Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp5349143rwi; Mon, 17 Oct 2022 20:08:10 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4YfFqOXYJY1B5nw9mnXpY40Yn2iQ8mH+aIuIWYirUnmudBuhhO5zXhjemp7WkAJsbyUQdK X-Received: by 2002:a17:906:30c5:b0:782:707:9e2d with SMTP id b5-20020a17090630c500b0078207079e2dmr646115ejb.286.1666062490245; Mon, 17 Oct 2022 20:08:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666062490; cv=none; d=google.com; s=arc-20160816; b=zBzFEA/l2YEbrG2CmaJL6QqK5OjpwWw7fyZdF+0eydqgQoZErSfjwNTaF3Ro6FAsZ9 TD86sw+/zfPPFsLZuKM+8m6gOaV89odhUzzNG4eNkszqBucasiEG6/nOo33AvXyzmkeW PenikOPygsLtwVYHDfg1NsKm1dL7ssMXAlngzzDoPZrw/jaU+ke8co4v0vDLt0RtAn89 nNObgzW1b5KKPZVr7AK5gkcuslGzDKFkfle6mauGFufG7qS8HV66GTzdz4cppKUgxFaX ctWX3vy0yMeN0hhpYuavWjrA3O0eVe5jlZ8bL4CtuxRlrl8JnXSXukPCZEvrjBNqmQ2H 6umA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:subject:user-agent:mime-version:date:message-id; bh=e0l8RMm/+PZpfVM++ATl8/i8kNIJoY+UrYe5ivVDndY=; b=cd6nnJsWlRCCEL6xrmMzuWe68CHRaGlG/cB1yJvCMDj7i1h8uktk+Q1flxFbWNQ5gN ru/qudqrBiB2xAhYUcgWb+M+b//268jwAmXcbYsYByJbCsGeM9xDBG+ZHtgmu1a4Jsdk 9KdPw7yLpaCpuw4Ayc8H3fwzHxBRkFs9NRN7GATr21g8nIq6su7zjGpxAYxEdii04FA7 uAnEe2rJb/V3Hq7oOKFHGlTD8sMiGuIXlA0t4nDKJWXk/i9TvkjHqx9TwkGM9X5Geadz 4BTzio86QdH0Ap7X2zo6ynrcqWEGhRRg9DT6CGfTrpyVl+JECdODQd1SzJ7hs2J+qrRZ WEgg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w15-20020a50c44f000000b0045a26e1b603si10189813edf.531.2022.10.17.20.07.45; Mon, 17 Oct 2022 20:08:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230416AbiJRCmG (ORCPT + 99 others); Mon, 17 Oct 2022 22:42:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60062 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230333AbiJRCmB (ORCPT ); Mon, 17 Oct 2022 22:42:01 -0400 Received: from out30-45.freemail.mail.aliyun.com (out30-45.freemail.mail.aliyun.com [115.124.30.45]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A6ABD95AF8; Mon, 17 Oct 2022 19:41:57 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R161e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018046060;MF=xianting.tian@linux.alibaba.com;NM=1;PH=DS;RN=24;SR=0;TI=SMTPD_---0VSSPzYT_1666060910; Received: from 30.221.96.155(mailfrom:xianting.tian@linux.alibaba.com fp:SMTPD_---0VSSPzYT_1666060910) by smtp.aliyun-inc.com; Tue, 18 Oct 2022 10:41:52 +0800 Message-ID: Date: Tue, 18 Oct 2022 10:41:50 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.12.0 Subject: Re: [PATCH V2 2/2] Documentation: kdump: describe VMCOREINFO export for RISCV64 To: Conor Dooley Cc: paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, anup@brainfault.org, heiko@sntech.de, guoren@kernel.org, mick@ics.forth.gr, alexandre.ghiti@canonical.com, bhe@redhat.com, vgoyal@redhat.com, dyoung@redhat.com, corbet@lwn.net, Conor.Dooley@microchip.com, bagasdotme@gmail.com, kexec@lists.infradead.org, linux-doc@vger.kernel.org, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, crash-utility@redhat.com, heinrich.schuchardt@canonical.com, k-hagio-ab@nec.com, hschauhan@nulltrace.org, yixun.lan@gmail.com