ia64/xen-unstable

changeset 18950:b59db1f95d19

shadow: Remove warnings about writes to read-only BIOS area. These
attempts can be legitimate.

Signed-off-by: Keir Fraser <keir.fraser@citrix.com>
author Keir Fraser <keir.fraser@citrix.com>
date Mon Dec 22 13:43:13 2008 +0000 (2008-12-22)
parents aa0fee8a6ef5
children e2f36d066b7b
files xen/arch/x86/mm/shadow/multi.c
line diff
     1.1 --- a/xen/arch/x86/mm/shadow/multi.c	Mon Dec 22 12:07:20 2008 +0000
     1.2 +++ b/xen/arch/x86/mm/shadow/multi.c	Mon Dec 22 13:43:13 2008 +0000
     1.3 @@ -3228,16 +3228,9 @@ static int sh_page_fault(struct vcpu *v,
     1.4          goto mmio;
     1.5      }
     1.6  
     1.7 -    /* Log attempts to write to read-only memory */
     1.8 +    /* Ignore attempts to write to read-only memory. */
     1.9      if ( (p2mt == p2m_ram_ro) && (ft == ft_demand_write) )
    1.10 -    {
    1.11 -        static unsigned long lastpage = 0;
    1.12 -        if ( xchg(&lastpage, va & PAGE_MASK) != (va & PAGE_MASK) )
    1.13 -            gdprintk(XENLOG_DEBUG, "guest attempted write to read-only memory"
    1.14 -                     " page. va page=%#lx, mfn=%#lx\n",
    1.15 -                     va & PAGE_MASK, mfn_x(gmfn));
    1.16          goto emulate_readonly; /* skip over the instruction */
    1.17 -    }
    1.18  
    1.19      /* In HVM guests, we force CR0.WP always to be set, so that the
    1.20       * pagetables are always write-protected.  If the guest thinks