diff options
author | Kees Cook <keescook@chromium.org> | 2024-02-22 14:00:51 -0800 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2024-02-29 13:38:03 -0800 |
commit | 67bbd2f00735d7f5ad6c3d08eff6c5403c3a9c33 (patch) | |
tree | 99ce4b90bc3ad52d2220bb7ca4af4d8ba871be99 /include/linux/overflow.h | |
parent | 3e389d457badb1dc07f9fb3197bd7cb5c2833e36 (diff) |
leaking_addresses: Provide mechanism to scan binary files
Introduce --kallsyms argument for scanning binary files for known symbol
addresses. This would have found the exposure in /sys/kernel/notes:
$ scripts/leaking_addresses.pl --kallsyms=<(sudo cat /proc/kallsyms)
/sys/kernel/notes: hypercall_page @ 156
/sys/kernel/notes: xen_hypercall_set_trap_table @ 156
/sys/kernel/notes: startup_xen @ 132
Acked-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Reviewed-by: Tycho Andersen <tandersen@netflix.com>
Link: https://lore.kernel.org/r/20240222220053.1475824-4-keescook@chromium.org
Signed-off-by: Kees Cook <keescook@chromium.org>
Diffstat (limited to 'include/linux/overflow.h')
0 files changed, 0 insertions, 0 deletions