Re: [announce] [patch] NX (No eXecute) support for x86, 2.6.7-rc2-bk2

From: Ingo Molnar
Date: Fri Jun 04 2004 - 04:42:14 EST



* Gerhard Mack <gmack@xxxxxxxxxxxxx> wrote:

> > kernel tried to access NX-protected page - exploit attempt? (uid: 500)
> > Unable to handle kernel paging request at virtual address f78d0f40
> > printing eip:
> > ...
>
> Just a small nitpick...
>
> Can you please drop the "- exploit attempt" from the error? Buffer
> overflows aren't always exploits.

this message will only trigger if the kernel tries to _execute_ an
non-executable kernel page - which almost never happens even considering
kernel crashes. Normal kernel oopses will still look like they used to.

Ingo
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/