| /xnu-11215/tools/lldbmacros/core/ |
| H A D | xnu_lldb_init.py | 4 def GetSettingsValues(debugger, setting_variable_name): argument 13 …settings_val_list = debugger.GetInternalVariableValue(setting_variable_name, debugger.GetInstanceN… 63 def CheckMissingLibs(debugger): argument 69 ver_str = debugger.GetVersionString() 87 def __lldb_init_module(debugger, internal_dict): argument 89 if not CheckMissingLibs(debugger): 124 debugger.HandleCommand(osplugin_cmd) 128 debugger.HandleCommand(osplugin_cmd) 130 debugger.HandleCommand(whitelist_trap_cmd) 132 debugger.HandleCommand(xnu_load_cmd) [all …]
|
| H A D | caching.py | 187 for tg in lldb.debugger
|
| H A D | kernelcore.py | 234 def __init__(self, debugger): argument
|
| H A D | lldbwrap.py | 1192 return SBDebugger(lldb.debugger)
|
| /xnu-11215/tools/lldbmacros/tests/lldbtest/ |
| H A D | testcase.py | 63 def debugger(self): member in LLDBTestCase 66 return lldb.debugger 84 return lldb.debugger.GetSelectedTarget() 106 self.debugger.GetCommandInterpreter().HandleCommand(command, res) 130 target = lldb.debugger.GetSelectedTarget() 144 return lldb.debugger.GetSelectedTarget().triple.split('-', 1)[0] 150 target = lldb.debugger.GetSelectedTarget() 192 lldb.debugger.GetSelectedTarget().GetProcess() \
|
| /xnu-11215/tools/lldbmacros/ |
| H A D | xnu.py | 292 lldb.debugger.HandleCommand('type category disable kernel') 393 lldb.debugger.HandleCommand(lldb_cmd) 434 lldb.debugger.HandleCommand(cmd) 675 lldb.debugger.HandleCommand('type category disable kernel' ) 676 lldb.debugger.HandleCommand(command) 677 lldb.debugger.HandleCommand('type category enable kernel' ) 774 lldb.debugger.HandleCommand(" ".join(command_args[2:])) 805 lldb.debugger.HandleCommand(" ".join(command_args[2:])) 1214 def __lldb_init_module(debugger, internal_dict): argument 1222 kern = KernelTarget(debugger) [all …]
|
| H A D | kdp.py | 247 lldb.debugger.HandleCommand('process continue') 261 lldb.debugger.HandleCommand('process plugin packet send --command 0x13') 262 lldb.debugger.HandleCommand('detach')
|
| H A D | vm_pageout.py | 125 lldb_obj.debugger.GetCommandInterpreter().HandleCommand("showvmpageouthistory", res) 190 lldb_obj.debugger.GetCommandInterpreter().HandleCommand("showvmpageoutstats", res)
|
| H A D | utils.py | 27 lldb.debugger.GetCommandInterpreter().HandleCommand(cmdstring, res) 467 lldb.debugger.HandleCommand(cmd_str) 494 lldb.debugger.HandleCommand(cmd_str)
|
| H A D | kext.py | 453 lldb.debugger.HandleCommand(cmd_str)
|
| H A D | pmap.py | 76 ci = lldb.debugger.GetCommandInterpreter() 171 ci = lldb.debugger.GetCommandInterpreter()
|
| H A D | README.md | 77 The lldb debugger provides python scripting bridge for customizing commands and summaries in lldb. … 207 The lldb debugger provides ways for user to customize how a particular type of object be described …
|
| H A D | memory.py | 179 lldb_obj.debugger.GetCommandInterpreter().HandleCommand("memstats", res) 593 lldb_obj.debugger.GetCommandInterpreter().HandleCommand("zprint", res) 2272 lldb_obj.debugger.GetCommandInterpreter().HandleCommand("showallvnodes", res)
|
| /xnu-11215/tests/ipc/ |
| H A D | hardened_exceptions.c | 181 bool debugger = strstr(__progname, "debugger") != NULL; 190 if (!entitled && !debugger) { 192 } else if (entitled && !debugger) { 194 } else if (entitled && debugger) {
|
| /xnu-11215/tools/lldbmacros/tests/ |
| H A D | runtests.py | 119 debugger = lldb.SBDebugger.Create() variable 123 target = debugger.CreateTargetWithFileAndArch(args.kernel, None) 127 ci = debugger.GetCommandInterpreter()
|
| H A D | lldb_test_process.py | 167 def run_unit_tests(debugger, _command, _exe_ctx, _result, _internal_dict): argument 171 sp = debugger.GetSelectedTarget().GetProcess().GetScriptedImplementation() 204 lldb.debugger.HandleCommand( 208 lldb.debugger.HandleCommand(f"command script add "
|
| /xnu-11215/doc/observability/ |
| H A D | mt_stackshot.md | 17 called) sets up state. Then, it enters the debugger trap, and IPIs the other 18 cores into the debugger trap as well. The other CPUs call into stackshot from 19 the debugger trap instead of spinning, and determine if they are eligible to 22 IPI'd into the debugger trap, and we want to avoid overheating the CPU). 31 debugger trap, interrupts are re-enabled, and the kcdata from all of the CPUs 124 CPU which can be seen from a debugger. 142 Since stackshot takes place entirely from within the debugger trap, if an 144 panics, it will not be able to acquire the debugger lock since it is already 151 place, it will release the debugger lock. Once all CPUs are spinning, the panic 157 piggybacking on the debugger trap.
|
| /xnu-11215/doc/debugging/ |
| H A D | debugging.md | 311 YES, It is possible to use a debugger to debug your macro! 314 document the debugger itself. Lets focus on how to use it on a real life example. The debugger used… 364 Lets try to look around with a debugger. 369 # Run last statement with debugger. 374 # Show debugger's help 383 You can now single step or continue the execution as usuall for a debugger. 450 Running debugger on working case and stepping through the load() method shows that this code is not…
|
| H A D | macro_testing.md | 19 access debugger/process/target from such test or invoke LLDB commands. This
|
| /xnu-11215/tools/lldbmacros/tests/lldbmock/ |
| H A D | utils.py | 60 rettype = lldb.debugger.GetSelectedTarget().FindFirstType(sbtype)
|
| /xnu-11215/doc/building/ |
| H A D | bound_checks.md | 37 information on the trap instruction will be meaningless and the debugger won't 44 debugger.
|
| /xnu-11215/ |
| H A D | README.md | 485 …riden by the `debug` boot-arg -- `debug=0x14e` will cause a panic to wait for a debugger to attach.
|