Crashpad
 
All Classes Namespaces Files Functions Variables Typedefs Enumerations Enumerator Macros Pages
Loading...
Searching...
No Matches
crashpad::internal::CaptureMemory Class Reference

Classes

class  Delegate
 An interface to a platform-specific process reader. More...
 

Public Member Functions

 CaptureMemory (const CaptureMemory &)=delete
 
CaptureMemoryoperator= (const CaptureMemory &)=delete
 

Static Public Member Functions

static void PointedToByContext (const CPUContext &context, Delegate *delegate)
 For all registers that appear to be pointer-like in context, captures a small amount of memory near their pointed to location.
 
static void PointedToByMemoryRange (const MemorySnapshot &memory, Delegate *delegate)
 For all pointer-like values in a memory range of the target process, captures a small amount of memory near the pointed to location.
 

Member Function Documentation

◆ PointedToByContext()

void crashpad::internal::CaptureMemory::PointedToByContext ( const CPUContext & context,
Delegate * delegate )
static

For all registers that appear to be pointer-like in context, captures a small amount of memory near their pointed to location.

"Pointer-like" in this context means not too close to zero (signed or unsigned) so that there's a reasonable chance that the value is a pointer.

Parameters
[in]contextThe context to inspect.
[in]delegateA Delegate that handles reading from the target process and adding new ranges.

◆ PointedToByMemoryRange()

void crashpad::internal::CaptureMemory::PointedToByMemoryRange ( const MemorySnapshot & memory,
Delegate * delegate )
static

For all pointer-like values in a memory range of the target process, captures a small amount of memory near the pointed to location.

Parameters
[in]memoryAn existing MemorySnapshot of the range to search. The base address and size must be pointer-aligned and an integral number of pointers long.
[in]delegateA Delegate that handles reading from the target process and adding new ranges.

The documentation for this class was generated from the following files: