From ab5ffb8b6cb5863f15153184e5ca33de2f47321d Mon Sep 17 00:00:00 2001 From: "Liu.andrew.x@gmail.com" Date: Sat, 15 Aug 2015 00:27:27 +0000 Subject: Add check to see if stack pointer is off the stack according to the memory mappings when rating Linux exploitability. R=ivanpe@chromium.org Review URL: https://codereview.chromium.org/1286033002 git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1487 4c0a9323-5329-0410-9bdc-e9ce6186880e --- .../testdata/linux_stack_pointer_in_module.dmp | Bin 0 -> 38761 bytes src/processor/testdata/linux_stack_pointer_in_stack.dmp | Bin 0 -> 38761 bytes 2 files changed, 0 insertions(+), 0 deletions(-) create mode 100644 src/processor/testdata/linux_stack_pointer_in_module.dmp create mode 100644 src/processor/testdata/linux_stack_pointer_in_stack.dmp (limited to 'src/processor/testdata') diff --git a/src/processor/testdata/linux_stack_pointer_in_module.dmp b/src/processor/testdata/linux_stack_pointer_in_module.dmp new file mode 100644 index 00000000..92b6c21a Binary files /dev/null and b/src/processor/testdata/linux_stack_pointer_in_module.dmp differ diff --git a/src/processor/testdata/linux_stack_pointer_in_stack.dmp b/src/processor/testdata/linux_stack_pointer_in_stack.dmp new file mode 100644 index 00000000..f70b881f Binary files /dev/null and b/src/processor/testdata/linux_stack_pointer_in_stack.dmp differ -- cgit v1.2.1