Show a cover letter.

GET /api/1.1/covers/2229782/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2229782,
    "url": "http://patchwork.ozlabs.org/api/1.1/covers/2229782/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260428175725.72050-1-ja@ssi.bg/",
    "project": {
        "id": 26,
        "url": "http://patchwork.ozlabs.org/api/1.1/projects/26/?format=api",
        "name": "Netfilter Development",
        "link_name": "netfilter-devel",
        "list_id": "netfilter-devel.vger.kernel.org",
        "list_email": "netfilter-devel@vger.kernel.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null
    },
    "msgid": "<20260428175725.72050-1-ja@ssi.bg>",
    "date": "2026-04-28T17:57:18",
    "name": "[nf,0/7] IPVS fixes for nf",
    "submitter": {
        "id": 2825,
        "url": "http://patchwork.ozlabs.org/api/1.1/people/2825/?format=api",
        "name": "Julian Anastasov",
        "email": "ja@ssi.bg"
    },
    "mbox": "http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260428175725.72050-1-ja@ssi.bg/mbox/",
    "series": [
        {
            "id": 501917,
            "url": "http://patchwork.ozlabs.org/api/1.1/series/501917/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/netfilter-devel/list/?series=501917",
            "date": "2026-04-28T17:57:19",
            "name": "IPVS fixes for nf",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/501917/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/covers/2229782/comments/",
    "headers": {
        "Return-Path": "\n <netfilter-devel+bounces-12267-incoming=patchwork.ozlabs.org@vger.kernel.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "netfilter-devel@vger.kernel.org"
        ],
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (4096-bit key;\n unprotected) header.d=ssi.bg header.i=@ssi.bg header.a=rsa-sha256\n header.s=ssi header.b=OK6PhHZV;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c04:e001:36c::12fc:5321; helo=tor.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-12267-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)",
            "smtp.subspace.kernel.org;\n\tdkim=pass (4096-bit key) header.d=ssi.bg header.i=@ssi.bg header.b=\"OK6PhHZV\"",
            "smtp.subspace.kernel.org;\n arc=none smtp.client-ip=193.238.174.39",
            "smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=ssi.bg",
            "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=ssi.bg"
        ],
        "Received": [
            "from tor.lore.kernel.org (tor.lore.kernel.org\n [IPv6:2600:3c04:e001:36c::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g4pC857pBz1xvV\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 29 Apr 2026 04:01:08 +1000 (AEST)",
            "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby tor.lore.kernel.org (Postfix) with ESMTP id 8A81B301AAB3\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 28 Apr 2026 18:01:06 +0000 (UTC)",
            "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 31FEB44D022;\n\tTue, 28 Apr 2026 18:01:06 +0000 (UTC)",
            "from mx.ssi.bg (mx.ssi.bg [193.238.174.39])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 871BA27E045;\n\tTue, 28 Apr 2026 18:01:02 +0000 (UTC)",
            "from mx.ssi.bg (localhost [127.0.0.1])\n\tby mx.ssi.bg (Potsfix) with ESMTP id AB608212E8;\n\tTue, 28 Apr 2026 21:00:54 +0300 (EEST)",
            "from box.ssi.bg (box.ssi.bg [193.238.174.46])\n\tby mx.ssi.bg (Potsfix) with ESMTPS;\n\tTue, 28 Apr 2026 21:00:53 +0300 (EEST)",
            "from ja.ssi.bg (unknown [213.16.62.126])\n\tby box.ssi.bg (Potsfix) with ESMTPSA id 9E9D462902;\n\tTue, 28 Apr 2026 21:00:52 +0300 (EEST)",
            "from ja.home.ssi.bg (localhost.localdomain [127.0.0.1])\n\tby ja.ssi.bg (8.18.1/8.18.1) with ESMTP id 63SHvmJD072078;\n\tTue, 28 Apr 2026 20:57:48 +0300",
            "(from root@localhost)\n\tby ja.home.ssi.bg (8.18.1/8.18.1/Submit) id 63SHvkB6072076;\n\tTue, 28 Apr 2026 20:57:46 +0300"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1777399264; cv=none;\n b=NnqDyfOvQ+4IyMAnM1n+gy8dERrEfHXSIhNrweeBEW85qN3KBXbVRSLMEYvvaBwdbGgySyj7lM+1JWcAkuEXAdd4oRmSD8xjxjCXYNaLCA92dMBEwbpfyP2yG2yoRIo/hozpF5b8dSZjKaCJ88lj4a7hKphofJ0vCiArqw3nJh8=",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1777399264; c=relaxed/simple;\n\tbh=P5oh7R4o0xFOfhPvD27lFRyTEccAfIrpV5bZ6UfOayw=;\n\th=From:To:Cc:Subject:Date:Message-ID:MIME-Version;\n b=jwYPKHVuheLCr/1dWssFOxnFJFB4g4ZzJqTBp+i1Ot32icbNAgs24uf+rSe8NoTIx6pgbZhtIuSa/JHEFIIbm/rnFbmtETll4bju5CM97h2iFEr7cUeSZCB81aGdM33I7PFAbL2cwcYGbxRY6cGFg2tIFq+9Y5gG2XayFUsK/UY=",
