Home
last modified time | relevance | path

Searched refs:exe_path (Results 1 – 13 of 13) sorted by relevance

/openbsd-src/gnu/llvm/lldb/scripts/
H A Dverify_api.py11 def extract_exe_symbol_names(arch, exe_path, match_str): argument
13 arch, exe_path, match_str)
91 for exe_path in args:
92 print('Verifying (%s) "%s"...' % (arch, exe_path))
95 arch, exe_path, "( UNDF EXT)")
/openbsd-src/gnu/llvm/lldb/source/Host/freebsd/
H A DHostInfoFreeBSD.cpp49 char exe_path[PATH_MAX]; in GetProgramFileSpec() local
50 size_t exe_path_size = sizeof(exe_path); in GetProgramFileSpec()
51 if (sysctl(exe_path_mib, 4, exe_path, &exe_path_size, NULL, 0) == 0) in GetProgramFileSpec()
52 g_program_filespec.SetFile(exe_path, FileSpec::Style::native); in GetProgramFileSpec()
/openbsd-src/gnu/llvm/lldb/source/Host/linux/
H A DHostInfoLinux.cpp159 char exe_path[PATH_MAX]; in GetProgramFileSpec() local
160 ssize_t len = readlink("/proc/self/exe", exe_path, sizeof(exe_path) - 1); in GetProgramFileSpec()
162 exe_path[len] = 0; in GetProgramFileSpec()
163 g_program_filespec.SetFile(exe_path, FileSpec::Style::native); in GetProgramFileSpec()
H A DHost.cpp130 static ArchSpec GetELFProcessCPUType(llvm::StringRef exe_path) { in GetELFProcessCPUType() argument
133 auto buffer_sp = FileSystem::Instance().CreateDataBuffer(exe_path, 0x20, 0); in GetELFProcessCPUType()
149 LLDB_LOG(log, "Unknown elf class ({0}) in file {1}", exe_class, exe_path); in GetELFProcessCPUType()
/openbsd-src/gnu/llvm/llvm/lib/Support/Unix/
H A DPath.inc198 char exe_path[PATH_MAX];
199 uint32_t size = sizeof(exe_path);
200 if (_NSGetExecutablePath(exe_path, &size) == 0) {
202 if (realpath(exe_path, link_path))
210 char exe_path[PATH_MAX];
212 if (elf_aux_info(AT_EXECPATH, exe_path, sizeof(exe_path)) == 0) {
214 if (realpath(exe_path, link_path))
234 if (getprogpath(exe_path, argv0) != NULL)
235 return exe_path;
239 char exe_path[PATH_MAX];
[all …]
/openbsd-src/gnu/llvm/lldb/source/Target/
H A DRemoteAwarePlatform.cpp38 char exe_path[PATH_MAX]; in ResolveExecutable() local
45 resolved_module_spec.GetFileSpec().GetPath(exe_path, sizeof(exe_path)); in ResolveExecutable()
46 resolved_module_spec.GetFileSpec().SetFile(exe_path, in ResolveExecutable()
90 exe_path); in ResolveExecutable()
/openbsd-src/gnu/llvm/lldb/packages/Python/lldbsuite/test/tools/lldb-server/
H A Dgdbremote_testcase.py439 exe_path=None): argument
443 if not exe_path:
444 exe_path = self.getBuildArtifact("a.out")
452 return self.spawnSubprocess(exe_path, args)
487 exe_path=inferior_exe_path)
1553 exe_path = self.getBuildArtifact("a.out")
1555 return [exe_path]
1557 os.path.basename(exe_path))
1559 err = lldb.remote_platform.Install(lldb.SBFileSpec(exe_path, True),
1563 (exe_path, remote_path, err))
/openbsd-src/gnu/llvm/lldb/source/Host/macosx/objcxx/
H A DHost.mm198 LaunchInNewTerminalWithAppleScript(const char *exe_path,
268 command.Printf(R"( \"%s\")", exe_path);
273 command.Printf(R"( \"%s\")", exe_path);
865 static Status LaunchProcessXPC(const char *exe_path,
1078 static Status LaunchProcessPosixSpawn(const char *exe_path,
1195 tmp_argv[0] = exe_path;
1248 ::posix_spawnp(&result_pid, exe_path, &file_actions, &attr, argv, envp),
1256 error, result_pid, exe_path, &file_actions, &attr, argv,
1266 ::posix_spawnp(&result_pid, exe_path, NULL, &attr, argv, envp),
1273 error, result_pid, exe_path, &attr, argv, envp.get());
[all …]
/openbsd-src/gnu/llvm/compiler-rt/lib/sanitizer_common/
H A Dsanitizer_mac.cpp471 InternalMmapVector<char> exe_path(kMaxPathLength); in ReadBinaryName() local
472 uint32_t size = exe_path.size(); in ReadBinaryName()
473 if (_NSGetExecutablePath(exe_path.data(), &size) == 0 && in ReadBinaryName()
474 realpath(exe_path.data(), buf) != 0) { in ReadBinaryName()
/openbsd-src/gnu/llvm/lldb/source/Commands/
H A DCommandObjectPlatform.cpp1176 llvm::SmallString<128> exe_path; in DoExecute() local
1177 m_options.launch_info.GetExecutableFile().GetPath(exe_path); in DoExecute()
1178 if (!exe_path.empty()) in DoExecute()
1179 m_options.launch_info.GetArguments().AppendArgument(exe_path); in DoExecute()
H A DCommandObjectTarget.cpp77 char exe_path[PATH_MAX]; in DumpTargetInfo() local
80 exe_valid = exe_module->GetFileSpec().GetPath(exe_path, sizeof(exe_path)); in DumpTargetInfo()
83 ::strcpy(exe_path, "<none>"); in DumpTargetInfo()
86 exe_path); in DumpTargetInfo()
/openbsd-src/gnu/llvm/lldb/tools/lldb-vscode/
H A Dlldb-vscode.cpp349 char exe_path[PATH_MAX]; in SendProcessEvent() local
350 exe_fspec.GetPath(exe_path, sizeof(exe_path)); in SendProcessEvent()
353 EmplaceSafeString(body, "name", std::string(exe_path)); in SendProcessEvent()
/openbsd-src/gnu/llvm/lldb/source/Plugins/SymbolFile/NativePDB/
H A DSymbolFileNativePDB.cpp85 loadMatchingPDBFile(std::string exe_path, llvm::BumpPtrAllocator &allocator) { in loadMatchingPDBFile() argument
88 auto expected_binary = createBinary(exe_path); in loadMatchingPDBFile()
115 const auto exe_dir = FileSpec(exe_path).CopyByRemovingLastPathComponent(); in loadMatchingPDBFile()