public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
From: Jason Wessel <jason.wessel@windriver.com>
To: sonic zhang <sonic.adi@gmail.com>
Cc: Linux Kernel <linux-kernel@vger.kernel.org>,
	kgdb mailing list <kgdb-bugreport@lists.sourceforge.net>
Subject: Re: [PATCH][kgdb] Make mem access function weak in kgdb.c.
Date: Tue, 09 Sep 2008 07:08:07 -0500	[thread overview]
Message-ID: <48C66727.9090600@windriver.com> (raw)
In-Reply-To: <1220940220.30906.6.camel@eight.analog.com>

sonic zhang wrote:
> L1 instruction memory and MMR memory on blackfin can not be accessed by
> common functions probe_kernel_read() and probe_kernel_write().
> Blackfin asks for 2/4 byte align access to MMR memory and DMA access to L1
> instruction memory. These functions need to be reimplemented in
> architecture specific kgdb.c.
>

This patch is a reasonable change if you are looking to use the common
kgdb code, however your patch needs some further work in that the
documentation and prototypes in include/linux/kgdb.h file need to be
updated as well.

--- functions from your patch ---
>
> -int kgdb_mem2hex(char *mem, char *buf, int count)
> +int __weak kgdb_mem2hex(char *mem, char *buf, int count)


> -static int kgdb_ebin2mem(char *buf, char *mem, int count)
> +int __weak kgdb_ebin2mem(char *buf, char *mem, int count)


> -int kgdb_hex2mem(char *buf, char *mem, int count)
> +int __weak kgdb_hex2mem(char *buf, char *mem, int count)
--------------------

In include/linux/kgdb.h you have:
    270 extern int kgdb_mem2hex(char *mem, char *buf, int count);
    271 extern int kgdb_hex2mem(char *buf, char *mem, int count);

The above two lines need to be changed by your patch, as well as
adding a definition for the ebin2mem, because we do not want to make
new sparse warnings run have something link to the wrong function with
the various revs of gcc out there.

To fix the documentation, you add some extra information to the
comments preceding the functions prototype in include/linux/kgdb.h,
there are other examples in the same file. IE:

/**
 *      kgdb_mem2hex - (optional arch overide) traslate bin to hex chars
 *      @mem: source buffer
 *	@buf: target buffer
 *      @count: number of bytes in mem
 *
 *      Archictures which do not support probe_kernel_(read|write), 
 *	can make an alternate implmentation of this function.
 *	This function safely reads memory to into hex
 *	characters for use with the kgdb protocol.
 */
int __weak kgdb_mem2hex(char *mem, char *buf, int count);



The other approach here would be to consider changing the
probe_kernel_write() and probe_kernel_read() to work safely on the
black fin architecture, then you would not need to have an
architecture specific override for these kgdb internals.  In the long
run, I suspect other kernel functionality may use the probe_kernel_*
functions so you might consider this.  Regardless of the direction you
choose, I have no strong objection to accepting your patch if you make
the requested changes.

Thanks,
Jason.

      reply	other threads:[~2008-09-09 12:08 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2008-09-09  6:03 [PATCH][kgdb] Make mem access function weak in kgdb.c sonic zhang
2008-09-09 12:08 ` Jason Wessel [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=48C66727.9090600@windriver.com \
    --to=jason.wessel@windriver.com \
    --cc=kgdb-bugreport@lists.sourceforge.net \
    --cc=linux-kernel@vger.kernel.org \
    --cc=sonic.adi@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox