target/ppc: Fix XER access in monitor
authorMatheus Ferst <matheus.ferst@eldorado.org.br>
Thu, 14 Oct 2021 22:32:34 +0000 (19:32 -0300)
committerDavid Gibson <david@gibson.dropbear.id.au>
Thu, 21 Oct 2021 00:42:47 +0000 (11:42 +1100)
commit3938cacdb2367c203fd796af3f8c70cdb70c5007
tree5961d702167dda98b45e2ea099f07e2e39591942
parent10de0521889d36633450e35b22f6a45ef856226d
target/ppc: Fix XER access in monitor

We can't read env->xer directly, as it does not contain some bits of
XER. Instead, we should have a callback that uses cpu_read_xer to read
the complete register.

Fixes: da91a00f191f ("target-ppc: Split out SO, OV, CA fields from XER")
Signed-off-by: Matheus Ferst <matheus.ferst@eldorado.org.br>
Message-Id: <20211014223234.127012-5-matheus.ferst@eldorado.org.br>
Reviewed-by: Richard Henderson <richard.henderson@linaro.org>
Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
target/ppc/monitor.c