get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/818021/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 818021,
    "url": "http://patchwork.ozlabs.org/api/patches/818021/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/netdev/patch/9ab7611469e6314f35ae85a274308064417f3be2.1506297988.git.daniel@iogearbox.net/",
    "project": {
        "id": 7,
        "url": "http://patchwork.ozlabs.org/api/projects/7/?format=api",
        "name": "Linux network development",
        "link_name": "netdev",
        "list_id": "netdev.vger.kernel.org",
        "list_email": "netdev@vger.kernel.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<9ab7611469e6314f35ae85a274308064417f3be2.1506297988.git.daniel@iogearbox.net>",
    "list_archive_url": null,
    "date": "2017-09-25T00:25:50",
    "name": "[net-next,1/6] bpf: rename bpf_compute_data_end into bpf_compute_data_pointers",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "2e8624997f671f334393d46136b1c10977e87774",
    "submitter": {
        "id": 65705,
        "url": "http://patchwork.ozlabs.org/api/people/65705/?format=api",
        "name": "Daniel Borkmann",
        "email": "daniel@iogearbox.net"
    },
    "delegate": {
        "id": 34,
        "url": "http://patchwork.ozlabs.org/api/users/34/?format=api",
        "username": "davem",
        "first_name": "David",
        "last_name": "Miller",
        "email": "davem@davemloft.net"
    },
    "mbox": "http://patchwork.ozlabs.org/project/netdev/patch/9ab7611469e6314f35ae85a274308064417f3be2.1506297988.git.daniel@iogearbox.net/mbox/",
    "series": [
        {
            "id": 4860,
            "url": "http://patchwork.ozlabs.org/api/series/4860/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/netdev/list/?series=4860",
            "date": "2017-09-25T00:25:49",
            "name": "BPF metadata for direct access",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/4860/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/818021/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/818021/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<netdev-owner@vger.kernel.org>",
        "X-Original-To": "patchwork-incoming@ozlabs.org",
        "Delivered-To": "patchwork-incoming@ozlabs.org",
        "Authentication-Results": "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=vger.kernel.org\n\t(client-ip=209.132.180.67; helo=vger.kernel.org;\n\tenvelope-from=netdev-owner@vger.kernel.org;\n\treceiver=<UNKNOWN>)",
        "Received": [
            "from vger.kernel.org (vger.kernel.org [209.132.180.67])\n\tby ozlabs.org (Postfix) with ESMTP id 3y0lK92tqhz9s82\n\tfor <patchwork-incoming@ozlabs.org>;\n\tMon, 25 Sep 2017 10:27:25 +1000 (AEST)",
            "(majordomo@vger.kernel.org) by vger.kernel.org via listexpand\n\tid S933349AbdIYA1T (ORCPT <rfc822;patchwork-incoming@ozlabs.org>);\n\tSun, 24 Sep 2017 20:27:19 -0400",
            "from www62.your-server.de ([213.133.104.62]:37229 \"EHLO\n\twww62.your-server.de\" rhost-flags-OK-OK-OK-OK) by vger.kernel.org\n\twith ESMTP id S933040AbdIYA1H (ORCPT\n\t<rfc822;netdev@vger.kernel.org>); Sun, 24 Sep 2017 20:27:07 -0400",
            "from [85.7.161.218] (helo=localhost)\n\tby www62.your-server.de with esmtpsa\n\t(TLSv1.2:DHE-RSA-AES128-GCM-SHA256:128) (Exim 4.85_2)\n\t(envelope-from <daniel@iogearbox.net>)\n\tid 1dwHEk-0000Hb-E9; Mon, 25 Sep 2017 02:27:02 +0200"
        ],
        "From": "Daniel Borkmann <daniel@iogearbox.net>",
        "To": "davem@davemloft.net",
        "Cc": "alexei.starovoitov@gmail.com, john.fastabend@gmail.com,\n\tpeter.waskiewicz.jr@intel.com, jakub.kicinski@netronome.com,\n\tnetdev@vger.kernel.org, Daniel Borkmann <daniel@iogearbox.net>",
