1. 25 11月, 2020 2 次提交
    • J
      Merge tag 'rxrpc-next-20201123' of git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs · 23c01ed3
      Jakub Kicinski 提交于
      David Howells says:
      
      ====================
      rxrpc: Prelude to gssapi support
      
      Here are some patches that do some reorganisation of the security class
      handling in rxrpc to allow implementation of the RxGK security class that
      will allow AF_RXRPC to use GSSAPI-negotiated tokens and better crypto.  The
      RxGK security class is not included in this patchset.
      
      It does the following things:
      
       (1) Add a keyrings patch to provide the original key description, as
           provided to add_key(), to the payload preparser so that it can
           interpret the content on that basis.  Unfortunately, the rxrpc_s key
           type wasn't written to interpret its payload as anything other than a
           string of bytes comprising a key, but for RxGK, more information is
           required as multiple Kerberos enctypes are supported.
      
       (2) Remove the rxk5 security class key parsing.  The rxk5 class never got
           rolled out in OpenAFS and got replaced with rxgk.
      
       (3) Support the creation of rxrpc keys with multiple tokens of different
           types.  If some types are not supported, the ENOPKG error is
           suppressed if at least one other token's type is supported.
      
       (4) Punt the handling of server keys (rxrpc_s type) to the appropriate
           security class.
      
       (5) Organise the security bits in the rxrpc_connection struct into a
           union to make it easier to override for other classes.
      
       (6) Move some bits from core code into rxkad that won't be appropriate to
           rxgk.
      
      * tag 'rxrpc-next-20201123' of git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs:
        rxrpc: Ask the security class how much space to allow in a packet
        rxrpc: rxkad: Don't use pskb_pull() to advance through the response packet
        rxrpc: Organise connection security to use a union
        rxrpc: Don't reserve security header in Tx DATA skbuff
        rxrpc: Merge prime_packet_security into init_connection_security
        rxrpc: Fix example key name in a comment
        rxrpc: Ignore unknown tokens in key payload unless no known tokens
        rxrpc: Make the parsing of xdr payloads more coherent
        rxrpc: Allow security classes to give more info on server keys
        rxrpc: Don't leak the service-side session key to userspace
        rxrpc: Hand server key parsing off to the security class
        rxrpc: Split the server key type (rxrpc_s) into its own file
        rxrpc: Don't retain the server key in the connection
        rxrpc: Support keys with multiple authentication tokens
        rxrpc: List the held token types in the key description in /proc/keys
        rxrpc: Remove the rxk5 security class as it's now defunct
        keys: Provide the original description to the key preparser
      ====================
      
      Link: https://lore.kernel.org/r/160616220405.830164.2239716599743995145.stgit@warthog.procyon.org.ukSigned-off-by: NJakub Kicinski <kuba@kernel.org>
      23c01ed3
    • V
      net: stmmac: Use hrtimer for TX coalescing · d5a05e69
      Vincent Whitchurch 提交于
      This driver uses a normal timer for TX coalescing, which means that the
      with the default tx-usecs of 1000 microseconds the cleanups actually
      happen 10 ms or more later with HZ=100.  This leads to very low
      througput with TCP when bridged to a slow link such as a 4G modem.  Fix
      this by using an hrtimer instead.
      
      On my ARM platform with HZ=100 and the default TX coalescing settings
      (tx-frames 25 tx-usecs 1000), with "tc qdisc add dev eth0 root netem
      delay 60ms 40ms rate 50Mbit" run on the server, netperf's TCP_STREAM
      improves from ~5.5 Mbps to ~100 Mbps.
      Signed-off-by: NVincent Whitchurch <vincent.whitchurch@axis.com>
      Link: https://lore.kernel.org/r/20201120150208.6838-1-vincent.whitchurch@axis.comSigned-off-by: NJakub Kicinski <kuba@kernel.org>
      d5a05e69
  2. 24 11月, 2020 30 次提交
  3. 22 11月, 2020 8 次提交