get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/1307959/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 1307959,
    "url": "http://patchwork.ozlabs.org/api/patches/1307959/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/skiboot/patch/20200612022452.371685-11-oohall@gmail.com/",
    "project": {
        "id": 44,
        "url": "http://patchwork.ozlabs.org/api/projects/44/?format=api",
        "name": "skiboot firmware development",
        "link_name": "skiboot",
        "list_id": "skiboot.lists.ozlabs.org",
        "list_email": "skiboot@lists.ozlabs.org",
        "web_url": "http://github.com/open-power/skiboot",
        "scm_url": "http://github.com/open-power/skiboot",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20200612022452.371685-11-oohall@gmail.com>",
    "list_archive_url": null,
    "date": "2020-06-12T02:24:47",
    "name": "[10/15] travis: Disable seccomp on child containers",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": false,
    "hash": "f30118cb8f176792535fde855a562194dbe045fe",
    "submitter": {
        "id": 68108,
        "url": "http://patchwork.ozlabs.org/api/people/68108/?format=api",
        "name": "Oliver O'Halloran",
        "email": "oohall@gmail.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/skiboot/patch/20200612022452.371685-11-oohall@gmail.com/mbox/",
    "series": [
        {
            "id": 182887,
            "url": "http://patchwork.ozlabs.org/api/series/182887/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/skiboot/list/?series=182887",
            "date": "2020-06-12T02:24:38",
            "name": "[01/15] test/qemu: Update command line arguments",
            "version": 1,
            "mbox": "http://patchwork.ozlabs.org/series/182887/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/1307959/comments/",
    "check": "fail",
    "checks": "http://patchwork.ozlabs.org/api/patches/1307959/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "skiboot@lists.ozlabs.org"
        ],
        "Delivered-To": [
            "patchwork-incoming@bilbo.ozlabs.org",
            "skiboot@lists.ozlabs.org"
        ],
        "Received": [
            "from lists.ozlabs.org (lists.ozlabs.org [203.11.71.2])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange X25519 server-signature RSA-PSS (4096 bits))\n\t(No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 49jl5g723Rz9sRN\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 12 Jun 2020 12:28:39 +1000 (AEST)",
            "from bilbo.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 49jl5g2yn1zDqZ2\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 12 Jun 2020 12:28:39 +1000 (AEST)",
            "from mail-wm1-x342.google.com (mail-wm1-x342.google.com\n [IPv6:2a00:1450:4864:20::342])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n (No client certificate requested)\n by lists.ozlabs.org (Postfix) with ESMTPS id 49jl241LwVzDqv9\n for <skiboot@lists.ozlabs.org>; Fri, 12 Jun 2020 12:25:32 +1000 (AEST)",
            "by mail-wm1-x342.google.com with SMTP id d128so6853839wmc.1\n for <skiboot@lists.ozlabs.org>; Thu, 11 Jun 2020 19:25:31 -0700 (PDT)",
            "from localhost.ibm.com (123-243-125-185.tpgi.com.au.\n [123.243.125.185])\n by smtp.gmail.com with ESMTPSA id h7sm6756948wml.24.2020.06.11.19.25.26\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Thu, 11 Jun 2020 19:25:27 -0700 (PDT)"
        ],
        "Authentication-Results": [
            "ozlabs.org;\n dmarc=fail (p=none dis=none) header.from=gmail.com",
            "ozlabs.org;\n\tdkim=fail reason=\"signature verification failed\" (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20161025 header.b=taxPy8Zm;\n\tdkim-atps=neutral",
            "lists.ozlabs.org; spf=pass (sender SPF authorized)\n smtp.mailfrom=gmail.com (client-ip=2a00:1450:4864:20::342;\n helo=mail-wm1-x342.google.com; envelope-from=oohall@gmail.com;\n receiver=<UNKNOWN>)",
            "lists.ozlabs.org;\n dmarc=pass (p=none dis=none) header.from=gmail.com",
            "lists.ozlabs.org; dkim=pass (2048-bit key;\n unprotected) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256\n header.s=20161025 header.b=taxPy8Zm; dkim-atps=neutral"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;\n h=from:to:cc:subject:date:message-id:in-reply-to:references\n :mime-version:content-transfer-encoding;\n bh=NxwYqRmH74CUDBDX2IKkxpK6qiTEAsIsL/DXaTa1NPc=;\n b=taxPy8ZmdLxJsxKMS+MG9TiA5+cRmZYEjVM0Y85cvY1GVJAG89VpsriRA7swRxI9Sv\n +BF3vilvw5rX8qxCYlKLgGdx5pPtTsspcggphJ6m2wonVQipPRXp7t6QYxy8qBI/1ozv\n QTKvPbzTMmlSyhJ/RaTRATuNZh5z3Pnyqld5vecyinh13xJrWiuSwLB5Xur1X+kwWDQA\n DQhuBbFxdBT3TgQ3rr9ct+LOOWhLVibwic6SEp9HcoGaRLuu4rjzzN+ZHglnDWu7MjqO\n 0CiK67wpAGd5anmuZznZdMVGb34KEhENaJUMNrTxTgDx7UDeY7o8Qnmsc7jbviXDTvll\n M5yA==",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20161025;\n h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to\n :references:mime-version:content-transfer-encoding;\n bh=NxwYqRmH74CUDBDX2IKkxpK6qiTEAsIsL/DXaTa1NPc=;\n b=FzYFgCuTMN6GbDhwF/7FoNXGYP4KsxZct40tmGpcpkbm2RyIXasF8OlA8vB5b5pD/S\n 0TLMwGk8k1ZZL39qHkuqGgHY8luZO0QMgB8uKyx9e7TJfh/RAEKrmF2y4seuGsU1UnRl\n snBhMKyKEm49M/YxPZeEKitft9EJ+RzTJjqgQwmqjigzoBLaEd8WfI+vPiBzhs5FlA+a\n D6n3cjA33Zl62wK9qVyedjvpx5wg36DNLpqy4AvoN1wbFkY3mEAB7Wk1WQOwlu7hVuDh\n +G1NXLK4oonaxGBBzLVfDwyg/DuEzd5k9N4UBiiGFF5WcJeNFhfj1E91BIS34k+E/Wep\n zobQ==",
        "X-Gm-Message-State": "AOAM533BxZEVGMl25U6JJSCXEAXuFJWt8C+wVO1A4DvkA+P6+VlUgJuX\n mNyznYL+F3mwPJ4gvR4WHDumawno",
        "X-Google-Smtp-Source": "\n ABdhPJzhgZPTTPa5IdyOQ8xw+etdb/hLXDVeY1eit7OkPFPi92uXNdO+BVzBifWIOcmeOxsalHH8pw==",
        "X-Received": "by 2002:a1c:2c45:: with SMTP id s66mr11379667wms.40.1591928728448;\n Thu, 11 Jun 2020 19:25:28 -0700 (PDT)",
        "From": "Oliver O'Halloran <oohall@gmail.com>",
        "To": "skiboot@lists.ozlabs.org",
        "Date": "Fri, 12 Jun 2020 12:24:47 +1000",
        "Message-Id": "<20200612022452.371685-11-oohall@gmail.com>",
        "X-Mailer": "git-send-email 2.26.2",
        "In-Reply-To": "<20200612022452.371685-1-oohall@gmail.com>",
        "References": "<20200612022452.371685-1-oohall@gmail.com>",
        "MIME-Version": "1.0",
        "Subject": "[Skiboot] [PATCH 10/15] travis: Disable seccomp on child containers",
        "X-BeenThere": "skiboot@lists.ozlabs.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "Mailing list for skiboot development <skiboot.lists.ozlabs.org>",
        "List-Unsubscribe": "<https://lists.ozlabs.org/options/skiboot>,\n <mailto:skiboot-request@lists.ozlabs.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.ozlabs.org/pipermail/skiboot/>",
        "List-Post": "<mailto:skiboot@lists.ozlabs.org>",
        "List-Help": "<mailto:skiboot-request@lists.ozlabs.org?subject=help>",
        "List-Subscribe": "<https://lists.ozlabs.org/listinfo/skiboot>,\n <mailto:skiboot-request@lists.ozlabs.org?subject=subscribe>",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Errors-To": "skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org",
        "Sender": "\"Skiboot\"\n <skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org>"
    },
    "content": "We've been hitting the following issue with valgrind breaking when run\ninside a Fedora 32 container:\n\n\t        [ BOOT TEST ]  ccan/check_type/test/run\n\tvalgrind: ccan/check_type/test/run: Operation not permitted\n\tmake: *** [/build/ccan/Makefile.check:24:\n\tccan/check_type/test/run-check] Error 126\n\tmake: *** Waiting for unfinished jobs....\n\nThis seems to be a result of the default seccomp profile blocking system\ncalls that valgrind wants to use to inspect the process being debugged\n(i.e. ptrace). Fix this by using the unrestricted seccomp profile and\ngiving the container the ptrace capability.\n\nTravis uses ephemereal VMs for each job so this isn't any kind of\nsecurity issue.\n\nSigned-off-by: Oliver O'Halloran <oohall@gmail.com>\n---\n .travis.yml | 1 +\n 1 file changed, 1 insertion(+)",
    "diff": "diff --git a/.travis.yml b/.travis.yml\nindex 17061913feb5..860d204d0465 100644\n--- a/.travis.yml\n+++ b/.travis.yml\n@@ -39,6 +39,7 @@ install:\n script:\n     - >\n       docker run\n+      --security-opt seccomp=unconfined\n       --volume $HOME/.ccache:/root/.ccache\n       --volume `pwd`:/build\n       --volume `pwd`/ci_build_cache/${RUN_ON_CONTAINER}:/root/ci_build_cache/\n",
    "prefixes": [
        "10/15"
    ]
}