From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=unavailable autolearn_force=no version=3.4.4 Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail From: "Jeffrey R. Carter" Newsgroups: comp.lang.ada Subject: Re: Getting started with bare-board development Date: Sun, 13 Nov 2016 14:04:59 -0700 Organization: Also freenews.netfront.net; news.tornevall.net; news.eternal-september.org Message-ID: References: Mime-Version: 1.0 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Injection-Date: Sun, 13 Nov 2016 21:04:33 -0000 (UTC) Injection-Info: mx02.eternal-september.org; posting-host="09e61aea82dc7fb95595da9aad5c117c"; logging-data="16164"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19ZO3OmdGStGI1DquhVDC2hmXqvwmvxdD4=" User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0 In-Reply-To: Cancel-Lock: sha1:LL3dbiqh122+aYXDrQXFtL1BshM= Xref: news.eternal-september.org comp.lang.ada:32300 Date: 2016-11-13T14:04:59-07:00 List-Id: On 11/13/2016 01:03 PM, Adam Jensen wrote: > > When writing device drivers, how do you mock the memory map of the > target hardware? > > In the mocked the hardware, how is timing controlled? > > When extending and mapping run-time support to the mocked hardware, how > does that fit into the run-time system for the native platform (your > workstation)? You seem to be thinking at too low a level. There isn't any "mocked H/W", only mocked behavior. The H/W simulation bodies give the information or have the effect expected of the devices given the state of the reality modeled in the environment pkg, but they need have no similarity to the real bodies, and usually don't. The device may be memory mapped, but there's no reason for the simulation to be. If access the device takes appreciable time, that's usually simulated using a delay. There's usually no reason to limit these parts of the S/W to the constraints of the target run time. -- Jeff Carter "Beyond 100,000 lines of code you should probably be coding in Ada." P. J. Plauger 26