Package: src:xen Version: 4.17.0+46-gaaf74a532c-1 Severity: important Two major bugs have shown with the release of new hardware from AMD. Since the new hardware is likely to become common during the life of Debian/bookworm, you may wish to grab them early:
ad15a0a8ca2515d8ac58edfc0bc1d3719219cb77 x86/time: prevent overflow with high frequency TSCs Turns out the latest generation is fast enough to cause overflows. I haven't found a patch for the other one yet. There is some issue with the latest generation which needs "x2apic=false" on Xen's command-line in order to get interrupts to domain 0. I'm guessing the latest from AMD broke the PIC emulation. If this isn't actually patched yet, I suspect it soon will be. I haven't observed anything on xen-devel, so perhaps the workaround was found too quickly to get noticed as urgent. Now to continuing the work on figuring out the consequences from upgrading hardware a bit too early... -- (\___(\___(\______ --=> 8-) EHM <=-- ______/)___/)___/) \BS ( | ehem+sig...@m5p.com PGP 87145445 | ) / \_CS\ | _____ -O #include <stddisclaimer.h> O- _____ | / _/ 8A19\___\_|_/58D2 7E3D DDF4 7BA6 <-PGP-> 41D1 B375 37D0 8714\_|_/___/5445