(resend) RFC/Patch xmon pte/pgd/ userspace address additions

will schmidt will_schmidt at vnet.ibm.com
Wed May 4 23:12:27 EST 2005


Hi Folks,

This is a resend.  I didnt see this on the patch page, so suspect it got 
lost.  (Do updated patches need to be sent to the list under a different 
thread?)

-Will

-------- Original Message --------
Subject: Re: RFC/Patch  more xmon additions
Date: Thu, 07 Apr 2005 08:39:36 -0500
From: will schmidt <will_schmidt at vnet.ibm.com>
To: will schmidt <will_schmidt at vnet.ibm.com>
CC: linuxppc64-dev at ozlabs.org
References: <421E3BE3.90301 at vnet.ibm.com>

Hi All,
    here's a revised version of my initial patch.

- I've removed the try_spinlock code;
- As an alternative to duplicating lots of function to add mread calls
in place of references, I've added setjmp(bus_error_jmp) {} around what
seem more likely to be critical areas.
- cleaned up spacing
- changed most of the function names to be xmon_xxx instead of wm_xxx.

these functions show up under a submenu 'w'.   use "w?" at xmon> prompt
to get the help blurb.

-Will

will schmidt wrote:
> 
> Hi Folks,
> Am looking for comments on this additional function i've added to xmon 
> on the side..
> 
> the bulk of my intent was to make it easier for me to poke at memory 
> within a particular user process.
> 
> I realize that the spacing is a bit screwed up, and the function names 
> should eventually change.   Because i couldnt decide on letters for the 
> new functions, i put them under a submenu 'w'.
> 
> wP will dump info on all processes.
> 
> wp 0xabc  will make process with pid 0xabc the active pid. <- active 
> only with respect to xmon poking into memory.
> 
> wd 0xabcd1234 - will call through the pdg/pmd functions and return the 
> kernel address corresponding to 0xabcd1234 within the processes memory 
> space location.
> 
> wg  will dump gprs of the process/thread.
> 
> -Will
> 
> 
> ------------------------------------------------------------------------
> 
> 
> _______________________________________________
> Linuxppc64-dev mailing list
> Linuxppc64-dev at ozlabs.org
> https://ozlabs.org/cgi-bin/mailman/listinfo/linuxppc64-dev


-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: xmon_pxd_code_apr7.diff
Url: http://ozlabs.org/pipermail/linuxppc64-dev/attachments/20050504/e50cfe05/attachment.txt 


More information about the Linuxppc64-dev mailing list