mirror of
https://github.com/yuzu-emu/breakpad.git
synced 2026-04-29 12:54:14 +00:00
is no reason not to keep it locally. Implemented a basic disassembler which can be used to scan bytecode for interesting conditions. This should be pretty easy to add to for things other than exploitability if there is a desire. This also adds several tests to the windows exploitability ranking code to take advantage of the disassembler for x86 code. BUG=None TEST=DisassemblerX86Test.* Review URL: http://breakpad.appspot.com/203001 git-svn-id: http://google-breakpad.googlecode.com/svn/trunk@705 4c0a9323-5329-0410-9bdc-e9ce6186880e
14 lines
355 B
C
14 lines
355 B
C
#ifndef IA32_IMPLICIT_H
|
|
#define IA32_IMPLICIT_H
|
|
|
|
#include "libdis.h"
|
|
|
|
/* OK, this is a hack to deal with prefixes having implicit operands...
|
|
* thought I had removed all the old hackishness ;( */
|
|
|
|
#define IDX_IMPLICIT_REP 41 /* change this if the table changes! */
|
|
|
|
unsigned int ia32_insn_implicit_ops( x86_insn_t *insn, unsigned int impl_idx );
|
|
|
|
#endif
|