
Eh, don't want to test -- ext3 buffers aren't fully flushed on "sync".neuron wrote:simple enough to find out really, use it and see if magic keys still work, if they do the kernel is running.Hypnos wrote:vanilla 2.6.6 + ACPI
This disturbs me. It might very well be a gcc bug, but isn't something wrong with the kernel process security model if an exception can crash a system?
of course not, I meant to test for someone who's in position to do so (for example using a livecd, or in a virtual machine)Hypnos wrote:Eh, don't want to test -- ext3 buffers aren't fully flushed on "sync".neuron wrote:simple enough to find out really, use it and see if magic keys still work, if they do the kernel is running.Hypnos wrote:vanilla 2.6.6 + ACPI
This disturbs me. It might very well be a gcc bug, but isn't something wrong with the kernel process security model if an exception can crash a system?
In any case, having to use sysrq is not an acceptable.



I don't understand the particulars, but the code manages to create an FPU fault in kernel space, and then the kernel trips on "fwait" which raises an exception. Perhaps magic key/ctl-alt-del still works because it's a lower control which kills the offending thread.Derryth wrote:[...] There's some explanation for those who understand anything about it:
http://marc.theaimsgroup.com/?l=linux-k ... 114434&w=2

Yep...dioxmat wrote:Trivial patch:
http://marc.theaimsgroup.com/?l=bk-comm ... 126541&w=2
and for x86-64 too:
http://marc.theaimsgroup.com/?l=bk-comm ... 130848&w=2

I have a new "you know you run Linux when..." line.dioxmat wrote:Trivial patch:
http://marc.theaimsgroup.com/?l=bk-comm ... 126541&w=2
and for x86-64 too:
http://marc.theaimsgroup.com/?l=bk-comm ... 130848&w=2
You know you run Linux when the latest and only major bug is crushed within two days
