diff options
author | Tobin C. Harding <me@tobin.cc> | 2018-02-27 14:14:24 +1100 |
---|---|---|
committer | Tobin C. Harding <me@tobin.cc> | 2018-04-07 08:50:34 +1000 |
commit | 2ad742939283ed0613be654ad0aaf29b797f9905 (patch) | |
tree | 4e9ebb74240570ae6aa3b2aaaac30e9639b08a47 /scripts | |
parent | 472c9e1085f20de71fc482500c8f1e4e45dff651 (diff) |
leaking_addresses: skip '/proc/1/syscall'
The pointers listed in /proc/1/syscall are user pointers, and negative
syscall args will show up like kernel addresses.
For example
/proc/31808/syscall: 0 0x3 0x55b107a38180 0x2000 0xffffffffffffffb0 \
0x55b107a302d0 0x55b107a38180 0x7fffa313b8e8 0x7ff098560d11
Skip parsing /proc/1/syscall
Suggested-by: Tycho Andersen <tycho@tycho.ws>
Signed-off-by: Tobin C. Harding <me@tobin.cc>
Diffstat (limited to 'scripts')
-rwxr-xr-x | scripts/leaking_addresses.pl | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/scripts/leaking_addresses.pl b/scripts/leaking_addresses.pl index 2075d98278f2..db6f39df879f 100755 --- a/scripts/leaking_addresses.pl +++ b/scripts/leaking_addresses.pl @@ -60,6 +60,7 @@ my $page_offset_32bit = 0; # Page offset for 32-bit kernel. my @skip_abs = ( '/proc/kmsg', '/proc/device-tree', + '/proc/1/syscall', '/sys/firmware/devicetree', '/sys/kernel/debug/tracing/trace_pipe', '/sys/kernel/security/apparmor/revision'); |