Home
last modified time | relevance | path

Searched refs:symbolizer (Results 1 – 25 of 42) sorted by relevance

12

/external/llvm/test/tools/llvm-symbolizer/
Dfat.test1 RUN: echo 0 | llvm-symbolizer -obj=%p/Inputs/fat.o -default-arch=x86_64 | FileCheck --check-prefix=…
2 RUN: echo 0 | llvm-symbolizer -obj=%p/Inputs/fat.o -default-arch=x86_64h | FileCheck --check-prefix…
3 RUN: echo 0 | llvm-symbolizer -obj=%p/Inputs/fat.o -default-arch=armv7 | FileCheck --check-prefix=A…
4 RUN: echo 0 | llvm-symbolizer -obj=%p/Inputs/fat.o -default-arch=thumbv7em | FileCheck --check-pref…
5 RUN: echo 0 | llvm-symbolizer -obj=%p/Inputs/fat.o -default-arch=thumbv7m | FileCheck --check-prefi…
Ddsym.test3 RUN: llvm-symbolizer < %t.input | FileCheck %s --check-prefix=CHECK-NOHINT
4 RUN: llvm-symbolizer -dsym-hint=%p/Inputs/dsym-test-exe-differentname.dSYM < %t.input | FileCheck %…
Dsym.test20 RUN: llvm-symbolizer -print-address -obj=%p/Inputs/addr.exe < %p/Inputs/addr.inp | FileCheck %s
21 RUN: llvm-symbolizer -inlining -print-address -pretty-print -obj=%p/Inputs/addr.exe < %p/Inputs/add…
Dppc64.test7 RUN: %python -c "print('0x1000014c\n0x1000018c\n0x100001cc')" | llvm-symbolizer -obj=%p/Inputs/ppc6…
Dcoff-dwarf.test2 RUN: | llvm-symbolizer --inlining --relative-address -obj="%p/Inputs/coff-dwarf.exe" \
Dcoff-exports.test2 RUN: | llvm-symbolizer --inlining --relative-address -obj="%p/Inputs/coff-exports.exe" \
/external/llvm/docs/CommandGuide/
Dllvm-symbolizer.rst1 llvm-symbolizer - convert addresses into source code locations
7 :program:`llvm-symbolizer` [options]
12 :program:`llvm-symbolizer` reads object file names and addresses from standard
14 If object file is specified in command line, :program:`llvm-symbolizer`
29 $ llvm-symbolizer < addr.txt
53 $ llvm-symbolizer -obj=a.out < addr2.txt
61 $llvm-symbolizer -inlining -print-address -pretty-print -obj=addr.exe < addr.txt
64 $llvm-symbolizer -inlining -pretty-print -obj=addr.exe < addr.txt
121 :program:`llvm-symbolizer` returns 0. Other exit codes imply internal program error.
Dindex.rst31 llvm-symbolizer
/external/llvm/test/DebugInfo/
Dllvm-symbolizer.test19 RUN: echo "%p/Inputs/llvm-symbolizer-dwo-test 0x400514" >> %t.input
27 RUN: llvm-symbolizer --functions=linkage --inlining --demangle=false \
34 RUN: llvm-symbolizer --functions=linkage --inlining --demangle=false \
42 RUN: llvm-symbolizer --functions=linkage --inlining --demangle=false \
112 CHECK-NEXT: llvm-symbolizer-dwo-test.cc:11
129 ; func has been inlined into main by LTO. Check that the symbolizer is able
137 RUN: llvm-symbolizer < %t.input2 2>&1 | FileCheck %s --check-prefix=MISSING-FILE
142 RUN: llvm-symbolizer < %t.input3 | FileCheck %s --check-prefix=UNKNOWN-ARCH
150 RUN: llvm-symbolizer --obj %p/Inputs/dwarfdump-test.elf-x86-64 < %t.input4 \
160 RUN: llvm-symbolizer --obj %p/Inputs/llvm-symbolizer-test.elf-x86-64 < %t.input5 \
[all …]
Dllvm-symbolizer-zlib.test4 RUN: llvm-symbolizer < %t1.input | FileCheck %s
7 RUN: llvm-symbolizer < %t2.input | FileCheck %s
