Fix: bytecode validator: reject specialized load field/context ref instructions
authorMathieu Desnoyers <mathieu.desnoyers@efficios.com>
Fri, 30 Sep 2022 14:14:18 +0000 (10:14 -0400)
committerMathieu Desnoyers <mathieu.desnoyers@efficios.com>
Fri, 30 Sep 2022 14:23:31 +0000 (10:23 -0400)
commite2a5259590728af9f088c61dafe8e5c5dd2003db
tree3e2e1f513cb05e753066c0a9c82fe998b85a66f9
parentc4bf9003172c02d6d99ecfa4c445e8f7327fbac4
Fix: bytecode validator: reject specialized load field/context ref instructions

Reject specialized load field/context ref instructions so a bytecode
crafted with nefarious intent cannot:

- Read user-space memory without proper get_user accessors,
- Read a memory area larger than the memory targeted by the instrumentation.

This prevents bytecode received from a tracing group user from oopsing
the kernel or disclosing the content of kernel memory to the tracing
group

Signed-off-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Change-Id: I2bda938a3a050f20be1d3d542aefe638b1b8bf73
include/lttng/lttng-bytecode.h
src/lttng-bytecode-validator.c
src/lttng-bytecode.c
This page took 0.026443 seconds and 4 git commands to generate.