mirror of
https://git.suyu.dev/suyu/breakpad.git
synced 2025-12-29 02:35:31 +01:00
Checking location of the instruction pointer to see if it is
in valid code for Linux exploitability rating. This CL adds to the Linux exploitability checker by verifying that the instruction pointer is in valid code. Verification is done by obtaining a memory mapping of the crash and checking if the instruction pointer lies in an executable region. If there is no memory mapping, the instruction pointer is checked to determine if it lies within a known module. R=ivanpe@chromium.org Review URL: https://codereview.chromium.org/1210493003 git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1464 4c0a9323-5329-0410-9bdc-e9ce6186880e
This commit is contained in:
parent
ed3bf1c825
commit
cca153368a
6 changed files with 71 additions and 0 deletions
BIN
src/processor/testdata/linux_null_dereference.dmp
vendored
Normal file
BIN
src/processor/testdata/linux_null_dereference.dmp
vendored
Normal file
Binary file not shown.
Loading…
Add table
Add a link
Reference in a new issue