Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(132)

Issue 1210493003: Checking location of the instruction pointer to see if it is (Closed)

Created:
5 years, 6 months ago by liuandrew
Modified:
5 years, 6 months ago
Reviewers:
ivanpe
CC:
google-breakpad-dev_googlegroups.com
Visibility:
Public.

Description

Checking location of the instruction pointer to see if it is in valid code for Linux exploitability rating. This CL adds to the Linux exploitability checker by verifying that the instruction pointer is in valid code. Verification is done by obtaining a memory mapping of the crash and checking if the instruction pointer lies in an executable region. If there is no memory mapping, the instruction pointer is checked to determine if it lies within a known module. R=ivanpe@chromium.org Committed: https://code.google.com/p/google-breakpad/source/detail?r=1464

Patch Set 1 #

Total comments: 8

Patch Set 2 : Checking location of the instruction pointer to see if it is #

Total comments: 6
Unified diffs Side-by-side diffs Delta from patch set Stats (+74 lines, -0 lines) Patch
M src/processor/exploitability_linux.h View 1 1 chunk +6 lines, -0 lines 1 comment Download
M src/processor/exploitability_linux.cc View 1 2 chunks +61 lines, -0 lines 5 comments Download
M src/processor/exploitability_unittest.cc View 1 chunk +7 lines, -0 lines 0 comments Download
A src/processor/testdata/linux_divide_by_zero.dmp View Binary file 0 comments Download
A src/processor/testdata/linux_divide_by_zero.dmp View 1 Binary file 0 comments Download
A src/processor/testdata/linux_jmp_to_0.dmp View Binary file 0 comments Download
A src/processor/testdata/linux_jmp_to_0.dmp View 1 Binary file 0 comments Download
A src/processor/testdata/linux_null_dereference.dmp View Binary file 0 comments Download
A src/processor/testdata/linux_null_dereference.dmp View 1 Binary file 0 comments Download

Messages

Total messages: 12 (4 generated)
liuandrew
5 years, 6 months ago (2015-06-24 18:52:13 UTC) #4
ivanpe
https://codereview.chromium.org/1210493003/diff/1/src/processor/exploitability_linux.cc File src/processor/exploitability_linux.cc (right): https://codereview.chromium.org/1210493003/diff/1/src/processor/exploitability_linux.cc#newcode112 src/processor/exploitability_linux.cc:112: default: Please, add a TODO to handle ARM and ...
5 years, 6 months ago (2015-06-24 19:14:06 UTC) #5
liuandrew
I made the changes discussed earlier today locally, but the changes do not appear on ...
5 years, 6 months ago (2015-06-24 20:59:37 UTC) #7
ivanpe
On 2015/06/24 20:59:37, liuandrew wrote: > I made the changes discussed earlier today locally, but ...
5 years, 6 months ago (2015-06-25 02:16:07 UTC) #8
liuandrew
Checking location of the instruction pointer to see if it is in valid code for ...
5 years, 6 months ago (2015-06-25 15:52:54 UTC) #9
liuandrew
5 years, 6 months ago (2015-06-25 17:15:59 UTC) #10
ivanpe
LGTM. Please, address my comments before submitting. https://codereview.chromium.org/1210493003/diff/20001/src/processor/exploitability_linux.cc File src/processor/exploitability_linux.cc (right): https://codereview.chromium.org/1210493003/diff/20001/src/processor/exploitability_linux.cc#newcode110 src/processor/exploitability_linux.cc:110: // TODO(liuandrew) ...
5 years, 6 months ago (2015-06-25 20:58:39 UTC) #11
liuandrew
5 years, 6 months ago (2015-06-25 23:05:55 UTC) #12
Message was sent while issue was closed.
Committed patchset #2 (id:20001) manually as r1464 (presubmit successful).

Powered by Google App Engine
This is Rietveld 408576698