Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2195483/?format=api
{ "id": 2195483, "url": "http://patchwork.ozlabs.org/api/patches/2195483/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/patch/20260211082401.2407853-2-coxu@redhat.com/", "project": { "id": 2, "url": "http://patchwork.ozlabs.org/api/projects/2/?format=api", "name": "Linux PPC development", "link_name": "linuxppc-dev", "list_id": "linuxppc-dev.lists.ozlabs.org", "list_email": "linuxppc-dev@lists.ozlabs.org", "web_url": "https://github.com/linuxppc/wiki/wiki", "scm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git", "webscm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/", "list_archive_url": "https://lore.kernel.org/linuxppc-dev/", "list_archive_url_format": "https://lore.kernel.org/linuxppc-dev/{}/", "commit_url_format": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id={}" }, "msgid": "<20260211082401.2407853-2-coxu@redhat.com>", "list_archive_url": "https://lore.kernel.org/linuxppc-dev/20260211082401.2407853-2-coxu@redhat.com/", "date": "2026-02-11T08:23:59", "name": "[v4,1/2] crash_dump/dm-crypt: Don't print in arch-specific code", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "d82cefe1520e0a4142a8562ed53af2b40236afc2", "submitter": { "id": 81201, "url": "http://patchwork.ozlabs.org/api/people/81201/?format=api", "name": "Coiby Xu", "email": "coxu@redhat.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/linuxppc-dev/patch/20260211082401.2407853-2-coxu@redhat.com/mbox/", "series": [ { "id": 491790, "url": "http://patchwork.ozlabs.org/api/series/491790/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/list/?series=491790", "date": "2026-02-11T08:23:59", "name": "kdump: Enable LUKS-encrypted dump target support in ARM64 and PowerPC", "version": 4, "mbox": "http://patchwork.ozlabs.org/series/491790/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2195483/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/2195483/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "\n <linuxppc-dev+bounces-16798-incoming=patchwork.ozlabs.org@lists.ozlabs.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "linuxppc-dev@lists.ozlabs.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=HGM0BIZ2;\n\tdkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.a=rsa-sha256 header.s=mimecast20190719 header.b=HGM0BIZ2;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org\n (client-ip=2404:9400:21b9:f100::1; helo=lists.ozlabs.org;\n envelope-from=linuxppc-dev+bounces-16798-incoming=patchwork.ozlabs.org@lists.ozlabs.org;\n receiver=patchwork.ozlabs.org)", "lists.ozlabs.org;\n arc=none smtp.remote-ip=170.10.133.124", "lists.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=redhat.com", "lists.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=HGM0BIZ2;\n\tdkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.a=rsa-sha256 header.s=mimecast20190719 header.b=HGM0BIZ2;\n\tdkim-atps=neutral", "lists.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=redhat.com\n (client-ip=170.10.133.124; helo=us-smtp-delivery-124.mimecast.com;\n envelope-from=coxu@redhat.com; receiver=lists.ozlabs.org)" ], "Received": [ "from lists.ozlabs.org (lists.ozlabs.org\n [IPv6:2404:9400:21b9:f100::1])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1 raw public key)\n server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4f9s0q42HHz1xpY\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 11 Feb 2026 19:24:27 +1100 (AEDT)", "from boromir.ozlabs.org (localhost [127.0.0.1])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 4f9s0h5mryz2ySS;\n\tWed, 11 Feb 2026 19:24:20 +1100 (AEDT)", "from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.133.124])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 4f9s0g2Wwbz2xlM\n\tfor <linuxppc-dev@lists.ozlabs.org>; Wed, 11 Feb 2026 19:24:16 +1100 (AEDT)", "from mail-pl1-f200.google.com (mail-pl1-f200.google.com\n [209.85.214.200]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-354-K6tmrgPQNxaex0KodTc-zg-1; Wed, 11 Feb 2026 03:24:11 -0500", "by mail-pl1-f200.google.com with SMTP id\n d9443c01a7336-2aad6045810so15371765ad.3\n for <linuxppc-dev@lists.ozlabs.org>;\n Wed, 11 Feb 2026 00:24:11 -0800 (PST)", "from localhost ([209.132.188.88])\n by smtp.gmail.com with ESMTPSA id\n d9443c01a7336-2ab29964c62sm14460265ad.55.2026.02.11.00.24.08\n (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n Wed, 11 Feb 2026 00:24:09 -0800 (PST)" ], "ARC-Seal": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1770798260;\n\tcv=none;\n b=Atg6xp5aNTIAWrrOs9/FxzV1CIBbILGv8YkpBIsBlOUJaCL65rSG53js98hm1T/LooW8Vt2jby1CG+LzHr4GvnjhmrzrYGBm8rHJqLQmgBlsqBUBT30diTY01eqZM2SJ8WNmTY91uGwpeppNXlPFL1rLHpov8CeJR24MrgzojciRxq4ga+UaTTaHKVgO+1zq1iemVFM5ltMymV3GkZsE0ZPaiiMQCWwIdds7VQPHH5PO7IKzCH1xc5dO57ocW0Y1OyUZND+BJ1B8iojcgBH+ELtn3UtLUeb23V20MXOKpRUaALlk5olcqqTyJiohRbWupR315IKVax7dxPgFwKOqxg==", "ARC-Message-Signature": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707;\n\tt=1770798260; c=relaxed/relaxed;\n\tbh=ihJ36lzkXZ7WFB7v/KaqffqO3gp0QEVYrI9tOHAHfi4=;\n\th=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n\t MIME-Version:content-type;\n b=OYcsWJMNYKCjNbbsZTxi7sfZM3KaYUM9OIlyOcdZHWmpSyI5GDyYTS3gCZ0L15LrR31gdSGzDg8clWLB9qmfxbhkqLToClO+dCJ8pthb3tw/MSoOHwzpJVjEZv90Gsu1uMAAXGzC/1TPez0yIe3w0x9vpztrDVwYd0F3BS6YbJ/0lzyqC5QJEoWvrgE7AFQk/pjbgXSGBYtQlNZTE3aMyGHtMYu7XyNG+ARxJB7N7Yps6hFJLm98pCCX+A2hRZ+Hx0ABVODIRDMT4fmqOkrOP+lWIozM5USb6JFgZGoZqbeg7SWNyqJMq0S3Mx4dgVGyPBiGu7cQNzSDaDgHJuLB6w==", "ARC-Authentication-Results": "i=1; lists.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=redhat.com;\n dkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=HGM0BIZ2;\n dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.a=rsa-sha256 header.s=mimecast20190719 header.b=HGM0BIZ2;\n dkim-atps=neutral; spf=pass (client-ip=170.10.133.124;\n helo=us-smtp-delivery-124.mimecast.com; envelope-from=coxu@redhat.com;\n receiver=lists.ozlabs.org) smtp.mailfrom=redhat.com", "DKIM-Signature": [ "v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n\ts=mimecast20190719; t=1770798253;\n\th=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n\t to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n\t content-transfer-encoding:content-transfer-encoding:\n\t in-reply-to:in-reply-to:references:references;\n\tbh=ihJ36lzkXZ7WFB7v/KaqffqO3gp0QEVYrI9tOHAHfi4=;\n\tb=HGM0BIZ2j8v/Ckvo+ZUTjfoTeR8qZyKRQafo3MM46cOEZ8By7cR3hnNBDkpdpoh2T0WAIR\n\t1g2NCUsh7869SpDqdOch7vkAT3334XDhQqnXin9TR45qtZtSYB8+qsOoH59cseIazlnfKY\n\t8SaT6h7U1jMjbxPyHOUaGPv74O4pNPE=", "v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n\ts=mimecast20190719; t=1770798253;\n\th=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n\t to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n\t content-transfer-encoding:content-transfer-encoding:\n\t in-reply-to:in-reply-to:references:references;\n\tbh=ihJ36lzkXZ7WFB7v/KaqffqO3gp0QEVYrI9tOHAHfi4=;\n\tb=HGM0BIZ2j8v/Ckvo+ZUTjfoTeR8qZyKRQafo3MM46cOEZ8By7cR3hnNBDkpdpoh2T0WAIR\n\t1g2NCUsh7869SpDqdOch7vkAT3334XDhQqnXin9TR45qtZtSYB8+qsOoH59cseIazlnfKY\n\t8SaT6h7U1jMjbxPyHOUaGPv74O4pNPE=" ], "X-MC-Unique": "K6tmrgPQNxaex0KodTc-zg-1", "X-Mimecast-MFC-AGG-ID": "K6tmrgPQNxaex0KodTc-zg_1770798250", "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n d=1e100.net; s=20230601; t=1770798250; x=1771403050;\n h=content-transfer-encoding:mime-version:references:in-reply-to\n :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n :to:cc:subject:date:message-id:reply-to;\n bh=ihJ36lzkXZ7WFB7v/KaqffqO3gp0QEVYrI9tOHAHfi4=;\n b=mUB26ciEC32Ob33tbfmJ7DrSJeMZ+kkunnAq+r2Xg4WIcqgV5uQz4JGQfyKuT9msFJ\n bvNc5AWF66n2mQ3/AVsK8bwlw+VMgDcTnZmgWzXeFd/RI0QrlOhEI7kBfLgDktoGK/eW\n HOATbCpwNpj9FcSr2EfAnHQzLS9hYrd4abSoxZT2RuNV8opzBTwj7aOFC7yoxi6b8ZW+\n gc9fe8W8TmpIE6bUlI1i6VXPquL1TjNsH4MQ0cAdW23IOE1GVgVNysMlMhQwklwLs/mJ\n i7g85mryeV/0jXNwaVNXQga6GZhiVBBT4EF46nEg3Et8FaNAG8M02sOvUtxV4oOVcpFS\n sLrw==", "X-Forwarded-Encrypted": "i=1;\n AJvYcCXw7OTIr/TNwGxeqEbVpJOlj8WjE0IkSSXKxUAPUJsDOmxO3BJYNbQCbBfz4h1bDJb4efdchwr98MV2dEQ=@lists.ozlabs.org", "X-Gm-Message-State": "AOJu0YyD7PYOz345E7cIHdxLbMiq2tERyT7JUAkFKmJaHayi0Nqy6AXc\n\tjVHpay1ZADn0FNvk7SrQ4EoV8tua0TfzravC5Efu3869SMfTWotIfT+TxonlTYpBJ+U7yR8tfd6\n\tWpc6dWXd0/Xxi8T5cUMUD3tDtTfZadsDI9YbH4fChxlf/hD/k8wKMgrMlXsowZ9TPAY8=", "X-Gm-Gg": "AZuq6aIMAE8eU7K9J6FNA/C9HfTj6ZcOB6NrZ2EjJw5Qari3E2A8OIHoZHJgBfOkbYj\n\t1pXtjrjPcF7LVyPaJHKFT9B3FaJm5ulQxZylkI2KXrcOzG1eEqj/8cvLRJZ1Gd6BRMAN0xuBUp5\n\tU/QQdu58g/wwXydjNg9uYtBklwjMETW/LNXS/WeVtgNe/NYLfOJcosqkNOU1EaittQZZM/a9Yx1\n\tm0ZEz4n/h8T9YGdsn7zH+bDMTAGF8b4zxGqyH0jFfeqVBuJA2pHRFMn4BZeiAM5TNRvo3fYRTNj\n\toCnHgZyyz+rxB62Y5P1WWWaJVLO/LtTODjg0BtDdgPh/I3RtJKnULRQ54iX8HK2mfcq0JmdlZXO\n\tf+Un/J9ntShrh", "X-Received": [ "by 2002:a17:903:1a0e:b0:2a9:4450:abb7 with SMTP id\n d9443c01a7336-2a9516fcf6amr203049345ad.39.1770798250253;\n Wed, 11 Feb 2026 00:24:10 -0800 (PST)", "by 2002:a17:903:1a0e:b0:2a9:4450:abb7 with SMTP id\n d9443c01a7336-2a9516fcf6amr203049015ad.39.1770798249724;\n Wed, 11 Feb 2026 00:24:09 -0800 (PST)" ], "From": "Coiby Xu <coxu@redhat.com>", "To": "kexec@lists.infradead.org,\n\tlinux-arm-kernel@lists.infradead.org,\n\tlinuxppc-dev@lists.ozlabs.org,\n\tdevicetree@vger.kernel.org", "Cc": "Will Deacon <will@kernel.org>,\n\tThomas Gleixner <tglx@kernel.org>,\n\tIngo Molnar <mingo@redhat.com>,\n\tBorislav Petkov <bp@alien8.de>,\n\tDave Hansen <dave.hansen@linux.intel.com>,\n\tx86@kernel.org (maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)),\n\t\"H. Peter Anvin\" <hpa@zytor.com>,\n\tAndrew Morton <akpm@linux-foundation.org>,\n\tBaoquan He <bhe@redhat.com>,\n\tVivek Goyal <vgoyal@redhat.com>,\n\tDave Young <dyoung@redhat.com>,\n\tlinux-kernel@vger.kernel.org (open list:X86 ARCHITECTURE (32-BIT AND 64-BIT))", "Subject": "[PATCH v4 1/2] crash_dump/dm-crypt: Don't print in arch-specific code", "Date": "Wed, 11 Feb 2026 16:23:59 +0800", "Message-ID": "<20260211082401.2407853-2-coxu@redhat.com>", "X-Mailer": "git-send-email 