WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] dom0 shadow & audit

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] dom0 shadow & audit
From: Gerd Knorr <kraxel@xxxxxxx>
Date: Thu, 28 Jul 2005 17:40:18 +0200
Delivery-date: Thu, 28 Jul 2005 15:43:29 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Mutt/1.5.9i
  Hi,

Trying to boot domain0 in translated shadow mode doesn't work,
looks like the audit code doesn't like that:

(XEN) CPU:    0
(XEN) EIP:    e008:[<ff129808>] __context_switch+0x36/0x25d
(XEN) EFLAGS: 00010286   CONTEXT: hypervisor
(XEN) eax: 00000000   ebx: 00000000   ecx: 00000005   edx: ff103fb4
(XEN) esi: 00fa5044   edi: ff1f6c80   ebp: ff10397c   esp: ff103924
(XEN) cr0: 8005003b   cr3: 00104000
(XEN) ds: e010   es: e010   fs: e010   gs: e010   ss: e010   cs: e008
(XEN) Xen stack trace from esp=ff103924:
(XEN)    000003fd 00000000 ff10394c ff120fe9 ff19bde0 00000005 00000045 
00000000 
(XEN)    00000000 00000000 ff10396c ff119742 ffbf0080 00000000 ff10396c 
ff120ea3 
(XEN)    ff182080 00000000 00000000 ff103fb4 ff195080 ff103fb4 ff10399c 
ff129b5b 
(XEN)    00000000 ffbf1394 ff1039ac ff109e5f ffbf0080 ffbf1080 ff1039ac 
ff129c00 
(XEN)    ff1a2e80 00000000 ff103a0c ff124bca ffbf1080 ffbf1080 00000000 
00000000 
(XEN)    00fa5044 ff1f6c80 ff103a0c ff181338 00490000 ff120494 0000e008 
00000286 
(XEN)    ff181338 0000000a ff17fe71 ff103a18 fec01000 00000000 00000286 
00000000 
(XEN)    ff197507 00000000 ff103a5c ff15ac19 ffbf1080 00000003 00000100 
ff11fe55 
(XEN)    00000086 ff181400 00000000 ff120ce6 ff1f6c80 00000000 ff1f6080 
00000c00 
(XEN)    00000000 ff1f6080 00000013 00000000 ff1fe000 c059c424 ff103a7c 
ff15ae3e 
(XEN)    ffbf1080 00000013 00000282 00000000 00000000 ff103a88 ff103bcc 
ff12d0e3 
(XEN)    ffbf1080 00000013 c059e000 c059c000 c0519000 c0519000 c0599000 
c0599000 
(XEN)    c059c000 c059c000 c059d000 c059d000 c059e000 c0000000 c0800000 
ff13a1fe 
(XEN)    ff1f8000 000001f8 00000000 00000013 00000000 00000000 00000000 
00010063 
(XEN)    00001000 00000000 ff103b0c c059c424 c059c024 00000000 00000400 
c059c000 
(XEN)    ff103b44 c059c024 10599000 00000000 1059c000 c0800000 c059c000 
c0599000 
(XEN)    c059e000 c059d000 c059d000 c059c000 c0599000 c0519000 c0519000 
c0519000 
(XEN)    00c00000 003a5044 c0000000 c05188c4 c0100000 c05188c4 c0100000 
00000000 
(XEN)    00000000 00000000 00fa49ba ffbf0e00 1059b000 1059b670 10599000 
10599c04 
(XEN)    00000000 00c00000 ffbf0080 c059c000 fc880000 00000003 20000000 
10000000 
(XEN) Xen call trace from esp=ff103924:
(XEN)    [<ff120fe9>] ns16550_getc+0x22/0x5b
(XEN) [<ff119742>] sedf_sleep+0xc8/0xe1
(XEN) [<ff120ea3>] ns_read_reg+0x27/0x46
(XEN) [<ff129b5b>] __sync_lazy_execstate+0x34/0x54
(XEN) [<ff109e5f>] domain_pause+0x65/0x72
(XEN) [<ff129c00>] sync_lazy_execstate_all+0xb/0x22
(XEN) 
(XEN)    [<ff124bca>] _audit_domain+0x79/0x8b3
(XEN) [<ff120494>] printf+0xeb/0xed
(XEN) [<ff15ac19>] __shadow_mode_enable+0x71b/0x8e1
(XEN) [<ff11fe55>] putchar_console+0x1c/0x7d
(XEN) [<ff120ce6>] __putstr+0x45/0x49
(XEN) [<ff15ae3e>] shadow_mode_enable+0x5f/0xf7
(XEN) 
(XEN)    [<ff12d0e3>] construct_dom0+0x1c3a/0x1d9e
(XEN) [<ff13a1fe>] __memguard_change_range+0x1a1/0x1a3
(XEN) [<ff16aba4>] __start_xen+0x94f/0x9c5

btw: the new stack trace is a big step forward ;)
real call trace is this:

=> construct_dom0
 => shadow_mode_enable
  => __shadow_mode_enable
   => _audit_domain
    => sync_lazy_execstate_all
     => __sync_lazy_execstate
      => __context_switch

Ideas anyone?

  Gerd


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-devel] dom0 shadow & audit, Gerd Knorr <=