get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/2195483/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 2195483,
    "url": "http://patchwork.ozlabs.org/api/patches/2195483/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/patch/20260211082401.2407853-2-coxu@redhat.com/",
    "project": {
        "id": 2,
        "url": "http://patchwork.ozlabs.org/api/projects/2/?format=api",
        "name": "Linux PPC development",
        "link_name": "linuxppc-dev",
        "list_id": "linuxppc-dev.lists.ozlabs.org",
        "list_email": "linuxppc-dev@lists.ozlabs.org",
        "web_url": "https://github.com/linuxppc/wiki/wiki",
        "scm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git",
        "webscm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/",
        "list_archive_url": "https://lore.kernel.org/linuxppc-dev/",
        "list_archive_url_format": "https://lore.kernel.org/linuxppc-dev/{}/",
        "commit_url_format": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id={}"
    },
    "msgid": "<20260211082401.2407853-2-coxu@redhat.com>",
    "list_archive_url": "https://lore.kernel.org/linuxppc-dev/20260211082401.2407853-2-coxu@redhat.com/",
    "date": "2026-02-11T08:23:59",
    "name": "[v4,1/2] crash_dump/dm-crypt: Don't print in arch-specific code",
    "commit_ref": null,
    "pull_url": null,
    "state": "new",
    "archived": false,
    "hash": "d82cefe1520e0a4142a8562ed53af2b40236afc2",
    "submitter": {
        "id": 81201,
        "url": "http://patchwork.ozlabs.org/api/people/81201/?format=api",
        "name": "Coiby Xu",
        "email": "coxu@redhat.com"
    },
    "delegate": null,
    "mbox": "http://patchwork.ozlabs.org/project/linuxppc-dev/patch/20260211082401.2407853-2-coxu@redhat.com/mbox/",
    "series": [
        {
            "id": 491790,
            "url": "http://patchwork.ozlabs.org/api/series/491790/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/list/?series=491790",
            "date": "2026-02-11T08:23:59",
            "name": "kdump: Enable LUKS-encrypted dump target support in ARM64 and PowerPC",
            "version": 4,
            "mbox": "http://patchwork.ozlabs.org/series/491790/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/patches/2195483/comments/",
    "check": "pending",
    "checks": "http://patchwork.ozlabs.org/api/patches/2195483/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "\n <linuxppc-dev+bounces-16798-incoming=patchwork.ozlabs.org@lists.ozlabs.org>",
        "X-Original-To": [
            "incoming@patchwork.ozlabs.org",
            "linuxppc-dev@lists.ozlabs.org"
        ],
        "Delivered-To": "patchwork-incoming@legolas.ozlabs.org",
        "Authentication-Results": [
            "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=HGM0BIZ2;\n\tdkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.a=rsa-sha256 header.s=mimecast20190719 header.b=HGM0BIZ2;\n\tdkim-atps=neutral",
