[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [XenPPC] [xenppc-unstable] [ppc] Handle memory accesses based on the MSR value
# HG changeset patch # User Jimi Xenidis <jimix@xxxxxxxxxxxxxx> # Node ID 3adb8d61d667d977e967c7e757ef0775ef4c283d # Parent bde996cddbbaea72c260b04fd6b95c5f43973f67 [ppc] Handle memory accesses based on the MSR value While in real mode, the upper bits of an effective address is truncated, RW does not take care of this automaically. This allows us to debug the real mode areas of the linux kernel, especially the early boot phase. Signed-off-by: Jimi Xenidis <jimix@xxxxxxxxxxxxxx> --- tools/gpproxy/riscwatch.py | 31 +++++++++++++++++++++++++------ 1 files changed, 25 insertions(+), 6 deletions(-) diff -r bde996cddbba -r 3adb8d61d667 tools/gpproxy/riscwatch.py --- a/tools/gpproxy/riscwatch.py Wed Jul 26 13:48:25 2006 -0400 +++ b/tools/gpproxy/riscwatch.py Wed Jul 26 13:51:44 2006 -0400 @@ -76,6 +76,17 @@ class RISCWatchSession: self.telnet.write(cmd) return self._getprompt() + def adjust_addr(self, addr): + msr = int(self.get_register("msr"), 16) + # could come in as string or int + try: + val = int(addr) + except: + val = int(addr, 16) + if ((msr & 0x30) != 0x30) : + val = val & ~(0xc000000000000000) + return val + def _command(self, cmd): """Send command and consume the echo.""" cmd += "\n" @@ -160,6 +171,7 @@ class RISCWatchSession: def set_memory(self, addr, len, val): assert len < 32 + addr = self.adjust_addr(addr) result = self._command("m -d%d %x=%x" % (len, addr, val)) m = ERRVAL.match(result) if m: @@ -184,6 +196,7 @@ class RISCWatchSession: if remaining >= size: break + addr = self.adjust_addr(addr) # do the read hexaddr = "%x" % (addr + pos) val = self._command("m -d%s %s" % (size, hexaddr)) @@ -206,36 +219,42 @@ class RISCWatchSession: def step(self, signal=None, addr=None): if addr: - self._command("s 1 %s" % addr) + addr = self.adjust_addr(addr) + self._command("s 1 %x" % addr) else: self._command("s") def resume(self, signal=None, addr=None): if addr: - self._command("r %s" % addr) + addr = self.adjust_addr(addr) + self._command("r %x" % addr) else: self._command("r") def break_insert_mem(self, addr): - result = self._command("bp %s" % addr) + addr = self.adjust_addr(addr) + result = self._command("bp %x" % addr) m = ERRVAL.match(result) if m: raise IOError(m.group(2)) def break_remove_mem(self, addr): - result = self._command("bp -r %s" % addr) + addr = self.adjust_addr(addr) + result = self._command("bp -r %x" % addr) m = ERRVAL.match(result) if m: raise IOError(m.group(2)) def break_insert_hardware(self, addr): - result = self._command("bp -h %s" % addr) + addr = self.adjust_addr(addr) + result = self._command("bp -h %x" % addr) m = ERRVAL.match(result) if m: raise IOError(m.group(2)) def break_remove_hardware(self, addr): - result = self._command("bp -h -r %s" % addr) + addr = self.adjust_addr(addr) + result = self._command("bp -h -r %x" % addr) m = ERRVAL.match(result) if m: raise IOError(m.group(2)) _______________________________________________ Xen-ppc-devel mailing list Xen-ppc-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-ppc-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |