Searched refs:addr2line (Results 1 - 10 of 10) sorted by relevance
/external/chromium_org/third_party/mesa/src/src/gallium/tools/ |
H A D | addr2line.sh | 22 addr2line -p -e "$bin" -a -f < "$i"|sed -nre 's@^0x0*([^:]*): ([^?]*)$@s|'"$bin"'(+0x\1)|\2|g@gp'
|
/external/mesa3d/src/gallium/tools/ |
H A D | addr2line.sh | 22 addr2line -p -e "$bin" -a -f < "$i"|sed -nre 's@^0x0*([^:]*): ([^?]*)$@s|'"$bin"'(+0x\1)|\2|g@gp'
|
/external/chromium_org/native_client_sdk/src/tools/ |
H A D | decode_dump.py | 23 addr2line, library_paths, platform): 29 addr2line: path to appropriate addr2line. 39 self.addr2line = addr2line 94 """Use addr2line to decode a code address. 113 self.addr2line, '-f', '--inlines', '-e', filename, '0x%08x' % address, 186 parser.add_option('-a', '--addr2line', dest='addr2line', 187 help='path to appropriate addr2line') [all...] |
/external/compiler-rt/lib/sanitizer_common/ |
H A D | sanitizer_symbolizer_posix_libcdep.cc | 399 Addr2LineProcess *addr2line = 0; 403 addr2line = addr2line_pool_[i]; 407 if (!addr2line) { 408 addr2line = 410 addr2line_pool_.push_back(addr2line); 412 return addr2line->SendCommand(is_data, module_name, module_offset); 742 // If llvm-symbolizer is not found, try to use addr2line. 743 if (const char *addr2line_path = FindPathToBinary("addr2line")) {
|
/external/elfutils/0.153/ |
H A D | elfutils.spec | 142 %{_bindir}/eu-addr2line 231 - addr2line: New flag -F/--flags to print more DWARF line information 297 - addr2line: take -j/--section=NAME option for binutils compatibility 376 - addr2line: new option --symbols (or -S) 533 - addr2line: New program
|
/external/chromium_org/third_party/tcmalloc/vendor/ |
H A D | Makefile.am | 391 # On MSVC, we need our own versions of addr2line and nm to work with pprof. 393 WINDOWS_PROJECTS += vsprojects/addr2line-pdb/addr2line-pdb.vcproj 396 src/windows/addr2line-pdb.c
|
/external/chromium_org/third_party/tcmalloc/chromium/src/ |
H A D | pprof | 83 "addr2line" => "addr2line", 87 #"addr2line_pdb" => "addr2line-pdb", # ditto 138 # Used as separator to parse "addr2line -i" output. 2766 # 'addr2line' outputs "??:0" for unknown locations; we do the 4628 # Figure out the addr2line command to use 4629 my $addr2line = $obj_tool_map{"addr2line"}; 4630 my $cmd = ShellEscape($addr2line, "-f", "-C", "-e", $image); 4632 $addr2line [all...] |
/external/jemalloc/bin/ |
H A D | pprof | 83 "addr2line" => "addr2line", 87 #"addr2line_pdb" => "addr2line-pdb", # ditto 138 # Used as separator to parse "addr2line -i" output. 2766 # 'addr2line' outputs "??:0" for unknown locations; we do the 4661 # Figure out the addr2line command to use 4662 my $addr2line = $obj_tool_map{"addr2line"}; 4663 my $cmd = ShellEscape($addr2line, "-f", "-C", "-e", $image); 4665 $addr2line [all...] |
/external/chromium_org/third_party/cython/src/Cython/Debugger/ |
H A D | libpython.py | 645 def addr2line(self, addrq): member in class:PyCodeObjectPtr 956 return self.co.addr2line(self.f_lasti) 2068 PyFrameObjectPtr.current_line_num and PyFrameObjectPtr.addr2line.
|
/external/chromium_org/third_party/tcmalloc/vendor/src/ |
H A D | pprof | 83 "addr2line" => "addr2line", 87 #"addr2line_pdb" => "addr2line-pdb", # ditto 138 # Used as separator to parse "addr2line -i" output. 2766 # 'addr2line' outputs "??:0" for unknown locations; we do the 4628 # Figure out the addr2line command to use 4629 my $addr2line = $obj_tool_map{"addr2line"}; 4630 my $cmd = ShellEscape($addr2line, "-f", "-C", "-e", $image); 4632 $addr2line [all...] |
Completed in 1485 milliseconds