[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen-unstable] shadow: Remove warnings about writes to read-only BIOS area. These
# HG changeset patch # User Keir Fraser <keir.fraser@xxxxxxxxxx> # Date 1229953393 0 # Node ID b59db1f95d193f3bd04401cc22965035e1bd8dbf # Parent aa0fee8a6ef56dacca4fd6ef54851dad806cb5c5 shadow: Remove warnings about writes to read-only BIOS area. These attempts can be legitimate. Signed-off-by: Keir Fraser <keir.fraser@xxxxxxxxxx> --- xen/arch/x86/mm/shadow/multi.c | 9 +-------- 1 files changed, 1 insertion(+), 8 deletions(-) diff -r aa0fee8a6ef5 -r b59db1f95d19 xen/arch/x86/mm/shadow/multi.c --- a/xen/arch/x86/mm/shadow/multi.c Mon Dec 22 12:07:20 2008 +0000 +++ b/xen/arch/x86/mm/shadow/multi.c Mon Dec 22 13:43:13 2008 +0000 @@ -3228,16 +3228,9 @@ static int sh_page_fault(struct vcpu *v, goto mmio; } - /* Log attempts to write to read-only memory */ + /* Ignore attempts to write to read-only memory. */ if ( (p2mt == p2m_ram_ro) && (ft == ft_demand_write) ) - { - static unsigned long lastpage = 0; - if ( xchg(&lastpage, va & PAGE_MASK) != (va & PAGE_MASK) ) - gdprintk(XENLOG_DEBUG, "guest attempted write to read-only memory" - " page. va page=%#lx, mfn=%#lx\n", - va & PAGE_MASK, mfn_x(gmfn)); goto emulate_readonly; /* skip over the instruction */ - } /* In HVM guests, we force CR0.WP always to be set, so that the * pagetables are always write-protected. If the guest thinks _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |