Searched refs:lldb (Results 1 - 25 of 1229) sorted by path

1234567891011>>

/external/chromium_org/third_party/WebKit/Tools/Scripts/
H A Dwebkitdirs.pm1495 $debugger = "lldb";
1500 if (checkForArgumentAndRemoveFromARGV("--use-lldb")) {
1501 $debugger = "lldb";
2683 --use-lldb Use LLDB (this is the default when using Xcode 4.5 or later)
2725 if (debugger() eq "lldb") {
/external/chromium_org/third_party/WebKit/Tools/lldb/
H A Dlldb_webkit.py28 command script import {Path to WebKit Root}/Tools/lldb/lldb_webkit.py
32 import lldb namespace
147 error = lldb.SBError()
/external/clang/utils/
H A DClangDataFormat.py0 """lldb data formatters for clang classes.
11 (lldb) p Tok.Loc
18 (lldb) p Tok.Loc
22 import lldb namespace
92 error = lldb.SBError()
119 # FIXME: lldb should provide something like getBaseType
133 # FIXME: lldb should provide something like getCanonicalType
159 stream = lldb.SBStream()
/external/lldb/
H A DAndroid.mk2 # This guard will be removed once lldb is working
28 include $(LOCAL_PATH)/lldb.mk
/external/lldb/examples/customization/import-python/
H A Dimportcmd.py1 import sys,os,lldb namespace
/external/lldb/examples/darwin/heap_find/
H A Dheap.py4 # This module is designed to live inside the "lldb" python package
5 # in the "lldb.macosx" package. To use this in the embedded python
6 # interpreter using "lldb" just import it:
8 # (lldb) script import lldb.macosx.heap
11 import lldb namespace
20 import lldb.utils.symbolication namespace
272 sb_addr = lldb.debugger.GetSelectedTarget().ResolveLoadAddress(ptr_addr + offset)
275 sb_addr = lldb.debugger.GetSelectedTarget().ResolveLoadAddress(ptr_addr + offset)
288 symbolicator = lldb
[all...]
/external/lldb/examples/functions/
H A DMakefile5 EXE := lldb-functions
H A Dmain.cpp31 using namespace lldb;
49 // $ DYLD_FRAMEWORK_PATH=/Volumes/data/lldb/tot/build/Debug ./a.out executable_path1 [executable_path2 ...]
75 #define PROGRAM_NAME "lldb-functions"
205 lldb::SBCommandReturnObject command_result;
/external/lldb/examples/lookup/
H A DMakefile4 EXE := lldb-lookup
H A Dmain.cpp31 using namespace lldb;
47 // $ DYLD_FRAMEWORK_PATH=/Volumes/data/lldb/svn/ToT/build/Debug ./a.out executable_path file_address
71 #define PROGRAM_NAME "lldb-lookup"
77 " " PROGRAM_NAME " -- symbolicate addresses using lldb.\n"
182 lldb::addr_t file_addr = strtoull (addr_cstr, NULL, 0);
213 // lldb-enumeration.h to request only what you want. Here we
/external/lldb/examples/plugins/commands/
H A Dfooplugin.cpp20 namespace lldb { namespace
22 PluginInitialize (lldb::SBDebugger debugger);
25 class ChildCommand : public lldb::SBCommandPluginInterface
29 DoExecute (lldb::SBDebugger debugger,
31 lldb::SBCommandReturnObject &result)
49 lldb::PluginInitialize (lldb::SBDebugger debugger)
51 lldb::SBCommandInterpreter interpreter = debugger.GetCommandInterpreter();
52 lldb::SBCommand foo = interpreter.AddMultiwordCommand("foo",NULL);
/external/lldb/examples/python/
H A Dcmdtemplate.py6 # # To use this in the embedded python interpreter using "lldb" just
9 # (lldb) command script import /path/to/cmdtemplate.py
12 import lldb namespace
44 # in a command - the lldb.* convenience variables are not to be used
53 # from now on, replace lldb.<thing>.whatever with <thing>.whatever
H A Dcrashlog.py6 # To use this in the embedded python interpreter using "lldb":
9 # lldb
10 # (lldb) script import crashlog
12 # (lldb) crashlog ~/Library/Logs/DiagnosticReports/a.crash
14 # The benefit of running the crashlog command inside lldb in the
47 import lldb namespace
50 # lldb is not in the PYTHONPATH, try some defaults for the current platform
65 import lldb namespace
69 print 'imported lldb from: "%s"' % (lldb_python_dir)
73 print "error: couldn't locate the 'lldb' modul
[all...]
H A Ddelta.py11 # To use this in the embedded python interpreter using "lldb" just
14 # (lldb) command script import /path/to/gdbremote.py
69 (lldb) log enable --threadsafe --timestamp --file <FILE> ....
110 import lldb namespace
111 if lldb.debugger:
114 lldb.debugger.HandleCommand('command script add -f delta.parse_time_log parse_time_log')
H A Ddiagnose_nsstring.py2 # command script import lldb.diagnose
6 import lldb namespace
10 error = lldb.SBError()
40 (lldb) diagnose-nsstring <expr returning NSString>
42 (lldb) diagnose-nsstring @"Hello world"
50 options = lldb.SBExpressionOptions()
52 error = lldb.SBError()
105 little_endian = (target.byte_order == lldb.eByteOrderLittle)
