isa_fake.hh revision 3499
11817SN/A/* 21817SN/A * Copyright (c) 2004-2005 The Regents of The University of Michigan 31817SN/A * All rights reserved. 41817SN/A * 51817SN/A * Redistribution and use in source and binary forms, with or without 61817SN/A * modification, are permitted provided that the following conditions are 71817SN/A * met: redistributions of source code must retain the above copyright 81817SN/A * notice, this list of conditions and the following disclaimer; 91817SN/A * redistributions in binary form must reproduce the above copyright 101817SN/A * notice, this list of conditions and the following disclaimer in the 111817SN/A * documentation and/or other materials provided with the distribution; 121817SN/A * neither the name of the copyright holders nor the names of its 131817SN/A * contributors may be used to endorse or promote products derived from 141817SN/A * this software without specific prior written permission. 151817SN/A * 161817SN/A * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 171817SN/A * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 181817SN/A * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 191817SN/A * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 201817SN/A * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 211817SN/A * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 221817SN/A * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 231817SN/A * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 241817SN/A * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 251817SN/A * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 261817SN/A * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 272665Ssaidi@eecs.umich.edu * 283499Ssaidi@eecs.umich.edu * Authors: Ali Saidi 291817SN/A */ 301817SN/A 311817SN/A/** @file 321817SN/A * Declaration of a fake device. 331817SN/A */ 341817SN/A 351817SN/A#ifndef __ISA_FAKE_HH__ 361817SN/A#define __ISA_FAKE_HH__ 371817SN/A 381817SN/A#include "base/range.hh" 391817SN/A#include "dev/io_device.hh" 403348Sbinkertn@umich.edu#include "dev/tsunami.hh" 413348Sbinkertn@umich.edu#include "mem/packet.hh" 421817SN/A 431817SN/A/** 443499Ssaidi@eecs.umich.edu * IsaFake is a device that returns, BadAddr, 1 or 0 on all reads and 453499Ssaidi@eecs.umich.edu * rites. It is meant to be placed at an address range 461817SN/A * so that an mcheck doesn't occur when an os probes a piece of hw 473499Ssaidi@eecs.umich.edu * that doesn't exist (e.g. UARTs1-3), or catch requests in the memory system 483499Ssaidi@eecs.umich.edu * that have no responders.. 491817SN/A */ 502539SN/Aclass IsaFake : public BasicPioDevice 511817SN/A{ 522539SN/A public: 532539SN/A struct Params : public BasicPioDevice::Params 542539SN/A { 552539SN/A Addr pio_size; 563499Ssaidi@eecs.umich.edu bool retBadAddr; 573499Ssaidi@eecs.umich.edu uint8_t retData; 582539SN/A }; 592539SN/A protected: 602539SN/A const Params *params() const { return (const Params*)_params; } 613499Ssaidi@eecs.umich.edu uint64_t retData; 621817SN/A 631817SN/A public: 641817SN/A /** 651817SN/A * The constructor for Tsunmami Fake just registers itself with the MMU. 662539SN/A * @param p params structure 671817SN/A */ 682539SN/A IsaFake(Params *p); 691817SN/A 701817SN/A /** 711817SN/A * This read always returns -1. 722982Sstever@eecs.umich.edu * @param pkt The memory request. 731817SN/A * @param data Where to put the data. 741817SN/A */ 753349Sbinkertn@umich.edu virtual Tick read(PacketPtr pkt); 761817SN/A 771817SN/A /** 781817SN/A * All writes are simply ignored. 792982Sstever@eecs.umich.edu * @param pkt The memory request. 801817SN/A * @param data the data to not write. 811817SN/A */ 823349Sbinkertn@umich.edu virtual Tick write(PacketPtr pkt); 833499Ssaidi@eecs.umich.edu 843499Ssaidi@eecs.umich.edu void init(); 851817SN/A}; 861817SN/A 873499Ssaidi@eecs.umich.edu#endif // __ISA_FAKE_HH__ 88