Replies: 2 comments 3 replies
-
Are you asking about analysing a user-mode codebase together with the kernel, or just about identifying inputs (data passed into a syscall, or copied from user memory, or otherwise passed into the kernel by a user-mode application?) |
Beta Was this translation helpful? Give feedback.
1 reply
-
Hi @shahar99s 👋. Do you have an example of a bug you're trying to identify? |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
First of all, I am a codeql beginner, so sorry if I ask something unclear or even stupid.
I am trying to detect kernel bugs using codeql where the bug is triggered by some syscalls that lead to the bug in the kernel.
I have searched for an article about data flows that identify a kernel bug, caused by a tainted user mode code, but I haven't find anything.
Does a data flow from user to kernel requires a special treat? If so, how is it done?
Beta Was this translation helpful? Give feedback.
All reactions