From 1f95053ea5f0845fd0416e91d8d3d92671ea6610 Mon Sep 17 00:00:00 2001 From: Keir Fraser Date: Mon, 22 Dec 2008 13:43:13 +0000 Subject: [PATCH] shadow: Remove warnings about writes to read-only BIOS area. These attempts can be legitimate. Signed-off-by: Keir Fraser --- xen/arch/x86/mm/shadow/multi.c | 9 +-------- 1 file changed, 1 insertion(+), 8 deletions(-) diff --git a/xen/arch/x86/mm/shadow/multi.c b/xen/arch/x86/mm/shadow/multi.c index 22529b4041..791669e6b6 100644 --- a/xen/arch/x86/mm/shadow/multi.c +++ b/xen/arch/x86/mm/shadow/multi.c @@ -3228,16 +3228,9 @@ static int sh_page_fault(struct vcpu *v, goto mmio; } - /* Log attempts to write to read-only memory */ + /* Ignore attempts to write to read-only memory. */ if ( (p2mt == p2m_ram_ro) && (ft == ft_demand_write) ) - { - static unsigned long lastpage = 0; - if ( xchg(&lastpage, va & PAGE_MASK) != (va & PAGE_MASK) ) - gdprintk(XENLOG_DEBUG, "guest attempted write to read-only memory" - " page. va page=%#lx, mfn=%#lx\n", - va & PAGE_MASK, mfn_x(gmfn)); goto emulate_readonly; /* skip over the instruction */ - } /* In HVM guests, we force CR0.WP always to be set, so that the * pagetables are always write-protected. If the guest thinks -- 2.30.2