        "ARC-Authentication-Results": "i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=ssi.bg;\n spf=pass smtp.mailfrom=ssi.bg;\n dkim=pass (4096-bit key) header.d=ssi.bg header.i=@ssi.bg header.b=OK6PhHZV;\n arc=none smtp.client-ip=193.238.174.39",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=ssi.bg; h=cc:cc\n\t:content-transfer-encoding:date:from:from:message-id\n\t:mime-version:reply-to:subject:subject:to:to; s=ssi; bh=tw7H3kER\n\tOqKJbQMovylro4lI5okdam/U9KOsRQsbeZU=; b=OK6PhHZVt51eyUlW8q0Yhh0x\n\twRzuvwz6/KhRmqqhoWkHWj/i63IT77Gyma1Q6mpTr6R1FK2xp+6ahfiOHOujhVgy\n\tFEnws7eoD3FZv54bdjiB3VLjf5CnkNAsTNF+ysRaCgCy2NrhMFEhSxAkvHTKZW/i\n\t7lCSY2+CXBDcy8xxcVuH4iZJMzTWTzTplL3hGR5DmA/gqYY2hyn9rUc1Y70hfem6\n\t6GUJIWSd1R25VsmUWOfrN9++44iK2fhZhAf9RR2PjY7iYAoDFXx4y7AK+SijC7I1\n\tsdGCt0KK2/tToMAuFJa+/4FmeILqJtoXVMUfbj5FhxJO8iQi9ThaxHgU3tgzar95\n\tZFV3V9mgqAM2Vsj6XidPUZhdolzUsATrV2zrbZuq0PtmTaaBryb73aVKnjHxrQgX\n\tP7a7Ia0bHjbs5eR6WDcIPtcgZM8NxS+ngF4uWIF1wDT4oAre7U2b6JGt04fJQR5e\n\tUqOt18XJ9kozVNQr4vBYLjyHDaOld3J2ROVKuZks4bfNA1Nqm3IGEaEalfp0ldUR\n\tFjFijR6GjzVBMF/P9/4Xg7L4Lc8mWIFp0nSiJAAChtjuJztvqp8DPREzWvVqicHX\n\tFTuYwhnbeF6h3gapVCog1GYjlr5xvd0/x3dD8+2aODkyrX4P/N70p5fwdhzpJPeb\n\tKFIEc5ACEBfUbVqfgDo=",
        "From": "Julian Anastasov <ja@ssi.bg>",
        "To": "Simon Horman <horms@verge.net.au>",
        "Cc": "Pablo Neira Ayuso <pablo@netfilter.org>, Florian Westphal <fw@strlen.de>,\n        Waiman Long <longman@redhat.com>, lvs-devel@vger.kernel.org,\n        netfilter-devel@vger.kernel.org",
        "Subject": "[PATCH nf 0/7] IPVS fixes for nf",
        "Date": "Tue, 28 Apr 2026 20:57:18 +0300",
        "Message-ID": "<20260428175725.72050-1-ja@ssi.bg>",
        "X-Mailer": "git-send-email 2.53.0",
        "Precedence": "bulk",
        "X-Mailing-List": "netfilter-devel@vger.kernel.org",
        "List-Id": "<netfilter-devel.vger.kernel.org>",
        "List-Subscribe": "<mailto:netfilter-devel+subscribe@vger.kernel.org>",
        "List-Unsubscribe": "<mailto:netfilter-devel+unsubscribe@vger.kernel.org>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit"
    },
    "content": "Hello,\n\n        This patchset contains accumulated fixes for the nf tree:\n\n1-3) Fixes for the recently added resizable hash tables (v5)\n\n4) fixed races and locking for the estimation kthreads (v5)\n\n5) fix for wrong roundup_pow_of_two() usage in the resizable hash\n   tables\n\n6-7) v2 of the changes from Waiman Long to properly guard against\n  the housekeeping_cpumask() updates:\n\n  https://lore.kernel.org/netfilter-devel/20260331165015.2777765-1-longman@redhat.com/\n\n  I added Fixes tag to the 7th patch. The original description:\n\n  Since commit 041ee6f3727a (\"kthread: Rely on HK_TYPE_DOMAIN for preferred\n  affinity management\"), the HK_TYPE_KTHREAD housekeeping cpumask may no\n  longer be correct in showing the actual CPU affinity of kthreads that\n  have no predefined CPU affinity. As the ipvs networking code is still\n  using HK_TYPE_KTHREAD, we need to make HK_TYPE_KTHREAD reflect the\n  reality.\n\n  This patch series makes HK_TYPE_KTHREAD an alias of HK_TYPE_DOMAIN\n  and uses RCU to protect access to the HK_TYPE_KTHREAD housekeeping\n  cpumask.\n\nJulian Anastasov (5):\n  ipvs: fixes for the new ip_vs_status info\n  ipvs: fix races around the conn_lfactor and svc_lfactor sysctl vars\n  ipvs: fix the spin_lock usage for RT build\n  ipvs: fix races around est_mutex and est_cpulist\n  ipvs: fix shift-out-of-bounds in ip_vs_rht_desired_size\n\nWaiman Long (2):\n  sched/isolation: Make HK_TYPE_KTHREAD an alias of HK_TYPE_DOMAIN\n  ipvs: Guard access of HK_TYPE_KTHREAD cpumask with RCU\n\n include/linux/sched/isolation.h |   6 +-\n include/net/ip_vs.h             |  31 ++++++--\n net/netfilter/ipvs/ip_vs_conn.c |  76 ++++++++++---------\n net/netfilter/ipvs/ip_vs_core.c |   2 +-\n net/netfilter/ipvs/ip_vs_ctl.c  | 127 ++++++++++++++++++++++++--------\n net/netfilter/ipvs/ip_vs_est.c  |  83 ++++++++++++---------\n 6 files changed, 217 insertions(+), 108 deletions(-)"
}