Searched refs:addr2line (Results 1 - 10 of 10) sorted by relevance

/external/chromium_org/third_party/mesa/src/src/gallium/tools/
H A Daddr2line.sh22 addr2line -p -e "$bin" -a -f < "$i"|sed -nre 's@^0x0*([^:]*): ([^?]*)$@s|'"$bin"'(+0x\1)|\2|g@gp'
/external/mesa3d/src/gallium/tools/
H A Daddr2line.sh22 addr2line -p -e "$bin" -a -f < "$i"|sed -nre 's@^0x0*([^:]*): ([^?]*)$@s|'"$bin"'(+0x\1)|\2|g@gp'
/external/chromium_org/native_client_sdk/src/tools/
H A Ddecode_dump.py23 addr2line, library_paths, platform):
29 addr2line: path to appropriate addr2line.
39 self.addr2line = addr2line
94 """Use addr2line to decode a code address.
113 self.addr2line, '-f', '--inlines', '-e', filename, '0x%08x' % address,
186 parser.add_option('-a', '--addr2line', dest='addr2line',
187 help='path to appropriate addr2line')
[all...]
/external/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_symbolizer_posix_libcdep.cc399 Addr2LineProcess *addr2line = 0;
403 addr2line = addr2line_pool_[i];
407 if (!addr2line) {
408 addr2line =
410 addr2line_pool_.push_back(addr2line);
412 return addr2line->SendCommand(is_data, module_name, module_offset);
742 // If llvm-symbolizer is not found, try to use addr2line.
743 if (const char *addr2line_path = FindPathToBinary("addr2line")) {
/external/elfutils/0.153/
H A Delfutils.spec142 %{_bindir}/eu-addr2line
231 - addr2line: New flag -F/--flags to print more DWARF line information
297 - addr2line: take -j/--section=NAME option for binutils compatibility
376 - addr2line: new option --symbols (or -S)
533 - addr2line: New program
/external/chromium_org/third_party/tcmalloc/vendor/
H A DMakefile.am391 # On MSVC, we need our own versions of addr2line and nm to work with pprof.
393 WINDOWS_PROJECTS += vsprojects/addr2line-pdb/addr2line-pdb.vcproj
396 src/windows/addr2line-pdb.c
/external/chromium_org/third_party/tcmalloc/chromium/src/
H A Dpprof83 "addr2line" => "addr2line",
87 #"addr2line_pdb" => "addr2line-pdb", # ditto
138 # Used as separator to parse "addr2line -i" output.
2766 # 'addr2line' outputs "??:0" for unknown locations; we do the
4628 # Figure out the addr2line command to use
4629 my $addr2line = $obj_tool_map{"addr2line"};
4630 my $cmd = ShellEscape($addr2line, "-f", "-C", "-e", $image);
4632 $addr2line
[all...]
/external/jemalloc/bin/
H A Dpprof83 "addr2line" => "addr2line",
87 #"addr2line_pdb" => "addr2line-pdb", # ditto
138 # Used as separator to parse "addr2line -i" output.
2766 # 'addr2line' outputs "??:0" for unknown locations; we do the
4661 # Figure out the addr2line command to use
4662 my $addr2line = $obj_tool_map{"addr2line"};
4663 my $cmd = ShellEscape($addr2line, "-f", "-C", "-e", $image);
4665 $addr2line
[all...]
/external/chromium_org/third_party/cython/src/Cython/Debugger/
H A Dlibpython.py645 def addr2line(self, addrq): member in class:PyCodeObjectPtr
956 return self.co.addr2line(self.f_lasti)
2068 PyFrameObjectPtr.current_line_num and PyFrameObjectPtr.addr2line.
/external/chromium_org/third_party/tcmalloc/vendor/src/
H A Dpprof83 "addr2line" => "addr2line",
87 #"addr2line_pdb" => "addr2line-pdb", # ditto
138 # Used as separator to parse "addr2line -i" output.
2766 # 'addr2line' outputs "??:0" for unknown locations; we do the
4628 # Figure out the addr2line command to use
4629 my $addr2line = $obj_tool_map{"addr2line"};
4630 my $cmd = ShellEscape($addr2line, "-f", "-C", "-e", $image);
4632 $addr2line
[all...]

Completed in 1485 milliseconds