/developtools/smartperf_host/trace_streamer/src/filter/hook_filter/ |
H A D | offline_symbolization_filter.cpp | 35 uint64_t ip, in GetSymbolStartMaybeUpdateFrameInfo() 41 frameInfo->offset_ = elfSym->st_value != 0 ? elfSym->st_value : ip; in GetSymbolStartMaybeUpdateFrameInfo() 47 bool OfflineSymbolizationFilter::FillFrameInfo(const std::shared_ptr<FrameInfo> &frameInfo, uint64_t ip, uint64_t ipid) in FillFrameInfo() argument 49 frameInfo->ip_ = ip; in FillFrameInfo() 53 auto endItor = startAddrToMapsInfoItor->upper_bound(ip); in FillFrameInfo() 58 if (ip < endItor->second->end()) { in FillFrameInfo() 66 TS_LOGI("find matching Maps Info failed, ip = %" PRIu64 ", length=%" PRId64 "", ip, length); in FillFrameInfo() 72 uint64_t ip, in CalcSymInfo() 77 // calculate symVaddr = ip in CalcSymInfo() 32 GetSymbolStartMaybeUpdateFrameInfo(T *elfSym, uint32_t &symbolStart, uint64_t symVaddr, uint64_t ip, FrameInfo *frameInfo) GetSymbolStartMaybeUpdateFrameInfo() argument 71 CalcSymInfo(uint64_t ipid, uint64_t ip, uint32_t &symbolStart, std::shared_ptr<FrameInfo> &frameInfo, std::shared_ptr<ProtoReader::SymbolTable_Reader> &symbolTable) CalcSymInfo() argument 114 OfflineSymbolizationByIp(uint64_t ipid, uint64_t ip) OfflineSymbolizationByIp() argument [all...] |
H A D | offline_symbolization_filter.h | 65 std::shared_ptr<FrameInfo> OfflineSymbolizationByIp(uint64_t ipid, uint64_t ip); 76 // first is ipid, second is ip, third is FrameInfo 93 uint64_t ip, 95 bool FillFrameInfo(const std::shared_ptr<FrameInfo> &frameInfo, uint64_t ip, uint64_t ipid); 97 uint64_t ip,
|
/developtools/smartperf_host/trace_streamer/src/parser/ebpf_parser/ |
H A D | ebpf_base.cpp | 73 EbpfSymbolInfo EbpfBase::GetEbpfSymbolInfo(uint32_t pid, uint64_t ip) in GetEbpfSymbolInfo() argument 75 auto value = pidAndIpToEbpfSymbolInfo_.Find(pid, ip); in GetEbpfSymbolInfo() 79 return GetSymbolNameIndexFromElfSym(pid, ip); in GetEbpfSymbolInfo() 117 void EbpfBase::UpdateFilePathIndexToPidAndIpMap(DataIndex filePathIndex, uint32_t pid, uint64_t ip) in UpdateFilePathIndexToPidAndIpMap() argument 121 itor->second->insert(std::make_tuple(pid, ip)); in UpdateFilePathIndexToPidAndIpMap() 124 pidAndIpSet->insert(std::make_tuple(pid, ip)); in UpdateFilePathIndexToPidAndIpMap() 133 uint64_t ip) in GetSymbolSave() 139 auto end = startToMapsAddr->upper_bound(ip); in GetSymbolSave() 144 if (ip < end->second->end) { in GetSymbolSave() 153 pidAndIpToEbpfSymbolInfo_.Insert(pid, ip, ebpfSymbolInf in GetSymbolSave() 130 GetSymbolSave(EbpfSymbolInfo &ebpfSymbolInfo, StartToMapsAddr &startToMapsAddr, uint32_t pid, uint64_t ip) GetSymbolSave() argument 175 GetSymbolNameIndexFromElfSym(uint32_t pid, uint64_t ip) GetSymbolNameIndexFromElfSym() argument [all...] |
H A D | ebpf_base.h | 44 EbpfSymbolInfo GetEbpfSymbolInfo(uint32_t pid, uint64_t ip); 45 EbpfSymbolInfo GetSymbolNameIndexFromElfSym(uint32_t pid, uint64_t ip); 47 void GetSymbolSave(EbpfSymbolInfo &ebpfSymbolInfo, StartToMapsAddr &startToMapsAddr, uint32_t pid, uint64_t ip); 48 void UpdateFilePathIndexToPidAndIpMap(DataIndex filePathIndex, uint32_t pid, uint64_t ip);
|
