Hi list, I use the PAX patch in the kernel 3.2.14. My qemu-kvm guest running on a gentoo hardend as host. When I try to start my kvm guest I get:
PAX: size overflow detected in function wrmsr_interception arch/x86/kvm/svm.c:3115
Pid: 3565, comm: kvm_webserver Not tainted 3.2.14-rsbac-2.57-sec #5 Call Trace: [<ffffffff8115a407>] ? 0xffffffff8115a407 [<ffffffff810344f4>] ? 0xffffffff810344f4 [<ffffffff81032fd0>] ? 0xffffffff81032fd0 [<ffffffff81016f3c>] ? 0xffffffff81016f3c [<ffffffff8102f215>] ? 0xffffffff8102f215 [<ffffffff810019c2>] ? 0xffffffff810019c2 [<ffffffff8116965b>] ? 0xffffffff8116965b [<ffffffff81169f3b>] ? 0xffffffff81169f3b [<ffffffff8116a60b>] ? 0xffffffff8116a60b [<ffffffff81542226>] ? 0xffffffff81542226 [<ffffffff8154224d>] ? 0xffffffff8154224d -- Mit freundlchen Grüßen Jerns Kasten http://www.kasten-edv.de -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html