HomeSort by: relevance | last modified time | path
    Searched refs:Symbolizer (Results 1 - 23 of 23) sorted by relevancy

  /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/
sanitizer_symbolizer.cc 70 Symbolizer *Symbolizer::symbolizer_;
71 StaticSpinMutex Symbolizer::init_mu_;
72 LowLevelAllocator Symbolizer::symbolizer_allocator_;
74 void Symbolizer::InvalidateModuleList() {
78 void Symbolizer::AddHooks(Symbolizer::StartSymbolizationHook start_hook,
79 Symbolizer::EndSymbolizationHook end_hook) {
85 const char *Symbolizer::ModuleNameOwner::GetOwnedCopy(const char *str) {
105 Symbolizer::Symbolizer(IntrusiveList<SymbolizerTool> tools
    [all...]
sanitizer_symbolizer_markup.cc 12 // Implementation of offline markup symbolizer.
42 const char *Symbolizer::Demangle(const char *name) {
53 bool Symbolizer::GetModuleNameAndOffsetForPC(uptr pc, const char **module_name,
66 SymbolizedStack *Symbolizer::SymbolizePC(uptr addr) {
75 bool Symbolizer::SymbolizeData(uptr addr, DataInfo *info) {
94 Symbolizer *Symbolizer::PlatformInit() {
95 return new (symbolizer_allocator_) Symbolizer({});
98 void Symbolizer::LateInitialize() { Symbolizer::GetOrInit();
    [all...]
sanitizer_symbolizer.h 10 // Symbolizer is used by sanitizers to map instruction address to a location in
11 // source code at run-time. Symbolizer either uses __sanitizer_symbolize_*
13 // launch "llvm-symbolizer" commandline tool in a separate process and
83 class Symbolizer final {
85 /// Initialize and return platform-specific implementation of symbolizer
87 static Symbolizer *GetOrInit();
94 // The module names Symbolizer returns are stable and unique for every given
111 // Allow user to install hooks that would be called before/after Symbolizer
148 /// Platform-specific function for creating a Symbolizer object.
149 static Symbolizer *PlatformInit()
    [all...]
sanitizer_stacktrace_libcdep.cc 35 SymbolizedStack *frames = Symbolizer::GetOrInit()->SymbolizePC(pc);
89 bool ok = Symbolizer::GetOrInit()->GetModuleNameAndOffsetForPC(
110 SymbolizedStack *frame = Symbolizer::GetOrInit()->SymbolizePC(pc);
144 if (!Symbolizer::GetOrInit()->SymbolizeData(data_addr, &DI)) return;
sanitizer_symbolizer_win.cc 12 // Windows-specific implementation of symbolizer parts.
160 // Otherwise, try llvm-symbolizer.
175 const char *Symbolizer::PlatformDemangle(const char *name) {
237 VReport(3, "Launching symbolizer command: %s\n", command_line.data());
239 // Launch llvm-symbolizer with stdin and stdout redirected.
266 // The llvm-symbolizer process is responsible for quitting itself when the
268 // leaks. If we ever want to try to kill the symbolizer process from the
278 VReport(2, "Symbolizer is disabled.\n");
282 // Add llvm-symbolizer in case the binary has dwarf.
285 user_path ? user_path : FindPathToBinary("llvm-symbolizer.exe")
    [all...]
sanitizer_symbolizer_libcdep.cc 20 Symbolizer *Symbolizer::GetOrInit() {
75 SymbolizedStack *Symbolizer::SymbolizePC(uptr addr) {
95 bool Symbolizer::SymbolizeData(uptr addr, DataInfo *info) {
116 bool Symbolizer::GetModuleNameAndOffsetForPC(uptr pc, const char **module_name,
130 void Symbolizer::Flush() {
138 const char *Symbolizer::Demangle(const char *name) {
148 bool Symbolizer::FindModuleNameAndOffsetForAddress(uptr address,
161 void Symbolizer::RefreshModules() {
178 const LoadedModule *Symbolizer::FindModuleForAddress(uptr address)
    [all...]
sanitizer_symbolizer_posix_libcdep.cc 12 // POSIX-specific implementation of symbolizer parts.
149 Report("WARNING: invalid path to external symbolizer!\n");
163 "external symbolizer (errno: %d)\n", errno);
185 Report("WARNING: failed to fork external symbolizer (errno: %d)\n",
243 // Check that symbolizer subprocess started successfully.
247 Report("WARNING: external symbolizer didn't start up correctly!\n");
445 const char *Symbolizer::PlatformDemangle(const char *name) {
453 VReport(2, "External symbolizer is explicitly disabled.\n");
455 } else if (!internal_strcmp(binary_name, "llvm-symbolizer")) {
456 VReport(2, "Using llvm-symbolizer at user-specified path: %s\n", path)
    [all...]
sanitizer_symbolizer_report.cc 85 SymbolizedStack *frame = Symbolizer::GetOrInit()->SymbolizePC(pc);
sanitizer_common_interceptors.inc 5963 Symbolizer::GetOrInit()->InvalidateModuleList();
5972 Symbolizer::GetOrInit()->InvalidateModuleList();
  /src/sys/external/bsd/compiler_rt/dist/lib/sanitizer_common/tests/
sanitizer_symbolizer_test.cc 20 TEST(Symbolizer, ExtractToken) {
35 TEST(Symbolizer, ExtractInt) {
42 TEST(Symbolizer, ExtractUptr) {
49 TEST(Symbolizer, ExtractTokenUpToDelimiter) {
59 TEST(Symbolizer, DemangleSwiftAndCXX) {
  /src/sys/external/bsd/compiler_rt/dist/lib/tsan/rtl/
tsan_symbolize.cc 107 return Symbolizer::GetOrInit()->SymbolizePC(addr);
112 if (!Symbolizer::GetOrInit()->SymbolizeData(addr, &info))
120 Symbolizer::GetOrInit()->Flush();
tsan_debugging.cc 221 if (Symbolizer::GetOrInit()->SymbolizeData(addr, &info)) {
tsan_rtl.cc 211 // Flush symbolizer cache if requested.
391 Symbolizer::GetOrInit()->AddHooks(EnterSymbolizer, ExitSymbolizer);
407 Symbolizer::LateInitialize();
  /src/sys/external/bsd/compiler_rt/dist/lib/asan/
asan_suppressions.cc 72 Symbolizer *symbolizer = Symbolizer::GetOrInit(); local in function:__asan::IsStackTraceSuppressed
79 if (const char *module_name = symbolizer->GetModuleNameForPc(addr))
85 SymbolizedStack *frames = symbolizer->SymbolizePC(addr);
asan_rtl.cc 511 Symbolizer::LateInitialize();
513 Symbolizer::LateInitialize();
asan_globals.cc 286 return should_demangle ? Symbolizer::GetOrInit()->Demangle(name) : name;
  /src/sys/external/bsd/compiler_rt/dist/lib/ubsan/
ubsan_handlers_cxx.cc 148 const char *DstModule = Symbolizer::GetOrInit()->GetModuleNameForPc(Vtable);
152 const char *SrcModule = Symbolizer::GetOrInit()->GetModuleNameForPc(Opts.pc);
ubsan_diag.cc 110 return Symbolizer::GetOrInit()->SymbolizePC(PC);
191 Buffer->append("'%s'", Symbolizer::GetOrInit()->Demangle(A.String));
335 // This needs an external symbolizer, or (preferably) ASan instrumentation.
425 if (const char *Module = Symbolizer::GetOrInit()->GetModuleNameForPc(PC)) {
430 SymbolizedStackHolder Stack(Symbolizer::GetOrInit()->SymbolizePC(PC));
ubsan_handlers.cc 745 const char *SrcModule = Symbolizer::GetOrInit()->GetModuleNameForPc(Opts.pc);
  /src/sys/external/bsd/compiler_rt/dist/lib/asan/scripts/
asan_symbolize.py 52 class Symbolizer(object):
72 class LLVMSymbolizer(Symbolizer):
103 """Overrides Symbolizer.symbolize."""
135 # Assume llvm-symbolizer is in PATH.
136 symbolizer_path = 'llvm-symbolizer'
140 class Addr2LineSymbolizer(Symbolizer):
163 """Overrides Symbolizer.symbolize."""
217 class DarwinSymbolizer(Symbolizer):
231 """Overrides Symbolizer.symbolize."""
255 # Chain several symbolizers so that if one symbolizer fails, we fall bac
    [all...]
  /src/sys/external/bsd/compiler_rt/dist/lib/stats/
stats.cc 65 LoadedModule *mod = Symbolizer::GetOrInit()->FindModuleForAddress(
  /src/sys/external/bsd/compiler_rt/dist/lib/lsan/
lsan_common.cc 636 Symbolizer::GetOrInit()->GetModuleNameForPc(addr))
641 SymbolizedStack *frames = Symbolizer::GetOrInit()->SymbolizePC(addr);
  /src/sys/external/bsd/compiler_rt/dist/lib/msan/
msan.cc 441 Symbolizer::GetOrInit()->AddHooks(EnterSymbolizer, ExitSymbolizer);

Completed in 30 milliseconds