H A D | ebpf_data_reader.cpp | 293 EbpfSymbolInfo EbpfDataReader::GetSymbolNameIndexFromElfSym(uint64_t ip) in GetSymbolNameIndexFromElfSym() argument 296 auto end = kernelSymbolMap_.upper_bound(ip); in GetSymbolNameIndexFromElfSym() 301 if (ip < end->first + end->second.size) { in GetSymbolNameIndexFromElfSym() 306 TS_LOGD("failed for ip:%" PRIu64 ", kernelip:%" PRIu64 ", size:%" PRIu64 "", ip, end->first, in GetSymbolNameIndexFromElfSym() 311 TS_LOGD("failed for ip:%" PRIu64 "", ip); in GetSymbolNameIndexFromElfSym()
|
/developtools/integration_verification/DeployDevice/src/aw/poweronoff/ |
H A D | serial_power_on_off.py | 7 def __init__(self, ip, port, timeout=10, encoding="GBK"): 10 # @Method: __init__(self, ip, port,timeout=20,encoding="GBK") 12 # @Param: ip: ip地址 24 self.connect((ip, port)) 34 # @Method: __init__(self, ip, port,timeout=20,encoding="GBK") 108 def serialPowerOnOff(ip, port, index, power, user='Administrator', password=''): 111 # @Method: serialPowerOnOff(ip, port,index,power,user='Administrator', password='') 113 # @Param: ip: 串口服务器ip [all...] |
/developtools/profiler/device/plugins/native_daemon/include/ |
H A D | virtual_runtime.h | 39 It mainly receives data is ip pointer (virtual address), pid 143 uint64_t& ip = first; member 150 ip = sym.ip; in operator =() 154 SymbolCacheKey(const std::pair<uint64_t, uint32_t>& arg) : pair(arg), ip(first), filePathId(second) {} in SymbolCacheKey() 155 SymbolCacheKey(uint64_t ip, uint32_t filePathId) : pair(ip, filePathId), ip(first), filePathId(second) {} in SymbolCacheKey() 165 seed ^= hasher(key.ip) + 0x9e3779b9 + (seed << 6) + (seed >> 2); in operator ()() 184 bool GetSymbolCache(uint64_t ip, DfxSymbo [all...] |
H A D | perf_event_record.h | 59 CallFrame(uint64_t ip, uint64_t sp = 0, bool isJsFrame = false) : ip_(ip), sp_(sp), isJsFrame_(isJsFrame) {} in CallFrame() 62 CallFrame(uint64_t ip, uint64_t vaddrInFile, const char *name, const char *filePath) in CallFrame() 63 : ip_(ip), vaddrInFile_(vaddrInFile), symbolName_(name), filePath_(filePath) in CallFrame() 76 return StringPrintf("ip: 0x%016llx sp: 0x%016llx", ip_, sp_); in ToString() 84 output = StringPrintf("ip: 0x%016llx ", ip_); in ToSymbolString()
|
H A D | call_stack.h | 64 bool GetIpSP(uint64_t &ip, uint64_t &sp, const u64 *regs, size_t regNum) const;
75 static int FindProcInfo(unw_addr_space_t as, unw_word_t ip, unw_proc_info_t *pi,
89 UnwindInfo *unwindInfoPtr, unw_addr_space_t as, unw_word_t ip,
|
/developtools/profiler/device/plugins/native_daemon/src/ |
H A D | virtual_runtime.cpp | 338 const DfxSymbol VirtualRuntime::GetKernelSymbol(uint64_t ip, const std::vector<std::shared_ptr<DfxMap>> &maps, in GetKernelSymbol() argument 341 DfxSymbol vaddrSymbol(ip, thread.name_); in GetKernelSymbol() 343 if (ip > map->begin && ip < map->end) { in GetKernelSymbol() 345 ip, map->begin, map->end, map->name.c_str()); in GetKernelSymbol() 352 symbolsFile->GetVaddrInSymbols(ip, map->begin, map->offset); in GetKernelSymbol() 355 vaddrSymbol.fileVaddr_, ip, map->name.c_str()); in GetKernelSymbol() 360 foundSymbols.taskVaddr_ = ip; in GetKernelSymbol() 363 ip, vaddrSymbol.fileVaddr_, map->name.c_str()); in GetKernelSymbol() 369 HLOGW("addr 0x%" PRIx64 " in map but NOT found the symbol file %s", ip, in GetKernelSymbol() 379 GetUserSymbol(uint64_t ip, const VirtualThread &thread) GetUserSymbol() argument 427 GetSymbolCache(uint64_t ip, DfxSymbol &symbol, const VirtualThread &thread) GetSymbolCache() argument 440 UpdateSymbolCache(uint64_t ip, DfxSymbol &symbol, HashList<uint64_t, DfxSymbol> &cache) UpdateSymbolCache() argument [all...] |
