/external/chromium_org/chrome/browser/install_verification/win/ |
module_info.h | 13 ModuleInfo() : base_address(0), size(0) { 19 : base_address(module_base_address), 26 return base_address < compare.base_address; 31 return address >= base_address && address < base_address + size; 35 uintptr_t base_address; member in struct:ModuleInfo
|
imported_module_verification.cc | 29 return module.base_address + module.size < address;
|
/art/compiler/ |
elf_fixup.h | 36 // Fixup .dynamic d_ptr values for the expected base_address. 37 static bool FixupDynamic(ElfFile& elf_file, uintptr_t base_address); 40 static bool FixupSectionHeaders(ElfFile& elf_file, uintptr_t base_address); 43 static bool FixupProgramHeaders(ElfFile& elf_file, uintptr_t base_address); 46 static bool FixupSymbols(ElfFile& elf_file, uintptr_t base_address, bool dynamic); 49 static bool FixupRelocations(ElfFile& elf_file, uintptr_t base_address);
|
elf_fixup.cc | 35 ::llvm::ELF::Elf32_Off base_address = oat_data_begin - oatdata_address; local 37 if (!FixupDynamic(*elf_file.get(), base_address)) { 41 if (!FixupSectionHeaders(*elf_file.get(), base_address)) { 45 if (!FixupProgramHeaders(*elf_file.get(), base_address)) { 49 if (!FixupSymbols(*elf_file.get(), base_address, true)) { 53 if (!FixupSymbols(*elf_file.get(), base_address, false)) { 57 if (!FixupRelocations(*elf_file.get(), base_address)) { 82 bool ElfFixup::FixupDynamic(ElfFile& elf_file, uintptr_t base_address) { 181 d_ptr, d_ptr + base_address); 183 d_ptr += base_address; [all...] |
/external/chromium_org/sandbox/win/src/ |
interception_agent.h | 49 void* base_address); 52 void OnDllUnload(void* base_address); 65 // Performs the patching of the dll loaded at base_address.
|
target_process.h | 120 HMODULE base_address); 127 TargetProcess* MakeTestTargetProcess(HANDLE process, HMODULE base_address);
|
interception_agent.cc | 86 void* base_address) { 112 new(NT_PAGE, base_address) char[buffer_bytes]); 120 dlls_[i]->base = base_address; 134 void InterceptionAgent::OnDllUnload(void* base_address) { 136 if (dlls_[i] && dlls_[i]->base == base_address) {
|
target_process.cc | 328 TargetProcess* MakeTestTargetProcess(HANDLE process, HMODULE base_address) { 333 target->base_address_ = base_address;
|
/external/chromium/chrome/browser/ui/app_modal_dialogs/ |
message_box_handler.cc | 49 string16 base_address = ui::ElideUrl(frame_url.GetOrigin(), local 53 base_address = base::i18n::GetDisplayStringInLTRDirectionality( 54 base_address); 59 base_address));
|
/external/chromium_org/ppapi/tests/ |
test_tcp_server_socket_private_disallowed.cc | 65 PP_NetAddress_Private base_address, address; local 66 pp::NetAddressPrivate::GetAnyAddress(false, &base_address); 68 base_address, 0, &address));
|
test_tcp_server_socket_private.cc | 127 PP_NetAddress_Private base_address; local 128 ASSERT_SUBTEST_SUCCESS(GetLocalAddress(&base_address)); 129 if (!NetAddressPrivate::ReplacePort(base_address, 0, address))
|
test_udp_socket_private.cc | 104 PP_NetAddress_Private base_address; local 105 ASSERT_SUBTEST_SUCCESS(GetLocalAddress(&base_address)); 109 if (!pp::NetAddressPrivate::ReplacePort(base_address, port, address))
|
test_udp_socket.cc | 129 pp::NetAddress base_address; local 130 ASSERT_SUBTEST_SUCCESS(GetLocalAddress(&base_address)); 134 pp::NetAddress new_address = ReplacePort(instance_, base_address, port);
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_symbolizer.h | 89 LoadedModule(const char *module_name, uptr base_address); 94 uptr base_address() const { return base_address_; } function in class:__sanitizer::LoadedModule
|
sanitizer_symbolizer_libcdep.cc | 29 LoadedModule::LoadedModule(const char *module_name, uptr base_address) { 31 base_address_ = base_address; 274 uptr module_offset = addr - module->base_address(); 332 uptr module_offset = addr - module->base_address(); 343 info->start += module->base_address();
|
/external/chromium_org/base/process/ |
process_metrics_win.cc | 90 void* base_address = NULL; local 91 while (VirtualQueryEx(process_, base_address, &mbi, sizeof(mbi)) == 108 if (new_base <= base_address) { 114 base_address = new_base;
|
/bionic/tests/ |
dlfcn_test.cpp | 154 void* base_address = NULL; local 165 base_address = reinterpret_cast<void*>(start); 172 ASSERT_EQ(info.dli_fbase, base_address);
|
/external/grub/netboot/ |
w89c840.c | 273 static int mdio_read(int base_address, int phy_id, int location); 274 static void mdio_write(int base_address, int phy_id, int location, int value); 788 static int mdio_read(int base_address, int phy_id, int location) 790 long mdio_addr = base_address + MIICtrl; 817 static void mdio_write(int base_address, int phy_id, int location, int value) 819 long mdio_addr = base_address + MIICtrl;
|
/external/chromium/base/ |
process_util_win.cc | 637 void* base_address = NULL; local 638 while (VirtualQueryEx(process_, base_address, &mbi, sizeof(mbi)) == 655 if (new_base <= base_address) { 661 base_address = new_base;
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/asm/ |
kvm.h | 45 __u64 base_address; member in struct:kvm_ioapic_state
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/ |
edd.h | 86 __u16 base_address; member in struct:edd_device_params::__anon37508::__anon37509
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/asm/ |
kvm.h | 45 __u64 base_address; member in struct:kvm_ioapic_state
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
edd.h | 86 __u16 base_address; member in struct:edd_device_params::__anon39099::__anon39100
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/asm/ |
kvm.h | 45 __u64 base_address; member in struct:kvm_ioapic_state
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/ |
edd.h | 86 __u16 base_address; member in struct:edd_device_params::__anon40613::__anon40614
|