History log of /external/google-breakpad/src/processor/exploitability_win.cc
Revision Date Author Comments (<<< Hide modified files) (Show modified files >>>)
4b3f4e17a6ebdef8fbedb89c75ae2bdebfb4f961 07-May-2013 mseaborn@chromium.org <mseaborn@chromium.org@4c0a9323-5329-0410-9bdc-e9ce6186880e> Fix an "unused variable" compiler warning in exploitability_win.cc

BUG=none
TEST=compile with "-Wall -Werror"

Review URL: https://breakpad.appspot.com/588003

git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1171 4c0a9323-5329-0410-9bdc-e9ce6186880e
/external/google-breakpad/src/processor/exploitability_win.cc
6162aed3c3fcfc53373c963ac375d39a5dfa5a25 06-Mar-2013 ted.mielczarek@gmail.com <ted.mielczarek@gmail.com@4c0a9323-5329-0410-9bdc-e9ce6186880e> Use stdint types everywhere
R=mark at https://breakpad.appspot.com/535002/

git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1121 4c0a9323-5329-0410-9bdc-e9ce6186880e
/external/google-breakpad/src/processor/exploitability_win.cc
2cc15ba4327831f917ff55b87e6d5fc3c7750085 17-Jan-2013 ted.mielczarek@gmail.com <ted.mielczarek@gmail.com@4c0a9323-5329-0410-9bdc-e9ce6186880e> Move scoped_ptr.h to common
R=mark at https://breakpad.appspot.com/509002/

git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1096 4c0a9323-5329-0410-9bdc-e9ce6186880e
/external/google-breakpad/src/processor/exploitability_win.cc
361f24eac7fb452a795709479fc48fd59b04bc1f 15-Oct-2010 SiyangXie@gmail.com <SiyangXie@gmail.com@4c0a9323-5329-0410-9bdc-e9ce6186880e> Fix some compiler warnings: char*->const char*, default in swtch.


git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@713 4c0a9323-5329-0410-9bdc-e9ce6186880e
/external/google-breakpad/src/processor/exploitability_win.cc
8b2e6865e54d52fcd45514e12e90ee425b82cb52 02-Oct-2010 cdn@chromium.org <cdn@chromium.org@4c0a9323-5329-0410-9bdc-e9ce6186880e> Added method to exploitability class which checks if a given address contains all ascii characters.

BUG=NONE
TEST=ExploitabilityTest.TestWindowsEngine
Review URL: http://breakpad.appspot.com/207001

git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@706 4c0a9323-5329-0410-9bdc-e9ce6186880e
/external/google-breakpad/src/processor/exploitability_win.cc
2b4274afc4fae883d1251a7a420e24fd526a9f16 02-Oct-2010 cdn@chromium.org <cdn@chromium.org@4c0a9323-5329-0410-9bdc-e9ce6186880e> Added libdisasm to the repository. This library is no longer under development so there
is no reason not to keep it locally. Implemented a basic disassembler which can be used
to scan bytecode for interesting conditions. This should be pretty easy to add to for
things other than exploitability if there is a desire. This also adds several tests to
the windows exploitability ranking code to take advantage of the disassembler for x86
code.

BUG=None
TEST=DisassemblerX86Test.*

Review URL: http://breakpad.appspot.com/203001

git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@705 4c0a9323-5329-0410-9bdc-e9ce6186880e
/external/google-breakpad/src/processor/exploitability_win.cc
cec12872c403314261e151cf2fa4505ae1affaf6 22-Sep-2010 cdn@chromium.org <cdn@chromium.org@4c0a9323-5329-0410-9bdc-e9ce6186880e> Added the base exploitability module for windows. This only adds the very basic exception type based analysis for now.

BUG=NONE
TEST=MinidumpProcessorTest.TestExploitilityEngine

Review URL: http://breakpad.appspot.com/189001

git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@698 4c0a9323-5329-0410-9bdc-e9ce6186880e
/external/google-breakpad/src/processor/exploitability_win.cc