Searched refs:load_addr (Results 1 - 25 of 37) sorted by relevance

12

/external/lldb/source/Target/
H A DSectionLoadList.cpp60 SectionLoadList::SetSectionLoadAddress (const lldb::SectionSP &section, addr_t load_addr, bool warn_multiple) argument
67 log->Printf ("SectionLoadList::%s (section = %p (%s.%s), load_addr = 0x%16.16" PRIx64 ")",
72 load_addr);
78 // Fill in the section -> load_addr map
83 if (load_addr == sta_pos->second)
86 sta_pos->second = load_addr;
89 m_sect_to_addr[section.get()] = load_addr;
91 // Fill in the load_addr -> section map
92 addr_to_sect_collection::iterator ats_pos = m_addr_to_sect.find(load_addr);
114 load_addr,
155 addr_t load_addr = sta_pos->second; local
167 SetSectionUnloaded(const lldb::SectionSP &section_sp, addr_t load_addr) argument
202 ResolveLoadAddress(addr_t load_addr, Address &so_addr) const argument
[all...]
H A DTarget.cpp1281 addr_t load_addr = LLDB_INVALID_ADDRESS; local
1299 load_addr = addr.GetOffset(); // "addr" doesn't have a section, so its offset is the load address
1300 m_section_load_list.ResolveLoadAddress (load_addr, resolved_addr);
1316 if (load_addr == LLDB_INVALID_ADDRESS)
1317 load_addr = resolved_addr.GetLoadAddress (this);
1319 if (load_addr == LLDB_INVALID_ADDRESS)
1332 bytes_read = m_process_sp->ReadMemory(load_addr, dst, dst_len, error);
1338 error.SetErrorStringWithFormat("read memory from 0x%" PRIx64 " failed", load_addr);
1340 error.SetErrorStringWithFormat("only %" PRIu64 " of %" PRIu64 " bytes were read from memory at 0x%" PRIx64, (uint64_t)bytes_read, (uint64_t)dst_len, load_addr);
1346 *load_addr_ptr = load_addr;
1898 GetCallableLoadAddress(lldb::addr_t load_addr, AddressClass addr_class) const argument
1943 GetOpcodeLoadAddress(lldb::addr_t load_addr, AddressClass addr_class) const argument
[all...]
/external/lldb/examples/python/
H A Dgdb_disassemble.py6 start_addr = lldb.frame.function.addr.load_addr
10 start_addr = lldb.frame.symbol.addr.load_addr
14 inst_addr = inst.addr.load_addr
H A Dsymbolication.py42 def __init__(self, target, load_addr):
44 self.load_addr = load_addr # The load address that this object represents
51 s = "%#16.16x" % (self.load_addr)
62 self.so_addr = self.target.ResolveLoadAddress (self.load_addr)
125 function_offset = self.load_addr - function_start_load_addr
245 def get_section_containing_load_addr (self, load_addr):
247 if section_info.contains(load_addr):
402 def find_image_containing_load_addr(self, load_addr):
404 if image.get_section_containing_load_addr (load_addr)
[all...]
/external/lldb/include/lldb/Target/
H A DSectionLoadList.h56 ResolveLoadAddress (lldb::addr_t load_addr, Address &so_addr) const;
59 SetSectionLoadAddress (const lldb::SectionSP &section_sp, lldb::addr_t load_addr, bool warn_multiple = false);
65 SetSectionUnloaded (const lldb::SectionSP &section_sp, lldb::addr_t load_addr);
H A DTarget.h516 CreateBreakpoint (lldb::addr_t load_addr,
644 /// Get \a load_addr as a callable code load address for this target
646 /// Take \a load_addr and potentially add any address bits that are
648 /// zero (if it already isn't) if \a load_addr is a thumb function.
655 GetCallableLoadAddress (lldb::addr_t load_addr, lldb::AddressClass addr_class = lldb::eAddressClassInvalid) const;
658 /// Get \a load_addr as an opcode for this target.
660 /// Take \a load_addr and potentially strip any address bits that are
662 /// clear bit zero (if it already isn't) if \a load_addr is a
663 /// thumb function and load_addr is in code.
670 GetOpcodeLoadAddress (lldb::addr_t load_addr, lld
[all...]
