[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [xen-unstable] shadow: Remove warnings about writes to read-only BIOS area. These



# HG changeset patch
# User Keir Fraser <keir.fraser@xxxxxxxxxx>
# Date 1229953393 0
# Node ID b59db1f95d193f3bd04401cc22965035e1bd8dbf
# Parent  aa0fee8a6ef56dacca4fd6ef54851dad806cb5c5
shadow: Remove warnings about writes to read-only BIOS area. These
attempts can be legitimate.

Signed-off-by: Keir Fraser <keir.fraser@xxxxxxxxxx>
---
 xen/arch/x86/mm/shadow/multi.c |    9 +--------
 1 files changed, 1 insertion(+), 8 deletions(-)

diff -r aa0fee8a6ef5 -r b59db1f95d19 xen/arch/x86/mm/shadow/multi.c
--- a/xen/arch/x86/mm/shadow/multi.c    Mon Dec 22 12:07:20 2008 +0000
+++ b/xen/arch/x86/mm/shadow/multi.c    Mon Dec 22 13:43:13 2008 +0000
@@ -3228,16 +3228,9 @@ static int sh_page_fault(struct vcpu *v,
         goto mmio;
     }
 
-    /* Log attempts to write to read-only memory */
+    /* Ignore attempts to write to read-only memory. */
     if ( (p2mt == p2m_ram_ro) && (ft == ft_demand_write) )
-    {
-        static unsigned long lastpage = 0;
-        if ( xchg(&lastpage, va & PAGE_MASK) != (va & PAGE_MASK) )
-            gdprintk(XENLOG_DEBUG, "guest attempted write to read-only memory"
-                     " page. va page=%#lx, mfn=%#lx\n",
-                     va & PAGE_MASK, mfn_x(gmfn));
         goto emulate_readonly; /* skip over the instruction */
-    }
 
     /* In HVM guests, we force CR0.WP always to be set, so that the
      * pagetables are always write-protected.  If the guest thinks

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.