From cca153368ad99492c4bff6dc1ca5d48b5daad1e9 Mon Sep 17 00:00:00 2001 From: "Liu.andrew.x@gmail.com" Date: Thu, 25 Jun 2015 23:05:16 +0000 Subject: Checking location of the instruction pointer to see if it is in valid code for Linux exploitability rating. This CL adds to the Linux exploitability checker by verifying that the instruction pointer is in valid code. Verification is done by obtaining a memory mapping of the crash and checking if the instruction pointer lies in an executable region. If there is no memory mapping, the instruction pointer is checked to determine if it lies within a known module. R=ivanpe@chromium.org Review URL: https://codereview.chromium.org/1210493003 git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1464 4c0a9323-5329-0410-9bdc-e9ce6186880e --- src/processor/testdata/linux_divide_by_zero.dmp | Bin 0 -> 38760 bytes src/processor/testdata/linux_jmp_to_0.dmp | Bin 0 -> 38544 bytes src/processor/testdata/linux_null_dereference.dmp | Bin 0 -> 38760 bytes 3 files changed, 0 insertions(+), 0 deletions(-) create mode 100644 src/processor/testdata/linux_divide_by_zero.dmp create mode 100644 src/processor/testdata/linux_jmp_to_0.dmp create mode 100644 src/processor/testdata/linux_null_dereference.dmp (limited to 'src/processor/testdata') diff --git a/src/processor/testdata/linux_divide_by_zero.dmp b/src/processor/testdata/linux_divide_by_zero.dmp new file mode 100644 index 00000000..e7b37cf2 Binary files /dev/null and b/src/processor/testdata/linux_divide_by_zero.dmp differ diff --git a/src/processor/testdata/linux_jmp_to_0.dmp b/src/processor/testdata/linux_jmp_to_0.dmp new file mode 100644 index 00000000..40e4b15f Binary files /dev/null and b/src/processor/testdata/linux_jmp_to_0.dmp differ diff --git a/src/processor/testdata/linux_null_dereference.dmp b/src/processor/testdata/linux_null_dereference.dmp new file mode 100644 index 00000000..d216a802 Binary files /dev/null and b/src/processor/testdata/linux_null_dereference.dmp differ -- cgit v1.2.1