Quieten down MSR access warnings.
authorkaf24@firebug.cl.cam.ac.uk <kaf24@firebug.cl.cam.ac.uk>
Fri, 24 Feb 2006 18:16:15 +0000 (19:16 +0100)
committerkaf24@firebug.cl.cam.ac.uk <kaf24@firebug.cl.cam.ac.uk>
Fri, 24 Feb 2006 18:16:15 +0000 (19:16 +0100)
Signed-off-by: Keir Fraser <keir@xensource.com>
xen/arch/x86/traps.c

index d331d7d72a6c95c24874f415b11fc926b9024fd5..109c9fd5161a584d3ebbd3b073fa2908bf0bebc6 100644 (file)
@@ -1002,7 +1002,6 @@ static int emulate_privileged_op(struct cpu_user_regs *regs)
 #endif
         default:
             if ( (rdmsr_safe(regs->ecx, l, h) != 0) ||
-                 (regs->ecx != MSR_EFER) ||
                  (regs->eax != l) || (regs->edx != h) )
                 DPRINTK("Domain attempted WRMSR %p from "
                         "%08x:%08x to %08lx:%08lx.\n",
@@ -1033,8 +1032,8 @@ static int emulate_privileged_op(struct cpu_user_regs *regs)
                 goto fail;
             break;
         default:
-            DPRINTK("Domain attempted RDMSR %p.\n", _p(regs->ecx));
             /* Everyone can read the MSR space. */
+            /*DPRINTK("Domain attempted RDMSR %p.\n", _p(regs->ecx));*/
             if ( rdmsr_safe(regs->ecx, regs->eax, regs->edx) )
                 goto fail;
             break;