On Mon, 2010-05-03 at 22:48 +0200, Gábor Stefanik wrote: > One exception I can think of: major misconfiguration can cause a > wireless device to DMA data into sensitive memory locations. When > evidence of this is detected, it might make sense to BUG_ON() > (especially if the bogus DMA operations can be exploited remotely to > overwrite arbitrary memory addresses). However, in that case, the > attacker may have already overwritten panic() with malicious code as > well, so even this case doesn't hold. And then there is a case when encryption fails and there is a risk of transmitting data without encryption or accepting data without verification. But generally, I agree. -- Regards, Pavel Roskin -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html