While I want to wait for this to further go through the process upstream, there 
is a fix for this issue now. And some explanation why this was observed only by 
some people. It seems the bug was only observable on AMD based systems which 
seem to need certain hypercall instructions patched where Intel CPUs do not. 
And that code happened to be in a write-protected section which is protected by 
the patch that introduced the problem.
So the fix is to allow access without checking for protections when kvm itself 
wants to modify an instruction. Many thanks to Marcelo Tosatti for helping on 
this.

** Patch added: "Proposed fix"
   
http://launchpadlibrarian.net/40827609/KVM%3A%20x86%3A%20ignore%20access%20permissions%20for%20hypercall%20patching.patch

-- 
[lucid] All linux guests oops in kvm_leave_lazy_mmu during boot (9.04, 9.10, 
10.04)
https://bugs.launchpad.net/bugs/531823
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to