commit | 2ad742939283ed0613be654ad0aaf29b797f9905 | [log] [tgz] |
---|---|---|
author | Tobin C. Harding <me@tobin.cc> | Tue Feb 27 14:14:24 2018 +1100 |
committer | Tobin C. Harding <me@tobin.cc> | Sat Apr 07 08:50:34 2018 +1000 |
tree | 4e9ebb74240570ae6aa3b2aaaac30e9639b08a47 | |
parent | 472c9e1085f20de71fc482500c8f1e4e45dff651 [diff] |
leaking_addresses: skip '/proc/1/syscall' The pointers listed in /proc/1/syscall are user pointers, and negative syscall args will show up like kernel addresses. For example /proc/31808/syscall: 0 0x3 0x55b107a38180 0x2000 0xffffffffffffffb0 \ 0x55b107a302d0 0x55b107a38180 0x7fffa313b8e8 0x7ff098560d11 Skip parsing /proc/1/syscall Suggested-by: Tycho Andersen <tycho@tycho.ws> Signed-off-by: Tobin C. Harding <me@tobin.cc>