From patchwork Wed Sep 8 18:39:00 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ryan Grimm X-Patchwork-Id: 1525987 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256 header.s=pp1 header.b=BYlzbzec; dkim-atps=neutral Authentication-Results: ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org (client-ip=2404:9400:2:0:216:3eff:fee1:b9f1; helo=lists.ozlabs.org; envelope-from=skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org; receiver=) Received: from lists.ozlabs.org (lists.ozlabs.org [IPv6:2404:9400:2:0:216:3eff:fee1:b9f1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 4H4WBW6nwpz9sVw for ; Thu, 9 Sep 2021 04:39:15 +1000 (AEST) Received: from boromir.ozlabs.org (localhost [IPv6:::1]) by lists.ozlabs.org (Postfix) with ESMTP id 4H4WBW4wY9z2yHp for ; Thu, 9 Sep 2021 04:39:15 +1000 (AEST) Authentication-Results: lists.ozlabs.org; dkim=fail reason="signature verification failed" (2048-bit key; unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256 header.s=pp1 header.b=BYlzbzec; dkim-atps=neutral X-Original-To: skiboot@lists.ozlabs.org Delivered-To: skiboot@lists.ozlabs.org Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=linux.ibm.com (client-ip=148.163.156.1; helo=mx0a-001b2d01.pphosted.com; envelope-from=grimm@linux.ibm.com; receiver=) Authentication-Results: lists.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256 header.s=pp1 header.b=BYlzbzec; dkim-atps=neutral Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4H4WBQ6LH0z2xY5 for ; Thu, 9 Sep 2021 04:39:10 +1000 (AEST) Received: from pps.filterd (m0098404.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 188IWtgM164718 for ; Wed, 8 Sep 2021 14:39:08 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=from : to : cc : subject : date : message-id : mime-version : content-transfer-encoding; s=pp1; bh=XG1eYu6crUcSNPpN4rSf0x+Qa/h6HaOCxcwAv6eqZ7A=; b=BYlzbzecdoU7QoSEa7HEuXSfYzMF4jeyvlXezv6UAbbUrnlHwtN/bY5LUpUf8cXgpOiC zVN39+zfz/gWpXy8siHepSyZr4ckAgjAGsge+Tln56kbwo7LClOxJ7gXBQxDuPh5nXFk Xrp6UKfBYcFaB0vaV9/z52Kb9S4cnmJHg9ZmKMH6wq7jRrcjehHIs4AdPcUWIBe3PMkI u3HQZVXwQ4+p70t9H8up7qT/iaTqrqTzBRz2SAIYH46nOM+9uGDi4RTyx3ic4+5CMf3D NIv1GkcuBrTTknJlQvLX8R+cpJ6XJs2qyKrLROr8JqSP4nbZ3MAyW1aw4/BjpM0cGbD/ 2w== Received: from ppma04wdc.us.ibm.com (1a.90.2fa9.ip4.static.sl-reverse.com [169.47.144.26]) by mx0a-001b2d01.pphosted.com with ESMTP id 3ay14ta79w-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 08 Sep 2021 14:39:07 -0400 Received: from pps.filterd (ppma04wdc.us.ibm.com [127.0.0.1]) by ppma04wdc.us.ibm.com (8.16.1.2/8.16.1.2) with SMTP id 188IXLCw016925 for ; Wed, 8 Sep 2021 18:39:06 GMT Received: from b03cxnp07028.gho.boulder.ibm.com (b03cxnp07028.gho.boulder.ibm.com [9.17.130.15]) by ppma04wdc.us.ibm.com with ESMTP id 3axcnqjpmp-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for ; Wed, 08 Sep 2021 18:39:06 +0000 Received: from b03ledav005.gho.boulder.ibm.com (b03ledav005.gho.boulder.ibm.com [9.17.130.236]) by b03cxnp07028.gho.boulder.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 188Id5af48496928 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 8 Sep 2021 18:39:05 GMT Received: from b03ledav005.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 7B247BE06A; Wed, 8 Sep 2021 18:39:05 +0000 (GMT) Received: from b03ledav005.gho.boulder.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 46F92BE05A; Wed, 8 Sep 2021 18:39:05 +0000 (GMT) Received: from bml86.aus.stglabs.ibm.com (unknown [9.3.136.162]) by b03ledav005.gho.boulder.ibm.com (Postfix) with ESMTP; Wed, 8 Sep 2021 18:39:05 +0000 (GMT) From: Ryan Grimm To: skiboot@lists.ozlabs.org Date: Wed, 8 Sep 2021 13:39:00 -0500 Message-Id: <20210908183901.3773783-1-grimm@linux.ibm.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 X-TM-AS-GCONF: 00 X-Proofpoint-ORIG-GUID: tqabd223W9mm8Qo9TfBMoJs7VPS-S8j7 X-Proofpoint-GUID: tqabd223W9mm8Qo9TfBMoJs7VPS-S8j7 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.391, 18.0.790 definitions=2021-09-08_06:2021-09-07, 2021-09-08 signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 priorityscore=1501 lowpriorityscore=0 phishscore=0 impostorscore=0 suspectscore=0 mlxlogscore=704 clxscore=1015 adultscore=0 malwarescore=0 bulkscore=0 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2109030001 definitions=main-2109080116 Subject: [Skiboot] [RFC PATCH 0/1] AWAN HACK to flush console X-BeenThere: skiboot@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Mailing list for skiboot development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Ryan Grimm Errors-To: skiboot-bounces+incoming=patchwork.ozlabs.org@lists.ozlabs.org Sender: "Skiboot" I encountered an AWAN environment where the tools for reading caches were broken. Normally, we'd use this tool to access caches directly for the inmem console. We do have a tool that can read the DIMMs so I hacked this up and it actually worked. Just sharing b/c it might be useful if we encounter this again. Does the hack look like it is working as intended? Do I need to worry about a sync? Also, I tried to handle console wrapping with the ugly calculation (total_cache_lines % (INMEM_CON_LEN / 128)) * 128 but it's difficult to test. Ryan Grimm (1): AWAN CHIP HACK: Flush console buffer to memory core/console.c | 17 +++++++++++++++++ 1 file changed, 17 insertions(+)