST_NTLMV2;
|
|
else if ((*flags & CIFSSEC_MUST_NTLM) == CIFSSEC_MUST_NTLM)
|
|
*flags = CIFSSEC_MUST_NTLM;
|
|
else if (CIFSSEC_MUST_LANMAN &&
|
|
(*flags & CIFSSEC_MUST_LANMAN) == CIFSSEC_MUST_LANMAN)
|
|
*flags = CIFSSEC_MUST_LANMAN;
|
|
else if (CIFSSEC_MUST_PLNTXT &&
|
|
(*flags & CIFSSEC_MUST_PLNTXT) == CIFSSEC_MUST_PLNTXT)
|
|
*flags = CIFSSEC_MUST_PLNTXT;
|
|
|
|
*flags |= signflags;
|
|
}
|
|
|
|
static ssize_t cifs_security_flags_proc_write(struct file *file,
|
|
const char __user *buffer, size_t count, loff_t *ppos)
|
|
{
|
|
int rc;
|
|
unsigned int flags;
|
|
char flags_string[12];
|
|
bool bv;
|
|
|
|
if ((count < 1) || (count > 11))
|
|
return -EINVAL;
|
|
|
|
memset(flags_string, 0, 12);
|
|
|
|
if (copy_from_user(flags_string, buffer, count))
|
|
return -EFAULT;
|
|
|
|
if (count < 3) {
|
|
/* single char or single char followed by null */
|
|
if (strtobool(flags_string, &bv) == 0) {
|
|
global_secflags = bv ? CIFSSEC_MAX : CIFSSEC_DEF;
|
|
return count;
|
|
} else if (!isdigit(flags_string[0])) {
|
|
cifs_dbg(VFS, "Invalid SecurityFlags: %s\n",
|
|
flags_string);
|
|
return -EINVAL;
|
|
}
|
|
}
|
|
|
|
/* else we have a number */
|
|
rc = kstrtouint(flags_string, 0, &flags);
|
|
if (rc) {
|
|
cifs_dbg(VFS, "Invalid SecurityFlags: %s\n",
|
|
flags_string);
|
|
return rc;
|
|
}
|
|
|
|
cifs_dbg(FYI, "sec flags 0x%x\n", flags);
|
|
|
|
if (flags == 0) {
|
|
cifs_dbg(VFS, "Invalid SecurityFlags: %s\n", flags_string);
|
|
return -EINVAL;
|
|
}
|
|
|
|
if (flags & ~CIFSSEC_MASK) {
|
|
cifs_dbg(VFS, "Unsupported security flags: 0x%x\n",
|
|
flags & ~CIFSSEC_MASK);
|
|
return -EINVAL;
|
|
}
|
|
|
|
cifs_security_flags_handle_must_flags(&flags);
|
|
|
|
/* flags look ok - update the global security flags for cifs module */
|
|
global_secflags = flags;
|
|
if (global_secflags & CIFSSEC_MUST_SIGN) {
|
|
/* requiring signing implies signing is allowed */
|
|
global_secflags |= CIFSSEC_MAY_SIGN;
|
|
cifs_dbg(FYI, "packet signing now required\n");
|
|
} else if ((global_secflags & CIFSSEC_MAY_SIGN) == 0) {
|
|
cifs_dbg(FYI, "packet signing disabled\n");
|
|
}
|
|
/* BB should we turn on MAY flags for other MUST options? */
|
|
return count;
|
|
}
|
|
|
|
static const struct proc_ops cifs_security_flags_proc_ops = {
|
|
.proc_open = cifs_security_flags_proc_open,
|
|
.proc_read = seq_read,
|
|
.proc_lseek = seq_lseek,
|
|
.proc_release = single_release,
|
|
.proc_write = cifs_security_flags_proc_write,
|
|
};
|
|
#else
|
|
inline void cifs_proc_init(void)
|
|
{
|
|
}
|
|
|
|
inline void cifs_proc_clean(void)
|
|
{
|
|
}
|
|
#endif /* PROC_FS */
|