Home
last modified time | relevance | path

Searched refs:instruction_ptr (Results 1 – 3 of 3) sorted by relevance

/external/google-breakpad/src/processor/
Dexploitability_win.cc107 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local
110 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability()
120 if (instruction_ptr <= (stack_ptr + kProbableStackOffset) && in CheckPlatformExploitability()
121 instruction_ptr >= (stack_ptr - kProbableStackOffset)) in CheckPlatformExploitability()
201 memory_list->GetMemoryRegionForAddress(instruction_ptr); in CheckPlatformExploitability()
208 instruction_ptr - instruction_region->GetBase(); in CheckPlatformExploitability()
218 instruction_ptr); in CheckPlatformExploitability()
Dexploitability_linux.cc132 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local
142 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability()
155 if (!this->InstructionPointerInCode(instruction_ptr) || in CheckPlatformExploitability()
163 if (enable_objdump_ && this->EndedOnIllegalWrite(instruction_ptr)) { in CheckPlatformExploitability()
172 bool ExploitabilityLinux::EndedOnIllegalWrite(uint64_t instruction_ptr) { in EndedOnIllegalWrite() argument
180 memory_list->GetMemoryRegionForAddress(instruction_ptr) : NULL; in EndedOnIllegalWrite()
222 if (base > instruction_ptr) { in EndedOnIllegalWrite()
226 const uint64_t offset = instruction_ptr - base; in EndedOnIllegalWrite()
571 bool ExploitabilityLinux::InstructionPointerInCode(uint64_t instruction_ptr) { in InstructionPointerInCode() argument
580 linux_maps_list->GetLinuxMapsForAddress(instruction_ptr) : NULL; in InstructionPointerInCode()
Dexploitability_linux.h67 bool InstructionPointerInCode(uint64_t instruction_ptr);
77 bool EndedOnIllegalWrite(uint64_t instruction_ptr);