<div dir="ltr">Hi Kihong:<div><br></div><div>I haven't used it yet, but have a look at <a href="https://llvm.org/docs/XRay.html">https://llvm.org/docs/XRay.html</a> and see if that helps...</div><div><br></div><div>hth...</div><div>don</div></div><br><div class="gmail_quote"><div dir="ltr" class="gmail_attr">On Mon, May 6, 2019 at 8:27 AM Kihong Heo via cfe-dev <<a href="mailto:cfe-dev@lists.llvm.org">cfe-dev@lists.llvm.org</a>> wrote:<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">Hi list,<br>
<br>
I am wondering if there is any method to extract execution traces or path conditions in Clang AST level. I want to run a binary with an input and observe which AST nodes are visited during the execution. I tried Sanitizer Coverage tool but it is quite hard to match LLVM bitcode and source code.<br>
<br>
It would be appreciated if you could give some idea.<br>
<br>
Thanks,<br>
Kihong<br>
_______________________________________________<br>
cfe-dev mailing list<br>
<a href="mailto:cfe-dev@lists.llvm.org" target="_blank">cfe-dev@lists.llvm.org</a><br>
<a href="https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-dev" rel="noreferrer" target="_blank">https://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-dev</a><br>
</blockquote></div>