Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S264330AbUFCOnB (ORCPT ); Thu, 3 Jun 2004 10:43:01 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S265539AbUFCOi2 (ORCPT ); Thu, 3 Jun 2004 10:38:28 -0400 Received: from [65.39.167.249] ([65.39.167.249]:31200 "HELO innerfire.net") by vger.kernel.org with SMTP id S265405AbUFCOgq (ORCPT ); Thu, 3 Jun 2004 10:36:46 -0400 Date: Thu, 3 Jun 2004 10:36:45 -0400 (EDT) From: Gerhard Mack To: Ingo Molnar cc: linux-kernel@vger.kernel.org, Andrew Morton , Andi Kleen , Linus Torvalds , Arjan van de Ven , "Siddha, Suresh B" , "Nakajima, Jun" Subject: Re: [announce] [patch] NX (No eXecute) support for x86, 2.6.7-rc2-bk2 In-Reply-To: <20040602205025.GA21555@elte.hu> Message-ID: References: <20040602205025.GA21555@elte.hu> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 838 Lines: 28 > kernel tried to access NX-protected page - exploit attempt? (uid: 500) > Unable to handle kernel paging request at virtual address f78d0f40 > printing eip: > ... Just a small nitpick... Can you please drop the "- exploit attempt" from the error? Buffer overflows aren't always exploits. I already have a problem with jumpy users to blame everything on "hackers" I'd much rather have someone qualified come to that conclusion rather than the kernel making a bad guess at it. Gerhard -- Gerhard Mack gmack@innerfire.net <>< As a computer I find your faith in technology amusing. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/