From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Mon, 7 May 2001 13:28:20 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Mon, 7 May 2001 13:28:10 -0400 Received: from t2.redhat.com ([199.183.24.243]:46586 "EHLO passion.cambridge.redhat.com") by vger.kernel.org with ESMTP id ; Mon, 7 May 2001 13:28:03 -0400 X-Mailer: exmh version 2.3 01/15/2001 with nmh-1.0.4 From: David Woodhouse X-Accept-Language: en_GB In-Reply-To: In-Reply-To: To: Linus Torvalds Cc: Alan Cox , Brian Gerst , linux-kernel@vger.kernel.org Subject: Re: [PATCH] x86 page fault handler not interrupt safe Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Mon, 07 May 2001 18:27:35 +0100 Message-ID: <12402.989256455@redhat.com> Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org torvalds@transmeta.com said: > If anybody has such a beast, please try this kernel patch _and_ > running the F0 0F bug-producing program (search for it on the 'net - > it must be out there somewhere) to verify that the code still > correctly handles that case. Something along the lines of: echo "unsigned long main=0xf00fc7c8;" > f00fbug.c ; make f00fbug -- dwmw2