/external/chromium_org/third_party/WebKit/Tools/Scripts/ |
H A D | webkitdirs.pm | 1495 $debugger = "lldb"; 1500 if (checkForArgumentAndRemoveFromARGV("--use-lldb")) { 1501 $debugger = "lldb"; 2683 --use-lldb Use LLDB (this is the default when using Xcode 4.5 or later) 2725 if (debugger() eq "lldb") {
|
/external/chromium_org/third_party/WebKit/Tools/lldb/ |
H A D | lldb_webkit.py | 28 command script import {Path to WebKit Root}/Tools/lldb/lldb_webkit.py 32 import lldb namespace 147 error = lldb.SBError()
|
/external/clang/utils/ |
H A D | ClangDataFormat.py | 0 """lldb data formatters for clang classes. 11 (lldb) p Tok.Loc 18 (lldb) p Tok.Loc 22 import lldb namespace 92 error = lldb.SBError() 119 # FIXME: lldb should provide something like getBaseType 133 # FIXME: lldb should provide something like getCanonicalType 159 stream = lldb.SBStream()
|
/external/lldb/ |
H A D | Android.mk | 2 # This guard will be removed once lldb is working 28 include $(LOCAL_PATH)/lldb.mk
|
/external/lldb/examples/customization/import-python/ |
H A D | importcmd.py | 1 import sys,os,lldb namespace
|
/external/lldb/examples/darwin/heap_find/ |
H A D | heap.py | 4 # This module is designed to live inside the "lldb" python package 5 # in the "lldb.macosx" package. To use this in the embedded python 6 # interpreter using "lldb" just import it: 8 # (lldb) script import lldb.macosx.heap 11 import lldb namespace 20 import lldb.utils.symbolication namespace 272 sb_addr = lldb.debugger.GetSelectedTarget().ResolveLoadAddress(ptr_addr + offset) 275 sb_addr = lldb.debugger.GetSelectedTarget().ResolveLoadAddress(ptr_addr + offset) 288 symbolicator = lldb [all...] |
/external/lldb/examples/functions/ |
H A D | Makefile | 5 EXE := lldb-functions
|
H A D | main.cpp | 31 using namespace lldb; 49 // $ DYLD_FRAMEWORK_PATH=/Volumes/data/lldb/tot/build/Debug ./a.out executable_path1 [executable_path2 ...] 75 #define PROGRAM_NAME "lldb-functions" 205 lldb::SBCommandReturnObject command_result;
|
/external/lldb/examples/lookup/ |
H A D | Makefile | 4 EXE := lldb-lookup
|
H A D | main.cpp | 31 using namespace lldb; 47 // $ DYLD_FRAMEWORK_PATH=/Volumes/data/lldb/svn/ToT/build/Debug ./a.out executable_path file_address 71 #define PROGRAM_NAME "lldb-lookup" 77 " " PROGRAM_NAME " -- symbolicate addresses using lldb.\n" 182 lldb::addr_t file_addr = strtoull (addr_cstr, NULL, 0); 213 // lldb-enumeration.h to request only what you want. Here we
|
/external/lldb/examples/plugins/commands/ |
H A D | fooplugin.cpp | 20 namespace lldb { namespace 22 PluginInitialize (lldb::SBDebugger debugger); 25 class ChildCommand : public lldb::SBCommandPluginInterface 29 DoExecute (lldb::SBDebugger debugger, 31 lldb::SBCommandReturnObject &result) 49 lldb::PluginInitialize (lldb::SBDebugger debugger) 51 lldb::SBCommandInterpreter interpreter = debugger.GetCommandInterpreter(); 52 lldb::SBCommand foo = interpreter.AddMultiwordCommand("foo",NULL);
|
/external/lldb/examples/python/ |
H A D | cmdtemplate.py | 6 # # To use this in the embedded python interpreter using "lldb" just 9 # (lldb) command script import /path/to/cmdtemplate.py 12 import lldb namespace 44 # in a command - the lldb.* convenience variables are not to be used 53 # from now on, replace lldb.<thing>.whatever with <thing>.whatever
|
H A D | crashlog.py | 6 # To use this in the embedded python interpreter using "lldb": 9 # lldb 10 # (lldb) script import crashlog 12 # (lldb) crashlog ~/Library/Logs/DiagnosticReports/a.crash 14 # The benefit of running the crashlog command inside lldb in the 47 import lldb namespace 50 # lldb is not in the PYTHONPATH, try some defaults for the current platform 65 import lldb namespace 69 print 'imported lldb from: "%s"' % (lldb_python_dir) 73 print "error: couldn't locate the 'lldb' modul [all...] |
H A D | delta.py | 11 # To use this in the embedded python interpreter using "lldb" just 14 # (lldb) command script import /path/to/gdbremote.py 69 (lldb) log enable --threadsafe --timestamp --file <FILE> .... 110 import lldb namespace 111 if lldb.debugger: 114 lldb.debugger.HandleCommand('command script add -f delta.parse_time_log parse_time_log')
|
H A D | diagnose_nsstring.py | 2 # command script import lldb.diagnose 6 import lldb namespace 10 error = lldb.SBError() 40 (lldb) diagnose-nsstring <expr returning NSString> 42 (lldb) diagnose-nsstring @"Hello world" 50 options = lldb.SBExpressionOptions() 52 error = lldb.SBError() 105 little_endian = (target.byte_order == lldb.eByteOrderLittle) 113 is_special = (nsstring.GetDynamicValue(lldb.eDynamicCanRunTarget).GetTypeName() == "NSPathStore2") 170 __lldb_init_module(lldb [all...] |