Dllvm-symbolizer-split-dwarf-empty.test6 RUN: llvm-symbolizer --functions=linkage --inlining --demangle=false \
/external/llvm/tools/llvm-symbolizer/
DCMakeLists.txt1 # FIXME: As we plan to execute llvm-symbolizer binary from compiler-rt
14 add_llvm_tool(llvm-symbolizer
15 llvm-symbolizer.cpp
DAndroid.bp2 name: "llvm-symbolizer",
4 srcs: ["llvm-symbolizer.cpp"],
/external/compiler-rt/lib/asan/
Dasan_suppressions.cc78 Symbolizer *symbolizer = Symbolizer::GetOrInit(); in IsStackTraceSuppressed() local
85 if (const char *module_name = symbolizer->GetModuleNameForPc(addr)) in IsStackTraceSuppressed()
91 SymbolizedStack *frames = symbolizer->SymbolizePC(addr); in IsStackTraceSuppressed()
/external/llvm/test/Unit/
Dlit.cfg36 # Propagate path to symbolizer for ASan/MSan.
37 for symbolizer in ['ASAN_SYMBOLIZER_PATH', 'MSAN_SYMBOLIZER_PATH']:
38 if symbolizer in os.environ:
39 config.environment[symbolizer] = os.environ[symbolizer]
/external/llvm/test/tools/llvm-symbolizer/pdb/
Dpdb.test2 RUN: | llvm-symbolizer -obj="%p/Inputs/test.exe" \
5 RUN: | llvm-symbolizer -obj="%p/Inputs/test.exe" -demangle=false \
13 RUN: | llvm-symbolizer -obj="%p/Inputs/test.exe" -demangle=false --relative-address \
Dmissing_pdb.test2 RUN: | llvm-symbolizer -obj="%p/Inputs/missing_pdb.exe" 2>%t.err \
9 llvm-symbolizer should print one error and two unknown line info records.
/external/clang/test/Unit/
Dlit.cfg35 # Propagate path to symbolizer for ASan/MSan.
36 for symbolizer in ['ASAN_SYMBOLIZER_PATH', 'MSAN_SYMBOLIZER_PATH']:
37 if symbolizer in os.environ:
38 config.environment[symbolizer] = os.environ[symbolizer]
/external/v8/src/
Dbase.isolate30 # For llvm-symbolizer.
38 '../third_party/llvm-build/Release+Asserts/bin/llvm-symbolizer<(EXECUTABLE_SUFFIX)',
/external/clang/
DAndroid.mk18 llvm-symbolizer \
55 llvm-symbolizer \
/external/libchrome/base/
Dbase.isolate42 # For llvm-symbolizer.
51 '../third_party/llvm-build/Release+Asserts/bin/llvm-symbolizer<(EXECUTABLE_SUFFIX)',
/external/compiler-rt/lib/asan/scripts/
Dasan_symbolize.py251 for symbolizer in self.symbolizer_list:
252 if symbolizer:
253 result = symbolizer.symbolize(addr, binary, offset)
258 def append_symbolizer(self, symbolizer): argument
259 self.symbolizer_list.append(symbolizer)
/external/v8/tools/
Drun-tests.py399 symbolizer = 'external_symbolizer_path=%s' % (
407 asan_options = [symbolizer]
422 symbolizer,
430 symbolizer,
434 os.environ['MSAN_OPTIONS'] = symbolizer
440 symbolizer,
/external/skia/infra/bots/recipe_modules/core/resources/
Delf_symbolizer.py226 def __init__(self, symbolizer): argument
227 self._symbolizer = symbolizer
228 self._lib_file_name = posixpath.basename(symbolizer.elf_file_path)
/external/compiler-rt/lib/sanitizer_common/
Dsanitizer_flags.inc25 "If set, use the online symbolizer from common sanitizer runtime to turn "
29 "Path to external symbolizer. If empty, the tool will search $PATH for "
30 "the symbolizer.")
33 "If set, allows online symbolizer to run addr2line binary to symbolize "
34 "stack traces (addr2line will only be used if llvm-symbolizer binary is "

12