Fix: bytecode validator: reject specialized load field/context ref instructions
authorMathieu Desnoyers <mathieu.desnoyers@efficios.com>
Fri, 30 Sep 2022 14:14:18 +0000 (10:14 -0400)
committerMathieu Desnoyers <mathieu.desnoyers@efficios.com>
Fri, 30 Sep 2022 15:23:13 +0000 (11:23 -0400)
commit3909a7a96b56d6b2694e0de79e9f7341c8b5e3c4
tree95b2b4ab50b7543c434d3e451e9712426ccfcccc
parent46c5266089f738935d7d2bad132b1a0b0344e700
Fix: bytecode validator: reject specialized load field/context ref instructions

Reject specialized load field/context ref instructions so a bytecode
crafted with nefarious intent cannot:

- Read user-space memory without proper get_user accessors,
- Read a memory area larger than the memory targeted by the instrumentation.

This prevents bytecode received from a tracing group user from oopsing
the kernel or disclosing the content of kernel memory to the tracing
group

Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Change-Id: I2bda938a3a050f20be1d3d542aefe638b1b8bf73
include/lttng/lttng-bytecode.h
src/lttng-bytecode-validator.c
src/lttng-bytecode.c
This page took 0.026786 seconds and 4 git commands to generate.