One further step finally. Using 'on_crash = "coredump-destroy"' and after creating /var/xen/dump, I was able to extract the following from the dump file:
<6>[ 0.000000] ACPI in unprivileged domain disabled <3>[ 0.000000] max_pfn used = 26700(26700000) <3>[ 0.000000] Xen: map base 0 + 26f00000 <3>[ 0.000000] Xen: map end = 26f00000 <3>[ 0.000000] map size reduzed to 26700000 <3>[ 0.000000] delta = 800000, extra_pages = 2048 <3>[ 0.000000] extra_mem_start = 26700000 <3>[ 0.000000] Xen: reserve c166f000c15d2000 - 800 <6>[ 0.000000] released 0 pages of unused memory <3>[ 0.000000] Xen: extra_limit = 159488 <3>[ 0.000000] Xen: adding 2048 extra pages at 644874240 <6>[ 0.000000] BIOS-provided physical RAM map: <6>[ 0.000000] Xen: 0000000000000000 - 00000000000a0000 (usable) <6>[ 0.000000] Xen: 00000000000a0000 - 0000000000100000 (reserved) <6>[ 0.000000] Xen: 0000000000100000 - 0000000026f00000 (usable) <6>[ 0.000000] NX (Execute Disable) protection: active <6>[ 0.000000] DMI not present or invalid. <7>[ 0.000000] e820 update range: 0000000000000000 - 0000000000010000 (usable ) ==> (reserved) <7>[ 0.000000] e820 remove range: 00000000000a0000 - 0000000000100000 (usable) <6>[ 0.000000] last_pfn = 0x26f00 max_arch_pfn = 0x1000000 <6>[ 0.000000] Scanning 0 areas for low memory corruption <7>[ 0.000000] initial memory mapped : 0 - 01fff000 <6>[ 0.000000] init_memory_mapping: 0000000000000000-0000000026f00000 <7>[ 0.000000] 0000000000 - 0026f00000 page 4k <7>[ 0.000000] kernel direct mapping tables up to 26f00000 @ 1ec4000-1fff000 <1>[ 0.000000] BUG: unable to handle kernel NULL pointer dereference at (null) <1>[ 0.000000] IP: [<c0107397>] xen_set_pte+0x27/0x60 <4>[ 0.000000] *pdpt = 0000000000000000 *pde = 0000000000000000 <0>[ 0.000000] Oops: 0003 [#1] SMP <0>[ 0.000000] last sysfs file: <4>[ 0.000000] Modules linked in: <4>[ 0.000000] <4>[ 0.000000] Pid: 0, comm: swapper Not tainted 2.6.37-12-virtual #26+lp686692v3 / <4>[ 0.000000] EIP: e019:[<c0107397>] EFLAGS: 00010046 CPU: 0 <4>[ 0.000000] EIP is at xen_set_pte+0x27/0x60 <4>[ 0.000000] EAX: 00000000 EBX: c1fe7800 ECX: 00000000 EDX: c0848000 <4>[ 0.000000] ESI: 00000003 EDI: 00000000 EBP: c0849e14 ESP: c0849e04 <4>[ 0.000000] DS: e021 ES: e021 FS: 00d8 GS: 00e0 SS: e021 <0>[ 0.000000] Process swapper (pid: 0, ti=c0848000 task=c084f060 task.ti=c0848000) <0>[ 0.000000] Stack: <4>[ 0.000000] c1fe7800 c1fe7800 00000003 00000000 c0849e30 c08aa7ca 00000fff fffff003 <4>[ 0.000000] e6700000 00000000 00026700 c0849e38 c01362be c0849e8c c08b9961 c0849e64 <4>[ 0.000000] 46cf9ef8 00026701 c1fe7800 c0a3f998 00000133 00000100 00026f00 00000000 <0>[ 0.000000] Call Trace: <4>[ 0.000000] [<c08aa7ca>] ? xen_set_pte_init+0x6b/0x72 <4>[ 0.000000] [<c01362be>] ? set_pte+0xe/0x10 <4>[ 0.000000] [<c08b9961>] ? kernel_physical_mapping_init+0x1c9/0x291 <4>[ 0.000000] [<c06122b6>] ? init_memory_mapping+0x1e6/0x340 <4>[ 0.000000] [<c08ac037>] ? setup_arch+0x6ce/0x935 <4>[ 0.000000] [<c010798e>] ? __raw_callee_save_xen_restore_fl+0x6/0x8 <4>[ 0.000000] [<c08a6549>] ? start_kernel+0xba/0x356 <4>[ 0.000000] [<c08a60ed>] ? i386_start_kernel+0xdc/0xe4 <4>[ 0.000000] [<c08a9ab2>] ? xen_start_kernel+0x56b/0x573 <4>[ 0.000000] [<c0409095>] ? regulator_check_current_limit.clone.9+0x65/0xe0 <0>[ 0.000000] Code: 00 00 00 00 55 89 e5 83 ec 10 89 5d f4 89 75 f8 89 7d fc e8 e4 3b 00 00 f6 c6 04 89 c3 89 d6 89 cf 75 19 e8 2c e6 02 00 89 7b 04 <89> 33 8b 7d fc 8b 5d f4 8b 75 f8 89 ec 5d c3 66 90 c7 04 24 f1 <0>[ 0.000000] EIP: [<c0107397>] xen_set_pte+0x27/0x60 SS:ESP e021:c0849e04 <0>[ 0.000000] CR2: 0000000000000000 <4>[ 0.000000] ---[ end trace a7919e7f17c0a725 ]--- <0>[ 0.000000] Kernel panic - not syncing: Attempted to kill the idle task! -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/686692 Title: natty kernel does not boot on ec2 t1.micro -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs