breakpad/src
Liu.andrew.x@gmail.com cca153368a Checking location of the instruction pointer to see if it is
in valid code for Linux exploitability rating.

This CL adds to the Linux exploitability checker by verifying that the
instruction pointer is in valid code. Verification is done by obtaining a
memory mapping of the crash and checking if the instruction pointer lies in
an executable region. If there is no memory mapping, the instruction pointer
is checked to determine if it lies within a known module.

R=ivanpe@chromium.org

Review URL: https://codereview.chromium.org/1210493003

git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1464 4c0a9323-5329-0410-9bdc-e9ce6186880e
2015-06-25 23:05:16 +00:00
..
build Rename gyp variable use_titlecase_in_grd_files -> use_titlecase_in_grd. 2014-09-10 12:47:46 +00:00
client Update breakpad for Android packed relocations. 2015-06-19 16:30:42 +00:00
common Use local variable for out parameter rather than direct use of ivar 2015-06-20 00:32:37 +00:00
google_breakpad [MIPS]: Use mcontext_t structure for MIPS 2015-04-21 21:34:14 +00:00
processor Checking location of the instruction pointer to see if it is 2015-06-25 23:05:16 +00:00
third_party MIPS64: Initial MIPS64 related change. 2015-04-15 19:28:11 +00:00
tools Reconfigured options for sym_upload to not treat h and ? flags as invalid options. 2015-06-22 21:21:40 +00:00
breakpad_googletest_includes.h disable unittests under ASAN that use memory crashes 2013-12-11 05:38:34 +00:00
config.h.in Use AM_MAINTAINER_MODE so configure supports --enable-maintainer-mode 2013-12-10 12:28:11 +00:00