| /openbsd-src/gnu/llvm/lldb/scripts/ |
| H A D | verify_api.py | 11 def extract_exe_symbol_names(arch, exe_path, match_str): argument 13 arch, exe_path, match_str) 91 for exe_path in args: 92 print('Verifying (%s) "%s"...' % (arch, exe_path)) 95 arch, exe_path, "( UNDF EXT)")
|
| /openbsd-src/gnu/llvm/lldb/source/Host/freebsd/ |
| H A D | HostInfoFreeBSD.cpp | 49 char exe_path[PATH_MAX]; in GetProgramFileSpec() local 50 size_t exe_path_size = sizeof(exe_path); in GetProgramFileSpec() 51 if (sysctl(exe_path_mib, 4, exe_path, &exe_path_size, NULL, 0) == 0) in GetProgramFileSpec() 52 g_program_filespec.SetFile(exe_path, FileSpec::Style::native); in GetProgramFileSpec()
|
| /openbsd-src/gnu/llvm/lldb/source/Host/linux/ |
| H A D | HostInfoLinux.cpp | 159 char exe_path[PATH_MAX]; in GetProgramFileSpec() local 160 ssize_t len = readlink("/proc/self/exe", exe_path, sizeof(exe_path) - 1); in GetProgramFileSpec() 162 exe_path[len] = 0; in GetProgramFileSpec() 163 g_program_filespec.SetFile(exe_path, FileSpec::Style::native); in GetProgramFileSpec()
|
| H A D | Host.cpp | 130 static ArchSpec GetELFProcessCPUType(llvm::StringRef exe_path) { in GetELFProcessCPUType() argument 133 auto buffer_sp = FileSystem::Instance().CreateDataBuffer(exe_path, 0x20, 0); in GetELFProcessCPUType() 149 LLDB_LOG(log, "Unknown elf class ({0}) in file {1}", exe_class, exe_path); in GetELFProcessCPUType()
|
| /openbsd-src/gnu/llvm/llvm/lib/Support/Unix/ |
| H A D | Path.inc | 198 char exe_path[PATH_MAX]; 199 uint32_t size = sizeof(exe_path); 200 if (_NSGetExecutablePath(exe_path, &size) == 0) { 202 if (realpath(exe_path, link_path)) 210 char exe_path[PATH_MAX]; 212 if (elf_aux_info(AT_EXECPATH, exe_path, sizeof(exe_path)) == 0) { 214 if (realpath(exe_path, link_path)) 234 if (getprogpath(exe_path, argv0) != NULL) 235 return exe_path; 239 char exe_path[PATH_MAX]; [all …]
|
| /openbsd-src/gnu/llvm/lldb/source/Target/ |
| H A D | RemoteAwarePlatform.cpp | 38 char exe_path[PATH_MAX]; in ResolveExecutable() local 45 resolved_module_spec.GetFileSpec().GetPath(exe_path, sizeof(exe_path)); in ResolveExecutable() 46 resolved_module_spec.GetFileSpec().SetFile(exe_path, in ResolveExecutable() 90 exe_path); in ResolveExecutable()
|
| /openbsd-src/gnu/llvm/lldb/packages/Python/lldbsuite/test/tools/lldb-server/ |
| H A D | gdbremote_testcase.py | 439 exe_path=None): argument 443 if not exe_path: 444 exe_path = self.getBuildArtifact("a.out") 452 return self.spawnSubprocess(exe_path, args) 487 exe_path=inferior_exe_path) 1553 exe_path = self.getBuildArtifact("a.out") 1555 return [exe_path] 1557 os.path.basename(exe_path)) 1559 err = lldb.remote_platform.Install(lldb.SBFileSpec(exe_path, True), 1563 (exe_path, remote_path, err))
|
| /openbsd-src/gnu/llvm/lldb/source/Host/macosx/objcxx/ |
| H A D | Host.mm | 198 LaunchInNewTerminalWithAppleScript(const char *exe_path, 268 command.Printf(R"( \"%s\")", exe_path); 273 command.Printf(R"( \"%s\")", exe_path); 865 static Status LaunchProcessXPC(const char *exe_path, 1078 static Status LaunchProcessPosixSpawn(const char *exe_path, 1195 tmp_argv[0] = exe_path; 1248 ::posix_spawnp(&result_pid, exe_path, &file_actions, &attr, argv, envp), 1256 error, result_pid, exe_path, &file_actions, &attr, argv, 1266 ::posix_spawnp(&result_pid, exe_path, NULL, &attr, argv, envp), 1273 error, result_pid, exe_path, &attr, argv, envp.get()); [all …]
|
| /openbsd-src/gnu/llvm/compiler-rt/lib/sanitizer_common/ |
| H A D | sanitizer_mac.cpp | 471 InternalMmapVector<char> exe_path(kMaxPathLength); in ReadBinaryName() local 472 uint32_t size = exe_path.size(); in ReadBinaryName() 473 if (_NSGetExecutablePath(exe_path.data(), &size) == 0 && in ReadBinaryName() 474 realpath(exe_path.data(), buf) != 0) { in ReadBinaryName()
|
| /openbsd-src/gnu/llvm/lldb/source/Commands/ |
| H A D | CommandObjectPlatform.cpp | 1176 llvm::SmallString<128> exe_path; in DoExecute() local 1177 m_options.launch_info.GetExecutableFile().GetPath(exe_path); in DoExecute() 1178 if (!exe_path.empty()) in DoExecute() 1179 m_options.launch_info.GetArguments().AppendArgument(exe_path); in DoExecute()
|
| H A D | CommandObjectTarget.cpp | 77 char exe_path[PATH_MAX]; in DumpTargetInfo() local 80 exe_valid = exe_module->GetFileSpec().GetPath(exe_path, sizeof(exe_path)); in DumpTargetInfo() 83 ::strcpy(exe_path, "<none>"); in DumpTargetInfo() 86 exe_path); in DumpTargetInfo()
|
| /openbsd-src/gnu/llvm/lldb/tools/lldb-vscode/ |
| H A D | lldb-vscode.cpp | 349 char exe_path[PATH_MAX]; in SendProcessEvent() local 350 exe_fspec.GetPath(exe_path, sizeof(exe_path)); in SendProcessEvent() 353 EmplaceSafeString(body, "name", std::string(exe_path)); in SendProcessEvent()
|
| /openbsd-src/gnu/llvm/lldb/source/Plugins/SymbolFile/NativePDB/ |
| H A D | SymbolFileNativePDB.cpp | 85 loadMatchingPDBFile(std::string exe_path, llvm::BumpPtrAllocator &allocator) { in loadMatchingPDBFile() argument 88 auto expected_binary = createBinary(exe_path); in loadMatchingPDBFile() 115 const auto exe_dir = FileSpec(exe_path).CopyByRemovingLastPathComponent(); in loadMatchingPDBFile()
|