Show a cover letter.

GET /api/covers/852524/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 852524,
    "url": "http://patchwork.ozlabs.org/api/covers/852524/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/netdev/cover/20171222192732.13188-1-pablo@netfilter.org/",
    "project": {
        "id": 7,
        "url": "http://patchwork.ozlabs.org/api/projects/7/?format=api",
        "name": "Linux network development",
        "link_name": "netdev",
        "list_id": "netdev.vger.kernel.org",
        "list_email": "netdev@vger.kernel.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20171222192732.13188-1-pablo@netfilter.org>",
    "list_archive_url": null,
    "date": "2017-12-22T19:27:25",
    "name": "[nf-next,v3,0/7] Flow offload infrastructure",
    "submitter": {
        "id": 1315,
        "url": "http://patchwork.ozlabs.org/api/people/1315/?format=api",
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org"
    },
    "mbox": "http://patchwork.ozlabs.org/project/netdev/cover/20171222192732.13188-1-pablo@netfilter.org/mbox/",
    "series": [
        {
            "id": 20090,
            "url": "http://patchwork.ozlabs.org/api/series/20090/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/netdev/list/?series=20090",
            "date": "2017-12-22T19:27:25",
            "name": "Flow offload infrastructure",
            "version": 3,
            "mbox": "http://patchwork.ozlabs.org/series/20090/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/covers/852524/comments/",
    "headers": {
        "Return-Path": "<netdev-owner@vger.kernel.org>",
        "X-Original-To": "patchwork-incoming@ozlabs.org",
        "Delivered-To": "patchwork-incoming@ozlabs.org",
        "Authentication-Results": "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=netdev-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)",
        "Received": [
            "from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3z3JSn27jtz9s83\n\tfor <patchwork-incoming@ozlabs.org>;\n\tSat, 23 Dec 2017 06:28:09 +1100 (AEDT)",
            "(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S1756596AbdLVT2D (ORCPT <rfc822;patchwork-incoming@ozlabs.org>);\n\tFri, 22 Dec 2017 14:28:03 -0500",
            "from mail.us.es ([193.147.175.20]:42276 \"EHLO mail.us.es\"\n\trhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP\n\tid S1756065AbdLVT2B (ORCPT <rfc822;netdev@vger.kernel.org>);\n\tFri, 22 Dec 2017 14:28:01 -0500",
            "from antivirus1-rhel7.int (unknown [192.168.2.11])\n\tby mail.us.es (Postfix) with ESMTP id 2F1EBEBACF\n\tfor <netdev@vger.kernel.org>; Fri, 22 Dec 2017 20:28:00 +0100 (CET)",
            "from antivirus1-rhel7.int (localhost [127.0.0.1])\n\tby antivirus1-rhel7.int (Postfix) with ESMTP id 2001EF7320\n\tfor <netdev@vger.kernel.org>; Fri, 22 Dec 2017 20:28:00 +0100 (CET)",
            "by antivirus1-rhel7.int (Postfix, from userid 99)\n\tid 0EF45F7313; Fri, 22 Dec 2017 20:28:00 +0100 (CET)",
            "from antivirus1-rhel7.int (localhost [127.0.0.1])\n\tby antivirus1-rhel7.int (Postfix) with ESMTP id 94E8FF7319;\n\tFri, 22 Dec 2017 20:27:57 +0100 (CET)",
            "from 192.168.1.97 (192.168.1.97) by antivirus1-rhel7.int\n\t(F-Secure/fsigk_smtp/550/antivirus1-rhel7.int); \n\tFri, 22 Dec 2017 20:27:57 +0100 (CET)",
            "from salvia.here (129.166.216.87.static.jazztel.es\n\t[87.216.166.129]) (Authenticated sender: pneira@us.es)\n\tby entrada.int (Postfix) with ESMTPA id C33714265A31;\n\tFri, 22 Dec 2017 20:27:56 +0100 (CET)"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.1 (2015-04-28) on\n\tantivirus1-rhel7.int",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-108.2 required=7.5 tests=ALL_TRUSTED,BAYES_50,\n\tSMTPAUTH_US2,USER_IN_WHITELIST autolearn=disabled version=3.4.1",
