get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/808090/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 808090,
    "url": "http://patchwork.ozlabs.org/api/patches/808090/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/skiboot/patch/1504164285-15095-2-git-send-email-cclaudio@linux.vnet.ibm.com/",
    "project": {
        "id": 44,
        "url": "http://patchwork.ozlabs.org/api/projects/44/?format=api",
        "name": "skiboot firmware development",
        "link_name": "skiboot",
        "list_id": "skiboot.lists.ozlabs.org",
        "list_email": "skiboot@lists.ozlabs.org",
        "web_url": "http://github.com/open-power/skiboot",
        "scm_url": "http://github.com/open-power/skiboot",
        "webscm_url": "",
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<1504164285-15095-2-git-send-email-cclaudio@linux.vnet.ibm.com>",
    "list_archive_url": null,
    "date": "2017-08-31T07:24:32",
    "name": "[v2,01/14] libstb/stb.c: remove macros used to force secure-mode and trusted-mode",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "87fba57040ef5e0fafa32af78d0ad5b9dd6c6c99",
    "submitter": {
        "id": 69305,
        "url": "http://patchwork.ozlabs.org/api/people/69305/?format=api",
        "name": "Claudio Carvalho",
        "email": "cclaudio@linux.vnet.ibm.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/skiboot/patch/1504164285-15095-2-git-send-email-cclaudio@linux.vnet.ibm.com/mbox/",
    "series": [
        {
            "id": 760,
            "url": "http://patchwork.ozlabs.org/api/series/760/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/skiboot/list/?series=760",
            "date": "2017-08-31T07:24:31",
            "name": "libstb: simplify the initialization of cvc drivers",
            "version": 2,
            "mbox": "http://patchwork.ozlabs.org/series/760/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/808090/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/808090/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "skiboot@lists.ozlabs.org"
        ],
        "Delivered-To": [
            "patchwork-incoming@bilbo.ozlabs.org",
            "skiboot@lists.ozlabs.org"
        ],
        "Received": [
            "from lists.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3])\n\t(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xjYnc2mt8z9sNr\n\tfor <incoming@patchwork.ozlabs.org>;\n\tThu, 31 Aug 2017 17:25:56 +1000 (AEST)",
            "from lists.ozlabs.org (lists.ozlabs.org [IPv6:2401:3900:2:1::3])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 3xjYnb5q39zDqTr\n\tfor <incoming@patchwork.ozlabs.org>;\n\tThu, 31 Aug 2017 17:25:55 +1000 (AEST)",
            "from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com\n\t[148.163.156.1])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 3xjYmf58SQzDqGX\n\tfor <skiboot@lists.ozlabs.org>; Thu, 31 Aug 2017 17:25:06 +1000 (AEST)",
            "from pps.filterd (m0098410.ppops.net [127.0.0.1])\n\tby mx0a-001b2d01.pphosted.com (8.16.0.21/8.16.0.21) with SMTP id\n\tv7V7NgMO064296\n\tfor <skiboot@lists.ozlabs.org>; Thu, 31 Aug 2017 03:25:04 -0400",
            "from e16.ny.us.ibm.com (e16.ny.us.ibm.com [129.33.205.206])\n\tby mx0a-001b2d01.pphosted.com with ESMTP id 2cpdby25wn-1\n\t(version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT)\n\tfor <skiboot@lists.ozlabs.org>; Thu, 31 Aug 2017 03:25:04 -0400",
            "from localhost\n\tby e16.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use\n\tOnly! Violators will be prosecuted\n\tfor <skiboot@lists.ozlabs.org> from <cclaudio@linux.vnet.ibm.com>;\n\tThu, 31 Aug 2017 03:25:03 -0400",
            "from b01cxnp22034.gho.pok.ibm.com (9.57.198.24)\n\tby e16.ny.us.ibm.com (146.89.104.203) with IBM ESMTP SMTP Gateway:\n\tAuthorized Use Only! Violators will be prosecuted; \n\tThu, 31 Aug 2017 03:25:00 -0400",
            "from b01ledav004.gho.pok.ibm.com (b01ledav004.gho.pok.ibm.com\n\t[9.57.199.109])\n\tby b01cxnp22034.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP\n\tid v7V7P0Po23134372\n\tfor <skiboot@lists.ozlabs.org>; Thu, 31 Aug 2017 07:25:00 GMT",
            "from localhost (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with SMTP id CE88F112034\n\tfor <skiboot@lists.ozlabs.org>; Thu, 31 Aug 2017 03:24:45 -0400 (EDT)",
            "from legolas.ibm.com (unknown [9.85.193.48])\n\tby b01ledav004.gho.pok.ibm.com (Postfix) with ESMTP id 43997112034;\n\tThu, 31 Aug 2017 03:24:39 -0400 (EDT)"
