KVM: x86: ignore access permissions for hypercall patching Ignore access permissions while patching hypercall instructions. Otherwise KVM injects a page fault when trying to patch vmcall on read-only text regions: Freeing initrd memory: 8843k freed Freeing unused kernel memory: 660k freed Write protecting the kernel text: 4780k Write protecting the kernel read-only data: 1912k BUG: unable to handle kernel paging request at c01292e3 IP: [<c01292e3>] kvm_leave_lazy_mmu+0x43/0x70 *pde = 00910067 *pte = 00129161 Oops: 0003 [#1] SMP CC: stable Reported-and-Tested-by: Stefan Bader <stefan.bader> Signed-off-by: Marcelo Tosatti <mtosatti>
Hi Marcelo Do we have reproducer for RHEL x86_64 host ?
*** Bug 575257 has been marked as a duplicate of this bug. ***
lihuang, You need an AMD host without NPT and recent Linux guest (Fedora 12 for eg).
The original report can be found here: https://bugs.edge.launchpad.net/ubuntu/+source/linux/+bug/531823
(In reply to comment #7) > lihuang, > > You need an AMD host without NPT and recent Linux guest (Fedora 12 for eg). Yes . did reproduced with Fc12 guest when disable NPT. Thank you.
Tested in kvm-83-165.el5, this problem does not exist. cmd: /usr/libexec/qemu-kvm -no-hpet -rtc-td-hack -usbdevice tablet -smp 2 -m 4G -drive file=f12_32.qcow2,if=ide -net nic,vlan=0,macaddr=20:88:99:11:99:11 -net tap,vlan=0,script=/etc/qemu-ifup -uuid `uuidgen` -cpu qemu64,+sse2 -vnc :16 -monitor stdio -boot n result: f12_32bit can be installed successfully and then can boot successfully.
(In reply to comment #14) > Tested in kvm-83-165.el5, this problem does not exist. This package does not seem to be available; is there a timetable to release it?
*** Bug 590125 has been marked as a duplicate of this bug. ***
Based on comment#14, change status to verified.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on therefore solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2011-0028.html
*** Bug 648984 has been marked as a duplicate of this bug. ***