ROM write access for debugging (Jan Kiszka)
Enhance cpu_memory_rw_debug so that it can write even to ROM regions. This allows to modify ROM via gdb (I see no point in denying this to the user), and it will enable us to drop kvm_patch_opcode_byte(). Credits go to Avi for suggesting this. Signed-off-by: Jan Kiszka <jan.kiszka@siemens.com> Signed-off-by: Anthony Liguori <aliguori@us.ibm.com> git-svn-id: svn://svn.savannah.nongnu.org/qemu/trunk@6905 c046a42c-6fe2-441c-8c8c-71466251a162
This commit is contained in:
parent
26b258e138
commit
5e2972fdab
11
exec.c
11
exec.c
@ -3448,7 +3448,7 @@ void stq_phys(target_phys_addr_t addr, uint64_t val)
|
||||
|
||||
#endif
|
||||
|
||||
/* virtual memory access for debug */
|
||||
/* virtual memory access for debug (includes writing to ROM) */
|
||||
int cpu_memory_rw_debug(CPUState *env, target_ulong addr,
|
||||
uint8_t *buf, int len, int is_write)
|
||||
{
|
||||
@ -3465,8 +3465,13 @@ int cpu_memory_rw_debug(CPUState *env, target_ulong addr,
|
||||
l = (page + TARGET_PAGE_SIZE) - addr;
|
||||
if (l > len)
|
||||
l = len;
|
||||
cpu_physical_memory_rw(phys_addr + (addr & ~TARGET_PAGE_MASK),
|
||||
buf, l, is_write);
|
||||
phys_addr += (addr & ~TARGET_PAGE_MASK);
|
||||
#if !defined(CONFIG_USER_ONLY)
|
||||
if (is_write)
|
||||
cpu_physical_memory_write_rom(phys_addr, buf, l);
|
||||
else
|
||||
#endif
|
||||
cpu_physical_memory_rw(phys_addr, buf, l, is_write);
|
||||
len -= l;
|
||||
buf += l;
|
||||
addr += l;
|
||||
|
Loading…
Reference in New Issue
Block a user