Searched refs:symbolizer (Results 1 – 25 of 41) sorted by relevance
12
/external/llvm/test/tools/llvm-symbolizer/ |
D | fat.test | 1 RUN: echo 0 | llvm-symbolizer -obj=%p/Inputs/fat.o -default-arch=x86_64 | FileCheck --check-prefix=… 2 RUN: echo 0 | llvm-symbolizer -obj=%p/Inputs/fat.o -default-arch=x86_64h | FileCheck --check-prefix… 3 RUN: echo 0 | llvm-symbolizer -obj=%p/Inputs/fat.o -default-arch=armv7 | FileCheck --check-prefix=A… 4 RUN: echo 0 | llvm-symbolizer -obj=%p/Inputs/fat.o -default-arch=thumbv7em | FileCheck --check-pref… 5 RUN: echo 0 | llvm-symbolizer -obj=%p/Inputs/fat.o -default-arch=thumbv7m | FileCheck --check-prefi…
|
D | dsym.test | 3 RUN: llvm-symbolizer < %t.input | FileCheck %s --check-prefix=CHECK-NOHINT 4 RUN: llvm-symbolizer -dsym-hint=%p/Inputs/dsym-test-exe-differentname.dSYM < %t.input | FileCheck %…
|
D | sym.test | 20 RUN: llvm-symbolizer -print-address -obj=%p/Inputs/addr.exe < %p/Inputs/addr.inp | FileCheck %s 21 RUN: llvm-symbolizer -inlining -print-address -pretty-print -obj=%p/Inputs/addr.exe < %p/Inputs/add…
|
D | ppc64.test | 7 RUN: %python -c "print('0x1000014c\n0x1000018c\n0x100001cc')" | llvm-symbolizer -obj=%p/Inputs/ppc6…
|
D | coff-dwarf.test | 2 RUN: | llvm-symbolizer --inlining --relative-address -obj="%p/Inputs/coff-dwarf.exe" \
|
D | coff-exports.test | 2 RUN: | llvm-symbolizer --inlining --relative-address -obj="%p/Inputs/coff-exports.exe" \
|
/external/llvm/docs/CommandGuide/ |
D | llvm-symbolizer.rst | 1 llvm-symbolizer - convert addresses into source code locations 7 :program:`llvm-symbolizer` [options] 12 :program:`llvm-symbolizer` reads object file names and addresses from standard 14 If object file is specified in command line, :program:`llvm-symbolizer` 29 $ llvm-symbolizer < addr.txt 53 $ llvm-symbolizer -obj=a.out < addr2.txt 61 $llvm-symbolizer -inlining -print-address -pretty-print -obj=addr.exe < addr.txt 64 $llvm-symbolizer -inlining -pretty-print -obj=addr.exe < addr.txt 121 :program:`llvm-symbolizer` returns 0. Other exit codes imply internal program error.
|
D | index.rst | 31 llvm-symbolizer
|
/external/llvm/test/DebugInfo/ |
D | llvm-symbolizer.test | 19 RUN: echo "%p/Inputs/llvm-symbolizer-dwo-test 0x400514" >> %t.input 27 RUN: llvm-symbolizer --functions=linkage --inlining --demangle=false \ 34 RUN: llvm-symbolizer --functions=linkage --inlining --demangle=false \ 42 RUN: llvm-symbolizer --functions=linkage --inlining --demangle=false \ 112 CHECK-NEXT: llvm-symbolizer-dwo-test.cc:11 129 ; func has been inlined into main by LTO. Check that the symbolizer is able 137 RUN: llvm-symbolizer < %t.input2 2>&1 | FileCheck %s --check-prefix=MISSING-FILE 142 RUN: llvm-symbolizer < %t.input3 | FileCheck %s --check-prefix=UNKNOWN-ARCH 150 RUN: llvm-symbolizer --obj %p/Inputs/dwarfdump-test.elf-x86-64 < %t.input4 \ 160 RUN: llvm-symbolizer --obj %p/Inputs/llvm-symbolizer-test.elf-x86-64 < %t.input5 \ [all …]
|
D | llvm-symbolizer-zlib.test | 4 RUN: llvm-symbolizer < %t1.input | FileCheck %s 7 RUN: llvm-symbolizer < %t2.input | FileCheck %s
|
D | llvm-symbolizer-split-dwarf-empty.test | 6 RUN: llvm-symbolizer --functions=linkage --inlining --demangle=false \
|
/external/llvm/tools/llvm-symbolizer/ |
D | CMakeLists.txt | 1 # FIXME: As we plan to execute llvm-symbolizer binary from compiler-rt 14 add_llvm_tool(llvm-symbolizer 15 llvm-symbolizer.cpp
|
D | Android.bp | 2 name: "llvm-symbolizer", 4 srcs: ["llvm-symbolizer.cpp"],
|
/external/compiler-rt/lib/asan/ |
D | asan_suppressions.cc | 78 Symbolizer *symbolizer = Symbolizer::GetOrInit(); in IsStackTraceSuppressed() local 85 if (const char *module_name = symbolizer->GetModuleNameForPc(addr)) in IsStackTraceSuppressed() 91 SymbolizedStack *frames = symbolizer->SymbolizePC(addr); in IsStackTraceSuppressed()
|
/external/llvm/test/Unit/ |
D | lit.cfg | 36 # Propagate path to symbolizer for ASan/MSan. 37 for symbolizer in ['ASAN_SYMBOLIZER_PATH', 'MSAN_SYMBOLIZER_PATH']: 38 if symbolizer in os.environ: 39 config.environment[symbolizer] = os.environ[symbolizer]
|
/external/llvm/test/tools/llvm-symbolizer/pdb/ |
D | pdb.test | 2 RUN: | llvm-symbolizer -obj="%p/Inputs/test.exe" \ 5 RUN: | llvm-symbolizer -obj="%p/Inputs/test.exe" -demangle=false \ 13 RUN: | llvm-symbolizer -obj="%p/Inputs/test.exe" -demangle=false --relative-address \
|
D | missing_pdb.test | 2 RUN: | llvm-symbolizer -obj="%p/Inputs/missing_pdb.exe" 2>%t.err \ 9 llvm-symbolizer should print one error and two unknown line info records.
|
/external/clang/test/Unit/ |
D | lit.cfg | 35 # Propagate path to symbolizer for ASan/MSan. 36 for symbolizer in ['ASAN_SYMBOLIZER_PATH', 'MSAN_SYMBOLIZER_PATH']: 37 if symbolizer in os.environ: 38 config.environment[symbolizer] = os.environ[symbolizer]
|
/external/v8/src/ |
D | base.isolate | 27 # For llvm-symbolizer. 35 '../third_party/llvm-build/Release+Asserts/bin/llvm-symbolizer<(EXECUTABLE_SUFFIX)',
|
/external/clang/ |
D | Android.mk | 18 llvm-symbolizer \ 55 llvm-symbolizer \
|
/external/libchrome/base/ |
D | base.isolate | 42 # For llvm-symbolizer. 51 '../third_party/llvm-build/Release+Asserts/bin/llvm-symbolizer<(EXECUTABLE_SUFFIX)',
|
/external/compiler-rt/lib/asan/scripts/ |
D | asan_symbolize.py | 251 for symbolizer in self.symbolizer_list: 252 if symbolizer: 253 result = symbolizer.symbolize(addr, binary, offset) 258 def append_symbolizer(self, symbolizer): argument 259 self.symbolizer_list.append(symbolizer)
|
/external/v8/tools/ |
D | run-tests.py | 397 symbolizer = 'external_symbolizer_path=%s' % ( 405 os.environ['ASAN_OPTIONS'] = symbolizer 412 symbolizer, 420 symbolizer, 424 os.environ['MSAN_OPTIONS'] = symbolizer 430 symbolizer,
|
/external/skia/infra/bots/recipe_modules/core/resources/ |
D | elf_symbolizer.py | 226 def __init__(self, symbolizer): argument 227 self._symbolizer = symbolizer 228 self._lib_file_name = posixpath.basename(symbolizer.elf_file_path)
|
/external/compiler-rt/lib/sanitizer_common/ |
D | sanitizer_flags.inc | 25 "If set, use the online symbolizer from common sanitizer runtime to turn " 29 "Path to external symbolizer. If empty, the tool will search $PATH for " 30 "the symbolizer.") 33 "If set, allows online symbolizer to run addr2line binary to symbolize " 34 "stack traces (addr2line will only be used if llvm-symbolizer binary is "
|
12