ia64/xen-unstable
changeset 18950:b59db1f95d19
shadow: Remove warnings about writes to read-only BIOS area. These
attempts can be legitimate.
Signed-off-by: Keir Fraser <keir.fraser@citrix.com>
attempts can be legitimate.
Signed-off-by: Keir Fraser <keir.fraser@citrix.com>
author | Keir Fraser <keir.fraser@citrix.com> |
---|---|
date | Mon Dec 22 13:43:13 2008 +0000 (2008-12-22) |
parents | aa0fee8a6ef5 |
children | e2f36d066b7b |
files | xen/arch/x86/mm/shadow/multi.c |
line diff
1.1 --- a/xen/arch/x86/mm/shadow/multi.c Mon Dec 22 12:07:20 2008 +0000 1.2 +++ b/xen/arch/x86/mm/shadow/multi.c Mon Dec 22 13:43:13 2008 +0000 1.3 @@ -3228,16 +3228,9 @@ static int sh_page_fault(struct vcpu *v, 1.4 goto mmio; 1.5 } 1.6 1.7 - /* Log attempts to write to read-only memory */ 1.8 + /* Ignore attempts to write to read-only memory. */ 1.9 if ( (p2mt == p2m_ram_ro) && (ft == ft_demand_write) ) 1.10 - { 1.11 - static unsigned long lastpage = 0; 1.12 - if ( xchg(&lastpage, va & PAGE_MASK) != (va & PAGE_MASK) ) 1.13 - gdprintk(XENLOG_DEBUG, "guest attempted write to read-only memory" 1.14 - " page. va page=%#lx, mfn=%#lx\n", 1.15 - va & PAGE_MASK, mfn_x(gmfn)); 1.16 goto emulate_readonly; /* skip over the instruction */ 1.17 - } 1.18 1.19 /* In HVM guests, we force CR0.WP always to be set, so that the 1.20 * pagetables are always write-protected. If the guest thinks