On 04/15/2012 12:42 PM, Jens Kasten wrote: > Hi list, > > I use the PAX patch in the kernel 3.2.14. > My qemu-kvm guest running on a gentoo hardend as host. > When I try to start my kvm guest I get: > > > PAX: size overflow detected in function wrmsr_interception > arch/x86/kvm/svm.c:3115 > Pid: 3565, comm: kvm_webserver Not tainted 3.2.14-rsbac-2.57-sec #5 > Call Trace: > [<ffffffff8115a407>] ? 0xffffffff8115a407 > [<ffffffff810344f4>] ? 0xffffffff810344f4 > [<ffffffff81032fd0>] ? 0xffffffff81032fd0 > [<ffffffff81016f3c>] ? 0xffffffff81016f3c > [<ffffffff8102f215>] ? 0xffffffff8102f215 > [<ffffffff810019c2>] ? 0xffffffff810019c2 > [<ffffffff8116965b>] ? 0xffffffff8116965b > [<ffffffff81169f3b>] ? 0xffffffff81169f3b > [<ffffffff8116a60b>] ? 0xffffffff8116a60b > [<ffffffff81542226>] ? 0xffffffff81542226 > [<ffffffff8154224d>] ? 0xffffffff8154224d > Out of tree patches are not supported. But if you provided a decoded trace (with symbols instead of numbers), maybe we can learn something. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html