Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp270080rwb; Thu, 11 Aug 2022 00:47:42 -0700 (PDT) X-Google-Smtp-Source: AA6agR477RNvwjAYG2YT5a5LdK3pwPOntF0h26mJ6Gjh9s1Jrs/RMRnaMh3DyFq4ktzMrFr8h/0X X-Received: by 2002:aa7:d795:0:b0:43c:eb00:fc77 with SMTP id s21-20020aa7d795000000b0043ceb00fc77mr29348506edq.284.1660204062104; Thu, 11 Aug 2022 00:47:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660204062; cv=none; d=google.com; s=arc-20160816; b=t9EMpIIcfr4KYMisxDV8zoWh/r2lOhXuLe4V3UldzVZP4pff30K2i3GPxBeNcpFYWr aJ1VXXpuU2gLVqDNUrP8EOr4XYxdlu+c711PFrloe0b4nlx4vuGBz5puLeLcqYKkS8E9 sK9ceg/ud0+oyRlM+iYeE8WztA2l0eljIA6T8qQPE/4t/M+egUtdRBg0KljjGsGah9MP vdxF2wQaWMl6TRxdmTKj6hRi4AFOsrUp1/TNQ27w5zv4mfkFalEGvwMcG6le/MYtLwS8 RrAkGH1ZRha9qn1DOSqpPGBpUGI1DeFHA1BvLJR0Yljo8lcJttyoakz2kXbLgSY2rUcQ gZ7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=cUZxjfsy52qytZQN1mVDw9HA6s6r42MIU9xTbJomwQ8=; b=MGoaRxaHKO4+PtMGc4WCGDiWmmGf8C/C7M1e31cqhvcyRCP46kggGgMqwuBWQtcpRB Z8Lr0e3+FcbBUIfgHGFFGNQG+QZwSSyatg3z+pT6+mmoiFeuwjszy58PUZSK9BPeYuAD L6Zv6hBGlct6UlvbXlSeYvnXDOg9xuAFRZgSgpggLlDsz8bKojNmaTCpe+xY4aijmQfz raUk3lwxkl6iGhhMRjROhNT+kXfFA5y4PA+t+bKlJmUpCqskgGXeQASX9iMW8JzZPyfK cLHbnWsq2czZPg+NikCt25I+1ZjC7mRu6LupWcO/kat4JcO9uLTWGlXZPPvSO9CFfuAi 3DIA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hc17-20020a170907169100b0072f9b440ffbsi5885185ejc.225.2022.08.11.00.47.15; Thu, 11 Aug 2022 00:47:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234292AbiHKHm0 (ORCPT + 99 others); Thu, 11 Aug 2022 03:42:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47482 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234460AbiHKHmQ (ORCPT ); Thu, 11 Aug 2022 03:42:16 -0400 Received: from out30-56.freemail.mail.aliyun.com (out30-56.freemail.mail.aliyun.com [115.124.30.56]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BFAA9923E4; Thu, 11 Aug 2022 00:42:13 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R121e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018045170;MF=xianting.tian@linux.alibaba.com;NM=1;PH=DS;RN=23;SR=0;TI=SMTPD_---0VLyDZ1R_1660203721; Received: from localhost(mailfrom:xianting.tian@linux.alibaba.com fp:SMTPD_---0VLyDZ1R_1660203721) by smtp.aliyun-inc.com; Thu, 11 Aug 2022 15:42:02 +0800 From: Xianting Tian To: paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, anup@brainfault.org, heiko@sntech.de, guoren@kernel.org, mick@ics.forth.gr, alexandre.ghiti@canonical.com, bhe@redhat.com, vgoyal@redhat.com, dyoung@redhat.com, corbet@lwn.net, Conor.Dooley@microchip.com Cc: kexec@lists.infradead.org, linux-doc@vger.kernel.org, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, crash-utility@redhat.com, heinrich.schuchardt@canonical.com, k-hagio-ab@nec.com, hschauhan@nulltrace.org, yixun.lan@gmail.com, Xianting Tian Subject: [PATCH V6 6/6] Documentation: kdump: describe VMCOREINFO export for RISCV64 Date: Thu, 11 Aug 2022 15:41:50 +0800 Message-Id: <20220811074150.3020189-7-xianting.tian@linux.alibaba.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20220811074150.3020189-1-xianting.tian@linux.alibaba.com> References: <20220811074150.3020189-1-xianting.tian@linux.alibaba.com> X-Spam-Status: No, score=-9.9 required=5.0 tests=BAYES_00, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,UNPARSEABLE_RELAY, USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following interrelated definitions and ranges are needed by the kdump crash tool, they are exported by "arch/riscv/kernel/crash_core.c": VA_BITS, PAGE_OFFSET, phys_ram_base MODULES_VADDR ~ MODULES_END, VMALLOC_START ~ VMALLOC_END, VMEMMAP_START ~ VMEMMAP_END KASAN_SHADOW_START ~ KASAN_SHADOW_END, KERNEL_LINK_ADDR ~ ADDRESS_SPACE_END This patch just add the description of VMCOREINFO export for RISCV64. Signed-off-by: Xianting Tian --- .../admin-guide/kdump/vmcoreinfo.rst | 31 +++++++++++++++++++ 1 file changed, 31 insertions(+) diff --git a/Documentation/admin-guide/kdump/vmcoreinfo.rst b/Documentation/admin-guide/kdump/vmcoreinfo.rst index 8419019b6a88..1e71e6710404 100644 --- a/Documentation/admin-guide/kdump/vmcoreinfo.rst +++ b/Documentation/admin-guide/kdump/vmcoreinfo.rst @@ -595,3 +595,34 @@ X2TLB ----- Indicates whether the crashed kernel enabled SH extended mode. + +RISCV64 +======= + +VA_BITS +------- + +The maximum number of bits for virtual addresses. Used to compute the +virtual memory ranges. + +PAGE_OFFSET +----------- + +Indicates the virtual kernel start address of direct-mapped RAM region. + +phys_ram_base +------------- + +Indicates the start physical RAM address. + +---------------------------------------------------------------------------------------------------------------------------------------------------- +MODULES_VADDR|MODULES_END|VMALLOC_START|VMALLOC_END|VMEMMAP_START|VMEMMAP_END|KASAN_SHADOW_START|KASAN_SHADOW_END|KERNEL_LINK_ADDR|ADDRESS_SPACE_END +---------------------------------------------------------------------------------------------------------------------------------------------------- + +Used to get the correct ranges: + + * MODULES_VADDR ~ MODULES_END : Kernel module space. + * VMALLOC_START ~ VMALLOC_END : vmalloc() / ioremap() space. + * VMEMMAP_START ~ VMEMMAP_END : vmemmap region, used for struct page array. + * KASAN_SHADOW_START ~ KASAN_SHADOW_END : kasan shadow space. + * KERNEL_LINK_ADDR ~ ADDRESS_SPACE_END : Kernel link and BPF space. -- 2.17.1