Show a cover letter.

GET /api/covers/2195484/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2195484,
    "url": "http://patchwork.ozlabs.org/api/covers/2195484/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/cover/20260211082401.2407853-1-coxu@redhat.com/",
    "project": {
        "id": 2,
        "url": "http://patchwork.ozlabs.org/api/projects/2/?format=api",
        "name": "Linux PPC development",
        "link_name": "linuxppc-dev",
        "list_id": "linuxppc-dev.lists.ozlabs.org",
        "list_email": "linuxppc-dev@lists.ozlabs.org",
        "web_url": "https://github.com/linuxppc/wiki/wiki",
        "scm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git",
        "webscm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/",
        "list_archive_url": "https://lore.kernel.org/linuxppc-dev/",
        "list_archive_url_format": "https://lore.kernel.org/linuxppc-dev/{}/",
        "commit_url_format": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id={}"
    },
    "msgid": "<20260211082401.2407853-1-coxu@redhat.com>",
    "list_archive_url": "https://lore.kernel.org/linuxppc-dev/20260211082401.2407853-1-coxu@redhat.com/",
    "date": "2026-02-11T08:23:58",
    "name": "[v4,0/2] kdump: Enable LUKS-encrypted dump target support in ARM64 and PowerPC",
    "submitter": {
        "id": 81201,
        "url": "http://patchwork.ozlabs.org/api/people/81201/?format=api",
        "name": "Coiby Xu",
        "email": "coxu@redhat.com"
    },
    "mbox": "http://patchwork.ozlabs.org/project/linuxppc-dev/cover/20260211082401.2407853-1-coxu@redhat.com/mbox/",
    "series": [
        {
            "id": 491790,
            "url": "http://patchwork.ozlabs.org/api/series/491790/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/list/?series=491790",
            "date": "2026-02-11T08:23:59",
            "name": "kdump: Enable LUKS-encrypted dump target support in ARM64 and PowerPC",
            "version": 4,
            "mbox": "http://patchwork.ozlabs.org/series/491790/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/covers/2195484/comments/",
    "headers": {
        "Return-Path": "\n <linuxppc-dev+bounces-16799-incoming=patchwork.ozlabs.org@lists.ozlabs.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "linuxppc-dev@lists.ozlabs.org"
        ],
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=RoLDxS1t;\n\tdkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.a=rsa-sha256 header.s=mimecast20190719 header.b=RoLDxS1t;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org\n (client-ip=2404:9400:21b9:f100::1; helo=lists.ozlabs.org;\n envelope-from=linuxppc-dev+bounces-16799-incoming=patchwork.ozlabs.org@lists.ozlabs.org;\n receiver=patchwork.ozlabs.org)",
            "lists.ozlabs.org;\n arc=none smtp.remote-ip=170.10.133.124",
            "lists.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=redhat.com",
            "lists.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=RoLDxS1t;\n\tdkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.a=rsa-sha256 header.s=mimecast20190719 header.b=RoLDxS1t;\n\tdkim-atps=neutral",
            "lists.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=redhat.com\n (client-ip=170.10.133.124; helo=us-smtp-delivery-124.mimecast.com;\n envelope-from=coxu@redhat.com; receiver=lists.ozlabs.org)"
        ],
        "Received": [
            "from lists.ozlabs.org (lists.ozlabs.org\n [IPv6:2404:9400:21b9:f100::1])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1 raw public key)\n server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4f9s0q4L5Kz1xx7\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 11 Feb 2026 19:24:27 +1100 (AEDT)",
            "from boromir.ozlabs.org (localhost [127.0.0.1])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 4f9s0h654Fz2yY0;\n\tWed, 11 Feb 2026 19:24:20 +1100 (AEDT)",
            "from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.133.124])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 4f9s0g2YHWz2xlp\n\tfor <linuxppc-dev@lists.ozlabs.org>; Wed, 11 Feb 2026 19:24:17 +1100 (AEDT)",
            "from mail-pl1-f198.google.com (mail-pl1-f198.google.com\n [209.85.214.198]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-184-jfPWT_bUNiyHn6YQ5AtXRQ-1; Wed, 11 Feb 2026 03:24:07 -0500",
            "by mail-pl1-f198.google.com with SMTP id\n d9443c01a7336-2a77040ede0so16875735ad.2\n        for <linuxppc-dev@lists.ozlabs.org>;\n Wed, 11 Feb 2026 00:24:07 -0800 (PST)",
            "from localhost ([209.132.188.88])\n        by smtp.gmail.com with ESMTPSA id\n d9443c01a7336-2ab2984ab0esm15186415ad.9.2026.02.11.00.24.04\n        (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n        Wed, 11 Feb 2026 00:24:05 -0800 (PST)"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1770798260;\n\tcv=none;\n b=cd6hmO9mYe8G/W20TbiWuO0iliwZcEk8PtLLIfkL/PWRUISD/cQ6XiMj2txS/4gD9GBdGdPhL2g93eKGHlKUQsF+2sztfsAGtLXBRLYseWfBTuGnQmwjG5tEbbKZdi5+ak9DXUtOrGO3fQONy/aV1MOBx5Dn0fFt7dYs0AuafUANd4JTsNaPRKFBUajhkE5RFinH5ax+d5h68MMrHx3LxI1v9xwctOd9sj72lc2WlmNDGIH5xElbAfBg2ri7mnROgO8jA4NNHWskRqaBxNjZmRk7naJn4wfSXzlsWyh+kYb5z0N8xd0DkgeW5iKuytUy8UZL8ZAee40gEK+s1WorEg==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707;\n\tt=1770798260; c=relaxed/relaxed;\n\tbh=G1KvghMrg5FQLYtugCrRlvN5/+TeaaG+RNwvPgguvEY=;\n\th=From:To:Subject:Date:Message-ID:MIME-Version:content-type;\n b=C8qCzTyRp+3S+s8LYtM37ftwwtG5SmIXdeDK0HfgUit349EtywFZlBiIsE+HiOUxa3rkNZWTpRD15CenmAscLIcd+nKJVQLN+60Ub55SPJ5kZB8tICsJRJ73RVAMJocTEtVgN/FExcVbBzSguCQ8GDD6twLybEn3Vp+4SrGQ0HQlazj+22XV2kcq9YKuv0yoIbmYk5o4kOCYqEiEhvkaMppa2HpKcev9webt2EOgL/eNc1/dEYavC5j0hgHzgM32vIu53UdUrBIIaWgjYcM54E/yfpsG0bAWdOT8XfFTNQ2nwhuf5M1tk1oe8awJBT2fYyQMsUg3whZlqnBuA42lJw==",
        "ARC-Authentication-Results": "i=1; lists.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=redhat.com;\n dkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=RoLDxS1t;\n dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.a=rsa-sha256 header.s=mimecast20190719 header.b=RoLDxS1t;\n dkim-atps=neutral; spf=pass (client-ip=170.10.133.124;\n helo=us-smtp-delivery-124.mimecast.com; envelope-from=coxu@redhat.com;\n receiver=lists.ozlabs.org) smtp.mailfrom=redhat.com",
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n\ts=mimecast20190719; t=1770798249;\n\th=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n\t to:to:cc:mime-version:mime-version:content-type:content-type:\n\t content-transfer-encoding:content-transfer-encoding;\n\tbh=G1KvghMrg5FQLYtugCrRlvN5/+TeaaG+RNwvPgguvEY=;\n\tb=RoLDxS1t2M1rg5JM2bTEhKw3w1PhNwBmcsmmYM1j4K4xBMqBRQ8a71LdKmRYISXWgHcwL5\n\tccoPWzgncTk4+03q5R1LLu2VGaUsXD/2ZTNL70o7ist8/4kWF20WeNxjP59WL/zKoSR/CX\n\tCqbC7TLIdl5aN4/aruIVDio9hjMxSNA=",
