Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp121736rwb; Wed, 10 Aug 2022 20:59:37 -0700 (PDT) X-Google-Smtp-Source: AA6agR4OH0yOzT7QCdSgt1d0FLMQJdzuykWjq7ByUzMFMwC1ZZQ5WXG5knCnz4T/ZpIvpzXOSruf X-Received: by 2002:a63:1f65:0:b0:41c:a040:47d8 with SMTP id q37-20020a631f65000000b0041ca04047d8mr26180097pgm.573.1660190377049; Wed, 10 Aug 2022 20:59:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660190377; cv=none; d=google.com; s=arc-20160816; b=QtNIzcJa8u+/kDOASiFOQQ3V7rJQQxSjeFozG8sJzT8Xc/5ubAk/ssDUd4V4a77Gy5 kKyKHz0gS/EZOYe8u0cFGYZOlupXnsybJ8FrN1MtOxi/D7zZrYVMHo7XOVy/w9izKr7L zz24zfOlyIlJlkLyAU/Z7zkW0HPuCPVo+FXY4ibxszBDCF9UNWovhpG2WYnQo4+kr0gt 4AHmxfF6gtXcQdsJsop3M1MQF4S9Gfa19tX6buLqt5XSkKZhH2CkUI60mjOHMZp4MIe7 IHt6861hkN2QauBD9r3Eeb7nQYLTrfuTz4ehTYl62qevWvyqGZcTbOs+LvdXrkmNMjJj ihIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:references:cc:to :subject; bh=jt1OI6yuVOm50LWfjTy4HXQg3VGmJS/4BBsG2VIMfHc=; b=w4tdfnDajvYhDQTP9i9US2WCvnEVhlBU5ifdoOYt36IwmT9DExMPAS5zFlbhWYH1bo qtnN3rVH4yseyJEpCF7JHetOHYry/fh6YocpU6iJpWL6rszCZKYZW5MZvKUn1ZfrVew2 KhhPzmVMi5hrS0gJDbRUun1dKIwlbO14nXo0t2MoNhrh7DYH2uMrGO2wqsXkGrpHP9iT DDcK/nYCNSCcPTDhprDxWi8qRxh5HArXaqH52nw4qWfNLW6Xy76N6KWuFiaYJoGCeEfA RSTvRyDghV4HYk/UKqXLCFnXOjgokyjFjk6e2D5+WyA6/3dfPIPlHD01T46kOW2eAdPO uuhA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q11-20020a170902dacb00b0016d4841215dsi14722885plx.409.2022.08.10.20.59.24; Wed, 10 Aug 2022 20:59:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233709AbiHKDhv (ORCPT + 99 others); Wed, 10 Aug 2022 23:37:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51544 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229924AbiHKDhr (ORCPT ); Wed, 10 Aug 2022 23:37:47 -0400 Received: from out30-130.freemail.mail.aliyun.com (out30-130.freemail.mail.aliyun.com [115.124.30.130]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 139106CF73; Wed, 10 Aug 2022 20:37:38 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R541e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018045168;MF=xianting.tian@linux.alibaba.com;NM=1;PH=DS;RN=24;SR=0;TI=SMTPD_---0VLxQ5Q3_1660189052; Received: from B-LB6YLVDL-0141.local(mailfrom:xianting.tian@linux.alibaba.com fp:SMTPD_---0VLxQ5Q3_1660189052) by smtp.aliyun-inc.com; Thu, 11 Aug 2022 11:37:34 +0800 Subject: Re: [PATCH V5 5/6] riscv: crash_core: Export kernel vm layout, phys_ram_base To: Bagas Sanjaya Cc: paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, anup@brainfault.org, heiko@sntech.de, guoren@kernel.org, mick@ics.forth.gr, alexandre.ghiti@canonical.com, bhe@redhat.com, vgoyal@redhat.com, dyoung@redhat.com, corbet@lwn.net, Conor.Dooley@microchip.com, kexec@lists.infradead.org, linux-doc@vger.kernel.org, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, crash-utility@redhat.com, huanyi.xj@alibaba-inc.com, heinrich.schuchardt@canonical.com, k-hagio-ab@nec.com, hschauhan@nulltrace.org, yixun.lan@gmail.com References: <20220802121818.2201268-1-xianting.tian@linux.alibaba.com> <20220802121818.2201268-6-xianting.tian@linux.alibaba.com> From: Xianting Tian Message-ID: <81bf1acd-307c-b093-44c2-280c70f44e08@linux.alibaba.com> Date: Thu, 11 Aug 2022 11:37:32 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.14.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-9.9 required=5.0 tests=BAYES_00, ENV_AND_HDR_SPF_MATCH,NICE_REPLY_A,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 在 2022/8/11 上午11:06, Bagas Sanjaya 写道: > On Tue, Aug 02, 2022 at 08:18:17PM +0800, Xianting Tian wrote: >> These infos are needed by the kdump crash tool. Since these values change >> from time to time, it is preferable to export them via vmcoreinfo than to >> change the crash's code frequently. >> > I have to agree with Conor.Dooley, that this patch is misleading (I see > documentation instead of real export). So IMO, the patch subject should > be "Documentation: kdump: describe VMCOREINFO export for RISCV64". > > For MODULES_VADDR and friends, the doc can be improved, like: > > diff --git a/Documentation/admin-guide/kdump/vmcoreinfo.rst b/Documentation/admin-guide/kdump/vmcoreinfo.rst > index 6b76284a503ca5..6694acc32c3588 100644 > --- a/Documentation/admin-guide/kdump/vmcoreinfo.rst > +++ b/Documentation/admin-guide/kdump/vmcoreinfo.rst > @@ -615,14 +615,13 @@ phys_ram_base > > Indicates the start physical RAM address. > > -MODULES_VADDR|MODULES_END|VMALLOC_START|VMALLOC_END|VMEMMAP_START|VMEMMAP_END > ------------------------------------------------------------------------------ > -KASAN_SHADOW_START|KASAN_SHADOW_END|KERNEL_LINK_ADDR|ADDRESS_SPACE_END > ----------------------------------------------------------------------- > +MODULES_VADDR|MODULES_END|VMALLOC_START|VMALLOC_END|VMEMMAP_START|VMEMMAP_END|KASAN_SHADOW_START|KASAN_SHADOW_END|KERNEL_LINK_ADDR|ADDRESS_SPACE_END > +---------------------------------------------------------------------------------------------------------------------------------------------------- > > Used to get the correct ranges: > - MODULES_VADDR ~ MODULES_END : Kernel module space. > - VMALLOC_START ~ VMALLOC_END : vmalloc() / ioremap() space. > - VMEMMAP_START ~ VMEMMAP_END : vmemmap region, used for struct page array. > - KASAN_SHADOW_START ~ KASAN_SHADOW_END : kasan shadow space. > - KERNEL_LINK_ADDR ~ ADDRESS_SPACE_END : Kernel link and BPF space. > + > + * MODULES_VADDR ~ MODULES_END : Kernel module space. > + * VMALLOC_START ~ VMALLOC_END : vmalloc() / ioremap() space. > + * VMEMMAP_START ~ VMEMMAP_END : vmemmap region, used for struct page array. > + * KASAN_SHADOW_START ~ KASAN_SHADOW_END : kasan shadow space. > + * KERNEL_LINK_ADDR ~ ADDRESS_SPACE_END : Kernel link and BPF space. Thanks for the comment, I will fix it in V6 > > Thanks. >