Lines Matching refs:ip
419 uint64_t GetVaddrInSymbols(uint64_t ip, uint64_t mapStart,
428 if ip is 0x46e6ab
430 2. ip - map start(002c5000) = map section offset
433 = ip offset (ip always in exec file offset)
434 5. ip offset + exec begin vaddr(2c5000) = virtual ip in elf
436 uint64_t vaddr = ip - mapStart + mapPageOffset - textExecVaddrFileOffset_ + textExecVaddr_;
437 HLOGM(" ip :0x%016" PRIx64 " -> elf offset :0x%016" PRIx64 " -> vaddr :0x%016" PRIx64 " ",
438 ip, ip - mapStart + mapPageOffset, vaddr);
600 uint64_t GetVaddrInSymbols(uint64_t ip, uint64_t mapStart, uint64_t) const override
602 // ip is vaddr in /proc/kallsyms
603 return ip;
643 uint64_t GetVaddrInSymbols(uint64_t ip, uint64_t mapStart, uint64_t) const override
645 return ip - mapStart;
679 uint64_t GetVaddrInSymbols(uint64_t ip, uint64_t mapStart,
683 // elf use ip - mapStart + mapPageOffset - minExecAddrFileOffset_ + textExecVaddr_
684 return ip - mapStart + mapPageOffset;
825 DfxSymbol GetSymbolWithPcAndMap(uint64_t ip, std::shared_ptr<DfxMap> map) override
828 auto iter = symbolsMap_.find(ip);
833 return DfxSymbol(ip, "");
843 auto ret = DfxArk::ParseArkFrameInfo(static_cast<uintptr_t>(ip), static_cast<uintptr_t>(map->begin),
848 return DfxSymbol(ip, "");
850 this->symbolsMap_.insert(std::make_pair(ip,
851 DfxSymbol(ip,
857 DfxSymbol &foundSymbol = symbolsMap_[ip];
860 matchedSymbols_.push_back(&(symbolsMap_[ip]));
863 HLOGD("ip : 0x%" PRIx64 " the symbol file is : %s, function is %s demangle_ : %s", ip,
864 symbolsMap_[ip].module_.data(), jsFunc.functionName, matchedSymbols_.back()->demangle_.data());
865 return symbolsMap_[ip];
868 DfxSymbol symbol(ip, "");
1007 check ip vaddr for each val :
1008 ip sym
1113 uint64_t SymbolsFile::GetVaddrInSymbols(uint64_t ip, uint64_t, uint64_t) const
1116 return ip;