Received: by 2002:ac0:e350:0:0:0:0:0 with SMTP id g16csp2514744imn; Tue, 2 Aug 2022 05:59:50 -0700 (PDT) X-Google-Smtp-Source: AA6agR64ubKx0oTmeB4aaIjnrmkCrMEh/or6xUcgTCYM73sPBtz8kLiH5DjyLLEMTTq4dmLTLHue X-Received: by 2002:a63:8142:0:b0:41b:d0dc:aa8e with SMTP id t63-20020a638142000000b0041bd0dcaa8emr11941494pgd.90.1659445190133; Tue, 02 Aug 2022 05:59:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1659445190; cv=none; d=google.com; s=arc-20160816; b=zhLmc0RlQneLi+PFM9qGjLA0bvRcuAXn/qRJijXS9Peojve11mpcTtnUcXBN6SQ9N3 UgyRIebI14eShYdW24aGMnkZvST2Cw6/ARj/oJsEOczqgygkUkwG89sIA1m/8f1QAsEt FyMlAbFB67OziS43+sZIOLLbRNIS+SJmoRrGMIIbSbQGeQE1BNkZdLk1PXrd73vGKd0G 2bz58xoJVV6SUBCc8pYzVXxHcwxkGLCXMsXQNYV+ok6vAoFgNo+Ymvr/FVgpLfNgHbRH xs9hdesa5FqOJlcj+sseWpzAHl0JiOyR9sM/OoDkAxChlNgWs/njASIF3u+iE1fa6lCZ MvOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=8R8xNMxKJS7DuYdfZgS4hKpLuVo+ZuARvizqSgfxlm0=; b=o8EKH7eSoAIE2g3AFAZEuLlW3wpCcwAO2CZqegPK6Y1gbtmSQRmHMyRtYX8P1kPrNs Fw6k29509GaYrl4Eh4XxfrhM+jprUR2X6PQ5sn8TO7o6ZZgMaf0qABLY4GBybAtGWzuG KJc0Om5wXy1tynoaciKFw13jGwjcnI2u9PsUue0lAhIiOVhiZWqyyihm1ihPMOOE3XXV dlPvk8qsuQbju5ofBNLUjFZaQWkYrc8srj9vzuU1oh1Hb+ZCL7cBAcizfjABu50Ti+qV 4yw1JchkG2VkHH4dQq2wQOqSAiVbMo4p/i5SbDxuMMbj1bJyUS4tqGX3+3BrNluhYDVJ 0BcA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r1-20020a634401000000b004127d6a496fsi16520107pga.222.2022.08.02.05.59.35; Tue, 02 Aug 2022 05:59:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236926AbiHBMSg (ORCPT + 99 others); Tue, 2 Aug 2022 08:18:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38860 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236905AbiHBMSc (ORCPT ); Tue, 2 Aug 2022 08:18:32 -0400 Received: from out30-57.freemail.mail.aliyun.com (out30-57.freemail.mail.aliyun.com [115.124.30.57]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E6A264F6B8; Tue, 2 Aug 2022 05:18:26 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R281e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018046050;MF=xianting.tian@linux.alibaba.com;NM=1;PH=DS;RN=24;SR=0;TI=SMTPD_---0VLBiqD2_1659442701; Received: from localhost(mailfrom:xianting.tian@linux.alibaba.com fp:SMTPD_---0VLBiqD2_1659442701) by smtp.aliyun-inc.com; Tue, 02 Aug 2022 20:18:22 +0800 From: Xianting Tian To: paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, anup@brainfault.org, heiko@sntech.de, guoren@kernel.org, mick@ics.forth.gr, alexandre.ghiti@canonical.com, bhe@redhat.com, vgoyal@redhat.com, dyoung@redhat.com, corbet@lwn.net, Conor.Dooley@microchip.com Cc: kexec@lists.infradead.org, linux-doc@vger.kernel.org, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, crash-utility@redhat.com, huanyi.xj@alibaba-inc.com, heinrich.schuchardt@canonical.com, k-hagio-ab@nec.com, hschauhan@nulltrace.org, yixun.lan@gmail.com, Xianting Tian Subject: [PATCH V5 0/6] RISC-V fixups to work with crash tool Date: Tue, 2 Aug 2022 20:18:12 +0800 Message-Id: <20220802121818.2201268-1-xianting.tian@linux.alibaba.com> X-Mailer: git-send-email 2.17.1 X-Spam-Status: No, score=-9.9 required=5.0 tests=BAYES_00, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, UNPARSEABLE_RELAY,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org I ever sent the patch 1 in the link: https://patchwork.kernel.org/project/linux-riscv/patch/20220708073150.352830-3-xianting.tian@linux.alibaba.com/ And patch 2,3 in the link: https://patchwork.kernel.org/project/linux-riscv/patch/20220714113300.367854-2-xianting.tian@linux.alibaba.com/ https://patchwork.kernel.org/project/linux-riscv/patch/20220714113300.367854-3-xianting.tian@linux.alibaba.com/ This patch set just put these patches together, and with three new patch 4, 5, 6. these six patches are the fixups for machine_kexec, kernel mode PC for vmcore and improvements for vmcoreinfo, memory layout dump and fixup chedule out issue in machine_crash_shutdown(). The main changes in the six patchs as below, Patch 1: use __smp_processor_id() instead of smp_processor_id() to cleanup the console prints. Patch 2: Add VM layout, va bits, ram base to vmcoreinfo, which can simplify the development of crash tool as ARM64 already did (arch/arm64/kernel/crash_core.c). Patch 3: Add modules to virtual kernel memory layout dump. Patch 4: Fixup to get correct kernel mode PC for vmcore. Patch 5: Updates vmcoreinfo.rst. Patch 6: Fixup schedule out issue in machine_crash_shutdown() With these six patches(patch 2 is must), crash tool can work well to analyze a vmcore. The patches for crash tool for RISCV64 is in the link: https://lore.kernel.org/linux-riscv/20220801043040.2003264-1-xianting.tian@linux.alibaba.com/ ------ Changes v1 -> v2: 1, remove the patch "Add a fast call path of crash_kexec()" from this series of patches, as it already applied to riscv git. https://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git/commit/?h=for-next&id=3f1901110a89b0e2e13adb2ac8d1a7102879ea98 2, add 'Reviewed-by' based on the comments of v1. Changes v2 -> v3: use "riscv" instead of "riscv64" in patch 5 subject line. Changes v3 -> v4: use "riscv" instead of "riscv64" in the summary of patch 5 subject line. Changes v4 -> v5: add a new patch "RISC-V: Fixup schedule out issue in machine_crash_shutdown()" Xianting Tian (6): RISC-V: use __smp_processor_id() instead of smp_processor_id() RISC-V: Add arch_crash_save_vmcoreinfo support riscv: Add modules to virtual kernel memory layout dump RISC-V: Fixup getting correct current pc riscv: crash_core: Export kernel vm layout, phys_ram_base RISC-V: Fixup schedule out issue in machine_crash_shutdown() .../admin-guide/kdump/vmcoreinfo.rst | 31 +++++++++++++++++++ arch/riscv/kernel/Makefile | 1 + arch/riscv/kernel/crash_core.c | 29 +++++++++++++++++ arch/riscv/kernel/crash_save_regs.S | 2 +- arch/riscv/kernel/machine_kexec.c | 28 ++++++++++++++--- arch/riscv/mm/init.c | 4 +++ 6 files changed, 89 insertions(+), 6 deletions(-) create mode 100644 arch/riscv/kernel/crash_core.c -- 2.17.1