Cover Letter Detail
Show a cover letter.
GET /api/covers/814636/?format=api
{ "id": 814636, "url": "http://patchwork.ozlabs.org/api/covers/814636/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netfilter-devel/cover/20170917110751.7923-1-rafi@rbk.ms/", "project": { "id": 26, "url": "http://patchwork.ozlabs.org/api/projects/26/?format=api", "name": "Netfilter Development", "link_name": "netfilter-devel", "list_id": "netfilter-devel.vger.kernel.org", "list_email": "netfilter-devel@vger.kernel.org", "web_url": null, "scm_url": null, "webscm_url": null, "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<20170917110751.7923-1-rafi@rbk.ms>", "list_archive_url": null, "date": "2017-09-17T11:07:49", "name": "[0/2] xt_bpf: fix handling of pinned objects", "submitter": { "id": 72382, "url": "http://patchwork.ozlabs.org/api/people/72382/?format=api", "name": "Shmulik Ladkani", "email": "shmulik@nsof.io" }, "mbox": "http://patchwork.ozlabs.org/project/netfilter-devel/cover/20170917110751.7923-1-rafi@rbk.ms/mbox/", "series": [ { "id": 3506, "url": "http://patchwork.ozlabs.org/api/series/3506/?format=api", "web_url": "http://patchwork.ozlabs.org/project/netfilter-devel/list/?series=3506", "date": "2017-09-17T11:07:49", "name": "xt_bpf: fix handling of pinned objects", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/3506/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/814636/comments/", "headers": { "Return-Path": "<netfilter-devel-owner@vger.kernel.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@bilbo.ozlabs.org", "Authentication-Results": [ "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=netfilter-devel-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)", "ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n\tunprotected) header.d=nsof.io header.i=@nsof.io header.b=\"GVphQk/W\";\n\tdkim-atps=neutral" ], "Received": [ "from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3xw5w91mn7z9sBZ\n\tfor <incoming@patchwork.ozlabs.org>;\n\tSun, 17 Sep 2017 21:08:09 +1000 (AEST)", "(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S1750803AbdIQLIH (ORCPT <rfc822;incoming@patchwork.ozlabs.org>);\n\tSun, 17 Sep 2017 07:08:07 -0400", "from mail-wm0-f45.google.com ([74.125.82.45]:45866 \"EHLO\n\tmail-wm0-f45.google.com\" rhost-flags-OK-OK-OK-OK) by vger.kernel.org\n\twith ESMTP id S1750793AbdIQLIG (ORCPT\n\t<rfc822;netfilter-devel@vger.kernel.org>);\n\tSun, 17 Sep 2017 07:08:06 -0400", "by mail-wm0-f45.google.com with SMTP id g206so16330767wme.0\n\tfor <netfilter-devel@vger.kernel.org>;\n\tSun, 17 Sep 2017 04:08:06 -0700 (PDT)", "from localhost.localdomain (bzq-82-81-225-244.cablep.bezeqint.net.