get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2147594/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2147594,
    "url": "http://patchwork.ozlabs.org/api/patches/2147594/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/20251009115846.897186-3-anshuld@ti.com/",
    "project": {
        "id": 18,
        "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api",
        "name": "U-Boot",
        "link_name": "uboot",
        "list_id": "u-boot.lists.denx.de",
        "list_email": "u-boot@lists.denx.de",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20251009115846.897186-3-anshuld@ti.com>",
    "list_archive_url": null,
    "date": "2025-10-09T11:58:44",
    "name": "[v2,2/3] spl: prevent loading args file in secure falcon mode",
    "commit_ref": "82e04e768fc21c1ac43df5d5a68ec8aaf008c0a8",
    "pull_url": null,
    "state": "accepted",
    "archived": false,
    "hash": "50a8f91b12918cdf979d842135d55a1f554ddca7",
    "submitter": {
        "id": 90324,
        "url": "http://patchwork.ozlabs.org/api/people/90324/?format=api",
        "name": "Anshul Dalal",
        "email": "anshuld@ti.com"
    },
    "delegate": {
        "id": 3651,
        "url": "http://patchwork.ozlabs.org/api/users/3651/?format=api",
        "username": "trini",
        "first_name": "Tom",
        "last_name": "Rini",
        "email": "trini@ti.com"
    },
    "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/20251009115846.897186-3-anshuld@ti.com/mbox/",
    "series": [
        {
            "id": 476899,
            "url": "http://patchwork.ozlabs.org/api/series/476899/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=476899",
            "date": "2025-10-09T11:58:42",
            "name": "Add support for secure falcon mode: disable args file",
            "version": 2,
            "mbox": "http://patchwork.ozlabs.org/series/476899/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2147594/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2147594/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<u-boot-bounces@lists.denx.de>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=ti.com header.i=@ti.com header.a=rsa-sha256\n header.s=ti-com-17Q1 header.b=eAcBv78x;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=ti.com",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de",
            "phobos.denx.de;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=ti.com header.i=@ti.com header.b=\"eAcBv78x\";\n\tdkim-atps=neutral",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=ti.com",
            "phobos.denx.de; spf=pass smtp.mailfrom=anshuld@ti.com"
        ],
        "Received": [
            "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange X25519 server-signature ECDSA (secp384r1))\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4cj7hQ1VRyz1yGS\n\tfor <incoming@patchwork.ozlabs.org>; Thu,  9 Oct 2025 22:59:18 +1100 (AEDT)",
            "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id AAAEC844FF;\n\tThu,  9 Oct 2025 13:59:00 +0200 (CEST)",
            "by phobos.denx.de (Postfix, from userid 109)\n id CE795844FF; Thu,  9 Oct 2025 13:58:59 +0200 (CEST)",
            "from lelvem-ot02.ext.ti.com (lelvem-ot02.ext.ti.com [198.47.23.235])\n (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n bits)) (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id B58FA84459\n for <u-boot@lists.denx.de>; Thu,  9 Oct 2025 13:58:57 +0200 (CEST)",
            "from fllvem-sh03.itg.ti.com ([10.64.41.86])\n by lelvem-ot02.ext.ti.com (8.15.2/8.15.2) with ESMTP id 599BwsMc527509;\n Thu, 9 Oct 2025 06:58:54 -0500",
            "from DLEE113.ent.ti.com (dlee113.ent.ti.com [157.170.170.24])\n by fllvem-sh03.itg.ti.com (8.18.1/8.18.1) with ESMTPS id 599BwsWr1409772\n (version=TLSv1.2 cipher=ECDHE-RSA-AES128-SHA256 bits=128 verify=FAIL);\n Thu, 9 Oct 2025 06:58:54 -0500",
            "from DLEE206.ent.ti.com (157.170.170.90) by DLEE113.ent.ti.com\n (157.170.170.24) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.2507.55; Thu, 9\n Oct 2025 06:58:53 -0500",
