Cover Letter Detail
Show a cover letter.
GET /api/covers/2196525/?format=api
{ "id": 2196525, "url": "http://patchwork.ozlabs.org/api/covers/2196525/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260214151230.18970-1-ja@ssi.bg/", "project": { "id": 26, "url": "http://patchwork.ozlabs.org/api/projects/26/?format=api", "name": "Netfilter Development", "link_name": "netfilter-devel", "list_id": "netfilter-devel.vger.kernel.org", "list_email": "netfilter-devel@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20260214151230.18970-1-ja@ssi.bg>", "list_archive_url": null, "date": "2026-02-14T15:12:24", "name": "[nf-next,0/6] IPVS changes, part 2 of 4 - optimizations", "submitter": { "id": 2825, "url": "http://patchwork.ozlabs.org/api/people/2825/?format=api", "name": "Julian Anastasov", "email": "ja@ssi.bg" }, "mbox": "http://patchwork.ozlabs.org/project/netfilter-devel/cover/20260214151230.18970-1-ja@ssi.bg/mbox/", "series": [ { "id": 492179, "url": "http://patchwork.ozlabs.org/api/series/492179/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netfilter-devel/list/?series=492179", "date": "2026-02-14T15:12:24", "name": "IPVS changes, part 2 of 4 - optimizations", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/492179/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/2196525/comments/", "headers": { "Return-Path": "\n <netfilter-devel+bounces-10775-incoming=patchwork.ozlabs.org@vger.kernel.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "netfilter-devel@vger.kernel.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (4096-bit key;\n unprotected) header.d=ssi.bg header.i=@ssi.bg header.a=rsa-sha256\n header.s=ssi header.b=lthdKOV2;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.232.135.74; helo=sto.lore.kernel.org;\n envelope-from=netfilter-devel+bounces-10775-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)", "smtp.subspace.kernel.org;\n\tdkim=pass (4096-bit key) header.d=ssi.bg header.i=@ssi.bg header.b=\"lthdKOV2\"", "smtp.subspace.kernel.org;\n arc=none smtp.client-ip=193.238.174.39", "smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=ssi.bg", "smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=ssi.bg" ], "Received": [ "from sto.lore.kernel.org (sto.lore.kernel.org [172.232.135.74])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fCsx36YL0z1xpl\n\tfor <incoming@patchwork.ozlabs.org>; Sun, 15 Feb 2026 02:13:11 +1100 (AEDT)", "from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sto.lore.kernel.org (Postfix) with ESMTP id D740C3006B4B\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 14 Feb 2026 15:13:08 +0000 (UTC)", "from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 5735D2D739B;\n\tSat, 14 Feb 2026 15:13:05 +0000 (UTC)", "from mx.ssi.bg (mx.ssi.bg [193.238.174.39])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id BE72E1C695;\n\tSat, 14 Feb 2026 15:13:02 +0000 (UTC)", "from mx.ssi.bg (localhost [127.0.0.1])\n\tby mx.ssi.bg (Potsfix) with ESMTP id 9CE8C21D5E;\n\tSat, 14 Feb 2026 17:13:00 +0200 (EET)", "from box.ssi.bg (box.ssi.bg [193.238.174.46])\n\tby mx.ssi.bg (Potsfix) with ESMTPS;\n\tSat, 14 Feb 2026 17:12:59 +0200 (EET)", "from ja.ssi.bg (unknown [213.16.62.126])\n\tby box.ssi.bg (Potsfix) with ESMTPSA id 208A9609BE;\n\tSat, 14 Feb 2026 17:12:58 +0200 (EET)", "from ja.home.ssi.bg (localhost.localdomain [127.0.0.1])\n\tby ja.ssi.bg (8.18.1/8.18.1) with ESMTP id 61EFCvpC019340;\n\tSat, 14 Feb 2026 17:12:57 +0200", "(from root@localhost)\n\tby ja.home.ssi.bg (8.18.1/8.18.1/Submit) id 61EFCv61019339;\n\tSat, 14 Feb 2026 17:12:57 +0200" ], "ARC-Seal": "i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1771081984; cv=none;\n b=S2USouHOYp6ltoj4KfNb1521HidUaxxiVtUPLUl0FgXpPR7U3NuJJCGDzLRVjMTRTHRgkWX2ml3T8VXNJo8KXPLFldGvqHXLmxLnNd+eqwGcZLo6/eY6jC+cXjXIhBi6MrNRQmx61h2LjbFsruRfKfbkou2NDd3fKg8mNb7gWjE=", "ARC-Message-Signature": "i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1771081984; c=relaxed/simple;\n\tbh=pGHGDNAehl0I5AgqITEtnmxcPb2Um1PUdN9h5FNgdGQ=;\n\th=From:To:Cc:Subject:Date:Message-ID:MIME-Version;\n b=aybwn9FcMS0zrop2VipZz5jZPB16fklGM09hYyjKSvNdpim4+qSgQF9LYKI+6KS5N+7OVZ0+6mlokWGBXSsbJ2w4mUnQ1Nd//s41iWAZN9FscO/FkzGye6SwL9Pt8tCrhnzWMbFTqD9S8ltPmhZ+sK6ll5vKBzjanDSMexPNVM4=", "ARC-Authentication-Results": "i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=ssi.bg;\n spf=pass smtp.mailfrom=ssi.bg;\n dkim=pass (4096-bit key) header.d=ssi.bg header.i=@ssi.bg header.b=lthdKOV2;\n arc=none