tech-kern archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: UVM and the NULL page



Maxime Villard wrote:
> ...
> You know - as well as I do - that NULL pointer dereferences are quite common,
> and that it is the main way to execute malicious code in kernel mode. Allowing
> NULL is a huge problem on architectures like amd64. The way you are talking
> about compatibility sounds like you are ready to sacrifice the security of
> almost every NetBSD user just to allow a few programs that make use of a mapping
> model which has been known to be flawed for years. This is ridiculous.

I don't think that NULL pointer dereference is "is the main way to
execute malicious code in kernel mode". There are so many other ways.

If you're so scared about being hacked, stop writing in C.

-- 
Alex


Home | Main Index | Thread Index | Old Index