Fix: bytecode validator: reject specialized load instructions
authorMathieu Desnoyers <mathieu.desnoyers@efficios.com>
Thu, 29 Sep 2022 19:29:21 +0000 (15:29 -0400)
committerMathieu Desnoyers <mathieu.desnoyers@efficios.com>
Thu, 29 Sep 2022 19:37:31 +0000 (15:37 -0400)
commitc4bf9003172c02d6d99ecfa4c445e8f7327fbac4
tree8a638ccda931592d1d683824c6ae865164eeacd5
parent6f185e4fc107767e1b4f5f15abe9c62d431c9d66
Fix: bytecode validator: reject specialized load instructions

Reject specialized load instructions so a bytecode crafted with
nefarious intent cannot:

- Read user-space memory without proper get_user accessors,
- Read a memory area larger than the memory targeted by the instrumentation.

This prevents bytecode received from a tracing group user from oopsing
the kernel or disclosing the content of kernel memory to the tracing
group.

Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Change-Id: I6bcdf37d4a8601164082b3c24358bf0e765a2c92
src/lttng-bytecode-validator.c
This page took 0.029696 seconds and 4 git commands to generate.