404

[ Avaa Bypassed ]




Upload:

Command:

botdev@3.15.29.211: ~ $
#! /bin/bash
# SPDX-License-Identifier: GPL-2.0
# (c) 2015, Quentin Casasnovas <quentin.casasnovas@oracle.com>

obj=$1

file ${obj} | grep -q ELF || (echo "${obj} is not and ELF file." 1>&2 ; exit 0)

# Bail out early if there isn't an __ex_table section in this object file.
objdump -hj __ex_table ${obj} 2> /dev/null > /dev/null
[ $? -ne 0 ] && exit 0

white_list=.text,.fixup

suspicious_relocs=$(objdump -rj __ex_table ${obj}  | tail -n +6 |
			grep -v $(eval echo -e{${white_list}}) | awk '{print $3}')

# No suspicious relocs in __ex_table, jobs a good'un
[ -z "${suspicious_relocs}" ] && exit 0


# After this point, something is seriously wrong since we just found out we
# have some relocations in __ex_table which point to sections which aren't
# white listed.  If you're adding a new section in the Linux kernel, and
# you're expecting this section to contain code which can fault (i.e. the
# __ex_table relocation to your new section is expected), simply add your
# new section to the white_list variable above.  If not, you're probably
# doing something wrong and the rest of this code is just trying to print
# you more information about it.

function find_section_offset_from_symbol()
{
    eval $(objdump -t ${obj} | grep ${1} | sed 's/\([0-9a-f]\+\) .\{7\} \([^ \t]\+\).*/section="\2"; section_offset="0x\1" /')

    # addr2line takes addresses in hexadecimal...
    section_offset=$(printf "0x%016x" $(( ${section_offset} + $2 )) )
}

function find_symbol_and_offset_from_reloc()
{
    # Extract symbol and offset from the objdump output
    eval $(echo $reloc | sed 's/\([^+]\+\)+\?\(0x[0-9a-f]\+\)\?/symbol="\1"; symbol_offset="\2"/')

    # When the relocation points to the begining of a symbol or section, it
    # won't print the offset since it is zero.
    if [ -z "${symbol_offset}" ]; then
	symbol_offset=0x0
    fi
}

function find_alt_replacement_target()
{
    # The target of the .altinstr_replacement is the relocation just before
    # the .altinstr_replacement one.
    eval $(objdump -rj .altinstructions ${obj} | grep -B1 "${section}+${section_offset}" | head -n1 | awk '{print $3}' |
	   sed 's/\([^+]\+\)+\(0x[0-9a-f]\+\)/alt_target_section="\1"; alt_target_offset="\2"/')
}

function handle_alt_replacement_reloc()
{
    # This will define alt_target_section and alt_target_section_offset
    find_alt_replacement_target ${section} ${section_offset}

    echo "Error: found a reference to .altinstr_replacement in __ex_table:"
    addr2line -fip -j ${alt_target_section} -e ${obj} ${alt_target_offset} | awk '{print "\t" $0}'

    error=true
}

function is_executable_section()
{
    objdump -hwj ${section} ${obj} | grep -q CODE
    return $?
}

function handle_suspicious_generic_reloc()
{
    if is_executable_section ${section}; then
	# We've got a relocation to a non white listed _executable_
	# section, print a warning so the developper adds the section to
	# the white list or fix his code.  We try to pretty-print the file
	# and line number where that relocation was added.
	echo "Warning: found a reference to section \"${section}\" in __ex_table:"
	addr2line -fip -j ${section} -e ${obj} ${section_offset} | awk '{print "\t" $0}'
    else
	# Something is definitively wrong here since we've got a relocation
	# to a non-executable section, there's no way this would ever be
	# running in the kernel.
	echo "Error: found a reference to non-executable section \"${section}\" in __ex_table at offset ${section_offset}"
	error=true
    fi
}

function handle_suspicious_reloc()
{
    case "${section}" in
	".altinstr_replacement")
	    handle_alt_replacement_reloc ${section} ${section_offset}
	    ;;
	*)
	    handle_suspicious_generic_reloc ${section} ${section_offset}
	    ;;
    esac
}

function diagnose()
{

    for reloc in ${suspicious_relocs}; do
	# Let's find out where the target of the relocation in __ex_table
	# is, this will define ${symbol} and ${symbol_offset}
	find_symbol_and_offset_from_reloc ${reloc}

	# When there's a global symbol at the place of the relocation,
	# objdump will use it instead of giving us a section+offset, so
	# let's find out which section is this symbol in and the total
	# offset withing that section.
	find_section_offset_from_symbol ${symbol} ${symbol_offset}

	# In this case objdump was presenting us with a reloc to a symbol
	# rather than a section. Now that we've got the actual section,
	# we can skip it if it's in the white_list.
	if [ -z "$( echo $section | grep -v $(eval echo -e{${white_list}}))" ]; then
	    continue;
	fi

