| /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/ |
| sanitizer_symbolizer.cc | 70 Symbolizer *Symbolizer::symbolizer_; 71 StaticSpinMutex Symbolizer::init_mu_; 72 LowLevelAllocator Symbolizer::symbolizer_allocator_; 74 void Symbolizer::InvalidateModuleList() { 78 void Symbolizer::AddHooks(Symbolizer::StartSymbolizationHook start_hook, 79 Symbolizer::EndSymbolizationHook end_hook) { 85 const char *Symbolizer::ModuleNameOwner::GetOwnedCopy(const char *str) { 105 Symbolizer::Symbolizer(IntrusiveList<SymbolizerTool> tools [all...] |
| sanitizer_symbolizer_markup.cc | 12 // Implementation of offline markup symbolizer. 42 const char *Symbolizer::Demangle(const char *name) { 53 bool Symbolizer::GetModuleNameAndOffsetForPC(uptr pc, const char **module_name, 66 SymbolizedStack *Symbolizer::SymbolizePC(uptr addr) { 75 bool Symbolizer::SymbolizeData(uptr addr, DataInfo *info) { 94 Symbolizer *Symbolizer::PlatformInit() { 95 return new (symbolizer_allocator_) Symbolizer({}); 98 void Symbolizer::LateInitialize() { Symbolizer::GetOrInit(); [all...] |
| sanitizer_symbolizer.h | 10 // Symbolizer is used by sanitizers to map instruction address to a location in 11 // source code at run-time. Symbolizer either uses __sanitizer_symbolize_* 13 // launch "llvm-symbolizer" commandline tool in a separate process and 83 class Symbolizer final { 85 /// Initialize and return platform-specific implementation of symbolizer 87 static Symbolizer *GetOrInit(); 94 // The module names Symbolizer returns are stable and unique for every given 111 // Allow user to install hooks that would be called before/after Symbolizer 148 /// Platform-specific function for creating a Symbolizer object. 149 static Symbolizer *PlatformInit() [all...] |
| sanitizer_stacktrace_libcdep.cc | 35 SymbolizedStack *frames = Symbolizer::GetOrInit()->SymbolizePC(pc); 89 bool ok = Symbolizer::GetOrInit()->GetModuleNameAndOffsetForPC( 110 SymbolizedStack *frame = Symbolizer::GetOrInit()->SymbolizePC(pc); 144 if (!Symbolizer::GetOrInit()->SymbolizeData(data_addr, &DI)) return;
|
| sanitizer_symbolizer_win.cc | 12 // Windows-specific implementation of symbolizer parts. 160 // Otherwise, try llvm-symbolizer. 175 const char *Symbolizer::PlatformDemangle(const char *name) { 237 VReport(3, "Launching symbolizer command: %s\n", command_line.data()); 239 // Launch llvm-symbolizer with stdin and stdout redirected. 266 // The llvm-symbolizer process is responsible for quitting itself when the 268 // leaks. If we ever want to try to kill the symbolizer process from the 278 VReport(2, "Symbolizer is disabled.\n"); 282 // Add llvm-symbolizer in case the binary has dwarf. 285 user_path ? user_path : FindPathToBinary("llvm-symbolizer.exe") [all...] |
| sanitizer_symbolizer_libcdep.cc | 20 Symbolizer *Symbolizer::GetOrInit() { 75 SymbolizedStack *Symbolizer::SymbolizePC(uptr addr) { 95 bool Symbolizer::SymbolizeData(uptr addr, DataInfo *info) { 116 bool Symbolizer::GetModuleNameAndOffsetForPC(uptr pc, const char **module_name, 130 void Symbolizer::Flush() { 138 const char *Symbolizer::Demangle(const char *name) { 148 bool Symbolizer::FindModuleNameAndOffsetForAddress(uptr address, 161 void Symbolizer::RefreshModules() { 178 const LoadedModule *Symbolizer::FindModuleForAddress(uptr address) [all...] |