/external/lldb/source/Core/
H A DAddressRange.cpp108 addr_t load_addr = addr.GetLoadAddress(target);
109 if (load_addr == LLDB_INVALID_ADDRESS)
112 if (load_base_addr <= load_addr)
113 return (load_addr - load_base_addr) < GetByteSize();
119 AddressRange::ContainsLoadAddress (addr_t load_addr, Target *target) const argument
121 if (load_addr == LLDB_INVALID_ADDRESS)
128 if (load_base_addr <= load_addr)
129 return (load_addr - load_base_addr) < GetByteSize();
H A DAddress.cpp332 Address::SetCallableLoadAddress (lldb::addr_t load_addr, Target *target) argument
334 if (SetLoadAddress (load_addr, target))
353 Address::SetOpcodeLoadAddress (lldb::addr_t load_addr, Target *target) argument
355 if (SetLoadAddress (load_addr, target))
429 addr_t load_addr = GetLoadAddress (target); local
430 if (load_addr == LLDB_INVALID_ADDRESS)
436 s->Address (load_addr, addr_size);
739 addr_t load_addr = GetLoadAddress (target); local
740 if (load_addr != LLDB_INVALID_ADDRESS)
743 addr_t dereferenced_load_addr = process->ReadPointerFromMemory(load_addr, memory_erro
1037 SetLoadAddress(lldb::addr_t load_addr, Target *target) argument
[all...]
H A DValueObjectMemory.cpp220 lldb::addr_t load_addr = m_address.GetLoadAddress(target); local
221 if (load_addr != LLDB_INVALID_ADDRESS)
224 m_value.GetScalar() = load_addr;
H A DValueObjectVariable.cpp213 lldb::addr_t load_addr = so_addr.GetLoadAddress (target); local
214 if (load_addr != LLDB_INVALID_ADDRESS)
217 m_value.GetScalar() = load_addr;
H A DDisassembler.cpp1047 InstructionList::GetIndexOfInstructionAtLoadAddress (lldb::addr_t load_addr, Target &target) argument
1050 address.SetLoadAddress(load_addr, &target);
1081 lldb::addr_t load_addr = LLDB_INVALID_ADDRESS; local
1087 &load_addr);
1096 const bool data_from_file = load_addr == LLDB_INVALID_ADDRESS;
1137 lldb::addr_t load_addr = LLDB_INVALID_ADDRESS; local
1143 &load_addr);
1145 const bool data_from_file = load_addr == LLDB_INVALID_ADDRESS;
/external/lldb/scripts/Python/interface/
H A DSBAddress.i59 SBAddress (lldb::addr_t load_addr, lldb::SBTarget &target);
76 SetLoadAddress (lldb::addr_t load_addr,
147 def __set_load_addr_property__ (self, load_addr):
149 return self.SetLoadAddress (load_addr, target)
193 __swig_getmethods__["load_addr"] = __get_load_addr_property__
194 __swig_setmethods__["load_addr"] = __set_load_addr_property__
195 if _newclass: load_addr = property(__get_load_addr_property__, __set_load_addr_property__, doc='''A read/write property that gets/sets the SBAddress using load address. The setter resolves SBAddress using the SBTarget from lldb.target.''')
/external/lldb/source/Expression/
H A DMaterializer.cpp153 const lldb::addr_t load_addr = process_address + m_offset; local
158 (uint64_t)load_addr,
177 map.WriteScalarToMemory(load_addr,
203 const lldb::addr_t load_addr = process_address + m_offset; local
225 map.ReadPointerFromMemory(&location, load_addr, read_error);
328 const lldb::addr_t load_addr = process_address + m_offset; local
330 dump_stream.Printf("0x%" PRIx64 ": EntityPersistentVariable (%s)\n", load_addr, m_persistent_variable_sp->GetName().AsCString());
337 map.ReadMemory(data.GetBytes(), load_addr, m_size, err);
347 extractor.DumpHexBytes(&dump_stream, data.GetBytes(), data.GetByteSize(), 16, load_addr);
358 map.ReadPointerFromMemory (&target_address, load_addr, er
425 const lldb::addr_t load_addr = process_address + m_offset; local
551 const lldb::addr_t load_addr = process_address + m_offset; local
615 const lldb::addr_t load_addr = process_address + m_offset; local
739 const lldb::addr_t load_addr = process_address + m_offset; local
797 const lldb::addr_t load_addr = process_address + m_offset; local
883 const lldb::addr_t load_addr = process_address + m_offset; local
1000 const lldb::addr_t load_addr = process_address + m_offset; local
1049 const lldb::addr_t load_addr = process_address + m_offset; local
1067 const lldb::addr_t load_addr = process_address + m_offset; local
1128 const lldb::addr_t load_addr = process_address + m_offset; local
1189 const lldb::addr_t load_addr = process_address + m_offset; local
1243 const lldb::addr_t load_addr = process_address + m_offset; local
[all...]
