Files
android_kernel_xiaomi_sm8450/scripts
Tobin C. Harding 2ad7429392 leaking_addresses: skip '/proc/1/syscall'
The pointers listed in /proc/1/syscall are user pointers, and negative
syscall args will show up like kernel addresses.

For example

/proc/31808/syscall: 0 0x3 0x55b107a38180 0x2000 0xffffffffffffffb0 \
0x55b107a302d0 0x55b107a38180 0x7fffa313b8e8 0x7ff098560d11

Skip parsing /proc/1/syscall

Suggested-by: Tycho Andersen <tycho@tycho.ws>
Signed-off-by: Tobin C. Harding <me@tobin.cc>
2018-04-07 08:50:34 +10:00
..
2018-03-05 23:48:29 +09:00
2017-03-28 16:16:52 +02:00
2018-02-02 00:21:47 +09:00
2011-08-31 16:12:17 +02:00
2012-06-27 12:44:29 -07:00
2018-03-02 09:20:56 +09:00
2018-02-06 18:32:47 -08:00
2014-08-20 16:03:45 +02:00