        "X-Virus-Status": "clean(F-Secure/fsigk_smtp/550/antivirus1-rhel7.int)",
        "X-SMTPAUTHUS": "auth mail.us.es",
        "From": "Pablo Neira Ayuso <pablo@netfilter.org>",
        "To": "netfilter-devel@vger.kernel.org",
        "Cc": "netdev@vger.kernel.org, f.fainelli@gmail.com,\n\tsimon.horman@netronome.com, ronye@mellanox.com, jiri@mellanox.com,\n\tnbd@nbd.name, john@phrozen.org, kubakici@wp.pl, fw@strlen.de",
        "Subject": "[PATCH nf-next,v3 0/7] Flow offload infrastructure",
        "Date": "Fri, 22 Dec 2017 20:27:25 +0100",
        "Message-Id": "<20171222192732.13188-1-pablo@netfilter.org>",
        "X-Mailer": "git-send-email 2.11.0",
        "X-Virus-Scanned": "ClamAV using ClamSMTP",
        "Sender": "netdev-owner@vger.kernel.org",
        "Precedence": "bulk",
        "List-ID": "<netdev.vger.kernel.org>",
        "X-Mailing-List": "netdev@vger.kernel.org"
    },
    "content": "Hi,\n\nThis is a new round of the patchset to add the flow offload\ninfrastructure [1][2].\n\nThis round comes with IPv6 and mixed IPv4/IPv6 support, hardware offload\nsupport in a separated nf_flow_table_hw module, port translation, net\nnamespace support and several bugfixes.\n\nPatch 7/7 has been tagged as RFC, I will keep this one back until\nthere's an initial driver that introduces flow table offload support,\nlikely in a branch in nf-next.git once this new infrastructure gets\nmerged upstream.\n\nComments welcome, thanks.\n\n[1] https://lwn.net/Articles/738214/\n[2] https://marc.info/?l=netfilter-devel&m=151266258119014&w=2\n\nPablo Neira Ayuso (7):\n  netfilter: nf_tables: add flow table netlink frontend\n  netfilter: add generic flow table infrastructure\n  netfilter: flow table support for IPv4\n  netfilter: flow table support for IPv6\n  netfilter: flow table support for the mixed IPv4/IPv6 family\n  netfilter: nf_tables: flow offload expression\n  netfilter: nf_flow_table: add hardware offload support\n\n include/linux/netdevice.h                |   9 +\n include/net/ipv6.h                       |   2 +\n include/net/netfilter/nf_flow_table.h    | 128 ++++++\n include/net/netfilter/nf_tables.h        |  48 ++\n include/uapi/linux/netfilter/nf_tables.h |  64 +++\n net/ipv4/netfilter/Kconfig               |   8 +\n net/ipv4/netfilter/Makefile              |   3 +\n net/ipv4/netfilter/nf_flow_table_ipv4.c  | 284 ++++++++++++\n net/ipv6/ip6_output.c                    |   3 +-\n net/ipv6/netfilter/Kconfig               |   8 +\n net/ipv6/netfilter/Makefile              |   3 +\n net/ipv6/netfilter/nf_flow_table_ipv6.c  | 278 ++++++++++++\n net/netfilter/Kconfig                    |  31 ++\n net/netfilter/Makefile                   |   5 +\n net/netfilter/nf_flow_table.c            | 447 ++++++++++++++++++\n net/netfilter/nf_flow_table_hw.c         | 127 ++++++\n net/netfilter/nf_flow_table_inet.c       |  48 ++\n net/netfilter/nf_tables_api.c            | 749 ++++++++++++++++++++++++++++++-\n net/netfilter/nft_flow_offload.c         | 272 +++++++++++\n 19 files changed, 2515 insertions(+), 2 deletions(-)\n create mode 100644 include/net/netfilter/nf_flow_table.h\n create mode 100644 net/ipv4/netfilter/nf_flow_table_ipv4.c\n create mode 100644 net/ipv6/netfilter/nf_flow_table_ipv6.c\n create mode 100644 net/netfilter/nf_flow_table.c\n create mode 100644 net/netfilter/nf_flow_table_hw.c\n create mode 100644 net/netfilter/nf_flow_table_inet.c\n create mode 100644 net/netfilter/nft_flow_offload.c"
}