/dports/www/firefox/firefox-99.0/third_party/rust/minidump_writer_linux/src/sections/ |
H A D | thread_list_stream.rs | 80 let instruction_ptr = crash_context.get_instruction_pointer() as usize; in write() localVariable 87 instruction_ptr, in write() 97 if instruction_ptr < mapping.start_address in write() 98 || instruction_ptr >= mapping.start_address + mapping.size in write() 107 instruction_ptr - ip_memory_size / 2, in write() 114 instruction_ptr + ip_memory_size / 2, in write() 148 let instruction_ptr = info.get_instruction_pointer() as usize; in write() localVariable 154 instruction_ptr, in write() 183 instruction_ptr: usize, in fill_thread_stack() 216 if (instruction_ptr < low_addr || instruction_ptr > high_addr) in fill_thread_stack()
|
/dports/mail/thunderbird/thunderbird-91.8.0/third_party/rust/minidump_writer_linux/src/sections/ |
H A D | thread_list_stream.rs | 80 let instruction_ptr = crash_context.get_instruction_pointer() as usize; in write() localVariable 87 instruction_ptr, in write() 97 if instruction_ptr < mapping.start_address in write() 98 || instruction_ptr >= mapping.start_address + mapping.size in write() 107 instruction_ptr - ip_memory_size / 2, in write() 114 instruction_ptr + ip_memory_size / 2, in write() 148 let instruction_ptr = info.get_instruction_pointer() as usize; in write() localVariable 154 instruction_ptr, in write() 183 instruction_ptr: usize, in fill_thread_stack() 216 if (instruction_ptr < low_addr || instruction_ptr > high_addr) in fill_thread_stack()
|
/dports/www/firefox-esr/firefox-91.8.0/third_party/rust/minidump_writer_linux/src/sections/ |
H A D | thread_list_stream.rs | 80 let instruction_ptr = crash_context.get_instruction_pointer() as usize; in write() localVariable 87 instruction_ptr, in write() 97 if instruction_ptr < mapping.start_address in write() 98 || instruction_ptr >= mapping.start_address + mapping.size in write() 107 instruction_ptr - ip_memory_size / 2, in write() 114 instruction_ptr + ip_memory_size / 2, in write() 148 let instruction_ptr = info.get_instruction_pointer() as usize; in write() localVariable 154 instruction_ptr, in write() 183 instruction_ptr: usize, in fill_thread_stack() 216 if (instruction_ptr < low_addr || instruction_ptr > high_addr) in fill_thread_stack()
|
/dports/deskutils/owncloudclient/ownCloud-2.8.2.4246/src/3rdparty/libcrashreporter-qt/3rdparty/breakpad/processor/ |
H A D | exploitability_win.cc | 107 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 112 instruction_ptr = context->GetContextX86()->eip; in CheckPlatformExploitability() 116 instruction_ptr = context->GetContextAMD64()->rip; in CheckPlatformExploitability() 124 if (instruction_ptr <= (stack_ptr + kProbableStackOffset) && in CheckPlatformExploitability() 125 instruction_ptr >= (stack_ptr - kProbableStackOffset)) in CheckPlatformExploitability() 205 memory_list->GetMemoryRegionForAddress(instruction_ptr); in CheckPlatformExploitability() 212 instruction_ptr - instruction_region->GetBase(); in CheckPlatformExploitability() 222 instruction_ptr); in CheckPlatformExploitability()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/breakpad/breakpad/src/processor/ |
H A D | exploitability_win.cc | 107 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 110 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 120 if (instruction_ptr <= (stack_ptr + kProbableStackOffset) && in CheckPlatformExploitability() 121 instruction_ptr >= (stack_ptr - kProbableStackOffset)) in CheckPlatformExploitability() 201 memory_list->GetMemoryRegionForAddress(instruction_ptr); in CheckPlatformExploitability() 208 instruction_ptr - instruction_region->GetBase(); in CheckPlatformExploitability() 218 instruction_ptr); in CheckPlatformExploitability()
|
H A D | exploitability_linux.cc | 132 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 142 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 155 if (!this->InstructionPointerInCode(instruction_ptr) || in CheckPlatformExploitability() 163 if (enable_objdump_ && this->EndedOnIllegalWrite(instruction_ptr)) { in CheckPlatformExploitability() 172 bool ExploitabilityLinux::EndedOnIllegalWrite(uint64_t instruction_ptr) { in EndedOnIllegalWrite() argument 180 memory_list->GetMemoryRegionForAddress(instruction_ptr) : NULL; in EndedOnIllegalWrite() 222 if (base > instruction_ptr) { in EndedOnIllegalWrite() 226 const uint64_t offset = instruction_ptr - base; in EndedOnIllegalWrite() 571 bool ExploitabilityLinux::InstructionPointerInCode(uint64_t instruction_ptr) { in InstructionPointerInCode() argument 580 linux_maps_list->GetLinuxMapsForAddress(instruction_ptr) : NULL; in InstructionPointerInCode()
|
H A D | exploitability_linux.h | 67 bool InstructionPointerInCode(uint64_t instruction_ptr); 77 bool EndedOnIllegalWrite(uint64_t instruction_ptr);
|
/dports/lang/spidermonkey78/firefox-78.9.0/toolkit/crashreporter/google-breakpad/src/processor/ |
H A D | exploitability_win.cc | 107 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 110 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 120 if (instruction_ptr <= (stack_ptr + kProbableStackOffset) && in CheckPlatformExploitability() 121 instruction_ptr >= (stack_ptr - kProbableStackOffset)) in CheckPlatformExploitability() 201 memory_list->GetMemoryRegionForAddress(instruction_ptr); in CheckPlatformExploitability() 208 instruction_ptr - instruction_region->GetBase(); in CheckPlatformExploitability() 218 instruction_ptr); in CheckPlatformExploitability()
|
H A D | exploitability_linux.cc | 132 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 142 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 155 if (!this->InstructionPointerInCode(instruction_ptr) || in CheckPlatformExploitability() 163 if (enable_objdump_ && this->EndedOnIllegalWrite(instruction_ptr)) { in CheckPlatformExploitability() 172 bool ExploitabilityLinux::EndedOnIllegalWrite(uint64_t instruction_ptr) { in EndedOnIllegalWrite() argument 180 memory_list->GetMemoryRegionForAddress(instruction_ptr) : NULL; in EndedOnIllegalWrite() 222 if (base > instruction_ptr) { in EndedOnIllegalWrite() 226 const uint64_t offset = instruction_ptr - base; in EndedOnIllegalWrite() 571 bool ExploitabilityLinux::InstructionPointerInCode(uint64_t instruction_ptr) { in InstructionPointerInCode() argument 580 linux_maps_list->GetLinuxMapsForAddress(instruction_ptr) : NULL; in InstructionPointerInCode()
|
H A D | exploitability_linux.h | 67 bool InstructionPointerInCode(uint64_t instruction_ptr); 77 bool EndedOnIllegalWrite(uint64_t instruction_ptr);
|
/dports/lang/spidermonkey60/firefox-60.9.0/toolkit/crashreporter/google-breakpad/src/processor/ |
H A D | exploitability_win.cc | 107 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 110 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 120 if (instruction_ptr <= (stack_ptr + kProbableStackOffset) && in CheckPlatformExploitability() 121 instruction_ptr >= (stack_ptr - kProbableStackOffset)) in CheckPlatformExploitability() 201 memory_list->GetMemoryRegionForAddress(instruction_ptr); in CheckPlatformExploitability() 208 instruction_ptr - instruction_region->GetBase(); in CheckPlatformExploitability() 218 instruction_ptr); in CheckPlatformExploitability()
|
H A D | exploitability_linux.cc | 131 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 141 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 154 if (!this->InstructionPointerInCode(instruction_ptr) || in CheckPlatformExploitability() 162 if (enable_objdump_ && this->EndedOnIllegalWrite(instruction_ptr)) { in CheckPlatformExploitability() 171 bool ExploitabilityLinux::EndedOnIllegalWrite(uint64_t instruction_ptr) { in EndedOnIllegalWrite() argument 179 memory_list->GetMemoryRegionForAddress(instruction_ptr) : NULL; in EndedOnIllegalWrite() 221 if (base > instruction_ptr) { in EndedOnIllegalWrite() 225 const uint64_t offset = instruction_ptr - base; in EndedOnIllegalWrite() 570 bool ExploitabilityLinux::InstructionPointerInCode(uint64_t instruction_ptr) { in InstructionPointerInCode() argument 579 linux_maps_list->GetLinuxMapsForAddress(instruction_ptr) : NULL; in InstructionPointerInCode()
|
H A D | exploitability_linux.h | 67 bool InstructionPointerInCode(uint64_t instruction_ptr); 77 bool EndedOnIllegalWrite(uint64_t instruction_ptr);
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/breakpad/breakpad/src/processor/ |
