Package: linux-2.6 Version: 2.6.30-3 Severity: important 2.6.30.1 broke the abbility to run on Xen. The same code is in Linus' tree. The domain crashs early.
The stack shows: - read_pci_config - early_init_amd This makes x86-detect-use-of-extended-apic-id-for-amd-cpus.patch suspect. Bastian | (XEN) traps.c:413:d375 Unhandled general protection fault fault/trap [#13] on VCPU 0 [ec=0000] | (XEN) domain_crash_sync called from entry.S | (XEN) Domain 375 (vcpu#0) crashed on cpu#1: | (XEN) ----[ Xen-3.2-1 x86_64 debug=n Not tainted ]---- | (XEN) CPU: 1 | (XEN) RIP: e033:[<ffffffff80401d6b>] | (XEN) RFLAGS: 0000000000000282 CONTEXT: guest | (XEN) rax: 000000008000c068 rbx: ffffffff80618a40 rcx: 0000000000000068 | (XEN) rdx: 0000000000000cf8 rsi: 000000000000c000 rdi: 0000000000000000 | (XEN) rbp: 0000000000000018 rsp: ffffffff80621eb0 r8: ffffffff80621efc | (XEN) r9: 00000000ffffffff r10: ffffffff80621ef8 r11: 00000000ffffffff | (XEN) r12: ffffffffffffffff r13: ffffffff80621fd8 r14: 0000002040404030 | (XEN) r15: 00000000015bb600 cr0: 000000008005003b cr4: 00000000000006f0 | (XEN) cr3: 00000002077be000 cr2: 000000204316b000 | (XEN) ds: 0000 es: 0000 fs: 0000 gs: 0000 ss: e02b cs: e033 | (XEN) Guest stack trace from rsp=ffffffff80621eb0: | (XEN) 0000000000000068 00000000ffffffff 0000000000000000 ffffffff80401d6b | (XEN) 000000010000e030 0000000000010082 ffffffff80621ef0 000000000000e02b | (XEN) ffffffff804aeb3a 0000000100000000 0000302800000000 ffffffff805bcb20 | (XEN) ffffffff80651552 0000000000000000 0000000000000000 0000000000fdfd88 | (XEN) ffffffff8064e47c 0000000001fb9000 ffffffff80545875 0000000000000800 | (XEN) 0000000000002c00 ffffffff81fb9000 ffffffff80650026 ffffffff805ca1c0 | (XEN) 0000000000000000 ffffffff8020cee1 ffffffff806808f0 0000000001db6000 | (XEN) 0000000000000000 0000000000fdfd88 ffffffffffffffff ffffffff8067dd30 | (XEN) 0000002040404030 00000000015bb600 ffffffff8064a96b 00000000007d98cc | (XEN) 0000000000fdfd88 0000000000004800 ffffffff81fce000 0000000000004800 | (XEN) 00000020431245f0 0000002040404030 ffffffff81db6000 ffffffff81db7000 | (XEN) ffffffff81db8000 ffffffff81db9000 ffffffff81dba000 ffffffff81dbb000 | (XEN) ffffffff81dbc000 ffffffff81dbd000 ffffffff81dbe000 ffffffff81dbf000 | (XEN) ffffffff81dc0000 ffffffff81dc1000 ffffffff81dc2000 ffffffff81dc3000 | (XEN) ffffffff81dc4000 ffffffff81dc5000 ffffffff81dc6000 ffffffff81dc7000 | (XEN) ffffffff81dc8000 ffffffff81dc9000 ffffffff81dca000 ffffffff81dcb000 | (XEN) ffffffff81dcc000 ffffffff81dcd000 ffffffff81dce000 ffffffff81dcf000 | (XEN) ffffffff81dd0000 ffffffff81dd1000 ffffffff81dd2000 ffffffff81dd3000 | (XEN) ffffffff81dd4000 ffffffff81dd5000 ffffffff81dd6000 ffffffff81dd7000 | (XEN) ffffffff81dd8000 ffffffff81dd9000 ffffffff81dda000 ffffffff81ddb000 -- Conquest is easy. Control is not. -- Kirk, "Mirror, Mirror", stardate unknown -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org