get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2146084/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2146084,
    "url": "http://patchwork.ozlabs.org/api/patches/2146084/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/20251006101057.4172248-2-anshuld@ti.com/",
    "project": {
        "id": 18,
        "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api",
        "name": "U-Boot",
        "link_name": "uboot",
        "list_id": "u-boot.lists.denx.de",
        "list_email": "u-boot@lists.denx.de",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20251006101057.4172248-2-anshuld@ti.com>",
    "list_archive_url": null,
    "date": "2025-10-06T10:10:49",
    "name": "[-next,v3,1/7] spl: Kconfig: add SPL_OS_BOOT_SECURE config symbol",
    "commit_ref": null,
    "pull_url": null,
    "state": "changes-requested",
    "archived": false,
    "hash": "31c90a072d49515dde8c08b03cf4a3aa6379adb8",
    "submitter": {
        "id": 90324,
        "url": "http://patchwork.ozlabs.org/api/people/90324/?format=api",
        "name": "Anshul Dalal",
        "email": "anshuld@ti.com"
    },
    "delegate": {
        "id": 3651,
        "url": "http://patchwork.ozlabs.org/api/users/3651/?format=api",
        "username": "trini",
        "first_name": "Tom",
        "last_name": "Rini",
        "email": "trini@ti.com"
    },
    "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/20251006101057.4172248-2-anshuld@ti.com/mbox/",
    "series": [
        {
            "id": 476383,
            "url": "http://patchwork.ozlabs.org/api/series/476383/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=476383",
            "date": "2025-10-06T10:10:48",
            "name": "Add support for secure falcon mode: disable fallback",
            "version": 3,
            "mbox": "http://patchwork.ozlabs.org/series/476383/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2146084/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2146084/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<u-boot-bounces@lists.denx.de>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=ti.com header.i=@ti.com header.a=rsa-sha256\n header.s=ti-com-17Q1 header.b=IOjD9bqv;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=ti.com",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de",
            "phobos.denx.de;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=ti.com header.i=@ti.com header.b=\"IOjD9bqv\";\n\tdkim-atps=neutral",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=ti.com",
            "phobos.denx.de; spf=pass smtp.mailfrom=anshuld@ti.com"
        ],
        "Received": [
            "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4cgFRC65bsz1yGb\n\tfor <incoming@patchwork.ozlabs.org>; Mon,  6 Oct 2025 21:11:19 +1100 (AEDT)",
            "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 25EF9835FE;\n\tMon,  6 Oct 2025 12:11:11 +0200 (CEST)",
            "by phobos.denx.de (Postfix, from userid 109)\n id E5AF383653; Mon,  6 Oct 2025 12:11:08 +0200 (CEST)",
            "from fllvem-ot03.ext.ti.com (fllvem-ot03.ext.ti.com [198.47.19.245])\n (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n bits)) (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id EB13C835C6\n for <u-boot@lists.denx.de>; Mon,  6 Oct 2025 12:11:06 +0200 (CEST)",
            "from fllvem-sh04.itg.ti.com ([10.64.41.54])\n by fllvem-ot03.ext.ti.com (8.15.2/8.15.2) with ESMTP id 596AB3pH3526633;\n Mon, 6 Oct 2025 05:11:03 -0500",
            "from DLEE103.ent.ti.com (dlee103.ent.ti.com [157.170.170.33])\n by fllvem-sh04.itg.ti.com (8.18.1/8.18.1) with ESMTPS id 596AB3HT4044645\n (version=TLSv1.2 cipher=ECDHE-RSA-AES128-SHA256 bits=128 verify=FAIL);\n Mon, 6 Oct 2025 05:11:03 -0500",
            "from DLEE215.ent.ti.com (157.170.170.118) by DLEE103.ent.ti.com\n (157.170.170.33) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2507.55; Mon, 6\n Oct 2025 05:11:02 -0500",