H A DClangExpressionDeclMap.cpp1489 lldb::addr_t load_addr = so_addr.GetLoadAddress(target); local
1491 if (load_addr != LLDB_INVALID_ADDRESS)
1493 var_location.GetScalar() = load_addr;
1839 lldb::addr_t load_addr = fun_address->GetCallableLoadAddress(target, is_indirect_function); local
1853 if (load_addr != LLDB_INVALID_ADDRESS)
1856 parser_vars->m_lldb_value.GetScalar() = load_addr;
/external/compiler-rt/lib/asan/scripts/
H A Dsymbolize.py44 load_addr = int(match.group(1), 16)
45 load_addresses[path] = load_addr
46 return load_addr
75 load_addr = android_get_load_address(binary)
76 addr = hex(int(addr, 16) + load_addr)
/external/lldb/include/lldb/API/
H A DSBAddress.h29 SBAddress (lldb::addr_t load_addr, lldb::SBTarget &target);
52 SetLoadAddress (lldb::addr_t load_addr,
/external/lldb/source/API/
H A DSBAddress.cpp51 SBAddress::SBAddress (lldb::addr_t load_addr, lldb::SBTarget &target) : argument
54 SetLoadAddress (load_addr, target);
143 SBAddress::SetLoadAddress (lldb::addr_t load_addr, lldb::SBTarget &target) argument
148 *this = target.ResolveLoadAddress(load_addr);
157 m_opaque_ap->SetOffset(load_addr);
/external/lldb/include/lldb/Core/
H A DAddress.h398 /// Set the address to represent \a load_addr.
401 /// \a target that contains \a load_addr. If successful, this
404 /// be \a load_addr.
406 /// @param[in] load_addr
422 SetLoadAddress (lldb::addr_t load_addr, Target *target);
425 SetOpcodeLoadAddress (lldb::addr_t load_addr, Target *target);
428 SetCallableLoadAddress (lldb::addr_t load_addr, Target *target);
H A DAddressRange.h169 /// Check if the resolved load address \a load_addr is contained
181 ContainsLoadAddress (lldb::addr_t load_addr, Target *target) const;
H A DDisassembler.h176 GetIndexOfInstructionAtLoadAddress (lldb::addr_t load_addr, Target &target);
/external/lldb/include/lldb/Symbol/
H A DBlock.h451 GetRangeContainingLoadAddress (lldb::addr_t load_addr, Target &target, AddressRange &range);
/external/lldb/source/Plugins/Disassembler/llvm/
H A DDisassemblerLLVMC.cpp272 const lldb::addr_t load_addr = m_address.GetLoadAddress(target); local
273 if (load_addr != LLDB_INVALID_ADDRESS)
275 pc = load_addr;
/external/lldb/test/
H A Dlldbutil.py672 load_addr = addrs[i].GetLoadAddress(target)
678 num=i, addr=load_addr, mod=mods[i], symbol=symbols[i], offset=symbol_offset)
681 num=i, addr=load_addr, mod=mods[i],
/external/lldb/source/Plugins/DynamicLoader/Darwin-Kernel/
H A DDynamicLoaderDarwinKernel.h194 SetLoadAddress (lldb::addr_t load_addr); // Address of the Mach-O header for this binary
/external/lldb/source/Plugins/Process/gdb-remote/
H A DProcessGDBRemote.h178 GetMemoryRegionInfo (lldb::addr_t load_addr,

Completed in 372 milliseconds

12