H A D | call_stack.cpp | 169 UnwindInfo *unwindInfoPtr, unw_addr_space_t as, unw_word_t ip,
in FindUnwindTable() 220 tdep_search_unwind_table(as, ip, &di, pi, need_unwind_info, arg));
in FindUnwindTable() 239 int CallStack::FindProcInfo(unw_addr_space_t as, unw_word_t ip, unw_proc_info_t *pi,
in FindProcInfo() argument 244 HLOGM("need_unwind_info ret %d ip %" UNW_WORD_PFLAG "", need_unwind_info, ip);
in FindProcInfo() 245 auto map = unwindInfoPtr->thread.FindMapByAddr(ip);
in FindProcInfo() 249 return FindUnwindTable(symbolsFile, map, unwindInfoPtr, as, ip, pi, need_unwind_info,
in FindProcInfo() 256 HLOGE("ip 0x%016" UNW_WORD_PFLAG " not found in thread %d:%s", ip,
in FindProcInfo() 359 unw_word_t ip in UnwindStep() local 168 FindUnwindTable(SymbolsFile *symbolsFile, std::shared_ptr<DfxMap> map, UnwindInfo *unwindInfoPtr, unw_addr_space_t as, unw_word_t ip, unw_proc_info_t *pi, int need_unwind_info, void *arg) FindUnwindTable() argument 394 GetIpSP(uint64_t &ip, uint64_t &sp, const u64 *regs, size_t regNum) const GetIpSP() argument 458 uint64_t ip = 0; UnwindCallStack() local [all...] |
H A D | symbols_file.cpp | 419 uint64_t GetVaddrInSymbols(uint64_t ip, uint64_t mapStart, 428 if ip is 0x46e6ab 430 2. ip - map start(002c5000) = map section offset 433 = ip offset (ip always in exec file offset) 434 5. ip offset + exec begin vaddr(2c5000) = virtual ip in elf 436 uint64_t vaddr = ip - mapStart + mapPageOffset - textExecVaddrFileOffset_ + textExecVaddr_; 437 HLOGM(" ip :0x%016" PRIx64 " -> elf offset :0x%016" PRIx64 " -> vaddr :0x%016" PRIx64 " ", 438 ip, i 1113 GetVaddrInSymbols(uint64_t ip, uint64_t, uint64_t) const GetVaddrInSymbols() argument [all...] |
/developtools/hiperf/src/ |
H A D | virtual_runtime.cpp | 39 // if ip is 0 , 1 both not useful 386 HLOGW("Hashtable size limit, ip compress failed!"); in DedupFromRecord() 420 uint64_t ip = node->section.ip | KERNEL_PREFIX; in CollectDedupSymbol() local 421 if (ip == PERF_CONTEXT_KERNEL || ip == PERF_CONTEXT_USER) { in CollectDedupSymbol() 424 kernelSymbolsHits.insert(ip); in CollectDedupSymbol() 426 userSymbolsHits[pid].insert(node->section.ip); in CollectDedupSymbol() 490 void VirtualRuntime::SymbolicCallFrame(PerfRecordSample &recordSample, uint64_t ip, in SymbolicCallFrame() argument 498 auto symbol = GetSymbol(ip, pi in SymbolicCallFrame() 531 uint64_t ip = recordSample.data_.ips[i]; SymbolicRecord() local 922 GetKernelSymbol(uint64_t ip, const std::vector<DfxMap> &memMaps, const VirtualThread &thread) GetKernelSymbol() argument 968 GetKernelThreadSymbol(uint64_t ip, const VirtualThread &thread) GetKernelThreadSymbol() argument 1014 GetUserSymbol(uint64_t ip, const VirtualThread &thread) GetUserSymbol() argument 1095 GetSymbol(uint64_t ip, pid_t pid, pid_t tid, const perf_callchain_context &context) GetSymbol() argument [all...] |
