Am 28.01.2010 um 09:18 schrieb Andrew Morton: > On Thu, 28 Jan 2010 08:34:02 +0100 Mathias Krause > wrote: > >> I found by accident an reliable way to panic the kernel on an x86_64 >> system. Since this one can be triggered by an unprivileged user I >> CCed security@kernel.org. I also haven't found a corresponding bug on >> bugzilla.kernel.org. So, what to do to trigger the bug: >> >> 1. Enable core dumps >> 2. Start an 32 bit program that tries to execve() an 64 bit program >> 3. The 64 bit program cannot be started by the kernel because it >> can't find the interpreter, i.e. execve returns with an error >> 4. Generate a segmentation fault >> 5. panic > > hrm, isn't this the same as "failed exec() leaves caller with > incorrect > personality", discussed in December? afacit nothing happened as a > result > of that. Yes, indeed it is. Thanks for the pointer.