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n\ts=mimecast20190719; t=1770798249;\n\th=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n\t to:to:cc:mime-version:mime-version:content-type:content-type:\n\t content-transfer-encoding:content-transfer-encoding;\n\tbh=G1KvghMrg5FQLYtugCrRlvN5/+TeaaG+RNwvPgguvEY=;\n\tb=RoLDxS1t2M1rg5JM2bTEhKw3w1PhNwBmcsmmYM1j4K4xBMqBRQ8a71LdKmRYISXWgHcwL5\n\tccoPWzgncTk4+03q5R1LLu2VGaUsXD/2ZTNL70o7ist8/4kWF20WeNxjP59WL/zKoSR/CX\n\tCqbC7TLIdl5aN4/aruIVDio9hjMxSNA="
        ],
        "X-MC-Unique": "jfPWT_bUNiyHn6YQ5AtXRQ-1",
        "X-Mimecast-MFC-AGG-ID": "jfPWT_bUNiyHn6YQ5AtXRQ_1770798246",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20230601; t=1770798246; x=1771403046;\n        h=content-transfer-encoding:mime-version:message-id:date:subject:to\n         :from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n         :reply-to;\n        bh=G1KvghMrg5FQLYtugCrRlvN5/+TeaaG+RNwvPgguvEY=;\n        b=tERK7KYuzWhsfiNUM6K1JEm6uCkHbya+X9mWYQRXmF+h3UsUpwwGz3Fs2UhwObJptV\n         hYUhjHiuYRQhuOFEttzLaKS60ha36bnd2SK8y3w+w5cvJzEVXl8si53akeGgLtDpu8/4\n         gIBaH0/8/lTtKpSvyUgsz0+mV01TooEd/W5omMsp/7ocSGgdOMHZlChff6RyLbQCrN2I\n         UKOsri93F0X0y7vza9pl91LHuL6qysI4LvjMz5gTxRi/rmmtiYMaDhPnRrg39EjmJ/5V\n         vGvfRKMxz+nVLGPQbIO02DC4YeAx43wa4op2q7QMev9/j4C5es7aeX96mHLTB7dNeCAi\n         9bOg==",
        "X-Forwarded-Encrypted": "i=1;\n AJvYcCV6CxZTHiA/gyLT7549aTj/KFKR+yDr4pBSvpmNQzrB8K8g+qWGsBfXCvtcH3X9SNuZFK28iiEscYEvwyk=@lists.ozlabs.org",
        "X-Gm-Message-State": "AOJu0Yx0WMUInB/tOZFaYh3qQIYCbhlSUDr7nI+TLGymgcWs9LXNe3Dw\n\tOJXStcdcQgGnXPPlAH0ic40IBFJWb2Gds3SEK6A/pfBWBXR5lmn5hKQNQqiDNcx7qHFv9YkEXrq\n\t7INBnPAZ1FAbwrA3yyvcCuVYevXp07NpTsKkXa0YVkR80Nd6ISegkrOMa5Kr8DjsURfk=",
        "X-Gm-Gg": "AZuq6aLmzZ0TO9LH7/IQTSG3mnFi/m3pzNsCPTyYyRyv0xPbziC5lEzhvuh3MiJIJOQ\n\tFmWdctaqQAaGgGhrfc+G6+lqB8KwrQwOg5L6B0cYLWJldUHCSy2skINDiFMMdLb0XhMormmk8D8\n\tbMeDCFB3VbfVapClff6X48p5eAY653ZgY30kG2gXIOkkKkWky/T931hrYF7NxdhxqVIMGmCJcHy\n\tMip//hqb685AHinVFAt7cPXOMwFkwDQRD7Wwp9otiuMTg/u+l6JUZJB0qWUvg9LaCFL/apdM9a9\n\tIGztpJ4zVQynVqmkYrbD2WnXnLQ1QvjDv6PwdKfbbQzRgvW9tgJBVkPr8IkGKHQV5qcBVlX4/XT\n\tXd539bgdxxt9z",
        "X-Received": [
            "by 2002:a17:903:985:b0:2a9:cb10:42d with SMTP id\n d9443c01a7336-2a9cb100bcemr122999115ad.61.1770798246187;\n        Wed, 11 Feb 2026 00:24:06 -0800 (PST)",
            "by 2002:a17:903:985:b0:2a9:cb10:42d with SMTP id\n d9443c01a7336-2a9cb100bcemr122998855ad.61.1770798245566;\n        Wed, 11 Feb 2026 00:24:05 -0800 (PST)"
        ],
        "From": "Coiby Xu <coxu@redhat.com>",
        "To": "kexec@lists.infradead.org,\n\tlinux-arm-kernel@lists.infradead.org,\n\tlinuxppc-dev@lists.ozlabs.org,\n\tdevicetree@vger.kernel.org",
        "Subject": "[PATCH v4 0/2] kdump: Enable LUKS-encrypted dump target support in\n ARM64 and PowerPC",
        "Date": "Wed, 11 Feb 2026 16:23:58 +0800",
        "Message-ID": "<20260211082401.2407853-1-coxu@redhat.com>",
        "X-Mailer": "git-send-email 2.53.0",
        "X-Mailing-List": "linuxppc-dev@lists.ozlabs.org",
        "List-Id": "<linuxppc-dev.lists.ozlabs.org>",
        "List-Help": "<mailto:linuxppc-dev+help@lists.ozlabs.org>",
