Show a cover letter.

GET /api/covers/814640/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 814640,
    "url": "http://patchwork.ozlabs.org/api/covers/814640/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/netfilter-devel/cover/20170917112031.8644-1-shmulik@nsof.io/",
    "project": {
        "id": 26,
        "url": "http://patchwork.ozlabs.org/api/projects/26/?format=api",
        "name": "Netfilter Development",
        "link_name": "netfilter-devel",
        "list_id": "netfilter-devel.vger.kernel.org",
        "list_email": "netfilter-devel@vger.kernel.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20170917112031.8644-1-shmulik@nsof.io>",
    "list_archive_url": null,
    "date": "2017-09-17T11:20:29",
    "name": "[v2,0/2] xt_bpf: fix handling of pinned objects",
    "submitter": {
        "id": 72382,
        "url": "http://patchwork.ozlabs.org/api/people/72382/?format=api",
        "name": "Shmulik Ladkani",
        "email": "shmulik@nsof.io"
    },
    "mbox": "http://patchwork.ozlabs.org/project/netfilter-devel/cover/20170917112031.8644-1-shmulik@nsof.io/mbox/",
    "series": [
        {
            "id": 3508,
            "url": "http://patchwork.ozlabs.org/api/series/3508/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/netfilter-devel/list/?series=3508",
            "date": "2017-09-17T11:20:29",
            "name": "xt_bpf: fix handling of pinned objects",
            "version": 2,
            "mbox": "http://patchwork.ozlabs.org/series/3508/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/covers/814640/comments/",
    "headers": {
        "Return-Path": "<netfilter-devel-owner@vger.kernel.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@bilbo.ozlabs.org",
        "Authentication-Results": [
            "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=netfilter-devel-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)",
            "ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n\tunprotected) header.d=nsof.io header.i=@nsof.io header.b=\"Zde53CWR\";\n\tdkim-atps=neutral"
        ],
        "Received": [
            "from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3xw6Bj3Gxhz9sBZ\n\tfor <incoming@patchwork.ozlabs.org>;\n\tSun, 17 Sep 2017 21:20:45 +1000 (AEST)",
            "(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S1750851AbdIQLUo (ORCPT <rfc822;incoming@patchwork.ozlabs.org>);\n\tSun, 17 Sep 2017 07:20:44 -0400",
            "from mail-wr0-f174.google.com ([209.85.128.174]:49166 \"EHLO\n\tmail-wr0-f174.google.com\" rhost-flags-OK-OK-OK-OK) by vger.kernel.org\n\twith ESMTP id S1750803AbdIQLUo (ORCPT\n\t<rfc822;netfilter-devel@vger.kernel.org>);\n\tSun, 17 Sep 2017 07:20:44 -0400",
            "by mail-wr0-f174.google.com with SMTP id u96so4336085wrb.6\n\tfor <netfilter-devel@vger.kernel.org>;\n\tSun, 17 Sep 2017 04:20:43 -0700 (PDT)",
