|
|
|
|
|
|
|
|
|
|
xen-changelog
[Xen-changelog] [xen-unstable] shadow: Remove warnings about writes to r
# HG changeset patch
# User Keir Fraser <keir.fraser@xxxxxxxxxx>
# Date 1229953393 0
# Node ID b59db1f95d193f3bd04401cc22965035e1bd8dbf
# Parent aa0fee8a6ef56dacca4fd6ef54851dad806cb5c5
shadow: Remove warnings about writes to read-only BIOS area. These
attempts can be legitimate.
Signed-off-by: Keir Fraser <keir.fraser@xxxxxxxxxx>
---
xen/arch/x86/mm/shadow/multi.c | 9 +--------
1 files changed, 1 insertion(+), 8 deletions(-)
diff -r aa0fee8a6ef5 -r b59db1f95d19 xen/arch/x86/mm/shadow/multi.c
--- a/xen/arch/x86/mm/shadow/multi.c Mon Dec 22 12:07:20 2008 +0000
+++ b/xen/arch/x86/mm/shadow/multi.c Mon Dec 22 13:43:13 2008 +0000
@@ -3228,16 +3228,9 @@ static int sh_page_fault(struct vcpu *v,
goto mmio;
}
- /* Log attempts to write to read-only memory */
+ /* Ignore attempts to write to read-only memory. */
if ( (p2mt == p2m_ram_ro) && (ft == ft_demand_write) )
- {
- static unsigned long lastpage = 0;
- if ( xchg(&lastpage, va & PAGE_MASK) != (va & PAGE_MASK) )
- gdprintk(XENLOG_DEBUG, "guest attempted write to read-only memory"
- " page. va page=%#lx, mfn=%#lx\n",
- va & PAGE_MASK, mfn_x(gmfn));
goto emulate_readonly; /* skip over the instruction */
- }
/* In HVM guests, we force CR0.WP always to be set, so that the
* pagetables are always write-protected. If the guest thinks
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-changelog] [xen-unstable] shadow: Remove warnings about writes to read-only BIOS area. These,
Xen patchbot-unstable <=
|
|
|
|
|