	# Will either print a warning if the relocation happens to be in a
	# section we do not know but has executable bit set, or error out.
	handle_suspicious_reloc
    done
}

function check_debug_info() {
    objdump -hj .debug_info ${obj} 2> /dev/null > /dev/null ||
	echo -e "${obj} does not contain debug information, the addr2line output will be limited.\n" \
	     "Recompile ${obj} with CONFIG_DEBUG_INFO to get a more useful output."
}

check_debug_info

diagnose

if [ "${error}" ]; then
    exit 1
fi

exit 0

Filemanager

Name Type Size Permission Actions
basic Folder 0755
coccinelle Folder 0755
dtc Folder 0755
gcc-plugins Folder 0755
gdb Folder 0755
genksyms Folder 0755
kconfig Folder 0755
ksymoops Folder 0755
mod Folder 0755
package Folder 0755
selinux Folder 0755
tracing Folder 0755
.gitignore File 162 B 0644
Kbuild.include File 18.36 KB 0644
Lindent File 502 B 0755
Makefile File 1.9 KB 0644
Makefile.asm-generic File 1.17 KB 0644
Makefile.build File 20.68 KB 0644
Makefile.clean File 2.96 KB 0644
Makefile.dtbinst File 1.09 KB 0644
Makefile.extrawarn File 2.83 KB 0644
Makefile.gcc-plugins File 3.75 KB 0644
Makefile.headersinst File 3.98 KB 0644
Makefile.host File 6.23 KB 0644
Makefile.kasan File 1.09 KB 0644
Makefile.kcov File 201 B 0644
Makefile.lib File 15.25 KB 0644
Makefile.modbuiltin File 1.82 KB 0644
Makefile.modinst File 1.52 KB 0644
Makefile.modpost File 5.48 KB 0644
Makefile.modsign File 1.02 KB 0644
Makefile.ubsan File 1.07 KB 0644
adjust_autoksyms.sh File 3.09 KB 0755
asn1_compiler.c File 35.54 KB 0644
bloat-o-meter File 3.22 KB 0755
bootgraph.pl File 6.28 KB 0755
check_00index.sh File 1.3 KB 0755
check_extable.sh File 4.93 KB 0755
checkincludes.pl File 1.94 KB 0755
checkkconfigsymbols.py File 15.51 KB 0755
checkpatch.pl File 186.79 KB 0755
checkstack.pl File 5.49 KB 0755
checksyscalls.sh File 5.68 KB 0755
checkversion.pl File 1.9 KB 0755
cleanfile File 3.46 KB 0755
cleanpatch File 5.06 KB 0755
coccicheck File 7.24 KB 0755
config File 4.64 KB 0755
conmakehash.c File 5.98 KB 0644
const_structs.checkpatch File 964 B 0644
decode_stacktrace.sh File 3.82 KB 0755
decodecode File 2.3 KB 0755
depmod.sh File 1.94 KB 0755
diffconfig File 3.72 KB 0755
documentation-file-ref-check File 395 B 0755
export_report.pl File 4.55 KB 0755
extract-cert.c File 3.46 KB 0644
extract-ikconfig File 1.69 KB 0755
extract-module-sig.pl File 3.66 KB 0755
extract-sys-certs.pl File 3.75 KB 0755
extract-vmlinux File 1.6 KB 0755
extract_xc3028.pl File 44.6 KB 0755
faddr2line File 5.53 KB 0755
find-unused-docs.sh File 1.27 KB 0755
gcc-goto.sh File 530 B 0755
gcc-ld File 711 B 0755
gcc-plugin.sh File 1.06 KB 0755
gcc-version.sh File 857 B 0755
gcc-x86_32-has-stack-protector.sh File 219 B 0755
gcc-x86_64-has-stack-protector.sh File 244 B 0755
gen_initramfs_list.sh File 8.03 KB 0755
get_dvb_firmware File 25.22 KB 0755
get_maintainer.pl File 65.03 KB 0755
gfp-translate File 1.71 KB 0755
headerdep.pl File 3.5 KB 0755
headers.sh File 512 B 0755
headers_check.pl File 3.73 KB 0755
headers_install.sh File 1.32 KB 0755
insert-sys-cert.c File 13.08 KB 0644
kallsyms.c File 18.89 KB 0644
kernel-doc File 92.36 KB 0755
kmsg-doc File 12.13 KB 0755
ld-version.sh File 269 B 0755
leaking_addresses.pl File 9.65 KB 0755
link-vmlinux.sh File 7.65 KB 0755
makelst File 808 B 0755
markup_oops.pl File 8.08 KB 0755
mkcompile_h File 2.74 KB 0755
mkmakefile File 1.19 KB 0755
mksysmap File 1.33 KB 0755
mkuboot.sh File 414 B 0755
module-common.lds File 901 B 0644
namespace.pl File 13.18 KB 0755
objdiff File 2.85 KB 0755
parse-maintainers.pl File 3.72 KB 0755
patch-kernel File 9.95 KB 0755
pnmtologo.c File 11.91 KB 0644
profile2linkerlist.pl File 414 B 0755
prune-kernel File 708 B 0755
recordmcount.c File 17.49 KB 0644
recordmcount.h File 16.4 KB 0644
recordmcount.pl File 18.41 KB 0755
setlocalversion File 4.72 KB 0755
show_delta File 2.99 KB 0755
sign-file.c File 9.76 KB 0644
sortextable.c File 8.35 KB 0644
sortextable.h File 5.48 KB 0644
spelling.txt File 24.97 KB 0644
sphinx-pre-install File 14.04 KB 0755
stackdelta File 1.84 KB 0755
stackusage File 794 B 0755
subarch.include File 641 B 0644
tags.sh File 9.49 KB 0755
ubuntu-retpoline-extract-one File 7.26 KB 0644
unifdef.c File 34.8 KB 0644
ver_linux File 2.94 KB 0755
xen-hypercalls.sh File 386 B 0644
xz_wrap.sh File 562 B 0755