get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2218373/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2218373,
    "url": "http://patchwork.ozlabs.org/api/patches/2218373/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/ae0079a2839dceef08f3324714d45fb48d5d7100.1775023421.git.michal.simek@amd.com/",
    "project": {
        "id": 18,
        "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api",
        "name": "U-Boot",
        "link_name": "uboot",
        "list_id": "u-boot.lists.denx.de",
        "list_email": "u-boot@lists.denx.de",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<ae0079a2839dceef08f3324714d45fb48d5d7100.1775023421.git.michal.simek@amd.com>",
    "list_archive_url": null,
    "date": "2026-04-01T06:03:45",
    "name": "[v3,2/3] event: Introduce EVT_POST_PREBOOT event",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "f887d98142a1a6c959db671ae79e77bb5494bfa4",
    "submitter": {
        "id": 84271,
        "url": "http://patchwork.ozlabs.org/api/people/84271/?format=api",
        "name": "Michal Simek",
        "email": "michal.simek@amd.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/ae0079a2839dceef08f3324714d45fb48d5d7100.1775023421.git.michal.simek@amd.com/mbox/",
    "series": [
        {
            "id": 498277,
            "url": "http://patchwork.ozlabs.org/api/series/498277/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=498277",
            "date": "2026-04-01T06:03:43",
            "name": "fwu: Call EFI stack initialization after preboot",
            "version": 3,
            "mbox": "http://patchwork.ozlabs.org/series/498277/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2218373/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2218373/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<u-boot-bounces@lists.denx.de>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=amd.com header.i=@amd.com header.a=rsa-sha256\n header.s=selector1 header.b=rheRnHDK;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=amd.com",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de",
            "phobos.denx.de;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=amd.com header.i=@amd.com header.b=\"rheRnHDK\";\n\tdkim-atps=neutral",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=amd.com",
            "phobos.denx.de;\n spf=fail smtp.mailfrom=michal.simek@amd.com"
        ],
        "Received": [
            "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4flvb122fZz1xtJ\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 01 Apr 2026 17:04:45 +1100 (AEDT)",
            "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id 43F5084099;\n\tWed,  1 Apr 2026 08:04:37 +0200 (CEST)",
            "by phobos.denx.de (Postfix, from userid 109)\n id 21FBF84090; Wed,  1 Apr 2026 08:04:36 +0200 (CEST)",
            "from SN4PR0501CU005.outbound.protection.outlook.com\n (mail-southcentralusazlp170110003.outbound.protection.outlook.com\n [IPv6:2a01:111:f403:c10d::3])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id EEF5584099\n for <u-boot@lists.denx.de>; Wed,  1 Apr 2026 08:04:33 +0200 (CEST)",
            "from CH0PR08CA0019.namprd08.prod.outlook.com (2603:10b6:610:33::24)\n by BY5PR12MB4081.namprd12.prod.outlook.com (2603:10b6:a03:20e::21)\n with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9769.17; Wed, 1 Apr\n 2026 06:04:27 +0000",
            "from CH1PEPF0000AD82.namprd04.prod.outlook.com\n (2603:10b6:610:33:cafe::fb) by CH0PR08CA0019.outlook.office365.com\n (2603:10b6:610:33::24) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9745.30 via Frontend Transport; Wed,\n 1 Apr 2026 06:03:59 +0000",
            "from satlexmb08.amd.com (165.204.84.17) by\n CH1PEPF0000AD82.mail.protection.outlook.com (10.167.244.91) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9769.17 via Frontend Transport; Wed, 1 Apr 2026 06:04:27 +0000",
            "from satlexmb08.amd.com (10.181.42.217) by satlexmb08.amd.com\n (10.181.42.217) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Wed, 1 Apr\n 2026 01:04:26 -0500",
            "from localhost (10.180.168.240) by satlexmb08.amd.com\n (10.181.42.217) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17 via Frontend\n Transport; Wed, 1 Apr 2026 01:04:25 -0500"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-2.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,\n DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,\n RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2",
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=dxPmyStRbWQolJv8+PUtRQO1xQyPRt4C4dZ3CDAkVo5aZBTeBjGwzoFlvSEt5Gq8cqSQWOQbJyX8rQX4MZIYUtpo7BCnyybZ9jMPg2bde7Q4tw1MGuwSvpK8F3YYv97n7h+8hkw0ps1lHWWJXkYXGAzy8li3gVPrOjmYAjKyjgMYmycEFNcmq1tnFQ+YkyzttvoCsk16RE7qxeN3SMYgdwlI4rtfZAXHjBugfJlJo0h7ESw9+dgO+Gm2TbQAe5uV3/cbIprOOWQEVYfe3OIxFLD/bXncSpdJYhLIBFWtQWb/Wl4I/Yk1vtq6j/0zZXZOTyaBcd80W0FfUKCLdU5GBA==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=Z1OiGqWBZktCmbBCo4ViYYvrNvysqb8tZncNw79epwE=;\n b=r8TRWbF6HC4E/hScoRtwxarmrrvfOIpi1R6qQLBWFMoyZBMFs3f+vStGn0miVRtbubPSW/p8nchqlkEvpRmm75vnLZk+GkOci4rxX5mb2HummxRCtKtzesO8YlAgFXFCAnlz8j1QKHpRprlqaP/JWA7U39F47W+mZkwsgLy52rYTbqoaK4cxHrHc5soy64wak4xVzuqbuZBtVzQ479MBccJvRgCczTLqCu5i53wDSI/BeyO/OEKCPP++OAb+boZiMITgmbJIu9Wrp+6DHZUDyjHuoZUngN8dICO+E139pCsL5RY+Ij31GWUxfEjs6obC/qz38CIF1Xwz+B3dLLMqeg==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 165.204.84.17) smtp.rcpttodomain=lists.denx.de smtp.mailfrom=amd.com;\n dmarc=pass (p=quarantine sp=quarantine pct=100) action=none\n header.from=amd.com; dkim=none (message not signed); arc=none (0)",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=Z1OiGqWBZktCmbBCo4ViYYvrNvysqb8tZncNw79epwE=;\n b=rheRnHDK+bZdBnaVCaiem211Ar+q6xHUo6y02bF+bJxkIXvRoOGr4HZMUs2dKPsXmVyH98NqH6W2oKg+BQ9X9OB5c5t3CoWg97fVY/gxomV+KlQ7KZ6wa0oai7HAoAgO/UASzqtwtqMRZCa9EDPBecWBwZR2t8OkueOAzVeH7pM=",
        "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 165.204.84.17)\n smtp.mailfrom=amd.com; dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=amd.com;",
        "Received-SPF": "Pass (protection.outlook.com: domain of amd.com designates\n 165.204.84.17 as permitted sender) receiver=protection.outlook.com;\n client-ip=165.204.84.17; helo=satlexmb08.amd.com; pr=C",
        "From": "Michal Simek <michal.simek@amd.com>",
        "To": "<u-boot@lists.denx.de>, <git@amd.com>, <xypron.glpk@gmx.de>,\n <ilias.apalodimas@linaro.org>, <sjg@chromium.org>",