H A D | exploitability_win.cc | 107 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 110 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 120 if (instruction_ptr <= (stack_ptr + kProbableStackOffset) && in CheckPlatformExploitability() 121 instruction_ptr >= (stack_ptr - kProbableStackOffset)) in CheckPlatformExploitability() 201 memory_list->GetMemoryRegionForAddress(instruction_ptr); in CheckPlatformExploitability() 208 instruction_ptr - instruction_region->GetBase(); in CheckPlatformExploitability() 218 instruction_ptr); in CheckPlatformExploitability()
|
H A D | exploitability_linux.cc | 132 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 142 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 155 if (!this->InstructionPointerInCode(instruction_ptr) || in CheckPlatformExploitability() 163 if (enable_objdump_ && this->EndedOnIllegalWrite(instruction_ptr)) { in CheckPlatformExploitability() 172 bool ExploitabilityLinux::EndedOnIllegalWrite(uint64_t instruction_ptr) { in EndedOnIllegalWrite() argument 180 memory_list->GetMemoryRegionForAddress(instruction_ptr) : NULL; in EndedOnIllegalWrite() 222 if (base > instruction_ptr) { in EndedOnIllegalWrite() 226 const uint64_t offset = instruction_ptr - base; in EndedOnIllegalWrite() 571 bool ExploitabilityLinux::InstructionPointerInCode(uint64_t instruction_ptr) { in InstructionPointerInCode() argument 580 linux_maps_list->GetLinuxMapsForAddress(instruction_ptr) : NULL; in InstructionPointerInCode()
|
H A D | exploitability_linux.h | 67 bool InstructionPointerInCode(uint64_t instruction_ptr); 77 bool EndedOnIllegalWrite(uint64_t instruction_ptr);
|
/dports/www/firefox/firefox-99.0/toolkit/crashreporter/google-breakpad/src/processor/ |
H A D | exploitability_win.cc | 107 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 110 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 120 if (instruction_ptr <= (stack_ptr + kProbableStackOffset) && in CheckPlatformExploitability() 121 instruction_ptr >= (stack_ptr - kProbableStackOffset)) in CheckPlatformExploitability() 201 memory_list->GetMemoryRegionForAddress(instruction_ptr); in CheckPlatformExploitability() 208 instruction_ptr - instruction_region->GetBase(); in CheckPlatformExploitability() 218 instruction_ptr); in CheckPlatformExploitability()
|
H A D | exploitability_linux.cc | 132 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 142 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 155 if (!this->InstructionPointerInCode(instruction_ptr) || in CheckPlatformExploitability() 163 if (enable_objdump_ && this->EndedOnIllegalWrite(instruction_ptr)) { in CheckPlatformExploitability() 172 bool ExploitabilityLinux::EndedOnIllegalWrite(uint64_t instruction_ptr) { in EndedOnIllegalWrite() argument 180 memory_list->GetMemoryRegionForAddress(instruction_ptr) : NULL; in EndedOnIllegalWrite() 222 if (base > instruction_ptr) { in EndedOnIllegalWrite() 226 const uint64_t offset = instruction_ptr - base; in EndedOnIllegalWrite() 571 bool ExploitabilityLinux::InstructionPointerInCode(uint64_t instruction_ptr) { in InstructionPointerInCode() argument 580 linux_maps_list->GetLinuxMapsForAddress(instruction_ptr) : NULL; in InstructionPointerInCode()
|
/dports/mail/thunderbird/thunderbird-91.8.0/toolkit/crashreporter/google-breakpad/src/processor/ |
H A D | exploitability_win.cc | 107 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 110 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 120 if (instruction_ptr <= (stack_ptr + kProbableStackOffset) && in CheckPlatformExploitability() 121 instruction_ptr >= (stack_ptr - kProbableStackOffset)) in CheckPlatformExploitability() 201 memory_list->GetMemoryRegionForAddress(instruction_ptr); in CheckPlatformExploitability() 208 instruction_ptr - instruction_region->GetBase(); in CheckPlatformExploitability() 218 instruction_ptr); in CheckPlatformExploitability()
|
H A D | exploitability_linux.cc | 132 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 142 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 155 if (!this->InstructionPointerInCode(instruction_ptr) || in CheckPlatformExploitability() 163 if (enable_objdump_ && this->EndedOnIllegalWrite(instruction_ptr)) { in CheckPlatformExploitability() 172 bool ExploitabilityLinux::EndedOnIllegalWrite(uint64_t instruction_ptr) { in EndedOnIllegalWrite() argument 180 memory_list->GetMemoryRegionForAddress(instruction_ptr) : NULL; in EndedOnIllegalWrite() 222 if (base > instruction_ptr) { in EndedOnIllegalWrite() 226 const uint64_t offset = instruction_ptr - base; in EndedOnIllegalWrite() 571 bool ExploitabilityLinux::InstructionPointerInCode(uint64_t instruction_ptr) { in InstructionPointerInCode() argument 580 linux_maps_list->GetLinuxMapsForAddress(instruction_ptr) : NULL; in InstructionPointerInCode()
|
/dports/www/firefox-legacy/firefox-52.8.0esr/toolkit/crashreporter/google-breakpad/src/processor/ |
H A D | exploitability_win.cc | 107 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 110 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 120 if (instruction_ptr <= (stack_ptr + kProbableStackOffset) && in CheckPlatformExploitability() 121 instruction_ptr >= (stack_ptr - kProbableStackOffset)) in CheckPlatformExploitability() 201 memory_list->GetMemoryRegionForAddress(instruction_ptr); in CheckPlatformExploitability() 208 instruction_ptr - instruction_region->GetBase(); in CheckPlatformExploitability() 218 instruction_ptr); in CheckPlatformExploitability()
|
H A D | exploitability_linux.cc | 131 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 141 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 154 if (!this->InstructionPointerInCode(instruction_ptr) || in CheckPlatformExploitability() 162 if (enable_objdump_ && this->EndedOnIllegalWrite(instruction_ptr)) { in CheckPlatformExploitability() 171 bool ExploitabilityLinux::EndedOnIllegalWrite(uint64_t instruction_ptr) { in EndedOnIllegalWrite() argument 179 memory_list->GetMemoryRegionForAddress(instruction_ptr) : NULL; in EndedOnIllegalWrite() 221 if (base > instruction_ptr) { in EndedOnIllegalWrite() 225 const uint64_t offset = instruction_ptr - base; in EndedOnIllegalWrite() 570 bool ExploitabilityLinux::InstructionPointerInCode(uint64_t instruction_ptr) { in InstructionPointerInCode() argument 579 linux_maps_list->GetLinuxMapsForAddress(instruction_ptr) : NULL; in InstructionPointerInCode()
|
/dports/www/firefox-esr/firefox-91.8.0/toolkit/crashreporter/google-breakpad/src/processor/ |
H A D | exploitability_win.cc | 107 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 110 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 120 if (instruction_ptr <= (stack_ptr + kProbableStackOffset) && in CheckPlatformExploitability() 121 instruction_ptr >= (stack_ptr - kProbableStackOffset)) in CheckPlatformExploitability() 201 memory_list->GetMemoryRegionForAddress(instruction_ptr); in CheckPlatformExploitability() 208 instruction_ptr - instruction_region->GetBase(); in CheckPlatformExploitability() 218 instruction_ptr); in CheckPlatformExploitability()
|
H A D | exploitability_linux.cc | 132 uint64_t instruction_ptr = 0; in CheckPlatformExploitability() local 142 if (!context->GetInstructionPointer(&instruction_ptr)) { in CheckPlatformExploitability() 155 if (!this->InstructionPointerInCode(instruction_ptr) || in CheckPlatformExploitability() 163 if (enable_objdump_ && this->EndedOnIllegalWrite(instruction_ptr)) { in CheckPlatformExploitability() 172 bool ExploitabilityLinux::EndedOnIllegalWrite(uint64_t instruction_ptr) { in EndedOnIllegalWrite() argument 180 memory_list->GetMemoryRegionForAddress(instruction_ptr) : NULL; in EndedOnIllegalWrite() 222 if (base > instruction_ptr) { in EndedOnIllegalWrite() 226 const uint64_t offset = instruction_ptr - base; in EndedOnIllegalWrite() 571 bool ExploitabilityLinux::InstructionPointerInCode(uint64_t instruction_ptr) { in InstructionPointerInCode() argument 580 linux_maps_list->GetLinuxMapsForAddress(instruction_ptr) : NULL; in InstructionPointerInCode()
|
/dports/multimedia/obs-studio/obs-studio-27.1.3/libobs/ |
H A D | obs-win-crash-handler.c | 74 DWORD64 instruction_ptr; member 156 trace->instruction_ptr = trace->context.Rip; in init_instruction_data() 157 trace->frame.AddrPC.Offset = trace->instruction_ptr; in init_instruction_data() 162 trace->instruction_ptr = trace->context.Eip; in init_instruction_data() 163 trace->frame.AddrPC.Offset = trace->instruction_ptr; in init_instruction_data() 227 if (data->main_trace.instruction_ptr >= module_base && in enum_all_modules() 228 data->main_trace.instruction_ptr < module_base + module_size) { in enum_all_modules() 278 data->main_trace.instruction_ptr, data->module_name.array, in write_header()
|