get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2195670/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2195670,
    "url": "http://patchwork.ozlabs.org/api/patches/2195670/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/da151d1eaab4ba5aaf37c11ec1ae5ac3f1abb98d.1770825377.git.michal.simek@amd.com/",
    "project": {
        "id": 18,
        "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api",
        "name": "U-Boot",
        "link_name": "uboot",
        "list_id": "u-boot.lists.denx.de",
        "list_email": "u-boot@lists.denx.de",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<da151d1eaab4ba5aaf37c11ec1ae5ac3f1abb98d.1770825377.git.michal.simek@amd.com>",
    "list_archive_url": null,
    "date": "2026-02-11T15:56:22",
    "name": "[v8,3/4] efi_loader: Setup default location for UEFI Variables storing",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "5eba931c1412adbfe4b5c720f957960ca89a5516",
    "submitter": {
        "id": 84271,
        "url": "http://patchwork.ozlabs.org/api/people/84271/?format=api",
        "name": "Michal Simek",
        "email": "michal.simek@amd.com"
    },
    "delegate": {
        "id": 96103,
        "url": "http://patchwork.ozlabs.org/api/users/96103/?format=api",
        "username": "apalos",
        "first_name": "Ilias",
        "last_name": "Apalodimas",
        "email": "apalos@gmail.com"
    },
    "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/da151d1eaab4ba5aaf37c11ec1ae5ac3f1abb98d.1770825377.git.michal.simek@amd.com/mbox/",
    "series": [
        {
            "id": 491869,
            "url": "http://patchwork.ozlabs.org/api/series/491869/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=491869",
            "date": "2026-02-11T15:56:20",
            "name": "efi_vars: Implement SPI Flash storage for EFI",
            "version": 8,
            "mbox": "http://patchwork.ozlabs.org/series/491869/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2195670/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2195670/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<u-boot-bounces@lists.denx.de>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=amd.com header.i=@amd.com header.a=rsa-sha256\n header.s=selector1 header.b=G/cGFTwB;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=amd.com",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de",
            "phobos.denx.de;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=amd.com header.i=@amd.com header.b=\"G/cGFTwB\";\n\tdkim-atps=neutral",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=amd.com",
            "phobos.denx.de;\n spf=fail smtp.mailfrom=michal.simek@amd.com"
        ],
        "Received": [
            "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fB33N4bS4z1xtr\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 12 Feb 2026 02:57:20 +1100 (AEDT)",
            "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 3E7D283CB5;\n\tWed, 11 Feb 2026 16:56:57 +0100 (CET)",
            "by phobos.denx.de (Postfix, from userid 109)\n id 9077A83015; Wed, 11 Feb 2026 16:56:54 +0100 (CET)",
            "from DM1PR04CU001.outbound.protection.outlook.com\n (mail-centralusazlp170100005.outbound.protection.outlook.com\n [IPv6:2a01:111:f403:c111::5])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id DAF2283A47\n for <u-boot@lists.denx.de>; Wed, 11 Feb 2026 16:56:50 +0100 (CET)",
            "from PH8P222CA0027.NAMP222.PROD.OUTLOOK.COM (2603:10b6:510:2d7::28)\n by CH1PR12MB9621.namprd12.prod.outlook.com (2603:10b6:610:2b2::5)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9587.19; Wed, 11 Feb\n 2026 15:56:47 +0000",
            "from SN1PEPF0002529D.namprd05.prod.outlook.com\n (2603:10b6:510:2d7:cafe::c2) by PH8P222CA0027.outlook.office365.com\n (2603:10b6:510:2d7::28) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9611.10 via Frontend Transport; Wed,\n 11 Feb 2026 15:56:47 +0000",
