diff options
author | Tobin C. Harding <me@tobin.cc> | 2018-02-27 14:14:24 +1100 |
---|---|---|
committer | Tobin C. Harding <me@tobin.cc> | 2018-04-07 08:50:34 +1000 |
commit | 2ad742939283ed0613be654ad0aaf29b797f9905 (patch) | |
tree | 4e9ebb74240570ae6aa3b2aaaac30e9639b08a47 /scripts/coccicheck | |
parent | 472c9e1085f20de71fc482500c8f1e4e45dff651 (diff) |
leaking_addresses: skip '/proc/1/syscall'
The pointers listed in /proc/1/syscall are user pointers, and negative
syscall args will show up like kernel addresses.
For example
/proc/31808/syscall: 0 0x3 0x55b107a38180 0x2000 0xffffffffffffffb0 \
0x55b107a302d0 0x55b107a38180 0x7fffa313b8e8 0x7ff098560d11
Skip parsing /proc/1/syscall
Suggested-by: Tycho Andersen <tycho@tycho.ws>
Signed-off-by: Tobin C. Harding <me@tobin.cc>
Diffstat (limited to 'scripts/coccicheck')
0 files changed, 0 insertions, 0 deletions