4b3f4e17a6ebdef8fbedb89c75ae2bdebfb4f961 |
|
07-May-2013 |
mseaborn@chromium.org <mseaborn@chromium.org@4c0a9323-5329-0410-9bdc-e9ce6186880e> |
Fix an "unused variable" compiler warning in exploitability_win.cc BUG=none TEST=compile with "-Wall -Werror" Review URL: https://breakpad.appspot.com/588003 git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1171 4c0a9323-5329-0410-9bdc-e9ce6186880e
/external/google-breakpad/src/processor/exploitability_win.cc
|
6162aed3c3fcfc53373c963ac375d39a5dfa5a25 |
|
06-Mar-2013 |
ted.mielczarek@gmail.com <ted.mielczarek@gmail.com@4c0a9323-5329-0410-9bdc-e9ce6186880e> |
Use stdint types everywhere R=mark at https://breakpad.appspot.com/535002/ git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1121 4c0a9323-5329-0410-9bdc-e9ce6186880e
/external/google-breakpad/src/processor/exploitability_win.cc
|
2cc15ba4327831f917ff55b87e6d5fc3c7750085 |
|
17-Jan-2013 |
ted.mielczarek@gmail.com <ted.mielczarek@gmail.com@4c0a9323-5329-0410-9bdc-e9ce6186880e> |
Move scoped_ptr.h to common R=mark at https://breakpad.appspot.com/509002/ git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1096 4c0a9323-5329-0410-9bdc-e9ce6186880e
/external/google-breakpad/src/processor/exploitability_win.cc
|
361f24eac7fb452a795709479fc48fd59b04bc1f |
|
15-Oct-2010 |
SiyangXie@gmail.com <SiyangXie@gmail.com@4c0a9323-5329-0410-9bdc-e9ce6186880e> |
Fix some compiler warnings: char*->const char*, default in swtch. git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@713 4c0a9323-5329-0410-9bdc-e9ce6186880e
/external/google-breakpad/src/processor/exploitability_win.cc
|
8b2e6865e54d52fcd45514e12e90ee425b82cb52 |
|
02-Oct-2010 |
cdn@chromium.org <cdn@chromium.org@4c0a9323-5329-0410-9bdc-e9ce6186880e> |
Added method to exploitability class which checks if a given address contains all ascii characters. BUG=NONE TEST=ExploitabilityTest.TestWindowsEngine Review URL: http://breakpad.appspot.com/207001 git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@706 4c0a9323-5329-0410-9bdc-e9ce6186880e
/external/google-breakpad/src/processor/exploitability_win.cc
|
2b4274afc4fae883d1251a7a420e24fd526a9f16 |
|
02-Oct-2010 |
cdn@chromium.org <cdn@chromium.org@4c0a9323-5329-0410-9bdc-e9ce6186880e> |
Added libdisasm to the repository. This library is no longer under development so there is no reason not to keep it locally. Implemented a basic disassembler which can be used to scan bytecode for interesting conditions. This should be pretty easy to add to for things other than exploitability if there is a desire. This also adds several tests to the windows exploitability ranking code to take advantage of the disassembler for x86 code. BUG=None TEST=DisassemblerX86Test.* Review URL: http://breakpad.appspot.com/203001 git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@705 4c0a9323-5329-0410-9bdc-e9ce6186880e
/external/google-breakpad/src/processor/exploitability_win.cc
|
cec12872c403314261e151cf2fa4505ae1affaf6 |
|
22-Sep-2010 |
cdn@chromium.org <cdn@chromium.org@4c0a9323-5329-0410-9bdc-e9ce6186880e> |
Added the base exploitability module for windows. This only adds the very basic exception type based analysis for now. BUG=NONE TEST=MinidumpProcessorTest.TestExploitilityEngine Review URL: http://breakpad.appspot.com/189001 git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@698 4c0a9323-5329-0410-9bdc-e9ce6186880e
/external/google-breakpad/src/processor/exploitability_win.cc
|