            "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org\n (client-ip=2404:9400:21b9:f100::1; helo=lists.ozlabs.org;\n envelope-from=linuxppc-dev+bounces-16798-incoming=patchwork.ozlabs.org@lists.ozlabs.org;\n receiver=patchwork.ozlabs.org)",
            "lists.ozlabs.org;\n arc=none smtp.remote-ip=170.10.133.124",
            "lists.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=redhat.com",
            "lists.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=HGM0BIZ2;\n\tdkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.a=rsa-sha256 header.s=mimecast20190719 header.b=HGM0BIZ2;\n\tdkim-atps=neutral",
            "lists.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=redhat.com\n (client-ip=170.10.133.124; helo=us-smtp-delivery-124.mimecast.com;\n envelope-from=coxu@redhat.com; receiver=lists.ozlabs.org)"
        ],
        "Received": [
            "from lists.ozlabs.org (lists.ozlabs.org\n [IPv6:2404:9400:21b9:f100::1])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1 raw public key)\n server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4f9s0q42HHz1xpY\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 11 Feb 2026 19:24:27 +1100 (AEDT)",
            "from boromir.ozlabs.org (localhost [127.0.0.1])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 4f9s0h5mryz2ySS;\n\tWed, 11 Feb 2026 19:24:20 +1100 (AEDT)",
            "from us-smtp-delivery-124.mimecast.com\n (us-smtp-delivery-124.mimecast.com [170.10.133.124])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 4f9s0g2Wwbz2xlM\n\tfor <linuxppc-dev@lists.ozlabs.org>; Wed, 11 Feb 2026 19:24:16 +1100 (AEDT)",
            "from mail-pl1-f200.google.com (mail-pl1-f200.google.com\n [209.85.214.200]) by relay.mimecast.com with ESMTP with STARTTLS\n (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id\n us-mta-354-K6tmrgPQNxaex0KodTc-zg-1; Wed, 11 Feb 2026 03:24:11 -0500",
            "by mail-pl1-f200.google.com with SMTP id\n d9443c01a7336-2aad6045810so15371765ad.3\n        for <linuxppc-dev@lists.ozlabs.org>;\n Wed, 11 Feb 2026 00:24:11 -0800 (PST)",
            "from localhost ([209.132.188.88])\n        by smtp.gmail.com with ESMTPSA id\n d9443c01a7336-2ab29964c62sm14460265ad.55.2026.02.11.00.24.08\n        (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256);\n        Wed, 11 Feb 2026 00:24:09 -0800 (PST)"
        ],
        "ARC-Seal": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1770798260;\n\tcv=none;\n b=Atg6xp5aNTIAWrrOs9/FxzV1CIBbILGv8YkpBIsBlOUJaCL65rSG53js98hm1T/LooW8Vt2jby1CG+LzHr4GvnjhmrzrYGBm8rHJqLQmgBlsqBUBT30diTY01eqZM2SJ8WNmTY91uGwpeppNXlPFL1rLHpov8CeJR24MrgzojciRxq4ga+UaTTaHKVgO+1zq1iemVFM5ltMymV3GkZsE0ZPaiiMQCWwIdds7VQPHH5PO7IKzCH1xc5dO57ocW0Y1OyUZND+BJ1B8iojcgBH+ELtn3UtLUeb23V20MXOKpRUaALlk5olcqqTyJiohRbWupR315IKVax7dxPgFwKOqxg==",
        "ARC-Message-Signature": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707;\n\tt=1770798260; c=relaxed/relaxed;\n\tbh=ihJ36lzkXZ7WFB7v/KaqffqO3gp0QEVYrI9tOHAHfi4=;\n\th=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:\n\t MIME-Version:content-type;\n b=OYcsWJMNYKCjNbbsZTxi7sfZM3KaYUM9OIlyOcdZHWmpSyI5GDyYTS3gCZ0L15LrR31gdSGzDg8clWLB9qmfxbhkqLToClO+dCJ8pthb3tw/MSoOHwzpJVjEZv90Gsu1uMAAXGzC/1TPez0yIe3w0x9vpztrDVwYd0F3BS6YbJ/0lzyqC5QJEoWvrgE7AFQk/pjbgXSGBYtQlNZTE3aMyGHtMYu7XyNG+ARxJB7N7Yps6hFJLm98pCCX+A2hRZ+Hx0ABVODIRDMT4fmqOkrOP+lWIozM5USb6JFgZGoZqbeg7SWNyqJMq0S3Mx4dgVGyPBiGu7cQNzSDaDgHJuLB6w==",
        "ARC-Authentication-Results": "i=1; lists.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=redhat.com;\n dkim=pass (1024-bit key;\n unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256\n header.s=mimecast20190719 header.b=HGM0BIZ2;\n dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com\n header.a=rsa-sha256 header.s=mimecast20190719 header.b=HGM0BIZ2;\n dkim-atps=neutral; spf=pass (client-ip=170.10.133.124;\n helo=us-smtp-delivery-124.mimecast.com; envelope-from=coxu@redhat.com;\n receiver=lists.ozlabs.org) smtp.mailfrom=redhat.com",
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n\ts=mimecast20190719; t=1770798253;\n\th=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n\t to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n\t content-transfer-encoding:content-transfer-encoding:\n\t in-reply-to:in-reply-to:references:references;\n\tbh=ihJ36lzkXZ7WFB7v/KaqffqO3gp0QEVYrI9tOHAHfi4=;\n\tb=HGM0BIZ2j8v/Ckvo+ZUTjfoTeR8qZyKRQafo3MM46cOEZ8By7cR3hnNBDkpdpoh2T0WAIR\n\t1g2NCUsh7869SpDqdOch7vkAT3334XDhQqnXin9TR45qtZtSYB8+qsOoH59cseIazlnfKY\n\t8SaT6h7U1jMjbxPyHOUaGPv74O4pNPE=",
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com;\n\ts=mimecast20190719; t=1770798253;\n\th=from:from:reply-to:subject:subject:date:date:message-id:message-id:\n\t to:to:cc:cc:mime-version:mime-version:content-type:content-type:\n\t content-transfer-encoding:content-transfer-encoding:\n\t in-reply-to:in-reply-to:references:references;\n\tbh=ihJ36lzkXZ7WFB7v/KaqffqO3gp0QEVYrI9tOHAHfi4=;\n\tb=HGM0BIZ2j8v/Ckvo+ZUTjfoTeR8qZyKRQafo3MM46cOEZ8By7cR3hnNBDkpdpoh2T0WAIR\n\t1g2NCUsh7869SpDqdOch7vkAT3334XDhQqnXin9TR45qtZtSYB8+qsOoH59cseIazlnfKY\n\t8SaT6h7U1jMjbxPyHOUaGPv74O4pNPE="
        ],
        "X-MC-Unique": "K6tmrgPQNxaex0KodTc-zg-1",
        "X-Mimecast-MFC-AGG-ID": "K6tmrgPQNxaex0KodTc-zg_1770798250",
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20230601; t=1770798250; x=1771403050;\n        h=content-transfer-encoding:mime-version:references:in-reply-to\n         :message-id:date:subject:cc:to:from:x-gm-gg:x-gm-message-state:from\n         :to:cc:subject:date:message-id:reply-to;\n        bh=ihJ36lzkXZ7WFB7v/KaqffqO3gp0QEVYrI9tOHAHfi4=;\n        b=mUB26ciEC32Ob33tbfmJ7DrSJeMZ+kkunnAq+r2Xg4WIcqgV5uQz4JGQfyKuT9msFJ\n         bvNc5AWF66n2mQ3/AVsK8bwlw+VMgDcTnZmgWzXeFd/RI0QrlOhEI7kBfLgDktoGK/eW\n         HOATbCpwNpj9FcSr2EfAnHQzLS9hYrd4abSoxZT2RuNV8opzBTwj7aOFC7yoxi6b8ZW+\n         gc9fe8W8TmpIE6bUlI1i6VXPquL1TjNsH4MQ0cAdW23IOE1GVgVNysMlMhQwklwLs/mJ\n         i7g85mryeV/0jXNwaVNXQga6GZhiVBBT4EF46nEg3Et8FaNAG8M02sOvUtxV4oOVcpFS\n         sLrw==",
