HomeSort by relevance Sort by last modified time
    Searched refs:base_address (Results 1 - 25 of 51) sorted by null

1 2 3

  /external/chromium_org/chrome/browser/install_verification/win/
module_info.h 13 ModuleInfo() : base_address(0), size(0) {
19 : base_address(module_base_address),
26 return base_address < compare.base_address;
31 return address >= base_address && address < base_address + size;
35 uintptr_t base_address; member in struct:ModuleInfo
imported_module_verification.cc 29 return module.base_address + module.size < address;
  /art/compiler/
elf_fixup.h 36 // Fixup .dynamic d_ptr values for the expected base_address.
37 static bool FixupDynamic(ElfFile& elf_file, uintptr_t base_address);
40 static bool FixupSectionHeaders(ElfFile& elf_file, uintptr_t base_address);
43 static bool FixupProgramHeaders(ElfFile& elf_file, uintptr_t base_address);
46 static bool FixupSymbols(ElfFile& elf_file, uintptr_t base_address, bool dynamic);
49 static bool FixupRelocations(ElfFile& elf_file, uintptr_t base_address);
elf_fixup.cc 38 Elf32_Off base_address = oat_data_begin - oatdata_address; local
40 if (!FixupDynamic(*elf_file.get(), base_address)) {
44 if (!FixupSectionHeaders(*elf_file.get(), base_address)) {
48 if (!FixupProgramHeaders(*elf_file.get(), base_address)) {
52 if (!FixupSymbols(*elf_file.get(), base_address, true)) {
56 if (!FixupSymbols(*elf_file.get(), base_address, false)) {
60 if (!FixupRelocations(*elf_file.get(), base_address)) {
68 bool ElfFixup::FixupDynamic(ElfFile& elf_file, uintptr_t base_address) {
77 d_ptr, d_ptr + base_address);
79 d_ptr += base_address;
    [all...]
  /external/chromium_org/sandbox/win/src/
interception_agent.h 49 void* base_address);
52 void OnDllUnload(void* base_address);
65 // Performs the patching of the dll loaded at base_address.
target_process.h 120 HMODULE base_address);
127 TargetProcess* MakeTestTargetProcess(HANDLE process, HMODULE base_address);
interception_agent.cc 86 void* base_address) {
112 new(NT_PAGE, base_address) char[buffer_bytes]);
120 dlls_[i]->base = base_address;
134 void InterceptionAgent::OnDllUnload(void* base_address) {
136 if (dlls_[i] && dlls_[i]->base == base_address) {
target_process.cc 328 TargetProcess* MakeTestTargetProcess(HANDLE process, HMODULE base_address) {
333 target->base_address_ = base_address;
  /art/disassembler/
disassembler.h 37 DisassemblerOptions(bool absolute_addresses, const uint8_t* base_address)
38 : absolute_addresses_(absolute_addresses), base_address_(base_address) {}
  /external/chromium_org/ppapi/tests/
test_tcp_server_socket_private_disallowed.cc 58 PP_NetAddress_Private base_address, address; local
59 pp::NetAddressPrivate::GetAnyAddress(false, &base_address);
61 base_address, 0, &address));
test_tcp_server_socket_private.cc 127 PP_NetAddress_Private base_address; local
128 ASSERT_SUBTEST_SUCCESS(GetLocalAddress(&base_address));
129 if (!NetAddressPrivate::ReplacePort(base_address, 0, address))
test_udp_socket_private.cc 104 PP_NetAddress_Private base_address; local
105 ASSERT_SUBTEST_SUCCESS(GetLocalAddress(&base_address));
109 if (!pp::NetAddressPrivate::ReplacePort(base_address, port, address))
test_udp_socket.cc 129 pp::NetAddress base_address; local
130 ASSERT_SUBTEST_SUCCESS(GetLocalAddress(&base_address));
134 pp::NetAddress new_address = ReplacePort(instance_, base_address, port);
  /external/chromium_org/base/third_party/symbolize/
symbolize.h 128 // address into |base_address|, copies the object file name into
135 uint64_t &base_address,
symbolize.cc 501 // address into |base_address|, copies the object file name into
509 uint64_t &base_address,
597 base_address = ((num_maps == 1) ? 0U : start_address) - file_offset;
730 uint64_t base_address = 0;
741 base_address, out + 1,
745 base_address,
759 SafeAppendHexNumber(pc0 - base_address, out, out_size);
  /external/chromium_org/chrome/browser/safe_browsing/
environment_data_collection_win_unittest.cc 67 int base_address = 0x77770000; local
94 dll->set_base_address(base_address);
environment_data_collection_win.cc 62 dll->set_base_address(it->base_address);
  /external/chromium_org/base/process/
process_metrics_win.cc 90 void* base_address = NULL; local
91 while (VirtualQueryEx(process_, base_address, &mbi, sizeof(mbi)) ==
108 if (new_base <= base_address) {
114 base_address = new_base;
  /external/lldb/source/Symbol/
Symbol.cpp 292 const Address &base_address = m_addr_range.GetBaseAddress(); local
293 Function *function = base_address.CalculateSymbolContextFunction();
302 ModuleSP module_sp (base_address.GetModule());
306 uint32_t resolved_flags = module_sp->ResolveSymbolContextForAddress (base_address,
315 Address addr (base_address);
  /bionic/tests/
dlfcn_test.cpp 190 void* base_address = NULL; local
199 base_address = reinterpret_cast<void*>(start);
206 ASSERT_EQ(info.dli_fbase, base_address);
  /external/compiler-rt/lib/sanitizer_common/
sanitizer_coverage_mapping_libcdep.cc 88 uptr base = modules[i].base_address();
sanitizer_common.cc 215 LoadedModule::LoadedModule(const char *module_name, uptr base_address) {
217 base_address_ = base_address;
sanitizer_procmaps_linux.cc 271 uptr base_address = (i ? cur_beg : 0) - cur_offset; local
272 LoadedModule *cur_module = new(mem) LoadedModule(cur_name, base_address);
  /bionic/libc/kernel/uapi/linux/
edd.h 79 __u16 base_address; member in struct:edd_device_params::__anon406::__anon407
  /development/ndk/platforms/android-L/include/linux/
edd.h 79 __u16 base_address; member in struct:edd_device_params::__anon2016::__anon2017

Completed in 527 milliseconds

1 2 3