diff options
author | Liu.andrew.x@gmail.com <Liu.andrew.x@gmail.com> | 2015-06-25 23:05:16 +0000 |
---|---|---|
committer | Liu.andrew.x@gmail.com <Liu.andrew.x@gmail.com> | 2015-06-25 23:05:16 +0000 |
commit | cca153368ad99492c4bff6dc1ca5d48b5daad1e9 (patch) | |
tree | 81adfcd98b9eb770b8ec6d918c7373b5fbae617b /src/third_party/libdisasm/ia32_invariant.h | |
parent | Update the upload.py code review server. (diff) | |
download | breakpad-cca153368ad99492c4bff6dc1ca5d48b5daad1e9.tar.xz |
Checking location of the instruction pointer to see if it is
in valid code for Linux exploitability rating.
This CL adds to the Linux exploitability checker by verifying that the
instruction pointer is in valid code. Verification is done by obtaining a
memory mapping of the crash and checking if the instruction pointer lies in
an executable region. If there is no memory mapping, the instruction pointer
is checked to determine if it lies within a known module.
R=ivanpe@chromium.org
Review URL: https://codereview.chromium.org/1210493003
git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1464 4c0a9323-5329-0410-9bdc-e9ce6186880e
Diffstat (limited to 'src/third_party/libdisasm/ia32_invariant.h')
0 files changed, 0 insertions, 0 deletions