            "from lelvem-mr05.itg.ti.com (10.180.75.9) by DLEE206.ent.ti.com\n (157.170.170.90) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.20 via Frontend\n Transport; Thu, 9 Oct 2025 06:58:53 -0500",
            "from localhost (dhcp-172-24-233-105.dhcp.ti.com [172.24.233.105])\n by lelvem-mr05.itg.ti.com (8.18.1/8.18.1) with ESMTP id 599BwqCT210029;\n Thu, 9 Oct 2025 06:58:53 -0500"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-2.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,\n DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,\n RCVD_IN_DNSWL_BLOCKED,RCVD_IN_VALIDITY_CERTIFIED_BLOCKED,\n RCVD_IN_VALIDITY_RPBL_BLOCKED,SPF_HELO_PASS,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com;\n s=ti-com-17Q1; t=1760011134;\n bh=PEc0ujwOvW3awtO2KpSBzVDXZB+vWT1GLAn6PyzK61I=;\n h=From:To:CC:Subject:Date:In-Reply-To:References;\n b=eAcBv78xvzazIffukXXMEtCVm7b/XQmSB8rX/NQ27DhgTtajZDWRrwy2dpmw/uwHZ\n va1HwD0jawHafoTgppkwPcaRBPBMZ1krGNt1eDSjy5AzDUPXHJYdYWtuqeybzyA6p4\n AUfnwfzFsICXiJMqU4d4wcEqFFBaAnj3LYsXm+MM=",
        "From": "Anshul Dalal <anshuld@ti.com>",
        "To": "<u-boot@lists.denx.de>",
        "CC": "Anshul Dalal <anshuld@ti.com>, <vigneshr@ti.com>, <trini@konsulko.com>,\n <afd@ti.com>, <m-chawdhry@ti.com>, <n-francis@ti.com>, <b-liu@ti.com>,\n <nm@ti.com>, <bb@ti.com>, <kever.yang@rock-chips.com>,\n <hl@rock-chips.com>, <tim@feathertop.org>,\n <marek.vasut+renesas@mailbox.org>",
        "Subject": "[PATCH v2 2/3] spl: prevent loading args file in secure falcon mode",
        "Date": "Thu, 9 Oct 2025 17:28:44 +0530",
        "Message-ID": "<20251009115846.897186-3-anshuld@ti.com>",
        "X-Mailer": "git-send-email 2.51.0",
        "In-Reply-To": "<20251009115846.897186-1-anshuld@ti.com>",
        "References": "<20251009115846.897186-1-anshuld@ti.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-C2ProcessedOrg": "333ef613-75bf-4e12-a4b1-8e3623f5dcea",
        "X-BeenThere": "u-boot@lists.denx.de",
        "X-Mailman-Version": "2.1.39",
        "Precedence": "list",
        "List-Id": "U-Boot discussion <u-boot.lists.denx.de>",
        "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>",
        "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>",
        "List-Post": "<mailto:u-boot@lists.denx.de>",
        "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>",
        "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>",
        "Errors-To": "u-boot-bounces@lists.denx.de",
        "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>",
        "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de",
        "X-Virus-Status": "Clean"
    },
    "content": "The expected payload for the SPL in secure falcon mode is a fitImage\nthat contains the kernel image and the DT. This removes the need to load\nan additional args file, which exposes an additional attack vector since\nit can not be verified.\n\nTherefore this patch disables loading of the arg file when\nSPL_OS_BOOT_SECURE is set.\n\nReviewed-by: Tom Rini <trini@konsulko.com>\nSigned-off-by: Anshul Dalal <anshuld@ti.com>\n---\n common/spl/Kconfig | 3 ++-\n 1 file changed, 2 insertions(+), 1 deletion(-)",
    "diff": "diff --git a/common/spl/Kconfig b/common/spl/Kconfig\nindex 22ef43c3a6e..59be80dc55b 100644\n--- a/common/spl/Kconfig\n+++ b/common/spl/Kconfig\n@@ -796,6 +796,7 @@ config SPL_FS_LOAD_PAYLOAD_NAME\n config SPL_FS_LOAD_KERNEL_NAME\n \tstring \"File to load for the OS kernel from the filesystem\"\n \tdepends on (SPL_FS_EXT4 || SPL_FS_FAT || SPL_FS_SQUASHFS) && SPL_OS_BOOT\n+\tdefault \"fitImage\" if SPL_OS_BOOT_SECURE\n \tdefault \"uImage\"\n \thelp\n \t  Filename to read to load for the OS kernel when reading from the\n@@ -1216,7 +1217,7 @@ config SPL_OS_BOOT_SECURE\n \n config SPL_OS_BOOT_ARGS\n \tbool \"Allow SPL to load args for kernel in falcon mode\"\n-\tdepends on SPL_OS_BOOT || SPL_LOAD_FIT_OPENSBI_OS_BOOT\n+\tdepends on (SPL_OS_BOOT || SPL_LOAD_FIT_OPENSBI_OS_BOOT) && !SPL_OS_BOOT_SECURE\n \thelp\n \t  This option enables the SPL to load an args file (usually the FDT)\n \t  alongside the kernel image in falcon boot mode.\n",
    "prefixes": [
        "v2",
        "2/3"
    ]
}