smtp.client-ip=193.238.174.39", "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=ssi.bg; h=cc:cc\n\t:content-transfer-encoding:date:from:from:message-id\n\t:mime-version:reply-to:subject:subject:to:to; s=ssi; bh=1YRFgQbI\n\tjFSX0TXGd2sRMma1hz6StFpE4bzo8T3dAxc=; b=lthdKOV2HCBq00mCK1pprViW\n\tiLJ8k1vjKOce4xkT9UxdeVBu5iUcIDXFI8BRATGRqtAKJRCXVDO3Ejc8g1Us2jgV\n\tOiYApAVRWtK1WIALcCzh5UJW4qox/DP09VWkIhYsRRBt3fkO/lWp6FaQ3EqNph/I\n\tC4ndaeM6eMOCRrRb1IWrGYWOZVCKqiZECKz9mOtdBzsRWs6h2ujWcbv1/J122a/N\n\toxLM6RWvp9gduf2i0LQjMuTISKICRucr8qNskLeKHVuWardbRTU/4KFC4Lp2i5vT\n\tK+Ggnvhvqe2wMpjy/IBNL5D7Y0Og44ZK6nAJoXdhxm9Qi3MqU7rKmgPyOfdkDjOv\n\tVsbKKiWCQ1zEnDdHtPG5ReJ3isEOZM0yECFsl4slGkDnx4stF6pEud1C0TjLcO34\n\tL3Vk34AdNyLRQLvCVKmefzfhuJkNxYRn4ngDlUy+sZovohgBve+4wPSwPcjehF1e\n\t01swB/5xi8EDEXpZ+xe5Au7rSSwOwWntuCSKMpE5VuVdHzmLJeTLe6LGUInm7mNa\n\tOe5xJk8/DiVDFBtckFRhI/J/jc5FZ4F51sQ0+vHeaTJBnO1xXD4u837B+1ZI6OmD\n\tp73a4FAW+I3tLM/k6+QWAQBq0vJcZVX76qwtJV5xdwESGh2vbIj79UJ6iSSeF8QG\n\ts/1D7/qDCrbrZGTSD54=", "From": "Julian Anastasov <ja@ssi.bg>", "To": "Simon Horman <horms@verge.net.au>", "Cc": "Pablo Neira Ayuso <pablo@netfilter.org>, lvs-devel@vger.kernel.org,\n netfilter-devel@vger.kernel.org, Dust Li <dust.li@linux.alibaba.com>,\n Jiejian Wu <jiejian@linux.alibaba.com>", "Subject": "[PATCH nf-next 0/6] IPVS changes, part 2 of 4 - optimizations", "Date": "Sat, 14 Feb 2026 17:12:24 +0200", "Message-ID": "<20260214151230.18970-1-ja@ssi.bg>", "X-Mailer": "git-send-email 2.53.0", "Precedence": "bulk", "X-Mailing-List": "netfilter-devel@vger.kernel.org", "List-Id": "<netfilter-devel.vger.kernel.org>", "List-Subscribe": "<mailto:netfilter-devel+subscribe@vger.kernel.org>", "List-Unsubscribe": "<mailto:netfilter-devel+unsubscribe@vger.kernel.org>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit" }, "content": "Hello,\n\n This patchset is part 2 of changes that accumulated in\nrecent time. It is for nf-next and should be applied when the patches\nfrom part 1 are already applied. It contains optimizations and\nper-net changes.\n\n All patches here come from the work\n\"ipvs: per-net tables and optimizations\" last posted\non 19 Oct 2025 as v6, with the following changes:\n\nPatch 1 comes from v6/patch 2 without changes\n\nPatch 2 comes from v6/patch 3 with cosmetic change:\n - we can not use lockdep_is_held() condition because hlist_bl does\n not support such debugging yet, readers can be only under RCU lock.\n That is the reason for the rcu_read_lock() in the updating code\n in ip_vs_genl_set_cmd().\n\nPatch 3 comes from v6/patch 4 without changes\n\nPatch 4 comes from v6/patch 5 but some of its content was moved\n also to part1/patch 2\n\nPatch 5 comes from v6/patch 6 without changes\n\nPatch 6 comes from v6/patch 11 with small changes because\n it was moved forward before other patches from part 3 and 4\n\n\tAs result, the following patches will:\n\n* Convert the global __ip_vs_mutex to per-net service_mutex and\n switch the service tables to be per-net, cowork by Jiejian Wu and\n Dust Li\n\n* Convert some code that walks the service lists to use RCU instead of\n the service_mutex\n\n* We used two tables for services (non-fwmark and fwmark), merge them\n into single svc_table\n\n* The list for unavailable destinations (dest_trash) holds dsts and\n thus dev references causing extra work for the ip_vs_dst_event() dev\n notifier handler. Change this by dropping the reference when dest\n is removed and saved into dest_trash. The dest_trash will need more\n changes to make it light for lookups. TODO.\n\n* On new connection we can do multiple lookups for services by trying\n different fallback options. Add more counters for service types, so\n that we can avoid unneeded lookups for services.\n\n* The no_cport and dropentry counters can be per-net and also we can\navoid extra conn lookups\n\n\nJiejian Wu (1):\n ipvs: make ip_vs_svc_table and ip_vs_svc_fwm_table per netns\n\nJulian Anastasov (5):\n ipvs: some service readers can use RCU\n ipvs: use single svc table\n ipvs: do not keep dest_dst after dest is removed\n ipvs: use more counters to avoid service lookups\n ipvs: no_cport and dropentry counters can be per-net\n\n include/net/ip_vs.h | 39 +++-\n net/netfilter/ipvs/ip_vs_conn.c | 64 +++---\n net/netfilter/ipvs/ip_vs_core.c | 2 +-\n net/netfilter/ipvs/ip_vs_ctl.c | 368 +++++++++++---------------------\n net/netfilter/ipvs/ip_vs_est.c | 18 +-\n net/netfilter/ipvs/ip_vs_xmit.c | 12 +-\n 6 files changed, 212 insertions(+), 291 deletions(-)" }