            "from satlexmb07.amd.com (165.204.84.17) by\n SN1PEPF0002529D.mail.protection.outlook.com (10.167.242.4) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9611.8 via Frontend Transport; Wed, 11 Feb 2026 15:56:46 +0000",
            "from satlexmb10.amd.com (10.181.42.219) by satlexmb07.amd.com\n (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Wed, 11 Feb\n 2026 09:56:45 -0600",
            "from satlexmb07.amd.com (10.181.42.216) by satlexmb10.amd.com\n (10.181.42.219) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Wed, 11 Feb\n 2026 09:56:44 -0600",
            "from localhost (10.180.168.240) by satlexmb07.amd.com\n (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17 via Frontend\n Transport; Wed, 11 Feb 2026 09:56:44 -0600"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,\n DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,\n RCVD_IN_DNSWL_BLOCKED,SPF_HELO_PASS,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2",
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=GRPKkp8PVVYuYmvXnDOisGvpZ1UTP2479ZuhrXzyqMpvsNwsm4XeOz6HMiJvpeiRKxS77Lgn/vyDrXkS7xnfpMSPSrbxdBJ4pTFsSNRIdM4YYiz9iuiuiegynlmyz87iO5nobQGF5ffouhE1TzI7CiyDk9/nGGoVBj5GFmv3qFbvN0Xu/MtqiBK4Y+4eC4QrAC3jIxHYbs9+mDPoUwxIWDNUd0HiH0Gtgp9T02Yvec0tDRR9YXUEWRGsdyLqZlUjFP0ANHt7BpuZt5ECMw7Z6AIiSc4I6NVvOsytu+PBJ2tn5dd1QRyQB4Uof0Z9/8Y0U6RxpK59IJatM7I5z0SkZA==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=mJbXkM0IYCOF2/kEEBf2nuk9UYFoWTu7wnBeJQN00Ng=;\n b=Tq2XLwqls5ug0FiLaDmdHh6oq8GCZ/xrHK+m4jCJcjN//kGt2i0l/ZzA8dV0NdM+xS5TND3w07Su9qIc1tgOC995ipAIcmMFdN60sgEx3EG7m5NUdnk3JjP/aIU/quWYVaxkC58t+i/r3LJ/1/OJ4/hvMQiVFqJxr/1r+TCwqZLlFdRXv4n0YnQjAY38S3G+TWzJSROiE4vhcMsUer3g17BxigSvoHgBF4sTd3H+C4oeDnV8SUnZMHhUXH8m0hNXt/3lFUXGF5euCy1uWO1WIKlMycyAcbXAnzKWapwTrgJbMZftASbhcLbv7j5u9+rj7Gg3Q12MfbvaUwJI3JZgsA==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 165.204.84.17) smtp.rcpttodomain=lists.denx.de smtp.mailfrom=amd.com;\n dmarc=pass (p=quarantine sp=quarantine pct=100) action=none\n header.from=amd.com; dkim=none (message not signed); arc=none (0)",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=mJbXkM0IYCOF2/kEEBf2nuk9UYFoWTu7wnBeJQN00Ng=;\n b=G/cGFTwBntdX7C8NSw60BYJCg10U+wFWYJ2dEnhMUpdqZYUjsbjL0iOUGq2a6ZT41TWSpk45g9CtTIt9fn27x5nDZ2iSb4H37u06A8lF+rdU4jw/llnYkHKyhhDFMmN6j84Dtsh3H/7nAzxxuGMMjIvSLTnzkTRD65CnEjfzFEo=",
        "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 165.204.84.17)\n smtp.mailfrom=amd.com; dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=amd.com;",
        "Received-SPF": "Pass (protection.outlook.com: domain of amd.com designates\n 165.204.84.17 as permitted sender) receiver=protection.outlook.com;\n client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C",
        "From": "Michal Simek <michal.simek@amd.com>",
        "To": "<u-boot@lists.denx.de>, <git@amd.com>",
        "CC": "Tom Rini <trini@konsulko.com>, Heinrich Schuchardt <xypron.glpk@gmx.de>,\n Ilias Apalodimas <ilias.apalodimas@linaro.org>, Jan Kiszka\n <jan.kiszka@siemens.com>, Jonathan Humphreys <j-humphreys@ti.com>, \"Shantur\n Rathore\" <i@shantur.com>, Simon Glass <sjg@chromium.org>, \"Ying-Chun Liu\n (PaulLiu)\" <paul.liu@linaro.org>",
        "Subject": "[PATCH v8 3/4] efi_loader: Setup default location for UEFI Variables\n storing",
        "Date": "Wed, 11 Feb 2026 16:56:22 +0100",
        "Message-ID": "\n <da151d1eaab4ba5aaf37c11ec1ae5ac3f1abb98d.1770825377.git.michal.simek@amd.com>",
        "X-Mailer": "git-send-email 2.43.0",
        "In-Reply-To": "<cover.1770825377.git.michal.simek@amd.com>",
        "References": "<cover.1770825377.git.michal.simek@amd.com>",
        "MIME-Version": "1.0",
