get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/1.2/patches/809809/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 809809,
    "url": "http://patchwork.ozlabs.org/api/1.2/patches/809809/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/netdev/patch/1504555874-4168-10-git-send-email-pablo@netfilter.org/",
    "project": {
        "id": 7,
        "url": "http://patchwork.ozlabs.org/api/1.2/projects/7/?format=api",
        "name": "Linux network development",
        "link_name": "netdev",
        "list_id": "netdev.vger.kernel.org",
        "list_email": "netdev@vger.kernel.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<1504555874-4168-10-git-send-email-pablo@netfilter.org>",
    "list_archive_url": null,
    "date": "2017-09-04T20:11:11",
    "name": "[09/12] netfilter: nf_tables: add nf_tables_addchain()",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "7821ff8af27c786951436b84da1e0ca222eee1eb",
    "submitter": {
        "id": 1315,
        "url": "http://patchwork.ozlabs.org/api/1.2/people/1315/?format=api",
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org"
    },
    "delegate": {
        "id": 34,
        "url": "http://patchwork.ozlabs.org/api/1.2/users/34/?format=api",
        "username": "davem",
        "first_name": "David",
        "last_name": "Miller",
        "email": "davem@davemloft.net"
    },
    "mbox": "http://patchwork.ozlabs.org/project/netdev/patch/1504555874-4168-10-git-send-email-pablo@netfilter.org/mbox/",
    "series": [
        {
            "id": 1451,
            "url": "http://patchwork.ozlabs.org/api/1.2/series/1451/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/netdev/list/?series=1451",
            "date": "2017-09-04T20:11:02",
            "name": "[01/12] netfilter: xt_hashlimit: add rate match mode",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/1451/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/809809/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/809809/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<netdev-owner@vger.kernel.org>",
        "X-Original-To": "patchwork-incoming@ozlabs.org",
        "Delivered-To": "patchwork-incoming@ozlabs.org",
        "Authentication-Results": "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=netdev-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)",
        "Received": [
            "from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3xmLbt2SXKz9t2R\n\tfor <patchwork-incoming@ozlabs.org>;\n\tTue,  5 Sep 2017 06:12:10 +1000 (AEST)",
            "(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S932068AbdIDUL4 (ORCPT <rfc822;patchwork-incoming@ozlabs.org>);\n\tMon, 4 Sep 2017 16:11:56 -0400",
            "from mail.us.es ([193.147.175.20]:42160 \"EHLO mail.us.es\"\n\trhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP\n\tid S1754619AbdIDULc (ORCPT <rfc822;netdev@vger.kernel.org>);\n\tMon, 4 Sep 2017 16:11:32 -0400",
            "from antivirus1-rhel7.int (unknown [192.168.2.11])\n\tby mail.us.es (Postfix) with ESMTP id 92CDC532F8B\n\tfor <netdev@vger.kernel.org>; Mon,  4 Sep 2017 22:11:04 +0200 (CEST)",
            "from antivirus1-rhel7.int (localhost [127.0.0.1])\n\tby antivirus1-rhel7.int (Postfix) with ESMTP id 84DD9B502A\n\tfor <netdev@vger.kernel.org>; Mon,  4 Sep 2017 22:11:04 +0200 (CEST)",
            "by antivirus1-rhel7.int (Postfix, from userid 99)\n\tid 7A6EB35BA; Mon,  4 Sep 2017 22:11:04 +0200 (CEST)",
            "from antivirus1-rhel7.int (localhost [127.0.0.1])\n\tby antivirus1-rhel7.int (Postfix) with ESMTP id 47532B5027;\n\tMon,  4 Sep 2017 22:11:02 +0200 (CEST)",
            "from 192.168.1.97 (192.168.1.97) by antivirus1-rhel7.int\n\t(F-Secure/fsigk_smtp/550/antivirus1-rhel7.int); \n\tMon, 04 Sep 2017 22:11:02 +0200 (CEST)",
            "from salvia.here (129.166.216.87.static.jazztel.es\n\t[87.216.166.129]) (Authenticated sender: pneira@us.es)\n\tby entrada.int (Postfix) with ESMTPA id E05B84265A20;\n\tMon,  4 Sep 2017 22:11:01 +0200 (CEST)"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.1 (2015-04-28) on\n\tantivirus1-rhel7.int",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-108.2 required=7.5 tests=ALL_TRUSTED,BAYES_50,\n\tSMTPAUTH_US2,USER_IN_WHITELIST autolearn=disabled version=3.4.1",
        "X-Virus-Status": "clean(F-Secure/fsigk_smtp/550/antivirus1-rhel7.int)",
        "X-SMTPAUTHUS": "auth mail.us.es",
        "From": "Pablo Neira Ayuso <pablo@netfilter.org>",
        "To": "netfilter-devel@vger.kernel.org",
        "Cc": "davem@davemloft.net, netdev@vger.kernel.org",
        "Subject": "[PATCH 09/12] netfilter: nf_tables: add nf_tables_addchain()",
        "Date": "Mon,  4 Sep 2017 22:11:11 +0200",
        "Message-Id": "<1504555874-4168-10-git-send-email-pablo@netfilter.org>",
        "X-Mailer": "git-send-email 2.1.4",
        "In-Reply-To": "<1504555874-4168-1-git-send-email-pablo@netfilter.org>",
        "References": "<1504555874-4168-1-git-send-email-pablo@netfilter.org>",
        "X-Virus-Scanned": "ClamAV using ClamSMTP",
        "Sender": "netdev-owner@vger.kernel.org",
        "Precedence": "bulk",
        "List-ID": "<netdev.vger.kernel.org>",
        "X-Mailing-List": "netdev@vger.kernel.org"
    },
    "content": "Wrap the chain addition path in a function to make it more maintainable.\n\nSigned-off-by: Pablo Neira Ayuso <pablo@netfilter.org>\n---\n net/netfilter/nf_tables_api.c | 199 ++++++++++++++++++++++--------------------\n 1 file changed, 106 insertions(+), 93 deletions(-)",
    "diff": "diff --git a/net/netfilter/nf_tables_api.c b/net/netfilter/nf_tables_api.c\nindex a910544acf59..d95dfafea1e7 100644\n--- a/net/netfilter/nf_tables_api.c\n+++ b/net/netfilter/nf_tables_api.c\n@@ -1335,6 +1335,106 @@ static void nft_chain_release_hook(struct nft_chain_hook *hook)\n \t\tdev_put(hook->dev);\n }\n \n+static int nf_tables_addchain(struct nft_ctx *ctx, u8 family, u8 genmask,\n+\t\t\t      u8 policy, bool create)\n+{\n+\tconst struct nlattr * const *nla = ctx->nla;\n+\tstruct nft_table *table = ctx->table;\n+\tstruct nft_af_info *afi = ctx->afi;\n+\tstruct nft_base_chain *basechain;\n+\tstruct nft_stats __percpu *stats;\n+\tstruct net *net = ctx->net;\n+\tstruct nft_chain *chain;\n+\tunsigned int i;\n+\tint err;\n+\n+\tif (table->use == UINT_MAX)\n+\t\treturn -EOVERFLOW;\n+\n+\tif (nla[NFTA_CHAIN_HOOK]) {\n+\t\tstruct nft_chain_hook hook;\n+\t\tstruct nf_hook_ops *ops;\n+\t\tnf_hookfn *hookfn;\n+\n+\t\terr = nft_chain_parse_hook(net, nla, afi, &hook, create);\n+\t\tif (err < 0)\n+\t\t\treturn err;\n+\n+\t\tbasechain = kzalloc(sizeof(*basechain), GFP_KERNEL);\n+\t\tif (basechain == NULL) {\n+\t\t\tnft_chain_release_hook(&hook);\n+\t\t\treturn -ENOMEM;\n+\t\t}\n+\n+\t\tif (hook.dev != NULL)\n+\t\t\tstrncpy(basechain->dev_name, hook.dev->name, IFNAMSIZ);\n+\n+\t\tif (nla[NFTA_CHAIN_COUNTERS]) {\n+\t\t\tstats = nft_stats_alloc(nla[NFTA_CHAIN_COUNTERS]);\n+\t\t\tif (IS_ERR(stats)) {\n+\t\t\t\tnft_chain_release_hook(&hook);\n+\t\t\t\tkfree(basechain);\n+\t\t\t\treturn PTR_ERR(stats);\n+\t\t\t}\n+\t\t\tbasechain->stats = stats;\n+\t\t\tstatic_branch_inc(&nft_counters_enabled);\n+\t\t}\n+\n+\t\thookfn = hook.type->hooks[hook.num];\n+\t\tbasechain->type = hook.type;\n+\t\tchain = &basechain->chain;\n+\n+\t\tfor (i = 0; i < afi->nops; i++) {\n+\t\t\tops = &basechain->ops[i];\n+\t\t\tops->pf\t\t= family;\n+\t\t\tops->hooknum\t= hook.num;\n+\t\t\tops->priority\t= hook.priority;\n+\t\t\tops->priv\t= chain;\n+\t\t\tops->hook\t= afi->hooks[ops->hooknum];\n+\t\t\tops->dev\t= hook.dev;\n+\t\t\tif (hookfn)\n+\t\t\t\tops->hook = hookfn;\n+\t\t\tif (afi->hook_ops_init)\n+\t\t\t\tafi->hook_ops_init(ops, i);\n+\t\t}\n+\n+\t\tchain->flags |= NFT_BASE_CHAIN;\n+\t\tbasechain->policy = policy;\n+\t} else {\n+\t\tchain = kzalloc(sizeof(*chain), GFP_KERNEL);\n+\t\tif (chain == NULL)\n+\t\t\treturn -ENOMEM;\n+\t}\n+\tINIT_LIST_HEAD(&chain->rules);\n+\tchain->handle = nf_tables_alloc_handle(table);\n+\tchain->table = table;\n+\tchain->name = nla_strdup(nla[NFTA_CHAIN_NAME], GFP_KERNEL);\n+\tif (!chain->name) {\n+\t\terr = -ENOMEM;\n+\t\tgoto err1;\n+\t}\n+\n+\terr = nf_tables_register_hooks(net, table, chain, afi->nops);\n+\tif (err < 0)\n+\t\tgoto err1;\n+\n+\tctx->chain = chain;\n+\terr = nft_trans_chain_add(ctx, NFT_MSG_NEWCHAIN);\n+\tif (err < 0)\n+\t\tgoto err2;\n+\n+\ttable->use++;\n+\tlist_add_tail_rcu(&chain->list, &table->chains);\n+\n+\treturn 0;\n+err2:\n+\tnf_tables_unregister_hooks(net, table, chain, afi->nops);\n+err1:\n+\tnf_tables_chain_destroy(chain);\n+\n+\treturn err;\n+}\n+\n static int nf_tables_updchain(struct nft_ctx *ctx, u8 genmask, u8 policy,\n \t\t\t      bool create)\n {\n@@ -1433,19 +1533,15 @@ static int nf_tables_newchain(struct net *net, struct sock *nlsk,\n {\n \tconst struct nfgenmsg *nfmsg = nlmsg_data(nlh);\n \tconst struct nlattr * uninitialized_var(name);\n+\tu8 genmask = nft_genmask_next(net);\n+\tint family = nfmsg->nfgen_family;\n \tstruct nft_af_info *afi;\n \tstruct nft_table *table;\n \tstruct nft_chain *chain;\n-\tstruct nft_base_chain *basechain = NULL;\n-\tu8 genmask = nft_genmask_next(net);\n-\tint family = nfmsg->nfgen_family;\n \tu8 policy = NF_ACCEPT;\n+\tstruct nft_ctx ctx;\n \tu64 handle = 0;\n-\tunsigned int i;\n-\tstruct nft_stats __percpu *stats;\n-\tint