From patchwork Thu Jan 18 00:13:04 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Steve French X-Patchwork-Id: 1887662 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20230601 header.b=dqGzOJHD; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org (client-ip=2604:1380:4601:e00::3; helo=am.mirrors.kernel.org; envelope-from=linux-cifs+bounces-834-incoming=patchwork.ozlabs.org@vger.kernel.org; receiver=patchwork.ozlabs.org) Received: from am.mirrors.kernel.org (am.mirrors.kernel.org [IPv6:2604:1380:4601:e00::3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4TFjrm3gL0z23dx for ; Thu, 18 Jan 2024 11:13:28 +1100 (AEDT) Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 724BA1F22428 for ; Thu, 18 Jan 2024 00:13:24 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 33389191; Thu, 18 Jan 2024 00:13:20 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="dqGzOJHD" X-Original-To: linux-cifs@vger.kernel.org Received: from mail-lj1-f172.google.com (mail-lj1-f172.google.com [209.85.208.172]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 58810623 for ; Thu, 18 Jan 2024 00:13:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.208.172 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705536800; cv=none; b=Lmg0NykSUrval1AWBcIW+ys2N3jvTXmM30p4nhxcdxHx5eEBSU6HlO8/JQqlBQVFSHDQAhtKXKOWI9DI6fQjmujWTP77C1OY6mXS0l48kvSNEjTdbi1DwyUVp155R5VopF7D2EDYx3p3GVcz/0d5mLcoDvblARu61CJLuynZFgY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705536800; c=relaxed/simple; bh=Tr0wgWj7R3C0gTqnR5lavFZRisnEfi+CxDz0K+TYS0g=; h=Received:DKIM-Signature:X-Google-DKIM-Signature: X-Gm-Message-State:X-Google-Smtp-Source:X-Received:MIME-Version: From:Date:Message-ID:Subject:To:Content-Type; b=nCjikAOSJXUCqwawQjkOxjU4mAEFn+SRqAO76WE73CWcaGlnwBqZ17WEMmmU3YUo992+pLmd4LO/p5iOs9McEfAcq07rKjQ/+YEwhKpcCfmi/Yp5Irn6vRlM5TE4kEvUc/r++e87lYwM6DEU8bpIxtGDEBN9UJj50ecR8r1eN1c= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=dqGzOJHD; arc=none smtp.client-ip=209.85.208.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Received: by mail-lj1-f172.google.com with SMTP id 38308e7fff4ca-2cd1232a2c7so147042731fa.0 for ; Wed, 17 Jan 2024 16:13:17 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1705536796; x=1706141596; darn=vger.kernel.org; h=to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=9i8qODXe002QMPDdMmztpO3Oxegq4Xx5PYFd8vnb1Mk=; b=dqGzOJHDe1RkDgQKJqCkGk0kTRt6LO6BL7yKO2qS0yL9gu89/Zi2kAufsCtKAN1UJf yemiscsl5YFCW1ZZEMlG+WRDNA/kf13ekdG0423Z0dyWSt7HiiDBT62tgCJQmVPRMM61 X8z+ynsXmsR5pX9P+PJPzPVfvfRddGRqt5kHbaAWw0tHKwd9y8PzTdR9dCSCIwFEnZ9k rTqLeUj6ccOFGoIOK0C96L3C18Uu46A/5UVqxMGRE7aDLhfWHi4OP7lUm1t0qkNxSypL zD7rrzxWBkrPkU+INuy0+F9M/PRb+Zf2i5oLDNdJtVNF6XFpoZK1wiNeRnbrlNSgOFnP 79dg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1705536796; x=1706141596; h=to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=9i8qODXe002QMPDdMmztpO3Oxegq4Xx5PYFd8vnb1Mk=; b=LKJxeUfOhSY5AmMk5zrrJ+mzCVju0OW40pgQh5vSZUCoo26JxSwTviCqgylsnlVYZA dBMG7r57Lo2/Ng0GJQrkdiHsc6H76gPhgMGfHDFoDOu1t+5/Zk5k6OAWecs/yPxNzLyC +JHQX+NthPcTRb0Ez/ef/+aux6lJaz4sY6oNpdNf+LNoLr8RN6Ruv/Sj6zWKtOTsly6T tRxTMGNAcFuhcVRr32j66b7jkxR+ivWv9cPW4YvPm27gflKXAwD2LWvZIwXh44VzJ2wj qeW7GVUu+rsKFBiBrxGRRD9lHtGRzmSbL/Y3xtfOVxeASDERUeR3ZLO6/HuLt7wPvSC8 2FSA== X-Gm-Message-State: AOJu0Yz7AxpuyNfRKBgHQkqerClmlyAtpAJaKwo4q3l/xeakXSAczpTX jg0CAf/CrNekMkZBfCD7qHz0GUmh9zz+oIk1hpoUMhIW+ExehCrwa3lHVxcKjPqZlJgwVe5c+Y/ Vqr/jfiJujGKbMPZO+Jvq1knHT+64CQwaO2g= X-Google-Smtp-Source: AGHT+IHMGeObeMHlpTKi87fcxfm2qeR+fumWpCO01/QKmIQ/yRSM0Rfqkq8VYxNHzf5Ye6IVdkQj2a86PY7oiEjMAYk= X-Received: by 2002:a2e:92c1:0:b0:2cd:eab7:4765 with SMTP id k1-20020a2e92c1000000b002cdeab74765mr31604ljh.22.1705536795815; Wed, 17 Jan 2024 16:13:15 -0800 (PST) Precedence: bulk X-Mailing-List: linux-cifs@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 From: Steve French Date: Wed, 17 Jan 2024 18:13:04 -0600 Message-ID: Subject: [PATCH] minor updates to todo and usage for cifs.ko To: CIFS See attached, minor updates to Documentation todo and usage for cifs.ko From 5a6f82ca498c80bb93d0dbcc20098beab1622e6e Mon Sep 17 00:00:00 2001 From: Steve French Date: Wed, 17 Jan 2024 17:59:59 -0600 Subject: [PATCH] smb3: minor documentation updates Update the usage documentation to include some missing configuration options. Update the todo list documentation for cifs.ko Signed-off-by: Steve French --- Documentation/admin-guide/cifs/todo.rst | 31 ++++++++++++++---------- Documentation/admin-guide/cifs/usage.rst | 8 +++++- 2 files changed, 25 insertions(+), 14 deletions(-) diff --git a/Documentation/admin-guide/cifs/todo.rst b/Documentation/admin-guide/cifs/todo.rst index 2646ed2e2d3e..e85ccccad1a5 100644 --- a/Documentation/admin-guide/cifs/todo.rst +++ b/Documentation/admin-guide/cifs/todo.rst @@ -2,7 +2,9 @@ TODO ==== -Version 2.14 December 21, 2018 +As of 6.7 kernel, see + https://wiki.samba.org/index.php/LinuxCIFSKernel +for list of features added by release A Partial List of Missing Features ================================== @@ -12,19 +14,19 @@ for visible, important contributions to this module. Here is a partial list of the known problems and missing features: a) SMB3 (and SMB3.1.1) missing optional features: - - - multichannel (partially integrated), integration of multichannel with RDMA - - directory leases (improved metadata caching). Currently only implemented for root dir + - multichannel performance optimizations, algorithmic channel selection + - directory leases optimizations - T10 copy offload ie "ODX" (copy chunk, and "Duplicate Extents" ioctl currently the only two server side copy mechanisms supported) + - support for faster packet signing (GMAC) + - support for compression over the network -b) improved sparse file support (fiemap and SEEK_HOLE are implemented - but additional features would be supportable by the protocol such - as FALLOC_FL_COLLAPSE_RANGE and FALLOC_FL_INSERT_RANGE) +b) Better optimized compounding and error handling for sparse file support, + perhaps addition of new optional SMB3.1.1 fsctls to make collapse range + and insert range more atomic -c) Directory entry caching relies on a 1 second timer, rather than - using Directory Leases, currently only the root file handle is cached longer - by leveraging Directory Leases +c) Support for SMB3.1.1 over QUIC (and perhaps other socket based protocols + like SCTP) d) quota support (needs minor kernel change since quota calls otherwise won't make it to network filesystems or deviceless filesystems). @@ -92,10 +94,13 @@ t) split cifs and smb3 support into separate modules so legacy (and less v) Additional testing of POSIX Extensions for SMB3.1.1 -w) Add support for additional strong encryption types, and additional spnego - authentication mechanisms (see MS-SMB2). GCM-256 is now partially implemented. +w) Support for the Mac SMB3.1.1 extensions to improve interop with Apple servers + +x) Support for additional authentication options (e.g. IAKERB, peer-to-peer + Kerberos, SCRAM and others supported by existing servers) -x) Finish support for SMB3.1.1 compression +y) Improved tracing, more eBPF trace points, better scripts for performance + analysis Known Bugs ========== diff --git a/Documentation/admin-guide/cifs/usage.rst b/Documentation/admin-guide/cifs/usage.rst index 5f936b4b6018..aa8290a29dc8 100644 --- a/Documentation/admin-guide/cifs/usage.rst +++ b/Documentation/admin-guide/cifs/usage.rst @@ -81,7 +81,7 @@ much older and less secure than the default dialect SMB3 which includes many advanced security features such as downgrade attack detection and encrypted shares and stronger signing and authentication algorithms. There are additional mount options that may be helpful for SMB3 to get -improved POSIX behavior (NB: can use vers=3.0 to force only SMB3, never 2.1): +improved POSIX behavior (NB: can use vers=3 to force SMB3 or later, never 2.1): ``mfsymlinks`` and either ``cifsacl`` or ``modefromsid`` (usually with ``idsfromsid``) @@ -715,6 +715,7 @@ DebugData Displays information about active CIFS sessions and Stats Lists summary resource usage information as well as per share statistics. open_files List all the open file handles on all active SMB sessions. +mount_params List of all mount parameters available for the module ======================= ======================================================= Configuration pseudo-files: @@ -864,6 +865,11 @@ i.e.:: echo "value" > /sys/module/cifs/parameters/ +More detailed descriptions of the available module parameters and their values +can be seen by doing: + + modinfo cifs (or modinfo smb3) + ================= ========================================================== 1. enable_oplocks Enable or disable oplocks. Oplocks are enabled by default. [Y/y/1]. To disable use any of [N/n/0]. -- 2.40.1