Replies: 2 comments 3 replies
-
Are you asking about analysing a user-mode codebase together with the kernel, or just about identifying inputs (data passed into a syscall, or copied from user memory, or otherwise passed into the kernel by a user-mode application?) |
Beta Was this translation helpful? Give feedback.
1 reply
-
Hi @shahar99s 👋. Do you have an example of a bug you're trying to identify? |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
First of all, I am a codeql beginner, so sorry if I ask something unclear or even stupid.
I am trying to detect kernel bugs using codeql where the bug is triggered by some syscalls that lead to the bug in the kernel.
I have searched for an article about data flows that identify a kernel bug, caused by a tainted user mode code, but I haven't find anything.
Does a data flow from user to kernel requires a special treat? If so, how is it done?
Beta Was this translation helpful? Give feedback.
All reactions