aboutsummaryrefslogtreecommitdiff
path: root/src/processor/module_serializer.cc
diff options
context:
space:
mode:
authorLiu.andrew.x@gmail.com <Liu.andrew.x@gmail.com>2015-07-16 20:42:29 +0000
committerLiu.andrew.x@gmail.com <Liu.andrew.x@gmail.com>2015-07-16 20:42:29 +0000
commita840e1b710f3a24ff47d300425cf9bf5b5573a5c (patch)
tree47699daaa861dabb3030dba1d7ad3d16699296c0 /src/processor/module_serializer.cc
parentFix -Wreorder warnings in the Windows code. (diff)
downloadbreakpad-a840e1b710f3a24ff47d300425cf9bf5b5573a5c.tar.xz
Add ELF header analysis when checking for instruction pointer in code.
If the minidump module containing the instruction pointer has memory containing the ELF header and program header table, when checking the exploitability rating, the processor will use the ELF header data to determine if the instruction pointer lies in an executable region of the module, rather than just checking if it lies in a module. R=ivanpe@chromium.org Review URL: https://codereview.chromium.org/1233973002 git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1472 4c0a9323-5329-0410-9bdc-e9ce6186880e
Diffstat (limited to 'src/processor/module_serializer.cc')
0 files changed, 0 insertions, 0 deletions