        ],
        "X-IMSS-HAND-OFF-DIRECTIVE": "127.0.0.1:10026",
        "From": "Claudio Carvalho <cclaudio@linux.vnet.ibm.com>",
        "To": "skiboot@lists.ozlabs.org",
        "Date": "Thu, 31 Aug 2017 04:24:32 -0300",
        "X-Mailer": "git-send-email 2.7.4",
        "In-Reply-To": "<1504164285-15095-1-git-send-email-cclaudio@linux.vnet.ibm.com>",
        "References": "<1504164285-15095-1-git-send-email-cclaudio@linux.vnet.ibm.com>",
        "X-TM-AS-GCONF": "00",
        "x-cbid": "17083107-0024-0000-0000-000002C83746",
        "X-IBM-SpamModules-Scores": "",
        "X-IBM-SpamModules-Versions": "BY=3.00007640; HX=3.00000241; KW=3.00000007;\n\tPH=3.00000004; SC=3.00000226; SDB=6.00910097; UDB=6.00456510;\n\tIPR=6.00690378; \n\tBA=6.00005562; NDR=6.00000001; ZLA=6.00000005; ZF=6.00000009;\n\tZB=6.00000000; \n\tZP=6.00000000; ZH=6.00000000; ZU=6.00000002; MB=3.00016938;\n\tXFM=3.00000015; UTC=2017-08-31 07:25:01",
        "X-IBM-AV-DETECTION": "SAVI=unused REMOTE=unused XFE=unused",
        "x-cbparentid": "17083107-0025-0000-0000-00004544BA70",
        "Message-Id": "<1504164285-15095-2-git-send-email-cclaudio@linux.vnet.ibm.com>",
        "X-Proofpoint-Virus-Version": "vendor=fsecure engine=2.50.10432:, ,\n\tdefinitions=2017-08-31_02:, , signatures=0",
        "X-Proofpoint-Spam-Details": "rule=outbound_notspam policy=outbound score=0\n\tspamscore=0 suspectscore=1\n\tmalwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam\n\tadjust=0 reason=mlx scancount=1 engine=8.0.1-1707230000\n\tdefinitions=main-1708310114",
        "Subject": "[Skiboot] [PATCH v2 01/14] libstb/stb.c: remove macros used to\n\tforce secure-mode and trusted-mode",
        "X-BeenThere": "skiboot@lists.ozlabs.org",
        "X-Mailman-Version": "2.1.23",
        "Precedence": "list",
        "List-Id": "Mailing list for skiboot development <skiboot.lists.ozlabs.org>",
        "List-Unsubscribe": "<https://lists.ozlabs.org/options/skiboot>,\n\t<mailto:skiboot-request@lists.ozlabs.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.ozlabs.org/pipermail/skiboot/>",
        "List-Post": "<mailto:skiboot@lists.ozlabs.org>",
        "List-Help": "<mailto:skiboot-request@lists.ozlabs.org?subject=help>",
        "List-Subscribe": "<https://lists.ozlabs.org/listinfo/skiboot>,\n\t<mailto:skiboot-request@lists.ozlabs.org?subject=subscribe>",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain; charset=\"utf-8\"",
        "Content-Transfer-Encoding": "base64",
        "Errors-To": "skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org",
        "Sender": "\"Skiboot\"\n\t<skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org>"
    },
    "content": "This removes STB_FORCE_SECURE_MODE and STB_FORCE_TRUSTED_MODE, which are\nmacros used to force secure mode and trusted mode, respectively.\n\nWe don't need that anymore because the same functionality is provided by\nNVRAM config variables.\n\nSigned-off-by: Claudio Carvalho <cclaudio@linux.vnet.ibm.com>\n---\n libstb/stb.c | 12 ------------\n 1 file changed, 12 deletions(-)",
    "diff": "diff --git a/libstb/stb.c b/libstb/stb.c\nindex f798bcb..41e6505 100644\n--- a/libstb/stb.c\n+++ b/libstb/stb.c\n@@ -28,8 +28,6 @@\n \n /* For debugging only */\n //#define STB_DEBUG\n-//#define STB_FORCE_SECURE_MODE\n-//#define STB_FORCE_TRUSTED_MODE\n \n static bool secure_mode = false;\n static bool trusted_mode = false;\n@@ -112,10 +110,6 @@ void stb_init(void)\n \t\treturn;\n \t}\n \n-#ifdef STB_FORCE_SECURE_MODE\n-\tsecure_mode = true;\n-\tprlog(PR_NOTICE, \"STB: secure mode on (forced!)\\n\");\n-#else\n \tsecure_mode = dt_has_node_property(ibm_secureboot, \"secure-enabled\",\n \t\t\t\t\t   NULL);\n \n@@ -127,12 +121,7 @@ void stb_init(void)\n \t} else {\n \t\tprlog(PR_NOTICE, \"STB: secure mode off\\n\");\n \t}\n-#endif\n \n-#ifdef STB_FORCE_TRUSTED_MODE\n-\ttrusted_mode = true;\n-\tprlog(PR_NOTICE, \"STB: trusted mode on (forced!)\\n\");\n-#else\n \ttrusted_mode = dt_has_node_property(ibm_secureboot, \"trusted-enabled\",\n \t\t\t\t\t    NULL);\n \tif (nvram_query_eq(\"force-trusted-mode\", \"true\")) {\n@@ -141,7 +130,6 @@ void stb_init(void)\n \t}\n \tprlog(PR_NOTICE, \"STB: trusted mode %s\\n\",\n \t      trusted_mode ? \"on\" : \"off\");\n-#endif\n \n \tif (!secure_mode && !trusted_mode)\n \t\treturn;\n",
    "prefixes": [
        "v2",
        "01/14"
    ]
}