Received: by 2002:ac0:da4c:0:0:0:0:0 with SMTP id a12csp1819653imi; Sat, 23 Jul 2022 19:40:08 -0700 (PDT) X-Google-Smtp-Source: AGRyM1sU+8fY5XpuPJyC+hiYYtDaESdp42dgUXnyz/VI2FRUA02hSDjd/0zxWGLegPMDbpJQp1sc X-Received: by 2002:a17:902:8504:b0:16d:105c:43de with SMTP id bj4-20020a170902850400b0016d105c43demr6820156plb.10.1658630407895; Sat, 23 Jul 2022 19:40:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1658630407; cv=none; d=google.com; s=arc-20160816; b=duZaDvVlm9dZJEGBZRFYWX7fsgghG82Ggk8U8LPr/1vOqrEkU4RCwnH57+7TRGEMmp pPM13aMfr6ZF4XBjm7eww3xeHOGWCWEiUfIKxAO5nA+3U4+0+kgoOe0Sd63hRAWHZQBc 0yrRThZf2cABDbgjP5hdCaPvMRw44+TeVbkUrlVwyTtOkOZGR7LaTdA9cwMrQIlEAdPP 3Llk1REO93oftxRDWcFNKO2XcAKBIQcPgrGVbjpg5xx3VDkqEYKd893paNH0fLR2uB/o nUKMzGXntCCvq4tIAM56Mu1XY4NVTJA13ENZnz1S3XLhmIhSdbgUwfeNiZqPFhUNXftV 11sA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject; bh=8+k3nS+YpKTWHFZZBAgL1NOK1tkZaw2SmMz3P1GzMfE=; b=jIeKg4XBnbgp4R71IjGYmq8zQqwzlMrckOsBfpmnSTQxR0CMXI982ZpiV39uCbKl7M Np4oAMFN6z3TLIbqqsFUoZstOmfcFtMLjMNf71RBO6Gm5Z0CkCmG/0De7GvO9MKJZdu4 1f9g+zulaS5SNJL4Hm6V/z0631KVokZg1tc+nOFIjJoO4ZCvzt9evOs6ujWammfnLFLM qK9y9lRSoSivcf6vTGICYMXssjDjpy78VkZRL8AXClH9jwSc2ywc+/JZUlrNjwpApQdZ +C24XjjaCK1u1sLocu3SuXzkjK9XsrX7I60A+8VU6lsrnXbaUJTv2286qteJZ8KXm4B1 VyYg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q2-20020a17090aa00200b001ecba51171dsi4775455pjp.143.2022.07.23.19.39.54; Sat, 23 Jul 2022 19:40:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236475AbiGXCiR (ORCPT + 99 others); Sat, 23 Jul 2022 22:38:17 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57704 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229602AbiGXCiO (ORCPT ); Sat, 23 Jul 2022 22:38:14 -0400 Received: from out30-54.freemail.mail.aliyun.com (out30-54.freemail.mail.aliyun.com [115.124.30.54]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3A4CD13DE2 for ; Sat, 23 Jul 2022 19:38:13 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R151e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018046050;MF=xianting.tian@linux.alibaba.com;NM=1;PH=DS;RN=16;SR=0;TI=SMTPD_---0VKC1zl0_1658630286; Received: from 192.168.1.4(mailfrom:xianting.tian@linux.alibaba.com fp:SMTPD_---0VKC1zl0_1658630286) by smtp.aliyun-inc.com; Sun, 24 Jul 2022 10:38:08 +0800 Subject: Re: [Crash-utility] [PATCH 0/5] Fixups to work with crash tool To: Dave Young , "Discussion list for crash utility usage, maintenance and development" Cc: paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, anup@brainfault.org, heiko@sntech.de, guoren@kernel.org, mick@ics.forth.gr, alexandre.ghiti@canonical.com, huanyi.xj@alibaba-inc.com, hschauhan@nulltrace.org, linux-kernel@vger.kernel.org, heinrich.schuchardt@canonical.com, linux-riscv@lists.infradead.org, kexec@lists.infradead.org References: <20220717101323.370245-1-xianting.tian@linux.alibaba.com> From: tianxianting Message-ID: Date: Sun, 24 Jul 2022 10:38:06 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.10.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-9.9 required=5.0 tests=BAYES_00, ENV_AND_HDR_SPF_MATCH,NICE_REPLY_A,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE, SPF_PASS,UNPARSEABLE_RELAY,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 在 2022/7/22 下午4:13, Dave Young 写道: > Hi, > > On Sun, 17 Jul 2022 at 18:13, Xianting Tian > wrote: >> I ever sent the patch 1,2 in the link: >> https://patchwork.kernel.org/project/linux-riscv/patch/20220708073150.352830-2-xianting.tian@linux.alibaba.com/ >> https://patchwork.kernel.org/project/linux-riscv/patch/20220708073150.352830-3-xianting.tian@linux.alibaba.com/ >> And patch 3,4 in the link: >> https://patchwork.kernel.org/project/linux-riscv/patch/20220714113300.367854-2-xianting.tian@linux.alibaba.com/ >> https://patchwork.kernel.org/project/linux-riscv/patch/20220714113300.367854-3-xianting.tian@linux.alibaba.com/ >> >> This patch series just put these patches together, and with a new patch 5. >> these five patches are the fixups for kexec, vmcore and improvements >> for vmcoreinfo and memory layout dump. >> >> The main changes in the five patchs as below, >> Patch 1: Add a fast call path of crash_kexec() as other Arch(x86, arm64) do. >> Patch 2: use __smp_processor_id() instead of smp_processor_id() to cleanup >> the console prints. >> Patch 3: Add VM layout, va bits, ram base to vmcoreinfo, which can simplify >> the development of crash tool as ARM64 already did >> (arch/arm64/kernel/crash_core.c). >> Patch 4: Add modules to virtual kernel memory layout dump. >> Patch 5: Fixup to get correct kernel mode PC for vmcore >> >> With these 5 patches(patch 3 is must), crash tool can work well to analyze >> a vmcore. The patches for crash tool for RISCV64 is in the link: >> https://lore.kernel.org/linux-riscv/20220717042929.370022-1-xianting.tian@linux.alibaba.com/ >> >> Xianting Tian (5): >> RISC-V: Fixup fast call of crash_kexec() >> RISC-V: use __smp_processor_id() instead of smp_processor_id() >> RISC-V: Add arch_crash_save_vmcoreinfo support > Vmcoreinfo changes need to be documented in > Documentation/admin-guide/kdump/vmcoreinfo.rst > > Otherwise, I suggest to always cc kexec mail list (added in cc) for > kexec | kdump patches. > > thanks, I will fix it in v3. >> riscv: Add modules to virtual kernel memory layout dump >> RISC-V: Fixup getting correct current pc >> >> arch/riscv/kernel/Makefile | 1 + >> arch/riscv/kernel/crash_core.c | 29 +++++++++++++++++++++++++++++ >> arch/riscv/kernel/crash_save_regs.S | 2 +- >> arch/riscv/kernel/machine_kexec.c | 2 +- >> arch/riscv/kernel/traps.c | 4 ++++ >> arch/riscv/mm/init.c | 4 ++++ >> 6 files changed, 40 insertions(+), 2 deletions(-) >> create mode 100644 arch/riscv/kernel/crash_core.c >> >> -- >> 2.17.1 >> >> -- >> Crash-utility mailing list >> Crash-utility@redhat.com >> https://listman.redhat.com/mailman/listinfo/crash-utility >> Contribution Guidelines: https://github.com/crash-utility/crash/wiki >> > Thanks > Dave