H A D | diagnose_unwind.py | 3 # command script import lldb.diagnose 4 # it is used when lldb's backtrace fails -- it collects and prints 6 # algorithm, that will help to understand why lldb's unwind algorithm 10 import lldb namespace 23 sbaddr = lldb.SBAddress() 42 sym_ctx = target.ResolveSymbolContextForAddress(sbaddr, lldb.eSymbolContextEverything) 62 if initial_fp == lldb.LLDB_INVALID_ADDRESS and target.triple[0:3] == "arm": 79 cur_fp = process.ReadPointerFromMemory (initial_fp, lldb.SBError()) 80 cur_pc = process.ReadPointerFromMemory (initial_fp + process.GetAddressByteSize(), lldb.SBError()) 84 while cur_pc != 0 and cur_fp != 0 and cur_pc != lldb [all...] |
H A D | disasm-stress-test.py | 14 parser.add_argument('--lldb', required=False, action='store', help='The path to LLDB.framework, if LLDB should be overridden') 22 lldb_path = subprocess.check_output(["xcrun", "-find", "lldb"]) 23 re_result = re.match("(.*)/Developer/usr/bin/lldb", lldb_path) 37 if arg_ns.lldb == None: 40 sys.path.append(arg_ns.lldb + "/Resources/Python") 42 import lldb namespace 44 debugger = lldb.SBDebugger.Create() 141 fake_address = lldb.SBAddress() 166 instr_output_stream = lldb.SBStream()
|
H A D | disasm.py | 11 import lldb namespace 37 debugger = lldb.SBDebugger.Create() 46 target = debugger.CreateTargetWithFileAndArch (exe, lldb.LLDB_ARCH_DEFAULT) 63 if state == lldb.eStateStopped: 111 elif state == lldb.eStateExited: 119 lldb.SBDebugger.Terminate()
|
H A D | gdb_disassemble.py | 1 import lldb namespace 4 if lldb.frame.function: 5 instructions = lldb.frame.function.instructions 6 start_addr = lldb.frame.function.addr.load_addr 7 name = lldb.frame.function.name 8 elif lldb.frame.symbol: 9 instructions = lldb.frame.symbol.instructions 10 start_addr = lldb.frame.symbol.addr.load_addr 11 name = lldb.frame.symbol.name 23 lldb [all...] |
H A D | gdbremote.py | 11 # To use this in the embedded python interpreter using "lldb" just 14 # (lldb) command script import /path/to/gdbremote.py 232 parser.add_option('-s', '--symbolicate', action='store_true', dest='symbolicate', help='symbolicate addresses in log using current "lldb.target"', default=False) 240 if lldb.target: 241 import lldb.utils.symbolication namespace 242 options.symbolicator = lldb.utils.symbolication.Symbolicator() 243 options.symbolicator.target = lldb.target 861 (lldb) log enable --threadsafe --timestamp --file <FILE> gdb-remote packets 1019 import lldb namespace 1020 lldb 1021 import lldb.macosx.crashlog namespace 1036 import lldb namespace [all...] |
H A D | globals.py | 11 import lldb namespace 19 error = lldb.SBError() 23 target = lldb.debugger.CreateTarget(path, options.arch, options.platform, False, error) 32 if symbol.type == lldb.eSymbolTypeData: 40 global_variable_list = module.FindGlobalVariables (target, global_name, lldb.UINT32_MAX) 46 print 'type = %s' % global_variable.type # Returns an lldb.SBType object 47 print 'addr = %s' % global_variable.addr # Returns an lldb.SBAddress (section offset address) for this global 56 description='''This command will find all globals in the specified object file and return an list() of lldb.SBValue objects (which might be empty).''' 70 lldb.debugger = lldb [all...] |
H A D | jump.py | 1 import lldb, re namespace 141 stream = lldb.SBStream() 169 if lldb.debugger: 172 lldb.debugger.HandleCommand('command script add -f jump.jump jump')
|
H A D | lldb_module_utils.py | 3 import lldb namespace 27 lldb.target = target 30 module_fspec = lldb.SBFileSpec (module_name, False) 58 lldb.debugger.HandleCommand('command script add -f %s.dump_module_line_tables dump_module_line_tables' % __name__)
|
H A D | memory.py | 6 # # To use this in the embedded python interpreter using "lldb" just 9 # (lldb) command script import /path/to/cmdtemplate.py 20 import lldb namespace 23 # lldb is not in the PYTHONPATH, try some defaults for the current platform 38 import lldb namespace 42 print 'imported lldb from: "%s"' % (lldb_python_dir) 46 print "error: couldn't locate the 'lldb' module, please set PYTHONPATH correctly" 111 # result.SetStatus (lldb.eReturnStatusFailed) 155 error = lldb.SBError() 178 elif getattr(lldb, 'debugge [all...] |
H A D | operating_system.py | 3 import lldb namespace 17 if type(process) is lldb.SBProcess and process.IsValid(): 22 # NOTE: Don't use "lldb.target" when trying to get your target as the "lldb.target"
|