/external/chromium_org/chrome/browser/install_verification/win/ |
module_info.h | 13 ModuleInfo() : base_address(0), size(0) { 19 : base_address(module_base_address), 26 return base_address < compare.base_address; 31 return address >= base_address && address < base_address + size; 35 uintptr_t base_address; member in struct:ModuleInfo
|
imported_module_verification.cc | 29 return module.base_address + module.size < address;
|
/art/compiler/ |
elf_fixup.h | 36 // Fixup .dynamic d_ptr values for the expected base_address. 37 static bool FixupDynamic(ElfFile& elf_file, uintptr_t base_address); 40 static bool FixupSectionHeaders(ElfFile& elf_file, uintptr_t base_address); 43 static bool FixupProgramHeaders(ElfFile& elf_file, uintptr_t base_address); 46 static bool FixupSymbols(ElfFile& elf_file, uintptr_t base_address, bool dynamic); 49 static bool FixupRelocations(ElfFile& elf_file, uintptr_t base_address);
|
elf_fixup.cc | 38 Elf32_Off base_address = oat_data_begin - oatdata_address; local 40 if (!FixupDynamic(*elf_file.get(), base_address)) { 44 if (!FixupSectionHeaders(*elf_file.get(), base_address)) { 48 if (!FixupProgramHeaders(*elf_file.get(), base_address)) { 52 if (!FixupSymbols(*elf_file.get(), base_address, true)) { 56 if (!FixupSymbols(*elf_file.get(), base_address, false)) { 60 if (!FixupRelocations(*elf_file.get(), base_address)) { 68 bool ElfFixup::FixupDynamic(ElfFile& elf_file, uintptr_t base_address) { 77 d_ptr, d_ptr + base_address); 79 d_ptr += base_address; [all...] |
/external/chromium_org/sandbox/win/src/ |
interception_agent.h | 49 void* base_address); 52 void OnDllUnload(void* base_address); 65 // Performs the patching of the dll loaded at base_address.
|
target_process.h | 120 HMODULE base_address); 127 TargetProcess* MakeTestTargetProcess(HANDLE process, HMODULE base_address);
|
interception_agent.cc | 86 void* base_address) { 112 new(NT_PAGE, base_address) char[buffer_bytes]); 120 dlls_[i]->base = base_address; 134 void InterceptionAgent::OnDllUnload(void* base_address) { 136 if (dlls_[i] && dlls_[i]->base == base_address) {
|
target_process.cc | 328 TargetProcess* MakeTestTargetProcess(HANDLE process, HMODULE base_address) { 333 target->base_address_ = base_address;
|
/art/disassembler/ |
disassembler.h | 37 DisassemblerOptions(bool absolute_addresses, const uint8_t* base_address) 38 : absolute_addresses_(absolute_addresses), base_address_(base_address) {}
|
/external/chromium_org/ppapi/tests/ |
test_tcp_server_socket_private_disallowed.cc | 58 PP_NetAddress_Private base_address, address; local 59 pp::NetAddressPrivate::GetAnyAddress(false, &base_address); 61 base_address, 0, &address));
|
test_tcp_server_socket_private.cc | 127 PP_NetAddress_Private base_address; local 128 ASSERT_SUBTEST_SUCCESS(GetLocalAddress(&base_address)); 129 if (!NetAddressPrivate::ReplacePort(base_address, 0, address))
|
test_udp_socket_private.cc | 104 PP_NetAddress_Private base_address; local 105 ASSERT_SUBTEST_SUCCESS(GetLocalAddress(&base_address)); 109 if (!pp::NetAddressPrivate::ReplacePort(base_address, port, address))
|
test_udp_socket.cc | 129 pp::NetAddress base_address; local 130 ASSERT_SUBTEST_SUCCESS(GetLocalAddress(&base_address)); 134 pp::NetAddress new_address = ReplacePort(instance_, base_address, port);
|
/external/chromium_org/base/third_party/symbolize/ |
symbolize.h | 128 // address into |base_address|, copies the object file name into 135 uint64_t &base_address,
|
symbolize.cc | 501 // address into |base_address|, copies the object file name into 509 uint64_t &base_address, 597 base_address = ((num_maps == 1) ? 0U : start_address) - file_offset; 730 uint64_t base_address = 0; 741 base_address, out + 1, 745 base_address, 759 SafeAppendHexNumber(pc0 - base_address, out, out_size);
|
/external/chromium_org/chrome/browser/safe_browsing/ |
environment_data_collection_win_unittest.cc | 67 int base_address = 0x77770000; local 94 dll->set_base_address(base_address);
|
environment_data_collection_win.cc | 62 dll->set_base_address(it->base_address);
|
/external/chromium_org/base/process/ |
process_metrics_win.cc | 90 void* base_address = NULL; local 91 while (VirtualQueryEx(process_, base_address, &mbi, sizeof(mbi)) == 108 if (new_base <= base_address) { 114 base_address = new_base;
|
/external/lldb/source/Symbol/ |
Symbol.cpp | 292 const Address &base_address = m_addr_range.GetBaseAddress(); local 293 Function *function = base_address.CalculateSymbolContextFunction(); 302 ModuleSP module_sp (base_address.GetModule()); 306 uint32_t resolved_flags = module_sp->ResolveSymbolContextForAddress (base_address, 315 Address addr (base_address);
|
/bionic/tests/ |
dlfcn_test.cpp | 190 void* base_address = NULL; local 199 base_address = reinterpret_cast<void*>(start); 206 ASSERT_EQ(info.dli_fbase, base_address);
|
/external/compiler-rt/lib/sanitizer_common/ |
sanitizer_coverage_mapping_libcdep.cc | 88 uptr base = modules[i].base_address();
|
sanitizer_common.cc | 215 LoadedModule::LoadedModule(const char *module_name, uptr base_address) { 217 base_address_ = base_address;
|
sanitizer_procmaps_linux.cc | 271 uptr base_address = (i ? cur_beg : 0) - cur_offset; local 272 LoadedModule *cur_module = new(mem) LoadedModule(cur_name, base_address);
|
/bionic/libc/kernel/uapi/linux/ |
edd.h | 79 __u16 base_address; member in struct:edd_device_params::__anon406::__anon407
|
/development/ndk/platforms/android-L/include/linux/ |
edd.h | 79 __u16 base_address; member in struct:edd_device_params::__anon2016::__anon2017
|