From 7258ce4242b37a2cc39c9cc1a51bf735aac7becb Mon Sep 17 00:00:00 2001 From: "kaf24@firebug.cl.cam.ac.uk" Date: Fri, 24 Feb 2006 19:16:15 +0100 Subject: [PATCH] Quieten down MSR access warnings. Signed-off-by: Keir Fraser --- xen/arch/x86/traps.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c index d331d7d72a..109c9fd516 100644 --- a/xen/arch/x86/traps.c +++ b/xen/arch/x86/traps.c @@ -1002,7 +1002,6 @@ static int emulate_privileged_op(struct cpu_user_regs *regs) #endif default: if ( (rdmsr_safe(regs->ecx, l, h) != 0) || - (regs->ecx != MSR_EFER) || (regs->eax != l) || (regs->edx != h) ) DPRINTK("Domain attempted WRMSR %p from " "%08x:%08x to %08lx:%08lx.\n", @@ -1033,8 +1032,8 @@ static int emulate_privileged_op(struct cpu_user_regs *regs) goto fail; break; default: - DPRINTK("Domain attempted RDMSR %p.\n", _p(regs->ecx)); /* Everyone can read the MSR space. */ + /*DPRINTK("Domain attempted RDMSR %p.\n", _p(regs->ecx));*/ if ( rdmsr_safe(regs->ecx, regs->eax, regs->edx) ) goto fail; break; -- 2.30.2