        "List-Owner": "<mailto:linuxppc-dev+owner@lists.ozlabs.org>",
        "List-Post": "<mailto:linuxppc-dev@lists.ozlabs.org>",
        "List-Archive": "<https://lore.kernel.org/linuxppc-dev/>,\n  <https://lists.ozlabs.org/pipermail/linuxppc-dev/>",
        "List-Subscribe": "<mailto:linuxppc-dev+subscribe@lists.ozlabs.org>,\n  <mailto:linuxppc-dev+subscribe-digest@lists.ozlabs.org>,\n  <mailto:linuxppc-dev+subscribe-nomail@lists.ozlabs.org>",
        "List-Unsubscribe": "<mailto:linuxppc-dev+unsubscribe@lists.ozlabs.org>",
        "Precedence": "list",
        "MIME-Version": "1.0",
        "X-Mimecast-Spam-Score": "0",
        "X-Mimecast-MFC-PROC-ID": "NyBsnYHQ1Y_V-Qj9xlL6zt58lub-8kSxfsf6z1Lp8nE_1770798246",
        "X-Mimecast-Originator": "redhat.com",
        "Content-Transfer-Encoding": "8bit",
        "content-type": "text/plain; charset=\"US-ASCII\"; x-default=true",
        "X-Spam-Status": "No, score=-0.2 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED,\n\tDKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE,\n\tRCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=disabled\n\tversion=4.0.1 OzLabs 8",
        "X-Spam-Checker-Version": "SpamAssassin 4.0.1 (2024-03-25) on lists.ozlabs.org"
    },
    "content": "CONFIG_CRASH_DM_CRYPT has been introduced to support LUKS-encrypted\ndevice dump target by addressing two challenges [1],\n - Kdump kernel may not be able to decrypt the LUKS partition. For some\n   machines, a system administrator may not have a chance to enter the\n   password to decrypt the device in kdump initramfs after the 1st kernel\n   crashes\n\n - LUKS2 by default use the memory-hard Argon2 key derivation function\n   which is quite memory-consuming compared to the limited memory reserved\n   for kdump.\n\nTo also enable this feature for ARM64 and PowerPC, we only need to add a\ndevice tree property dmcryptkeys [2] as similar to elfcorehdr to pass the\nmemory address of the stored info of dm-crypt keys to the kdump kernel.\n\n[1] https://lore.kernel.org/all/20250502011246.99238-1-coxu@redhat.com/\n[2] https://github.com/devicetree-org/dt-schema/pull/181\n\n\nv4\n- Make arch-specific code more succinct by printing more logs in\n  arch-independent code [Will Deacon]  \n\n- Also use device tree for PowerPC to pass memory address of dm-crypt\n  keys info\n  - powerpc v2 patch that passes the dmcryptkeys kernel cmdline\n    parameter:\n    https://lore.kernel.org/all/20260106074039.564707-1-coxu@redhat.com/\n\nv3\n- Delete the property after reading it [Rob Herring]\n\nv2\n- Krzysztof\n  - Use imperative mood for commit message\n  - Add dt-schema ABI Documentation \n    https://github.com/devicetree-org/dt-schema/pull/181\n- Don't print dm-crypt keys address via pr_debug\n\nCoiby Xu (2):\n  crash_dump/dm-crypt: Don't print in arch-specific code\n  arm64,ppc64le/kdump: pass dm-crypt keys to kdump kernel\n\n arch/arm64/kernel/machine_kexec_file.c |  4 ++++\n arch/powerpc/kexec/elf_64.c            |  4 ++++\n arch/x86/kernel/kexec-bzimage64.c      |  6 +-----\n drivers/of/fdt.c                       | 21 +++++++++++++++++++++\n drivers/of/kexec.c                     | 19 +++++++++++++++++++\n kernel/crash_dump_dm_crypt.c           |  7 +++++--\n 6 files changed, 54 insertions(+), 7 deletions(-)\n\n\nbase-commit: 2619c62b7ef2f463bcbbb34af122689c09855c23"
}