H A D | callstack.cpp | 187 UnwindInfo *unwindInfoPtr, unw_addr_space_t as, unw_word_t ip, in FindUnwindTable() 241 tdep_search_unwind_table(as, ip, &di, pi, need_unwind_info, arg)); in FindUnwindTable() 260 int CallStack::FindProcInfo(unw_addr_space_t as, unw_word_t ip, unw_proc_info_t *pi, in FindProcInfo() argument 265 HLOGM("need_unwind_info ret %d ip %" UNW_WORD_PFLAG "", need_unwind_info, ip); in FindProcInfo() 266 auto map = unwindInfoPtr->thread.FindMapByAddr(ip); in FindProcInfo() 270 return FindUnwindTable(symbolsFile, map, unwindInfoPtr, as, ip, pi, need_unwind_info, arg); in FindProcInfo() 276 HLOGE("ip 0x%016" UNW_WORD_PFLAG " not found in thread %d:%s", ip, in FindProcInfo() 384 unw_word_t ip; in UnwindStep() local 186 FindUnwindTable(SymbolsFile *symbolsFile, std::shared_ptr<DfxMap> map, UnwindInfo *unwindInfoPtr, unw_addr_space_t as, unw_word_t ip, unw_proc_info_t *pi, int need_unwind_info, void *arg) FindUnwindTable() argument 419 GetIpSP(uint64_t &ip, uint64_t &sp, const u64 *regs, size_t regNum) const GetIpSP() argument 486 uint64_t ip; UnwindCallStack() local [all...] |
H A D | symbols_file.cpp | 461 uint64_t GetVaddrInSymbols(uint64_t ip, uint64_t mapStart, 470 if ip is 0x46e6ab 472 2. ip - map start(002c5000) = map section offset 475 = ip offset (ip always in exec file offset) 476 5. ip offset + exec begin vaddr(2c5000) = virtual ip in elf 478 uint64_t vaddr = ip - mapStart + mapPageOffset - textExecVaddrFileOffset_ + textExecVaddr_; 479 HLOGM(" ip :0x%016" PRIx64 " -> elf offset :0x%016" PRIx64 " -> vaddr :0x%016" PRIx64 " ", 480 ip, i 1297 GetVaddrInSymbols(uint64_t ip, uint64_t mapStart, uint64_t mapOffset) const GetVaddrInSymbols() argument [all...] |
/developtools/profiler/device/plugins/hiebpf_plugin/tools/src/ |
H A D | ebpf_converter.cpp | 235 for (const auto &ip : efs.userIPs) { in EventFsParsing() 236 if (ip == 0) { in EventFsParsing() 239 outData_ << " 0x" << std::hex << ip << std::dec << ":"; in EventFsParsing() 240 auto itm = GetSymbolInfo(efs.pid, ip); in EventFsParsing() 241 outData_ << "\n vAddr_: 0x" << std::hex << vAddr_[ip] << std::dec << '\n'; in EventFsParsing() 394 for (const auto &ip : mem.userIPs) { in EventMemParsing() 395 if (ip == 0) { in EventMemParsing() 398 outData_ << " 0x" << std::hex << ip << std::dec << ":"; in EventMemParsing() 399 auto itm = GetSymbolInfo(mem.pid, ip); in EventMemParsing() 400 outData_ << "\n vAddr_: 0x" << std::hex << vAddr_[ip] << st in EventMemParsing() 474 GetSymbolInfo(uint64_t pid, uint64_t ip) GetSymbolInfo() argument [all...] |
/developtools/hdc/src/host/ |
H A D | translate.cpp | 110 " tconn key - Connect device via key, TCP use ip:port\n" in Verbose() 124 " -s [ip:]port - Set hdc server listen config\n" in Verbose() 187 "extconn key - Connect external device via key, TCP use ip:port(remian)\n" in Verbose() 188 "-S [ip:]port - Set hdc external server listen config\n" in Verbose() 210 string ip = outCmd->parameters.substr(0, pos); in TargetConnect() local 211 if (!Base::IsValidIpv4(ip)) { in TargetConnect() 222 if (ip == "localhost") { in TargetConnect() 223 ip = "127.0.0.1"; in TargetConnect() 224 outCmd->parameters.replace(0, pos, ip); in TargetConnect() 228 if ((port <= 0 || port > MAX_IP_PORT) || uv_ip4_addr(ip in TargetConnect() [all...] |
