Cover Letter Detail
Show a cover letter.
GET /api/covers/2195484/?format=api
{ "id": 2195484, "url": "http://patchwork.ozlabs.org/api/covers/2195484/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/cover/20260211082401.2407853-1-coxu@redhat.com/", "project": { "id": 2, "url": "http://patchwork.ozlabs.org/api/projects/2/?format=api", "name": "Linux PPC development", "link_name": "linuxppc-dev", "list_id": "linuxppc-dev.lists.ozlabs.org", "list_email": "linuxppc-dev@lists.ozlabs.org", "web_url": "https://github.com/linuxppc/wiki/wiki", "scm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git", "webscm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/", "list_archive_url": "https://lore.kernel.org/linuxppc-dev/", "list_archive_url_format": "https://lore.kernel.org/linuxppc-dev/{}/", "commit_url_format": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id={}" }, "msgid": "<20260211082401.2407853-1-coxu@redhat.com>", "list_archive_url": "https://lore.kernel.org/linuxppc-dev/20260211082401.2407853-1-coxu@redhat.com/", "date": "2026-02-11T08:23:58", "name": "[v4,0/2] kdump: Enable LUKS-encrypted dump target support in ARM64 and PowerPC", "submitter": { "id": 81201, "url": "http://patchwork.ozlabs.org/api/people/81201/?format=api", "name": "Coiby Xu", "email": "coxu@redhat.com" }, "mbox": "http://patchwork.ozlabs.org/project/linuxppc-dev/cover/20260211082401.2407853-1-coxu@redhat.com/mbox/", "series": [ { "id": 491790, "url": "http://patchwork.ozlabs.org/api/series/491790/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/list/?series=491790", "date": "2026-02-11T08:23:59", "name": "kdump: Enable LUKS-encrypted dump target support in ARM64 and PowerPC", "version": 4, "mbox": "http://patchwork.ozlabs.org/series/491790/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/2195484/comments/", "headers": { "Return-Path": "\n <linuxppc-dev+bounces-16799-incoming=patchwork.ozlabs.org@lists.ozlabs.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "linuxppc-dev@lists.ozlabs.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=RoLDxS1t;\n\tdkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.a=rsa-sha256 header.s=mimecast20190719 header.b=RoLDxS1t;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org\n (client-ip=2404:9400:21b9:f100::1; helo=lists.ozlabs.org;\n envelope-from=linuxppc-dev+bounces-16799-incoming=patchwork.ozlabs.org@lists.ozlabs.org;\n receiver=patchwork.ozlabs.org)", "lists.ozlabs.org;\n arc=none smtp.remote-ip=170.10.133.124", "lists.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=redhat.com", "lists.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=RoLDxS1t;\n\tdkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.a=rsa-sha256 header.s=mimecast20190719 header.b=RoLDxS1t;\n\tdkim-atps=neutral", "lists.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=redhat.com\n (client-ip=170.10.133.124; helo=us-smtp-delivery-124.mimecast.com;\n envelope-from=coxu@redhat.com; receiver=lists.ozlabs.org)" ], "Received": [ "from lists.ozlabs.org (lists.ozlabs.org\n [IPv6:2404:9400:21b9:f100::1])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1 raw public key)\n server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4f9s0q4L5Kz1xx7\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 11 Feb 2026 19:24:27 +1100 (AEDT)", "from boromir.ozlabs.org (localhost [127.0.0.1])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 4f9s0h654Fz2yY0;\n\tWed, 11 Feb 2026 19:24:20 +1100 (AEDT)", "from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.133.124])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 4f9s0g2YHWz2xlp\n\tfor <linuxppc-dev@lists.ozlabs.org>; Wed, 11 Feb 2026 19:24:17 +1100 (AEDT)", "from mail-pl1-f198.google.com (mail-pl1-f198.google.com\n [209.85.214.198]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-184-jfPWT_bUNiyHn6YQ5AtXRQ-1; Wed, 11 Feb 2026 03:24:07 -0500", "by mail-pl1-f198.google.com with SMTP id\n d9443c01a7336-2a77040ede0so16875735ad.2\n for <linuxppc-dev@lists.ozlabs.org>;\n Wed, 11 Feb 2026 00:24:07 -0800 (PST)", "from localhost ([209.132.188.88])\n by smtp.gmail.com with ESMTPSA id\n d9443c01a7336-2ab2984ab0esm15186415ad.9.2026.02.11.00.24.04\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Wed, 11 Feb 2026 00:24:05 -0800 (PST)" ], "ARC-Seal": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1770798260;\n\tcv=none;\n b=cd6hmO9mYe8G/W20TbiWuO0iliwZcEk8PtLLIfkL/PWRUISD/cQ6XiMj2txS/4gD9GBdGdPhL2g93eKGHlKUQsF+2sztfsAGtLXBRLYseWfBTuGnQmwjG5tEbbKZdi5+ak9DXUtOrGO3fQONy/aV1MOBx5Dn0fFt7dYs0AuafUANd4JTsNaPRKFBUajhkE5RFinH5ax+d5h68MMrHx3LxI1v9xwctOd9sj72lc2WlmNDGIH5xElbAfBg2ri7mnROgO8jA4NNHWskRqaBxNjZmRk7naJn4wfSXzlsWyh+kYb5z0N8xd0DkgeW5iKuytUy8UZL8ZAee40gEK+s1WorEg==", "ARC-Message-Signature": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707;\n\tt=1770798260; c=relaxed/relaxed;\n\tbh=G1KvghMrg5FQLYtugCrRlvN5/+TeaaG+RNwvPgguvEY=;\n\th=From:To:Subject:Date:Message-ID:MIME-Version:content-type;\n b=C8qCzTyRp+3S+s8LYtM37ftwwtG5SmIXdeDK0HfgUit349EtywFZlBiIsE+HiOUxa3rkNZWTpRD15CenmAscLIcd+nKJVQLN+60Ub55SPJ5kZB8tICsJRJ73RVAMJocTEtVgN/FExcVbBzSguCQ8GDD6twLybEn3Vp+4SrGQ0HQlazj+22XV2kcq9YKuv0yoIbmYk5o4kOCYqEiEhvkaMppa2HpKcev9webt2EOgL/eNc1/dEYavC5j0hgHzgM32vIu53UdUrBIIaWgjYcM54E/yfpsG0bAWdOT8XfFTNQ2nwhuf5M1tk1oe8awJBT2fYyQMsUg3whZlqnBuA42lJw==", "ARC-Authentication-Results": "i=1; lists.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=redhat.com;\n dkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=RoLDxS1t;\n dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.a=rsa-sha256 header.s=mimecast20190719 header.b=RoLDxS1t;\n dkim-atps=neutral; spf=pass (client-ip=170.10.133.124;\n helo=us-smtp-delivery-124.mimecast.com; envelope-from=coxu@redhat.com;\n receiver=lists.ozlabs.org) smtp.mailfrom=redhat.com", "DKIM-Signature": [ "v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n\ts=mimecast20190719; t=1770798249;\n\th=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n\t to:to:cc:mime-version:mime-version:content-type:content-type:\n\t