Re: [announce] [patch] NX (No eXecute) support for x86, 2.6.7-rc2-bk2
From: Gerhard Mack
Date: Thu Jun 03 2004 - 09:53:21 EST
> kernel tried to access NX-protected page - exploit attempt? (uid: 500)
> Unable to handle kernel paging request at virtual address f78d0f40
> printing eip:
> ...
Just a small nitpick...
Can you please drop the "- exploit attempt" from the error? Buffer
overflows aren't always exploits.
I already have a problem with jumpy users to blame everything on "hackers"
I'd much rather have someone qualified come to that conclusion rather than
the kernel making a bad guess at it.
Gerhard
--
Gerhard Mack
gmack@xxxxxxxxxxxxx
<>< As a computer I find your faith in technology amusing.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/