Hi list,
I use the PAX patch in the kernel 3.2.14.
My qemu-kvm guest running on a gentoo hardend as host.
When I try to start my kvm guest I get:
PAX: size overflow detected in function wrmsr_interception
arch/x86/kvm/svm.c:3115
Pid: 3565, comm: kvm_webserver Not tainted 3.2.14-rsbac-2.57-sec #5
Call Trace:
[<ffffffff8115a407>] ? 0xffffffff8115a407
[<ffffffff810344f4>] ? 0xffffffff810344f4
[<ffffffff81032fd0>] ? 0xffffffff81032fd0
[<ffffffff81016f3c>] ? 0xffffffff81016f3c
[<ffffffff8102f215>] ? 0xffffffff8102f215
[<ffffffff810019c2>] ? 0xffffffff810019c2
[<ffffffff8116965b>] ? 0xffffffff8116965b
[<ffffffff81169f3b>] ? 0xffffffff81169f3b
[<ffffffff8116a60b>] ? 0xffffffff8116a60b
[<ffffffff81542226>] ? 0xffffffff81542226
[<ffffffff8154224d>] ? 0xffffffff8154224d
--
Mit freundlchen Grüßen
Jerns Kasten
http://www.kasten-edv.de
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html