Searched refs:stack_ptr (Results 1 – 7 of 7) sorted by relevance
106 uint64_t stack_ptr = 0; in CheckPlatformExploitability() local115 if (!context->GetStackPointer(&stack_ptr)) { in CheckPlatformExploitability()120 if (instruction_ptr <= (stack_ptr + kProbableStackOffset) && in CheckPlatformExploitability()121 instruction_ptr >= (stack_ptr - kProbableStackOffset)) in CheckPlatformExploitability()
133 uint64_t stack_ptr = 0; in CheckPlatformExploitability() local148 if (!context->GetStackPointer(&stack_ptr)) { in CheckPlatformExploitability()156 this->StackPointerOffStack(stack_ptr) || in CheckPlatformExploitability()536 bool ExploitabilityLinux::StackPointerOffStack(uint64_t stack_ptr) { in StackPointerOffStack() argument543 linux_maps_list->GetLinuxMapsForAddress(stack_ptr); in StackPointerOffStack()
116 bool StackPointerOffStack(uint64_t stack_ptr);
105 void *stack_ptr = (char *)start + size; in unsafe_stack_setup() local106 CHECK_EQ((((size_t)stack_ptr) & (kStackAlign - 1)), 0); in unsafe_stack_setup()108 __safestack_unsafe_stack_ptr = stack_ptr; in unsafe_stack_setup()
30 char stack_ptr[0]; member50 pid = clone(child, ca.stack_ptr, CLONE_NEWUSER | CLONE_NEWPID | SIGCHLD, NULL); in main()
103 void *stack_ptr = (char *)start + size; in unsafe_stack_setup() local104 SFS_CHECK((((size_t)stack_ptr) & (kStackAlign - 1)) == 0); in unsafe_stack_setup()106 __safestack_unsafe_stack_ptr = stack_ptr; in unsafe_stack_setup()
418 const uintptr_t stack_ptr = UContextReader::GetStackPointer(ucontext_); in WriteThreadListStream() local419 if (!FillThreadStack(&thread, stack_ptr, in WriteThreadListStream()