            "from lelvem-mr05.itg.ti.com (10.180.75.9) by DLEE215.ent.ti.com\n (157.170.170.118) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20 via Frontend\n Transport; Mon, 6 Oct 2025 05:11:02 -0500",
            "from localhost (dhcp-172-24-233-105.dhcp.ti.com [172.24.233.105])\n by lelvem-mr05.itg.ti.com (8.18.1/8.18.1) with ESMTP id 596AB10s3511531;\n Mon, 6 Oct 2025 05:11:02 -0500"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-2.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,\n DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,\n RCVD_IN_DNSWL_BLOCKED,RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,\n RCVD_IN_VALIDITY_RPBL_BLOCKED,SPF_HELO_PASS,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com;\n s=ti-com-17Q1; t=1759745463;\n bh=Jp7/xafMm6l8fNlv2qqj/gkubkkiSITH99AaRYmBEsY=;\n h=From:To:CC:Subject:Date:In-Reply-To:References;\n b=IOjD9bqvjoqshOfQyk2vLZo+w4FODAxrFrg4RUDW+0UdrzCrTDaGoqHmBTq42VtF2\n /q9/AjAQKb5BZX8G3JZ37nZv+SOTY4V46L9SVB9dfTjZoA/rHfiYuqQxyyL86Kef1s\n yVmQmik5FzekyaWH79gG5WocTU6YxbcS/VRQ0tdg=",
        "From": "Anshul Dalal <anshuld@ti.com>",
        "To": "<u-boot@lists.denx.de>",
        "CC": "Anshul Dalal <anshuld@ti.com>, <vigneshr@ti.com>, <trini@konsulko.com>,\n <afd@ti.com>, <m-chawdhry@ti.com>, <n-francis@ti.com>, <b-liu@ti.com>,\n <nm@ti.com>, <bb@ti.com>, <kever.yang@rock-chips.com>,\n <hl@rock-chips.com>, <tim@feathertop.org>,\n <marek.vasut+renesas@mailbox.org>",
        "Subject": "[PATCH -next v3 1/7] spl: Kconfig: add SPL_OS_BOOT_SECURE config\n symbol",
        "Date": "Mon, 6 Oct 2025 15:40:49 +0530",
        "Message-ID": "<20251006101057.4172248-2-anshuld@ti.com>",
        "X-Mailer": "git-send-email 2.51.0",
        "In-Reply-To": "<20251006101057.4172248-1-anshuld@ti.com>",
        "References": "<20251006101057.4172248-1-anshuld@ti.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-C2ProcessedOrg": "333ef613-75bf-4e12-a4b1-8e3623f5dcea",
        "X-BeenThere": "u-boot@lists.denx.de",
        "X-Mailman-Version": "2.1.39",
        "Precedence": "list",
        "List-Id": "U-Boot discussion <u-boot.lists.denx.de>",
        "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>",
        "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>",
        "List-Post": "<mailto:u-boot@lists.denx.de>",
        "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>",
        "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>",
        "Errors-To": "u-boot-bounces@lists.denx.de",
        "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>",
        "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de",
        "X-Virus-Status": "Clean"
    },
    "content": "This patch adds the new SPL_OS_BOOT_SECURE symbol that enables secure\nboot flow in falcon mode. This symbol can be used to disable certain\ninherently insecure options during falcon boot.\n\nReviewed-by: Tom Rini <trini@konsulko.com>\nSigned-off-by: Anshul Dalal <anshuld@ti.com>\n---\n common/spl/Kconfig | 8 ++++++++\n 1 file changed, 8 insertions(+)",
    "diff": "diff --git a/common/spl/Kconfig b/common/spl/Kconfig\nindex f34b96efc02..f20651c3769 100644\n--- a/common/spl/Kconfig\n+++ b/common/spl/Kconfig\n@@ -1206,6 +1206,14 @@ config SPL_OS_BOOT\n \t  Enable booting directly to an OS from SPL.\n \t  for more info read doc/README.falcon\n \n+config SPL_OS_BOOT_SECURE\n+\tbool \"Allow Falcon Mode on secure devices\"\n+\tdepends on SPL_OS_BOOT\n+\thelp\n+\t  This allows for secure devices with signature verification capabilities\n+\t  to use falcon mode by disabling certain inherently non-securable options\n+\t  in the SPL boot flow.\n+\n config SPL_PAYLOAD_ARGS_ADDR\n \thex \"Address in memory to load 'args' file for Falcon Mode to\"\n \tdepends on SPL_OS_BOOT || SPL_LOAD_FIT_OPENSBI_OS_BOOT\n",
    "prefixes": [
        "-next",
        "v3",
        "1/7"
    ]
}