From: Keir Fraser Date: Mon, 22 Dec 2008 13:43:13 +0000 (+0000) Subject: shadow: Remove warnings about writes to read-only BIOS area. These X-Git-Tag: archive/raspbian/4.8.0-1+rpi1~1^2~14026^2~1 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=1f95053ea5f0845fd0416e91d8d3d92671ea6610;p=xen.git shadow: Remove warnings about writes to read-only BIOS area. These attempts can be legitimate. Signed-off-by: Keir Fraser --- diff --git a/xen/arch/x86/mm/shadow/multi.c b/xen/arch/x86/mm/shadow/multi.c index 22529b4041..791669e6b6 100644 --- a/xen/arch/x86/mm/shadow/multi.c +++ b/xen/arch/x86/mm/shadow/multi.c @@ -3228,16 +3228,9 @@ static int sh_page_fault(struct vcpu *v, goto mmio; } - /* Log attempts to write to read-only memory */ + /* Ignore attempts to write to read-only memory. */ if ( (p2mt == p2m_ram_ro) && (ft == ft_demand_write) ) - { - static unsigned long lastpage = 0; - if ( xchg(&lastpage, va & PAGE_MASK) != (va & PAGE_MASK) ) - gdprintk(XENLOG_DEBUG, "guest attempted write to read-only memory" - " page. va page=%#lx, mfn=%#lx\n", - va & PAGE_MASK, mfn_x(gmfn)); goto emulate_readonly; /* skip over the instruction */ - } /* In HVM guests, we force CR0.WP always to be set, so that the * pagetables are always write-protected. If the guest thinks