Hi, Trying to boot domain0 in translated shadow mode doesn''t work, looks like the audit code doesn''t like that: (XEN) CPU: 0 (XEN) EIP: e008:[<ff129808>] __context_switch+0x36/0x25d (XEN) EFLAGS: 00010286 CONTEXT: hypervisor (XEN) eax: 00000000 ebx: 00000000 ecx: 00000005 edx: ff103fb4 (XEN) esi: 00fa5044 edi: ff1f6c80 ebp: ff10397c esp: ff103924 (XEN) cr0: 8005003b cr3: 00104000 (XEN) ds: e010 es: e010 fs: e010 gs: e010 ss: e010 cs: e008 (XEN) Xen stack trace from esp=ff103924: (XEN) 000003fd 00000000 ff10394c ff120fe9 ff19bde0 00000005 00000045 00000000 (XEN) 00000000 00000000 ff10396c ff119742 ffbf0080 00000000 ff10396c ff120ea3 (XEN) ff182080 00000000 00000000 ff103fb4 ff195080 ff103fb4 ff10399c ff129b5b (XEN) 00000000 ffbf1394 ff1039ac ff109e5f ffbf0080 ffbf1080 ff1039ac ff129c00 (XEN) ff1a2e80 00000000 ff103a0c ff124bca ffbf1080 ffbf1080 00000000 00000000 (XEN) 00fa5044 ff1f6c80 ff103a0c ff181338 00490000 ff120494 0000e008 00000286 (XEN) ff181338 0000000a ff17fe71 ff103a18 fec01000 00000000 00000286 00000000 (XEN) ff197507 00000000 ff103a5c ff15ac19 ffbf1080 00000003 00000100 ff11fe55 (XEN) 00000086 ff181400 00000000 ff120ce6 ff1f6c80 00000000 ff1f6080 00000c00 (XEN) 00000000 ff1f6080 00000013 00000000 ff1fe000 c059c424 ff103a7c ff15ae3e (XEN) ffbf1080 00000013 00000282 00000000 00000000 ff103a88 ff103bcc ff12d0e3 (XEN) ffbf1080 00000013 c059e000 c059c000 c0519000 c0519000 c0599000 c0599000 (XEN) c059c000 c059c000 c059d000 c059d000 c059e000 c0000000 c0800000 ff13a1fe (XEN) ff1f8000 000001f8 00000000 00000013 00000000 00000000 00000000 00010063 (XEN) 00001000 00000000 ff103b0c c059c424 c059c024 00000000 00000400 c059c000 (XEN) ff103b44 c059c024 10599000 00000000 1059c000 c0800000 c059c000 c0599000 (XEN) c059e000 c059d000 c059d000 c059c000 c0599000 c0519000 c0519000 c0519000 (XEN) 00c00000 003a5044 c0000000 c05188c4 c0100000 c05188c4 c0100000 00000000 (XEN) 00000000 00000000 00fa49ba ffbf0e00 1059b000 1059b670 10599000 10599c04 (XEN) 00000000 00c00000 ffbf0080 c059c000 fc880000 00000003 20000000 10000000 (XEN) Xen call trace from esp=ff103924: (XEN) [<ff120fe9>] ns16550_getc+0x22/0x5b (XEN) [<ff119742>] sedf_sleep+0xc8/0xe1 (XEN) [<ff120ea3>] ns_read_reg+0x27/0x46 (XEN) [<ff129b5b>] __sync_lazy_execstate+0x34/0x54 (XEN) [<ff109e5f>] domain_pause+0x65/0x72 (XEN) [<ff129c00>] sync_lazy_execstate_all+0xb/0x22 (XEN) (XEN) [<ff124bca>] _audit_domain+0x79/0x8b3 (XEN) [<ff120494>] printf+0xeb/0xed (XEN) [<ff15ac19>] __shadow_mode_enable+0x71b/0x8e1 (XEN) [<ff11fe55>] putchar_console+0x1c/0x7d (XEN) [<ff120ce6>] __putstr+0x45/0x49 (XEN) [<ff15ae3e>] shadow_mode_enable+0x5f/0xf7 (XEN) (XEN) [<ff12d0e3>] construct_dom0+0x1c3a/0x1d9e (XEN) [<ff13a1fe>] __memguard_change_range+0x1a1/0x1a3 (XEN) [<ff16aba4>] __start_xen+0x94f/0x9c5 btw: the new stack trace is a big step forward ;) real call trace is this: => construct_dom0 => shadow_mode_enable => __shadow_mode_enable => _audit_domain => sync_lazy_execstate_all => __sync_lazy_execstate => __context_switch Ideas anyone? Gerd _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel