Home
last modified time | relevance | path

Searched refs:VirtualAddress (Results 1 – 21 of 21) sorted by relevance

/external/llvm/test/tools/llvm-readobj/
Dprogram-headers.test14 ELF-I386-NEXT: VirtualAddress: 0x8048000
27 ELF-I386-NEXT: VirtualAddress: 0x0
43 ELF-X86-64-NEXT: VirtualAddress: 0x400000
56 ELF-X86-64-NEXT: VirtualAddress: 0x4000F4
68 ELF-X86-64-NEXT: VirtualAddress: 0x0
88 ELF-MIPS-NEXT: VirtualAddress: 0x400074
100 ELF-MIPS-NEXT: VirtualAddress: 0x400000
120 ELF-MIPS64-NEXT: VirtualAddress: 0x120000000
Dsections.test21 COFF-NEXT: VirtualAddress: 0x0
39 COFF-NEXT: VirtualAddress: 0x0
Dsections-ext.test21 COFF-NEXT: VirtualAddress: 0x0
/external/chromium_org/chrome/browser/safe_browsing/
Dpe_image_reader_win.cc294 if (section_header->VirtualAddress > relative_address) in FindSectionFromRva()
297 size_t address_offset = relative_address - section_header->VirtualAddress; in FindSectionFromRva()
314 FindSectionFromRva(entry->VirtualAddress); in GetImageData()
319 size_t data_offset = entry->VirtualAddress - header->VirtualAddress; in GetImageData()
/external/chromium_org/chrome/browser/install_verification/win/
Dimported_module_verification.cc50 if (!nt_headers->OptionalHeader.DataDirectory[1].VirtualAddress) in ScanImportAddressTable()
54 nt_headers->OptionalHeader.DataDirectory[1].VirtualAddress / in ScanImportAddressTable()
/external/valgrind/main/coregrind/m_debuginfo/
Dreadpdb.c162 unsigned long VirtualAddress; member
223 unsigned long VirtualAddress; member
1267 vsym.addr = bias + sectp[sym->data_v1.segment-1].VirtualAddress in DEBUG_SnarfCodeView()
1293 vsym.addr = bias + sectp[sym->data_v2.segment-1].VirtualAddress in DEBUG_SnarfCodeView()
1327 vsym.addr = bias + sectp[sym->public_v3.segment-1].VirtualAddress in DEBUG_SnarfCodeView()
1363 vsym.addr = bias + sectp[sym->proc_v1.segment-1].VirtualAddress in DEBUG_SnarfCodeView()
1385 vsym.addr = bias + sectp[sym->proc_v2.segment-1].VirtualAddress in DEBUG_SnarfCodeView()
1409 vsym.addr = bias + sectp[sym->proc_v3.segment-1].VirtualAddress in DEBUG_SnarfCodeView()
1621 Addr startaddr = bias + sectp[segno-1].VirtualAddress in DEBUG_SnarfLinetab()
1623 Addr endaddr = bias + sectp[segno-1].VirtualAddress in DEBUG_SnarfLinetab()
[all …]
/external/chromium_org/base/win/
Dpe_image.cc111 nt_headers->OptionalHeader.DataDirectory[directory].VirtualAddress); in GetImageDirectoryEntryAddr()
121 PEImage::RVAToAddr(section->VirtualAddress)); in GetImageSectionFromAddr()
246 PVOID section_start = RVAToAddr(section->VirtualAddress); in EnumSections()
327 PVOID address = RVAToAddr(base->VirtualAddress + (*reloc & 0x0FFF)); in EnumRelocs()
545 section_header->VirtualAddress)); in ImageAddrToOnDiskOffset()
/external/llvm/test/Object/
Dobj2yaml.test17 COFF-I386-NEXT: - VirtualAddress: 14
21 COFF-I386: - VirtualAddress: 19
25 COFF-I386: - VirtualAddress: 24
100 COFF-X86-64-NEXT: - VirtualAddress: 15
104 COFF-X86-64: - VirtualAddress: 20
108 COFF-X86-64: - VirtualAddress: 25
123 COFF-X86-64-NEXT: - VirtualAddress: 0
/external/chromium_org/tools/symsrc/
Dpefile.py824 offset = start - self.VirtualAddress
835 return offset - self.PointerToRawData + self.VirtualAddress
839 return (rva - self.VirtualAddress) + self.PointerToRawData
849 return self.PointerToRawData <= offset < self.VirtualAddress + self.SizeOfRawData
866 return self.VirtualAddress <= rva < self.VirtualAddress + size
1733 if section.VirtualAddress > 0x10000000:
1831 if dir_entry.VirtualAddress:
1832 value = entry[1](dir_entry.VirtualAddress, dir_entry.Size)
1952 rva+rlc_size, rlc.VirtualAddress, rlc.SizeOfBlock-rlc_size)
2955 if section.VirtualAddress >= max_virtual_address:
[all …]
/external/llvm/test/MC/COFF/
Dmodule-asm.ll13 ; CHECK-NEXT: VirtualAddress: 0
/external/llvm/tools/obj2yaml/
Dcoff2yaml.cpp72 Rel.VirtualAddress = reloc->VirtualAddress; in dumpSections()
/external/llvm/include/llvm/Support/
DCOFF.h222 uint32_t VirtualAddress; member
273 uint32_t VirtualAddress; member
/external/llvm/lib/Object/
DCOFFObjectFile.cpp149 Result = Section->VirtualAddress + Symb->Value; in getSymbolAddress()
257 Result = Sec->VirtualAddress; in getSectionAddress()
378 return FirstReloc->VirtualAddress; in getNumberOfRelocations()
443 uint32_t SectionStart = Section->VirtualAddress; in getRvaPtr()
444 uint32_t SectionEnd = Section->VirtualAddress + Section->VirtualSize; in getRvaPtr()
867 Res = toRel(Rel)->VirtualAddress; in getRelocationOffset()
DCOFFYAML.cpp292 IO.mapRequired("VirtualAddress", Rel.VirtualAddress); in mapping()
/external/llvm/lib/MC/
DWinCOFFObjectWriter.cpp634 WriteLE32(S.VirtualAddress); in WriteSectionHeader()
645 WriteLE32(R.VirtualAddress); in WriteRelocation()
763 Reloc.Data.VirtualAddress = Layout.getFragmentOffset(Fragment); in RecordRelocation()
775 Reloc.Data.VirtualAddress += Fixup.getOffset(); in RecordRelocation()
996 r.VirtualAddress = (*i)->Relocations.size() + 1; in WriteObject()
/external/llvm/tools/yaml2obj/
Dyaml2coff.cpp240 << binary_le(i->Header.VirtualAddress) in writeCOFF()
267 OS << binary_le(R.VirtualAddress) in writeCOFF()
/external/llvm/include/llvm/Object/
DCOFFYAML.h44 uint32_t VirtualAddress; member
DCOFF.h245 support::ulittle32_t VirtualAddress; member
263 support::ulittle32_t VirtualAddress; member
/external/chromium_org/chrome/browser/safe_browsing/incident_reporting/
Dmodule_integrity_verifier_win.cc220 mem_peimage.RVAToAddr(mem_code_header->VirtualAddress)); in GetCodeAddrsAndSize()
/external/chromium_org/chrome/app/
Dimage_pre_reader_win.cc310 static_cast<uint8*>(pe_image.RVAToAddr(section->VirtualAddress)); in PartialPreReadImageInMemory()
/external/llvm/tools/llvm-readobj/
DCOFFDumper.cpp611 W.printHex ("VirtualAddress", Section->VirtualAddress); in printSections()