diff options
author | Kees Cook <keescook@chromium.org> | 2024-02-23 01:00:51 +0300 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2024-03-01 00:38:03 +0300 |
commit | 67bbd2f00735d7f5ad6c3d08eff6c5403c3a9c33 (patch) | |
tree | 99ce4b90bc3ad52d2220bb7ca4af4d8ba871be99 /tools/perf/scripts/python/export-to-sqlite.py | |
parent | 3e389d457badb1dc07f9fb3197bd7cb5c2833e36 (diff) | |
download | linux-67bbd2f00735d7f5ad6c3d08eff6c5403c3a9c33.tar.xz |
leaking_addresses: Provide mechanism to scan binary files
Introduce --kallsyms argument for scanning binary files for known symbol
addresses. This would have found the exposure in /sys/kernel/notes:
$ scripts/leaking_addresses.pl --kallsyms=<(sudo cat /proc/kallsyms)
/sys/kernel/notes: hypercall_page @ 156
/sys/kernel/notes: xen_hypercall_set_trap_table @ 156
/sys/kernel/notes: startup_xen @ 132
Acked-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Reviewed-by: Tycho Andersen <tandersen@netflix.com>
Link: https://lore.kernel.org/r/20240222220053.1475824-4-keescook@chromium.org
Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'tools/perf/scripts/python/export-to-sqlite.py')
0 files changed, 0 insertions, 0 deletions