        "CC": "Casey Connolly <casey.connolly@linaro.org>, Tom Rini <trini@konsulko.com>",
        "Subject": "[PATCH v3 2/3] event: Introduce EVT_POST_PREBOOT event",
        "Date": "Wed, 1 Apr 2026 08:03:45 +0200",
        "Message-ID": "\n <ae0079a2839dceef08f3324714d45fb48d5d7100.1775023421.git.michal.simek@amd.com>",
        "X-Mailer": "git-send-email 2.43.0",
        "In-Reply-To": "<cover.1775023421.git.michal.simek@amd.com>",
        "References": "<cover.1775023421.git.michal.simek@amd.com>",
        "MIME-Version": "1.0",
        "X-Developer-Signature": "v=1; a=openpgp-sha256; l=1976; i=michal.simek@amd.com;\n h=from:subject:message-id; bh=T/cGva4hXoG7w9TnsMuwHQ2paQ0lMfy68D8biPoEpE8=;\n b=owGbwMvMwCG2mv3fB7+vgl8ZT6slMWSe2RoSKeIhKfNyWp9EempEd9CZ339f7J6b8dWe+cGUs\n NaDzyKjO0pZGMQ4GGTFFFmmM+k4rPl2banY8sh8mDmsTCBDGLg4BWAi768x/PfvvLGVWdBy9Z03\n s7fVqey3sHHO0Zh72tX11+NtDXdXPIlk+MPVNS1q+6ES6WSeyWoS+Z8u3hVVTdPdmK60Z2nd9YQ\n VGowA",
        "X-Developer-Key": "i=michal.simek@amd.com; a=openpgp;\n fpr=67350C9BF5CCEE9B5364356A377C7F21FE3D1F91",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-EOPAttributedMessage": "0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-TrafficTypeDiagnostic": "CH1PEPF0000AD82:EE_|BY5PR12MB4081:EE_",
        "X-MS-Office365-Filtering-Correlation-Id": "0605ae7b-462f-4e8c-c919-08de8fb48817",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|1800799024|82310400026|376014|36860700016|56012099003|18002099003|22082099003;",
        "X-Microsoft-Antispam-Message-Info": "\n EUiHquzeUB2rilXZrbIdOByuJ+eiVWoqp3bMfuBKyOroFDrzKHTLLU/GQYfUYtYFxuBQjR41iozfN+otQAvfAiFkCqtfjccsykxawe3AUWG3hjULo8zUJkG985z/TR3+VKFFvHF5Q2FnoeQQ7CXaX1xdU+1w6DmNayaSLjy9+9gyWKp4Zi5oQoZdZ7OwFoBwXCgj3fsbDxRN3H6LyGL1pFEaE3WyToHPxsl95wmg7h3oR0xlFFgKtvJPWtwxPhKSai2NGYGbW3F1inP0WjnjX74XQfe+bdyFUnZYle8/QCx38KiabSdnDPDigz1jyQnQYDyVKlU9H8NLNmNRWuBeYD9TMKTjvm/0AL1582Xge9WmrOuDl5FInOPudHdCsRXJQd3KuRRVlXrAyybHT1fV02xpPA+03jpHHeUNJS9FBtY2e2UaXGRA0fMMzCBR+uI8/l09pWcbIknaxU/Yvz0/w0QFYrLVJQSZJ2cfTkkUQ9btD2KXMWt524A2Fv/IpxqEo3VKFbH+W4JNRc/zqBrDSrVXTELIa//JCMbb2zjdh6tuSNZplK82zTzS4jnezmPqo6DIkaVIorB44q+CEIGd8q26EDMLrkfzCKM7mNkKD4WZN4W4niApYBx0jN8s+cBMS5QO6wI8EEqzepzPTvNzIcp9afJKTNRSfH4jHyKQip1/g5QoQDQARk+aIg0xwch4BYRojRkkA8jcQr5IZjRyeX4nuXkfzjKRDrNtMYPMb7PlwQejsPTQdH1ZbpfEhM0d1P/j3m8+AxGyhYDTs5IVZw==",
        "X-Forefront-Antispam-Report": "CIP:165.204.84.17; CTRY:US; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:satlexmb08.amd.com; PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(1800799024)(82310400026)(376014)(36860700016)(56012099003)(18002099003)(22082099003);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n sOvLI1hr8XgkZETd/cqB3VhkAjqxDbF8cqhjuodD3PQswg4p5zgywjZ51mYgp8FR9R8LP1Qxhxg+vE/QYeI8PGdOph8p6elU2OfxDO9YpztdO36Ns9iKG+iPKwv9KaTBvlByYCE+3viAZGMeZkxJ9j9mdI1p/MzoUngIBhBbYBYoDH9bn+JW2iifNWEmvJMYSW+NHSohWlFgW02y6Sh0O1GqR1ZU9Ka/JicyZOUJu059QX3IjQtdHbhZLbLAG413reVub82iox0Sjo3NWZ8bLNGxTyzYsRMBxtnWI8hEe2fWkqJjDkxSvKL61WVUEyCD1fDA4zfr+wubKlMNCpmYd3pR/qZZZ8xM9CfkdPMLQrFTi48MViDLyH4VNxczZL2EKdhU8f4OAZ5Kvojxj7j+Z7CA5Zq+JpIxqaEiJzLyCtnYREPQKdJqUW0523IGA4cL",
        "X-OriginatorOrg": "amd.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "01 Apr 2026 06:04:27.3054 (UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 0605ae7b-462f-4e8c-c919-08de8fb48817",
