leaking_addresses: Provide mechanism to scan binary files
authorKees Cook <keescook@chromium.org>
Thu, 22 Feb 2024 22:00:51 +0000 (14:00 -0800)
committerKees Cook <keescook@chromium.org>
Thu, 29 Feb 2024 21:38:03 +0000 (13:38 -0800)
commit67bbd2f00735d7f5ad6c3d08eff6c5403c3a9c33
tree99ce4b90bc3ad52d2220bb7ca4af4d8ba871be99
parent3e389d457badb1dc07f9fb3197bd7cb5c2833e36
leaking_addresses: Provide mechanism to scan binary files

Introduce --kallsyms argument for scanning binary files for known symbol
addresses. This would have found the exposure in /sys/kernel/notes:

$ scripts/leaking_addresses.pl --kallsyms=<(sudo cat /proc/kallsyms)
/sys/kernel/notes: hypercall_page @ 156
/sys/kernel/notes: xen_hypercall_set_trap_table @ 156
/sys/kernel/notes: startup_xen @ 132

Acked-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Reviewed-by: Tycho Andersen <tandersen@netflix.com>
Link: https://lore.kernel.org/r/20240222220053.1475824-4-keescook@chromium.org
Signed-off-by: Kees Cook <keescook@chromium.org>
scripts/leaking_addresses.pl