On Fri, 2005-09-16 at 14:32 +0200, Johannes Berg wrote: > On Sat, 2005-09-03 at 17:05 +1000, Benjamin Herrenschmidt wrote: > > > What we can do is also spy all IOs to the chip and use that to > > understand how it works, eventually writing a linux driver... > > > > Note also that the OS X driver has nice readable symbols too. So if > > somebody is really motivated, it should be possible to use both > > techniques to properly reverse engineer it. > > We're on it. Note that the MOL thing was actually invented for this > purpose :)
Heh, ok. A trick for spying IOs: give the driver an unmapped area of memory instead of the IOs it expects. You'll trap on all accesses. Then emulate the load/store access (and keep a trace). I can send you code of a userland SEGV handler that emulates such load/store accesses later, possibly tomorrow, if you are interested, that I wrote for spying some video drivers for sleep issues. Ben. -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]