get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/1.2/patches/811745/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 811745,
    "url": "http://patchwork.ozlabs.org/api/1.2/patches/811745/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/netfilter-devel/patch/1504892748-1605-1-git-send-email-pablo@netfilter.org/",
    "project": {
        "id": 26,
        "url": "http://patchwork.ozlabs.org/api/1.2/projects/26/?format=api",
        "name": "Netfilter Development",
        "link_name": "netfilter-devel",
        "list_id": "netfilter-devel.vger.kernel.org",
        "list_email": "netfilter-devel@vger.kernel.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<1504892748-1605-1-git-send-email-pablo@netfilter.org>",
    "list_archive_url": null,
    "date": "2017-09-08T17:45:39",
    "name": "[0/9] Netfilter/IPVS fixes for net",
    "commit_ref": null,
    "pull_url": "git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf.git HEAD",
    "state": "accepted",
    "archived": false,
    "hash": null,
    "submitter": {
        "id": 1315,
        "url": "http://patchwork.ozlabs.org/api/1.2/people/1315/?format=api",
        "name": "Pablo Neira Ayuso",
        "email": "pablo@netfilter.org"
    },
    "delegate": {
        "id": 6139,
        "url": "http://patchwork.ozlabs.org/api/1.2/users/6139/?format=api",
        "username": "pablo",
        "first_name": "Pablo",
        "last_name": "Neira",
        "email": "pablo@netfilter.org"
    },
    "mbox": "http://patchwork.ozlabs.org/project/netfilter-devel/patch/1504892748-1605-1-git-send-email-pablo@netfilter.org/mbox/",
    "series": [],
    "comments": "http://patchwork.ozlabs.org/api/patches/811745/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/811745/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<netfilter-devel-owner@vger.kernel.org>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@bilbo.ozlabs.org",
        "Authentication-Results": "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=netfilter-devel-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)",
        "Received": [
            "from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3xplBq6Rk4z9sBW\n\tfor <incoming@patchwork.ozlabs.org>;\n\tSat,  9 Sep 2017 03:47:15 +1000 (AEST)",
            "(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S1756724AbdIHRp7 (ORCPT <rfc822;incoming@patchwork.ozlabs.org>);\n\tFri, 8 Sep 2017 13:45:59 -0400",
            "from mail.us.es ([193.147.175.20]:54456 \"EHLO mail.us.es\"\n\trhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP\n\tid S1756303AbdIHRp6 (ORCPT <rfc822; netfilter-devel@vger.kernel.org>);\n\tFri, 8 Sep 2017 13:45:58 -0400",
            "from antivirus1-rhel7.int (unknown [192.168.2.11])\n\tby mail.us.es (Postfix) with ESMTP id 433D68D0507\n\tfor <netfilter-devel@vger.kernel.org>;\n\tFri,  8 Sep 2017 19:45:27 +0200 (CEST)",
            "from antivirus1-rhel7.int (localhost [127.0.0.1])\n\tby antivirus1-rhel7.int (Postfix) with ESMTP id 32A01B502A\n\tfor <netfilter-devel@vger.kernel.org>;\n\tFri,  8 Sep 2017 19:45:27 +0200 (CEST)",
            "by antivirus1-rhel7.int (Postfix, from userid 99)\n\tid 286D62DC87; Fri,  8 Sep 2017 19:45:27 +0200 (CEST)",
            "from antivirus1-rhel7.int (localhost [127.0.0.1])\n\tby antivirus1-rhel7.int (Postfix) with ESMTP id 16BB32DC87;\n\tFri,  8 Sep 2017 19:45:25 +0200 (CEST)",
            "from 192.168.1.97 (192.168.1.97) by antivirus1-rhel7.int\n\t(F-Secure/fsigk_smtp/550/antivirus1-rhel7.int); \n\tFri, 08 Sep 2017 19:45:25 +0200 (CEST)",
            "from salvia.here (129.166.216.87.static.jazztel.es\n\t[87.216.166.129]) (Authenticated sender: pneira@us.es)\n\tby entrada.int (Postfix) with ESMTPA id C6CF644581E0;\n\tFri,  8 Sep 2017 19:45:24 +0200 (CEST)"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.1 (2015-04-28) on\n\tantivirus1-rhel7.int",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-108.2 required=7.5 tests=ALL_TRUSTED,BAYES_50,\n\tSMTPAUTH_US2,USER_IN_WHITELIST autolearn=disabled version=3.4.1",
        "X-Virus-Status": "clean(F-Secure/fsigk_smtp/550/antivirus1-rhel7.int)",
        "X-SMTPAUTHUS": "auth mail.us.es",
        "From": "Pablo Neira Ayuso <pablo@netfilter.org>",
        "To": "netfilter-devel@vger.kernel.org",
        "Cc": "davem@davemloft.net, netdev@vger.kernel.org",
        "Subject": "[PATCH 0/9] Netfilter/IPVS fixes for net",
        "Date": "Fri,  8 Sep 2017 19:45:39 +0200",
        "Message-Id": "<1504892748-1605-1-git-send-email-pablo@netfilter.org>",
        "X-Mailer": "git-send-email 2.1.4",
        "X-Virus-Scanned": "ClamAV using ClamSMTP",
        "Sender": "netfilter-devel-owner@vger.kernel.org",
        "Precedence": "bulk",
        "List-ID": "<netfilter-devel.vger.kernel.org>",
        "X-Mailing-List": "netfilter-devel@vger.kernel.org"
    },
    "content": "Hi David,\n\nThe following patchset contains Netfilter/IPVS fixes for your net tree,\nthey are:\n\n1) Fix SCTP connection setup when IPVS module is loaded and any scheduler\n   is registered, from Xin Long.\n\n2) Don't create a SCTP connection from SCTP ABORT packets, also from\n   Xin Long.\n\n3) WARN_ON() and drop packet, instead of BUG_ON() races when calling\n   nf_nat_setup_info(). This is specifically a longstanding problem\n   when br_netfilter with conntrack support is in place, patch from\n   Florian Westphal.\n\n4) Avoid softlock splats via iptables-restore, also from Florian.\n\n5) Revert NAT hashtable conversion to rhashtable, semantics of rhlist\n   are different from our simple NAT hashtable, this has been causing\n   problems in the recent Linux kernel releases. From Florian.\n\n6) Add per-bucket spinlock for NAT hashtable, so at least we restore\n   one of the benefits we got from the previous rhashtable conversion.\n\n7) Fix incorrect hashtable size in memory allocation in xt_hashlimit,\n   from Zhizhou Tian.\n\n8) Fix build/link problems with hashlimit and 32-bit arches, to address\n   recent fallout from a new hashlimit mode, from Vishwanath Pai.\n\nYou can pull these changes from:\n\n  git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf.git\n\nThanks!\n\n----------------------------------------------------------------\n\nThe following changes since commit 8e0deed92406d93ae0365cb8a6134db5721e7aca:\n\n  tipc: remove unnecessary call to dev_net() (2017-09-06 21:25:52 -0700)\n\nare available in the git repository at:\n\n  git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf.git HEAD\n\nfor you to fetch changes up to 90c4ae4e2c1da9f1eaf846136861af43d4c1ff34:\n\n  netfilter: xt_hashlimit: fix build error caused by 64bit division (2017-09-08 18:55:53 +0200)\n\n----------------------------------------------------------------\nFlorian Westphal (5):\n      netfilter: nf_nat: don't bug when mapping already exists\n      netfilter: xtables: add scheduling opportunity in get_counters\n      netfilter: nat: Revert \"netfilter: nat: convert nat bysrc hash to rhashtable\"\n      netfilter: nat: use keyed locks\n      netfilter: core: remove erroneous warn_on\n\nVishwanath Pai (1):\n      netfilter: xt_hashlimit: fix build error caused by 64bit division\n\nXin Long (2):\n      netfilter: ipvs: fix the issue that sctp_conn_schedule drops non-INIT packet\n      netfilter: ipvs: do not create conn for ABORT packet in sctp_conn_schedule\n\nZhizhou Tian (1):\n      netfilter: xt_hashlimit: alloc hashtable with right size\n\n include/net/netfilter/nf_conntrack.h  |   3 +-\n include/net/netfilter/nf_nat.h        |   1 -\n net/ipv4/netfilter/arp_tables.c       |   1 +\n net/ipv4/netfilter/ip_tables.c        |   1 +\n net/ipv6/netfilter/ip6_tables.c       |   1 +\n net/netfilter/core.c                  |   2 +-\n net/netfilter/ipvs/ip_vs_proto_sctp.c |   8 +-\n net/netfilter/nf_nat_core.c           | 146 ++++++++++++++++------------------\n net/netfilter/xt_hashlimit.c          |  16 ++--\n 9 files changed, 88 insertions(+), 91 deletions(-)\n--\nTo unsubscribe from this list: send the line \"unsubscribe netfilter-devel\" in\nthe body of a message to majordomo@vger.kernel.org\nMore majordomo info at  http://vger.kernel.org/majordomo-info.html",
    "diff": null,
    "prefixes": [
        "0/9"
    ]
}