get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2219217/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2219217,
    "url": "http://patchwork.ozlabs.org/api/patches/2219217/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/uboot/patch/950bf29f73f44e8edc6b22cb7ea2d9a56cfe2872.1775144215.git.michal.simek@amd.com/",
    "project": {
        "id": 18,
        "url": "http://patchwork.ozlabs.org/api/projects/18/?format=api",
        "name": "U-Boot",
        "link_name": "uboot",
        "list_id": "u-boot.lists.denx.de",
        "list_email": "u-boot@lists.denx.de",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<950bf29f73f44e8edc6b22cb7ea2d9a56cfe2872.1775144215.git.michal.simek@amd.com>",
    "list_archive_url": null,
    "date": "2026-04-02T15:37:00",
    "name": "[v4,3/3] fwu: Move boottime checks to EVT_POST_PREBOOT",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "48ad3c03fda668ec129c8356369eb94f213417d5",
    "submitter": {
        "id": 84271,
        "url": "http://patchwork.ozlabs.org/api/people/84271/?format=api",
        "name": "Michal Simek",
        "email": "michal.simek@amd.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/uboot/patch/950bf29f73f44e8edc6b22cb7ea2d9a56cfe2872.1775144215.git.michal.simek@amd.com/mbox/",
    "series": [
        {
            "id": 498503,
            "url": "http://patchwork.ozlabs.org/api/series/498503/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/uboot/list/?series=498503",
            "date": "2026-04-02T15:36:57",
            "name": "fwu: Call EFI stack initialization after preboot",
            "version": 4,
            "mbox": "http://patchwork.ozlabs.org/series/498503/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2219217/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2219217/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<u-boot-bounces@lists.denx.de>",
        "X-Original-To": "incoming@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=amd.com header.i=@amd.com header.a=rsa-sha256\n header.s=selector1 header.b=zFZVgB7J;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.denx.de\n (client-ip=2a01:238:438b:c500:173d:9f52:ddab:ee01; helo=phobos.denx.de;\n envelope-from=u-boot-bounces@lists.denx.de; receiver=patchwork.ozlabs.org)",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=amd.com",
            "phobos.denx.de;\n spf=pass smtp.mailfrom=u-boot-bounces@lists.denx.de",
            "phobos.denx.de;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=amd.com header.i=@amd.com header.b=\"zFZVgB7J\";\n\tdkim-atps=neutral",
            "phobos.denx.de;\n dmarc=pass (p=quarantine dis=none) header.from=amd.com",
            "phobos.denx.de;\n spf=fail smtp.mailfrom=michal.simek@amd.com"
        ],
        "Received": [
            "from phobos.denx.de (phobos.denx.de\n [IPv6:2a01:238:438b:c500:173d:9f52:ddab:ee01])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fmmG11JMbz1xtJ\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 03 Apr 2026 02:38:01 +1100 (AEDT)",
            "from h2850616.stratoserver.net (localhost [IPv6:::1])\n\tby phobos.denx.de (Postfix) with ESMTP id A43A0839DF;\n\tThu,  2 Apr 2026 17:37:42 +0200 (CEST)",
            "by phobos.denx.de (Postfix, from userid 109)\n id 407D9840D8; Thu,  2 Apr 2026 17:37:41 +0200 (CEST)",