2.53.0", "In-Reply-To": "<20260211082401.2407853-1-coxu@redhat.com>", "References": "<20260211082401.2407853-1-coxu@redhat.com>", "X-Mailing-List": "linuxppc-dev@lists.ozlabs.org", "List-Id": "<linuxppc-dev.lists.ozlabs.org>", "List-Help": "<mailto:linuxppc-dev+help@lists.ozlabs.org>", "List-Owner": "<mailto:linuxppc-dev+owner@lists.ozlabs.org>", "List-Post": "<mailto:linuxppc-dev@lists.ozlabs.org>", "List-Archive": "<https://lore.kernel.org/linuxppc-dev/>,\n <https://lists.ozlabs.org/pipermail/linuxppc-dev/>", "List-Subscribe": "<mailto:linuxppc-dev+subscribe@lists.ozlabs.org>,\n <mailto:linuxppc-dev+subscribe-digest@lists.ozlabs.org>,\n <mailto:linuxppc-dev+subscribe-nomail@lists.ozlabs.org>", "List-Unsubscribe": "<mailto:linuxppc-dev+unsubscribe@lists.ozlabs.org>", "Precedence": "list", "MIME-Version": "1.0", "X-Mimecast-Spam-Score": "0", "X-Mimecast-MFC-PROC-ID": "6Pnuh1tthOly9A2JJh9CywcvnoJKpI4oHfWNXuSIsgg_1770798250", "X-Mimecast-Originator": "redhat.com", "Content-Transfer-Encoding": "8bit", "content-type": "text/plain; charset=\"US-ASCII\"; x-default=true", "X-Spam-Status": "No, score=-0.2 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED,\n\tDKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE,\n\tRCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=disabled\n\tversion=4.0.1 OzLabs 8", "X-Spam-Checker-Version": "SpamAssassin 4.0.1 (2024-03-25) on lists.ozlabs.org" }, "content": "When the vmcore dumping target is not a LUKS-encrypted target, it's\nexpected that there is no dm-crypt key thus no need to return -ENOENT.\nAlso print more logs in crash_load_dm_crypt_keys. The benefit is\narch-specific code can be more succinct.\n\nSuggested-by: Will Deacon <will@kernel.org>\nSigned-off-by: Coiby Xu <coxu@redhat.com>\n---\n arch/x86/kernel/kexec-bzimage64.c | 6 +-----\n kernel/crash_dump_dm_crypt.c | 7 +++++--\n 2 files changed, 6 insertions(+), 7 deletions(-)", "diff": "diff --git a/arch/x86/kernel/kexec-bzimage64.c b/arch/x86/kernel/kexec-bzimage64.c\nindex 7508d0ccc740..d20cf976d01a 100644\n--- a/arch/x86/kernel/kexec-bzimage64.c\n+++ b/arch/x86/kernel/kexec-bzimage64.c\n@@ -518,12 +518,8 @@ static void *bzImage64_load(struct kimage *image, char *kernel,\n \t\tif (ret)\n \t\t\treturn ERR_PTR(ret);\n \t\tret = crash_load_dm_crypt_keys(image);\n-\t\tif (ret == -ENOENT) {\n-\t\t\tkexec_dprintk(\"No dm crypt key to load\\n\");\n-\t\t} else if (ret) {\n-\t\t\tpr_err(\"Failed to load dm crypt keys\\n\");\n+\t\tif (ret)\n \t\t\treturn ERR_PTR(ret);\n-\t\t}\n \t\tif (image->dm_crypt_keys_addr &&\n \t\t cmdline_len + MAX_ELFCOREHDR_STR_LEN + MAX_DMCRYPTKEYS_STR_LEN >\n \t\t\t header->cmdline_size) {\ndiff --git a/kernel/crash_dump_dm_crypt.c b/kernel/crash_dump_dm_crypt.c\nindex 401423ba477d..478dacb0625c 100644\n--- a/kernel/crash_dump_dm_crypt.c\n+++ b/kernel/crash_dump_dm_crypt.c\n@@ -405,14 +405,16 @@ int crash_load_dm_crypt_keys(struct kimage *image)\n \n \tif (key_count <= 0) {\n \t\tkexec_dprintk(\"No dm-crypt keys\\n\");\n-\t\treturn -ENOENT;\n+\t\treturn 0;\n \t}\n \n \tif (!is_dm_key_reused) {\n \t\timage->dm_crypt_keys_addr = 0;\n \t\tr = build_keys_header();\n-\t\tif (r)\n+\t\tif (r) {\n+\t\t\tpr_err(\"Failed to build dm-crypt keys header, ret=%d\\n\", r);\n \t\t\treturn r;\n+\t\t}\n \t}\n \n \tkbuf.buffer = keys_header;\n@@ -423,6 +425,7 @@ int crash_load_dm_crypt_keys(struct kimage *image)\n \tkbuf.mem = KEXEC_BUF_MEM_UNKNOWN;\n \tr = kexec_add_buffer(&kbuf);\n \tif (r) {\n+\t\tpr_err(\"Failed to call kexec_add_buffer, ret=%d\\n\", r);\n \t\tkvfree((void *)kbuf.buffer);\n \t\treturn r;\n \t}\n", "prefixes": [ "v4", "1/2" ] }