| sanitizer_symbolizer_posix_libcdep.cc | 12 // POSIX-specific implementation of symbolizer parts. 149 Report("WARNING: invalid path to external symbolizer!\n"); 163 "external symbolizer (errno: %d)\n", errno); 185 Report("WARNING: failed to fork external symbolizer (errno: %d)\n", 243 // Check that symbolizer subprocess started successfully. 247 Report("WARNING: external symbolizer didn't start up correctly!\n"); 445 const char *Symbolizer::PlatformDemangle(const char *name) { 453 VReport(2, "External symbolizer is explicitly disabled.\n"); 455 } else if (!internal_strcmp(binary_name, "llvm-symbolizer")) { 456 VReport(2, "Using llvm-symbolizer at user-specified path: %s\n", path) [all...] |
| /src/external/gpl3/gcc.old/dist/libsanitizer/sanitizer_common/ |
| sanitizer_symbolizer_fuchsia.cc | 10 // Implementation of Fuchsia-specific symbolizer. 45 const char *Symbolizer::Demangle(const char *name) { 56 bool Symbolizer::GetModuleNameAndOffsetForPC(uptr pc, const char **module_name, 69 SymbolizedStack *Symbolizer::SymbolizePC(uptr addr) { 78 bool Symbolizer::SymbolizeData(uptr addr, DataInfo *info) { 97 Symbolizer *Symbolizer::PlatformInit() { 98 return new (symbolizer_allocator_) Symbolizer({}); 101 void Symbolizer::LateInitialize() { Symbolizer::GetOrInit(); [all...] |
| sanitizer_symbolizer.cpp | 79 Symbolizer *Symbolizer::symbolizer_; 80 StaticSpinMutex Symbolizer::init_mu_; 81 LowLevelAllocator Symbolizer::symbolizer_allocator_; 83 void Symbolizer::InvalidateModuleList() { 87 void Symbolizer::AddHooks(Symbolizer::StartSymbolizationHook start_hook, 88 Symbolizer::EndSymbolizationHook end_hook) { 94 const char *Symbolizer::ModuleNameOwner::GetOwnedCopy(const char *str) { 114 Symbolizer::Symbolizer(IntrusiveList<SymbolizerTool> tools [all...] |
| sanitizer_symbolizer_markup.cpp | 11 // Implementation of offline markup symbolizer. 40 const char *Symbolizer::Demangle(const char *name) { 51 bool Symbolizer::GetModuleNameAndOffsetForPC(uptr pc, const char **module_name, 58 bool Symbolizer::SymbolizeFrame(uptr addr, FrameInfo *info) { return false; } 68 SymbolizedStack *Symbolizer::SymbolizePC(uptr addr) { 77 bool Symbolizer::SymbolizeData(uptr addr, DataInfo *info) { 99 Symbolizer *Symbolizer::PlatformInit() { 100 return new (symbolizer_allocator_) Symbolizer({}); 103 void Symbolizer::LateInitialize() [all...] |
| sanitizer_symbolizer.h | 9 // Symbolizer is used by sanitizers to map instruction address to a location in 10 // source code at run-time. Symbolizer either uses __sanitizer_symbolize_* 12 // launch "llvm-symbolizer" commandline tool in a separate process and 109 class Symbolizer final { 111 /// Initialize and return platform-specific implementation of symbolizer 113 static Symbolizer *GetOrInit(); 121 // The module names Symbolizer returns are stable and unique for every given 138 // Allow user to install hooks that would be called before/after Symbolizer 175 /// Platform-specific function for creating a Symbolizer object. 176 static Symbolizer *PlatformInit() [all...] |
| sanitizer_symbolizer_libcdep.cpp | 20 Symbolizer *Symbolizer::GetOrInit() { 85 SymbolizedStack *Symbolizer::SymbolizePC(uptr addr) { 105 bool Symbolizer::SymbolizeData(uptr addr, DataInfo *info) { 126 bool Symbolizer::SymbolizeFrame(uptr addr, FrameInfo *info) { 142 bool Symbolizer::GetModuleNameAndOffsetForPC(uptr pc, const char **module_name, 156 void Symbolizer::Flush() { 164 const char *Symbolizer::Demangle(const char *name) { 174 bool Symbolizer::FindModuleNameAndOffsetForAddress(uptr address, 187 void Symbolizer::RefreshModules() [all...] |
| sanitizer_symbolizer_win.cpp | 11 // Windows-specific implementation of symbolizer parts. 163 // Otherwise, try llvm-symbolizer. 178 const char *Symbolizer::PlatformDemangle(const char *name) { 240 VReport(3, "Launching symbolizer command: %s\n", command_line.data()); 242 // Launch llvm-symbolizer with stdin and stdout redirected. 269 // The llvm-symbolizer process is responsible for quitting itself when the 271 // leaks. If we ever want to try to kill the symbolizer process from the 281 VReport(2, "Symbolizer is disabled.\n"); 285 // Add llvm-symbolizer. 295 user_path ? user_path : FindPathToBinary("llvm-symbolizer.exe") [all...] |
| sanitizer_symbolizer_posix_libcdep.cpp | 11 // POSIX-specific implementation of symbolizer parts. 137 Report("WARNING: invalid path to external symbolizer!\n"); 147 // Report how symbolizer is being launched for debugging purposes. 151 Report("Launching Symbolizer process: "); 161 Report("WARNING: failed to spawn external symbolizer (errno: %d)\n", 175 "external symbolizer (errno: %d)\n", errno); 193 // Check that symbolizer subprocess started successfully. 197 Report("WARNING: external symbolizer didn't start up correctly!\n"); 397 const char *Symbolizer::PlatformDemangle(const char *name) { 411 static const char kLLVMSymbolizerPrefix[] = "llvm-symbolizer"; [all...] |
| /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/ |
| sanitizer_symbolizer_test.cc | 20 TEST(Symbolizer, ExtractToken) { 35 TEST(Symbolizer, ExtractInt) { 42 TEST(Symbolizer, ExtractUptr) { 49 TEST(Symbolizer, ExtractTokenUpToDelimiter) { 59 TEST(Symbolizer, DemangleSwiftAndCXX) {
|
| /src/external/apache2/llvm/dist/llvm/tools/llvm-xray/ |
| func-id-helper.h | 29 symbolize::LLVMSymbolizer &Symbolizer; 35 symbolize::LLVMSymbolizer &Symbolizer, 37 : BinaryInstrMap(std::move(BinaryInstrMap)), Symbolizer(Symbolizer),
|
| func-id-helper.cpp | 37 if (auto ResOrErr = Symbolizer.symbolizeCode(BinaryInstrMap, ModuleAddress)) { 64 auto ResOrErr = Symbolizer.symbolizeCode(BinaryInstrMap, ModuleAddress);
|
| xray-extract.cpp | 95 symbolize::LLVMSymbolizer Symbolizer(opts); 96 llvm::xray::FuncIdConversionHelper FuncIdHelper(ExtractInput, Symbolizer,
|
| /src/external/apache2/llvm/dist/llvm/lib/MC/MCDisassembler/ |
| MCDisassembler.cpp | 30 if (Symbolizer) 31 return Symbolizer->tryAddingSymbolicOperand( 38 if (Symbolizer) 39 Symbolizer->tryAddingPcLoadReferenceComment(*CommentStream, Value, Address); 43 Symbolizer = std::move(Symzer);
|
| /src/external/gpl3/gcc.old/dist/libsanitizer/ubsan/ |
| ubsan_init.cpp | 54 Symbolizer::LateInitialize();
|
| /src/sys/external/bsd/compiler_rt/dist/lib/tsan/rtl/ |
| tsan_symbolize.cc | 107 return Symbolizer::GetOrInit()->SymbolizePC(addr); 112 if (!Symbolizer::GetOrInit()->SymbolizeData(addr, &info)) 120 Symbolizer::GetOrInit()->Flush();
|
| /src/external/gpl3/gcc.old/dist/libsanitizer/tsan/ |
| tsan_symbolize.cpp | 106 return Symbolizer::GetOrInit()->SymbolizePC(addr); 111 if (!Symbolizer::GetOrInit()->SymbolizeData(addr, &info)) 120 Symbolizer::GetOrInit()->Flush();
|
| /src/sys/external/bsd/compiler_rt/dist/lib/asan/ |
| asan_suppressions.cc | 72 Symbolizer *symbolizer = Symbolizer::GetOrInit(); local 79 if (const char *module_name = symbolizer->GetModuleNameForPc(addr)) 85 SymbolizedStack *frames = symbolizer->SymbolizePC(addr);
|
| /src/external/gpl3/gcc.old/dist/libsanitizer/asan/ |
| asan_suppressions.cpp | 71 Symbolizer *symbolizer = Symbolizer::GetOrInit(); local 78 if (const char *module_name = symbolizer->GetModuleNameForPc(addr)) 84 SymbolizedStack *frames = symbolizer->SymbolizePC(addr);
|
| /src/sys/external/bsd/compiler_rt/dist/lib/ubsan/ |
| ubsan_handlers_cxx.cc | 148 const char *DstModule = Symbolizer::GetOrInit()->GetModuleNameForPc(Vtable); 152 const char *SrcModule = Symbolizer::GetOrInit()->GetModuleNameForPc(Opts.pc);
|