            "from CH4PR04CU002.outbound.protection.outlook.com\n (mail-northcentralusazlp170130007.outbound.protection.outlook.com\n [IPv6:2a01:111:f403:c105::7])\n (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits))\n (No client certificate requested)\n by phobos.denx.de (Postfix) with ESMTPS id 136B580212\n for <u-boot@lists.denx.de>; Thu,  2 Apr 2026 17:37:39 +0200 (CEST)",
            "from MW4PR03CA0074.namprd03.prod.outlook.com (2603:10b6:303:b6::19)\n by DS7PR12MB5887.namprd12.prod.outlook.com (2603:10b6:8:7a::7) with\n Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9769.17; Thu, 2 Apr 2026 15:37:35 +0000",
            "from MWH0EPF000A672F.namprd04.prod.outlook.com\n (2603:10b6:303:b6:cafe::e6) by MW4PR03CA0074.outlook.office365.com\n (2603:10b6:303:b6::19) with Microsoft SMTP Server (version=TLS1_3,\n cipher=TLS_AES_256_GCM_SHA384) id 15.20.9745.30 via Frontend Transport; Thu,\n 2 Apr 2026 15:37:35 +0000",
            "from satlexmb08.amd.com (165.204.84.17) by\n MWH0EPF000A672F.mail.protection.outlook.com (10.167.249.21) with Microsoft\n SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id\n 15.20.9769.17 via Frontend Transport; Thu, 2 Apr 2026 15:37:34 +0000",
            "from SATLEXMB04.amd.com (10.181.40.145) by satlexmb08.amd.com\n (10.181.42.217) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.2.2562.17; Thu, 2 Apr\n 2026 10:37:34 -0500",
            "from satlexmb07.amd.com (10.181.42.216) by SATLEXMB04.amd.com\n (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Thu, 2 Apr\n 2026 10:37:32 -0500",
            "from localhost (10.180.168.240) by satlexmb07.amd.com\n (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17 via Frontend\n Transport; Thu, 2 Apr 2026 10:37:32 -0500"
        ],
        "X-Spam-Checker-Version": "SpamAssassin 3.4.2 (2018-09-13) on phobos.denx.de",
        "X-Spam-Level": "",
        "X-Spam-Status": "No, score=-2.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH,\n DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,\n RCVD_IN_DNSWL_BLOCKED,SPF_HELO_PASS,SPF_PASS autolearn=ham\n autolearn_force=no version=3.4.2",
        "ARC-Seal": "i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;\n b=kcHVCRgXzdNaCVkFbjRI+fhZexdkDDYOYap/B7CFvyEIs1GRd/mAj+83ujqbnYLhx6L8QIjZeL13lqvK+jXX5ZSa7tbg+VlwKxq1I1nNGzHv/2TGoRWYI+x7nyBGaelOpkjDMwyel0KWd4uOCr075vfyIhzicfFhpSJFY8d6sCkLA6hw83LJYfwTSopKyxRRHhmHqsuflV2NeiTrcF9Adqu5vC1lNjuo/P4BLTEwtLHuF6dzhvDWyjte6/1TH/GdcYy4IObXX+jpM1s+Yli6324kGO/V+7L7U9qpxD1sk8CZ0iWaugnlx5hN2nwb3IihjMUHPtJDMzZIx7v96cvr5g==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;\n s=arcselector10001;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;\n bh=RMMRe9faY1eztzeudNpfXSBn+UtbEOEB2Knvv7ZMbTg=;\n b=p9jqlr/K1CeZ93ggvBLSVbeKYqG9w9fZAHaqU1B+i55Te8A1qCFlIUPWLpGDGGtd8mSG08nVFw68J+VR7DRAugqst2XDNe7Ijxudlwg7AiQUtaDZajmmIIHiBT1tgM0WUL6UQ5n2ofBGAwNkPjRKVlCgPdJjRLV+XjdrugtArrX4KRMWwO4xxOuCxyfFqcCv/Z9dhKWYO5qjZ1mBST1pIGu7Cufw1Glx6ByyUFska1VijQFesq6dfWyU8a8I5xIbMpiGAvOv1BeLY72Zht2bItXDMGpOS7KzbbBnD2Pqm5bFDnctg8jbn2FGhll7q5UdSzKqIZ17TchjR9bJHLFDUA==",
        "ARC-Authentication-Results": "i=1; mx.microsoft.com 1; spf=pass (sender ip is\n 165.204.84.17) smtp.rcpttodomain=lists.denx.de smtp.mailfrom=amd.com;\n dmarc=pass (p=quarantine sp=quarantine pct=100) action=none\n header.from=amd.com; dkim=none (message not signed); arc=none (0)",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1;\n h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;\n bh=RMMRe9faY1eztzeudNpfXSBn+UtbEOEB2Knvv7ZMbTg=;\n b=zFZVgB7JGM/f4tA0pTSEeGwCZOXlOtobQyZrLwgdyKoYuD6WrwP042f76e55e4NhMZurXCjnh8LKEl62DoZ6cJ6DUVnTZKJ1f3fufV+YV73DbSSWdAY42PoG5KGO/223dL9EjpEPDG86SKbe//2vGRi6w5In6WRXXs0dQ/pZ0NQ=",
        "X-MS-Exchange-Authentication-Results": "spf=pass (sender IP is 165.204.84.17)\n smtp.mailfrom=amd.com; dkim=none (message not signed)\n header.d=none;dmarc=pass action=none header.from=amd.com;",
        "Received-SPF": [
            "Pass (protection.outlook.com: domain of amd.com designates\n 165.204.84.17 as permitted sender) receiver=protection.outlook.com;\n client-ip=165.204.84.17; helo=satlexmb08.amd.com; pr=C",
            "None (SATLEXMB04.amd.com: michal.simek@amd.com does not\n designate permitted sender hosts)"
        ],
        "From": "Michal Simek <michal.simek@amd.com>",
        "To": "<u-boot@lists.denx.de>, <git@amd.com>, <xypron.glpk@gmx.de>,\n <ilias.apalodimas@linaro.org>, <sjg@chromium.org>",
        "CC": "Kory Maincent <kory.maincent@bootlin.com>, Padmarao Begari\n <padmarao.begari@amd.com>, Sughosh Ganu <sughosh.ganu@arm.com>, Tom Rini\n <trini@konsulko.com>",
        "Subject": "[PATCH v4 3/3] fwu: Move boottime checks to EVT_POST_PREBOOT",
        "Date": "Thu, 2 Apr 2026 17:37:00 +0200",
        "Message-ID": "\n <950bf29f73f44e8edc6b22cb7ea2d9a56cfe2872.1775144215.git.michal.simek@amd.com>",
        "X-Mailer": "git-send-email 2.43.0",
        "In-Reply-To": "<cover.1775144215.git.michal.simek@amd.com>",
        "References": "<cover.1775144215.git.michal.simek@amd.com>",
        "MIME-Version": "1.0",
        "X-Developer-Signature": "v=1; a=openpgp-sha256; l=1797; i=michal.simek@amd.com;\n h=from:subject:message-id; bh=rRW3ORajYwBBQdvsDcHsADyk8Y4G+freyDOd87PtcFw=;\n b=owGbwMvMwCG2mv3fB7+vgl8ZT6slMWSe69Xe/ub0AvdlNsJLfgnPeu/Xy7DKlPNY7LMNsw5v4\n 2bZV1n9uaOUhUGMg0FWTJFlOpOOw5pv15aKLY/Mh5nDygQyhIGLUwAm8vs4w1/ZyXliLVy7Qri3\n fTq2u0P965L/Ks9Xlur5cV2NOJr5m+s3w39Hx1sndXkL1kjHerNX7225yPi2tCVhXh7PY/Ebeon\n XpLgA",
        "X-Developer-Key": "i=michal.simek@amd.com; a=openpgp;\n fpr=67350C9BF5CCEE9B5364356A377C7F21FE3D1F91",
        "Content-Transfer-Encoding": "8bit",
        "Content-Type": "text/plain",
        "X-EOPAttributedMessage": "0",
        "X-MS-PublicTrafficType": "Email",
        "X-MS-TrafficTypeDiagnostic": "MWH0EPF000A672F:EE_|DS7PR12MB5887:EE_",
        "X-MS-Office365-Filtering-Correlation-Id": "2f91aa0c-3644-444b-06d7-08de90cdc335",
        "X-MS-Exchange-SenderADCheck": "1",
        "X-MS-Exchange-AntiSpam-Relay": "0",
        "X-Microsoft-Antispam": "BCL:0;\n ARA:13230040|376014|36860700016|1800799024|82310400026|22082099003|56012099003|18002099003;",
        "X-Microsoft-Antispam-Message-Info": "\n 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",
        "X-Forefront-Antispam-Report": "CIP:165.204.84.17; CTRY:US; LANG:en; SCL:1; SRV:;\n IPV:NLI; SFV:NSPM; H:satlexmb08.amd.com; PTR:InfoDomainNonexistent; CAT:NONE;\n SFS:(13230040)(376014)(36860700016)(1800799024)(82310400026)(22082099003)(56012099003)(18002099003);\n DIR:OUT; SFP:1101;",
        "X-MS-Exchange-AntiSpam-MessageData-ChunkCount": "1",
        "X-MS-Exchange-AntiSpam-MessageData-0": "\n VTpHnYyjClf76JrBuId3UomFhVX0yLbSeebBrdO+rac33ZxMR/x/KThIWaFqn4N6piTKCzVBrlQX8QpqR5FAeRiUpIXQ5nPqgOhnQt8xhBFn0TfVE2GaJi684rxfF4QVLwVL/ETFh/pgDy0yM4eA4aG2TmCtREUqJzxaLHL9HRMYw9X/aUATtnFIJh0UCXwU87fMJezxIZQQmaKK6q23aYX00FZE5PIN4jd0ZcLycnPQK7FFaF1vMA4Az3JgxvCszSKw/tk6c1l3qiqkv1vP2H0wCMCPGzR8c33JXB9aDXC5laB52yi3BRhUZfVRkNdOiK6S4Y3WqTFY0LdN1egEMFnz02k+4gceF+8NOJLF0fYnhmgboCUSvecJXSpCP7Hi/5em2MCzvgDUTThhxh4sLBiWWSshk+/iQM9fz5loGLOan1NHKiiVMU4NJdwY/5it",
        "X-OriginatorOrg": "amd.com",