        "X-MS-Exchange-CrossTenant-Id": "3dd8961f-e488-4e60-8e11-a82d994e183d",
        "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d; Ip=[165.204.84.17];\n Helo=[satlexmb08.amd.com]",
        "X-MS-Exchange-CrossTenant-AuthSource": "\n CH1PEPF0000AD82.namprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "BY5PR12MB4081",
        "X-BeenThere": "u-boot@lists.denx.de",
        "X-Mailman-Version": "2.1.39",
        "Precedence": "list",
        "List-Id": "U-Boot discussion <u-boot.lists.denx.de>",
        "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>",
        "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>",
        "List-Post": "<mailto:u-boot@lists.denx.de>",
        "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>",
        "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>",
        "Errors-To": "u-boot-bounces@lists.denx.de",
        "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>",
        "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de",
        "X-Virus-Status": "Clean"
    },
    "content": "Add a new EVT_POST_PREBOOT event type which is fired in main_loop()\nafter the preboot command has been executed.\n\nSigned-off-by: Michal Simek <michal.simek@amd.com>\nReviewed-by: Simon Glass <sjg@chromium.org>\n---\n\nChanges in v3:\n- add missing type_name extension\n\nChanges in v2:\n- check return value\n\n common/event.c  | 3 +++\n common/main.c   | 4 ++++\n include/event.h | 9 +++++++++\n 3 files changed, 16 insertions(+)",
    "diff": "diff --git a/common/event.c b/common/event.c\nindex 8d7513eb10b6..398e713d2f82 100644\n--- a/common/event.c\n+++ b/common/event.c\n@@ -49,6 +49,9 @@ const char *const type_name[] = {\n \t/* main loop events */\n \t\"main_loop\",\n \n+\t/* post preboot events */\n+\t\"post_preboot\",\n+\n \t/* livetree has been built */\n \t\"of_live_init\",\n };\ndiff --git a/common/main.c b/common/main.c\nindex b0b6e74f5d3d..4b4504557f6e 100644\n--- a/common/main.c\n+++ b/common/main.c\n@@ -19,6 +19,7 @@\n #include <net.h>\n #include <version_string.h>\n #include <efi_loader.h>\n+#include <event.h>\n \n static void run_preboot_environment_command(void)\n {\n@@ -53,6 +54,9 @@ void main_loop(void)\n \tif (IS_ENABLED(CONFIG_USE_PREBOOT))\n \t\trun_preboot_environment_command();\n \n+\tif (event_notify_null(EVT_POST_PREBOOT))\n+\t\treturn;\n+\n \tif (IS_ENABLED(CONFIG_UPDATE_TFTP))\n \t\tupdate_tftp(0UL, NULL, NULL);\n \ndiff --git a/include/event.h b/include/event.h\nindex 1d267f1d1054..3ce5f992b04e 100644\n--- a/include/event.h\n+++ b/include/event.h\n@@ -153,6 +153,15 @@ enum event_t {\n \t */\n \tEVT_MAIN_LOOP,\n \n+\t/**\n+\t * @EVT_POST_PREBOOT:\n+\t * This event is triggered in main_loop() after the preboot command\n+\t * has run, so that devices initialised by preboot (e.g. USB, UFS)\n+\t * are available to event handlers. Its parameter is NULL.\n+\t * A non-zero return value causes the boot to fail.\n+\t */\n+\tEVT_POST_PREBOOT,\n+\n \t/**\n \t * @EVT_OF_LIVE_BUILT:\n \t * This event is triggered immediately after the live device tree has been\n",
    "prefixes": [
        "v3",
        "2/3"
    ]
}