References: <20221014134139.5151-1-xianting.tian@linux.alibaba.com> <20221014134139.5151-3-xianting.tian@linux.alibaba.com> From: Xianting Tian In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-9.9 required=5.0 tests=BAYES_00, ENV_AND_HDR_SPF_MATCH,NICE_REPLY_A,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS,UNPARSEABLE_RELAY, USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 在 2022/10/18 上午3:40, Conor Dooley 写道: > On Fri, Oct 14, 2022 at 09:41:39PM +0800, Xianting Tian wrote: >> The following interrelated definitions and ranges are needed by the kdump >> crash tool, they are exported by "arch/riscv/kernel/crash_core.c": >> VA_BITS, >> PAGE_OFFSET, >> phys_ram_base, >> MODULES_VADDR ~ MODULES_END, >> VMALLOC_START ~ VMALLOC_END, >> VMEMMAP_START ~ VMEMMAP_END, >> KASAN_SHADOW_START ~ KASAN_SHADOW_END, >> KERNEL_LINK_ADDR ~ ADDRESS_SPACE_END >> >> Document these RISCV64 exports above. >> >> Signed-off-by: Xianting Tian >> --- >> .../admin-guide/kdump/vmcoreinfo.rst | 30 +++++++++++++++++++ >> 1 file changed, 30 insertions(+) >> >> diff --git a/Documentation/admin-guide/kdump/vmcoreinfo.rst b/Documentation/admin-guide/kdump/vmcoreinfo.rst >> index 6726f439958c..8e2e164cf3db 100644 >> --- a/Documentation/admin-guide/kdump/vmcoreinfo.rst >> +++ b/Documentation/admin-guide/kdump/vmcoreinfo.rst >> @@ -595,3 +595,33 @@ X2TLB >> ----- >> >> Indicates whether the crashed kernel enabled SH extended mode. >> + >> +RISCV64 >> +======= >> + >> +VA_BITS >> +------- >> + >> +The maximum number of bits for virtual addresses. Used to compute the >> +virtual memory ranges. >> + >> +PAGE_OFFSET >> +----------- >> + >> +Indicates the virtual kernel start address of direct-mapped RAM region. > Apologies for not seeing this sooner, but should there not be a "the" > prior to "direct-mapped"? will fix in v3 > >> + >> +phys_ram_base >> +------------- >> + >> +Indicates the start physical RAM address. >> + >> +MODULES_VADDR|MODULES_END|VMALLOC_START|VMALLOC_END|VMEMMAP_START|VMEMMAP_END|KASAN_SHADOW_START|KASAN_SHADOW_END|KERNEL_LINK_ADDR|ADDRESS_SPACE_END >> +---------------------------------------------------------------------------------------------------------------------------------------------------- >> + >> +Used to get the correct ranges: >> + >> + * MODULES_VADDR ~ MODULES_END : Kernel module space. >> + * VMALLOC_START ~ VMALLOC_END : vmalloc() / ioremap() space. >> + * VMEMMAP_START ~ VMEMMAP_END : vmemmap region, used for struct page array. > Since I'm in pedant mode, it does look a little odd that you're using > region for vmemmap but space for the others but idc that much. Sorry, I didn't get your point :( it contains vmemmap area with reference wth arch/arm64/kernel/crash_core.c. > > Thanks, > Conor. > >> + * KASAN_SHADOW_START ~ KASAN_SHADOW_END : kasan shadow space. >> + * KERNEL_LINK_ADDR ~ ADDRESS_SPACE_END : Kernel link and BPF space. >> -- >> 2.17.1 >> >>