Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp3494236rwi; Wed, 12 Oct 2022 02:54:33 -0700 (PDT) X-Google-Smtp-Source: AMsMyM748EZzQsNIuryP6/sUnblkdlW0dPAMVk1Qz0iz6WMqRtzBxo+hiXzZLynRTHJLN9N10mPJ X-Received: by 2002:a65:58cc:0:b0:43c:2fc6:e7d7 with SMTP id e12-20020a6558cc000000b0043c2fc6e7d7mr25048493pgu.478.1665568473332; Wed, 12 Oct 2022 02:54:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665568473; cv=none; d=google.com; s=arc-20160816; b=hX6m8U0GPNuisJtzqegVm8Yj+uV+NyBwg7J6c8bpXTWFQRuDtSuZn8dOknMdTkk48S WO9Gpj6efVXhVdfLgY3Dxx4uWa7YBp3eXY/f+p4cW7tLGcH8AqEKcRQRVmdaqPiHhYWx hXGJ9G9QlWD2fsPZHnjnbfvH7jvFN6ZWzyK4QWRp7k8dLEIyXQ2QzZ8wiLLGQcHSB/YN Zny7E4+suNiC9O3ouB8SezoS7YNY/WH6XdEiGcYb30r816+cq52gIAfwMCp6AbyIxFr+ 2rDjdun6S5th0xmM2FS+I8cbfKeti01NEJPe+TBfEqVncJ7NJRmkzy7IUmkBonEkM4zR PG6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:subject:user-agent:mime-version:date:message-id; bh=nfT2eDTvbeORfVMni3Ufgv9ELk4GoWOIl5S3j+8bT5A=; b=wAhshTl5gVPFCOwCuHwML54o4stPI2nmQVoXDU6Fcm8aRwrslVBhs+rgFRtlkN5DZU 4n49FyOar7iuw5/ryg4v6RwgNio1CLpAG4rRf6VD7L5egIe1Q68oLjeqQtUmfUTQzCAP mjP/ARayveOIea/9m+tJipyHItCV54zX/fMpzcNgq1vGLjomlKGFvYPPLbE1mgX4p5Ra iTXxDDPfSGkq617NE16O5R3WQ4cqJY+dkQN2uuTUPV8LB4q/0s9gr1MFutVU/6MzUyIM lTyC7MGa9QqJbKFK1JHd8vthNWciqbciiW2L9QxRbM0jm3Z2BXAKMtMM8k9ObIR+nTPl 5jVg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l9-20020a170902f68900b0016d5d09a43dsi15841875plg.331.2022.10.12.02.54.20; Wed, 12 Oct 2022 02:54:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229628AbiJLJms (ORCPT + 99 others); Wed, 12 Oct 2022 05:42:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34408 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229691AbiJLJmq (ORCPT ); Wed, 12 Oct 2022 05:42:46 -0400 Received: from out30-43.freemail.mail.aliyun.com (out30-43.freemail.mail.aliyun.com [115.124.30.43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1333D42E52; Wed, 12 Oct 2022 02:42:44 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R301e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018045176;MF=xianting.tian@linux.alibaba.com;NM=1;PH=DS;RN=22;SR=0;TI=SMTPD_---0VS.Jp8U_1665567757; Received: from 30.221.98.246(mailfrom:xianting.tian@linux.alibaba.com fp:SMTPD_---0VS.Jp8U_1665567757) by smtp.aliyun-inc.com; Wed, 12 Oct 2022 17:42:39 +0800 Message-ID: Date: Wed, 12 Oct 2022 17:42:37 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.12.0 Subject: Re: [PATCH V6 0/6] RISC-V fixups to work with crash tool To: Palmer Dabbelt Cc: Paul Walmsley , aou@eecs.berkeley.edu, anup@brainfault.org, heiko@sntech.de, guoren@kernel.org, mick@ics.forth.gr, alexandre.ghiti@canonical.com, bhe@redhat.com, vgoyal@redhat.com, dyoung@redhat.com, corbet@lwn.net, Conor.Dooley@microchip.com, kexec@lists.infradead.org, linux-doc@vger.kernel.org, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, crash-utility@redhat.com, heinrich.schuchardt@canonical.com, k-hagio-ab@nec.com, hschauhan@nulltrace.org, yixun.lan@gmail.com References: From: Xianting Tian In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-10.4 required=5.0 tests=BAYES_00, ENV_AND_HDR_SPF_MATCH,NICE_REPLY_A,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS,UNPARSEABLE_RELAY, USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 在 2022/8/12 上午12:17, Palmer Dabbelt 写道: > On Thu, 11 Aug 2022 00:41:44 PDT (-0700), > xianting.tian@linux.alibaba.com wrote: >> I ever sent the patch 1 in the link: >> https://patchwork.kernel.org/project/linux-riscv/patch/20220708073150.352830-3-xianting.tian@linux.alibaba.com/ >> >> And patch 2,3 in the link: >> https://patchwork.kernel.org/project/linux-riscv/patch/20220714113300.367854-2-xianting.tian@linux.alibaba.com/ >> >> https://patchwork.kernel.org/project/linux-riscv/patch/20220714113300.367854-3-xianting.tian@linux.alibaba.com/ >> >> >> This patch set just put these patches together, and with three new >> patch 4, 5, 6. >> these six patches are the fixups for machine_kexec, kernel mode PC >> for vmcore >> and improvements for vmcoreinfo, memory layout dump and fixup >> schedule out issue >> in machine_crash_shutdown(). >> >> The main changes in the six patchs as below, >> Patch 1: Fixup use of smp_processor_id() in preemptible context, to >> cleanup >>          the console prints. >> Patch 2: Fixup to get correct kernel mode PC for kernel mode regs for >> vmcore. >> Patch 3: Fixup schedule out issue in machine_crash_shutdown() >> Patch 4: Add modules to virtual kernel memory layout dump. >> Patch 5: Add VM layout, va bits, ram base to vmcoreinfo, which can >> simplify >>          the development of crash tool as ARM64 already did >>          (arch/arm64/kernel/crash_core.c). >> Patch 6: Updates vmcoreinfo.rst for vmcoreinfo export for RISCV64. >> >> With these six patches(patch 2 is must), crash tool can work well to >> analyze >> a vmcore. The patches for crash tool for RISCV64 is in the link: >> https://lore.kernel.org/linux-riscv/20220801043040.2003264-1-xianting.tian@linux.alibaba.com/ >> >> >> ------ >> Changes v1 -> v2: >>   1, remove the patch "Add a fast call path of crash_kexec()" from >> this series >>      of patches, as it already applied to riscv git. >> https://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git/commit/?h=for-next&id=3f1901110a89b0e2e13adb2ac8d1a7102879ea98 >>   2, add 'Reviewed-by' based on the comments of v1. >> Changes v2 -> v3: >>   use "riscv" instead of "riscv64" in patch 5 subject line. >> Changes v3 -> v4: >>   use "riscv" instead of "riscv64" in the summary of patch 5 subject >> line. >> Changes v4 -> v5: >>   add a new patch "RISC-V: Fixup schedule out issue in >> machine_crash_shutdown()" >> Changes v5 -> v6: >>   1, move "fixup" patches to the start of the patch set. >>   2, change patch 1, 2, 6's subject to make it tell more what it's >> about. >>   3, add Fixes for patch 3. >>   4, adjuest the changes format for patch 6. >> >> >> Xianting Tian (6): >>   RISC-V: kexec: Fixup use of smp_processor_id() in preemptible context >>   RISC-V: Fixup get incorrect user mode PC for kernel mode regs >>   RISC-V: Fixup schedule out issue in machine_crash_shutdown() >>   RISC-V: Add modules to virtual kernel memory layout dump >>   RISC-V: Add arch_crash_save_vmcoreinfo support >>   Documentation: kdump: describe VMCOREINFO export for RISCV64 >> >>  .../admin-guide/kdump/vmcoreinfo.rst          | 31 +++++++++++++++++++ >>  arch/riscv/kernel/Makefile                    |  1 + >>  arch/riscv/kernel/crash_core.c                | 29 +++++++++++++++++ >>  arch/riscv/kernel/crash_save_regs.S           |  2 +- >>  arch/riscv/kernel/machine_kexec.c             | 28 ++++++++++++++--- >>  arch/riscv/mm/init.c                          |  4 +++ >>  6 files changed, 89 insertions(+), 6 deletions(-) >>  create mode 100644 arch/riscv/kernel/crash_core.c > > Thank.  I've taken the first 4 onto for-next, which is still targeted > for 5.20, as they're fixes.  I'm not opposed to taking the > documentation patch for this cycle as well, it just needs some > going-over as the wording looks very odd (or at least it does to me > right now, maybe I'm just still half asleep).  Patch 5 is a new > feature, and given that it's being spun during the merge window it's > too late. Hi Palmer Do you plan to merge the two patch to Linux 6.1 to support crash tool work?  thanks   RISC-V: kexec: Fixup use of smp_processor_id() in preemptible context   RISC-V: Fixup get incorrect user mode PC for kernel mode regs