HomeSort by relevance Sort by last modified time
    Searched refs:base_address (Results 1 - 25 of 32) sorted by null

1 2

  /external/chromium_org/chrome/browser/install_verification/win/
module_info.h 13 ModuleInfo() : base_address(0), size(0) {
19 : base_address(module_base_address),
26 return base_address < compare.base_address;
31 return address >= base_address && address < base_address + size;
35 uintptr_t base_address; member in struct:ModuleInfo
imported_module_verification.cc 29 return module.base_address + module.size < address;
  /art/compiler/
elf_fixup.h 36 // Fixup .dynamic d_ptr values for the expected base_address.
37 static bool FixupDynamic(ElfFile& elf_file, uintptr_t base_address);
40 static bool FixupSectionHeaders(ElfFile& elf_file, uintptr_t base_address);
43 static bool FixupProgramHeaders(ElfFile& elf_file, uintptr_t base_address);
46 static bool FixupSymbols(ElfFile& elf_file, uintptr_t base_address, bool dynamic);
49 static bool FixupRelocations(ElfFile& elf_file, uintptr_t base_address);
elf_fixup.cc 35 ::llvm::ELF::Elf32_Off base_address = oat_data_begin - oatdata_address; local
37 if (!FixupDynamic(*elf_file.get(), base_address)) {
41 if (!FixupSectionHeaders(*elf_file.get(), base_address)) {
45 if (!FixupProgramHeaders(*elf_file.get(), base_address)) {
49 if (!FixupSymbols(*elf_file.get(), base_address, true)) {
53 if (!FixupSymbols(*elf_file.get(), base_address, false)) {
57 if (!FixupRelocations(*elf_file.get(), base_address)) {
82 bool ElfFixup::FixupDynamic(ElfFile& elf_file, uintptr_t base_address) {
181 d_ptr, d_ptr + base_address);
183 d_ptr += base_address;
    [all...]
  /external/chromium_org/sandbox/win/src/
interception_agent.h 49 void* base_address);
52 void OnDllUnload(void* base_address);
65 // Performs the patching of the dll loaded at base_address.
target_process.h 120 HMODULE base_address);
127 TargetProcess* MakeTestTargetProcess(HANDLE process, HMODULE base_address);
interception_agent.cc 86 void* base_address) {
112 new(NT_PAGE, base_address) char[buffer_bytes]);
120 dlls_[i]->base = base_address;
134 void InterceptionAgent::OnDllUnload(void* base_address) {
136 if (dlls_[i] && dlls_[i]->base == base_address) {
target_process.cc 328 TargetProcess* MakeTestTargetProcess(HANDLE process, HMODULE base_address) {
333 target->base_address_ = base_address;
  /external/chromium/chrome/browser/ui/app_modal_dialogs/
message_box_handler.cc 49 string16 base_address = ui::ElideUrl(frame_url.GetOrigin(), local
53 base_address = base::i18n::GetDisplayStringInLTRDirectionality(
54 base_address);
59 base_address));
  /external/chromium_org/ppapi/tests/
test_tcp_server_socket_private_disallowed.cc 65 PP_NetAddress_Private base_address, address; local
66 pp::NetAddressPrivate::GetAnyAddress(false, &base_address);
68 base_address, 0, &address));
test_tcp_server_socket_private.cc 127 PP_NetAddress_Private base_address; local
128 ASSERT_SUBTEST_SUCCESS(GetLocalAddress(&base_address));
129 if (!NetAddressPrivate::ReplacePort(base_address, 0, address))
test_udp_socket_private.cc 104 PP_NetAddress_Private base_address; local
105 ASSERT_SUBTEST_SUCCESS(GetLocalAddress(&base_address));
109 if (!pp::NetAddressPrivate::ReplacePort(base_address, port, address))
test_udp_socket.cc 129 pp::NetAddress base_address; local
130 ASSERT_SUBTEST_SUCCESS(GetLocalAddress(&base_address));
134 pp::NetAddress new_address = ReplacePort(instance_, base_address, port);
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_symbolizer.h 89 LoadedModule(const char *module_name, uptr base_address);
94 uptr base_address() const { return base_address_; } function in class:__sanitizer::LoadedModule
sanitizer_symbolizer_libcdep.cc 29 LoadedModule::LoadedModule(const char *module_name, uptr base_address) {
31 base_address_ = base_address;
274 uptr module_offset = addr - module->base_address();
332 uptr module_offset = addr - module->base_address();
343 info->start += module->base_address();
  /external/chromium_org/base/process/
process_metrics_win.cc 90 void* base_address = NULL; local
91 while (VirtualQueryEx(process_, base_address, &mbi, sizeof(mbi)) ==
108 if (new_base <= base_address) {
114 base_address = new_base;
  /bionic/tests/
dlfcn_test.cpp 154 void* base_address = NULL; local
165 base_address = reinterpret_cast<void*>(start);
172 ASSERT_EQ(info.dli_fbase, base_address);
  /external/grub/netboot/
w89c840.c 273 static int mdio_read(int base_address, int phy_id, int location);
274 static void mdio_write(int base_address, int phy_id, int location, int value);
788 static int mdio_read(int base_address, int phy_id, int location)
790 long mdio_addr = base_address + MIICtrl;
817 static void mdio_write(int base_address, int phy_id, int location, int value)
819 long mdio_addr = base_address + MIICtrl;
  /external/chromium/base/
process_util_win.cc 637 void* base_address = NULL; local
638 while (VirtualQueryEx(process_, base_address, &mbi, sizeof(mbi)) ==
655 if (new_base <= base_address) {
661 base_address = new_base;
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/asm/
kvm.h 45 __u64 base_address; member in struct:kvm_ioapic_state
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
edd.h 86 __u16 base_address; member in struct:edd_device_params::__anon37508::__anon37509
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/asm/
kvm.h 45 __u64 base_address; member in struct:kvm_ioapic_state
  /prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/linux/
edd.h 86 __u16 base_address; member in struct:edd_device_params::__anon39099::__anon39100
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/asm/
kvm.h 45 __u64 base_address; member in struct:kvm_ioapic_state
  /prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/linux/
edd.h 86 __u16 base_address; member in struct:edd_device_params::__anon40613::__anon40614

Completed in 250 milliseconds

1 2