Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#44278 - [virtualbox] host crash with Intel Broadwell hardware
Attached to Project:
Community Packages
Opened by Christian Hesse (eworm) - Friday, 20 March 2015, 14:59 GMT
Last edited by Sébastien Luttringer (seblu) - Sunday, 22 March 2015, 02:50 GMT
Opened by Christian Hesse (eworm) - Friday, 20 March 2015, 14:59 GMT
Last edited by Sébastien Luttringer (seblu) - Sunday, 22 March 2015, 02:50 GMT
|
DetailsDescription:
Starting a virtualbox guest on a system with Intel Broadwell hardware (and SMAP feature enabled) makes the host crash immediately. Details can be found in upstream bug tracker [0] and fix is available [1]. A workaround is to boot the host with kernel parameter 'nosmap', but that disables supervisor mode access prevention. The feature is enabled by default. Additional info: virtualbox 4.3.26-1 [0] https://www.virtualbox.org/ticket/13961 [1] https://www.virtualbox.org/raw-attachment/ticket/13961/diff_smap_4 |
This task depends upon
Closed by Sébastien Luttringer (seblu)
Sunday, 22 March 2015, 02:50 GMT
Reason for closing: Fixed
Additional comments about closing: virtualbox-4.3.26-2
Sunday, 22 March 2015, 02:50 GMT
Reason for closing: Fixed
Additional comments about closing: virtualbox-4.3.26-2
Did not test virtualbox-host-modules as I am running git kernel atm. But given they are compiled from fixed source should be fine as well. ;)