On 27 Sep 2009, at 20:04, Brett Glass wrote:

As someone who has been frustrated by a disproportionate number of bugs related to null and wild pointer dereferencing, I'd opt for such an option to be incorporated in the next point release.

Perhaps, there could be two options: one to generate a warning in the log and then "fail soft" (e.g. by mapping a zero page) and another to cause a hard panic. The "fail soft" option would be particularly handy to help flush out bugs -- particularly in device drivers -- in preparation for making a hard panic the default at some future time. It would also provide a fallback for administrators, to allow them to keep their systems running while a bug was diagnosed and fixed.

Right now the immediate goals are:

(1) Enable by default in head so that we can evaluate the compatibility fallout (2) Provide the ability to enable on other -stable and -security branches non-default

My guess is that we'll enable it in -stable (and hence point releases) fairly quickly, but it's not a switch we want to throw in -stable until we have a better understanding of the impact. We're also still working through the implementation details so I suspect more commits will follow.

In practice, it will be tools like "doscmd" that fail in the new world order; some may not consider this a significant functional loss. We observe that Wine does do a mapping at NULL by default, but seems not to mind if it can't (as is also true on Linux I believe).

Robert


--Brett Glass

At 12:39 PM 9/27/2009, Robert Watson wrote:

FYI, changes are now going into head to implement this policy, although by slightly different mechanisms. I expect to see them merged to various branches, and also to active security branches (although disabled there by default using a sysctl so as not to disturb existing setups unless desired by the administrator).

Robert


_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to