Re: [announce] [patch] NX (No eXecute) support for x86, 2.6.7-rc2-bk2

From: Gerhard Mack
Date: Thu Jun 03 2004 - 09:53:21 EST


> kernel tried to access NX-protected page - exploit attempt? (uid: 500)
> Unable to handle kernel paging request at virtual address f78d0f40
> printing eip:
> ...

Just a small nitpick...

Can you please drop the "- exploit attempt" from the error? Buffer
overflows aren't always exploits.

I already have a problem with jumpy users to blame everything on "hackers"
I'd much rather have someone qualified come to that conclusion rather than
the kernel making a bad guess at it.

Gerhard


--
Gerhard Mack

gmack@xxxxxxxxxxxxx

<>< As a computer I find your faith in technology amusing.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/