From patchwork Wed Oct 19 10:36:23 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Xianting Tian X-Patchwork-Id: 5207 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:4ac7:0:0:0:0:0 with SMTP id y7csp264608wrs; Wed, 19 Oct 2022 04:20:31 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5Swbah5h6SRTf/RWPB7eySyrTGyBKRjEvg7K6oi2a/C0Ggy3rgwtyaOuvPg6TqElAEVp3v X-Received: by 2002:a17:907:7b8b:b0:78d:cee5:3145 with SMTP id ne11-20020a1709077b8b00b0078dcee53145mr6031902ejc.537.1666178430955; Wed, 19 Oct 2022 04:20:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666178430; cv=none; d=google.com; s=arc-20160816; b=gQFZEDWfyY4ktwUq8M8BqWtECQL+DrAY6CGIA4TPGK9mwV6NYGi591A2sgQIUqsIKN ic/p9bGmgKi4drwS4vX2WwS3NH8Z2DN3aokeXmkB3YxXwA7mLELhB0TaTwXl6tWQ6npS NC3sYbtrWS3u3FBhfJnDqkxC3bLel+AvhAREdsfUfKvBNykZ/zvp+SGcBqlx9oG+1FKb V9Z/jVK1zh7DOGs6SKSuT2UkZKCE/uohUUQdz0znsb+khM8bRp+CWAap5eV/mM54yPvV Wqre2jqVdmaqWRoEmNWfj5YrQ/FFEJkeK9VwiXBeJ93BSvYaFDzdIrd5CyywDCbSB+V1 JuJg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=KfM6RfG7OkZJR3LDNCD8Kdld1hgwE8AWtXLQfATHXm8=; b=b8xmxJokCu3bkTAOFWbrChP5URrer0ffpZjyEpCwek7Xx8HfI3m8jMYnfrljfKAmAo Y/bryAJ7HHdTgcbEhjxigHktk89t3ty7MFt1RbI35WRJlp0ehTKcQSPNKlWAauc7jiZm D1EpHoYKIZX9/6pKa77PYvK3RrgUccK8YL8z1XRxSVLMsF7EDrh9mbsUOyaDM+jLLCgA C8LcU39Z7ghe3p0ztWDVO+DDjUylO//mTwoeQmr4nBzzB0ztvv1trZdGoycoNTCTk/be 0P8lVKxos7XbqJwGXnsdRO9cXdoeEnW8FiWI+ZoJPGIXMbOSBou0W71C0cDi5BT6Ckud aHgw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n16-20020aa7c450000000b0043be542b956si12171933edr.262.2022.10.19.04.20.05; Wed, 19 Oct 2022 04:20:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232818AbiJSLKI (ORCPT + 99 others); Wed, 19 Oct 2022 07:10:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57032 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234038AbiJSLJB (ORCPT ); Wed, 19 Oct 2022 07:09:01 -0400 Received: from out30-43.freemail.mail.aliyun.com (out30-43.freemail.mail.aliyun.com [115.124.30.43]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3E1DC17D858; Wed, 19 Oct 2022 03:37:59 -0700 (PDT) X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R161e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018045168;MF=xianting.tian@linux.alibaba.com;NM=1;PH=DS;RN=25;SR=0;TI=SMTPD_---0VSaNstn_1666175796; Received: from localhost.localdomain(mailfrom:xianting.tian@linux.alibaba.com fp:SMTPD_---0VSaNstn_1666175796) by smtp.aliyun-inc.com; Wed, 19 Oct 2022 18:36:37 +0800 From: Xianting Tian To: paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, anup@brainfault.org, heiko@sntech.de, guoren@kernel.org, mick@ics.forth.gr, alexandre.ghiti@canonical.com, bhe@redhat.com, vgoyal@redhat.com, dyoung@redhat.com, corbet@lwn.net, Conor.Dooley@microchip.com, bagasdotme@gmail.com, k-hagio-ab@nec.com, lijiang@redhat.com Cc: kexec@lists.infradead.org, linux-doc@vger.kernel.org, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, crash-utility@redhat.com, heinrich.schuchardt@canonical.com, hschauhan@nulltrace.org, yixun.lan@gmail.com, Xianting Tian Subject: [PATCH V4 2/2] Documentation: kdump: describe VMCOREINFO export for RISCV64 Date: Wed, 19 Oct 2022 18:36:23 +0800 Message-Id: <20221019103623.7008-3-xianting.tian@linux.alibaba.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20221019103623.7008-1-xianting.tian@linux.alibaba.com> References: <20221019103623.7008-1-xianting.tian@linux.alibaba.com> X-Spam-Status: No, score=-9.9 required=5.0 tests=BAYES_00, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2, SPF_HELO_NONE,SPF_PASS,UNPARSEABLE_RELAY,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1747114714324784260?= X-GMAIL-MSGID: =?utf-8?q?1747114714324784260?= The following interrelated definitions and ranges are needed by the kdump crash tool, which are exported by "arch/riscv/kernel/crash_core.c": VA_BITS, PAGE_OFFSET, phys_ram_base, KERNEL_LINK_ADDR, MODULES_VADDR ~ MODULES_END, VMALLOC_START ~ VMALLOC_END, VMEMMAP_START ~ VMEMMAP_END, Document these RISCV64 exports above. Signed-off-by: Xianting Tian Reviewed-by: Bagas Sanjaya --- .../admin-guide/kdump/vmcoreinfo.rst | 29 +++++++++++++++++++ 1 file changed, 29 insertions(+) diff --git a/Documentation/admin-guide/kdump/vmcoreinfo.rst b/Documentation/admin-guide/kdump/vmcoreinfo.rst index 6726f439958c..86fd88492870 100644 --- a/Documentation/admin-guide/kdump/vmcoreinfo.rst +++ b/Documentation/admin-guide/kdump/vmcoreinfo.rst @@ -595,3 +595,32 @@ X2TLB ----- Indicates whether the crashed kernel enabled SH extended mode. + +RISCV64 +======= + +VA_BITS +------- + +The maximum number of bits for virtual addresses. Used to compute the +virtual memory ranges. + +PAGE_OFFSET +----------- + +Indicates the virtual kernel start address of the direct-mapped RAM region. + +phys_ram_base +------------- + +Indicates the start physical RAM address. + +MODULES_VADDR|MODULES_END|VMALLOC_START|VMALLOC_END|VMEMMAP_START|VMEMMAP_END|KERNEL_LINK_ADDR +---------------------------------------------------------------------------------------------- + +Used to get the correct ranges: + + * MODULES_VADDR ~ MODULES_END : Kernel module space. + * VMALLOC_START ~ VMALLOC_END : vmalloc() / ioremap() space. + * VMEMMAP_START ~ VMEMMAP_END : vmemmap space, used for struct page array. + * KERNEL_LINK_ADDR : start address of Kernel link and BPF