\n\t[82.81.225.244]) by smtp.gmail.com with ESMTPSA id\n\tl4sm4716895wrb.74.2017.09.17.04.08.03\n\t(version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128);\n\tSun, 17 Sep 2017 04:08:04 -0700 (PDT)" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nsof.io; s=google;\n\th=from:to:cc:subject:date:message-id;\n\tbh=87ZEHqTT9rqxbdY/of+lOuhfEYxkeOXM3wd+l7FTcdk=;\n\tb=GVphQk/WdB+DtkQY2VXivVWKjQoItVwTRssUVHEdlggJR4R9qlsm7j7l65Usg5SRRq\n\tha16+YkuzfK/jS/nqKL27KcUkOpF/YsP0TLx4cxtVnZHxML4jnbh6F+AILqVFS7E1f65\n\trENP+r0lhAKJP8KlLISlsNW7fVxGJRPkw6rMI=", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:from:to:cc:subject:date:message-id;\n\tbh=87ZEHqTT9rqxbdY/of+lOuhfEYxkeOXM3wd+l7FTcdk=;\n\tb=fBR4bKtLxlYRAjZjO4om2i9GFU6uY5WR+h9XET8sRh5tq5h5Gf7xQ2g9uYZbmBqRko\n\tyHvLdUmskCcQJQdZtbrepMY5Ir8KcMPAqiyapbMDP1yaRgoRYgdgVIKVZw77qAkCfUwj\n\taV1f2u45ofTI+r9EHsN9RuQcX9iniS4GDAZBwB8QxsGQtynUOWAm6mxpj5VntFiModnV\n\tPFhkI5mWwi/MH1jGLjn0t+YP6BPZax9LJOfmBqIWkZkU/Cx0kHGRw/Ec3R8GmEh31w1q\n\tWSel8O2Iei3SPPfx6pReONwp2dsbC5S7SSan1UQmhIfZ0+r05baT4/ZkfpXbpV0VaheP\n\tQWPw==", "X-Gm-Message-State": "AHPjjUgA/08h8yYcACM5Gq3KQG0Q+Tt3Lmu6yZSHMuGdRW98yCqlzt3X\n\tE4yWHgWrDHm/D/w3jQMuZw==", "X-Google-Smtp-Source": "AOwi7QAJCQwTF8VycT9tQoIu8aRj1C9Rfa/2X2WQ/gxaGkUWw+R6WmP6uHwYqK48SYBKfK0xyXnQwQ==", "X-Received": "by 10.28.109.78 with SMTP id i75mr6762048wmc.117.1505646485287; \n\tSun, 17 Sep 2017 04:08:05 -0700 (PDT)", "From": "Rafael Buchbinder <shmulik@nsof.io>", "X-Google-Original-From": "Rafael Buchbinder <rafi@rbk.ms>", "To": "netfilter-devel@vger.kernel.org, Pablo Neira Ayuso <pablo@netfilter.org>", "Cc": "Willem de Bruijn <willemb@google.com>, rbk@nsof.io,\n\tshmulik@nsof.io, Rafael Buchbinder <rafi@rbk.ms>", "Subject": "[PATCH 0/2] xt_bpf: fix handling of pinned objects", "Date": "Sun, 17 Sep 2017 14:07:49 +0300", "Message-Id": "<20170917110751.7923-1-rafi@rbk.ms>", "X-Mailer": "git-send-email 2.14.1", "Sender": "netfilter-devel-owner@vger.kernel.org", "Precedence": "bulk", "List-ID": "<netfilter-devel.vger.kernel.org>", "X-Mailing-List": "netfilter-devel@vger.kernel.org" }, "content": "Following set of commits fixes xt_bpf extension to correctly handle\npinned eBPF programs.\n\nThe origin of the bug lies in the fact that xt_bpf_info_v1 structure\nrequires an open file descriptor to create an eBPF match. \nThis file descriptor is checked on every replace. However, as this file\ndescriptor is valid only for the iptables invocation which loads the\neBPF for the first time, all subsequent iptables invocations fail in\nbpf_mt_check (kernel) function.\n\nSee discussion in [1] for more details.\n\nThe following patches add a hook in extensions which is called\nimmediately after TC_INIT to fixup whatever needs to be fixed up.\nIn case of xt_bpf, the fixup function gets the eBPF object by path to\npopulate xt_bpf_info_v1 structure with a valid file descriptor.\n\n[1] https://marc.info/?l=netfilter-devel&m=150530909630143&w=2\n\nRafael Buchbinder (2):\n iptables: support match info fixup after tc_init\n extensions: xt_bpf: get the pinned ebpf object when match is\n initialized\n\n extensions/libxt_bpf.c | 9 +++++++++\n include/xtables.h | 3 +++\n iptables/ip6tables.c | 35 +++++++++++++++++++++++++++++++++++\n iptables/iptables.c | 34 ++++++++++++++++++++++++++++++++++\n 4 files changed, 81 insertions(+)" }