        "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "02 Apr 2026 15:37:34.9575 (UTC)",
        "X-MS-Exchange-CrossTenant-Network-Message-Id": "\n 2f91aa0c-3644-444b-06d7-08de90cdc335",
        "X-MS-Exchange-CrossTenant-Id": "3dd8961f-e488-4e60-8e11-a82d994e183d",
        "X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp": "\n TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d; Ip=[165.204.84.17];\n Helo=[satlexmb08.amd.com]",
        "X-MS-Exchange-CrossTenant-AuthSource": "\n MWH0EPF000A672F.namprd04.prod.outlook.com",
        "X-MS-Exchange-CrossTenant-AuthAs": "Anonymous",
        "X-MS-Exchange-CrossTenant-FromEntityHeader": "HybridOnPrem",
        "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "DS7PR12MB5887",
        "X-BeenThere": "u-boot@lists.denx.de",
        "X-Mailman-Version": "2.1.39",
        "Precedence": "list",
        "List-Id": "U-Boot discussion <u-boot.lists.denx.de>",
        "List-Unsubscribe": "<https://lists.denx.de/options/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=unsubscribe>",
        "List-Archive": "<https://lists.denx.de/pipermail/u-boot/>",
        "List-Post": "<mailto:u-boot@lists.denx.de>",
        "List-Help": "<mailto:u-boot-request@lists.denx.de?subject=help>",
        "List-Subscribe": "<https://lists.denx.de/listinfo/u-boot>,\n <mailto:u-boot-request@lists.denx.de?subject=subscribe>",
        "Errors-To": "u-boot-bounces@lists.denx.de",
        "Sender": "\"U-Boot\" <u-boot-bounces@lists.denx.de>",
        "X-Virus-Scanned": "clamav-milter 0.103.8 at phobos.denx.de",
        "X-Virus-Status": "Clean"
    },
    "content": "Switch fwu_boottime_checks() from EVT_MAIN_LOOP to EVT_POST_PREBOOT\nbecause there is no reason to call FWU so early. FWU triggers EFI\nstack initialization before all devices are visible which prevents\nthe EFI stack from scanning these devices and adding them to EFI\nvariables.\n\nSigned-off-by: Michal Simek <michal.simek@amd.com>\n---\n\nChanges in v4:\n- update dm tests\n\n lib/fwu_updates/fwu.c | 2 +-\n test/dm/fwu_mdata.c   | 4 ++--\n 2 files changed, 3 insertions(+), 3 deletions(-)",
    "diff": "diff --git a/lib/fwu_updates/fwu.c b/lib/fwu_updates/fwu.c\nindex 37c613014d18..e82600a29a40 100644\n--- a/lib/fwu_updates/fwu.c\n+++ b/lib/fwu_updates/fwu.c\n@@ -796,4 +796,4 @@ static int fwu_boottime_checks(void)\n \n \treturn 0;\n }\n-EVENT_SPY_SIMPLE(EVT_MAIN_LOOP, fwu_boottime_checks);\n+EVENT_SPY_SIMPLE(EVT_POST_PREBOOT, fwu_boottime_checks);\ndiff --git a/test/dm/fwu_mdata.c b/test/dm/fwu_mdata.c\nindex 643b647af0a9..cfe543d8a236 100644\n--- a/test/dm/fwu_mdata.c\n+++ b/test/dm/fwu_mdata.c\n@@ -100,7 +100,7 @@ static int dm_test_fwu_mdata_read(struct unit_test_state *uts)\n \t * Trigger lib/fwu_updates/fwu.c fwu_boottime_checks()\n \t * to populate g_dev global pointer in that library.\n \t */\n-\tut_assertok(event_notify_null(EVT_MAIN_LOOP));\n+\tut_assertok(event_notify_null(EVT_POST_PREBOOT));\n \n \tut_assertok(uclass_first_device_err(UCLASS_FWU_MDATA, &dev));\n \tut_assertok(fwu_init());\n@@ -127,7 +127,7 @@ static int dm_test_fwu_mdata_write(struct unit_test_state *uts)\n \t * Trigger lib/fwu_updates/fwu.c fwu_boottime_checks()\n \t * to populate g_dev global pointer in that library.\n \t */\n-\tut_assertok(event_notify_null(EVT_MAIN_LOOP));\n+\tut_assertok(event_notify_null(EVT_POST_PREBOOT));\n \n \tut_assertok(uclass_first_device_err(UCLASS_FWU_MDATA, &dev));\n \n",
    "prefixes": [
        "v4",
        "3/3"
    ]
}