{"id":807078,"url":"http://patchwork.ozlabs.org/api/1.0/covers/807078/?format=json","project":{"id":7,"url":"http://patchwork.ozlabs.org/api/1.0/projects/7/?format=json","name":"Linux network development","link_name":"netdev","list_id":"netdev.vger.kernel.org","list_email":"netdev@vger.kernel.org","web_url":null,"scm_url":null,"webscm_url":null},"msgid":"<150400960745.21371.15455867950162722742.stgit@warthog.procyon.org.uk>","date":"2017-08-29T12:26:47","name":"[net-next,0/7] rxrpc: Miscellany","submitter":{"id":59,"url":"http://patchwork.ozlabs.org/api/1.0/people/59/?format=json","name":"David Howells","email":"dhowells@redhat.com"},"series":[{"id":358,"url":"http://patchwork.ozlabs.org/api/1.0/series/358/?format=json","date":"2017-08-29T12:27:14","name":"rxrpc: Miscellany","version":1,"mbox":"http://patchwork.ozlabs.org/series/358/mbox/"}],"headers":{"Return-Path":"<netdev-owner@vger.kernel.org>","X-Original-To":"patchwork-incoming@ozlabs.org","Delivered-To":"patchwork-incoming@ozlabs.org","Authentication-Results":["ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=netdev-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)","ext-mx06.extmail.prod.ext.phx2.redhat.com;\n\tdmarc=none (p=none dis=none) header.from=redhat.com","ext-mx06.extmail.prod.ext.phx2.redhat.com;\n\tspf=fail smtp.mailfrom=dhowells@redhat.com"],"Received":["from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3xhScL1TKDz9sNc\n\tfor <patchwork-incoming@ozlabs.org>;\n\tTue, 29 Aug 2017 22:29:06 +1000 (AEST)","(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S1753823AbdH2M0u (ORCPT <rfc822;patchwork-incoming@ozlabs.org>);\n\tTue, 29 Aug 2017 08:26:50 -0400","from mx1.redhat.com ([209.132.183.28]:61652 \"EHLO mx1.redhat.com\"\n\trhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP\n\tid S1751795AbdH2M0t (ORCPT <rfc822;netdev@vger.kernel.org>);\n\tTue, 29 Aug 2017 08:26:49 -0400","from smtp.corp.redhat.com\n\t(int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13])\n\t(using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits))\n\t(No client certificate requested)\n\tby mx1.redhat.com (Postfix) with ESMTPS id 288463680E;\n\tTue, 29 Aug 2017 12:26:49 +0000 (UTC)","from warthog.procyon.org.uk (ovpn-120-50.rdu2.redhat.com\n\t[10.10.120.50])\n\tby smtp.corp.redhat.com (Postfix) with ESMTP id 68C772E07F;\n\tTue, 29 Aug 2017 12:26:48 +0000 (UTC)"],"DMARC-Filter":"OpenDMARC Filter v1.3.2 mx1.redhat.com 288463680E","Subject":"[PATCH net-next 0/7] rxrpc: Miscellany","From":"David Howells <dhowells@redhat.com>","To":"netdev@vger.kernel.org","Cc":"dhowells@redhat.com, linux-afs@lists.infradead.org,\n\tlinux-kernel@vger.kernel.org","Date":"Tue, 29 Aug 2017 13:26:47 +0100","Message-ID":"<150400960745.21371.15455867950162722742.stgit@warthog.procyon.org.uk>","User-Agent":"StGit/0.17.1-dirty","MIME-Version":"1.0","Content-Type":"text/plain; charset=\"utf-8\"","Content-Transfer-Encoding":"7bit","X-Scanned-By":"MIMEDefang 2.79 on 10.5.11.13","X-Greylist":"Sender IP whitelisted, not delayed by milter-greylist-4.5.16\n\t(mx1.redhat.com [10.5.110.30]);\n\tTue, 29 Aug 2017 12:26:49 +0000 (UTC)","Sender":"netdev-owner@vger.kernel.org","Precedence":"bulk","List-ID":"<netdev.vger.kernel.org>","X-Mailing-List":"netdev@vger.kernel.org"},"content":"Here are a number of patches that make some changes/fixes and add a couple\nof extensions to AF_RXRPC for kernel services to use.  The changes and\nfixes are:\n\n (1) Use time64_t rather than u32 outside of protocol or\n     UAPI-representative structures.\n\n (2) Use the correct time stamp when loading a key from an XDR-encoded\n     Kerberos 5 key.\n\n (3) Fix IPv6 support.\n\n (4) Fix some places where the error code is being incorrectly made\n     positive before returning.\n\n (5) Remove some white space.\n\nAnd the extensions:\n\n (6) Add an end-of-Tx phase notification, thereby allowing kAFS to\n     transition the state on its own call record at the correct point,\n     rather than having to do it in advance and risk non-completion of the\n     call in the wrong state.\n\n (7) Allow a kernel client call to be retried if it fails on a network\n     error, thereby making it possible for kAFS to iterate over a number of\n     IP addresses without having to reload the Tx queue and re-encrypt data\n     each time.\n\nThe patches can be found here also:\n\n\thttp://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=rxrpc-next\n\nTagged thusly:\n\n\tgit://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git\n\trxrpc-next-20170829\n\nDavid\n---\nBaolin Wang (1):\n      net: rxrpc: Replace time_t type with time64_t type\n\nDavid Howells (6):\n      rxrpc: Use correct timestamp from Kerberos 5 ticket\n      rxrpc: Fix IPv6 support\n      rxrpc: Don't negate call->error before returning it\n      rxrpc: Remove some excess whitespace\n      rxrpc: Add notification of end-of-Tx phase\n      rxrpc: Allow failed client calls to be retried\n\n\n Documentation/networking/rxrpc.txt |   57 ++++++++++++++++++++\n fs/afs/rxrpc.c                     |   46 ++++++++++++----\n include/keys/rxrpc-type.h          |   23 ++++++++\n include/net/af_rxrpc.h             |   21 +++++++\n net/rxrpc/af_rxrpc.c               |   75 +++++++++++++++++++++++++-\n net/rxrpc/ar-internal.h            |   25 ++++-----\n net/rxrpc/call_accept.c            |    2 -\n net/rxrpc/call_object.c            |  102 ++++++++++++++++++++++++++++++++++--\n net/rxrpc/conn_client.c            |   17 +++++-\n net/rxrpc/conn_object.c            |    2 -\n net/rxrpc/key.c                    |   22 +++++---\n net/rxrpc/local_event.c            |    2 -\n net/rxrpc/output.c                 |    2 -\n net/rxrpc/peer_event.c             |    6 +-\n net/rxrpc/rxkad.c                  |   22 ++++----\n net/rxrpc/sendmsg.c                |   62 +++++++++++++++-------\n net/rxrpc/utils.c                  |   23 ++++++--\n 17 files changed, 419 insertions(+), 90 deletions(-)"}