        "Subject": "[PATCH net-next 1/6] bpf: rename bpf_compute_data_end into\n\tbpf_compute_data_pointers",
        "Date": "Mon, 25 Sep 2017 02:25:50 +0200",
        "Message-Id": "<9ab7611469e6314f35ae85a274308064417f3be2.1506297988.git.daniel@iogearbox.net>",
        "X-Mailer": "git-send-email 1.9.3",
        "In-Reply-To": [
            "<cover.1506297988.git.daniel@iogearbox.net>",
            "<cover.1506297988.git.daniel@iogearbox.net>"
        ],
        "References": [
            "<cover.1506297988.git.daniel@iogearbox.net>",
            "<cover.1506297988.git.daniel@iogearbox.net>"
        ],
        "X-Authenticated-Sender": "daniel@iogearbox.net",
        "X-Virus-Scanned": "Clear (ClamAV 0.99.2/23869/Sun Sep 24 18:45:57 2017)",
        "Sender": "netdev-owner@vger.kernel.org",
        "Precedence": "bulk",
        "List-ID": "<netdev.vger.kernel.org>",
        "X-Mailing-List": "netdev@vger.kernel.org"
    },
    "content": "Just do the rename into bpf_compute_data_pointers() as we'll add\none more pointer here to recompute.\n\nSigned-off-by: Daniel Borkmann <daniel@iogearbox.net>\nAcked-by: Alexei Starovoitov <ast@kernel.org>\nAcked-by: John Fastabend <john.fastabend@gmail.com>\n---\n include/linux/filter.h |  9 ++++++---\n kernel/bpf/sockmap.c   |  4 ++--\n net/bpf/test_run.c     |  2 +-\n net/core/filter.c      | 14 +++++++-------\n net/core/lwt_bpf.c     |  2 +-\n net/sched/act_bpf.c    |  4 ++--\n net/sched/cls_bpf.c    |  4 ++--\n 7 files changed, 21 insertions(+), 18 deletions(-)",
    "diff": "diff --git a/include/linux/filter.h b/include/linux/filter.h\nindex d29e58f..052bab3 100644\n--- a/include/linux/filter.h\n+++ b/include/linux/filter.h\n@@ -496,10 +496,13 @@ struct xdp_buff {\n \tvoid *data_hard_start;\n };\n \n-/* compute the linear packet data range [data, data_end) which\n- * will be accessed by cls_bpf, act_bpf and lwt programs\n+/* Compute the linear packet data range [data, data_end) which\n+ * will be accessed by various program types (cls_bpf, act_bpf,\n+ * lwt, ...). Subsystems allowing direct data access must (!)\n+ * ensure that cb[] area can be written to when BPF program is\n+ * invoked (otherwise cb[] save/restore is necessary).\n  */\n-static inline void bpf_compute_data_end(struct sk_buff *skb)\n+static inline void bpf_compute_data_pointers(struct sk_buff *skb)\n {\n \tstruct bpf_skb_data_end *cb = (struct bpf_skb_data_end *)skb->cb;\n \ndiff --git a/kernel/bpf/sockmap.c b/kernel/bpf/sockmap.c\nindex 6424ce0..a298d66 100644\n--- a/kernel/bpf/sockmap.c\n+++ b/kernel/bpf/sockmap.c\n@@ -102,7 +102,7 @@ static int smap_verdict_func(struct smap_psock *psock, struct sk_buff *skb)\n \n \tskb_orphan(skb);\n \tskb->sk = psock->sock;\n-\tbpf_compute_data_end(skb);\n+\tbpf_compute_data_pointers(skb);\n \trc = (*prog->bpf_func)(skb, prog->insnsi);\n \tskb->sk = NULL;\n \n@@ -369,7 +369,7 @@ static int smap_parse_func_strparser(struct strparser *strp,\n \t * any socket yet.\n \t */\n \tskb->sk = psock->sock;\n-\tbpf_compute_data_end(skb);\n+\tbpf_compute_data_pointers(skb);\n \trc = (*prog->bpf_func)(skb, prog->insnsi);\n \tskb->sk = NULL;\n \trcu_read_unlock();\ndiff --git a/net/bpf/test_run.c b/net/bpf/test_run.c\nindex 6be41a4..df67251 100644\n--- a/net/bpf/test_run.c\n+++ b/net/bpf/test_run.c\n@@ -133,7 +133,7 @@ int bpf_prog_test_run_skb(struct bpf_prog *prog, const union bpf_attr *kattr,\n \tif (is_l2)\n \t\t__skb_push(skb, ETH_HLEN);\n \tif (is_direct_pkt_access)\n-\t\tbpf_compute_data_end(skb);\n+\t\tbpf_compute_data_pointers(skb);\n \tretval = bpf_test_run(prog, skb, repeat, &duration);\n \tif (!is_l2)\n \t\t__skb_push(skb, ETH_HLEN);\ndiff --git a/net/core/filter.c b/net/core/filter.c\nindex 82edad5..c468e7c 100644\n--- a/net/core/filter.c\n+++ b/net/core/filter.c\n@@ -1402,7 +1402,7 @@ static inline int bpf_try_make_writable(struct sk_buff *skb,\n {\n \tint err = __bpf_try_make_writable(skb, write_len);\n \n-\tbpf_compute_data_end(skb);\n+\tbpf_compute_data_pointers(skb);\n \treturn err;\n }\n \n@@ -1962,7 +1962,7 @@ struct sock *do_sk_redirect_map(void)\n \tret = skb_vlan_push(skb, vlan_proto, vlan_tci);\n \tbpf_pull_mac_rcsum(skb);\n \n-\tbpf_compute_data_end(skb);\n+\tbpf_compute_data_pointers(skb);\n \treturn ret;\n }\n \n@@ -1984,7 +1984,7 @@ struct sock *do_sk_redirect_map(void)\n \tret = skb_vlan_pop(skb);\n \tbpf_pull_mac_rcsum(skb);\n \n-\tbpf_compute_data_end(skb);\n+\tbpf_compute_data_pointers(skb);\n \treturn ret;\n }\n \n@@ -2178,7 +2178,7 @@ static int bpf_skb_proto_xlat(struct sk_buff *skb, __be16 to_proto)\n \t * need to be verified first.\n \t */\n \tret = bpf_skb_proto_xlat(skb, proto);\n-\tbpf_compute_data_end(skb);\n+\tbpf_compute_data_pointers(skb);\n \treturn ret;\n }\n \n@@ -2303,7 +2303,7 @@ static int bpf_skb_adjust_net(struct sk_buff *skb, s32 len_diff)\n \tret = shrink ? bpf_skb_net_shrink(skb, len_diff_abs) :\n \t\t       bpf_skb_net_grow(skb, len_diff_abs);\n \n-\tbpf_compute_data_end(skb);\n+\tbpf_compute_data_pointers(skb);\n \treturn ret;\n }\n \n@@ -2394,7 +2394,7 @@ static int bpf_skb_trim_rcsum(struct sk_buff *skb, unsigned int new_len)\n \t\t\tskb_gso_reset(skb);\n \t}\n \n-\tbpf_compute_data_end(skb);\n+\tbpf_compute_data_pointers(skb);\n \treturn ret;\n }\n \n@@ -2434,7 +2434,7 @@ static int bpf_skb_trim_rcsum(struct sk_buff *skb, unsigned int new_len)\n \t\tskb_reset_mac_header(skb);\n \t}\n \n-\tbpf_compute_data_end(skb);\n+\tbpf_compute_data_pointers(skb);\n \treturn 0;\n }\n \ndiff --git a/net/core/lwt_bpf.c b/net/core/lwt_bpf.c\nindex 1307731..e7e626f 100644\n--- a/net/core/lwt_bpf.c\n+++ b/net/core/lwt_bpf.c\n@@ -51,7 +51,7 @@ static int run_lwt_bpf(struct sk_buff *skb, struct bpf_lwt_prog *lwt,\n \t */\n \tpreempt_disable();\n \trcu_read_lock();\n-\tbpf_compute_data_end(skb);\n+\tbpf_compute_data_pointers(skb);\n \tret = bpf_prog_run_save_cb(lwt->prog, skb);\n \trcu_read_unlock();\n \ndiff --git a/net/sched/act_bpf.c b/net/sched/act_bpf.c\nindex c0c707e..5ef8ce8 100644\n--- a/net/sched/act_bpf.c\n+++ b/net/sched/act_bpf.c\n@@ -49,11 +49,11 @@ static int tcf_bpf(struct sk_buff *skb, const struct tc_action *act,\n \tfilter = rcu_dereference(prog->filter);\n \tif (at_ingress) {\n \t\t__skb_push(skb, skb->mac_len);\n-\t\tbpf_compute_data_end(skb);\n+\t\tbpf_compute_data_pointers(skb);\n \t\tfilter_res = BPF_PROG_RUN(filter, skb);\n \t\t__skb_pull(skb, skb->mac_len);\n \t} else {\n-\t\tbpf_compute_data_end(skb);\n+\t\tbpf_compute_data_pointers(skb);\n \t\tfilter_res = BPF_PROG_RUN(filter, skb);\n \t}\n \trcu_read_unlock();\ndiff --git a/net/sched/cls_bpf.c b/net/sched/cls_bpf.c\nindex 520c502..36671b0 100644\n--- a/net/sched/cls_bpf.c\n+++ b/net/sched/cls_bpf.c\n@@ -99,11 +99,11 @@ static int cls_bpf_classify(struct sk_buff *skb, const struct tcf_proto *tp,\n \t\t} else if (at_ingress) {\n \t\t\t/* It is safe to push/pull even if skb_shared() */\n \t\t\t__skb_push(skb, skb->mac_len);\n-\t\t\tbpf_compute_data_end(skb);\n+\t\t\tbpf_compute_data_pointers(skb);\n \t\t\tfilter_res = BPF_PROG_RUN(prog->filter, skb);\n \t\t\t__skb_pull(skb, skb->mac_len);\n \t\t} else {\n-\t\t\tbpf_compute_data_end(skb);\n+\t\t\tbpf_compute_data_pointers(skb);\n \t\t\tfilter_res = BPF_PROG_RUN(prog->filter, skb);\n \t\t}\n \n",
    "prefixes": [
        "net-next",
        "1/6"
    ]
}