113 is_special = (nsstring.GetDynamicValue(lldb.eDynamicCanRunTarget).GetTypeName() == "NSPathStore2")
170 __lldb_init_module(lldb
[all...]
H A Ddiagnose_unwind.py3 # command script import lldb.diagnose
4 # it is used when lldb's backtrace fails -- it collects and prints
6 # algorithm, that will help to understand why lldb's unwind algorithm
10 import lldb namespace
23 sbaddr = lldb.SBAddress()
42 sym_ctx = target.ResolveSymbolContextForAddress(sbaddr, lldb.eSymbolContextEverything)
62 if initial_fp == lldb.LLDB_INVALID_ADDRESS and target.triple[0:3] == "arm":
79 cur_fp = process.ReadPointerFromMemory (initial_fp, lldb.SBError())
80 cur_pc = process.ReadPointerFromMemory (initial_fp + process.GetAddressByteSize(), lldb.SBError())
84 while cur_pc != 0 and cur_fp != 0 and cur_pc != lldb
[all...]
H A Ddisasm-stress-test.py14 parser.add_argument('--lldb', required=False, action='store', help='The path to LLDB.framework, if LLDB should be overridden')
22 lldb_path = subprocess.check_output(["xcrun", "-find", "lldb"])
23 re_result = re.match("(.*)/Developer/usr/bin/lldb", lldb_path)
37 if arg_ns.lldb == None:
40 sys.path.append(arg_ns.lldb + "/Resources/Python")
42 import lldb namespace
44 debugger = lldb.SBDebugger.Create()
141 fake_address = lldb.SBAddress()
166 instr_output_stream = lldb.SBStream()
H A Ddisasm.py11 import lldb namespace
37 debugger = lldb.SBDebugger.Create()
46 target = debugger.CreateTargetWithFileAndArch (exe, lldb.LLDB_ARCH_DEFAULT)
63 if state == lldb.eStateStopped:
111 elif state == lldb.eStateExited:
119 lldb.SBDebugger.Terminate()
H A Dgdb_disassemble.py1 import lldb namespace
4 if lldb.frame.function:
5 instructions = lldb.frame.function.instructions
6 start_addr = lldb.frame.function.addr.load_addr
7 name = lldb.frame.function.name
8 elif lldb.frame.symbol:
9 instructions = lldb.frame.symbol.instructions
10 start_addr = lldb.frame.symbol.addr.load_addr
11 name = lldb.frame.symbol.name
23 lldb
[all...]
H A Dgdbremote.py11 # To use this in the embedded python interpreter using "lldb" just
14 # (lldb) command script import /path/to/gdbremote.py
232 parser.add_option('-s', '--symbolicate', action='store_true', dest='symbolicate', help='symbolicate addresses in log using current "lldb.target"', default=False)
240 if lldb.target:
241 import lldb.utils.symbolication namespace
242 options.symbolicator = lldb.utils.symbolication.Symbolicator()
243 options.symbolicator.target = lldb.target
861 (lldb) log enable --threadsafe --timestamp --file <FILE> gdb-remote packets
1019 import lldb namespace
1020 lldb
1021 import lldb.macosx.crashlog namespace
1036 import lldb namespace
[all...]
H A Dglobals.py11 import lldb namespace
19 error = lldb.SBError()
23 target = lldb.debugger.CreateTarget(path, options.arch, options.platform, False, error)
32 if symbol.type == lldb.eSymbolTypeData:
40 global_variable_list = module.FindGlobalVariables (target, global_name, lldb.UINT32_MAX)
46 print 'type = %s' % global_variable.type # Returns an lldb.SBType object
47 print 'addr = %s' % global_variable.addr # Returns an lldb.SBAddress (section offset address) for this global
56 description='''This command will find all globals in the specified object file and return an list() of lldb.SBValue objects (which might be empty).'''
70 lldb.debugger = lldb
[all...]
H A Djump.py1 import lldb, re namespace
141 stream = lldb.SBStream()
169 if lldb.debugger:
172 lldb.debugger.HandleCommand('command script add -f jump.jump jump')
H A Dlldb_module_utils.py3 import lldb namespace
27 lldb.target = target
30 module_fspec = lldb.SBFileSpec (module_name, False)
58 lldb.debugger.HandleCommand('command script add -f %s.dump_module_line_tables dump_module_line_tables' % __name__)
H A Dmemory.py6 # # To use this in the embedded python interpreter using "lldb" just
9 # (lldb) command script import /path/to/cmdtemplate.py
20 import lldb namespace
23 # lldb is not in the PYTHONPATH, try some defaults for the current platform
38 import lldb namespace
42 print 'imported lldb from: "%s"' % (lldb_python_dir)
46 print "error: couldn't locate the 'lldb' module, please set PYTHONPATH correctly"
111 # result.SetStatus (lldb.eReturnStatusFailed)
155 error = lldb.SBError()
178 elif getattr(lldb, 'debugge
[all...]
H A Doperating_system.py3 import lldb namespace
17 if type(process) is lldb.SBProcess and process.IsValid():
22 # NOTE: Don't use "lldb.target" when trying to get your target as the "lldb.target"

Completed in 1331 milliseconds

1234567891011>>