Lines Matching refs:ip

461     uint64_t GetVaddrInSymbols(uint64_t ip, uint64_t mapStart,
470 if ip is 0x46e6ab
472 2. ip - map start(002c5000) = map section offset
475 = ip offset (ip always in exec file offset)
476 5. ip offset + exec begin vaddr(2c5000) = virtual ip in elf
478 uint64_t vaddr = ip - mapStart + mapPageOffset - textExecVaddrFileOffset_ + textExecVaddr_;
479 HLOGM(" ip :0x%016" PRIx64 " -> elf offset :0x%016" PRIx64 " -> vaddr :0x%016" PRIx64 " ",
480 ip, ip - mapStart + mapPageOffset, vaddr);
695 uint64_t GetVaddrInSymbols(uint64_t ip, uint64_t mapStart, uint64_t) const override
697 // ip is vaddr in /proc/kallsyms
698 return ip;
819 uint64_t GetVaddrInSymbols(uint64_t ip, uint64_t mapStart, uint64_t) const override
821 return ip - mapStart;
855 uint64_t GetVaddrInSymbols(uint64_t ip, uint64_t mapStart,
859 // elf use ip - mapStart + mapPageOffset - minExecAddrFileOffset_ + textExecVaddr_
860 return ip - mapStart + mapPageOffset;
984 DfxSymbol GetSymbolWithPcAndMap(uint64_t ip, std::shared_ptr<DfxMap> map) override
987 auto iter = symbolsMap_.find(ip);
992 return DfxSymbol(ip, "");
1001 auto ret = DfxArk::ParseArkFrameInfo(static_cast<uintptr_t>(ip), static_cast<uintptr_t>(map->begin),
1006 return DfxSymbol(ip, "");
1008 this->symbolsMap_.insert(std::make_pair(ip,
1009 DfxSymbol(ip,
1015 DfxSymbol &foundSymbol = symbolsMap_[ip];
1019 matchedSymbols_.push_back(&(symbolsMap_[ip]));
1022 HLOGD("ip : 0x%" PRIx64 " the symbol file is : %s, function is %s demangle_ : %s", ip,
1023 symbolsMap_[ip].module_.data(), jsFunc.functionName, matchedSymbols_.back()->demangle_.data());
1024 return symbolsMap_[ip];
1027 DfxSymbol symbol(ip, "");
1175 check ip vaddr for each val :
1176 ip sym
1297 uint64_t SymbolsFile::GetVaddrInSymbols(uint64_t ip, uint64_t mapStart, uint64_t mapOffset) const
1300 return ip;