diff options
author | ted.mielczarek@gmail.com <ted.mielczarek@gmail.com@4c0a9323-5329-0410-9bdc-e9ce6186880e> | 2013-03-06 14:04:42 +0000 |
---|---|---|
committer | ted.mielczarek@gmail.com <ted.mielczarek@gmail.com@4c0a9323-5329-0410-9bdc-e9ce6186880e> | 2013-03-06 14:04:42 +0000 |
commit | aeffe1056f9ff6526d87a16ef55222899f5528f7 (patch) | |
tree | 1b7601a9135f82c14e73535c9d4a24f94d494662 /src/processor/exploitability_win.cc | |
parent | Work around Windows headers #defining ERROR by renaming enum values in StackF... (diff) | |
download | breakpad-aeffe1056f9ff6526d87a16ef55222899f5528f7.tar.xz |
Use stdint types everywhere
R=mark at https://breakpad.appspot.com/535002/
git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@1121 4c0a9323-5329-0410-9bdc-e9ce6186880e
Diffstat (limited to 'src/processor/exploitability_win.cc')
-rw-r--r-- | src/processor/exploitability_win.cc | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/src/processor/exploitability_win.cc b/src/processor/exploitability_win.cc index e0798452..e20fbdda 100644 --- a/src/processor/exploitability_win.cc +++ b/src/processor/exploitability_win.cc @@ -50,8 +50,8 @@ namespace google_breakpad { // The cutoff that we use to judge if and address is likely an offset // from various interesting addresses. -static const u_int64_t kProbableNullOffset = 4096; -static const u_int64_t kProbableStackOffset = 8192; +static const uint64_t kProbableNullOffset = 4096; +static const uint64_t kProbableStackOffset = 8192; // The various cutoffs for the different ratings. static const size_t kHighCutoff = 100; @@ -98,14 +98,14 @@ ExploitabilityRating ExploitabilityWin::CheckPlatformExploitability() { BPLOG(INFO) << "Minidump memory segments not available."; memory_available = false; } - u_int64_t address = process_state_->crash_address(); - u_int32_t exception_code = raw_exception->exception_record.exception_code; + uint64_t address = process_state_->crash_address(); + uint32_t exception_code = raw_exception->exception_record.exception_code; - u_int32_t exploitability_weight = 0; + uint32_t exploitability_weight = 0; - u_int64_t stack_ptr = 0; - u_int64_t instruction_ptr = 0; - u_int64_t this_ptr = 0; + uint64_t stack_ptr = 0; + uint64_t instruction_ptr = 0; + uint64_t this_ptr = 0; switch (context->GetContextCPU()) { case MD_CONTEXT_X86: @@ -211,14 +211,14 @@ ExploitabilityRating ExploitabilityWin::CheckPlatformExploitability() { context->GetContextCPU() == MD_CONTEXT_X86 && (bad_read || bad_write)) { // Perform checks related to memory around instruction pointer. - u_int32_t memory_offset = + uint32_t memory_offset = instruction_ptr - instruction_region->GetBase(); - u_int32_t available_memory = + uint32_t available_memory = instruction_region->GetSize() - memory_offset; available_memory = available_memory > kDisassembleBytesBeyondPC ? kDisassembleBytesBeyondPC : available_memory; if (available_memory) { - const u_int8_t *raw_memory = + const uint8_t *raw_memory = instruction_region->GetMemory() + memory_offset; DisassemblerX86 disassembler(raw_memory, available_memory, |