err;\n \tbool create;\n-\tstruct nft_ctx ctx;\n \n \tcreate = nlh->nlmsg_flags & NLM_F_CREATE ? true : false;\n \n@@ -1493,101 +1589,18 @@ static int nf_tables_newchain(struct net *net, struct sock *nlsk,\n \t\t}\n \t}\n \n+\tnft_ctx_init(&ctx, net, skb, nlh, afi, table, chain, nla);\n+\n \tif (chain != NULL) {\n \t\tif (nlh->nlmsg_flags & NLM_F_EXCL)\n \t\t\treturn -EEXIST;\n \t\tif (nlh->nlmsg_flags & NLM_F_REPLACE)\n \t\t\treturn -EOPNOTSUPP;\n \n-\t\tnft_ctx_init(&ctx, net, skb, nlh, afi, table, chain, nla);\n-\n \t\treturn nf_tables_updchain(&ctx, genmask, policy, create);\n \t}\n \n-\tif (table->use == UINT_MAX)\n-\t\treturn -EOVERFLOW;\n-\n-\tif (nla[NFTA_CHAIN_HOOK]) {\n-\t\tstruct nft_chain_hook hook;\n-\t\tstruct nf_hook_ops *ops;\n-\t\tnf_hookfn *hookfn;\n-\n-\t\terr = nft_chain_parse_hook(net, nla, afi, &hook, create);\n-\t\tif (err < 0)\n-\t\t\treturn err;\n-\n-\t\tbasechain = kzalloc(sizeof(*basechain), GFP_KERNEL);\n-\t\tif (basechain == NULL) {\n-\t\t\tnft_chain_release_hook(&hook);\n-\t\t\treturn -ENOMEM;\n-\t\t}\n-\n-\t\tif (hook.dev != NULL)\n-\t\t\tstrncpy(basechain->dev_name, hook.dev->name, IFNAMSIZ);\n-\n-\t\tif (nla[NFTA_CHAIN_COUNTERS]) {\n-\t\t\tstats = nft_stats_alloc(nla[NFTA_CHAIN_COUNTERS]);\n-\t\t\tif (IS_ERR(stats)) {\n-\t\t\t\tnft_chain_release_hook(&hook);\n-\t\t\t\tkfree(basechain);\n-\t\t\t\treturn PTR_ERR(stats);\n-\t\t\t}\n-\t\t\tbasechain->stats = stats;\n-\t\t\tstatic_branch_inc(&nft_counters_enabled);\n-\t\t}\n-\n-\t\thookfn = hook.type->hooks[hook.num];\n-\t\tbasechain->type = hook.type;\n-\t\tchain = &basechain->chain;\n-\n-\t\tfor (i = 0; i < afi->nops; i++) {\n-\t\t\tops = &basechain->ops[i];\n-\t\t\tops->pf\t\t= family;\n-\t\t\tops->hooknum\t= hook.num;\n-\t\t\tops->priority\t= hook.priority;\n-\t\t\tops->priv\t= chain;\n-\t\t\tops->hook\t= afi->hooks[ops->hooknum];\n-\t\t\tops->dev\t= hook.dev;\n-\t\t\tif (hookfn)\n-\t\t\t\tops->hook = hookfn;\n-\t\t\tif (afi->hook_ops_init)\n-\t\t\t\tafi->hook_ops_init(ops, i);\n-\t\t}\n-\n-\t\tchain->flags |= NFT_BASE_CHAIN;\n-\t\tbasechain->policy = policy;\n-\t} else {\n-\t\tchain = kzalloc(sizeof(*chain), GFP_KERNEL);\n-\t\tif (chain == NULL)\n-\t\t\treturn -ENOMEM;\n-\t}\n-\n-\tINIT_LIST_HEAD(&chain->rules);\n-\tchain->handle = nf_tables_alloc_handle(table);\n-\tchain->table = table;\n-\tchain->name = nla_strdup(name, GFP_KERNEL);\n-\tif (!chain->name) {\n-\t\terr = -ENOMEM;\n-\t\tgoto err1;\n-\t}\n-\n-\terr = nf_tables_register_hooks(net, table, chain, afi->nops);\n-\tif (err < 0)\n-\t\tgoto err1;\n-\n-\tnft_ctx_init(&ctx, net, skb, nlh, afi, table, chain, nla);\n-\terr = nft_trans_chain_add(&ctx, NFT_MSG_NEWCHAIN);\n-\tif (err < 0)\n-\t\tgoto err2;\n-\n-\ttable->use++;\n-\tlist_add_tail_rcu(&chain->list, &table->chains);\n-\treturn 0;\n-err2:\n-\tnf_tables_unregister_hooks(net, table, chain, afi->nops);\n-err1:\n-\tnf_tables_chain_destroy(chain);\n-\treturn err;\n+\treturn nf_tables_addchain(&ctx, family, genmask, policy, create);\n }\n \n static int nf_tables_delchain(struct net *net, struct sock *nlsk,\n",
    "prefixes": [
        "09/12"
    ]
}