            "from localhost.localdomain (bzq-82-81-225-244.cablep.bezeqint.net.\n\t[82.81.225.244]) by smtp.gmail.com with ESMTPSA id\n\tu1sm4400684wrd.95.2017.09.17.04.20.41\n\t(version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128);\n\tSun, 17 Sep 2017 04:20:42 -0700 (PDT)"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nsof.io; s=google;\n\th=from:to:cc:subject:date:message-id;\n\tbh=rlMuRGTWqRp5YM7nLYeDPLEiyvJpbWmMYUqSPaLF/uI=;\n\tb=Zde53CWRV2fHc+wwSYwM5JQ7Bf0/v0whWQhDx8JgGHTRscu9Kkq9wz6R4JD9q++ysc\n\tQ6wDGxoGxIzBFAt1jeSHBxYPEbVD5s9LtbhkMPihY+03JqSOhK4Xg/FX+Lu4WbLuiqTY\n\tZr6+2zU3cJFpb5Ybn7j2bfTrdiEQBWQNqVXc8=",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:from:to:cc:subject:date:message-id;\n\tbh=rlMuRGTWqRp5YM7nLYeDPLEiyvJpbWmMYUqSPaLF/uI=;\n\tb=TuPn131fesrzUbhS63SUxjuu9ms2UJTrbqMefYWK/7//z9BSqfwPYAnInrnNwrCzQV\n\tmxmBHysTPblV2LIV/nElB5yFdycdygraVIfa69SHPYmps3HVew2iEaYmnbse7DQQR7nA\n\t+mTbwoEvgP+3zjq3MMzL+zF3q3VRmDRD0GEx/bpAyGZnYHarIkX7ZycHkc9nGnmi9REL\n\ta8Ho9K57SU5qkfqi7BKiQdVysXpFwFpHSP9pCWyJw5TbfTZsx1Pjg8B3ACIGcWL+lP/x\n\tpm45bYACgxjXDvPjDrsMEN60nyKbRxo7eN9Wh0tMYPSwqsfma0EO6Y+OGcy4sKNmxguZ\n\t/I1g==",
        "X-Gm-Message-State": "AHPjjUh3CINy3+SHJi1THeiUB54dbzNBd00sfdtt6IBVJVCDln5CthgM\n\tkuBoKXa2gQrmfoZxQlM0YA==",
        "X-Google-Smtp-Source": "ADKCNb6wMfnbipXF7Nne0g2YjzioOLUfRHA3uvwuSEHm9UvhxhEeQsreT4cl+kk/pQCsj91S5srWUg==",
        "X-Received": "by 10.223.132.225 with SMTP id 88mr23339045wrg.162.1505647242965;\n\tSun, 17 Sep 2017 04:20:42 -0700 (PDT)",
        "From": "Shmulik Ladkani <shmulik@nsof.io>",
        "To": "netfilter-devel@vger.kernel.org, Pablo Neira Ayuso <pablo@netfilter.org>",
        "Cc": "Willem de Bruijn <willemb@google.com>, rbk@nsof.io,\n\tshmulik@nsof.io, Rafael Buchbinder <rafi@rbk.ms>",
        "Subject": "[PATCH v2 0/2] xt_bpf: fix handling of pinned objects",
        "Date": "Sun, 17 Sep 2017 14:20:29 +0300",
        "Message-Id": "<20170917112031.8644-1-shmulik@nsof.io>",
        "X-Mailer": "git-send-email 2.14.1",
        "Sender": "netfilter-devel-owner@vger.kernel.org",
        "Precedence": "bulk",
        "List-ID": "<netfilter-devel.vger.kernel.org>",
        "X-Mailing-List": "netfilter-devel@vger.kernel.org"
    },
    "content": "From: Rafael Buchbinder <rafi@rbk.ms>\n\nFrom: Rafael Buchbinder <rafi@rbk.ms>\n\nFollowing set of commits fixes xt_bpf extension to correctly handle\npinned eBPF programs.\n\nThe origin of the bug lies in the fact that xt_bpf_info_v1 structure\nrequires an open file descriptor to create an eBPF match. \nThis file descriptor is checked on every replace. However, as this file\ndescriptor is valid only for the iptables invocation which loads the\neBPF for the first time, all subsequent iptables invocations fail in\nbpf_mt_check (kernel) function.\n\nSee discussion in [1] for more details.\n\nThe following patches add a hook in extensions which is called\nimmediately after TC_INIT to fixup whatever needs to be fixed up.\nIn case of xt_bpf, the fixup function gets the eBPF object by path to\npopulate xt_bpf_info_v1 structure with a valid file descriptor.\n\n[1] https://marc.info/?l=netfilter-devel&m=150530909630143&w=2\n\nSince v1:\n  - fixed From field\n\nRafael Buchbinder (2):\n  iptables: support match info fixup after tc_init\n  extensions: xt_bpf: get the pinned ebpf object when match is\n    initialized\n\n extensions/libxt_bpf.c |  9 +++++++++\n include/xtables.h      |  3 +++\n iptables/ip6tables.c   | 35 +++++++++++++++++++++++++++++++++++\n iptables/iptables.c    | 34 ++++++++++++++++++++++++++++++++++\n 4 files changed, 81 insertions(+)"
}