content-transfer-encoding:content-transfer-encoding;\n\tbh=G1KvghMrg5FQLYtugCrRlvN5/+TeaaG+RNwvPgguvEY=;\n\tb=RoLDxS1t2M1rg5JM2bTEhKw3w1PhNwBmcsmmYM1j4K4xBMqBRQ8a71LdKmRYISXWgHcwL5\n\tccoPWzgncTk4+03q5R1LLu2VGaUsXD/2ZTNL70o7ist8/4kWF20WeNxjP59WL/zKoSR/CX\n\tCqbC7TLIdl5aN4/aruIVDio9hjMxSNA=", "v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n\ts=mimecast20190719; t=1770798249;\n\th=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n\t to:to:cc:mime-version:mime-version:content-type:content-type:\n\t content-transfer-encoding:content-transfer-encoding;\n\tbh=G1KvghMrg5FQLYtugCrRlvN5/+TeaaG+RNwvPgguvEY=;\n\tb=RoLDxS1t2M1rg5JM2bTEhKw3w1PhNwBmcsmmYM1j4K4xBMqBRQ8a71LdKmRYISXWgHcwL5\n\tccoPWzgncTk4+03q5R1LLu2VGaUsXD/2ZTNL70o7ist8/4kWF20WeNxjP59WL/zKoSR/CX\n\tCqbC7TLIdl5aN4/aruIVDio9hjMxSNA=" ], "X-MC-Unique": "jfPWT_bUNiyHn6YQ5AtXRQ-1", "X-Mimecast-MFC-AGG-ID": "jfPWT_bUNiyHn6YQ5AtXRQ_1770798246", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20230601; t=1770798246; x=1771403046;\n h=content-transfer-encoding:mime-version:message-id:date:subject:to\n :from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n :reply-to;\n bh=G1KvghMrg5FQLYtugCrRlvN5/+TeaaG+RNwvPgguvEY=;\n b=tERK7KYuzWhsfiNUM6K1JEm6uCkHbya+X9mWYQRXmF+h3UsUpwwGz3Fs2UhwObJptV\n hYUhjHiuYRQhuOFEttzLaKS60ha36bnd2SK8y3w+w5cvJzEVXl8si53akeGgLtDpu8/4\n gIBaH0/8/lTtKpSvyUgsz0+mV01TooEd/W5omMsp/7ocSGgdOMHZlChff6RyLbQCrN2I\n UKOsri93F0X0y7vza9pl91LHuL6qysI4LvjMz5gTxRi/rmmtiYMaDhPnRrg39EjmJ/5V\n vGvfRKMxz+nVLGPQbIO02DC4YeAx43wa4op2q7QMev9/j4C5es7aeX96mHLTB7dNeCAi\n 9bOg==", "X-Forwarded-Encrypted": "i=1;\n AJvYcCV6CxZTHiA/gyLT7549aTj/KFKR+yDr4pBSvpmNQzrB8K8g+qWGsBfXCvtcH3X9SNuZFK28iiEscYEvwyk=@lists.ozlabs.org", "X-Gm-Message-State": "AOJu0Yx0WMUInB/tOZFaYh3qQIYCbhlSUDr7nI+TLGymgcWs9LXNe3Dw\n\tOJXStcdcQgGnXPPlAH0ic40IBFJWb2Gds3SEK6A/pfBWBXR5lmn5hKQNQqiDNcx7qHFv9YkEXrq\n\t7INBnPAZ1FAbwrA3yyvcCuVYevXp07NpTsKkXa0YVkR80Nd6ISegkrOMa5Kr8DjsURfk=", "X-Gm-Gg": "AZuq6aLmzZ0TO9LH7/IQTSG3mnFi/m3pzNsCPTyYyRyv0xPbziC5lEzhvuh3MiJIJOQ\n\tFmWdctaqQAaGgGhrfc+G6+lqB8KwrQwOg5L6B0cYLWJldUHCSy2skINDiFMMdLb0XhMormmk8D8\n\tbMeDCFB3VbfVapClff6X48p5eAY653ZgY30kG2gXIOkkKkWky/T931hrYF7NxdhxqVIMGmCJcHy\n\tMip//hqb685AHinVFAt7cPXOMwFkwDQRD7Wwp9otiuMTg/u+l6JUZJB0qWUvg9LaCFL/apdM9a9\n\tIGztpJ4zVQynVqmkYrbD2WnXnLQ1QvjDv6PwdKfbbQzRgvW9tgJBVkPr8IkGKHQV5qcBVlX4/XT\n\tXd539bgdxxt9z", "X-Received": [ "by 2002:a17:903:985:b0:2a9:cb10:42d with SMTP id\n d9443c01a7336-2a9cb100bcemr122999115ad.61.1770798246187;\n Wed, 11 Feb 2026 00:24:06 -0800 (PST)", "by 2002:a17:903:985:b0:2a9:cb10:42d with SMTP id\n d9443c01a7336-2a9cb100bcemr122998855ad.61.1770798245566;\n Wed, 11 Feb 2026 00:24:05 -0800 (PST)" ], "From": "Coiby Xu <coxu@redhat.com>", "To": "kexec@lists.infradead.org,\n\tlinux-arm-kernel@lists.infradead.org,\n\tlinuxppc-dev@lists.ozlabs.org,\n\tdevicetree@vger.kernel.org", "Subject": "[PATCH v4 0/2] kdump: Enable LUKS-encrypted dump target support in\n ARM64 and PowerPC", "Date": "Wed, 11 Feb 2026 16:23:58 +0800", "Message-ID": "<20260211082401.2407853-1-coxu@redhat.com>", "X-Mailer": "git-send-email 2.53.0", "X-Mailing-List": "linuxppc-dev@lists.ozlabs.org", "List-Id": "<linuxppc-dev.lists.ozlabs.org>", "List-Help": "<mailto:linuxppc-dev+help@lists.ozlabs.org>", "List-Owner": "<mailto:linuxppc-dev+owner@lists.ozlabs.org>", "List-Post": "<mailto:linuxppc-dev@lists.ozlabs.org>", "List-Archive": "<https://lore.kernel.org/linuxppc-dev/>,\n <https://lists.ozlabs.org/pipermail/linuxppc-dev/>", "List-Subscribe": "<mailto:linuxppc-dev+subscribe@lists.ozlabs.org>,\n <mailto:linuxppc-dev+subscribe-digest@lists.ozlabs.org>,\n <mailto:linuxppc-dev+subscribe-nomail@lists.ozlabs.org>", "List-Unsubscribe": "<mailto:linuxppc-dev+unsubscribe@lists.ozlabs.org>", "Precedence": "list", "MIME-Version": "1.0", "X-Mimecast-Spam-Score": "0", "X-Mimecast-MFC-PROC-ID": "NyBsnYHQ1Y_V-Qj9xlL6zt58lub-8kSxfsf6z1Lp8nE_1770798246", "X-Mimecast-Originator": "redhat.com", "Content-Transfer-Encoding": "8bit", "content-type": "text/plain; charset=\"US-ASCII\"; x-default=true", "X-Spam-Status": "No, score=-0.2 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED,\n\tDKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE,\n\tRCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=disabled\n\tversion=4.0.1 OzLabs 8", "X-Spam-Checker-Version": "SpamAssassin 4.0.1 (2024-03-25) on lists.ozlabs.org" }, "content": "CONFIG_CRASH_DM_CRYPT has been introduced to support LUKS-encrypted\ndevice dump target by addressing two challenges [1],\n - Kdump kernel may not be able to decrypt the LUKS partition. For some\n machines, a system administrator may not have a chance to enter the\n password to decrypt the device in kdump initramfs after the 1st kernel\n crashes\n\n - LUKS2 by default use the memory-hard Argon2 key derivation function\n which is quite memory-consuming compared to the limited memory reserved\n for kdump.\n\nTo also enable this feature for ARM64 and PowerPC, we only need to add a\ndevice tree property dmcryptkeys [2] as similar to elfcorehdr to pass the\nmemory address of the stored info of dm-crypt keys to the kdump kernel.\n\n[1] https://lore.kernel.org/all/20250502011246.99238-1-coxu@redhat.com/\n[2] https://github.com/devicetree-org/dt-schema/pull/181\n\n\nv4\n- Make arch-specific code more succinct by printing more logs in\n arch-independent code [Will Deacon] \n\n- Also use device tree for PowerPC to pass memory address of dm-crypt\n keys info\n - powerpc v2 patch that passes the dmcryptkeys kernel cmdline\n parameter:\n https://lore.kernel.org/all/20260106074039.564707-1-coxu@redhat.com/\n\nv3\n- Delete the property after reading it [Rob Herring]\n\nv2\n- Krzysztof\n - Use imperative mood for commit message\n - Add dt-schema ABI Documentation \n https://github.com/devicetree-org/dt-schema/pull/181\n- Don't print dm-crypt keys address via pr_debug\n\nCoiby Xu (2):\n crash_dump/dm-crypt: Don't print in arch-specific code\n arm64,ppc64le/kdump: pass dm-crypt keys to kdump kernel\n\n arch/arm64/kernel/machine_kexec_file.c | 4 ++++\n arch/powerpc/kexec/elf_64.c | 4 ++++\n arch/x86/kernel/kexec-bzimage64.c | 6 +-----\n drivers/of/fdt.c | 21 +++++++++++++++++++++\n drivers/of/kexec.c | 19 +++++++++++++++++++\n kernel/crash_dump_dm_crypt.c | 7 +++++--\n 6 files changed, 54 insertions(+), 7 deletions(-)\n\n\nbase-commit: 2619c62b7ef2f463bcbbb34af122689c09855c23" }