aboutsummaryrefslogtreecommitdiff
path: root/src/processor/exploitability_linux.h
diff options
context:
space:
mode:
authorLiu.andrew.x@gmail.com <Liu.andrew.x@gmail.com>2015-06-25 23:05:16 +0000
committerLiu.andrew.x@gmail.com <Liu.andrew.x@gmail.com>2015-06-25 23:05:16 +0000
commitcca153368ad99492c4bff6dc1ca5d48b5daad1e9 (patch)
tree81adfcd98b9eb770b8ec6d918c7373b5fbae617b /src/processor/exploitability_linux.h
parentUpdate the upload.py code review server. (diff)
downloadbreakpad-cca153368ad99492c4bff6dc1ca5d48b5daad1e9.tar.xz
Checking location of the instruction pointer to see if it is
in valid code for Linux exploitability rating. This CL adds to the Linux exploitability checker by verifying that the instruction pointer is in valid code. Verification is done by obtaining a memory mapping of the crash and checking if the instruction pointer lies in an executable region. If there is no memory mapping, the instruction pointer is checked to determine if it lies within a known module. R=ivanpe@chromium.org Review URL: https://codereview.chromium.org/1210493003 git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1464 4c0a9323-5329-0410-9bdc-e9ce6186880e
Diffstat (limited to 'src/processor/exploitability_linux.h')
-rw-r--r--src/processor/exploitability_linux.h5
1 files changed, 5 insertions, 0 deletions
diff --git a/src/processor/exploitability_linux.h b/src/processor/exploitability_linux.h
index c63c0457..95607602 100644
--- a/src/processor/exploitability_linux.h
+++ b/src/processor/exploitability_linux.h
@@ -48,6 +48,11 @@ class ExploitabilityLinux : public Exploitability {
ProcessState *process_state);
virtual ExploitabilityRating CheckPlatformExploitability();
+
+ private:
+ // This method takes the address of the instruction pointer and returns
+ // whether the instruction pointer lies in a valid instruction region.
+ bool InstructionPointerInCode(uint64_t instruction_ptr);
};
} // namespace google_breakpad