(resend) RFC/Patch xmon pte/pgd/ userspace address additions
will schmidt
will_schmidt at vnet.ibm.com
Wed May 4 23:12:27 EST 2005
Hi Folks,
This is a resend. I didnt see this on the patch page, so suspect it got
lost. (Do updated patches need to be sent to the list under a different
thread?)
-Will
-------- Original Message --------
Subject: Re: RFC/Patch more xmon additions
Date: Thu, 07 Apr 2005 08:39:36 -0500
From: will schmidt <will_schmidt at vnet.ibm.com>
To: will schmidt <will_schmidt at vnet.ibm.com>
CC: linuxppc64-dev at ozlabs.org
References: <421E3BE3.90301 at vnet.ibm.com>
Hi All,
here's a revised version of my initial patch.
- I've removed the try_spinlock code;
- As an alternative to duplicating lots of function to add mread calls
in place of references, I've added setjmp(bus_error_jmp) {} around what
seem more likely to be critical areas.
- cleaned up spacing
- changed most of the function names to be xmon_xxx instead of wm_xxx.
these functions show up under a submenu 'w'. use "w?" at xmon> prompt
to get the help blurb.
-Will
will schmidt wrote:
>
> Hi Folks,
> Am looking for comments on this additional function i've added to xmon
> on the side..
>
> the bulk of my intent was to make it easier for me to poke at memory
> within a particular user process.
>
> I realize that the spacing is a bit screwed up, and the function names
> should eventually change. Because i couldnt decide on letters for the
> new functions, i put them under a submenu 'w'.
>
> wP will dump info on all processes.
>
> wp 0xabc will make process with pid 0xabc the active pid. <- active
> only with respect to xmon poking into memory.
>
> wd 0xabcd1234 - will call through the pdg/pmd functions and return the
> kernel address corresponding to 0xabcd1234 within the processes memory
> space location.
>
> wg will dump gprs of the process/thread.
>
> -Will
>
>
> ------------------------------------------------------------------------
>
>
> _______________________________________________
> Linuxppc64-dev mailing list
> Linuxppc64-dev at ozlabs.org
> https://ozlabs.org/cgi-bin/mailman/listinfo/linuxppc64-dev
-------------- next part --------------
An embedded and charset-unspecified text was scrubbed...
Name: xmon_pxd_code_apr7.diff
Url: http://ozlabs.org/pipermail/linuxppc64-dev/attachments/20050504/e50cfe05/attachment.txt
More information about the Linuxppc64-dev
mailing list