Home
last modified time | relevance | path

Searched refs:debugger (Results 1 – 22 of 22) sorted by relevance

/xnu-11215/tools/lldbmacros/core/
H A Dxnu_lldb_init.py4 def GetSettingsValues(debugger, setting_variable_name): argument
13 …settings_val_list = debugger.GetInternalVariableValue(setting_variable_name, debugger.GetInstanceN…
63 def CheckMissingLibs(debugger): argument
69 ver_str = debugger.GetVersionString()
87 def __lldb_init_module(debugger, internal_dict): argument
89 if not CheckMissingLibs(debugger):
124 debugger.HandleCommand(osplugin_cmd)
128 debugger.HandleCommand(osplugin_cmd)
130 debugger.HandleCommand(whitelist_trap_cmd)
132 debugger.HandleCommand(xnu_load_cmd)
[all …]
H A Dcaching.py187 for tg in lldb.debugger
H A Dkernelcore.py234 def __init__(self, debugger): argument
H A Dlldbwrap.py1192 return SBDebugger(lldb.debugger)
/xnu-11215/tools/lldbmacros/tests/lldbtest/
H A Dtestcase.py63 def debugger(self): member in LLDBTestCase
66 return lldb.debugger
84 return lldb.debugger.GetSelectedTarget()
106 self.debugger.GetCommandInterpreter().HandleCommand(command, res)
130 target = lldb.debugger.GetSelectedTarget()
144 return lldb.debugger.GetSelectedTarget().triple.split('-', 1)[0]
150 target = lldb.debugger.GetSelectedTarget()
192 lldb.debugger.GetSelectedTarget().GetProcess() \
/xnu-11215/tools/lldbmacros/
H A Dxnu.py292 lldb.debugger.HandleCommand('type category disable kernel')
393 lldb.debugger.HandleCommand(lldb_cmd)
434 lldb.debugger.HandleCommand(cmd)
675 lldb.debugger.HandleCommand('type category disable kernel' )
676 lldb.debugger.HandleCommand(command)
677 lldb.debugger.HandleCommand('type category enable kernel' )
774 lldb.debugger.HandleCommand(" ".join(command_args[2:]))
805 lldb.debugger.HandleCommand(" ".join(command_args[2:]))
1214 def __lldb_init_module(debugger, internal_dict): argument
1222 kern = KernelTarget(debugger)
[all …]
H A Dkdp.py247 lldb.debugger.HandleCommand('process continue')
261 lldb.debugger.HandleCommand('process plugin packet send --command 0x13')
262 lldb.debugger.HandleCommand('detach')
H A Dvm_pageout.py125 lldb_obj.debugger.GetCommandInterpreter().HandleCommand("showvmpageouthistory", res)
190 lldb_obj.debugger.GetCommandInterpreter().HandleCommand("showvmpageoutstats", res)
H A Dutils.py27 lldb.debugger.GetCommandInterpreter().HandleCommand(cmdstring, res)
467 lldb.debugger.HandleCommand(cmd_str)
494 lldb.debugger.HandleCommand(cmd_str)
H A Dkext.py453 lldb.debugger.HandleCommand(cmd_str)
H A Dpmap.py76 ci = lldb.debugger.GetCommandInterpreter()
171 ci = lldb.debugger.GetCommandInterpreter()
H A DREADME.md77 The lldb debugger provides python scripting bridge for customizing commands and summaries in lldb. …
207 The lldb debugger provides ways for user to customize how a particular type of object be described …
H A Dmemory.py179 lldb_obj.debugger.GetCommandInterpreter().HandleCommand("memstats", res)
593 lldb_obj.debugger.GetCommandInterpreter().HandleCommand("zprint", res)
2272 lldb_obj.debugger.GetCommandInterpreter().HandleCommand("showallvnodes", res)
/xnu-11215/tests/ipc/
H A Dhardened_exceptions.c181 bool debugger = strstr(__progname, "debugger") != NULL;
190 if (!entitled && !debugger) {
192 } else if (entitled && !debugger) {
194 } else if (entitled && debugger) {
/xnu-11215/tools/lldbmacros/tests/
H A Druntests.py119 debugger = lldb.SBDebugger.Create() variable
123 target = debugger.CreateTargetWithFileAndArch(args.kernel, None)
127 ci = debugger.GetCommandInterpreter()
H A Dlldb_test_process.py167 def run_unit_tests(debugger, _command, _exe_ctx, _result, _internal_dict): argument
171 sp = debugger.GetSelectedTarget().GetProcess().GetScriptedImplementation()
204 lldb.debugger.HandleCommand(
208 lldb.debugger.HandleCommand(f"command script add "
/xnu-11215/doc/observability/
H A Dmt_stackshot.md17 called) sets up state. Then, it enters the debugger trap, and IPIs the other
18 cores into the debugger trap as well. The other CPUs call into stackshot from
19 the debugger trap instead of spinning, and determine if they are eligible to
22 IPI'd into the debugger trap, and we want to avoid overheating the CPU).
31 debugger trap, interrupts are re-enabled, and the kcdata from all of the CPUs
124 CPU which can be seen from a debugger.
142 Since stackshot takes place entirely from within the debugger trap, if an
144 panics, it will not be able to acquire the debugger lock since it is already
151 place, it will release the debugger lock. Once all CPUs are spinning, the panic
157 piggybacking on the debugger trap.
/xnu-11215/doc/debugging/
H A Ddebugging.md311 YES, It is possible to use a debugger to debug your macro!
314 document the debugger itself. Lets focus on how to use it on a real life example. The debugger used…
364 Lets try to look around with a debugger.
369 # Run last statement with debugger.
374 # Show debugger's help
383 You can now single step or continue the execution as usuall for a debugger.
450 Running debugger on working case and stepping through the load() method shows that this code is not…
H A Dmacro_testing.md19 access debugger/process/target from such test or invoke LLDB commands. This
/xnu-11215/tools/lldbmacros/tests/lldbmock/
H A Dutils.py60 rettype = lldb.debugger.GetSelectedTarget().FindFirstType(sbtype)
/xnu-11215/doc/building/
H A Dbound_checks.md37 information on the trap instruction will be meaningless and the debugger won't
44 debugger.
/xnu-11215/
H A DREADME.md485 …riden by the `debug` boot-arg -- `debug=0x14e` will cause a panic to wait for a debugger to attach.