H A D | host_tcp.cpp | 128 char ip[BUF_SIZE_TINY] = ""; in ConnectDaemon() local 130 if (Base::ConnectKey2IPPort(connectKey.c_str(), ip, &port, sizeof(ip)) < 0) { in ConnectDaemon() 144 uv_ip4_addr(ip, port, &dest); in ConnectDaemon()
|
H A D | client.cpp | 337 char ip[BUF_SIZE_TINY] = ""; in ExecuteCommand() local 339 int ret = Base::ConnectKey2IPPort(channelHostPort.c_str(), ip, &port, sizeof(ip)); in ExecuteCommand() 362 ConnectServerForClient(ip, port); in ExecuteCommand() 380 int HdcClient::ConnectServerForClient(const char *ip, uint16_t port) in ConnectServerForClient() argument 386 WRITE_LOG(LOG_DEBUG, "Try to connect %s:%d", ip, port); in ConnectServerForClient() 396 if (strchr(ip, '.')) { in ConnectServerForClient() 398 std::string s = ip; in ConnectServerForClient() 409 WRITE_LOG(LOG_DEBUG, "ConnectServerForClient ipv6 %s:%d", ip, port); in ConnectServerForClient() 410 uv_ip6_addr(ip, por in ConnectServerForClient() [all...] |
/developtools/integration_verification/DeployDevice/src/aw/Common/ |
H A D | Common.py | 77 # @Func: 返回机器ip 80 # @return: ip 83 ip = "" 87 ip = s.getsockname()[0] 92 return ip
|
/developtools/hiperf/include/ |
H A D | virtual_runtime.h | 36 It mainly receives data is ip pointer (virtual address), pid 132 DfxSymbol GetSymbol(uint64_t ip, pid_t pid, pid_t tid, 215 const DfxSymbol GetKernelSymbol(uint64_t ip, const std::vector<DfxMap> &memMaps, 217 const DfxSymbol GetUserSymbol(uint64_t ip, const VirtualThread &thread); 218 const DfxSymbol GetKernelThreadSymbol(uint64_t ip, const VirtualThread &thread); 222 void SymbolicCallFrame(PerfRecordSample &recordSample, uint64_t ip,
|
H A D | callstack.h | 80 bool GetIpSP(uint64_t &ip, uint64_t &sp, const u64 *regs, size_t regNum) const; 89 static int FindProcInfo(unw_addr_space_t as, unw_word_t ip, unw_proc_info_t *pi, 103 UnwindInfo *unwindInfoPtr, unw_addr_space_t as, unw_word_t ip,
|
/developtools/profiler/device/plugins/native_daemon/test/unittest/common/native/ |
H A D | register_test.cpp | 150 size_t ip = RegisterGetIP(buildArchType); in HWTEST_F() local 151 registers[ip] = 0x1234; in HWTEST_F() 153 EXPECT_EQ(RegisterGetValue(value, registers, ip, sizeof(registers)), in HWTEST_F()
|
/developtools/hiperf/test/unittest/common/native/ |
H A D | register_test.cpp | 150 size_t ip = RegisterGetIP(BUILD_ARCH_TYPE); in HWTEST_F() local 151 registers[ip] = 0x1234; in HWTEST_F() 153 EXPECT_EQ(RegisterGetValue(value, registers, ip, sizeof(registers)), in HWTEST_F()
|
/developtools/profiler/device/plugins/ftrace_plugin/tools/device_kernel_version/default/event_formatters/ |
H A D | ftrace_ftrace_event_formatter.cpp | 34 if (kernelSymbols.count(msg.ip()) > 0) { 35 functionStr = kernelSymbols[msg.ip()]; 41 len = snprintf_s(buffer, BUFFER_SIZE, BUFFER_SIZE - 1, "bputs: %p: %s", (void*)msg.ip(), msg.str().c_str()); 139 if (kernelSymbols.count(msg.ip()) > 0) { 140 functionStr = kernelSymbols[msg.ip()]; 147 buffer, BUFFER_SIZE, BUFFER_SIZE - 1, "function: %p <-- %p", (void*)msg.ip(), (void*)msg.parent_ip());
|