        "X-Developer-Signature": "v=1; a=openpgp-sha256; l=1038; i=michal.simek@amd.com;\n h=from:subject:message-id; bh=1Ma0ek5bOYG1+2nXadjJq3mlDh0kCPT2Ka3d0xoE9wg=;\n b=owGbwMvMwCG2mv3fB7+vgl8ZT6slMWT2LFu/5XDhxsMVjA0X/bX3yEy3FfjgYBhVNUvTymexJ\n MuaWy80O0pZGMQ4GGTFFFmmM+k4rPl2banY8sh8mDmsTCBDGLg4BWAir1wYGWavWP3LWlHFUGZV\n /ERzixk396sKlNc/L38ZysKmv8KWhYGRYduPxQkzMu0b85ZtUTUN3dRqEyPWV//2xNcX+5c95Oh\n 7xQgA",
        "X-Developer-Key": "i=michal.simek@amd.com; a=openpgp;\n fpr=67350C9BF5CCEE9B5364356A377C7F21FE3D1F91",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-EOPAttributedMessage": "0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-TrafficTypeDiagnostic": "SN1PEPF0002529D:EE_|CH1PR12MB9621:EE_",
        "X-MS-Office365-Filtering-Correlation-Id": "c9ceab23-a778-4a8b-8c96-08de698628b8",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|36860700013|376014|82310400026|1800799024;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:165.204.84.17; CTRY:US; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:satlexmb07.amd.com; PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(36860700013)(376014)(82310400026)(1800799024); DIR:OUT;\n SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n rVh8Eykejlo5TprnqmcObn8BefaKVn/MB9irHgbnprfAY0WxQ4IuwHD7C7rebgBOmk1ZHUBfFSpQht66CcDbwDzlUiHBqCgcxMJGb3BmVqprMpuyK37Ny6UC490ZtbJsuOOpg32fsPRGD0zEL2zF0m3+v7t4SafHgP0zTuSTfrAMWDzs0UiZqtT78doN755FUhKKgPXHDTp5J131+7TwjeTuSvheSnw/xTNgFgtqhiWYjt8QqOux0f7CfASNpv2m8QHHxRQA1bmKZOILmL8xN1tVph6uXZ3n0DoD3RRSZaJmpb/UtrD5tYhCNQCD/waVKvo0br+hl8aed+3S8TefzfJr5C/BDYfDW+iS6mccD70fI97OUEZx217aza5kFVeAPKdLxvIQLdT+eMwq/z5ov042RxNji/N/q6QORDKKyKM7nRxi4+Xj/G5tEVhlJvhn",
        "X-OriginatorOrg": "amd.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "11 Feb 2026 15:56:46.2301 (UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n c9ceab23-a778-4a8b-8c96-08de698628b8",
        "X-MS-Exchange-CrossTenant-Id": "3dd8961f-e488-4e60-8e11-a82d994e183d",
        "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d; Ip=[165.204.84.17];\n Helo=[satlexmb07.amd.com]",
        "X-MS-Exchange-CrossTenant-AuthSource": "\n SN1PEPF0002529D.namprd05.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "CH1PR12MB9621",
        "X-BeenThere": "u-boot@lists.denx.de",
        "X-Mailman-Version": "2.1.39",
        "Precedence": "list",
        "List-Id": "U-Boot discussion <u-boot.lists.denx.de>",
        "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>",
        "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>",
        "List-Post": "<mailto:u-boot@lists.denx.de>",
        "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>",
        "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>",
        "Errors-To": "u-boot-bounces@lists.denx.de",
        "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>",
        "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de",
        "X-Virus-Status": "Clean"
    },
    "content": "EFI_VARIABLE_FILE_STORE is only available when FAT_WRITE is enabled but\nthat's not valid for all platforms and dependency should be covered.\n\nAlso Kconfig behavior is that if default option is not valid then Kconfig\nselects the first presented valid option instead hence it is better to\nrecord EFI_VARIABLE_NO_STORE as safe default option.\n\nSuggested-by: Tom Rini <trini@konsulko.com>\nSigned-off-by: Michal Simek <michal.simek@amd.com>\n---\n\nChanges in v8:\n- new patch\n\n lib/efi_loader/Kconfig | 3 ++-\n 1 file changed, 2 insertions(+), 1 deletion(-)",
    "diff": "diff --git a/lib/efi_loader/Kconfig b/lib/efi_loader/Kconfig\nindex 13e44be1d067..579eed658801 100644\n--- a/lib/efi_loader/Kconfig\n+++ b/lib/efi_loader/Kconfig\n@@ -112,7 +112,8 @@ menu \"UEFI Variables\"\n \n choice\n \tprompt \"Store for non-volatile UEFI variables\"\n-\tdefault EFI_VARIABLE_FILE_STORE\n+\tdefault EFI_VARIABLE_FILE_STORE if FAT_WRITE\n+\tdefault EFI_VARIABLE_NO_STORE\n \thelp\n \t  Select where non-volatile UEFI variables shall be stored.\n \n",
    "prefixes": [
        "v8",
        "3/4"
    ]
}