While I want to wait for this to further go through the process upstream, there is a fix for this issue now. And some explanation why this was observed only by some people. It seems the bug was only observable on AMD based systems which seem to need certain hypercall instructions patched where Intel CPUs do not. And that code happened to be in a write-protected section which is protected by the patch that introduced the problem. So the fix is to allow access without checking for protections when kvm itself wants to modify an instruction. Many thanks to Marcelo Tosatti for helping on this.
** Patch added: "Proposed fix" http://launchpadlibrarian.net/40827609/KVM%3A%20x86%3A%20ignore%20access%20permissions%20for%20hypercall%20patching.patch -- [lucid] All linux guests oops in kvm_leave_lazy_mmu during boot (9.04, 9.10, 10.04) https://bugs.launchpad.net/bugs/531823 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs