Hi, x86 software emulation (non-KVM mode) does not check privilege levels on task gate switches ... so one can invoke a kernel's double fault handler from user space -- very bad. Expected behaviour (testcase works with any linux distribution + gcc): $ cat test.c int main(void) { __asm__ volatile ("int $8"); } $ gcc test.c $ ./a.out Segmentation fault $ ... and not a kernel panic (double fault) Forgive me for sending this patch as attachment, I'm not used to git. Best Regards, Alex