        "X-Forwarded-Encrypted": "i=1;\n AJvYcCXw7OTIr/TNwGxeqEbVpJOlj8WjE0IkSSXKxUAPUJsDOmxO3BJYNbQCbBfz4h1bDJb4efdchwr98MV2dEQ=@lists.ozlabs.org",
        "X-Gm-Message-State": "AOJu0YyD7PYOz345E7cIHdxLbMiq2tERyT7JUAkFKmJaHayi0Nqy6AXc\n\tjVHpay1ZADn0FNvk7SrQ4EoV8tua0TfzravC5Efu3869SMfTWotIfT+TxonlTYpBJ+U7yR8tfd6\n\tWpc6dWXd0/Xxi8T5cUMUD3tDtTfZadsDI9YbH4fChxlf/hD/k8wKMgrMlXsowZ9TPAY8=",
        "X-Gm-Gg": "AZuq6aIMAE8eU7K9J6FNA/C9HfTj6ZcOB6NrZ2EjJw5Qari3E2A8OIHoZHJgBfOkbYj\n\t1pXtjrjPcF7LVyPaJHKFT9B3FaJm5ulQxZylkI2KXrcOzG1eEqj/8cvLRJZ1Gd6BRMAN0xuBUp5\n\tU/QQdu58g/wwXydjNg9uYtBklwjMETW/LNXS/WeVtgNe/NYLfOJcosqkNOU1EaittQZZM/a9Yx1\n\tm0ZEz4n/h8T9YGdsn7zH+bDMTAGF8b4zxGqyH0jFfeqVBuJA2pHRFMn4BZeiAM5TNRvo3fYRTNj\n\toCnHgZyyz+rxB62Y5P1WWWaJVLO/LtTODjg0BtDdgPh/I3RtJKnULRQ54iX8HK2mfcq0JmdlZXO\n\tf+Un/J9ntShrh",
        "X-Received": [
            "by 2002:a17:903:1a0e:b0:2a9:4450:abb7 with SMTP id\n d9443c01a7336-2a9516fcf6amr203049345ad.39.1770798250253;\n        Wed, 11 Feb 2026 00:24:10 -0800 (PST)",
            "by 2002:a17:903:1a0e:b0:2a9:4450:abb7 with SMTP id\n d9443c01a7336-2a9516fcf6amr203049015ad.39.1770798249724;\n        Wed, 11 Feb 2026 00:24:09 -0800 (PST)"
        ],
        "From": "Coiby Xu <coxu@redhat.com>",
        "To": "kexec@lists.infradead.org,\n\tlinux-arm-kernel@lists.infradead.org,\n\tlinuxppc-dev@lists.ozlabs.org,\n\tdevicetree@vger.kernel.org",
        "Cc": "Will Deacon <will@kernel.org>,\n\tThomas Gleixner <tglx@kernel.org>,\n\tIngo Molnar <mingo@redhat.com>,\n\tBorislav Petkov <bp@alien8.de>,\n\tDave Hansen <dave.hansen@linux.intel.com>,\n\tx86@kernel.org (maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)),\n\t\"H. Peter Anvin\" <hpa@zytor.com>,\n\tAndrew Morton <akpm@linux-foundation.org>,\n\tBaoquan He <bhe@redhat.com>,\n\tVivek Goyal <vgoyal@redhat.com>,\n\tDave Young <dyoung@redhat.com>,\n\tlinux-kernel@vger.kernel.org (open list:X86 ARCHITECTURE (32-BIT AND 64-BIT))",
        "Subject": "[PATCH v4 1/2] crash_dump/dm-crypt: Don't print in arch-specific code",
        "Date": "Wed, 11 Feb 2026 16:23:59 +0800",
        "Message-ID": "<20260211082401.2407853-2-coxu@redhat.com>",
        "X-Mailer": "git-send-email 2.53.0",
        "In-Reply-To": "<20260211082401.2407853-1-coxu@redhat.com>",
        "References": "<20260211082401.2407853-1-coxu@redhat.com>",
        "X-Mailing-List": "linuxppc-dev@lists.ozlabs.org",
        "List-Id": "<linuxppc-dev.lists.ozlabs.org>",
        "List-Help": "<mailto:linuxppc-dev+help@lists.ozlabs.org>",
        "List-Owner": "<mailto:linuxppc-dev+owner@lists.ozlabs.org>",
        "List-Post": "<mailto:linuxppc-dev@lists.ozlabs.org>",
        "List-Archive": "<https://lore.kernel.org/linuxppc-dev/>,\n  <https://lists.ozlabs.org/pipermail/linuxppc-dev/>",
        "List-Subscribe": "<mailto:linuxppc-dev+subscribe@lists.ozlabs.org>,\n  <mailto:linuxppc-dev+subscribe-digest@lists.ozlabs.org>,\n  <mailto:linuxppc-dev+subscribe-nomail@lists.ozlabs.org>",
        "List-Unsubscribe": "<mailto:linuxppc-dev+unsubscribe@lists.ozlabs.org>",
        "Precedence": "list",
        "MIME-Version": "1.0",
        "X-Mimecast-Spam-Score": "0",
        "X-Mimecast-MFC-PROC-ID": "6Pnuh1tthOly9A2JJh9CywcvnoJKpI4oHfWNXuSIsgg_1770798250",
        "X-Mimecast-Originator": "redhat.com",
        "Content-Transfer-Encoding": "8bit",
        "content-type": "text/plain; charset=\"US-ASCII\"; x-default=true",
        "X-Spam-Status": "No, score=-0.2 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED,\n\tDKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE,\n\tRCVD_IN_MSPIKE_H2,SPF_HELO_PASS,SPF_PASS autolearn=disabled\n\tversion=4.0.1 OzLabs 8",
        "X-Spam-Checker-Version": "SpamAssassin 4.0.1 (2024-03-25) on lists.ozlabs.org"
    },
    "content": "When the vmcore dumping target is not a LUKS-encrypted target, it's\nexpected that there is no dm-crypt key thus no need to return -ENOENT.\nAlso print more logs in crash_load_dm_crypt_keys. The benefit is\narch-specific code can be more succinct.\n\nSuggested-by: Will Deacon <will@kernel.org>\nSigned-off-by: Coiby Xu <coxu@redhat.com>\n---\n arch/x86/kernel/kexec-bzimage64.c | 6 +-----\n kernel/crash_dump_dm_crypt.c      | 7 +++++--\n 2 files changed, 6 insertions(+), 7 deletions(-)",
    "diff": "diff --git a/arch/x86/kernel/kexec-bzimage64.c b/arch/x86/kernel/kexec-bzimage64.c\nindex 7508d0ccc740..d20cf976d01a 100644\n--- a/arch/x86/kernel/kexec-bzimage64.c\n+++ b/arch/x86/kernel/kexec-bzimage64.c\n@@ -518,12 +518,8 @@ static void *bzImage64_load(struct kimage *image, char *kernel,\n \t\tif (ret)\n \t\t\treturn ERR_PTR(ret);\n \t\tret = crash_load_dm_crypt_keys(image);\n-\t\tif (ret == -ENOENT) {\n-\t\t\tkexec_dprintk(\"No dm crypt key to load\\n\");\n-\t\t} else if (ret) {\n-\t\t\tpr_err(\"Failed to load dm crypt keys\\n\");\n+\t\tif (ret)\n \t\t\treturn ERR_PTR(ret);\n-\t\t}\n \t\tif (image->dm_crypt_keys_addr &&\n \t\t    cmdline_len + MAX_ELFCOREHDR_STR_LEN + MAX_DMCRYPTKEYS_STR_LEN >\n \t\t\t    header->cmdline_size) {\ndiff --git a/kernel/crash_dump_dm_crypt.c b/kernel/crash_dump_dm_crypt.c\nindex 401423ba477d..478dacb0625c 100644\n--- a/kernel/crash_dump_dm_crypt.c\n+++ b/kernel/crash_dump_dm_crypt.c\n@@ -405,14 +405,16 @@ int crash_load_dm_crypt_keys(struct kimage *image)\n \n \tif (key_count <= 0) {\n \t\tkexec_dprintk(\"No dm-crypt keys\\n\");\n-\t\treturn -ENOENT;\n+\t\treturn 0;\n \t}\n \n \tif (!is_dm_key_reused) {\n \t\timage->dm_crypt_keys_addr = 0;\n \t\tr = build_keys_header();\n-\t\tif (r)\n+\t\tif (r) {\n+\t\t\tpr_err(\"Failed to build dm-crypt keys header, ret=%d\\n\", r);\n \t\t\treturn r;\n+\t\t}\n \t}\n \n \tkbuf.buffer = keys_header;\n@@ -423,6 +425,7 @@ int crash_load_dm_crypt_keys(struct kimage *image)\n \tkbuf.mem = KEXEC_BUF_MEM_UNKNOWN;\n \tr = kexec_add_buffer(&kbuf);\n \tif (r) {\n+\t\tpr_err(\"Failed to call kexec_add_buffer, ret=%d\\n\", r);\n \t\tkvfree((void *)kbuf.buffer);\n \t\treturn r;\n \t}\n",
    "prefixes": [
        "v4",
        "1/2"
    ]
}