isa_fake.hh revision 3814
1/* 2 * Copyright (c) 2004-2005 The Regents of The University of Michigan 3 * All rights reserved. 4 * 5 * Redistribution and use in source and binary forms, with or without 6 * modification, are permitted provided that the following conditions are 7 * met: redistributions of source code must retain the above copyright 8 * notice, this list of conditions and the following disclaimer; 9 * redistributions in binary form must reproduce the above copyright 10 * notice, this list of conditions and the following disclaimer in the 11 * documentation and/or other materials provided with the distribution; 12 * neither the name of the copyright holders nor the names of its 13 * contributors may be used to endorse or promote products derived from 14 * this software without specific prior written permission. 15 * 16 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 17 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 18 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 19 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 20 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 21 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 22 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 23 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 24 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 25 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 26 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 27 * 28 * Authors: Ali Saidi 29 */ 30 31/** @file 32 * Declaration of a fake device. 33 */ 34 35#ifndef __ISA_FAKE_HH__ 36#define __ISA_FAKE_HH__ 37 38#include "base/range.hh" 39#include "dev/io_device.hh" 40#include "dev/alpha/tsunami.hh" 41#include "mem/packet.hh" 42 43#include <string> 44 45/** 46 * IsaFake is a device that returns, BadAddr, 1 or 0 on all reads and 47 * rites. It is meant to be placed at an address range 48 * so that an mcheck doesn't occur when an os probes a piece of hw 49 * that doesn't exist (e.g. UARTs1-3), or catch requests in the memory system 50 * that have no responders.. 51 */ 52class IsaFake : public BasicPioDevice 53{ 54 public: 55 struct Params : public BasicPioDevice::Params 56 { 57 Addr pio_size; 58 bool retBadAddr; 59 bool updateData; 60 uint8_t retData8; 61 uint16_t retData16; 62 uint32_t retData32; 63 uint64_t retData64; 64 std::string warnAccess; 65 }; 66 protected: 67 const Params *params() const { return (const Params*)_params; } 68 uint8_t retData8; 69 uint16_t retData16; 70 uint32_t retData32; 71 uint64_t retData64; 72 73 74 public: 75 /** 76 * The constructor for Tsunmami Fake just registers itself with the MMU. 77 * @param p params structure 78 */ 79 IsaFake(Params *p); 80 81 /** 82 * This read always returns -1. 83 * @param pkt The memory request. 84 * @param data Where to put the data. 85 */ 86 virtual Tick read(PacketPtr pkt); 87 88 /** 89 * All writes are simply ignored. 90 * @param pkt The memory request. 91 * @param data the data to not write. 92 */ 93 virtual Tick write(PacketPtr pkt); 94}; 95 96#endif // __ISA_FAKE_HH__ 97