Home
last modified time | relevance | path

Searched refs:ip (Results 1 - 25 of 58) sorted by relevance

123

/developtools/smartperf_host/trace_streamer/src/filter/hook_filter/
H A Doffline_symbolization_filter.cpp35 uint64_t ip, in GetSymbolStartMaybeUpdateFrameInfo()
41 frameInfo->offset_ = elfSym->st_value != 0 ? elfSym->st_value : ip; in GetSymbolStartMaybeUpdateFrameInfo()
47 bool OfflineSymbolizationFilter::FillFrameInfo(const std::shared_ptr<FrameInfo> &frameInfo, uint64_t ip, uint64_t ipid) in FillFrameInfo() argument
49 frameInfo->ip_ = ip; in FillFrameInfo()
53 auto endItor = startAddrToMapsInfoItor->upper_bound(ip); in FillFrameInfo()
58 if (ip < endItor->second->end()) { in FillFrameInfo()
66 TS_LOGI("find matching Maps Info failed, ip = %" PRIu64 ", length=%" PRId64 "", ip, length); in FillFrameInfo()
72 uint64_t ip, in CalcSymInfo()
77 // calculate symVaddr = ip in CalcSymInfo()
32 GetSymbolStartMaybeUpdateFrameInfo(T *elfSym, uint32_t &symbolStart, uint64_t symVaddr, uint64_t ip, FrameInfo *frameInfo) GetSymbolStartMaybeUpdateFrameInfo() argument
71 CalcSymInfo(uint64_t ipid, uint64_t ip, uint32_t &symbolStart, std::shared_ptr<FrameInfo> &frameInfo, std::shared_ptr<ProtoReader::SymbolTable_Reader> &symbolTable) CalcSymInfo() argument
114 OfflineSymbolizationByIp(uint64_t ipid, uint64_t ip) OfflineSymbolizationByIp() argument
[all...]
H A Doffline_symbolization_filter.h65 std::shared_ptr<FrameInfo> OfflineSymbolizationByIp(uint64_t ipid, uint64_t ip);
76 // first is ipid, second is ip, third is FrameInfo
93 uint64_t ip,
95 bool FillFrameInfo(const std::shared_ptr<FrameInfo> &frameInfo, uint64_t ip, uint64_t ipid);
97 uint64_t ip,
/developtools/smartperf_host/trace_streamer/src/parser/ebpf_parser/
H A Debpf_base.cpp73 EbpfSymbolInfo EbpfBase::GetEbpfSymbolInfo(uint32_t pid, uint64_t ip) in GetEbpfSymbolInfo() argument
75 auto value = pidAndIpToEbpfSymbolInfo_.Find(pid, ip); in GetEbpfSymbolInfo()
79 return GetSymbolNameIndexFromElfSym(pid, ip); in GetEbpfSymbolInfo()
117 void EbpfBase::UpdateFilePathIndexToPidAndIpMap(DataIndex filePathIndex, uint32_t pid, uint64_t ip) in UpdateFilePathIndexToPidAndIpMap() argument
121 itor->second->insert(std::make_tuple(pid, ip)); in UpdateFilePathIndexToPidAndIpMap()
124 pidAndIpSet->insert(std::make_tuple(pid, ip)); in UpdateFilePathIndexToPidAndIpMap()
133 uint64_t ip) in GetSymbolSave()
139 auto end = startToMapsAddr->upper_bound(ip); in GetSymbolSave()
144 if (ip < end->second->end) { in GetSymbolSave()
153 pidAndIpToEbpfSymbolInfo_.Insert(pid, ip, ebpfSymbolInf in GetSymbolSave()
130 GetSymbolSave(EbpfSymbolInfo &ebpfSymbolInfo, StartToMapsAddr &startToMapsAddr, uint32_t pid, uint64_t ip) GetSymbolSave() argument
175 GetSymbolNameIndexFromElfSym(uint32_t pid, uint64_t ip) GetSymbolNameIndexFromElfSym() argument
[all...]
H A Debpf_base.h44 EbpfSymbolInfo GetEbpfSymbolInfo(uint32_t pid, uint64_t ip);
45 EbpfSymbolInfo GetSymbolNameIndexFromElfSym(uint32_t pid, uint64_t ip);
47 void GetSymbolSave(EbpfSymbolInfo &ebpfSymbolInfo, StartToMapsAddr &startToMapsAddr, uint32_t pid, uint64_t ip);
48 void UpdateFilePathIndexToPidAndIpMap(DataIndex filePathIndex, uint32_t pid, uint64_t ip);
H A Debpf_data_reader.cpp293 EbpfSymbolInfo EbpfDataReader::GetSymbolNameIndexFromElfSym(uint64_t ip) in GetSymbolNameIndexFromElfSym() argument
296 auto end = kernelSymbolMap_.upper_bound(ip); in GetSymbolNameIndexFromElfSym()
301 if (ip < end->first + end->second.size) { in GetSymbolNameIndexFromElfSym()
306 TS_LOGD("failed for ip:%" PRIu64 ", kernelip:%" PRIu64 ", size:%" PRIu64 "", ip, end->first, in GetSymbolNameIndexFromElfSym()
311 TS_LOGD("failed for ip:%" PRIu64 "", ip); in GetSymbolNameIndexFromElfSym()
/developtools/integration_verification/DeployDevice/src/aw/poweronoff/
H A Dserial_power_on_off.py7 def __init__(self, ip, port, timeout=10, encoding="GBK"):
10 # @Method: __init__(self, ip, port,timeout=20,encoding="GBK")
12 # @Param: ip: ip地址
24 self.connect((ip, port))
34 # @Method: __init__(self, ip, port,timeout=20,encoding="GBK")
108 def serialPowerOnOff(ip, port, index, power, user='Administrator', password=''):
111 # @Method: serialPowerOnOff(ip, port,index,power,user='Administrator', password='')
113 # @Param: ip: 串口服务器ip
[all...]
/developtools/profiler/device/plugins/native_daemon/include/
H A Dvirtual_runtime.h39 It mainly receives data is ip pointer (virtual address), pid
143 uint64_t& ip = first; member
150 ip = sym.ip; in operator =()
154 SymbolCacheKey(const std::pair<uint64_t, uint32_t>& arg) : pair(arg), ip(first), filePathId(second) {} in SymbolCacheKey()
155 SymbolCacheKey(uint64_t ip, uint32_t filePathId) : pair(ip, filePathId), ip(first), filePathId(second) {} in SymbolCacheKey()
165 seed ^= hasher(key.ip) + 0x9e3779b9 + (seed << 6) + (seed >> 2); in operator ()()
184 bool GetSymbolCache(uint64_t ip, DfxSymbo
[all...]
H A Dperf_event_record.h59 CallFrame(uint64_t ip, uint64_t sp = 0, bool isJsFrame = false) : ip_(ip), sp_(sp), isJsFrame_(isJsFrame) {} in CallFrame()
62 CallFrame(uint64_t ip, uint64_t vaddrInFile, const char *name, const char *filePath) in CallFrame()
63 : ip_(ip), vaddrInFile_(vaddrInFile), symbolName_(name), filePath_(filePath) in CallFrame()
76 return StringPrintf("ip: 0x%016llx sp: 0x%016llx", ip_, sp_); in ToString()
84 output = StringPrintf("ip: 0x%016llx ", ip_); in ToSymbolString()
H A Dcall_stack.h64 bool GetIpSP(uint64_t &ip, uint64_t &sp, const u64 *regs, size_t regNum) const;
75 static int FindProcInfo(unw_addr_space_t as, unw_word_t ip, unw_proc_info_t *pi,
89 UnwindInfo *unwindInfoPtr, unw_addr_space_t as, unw_word_t ip,
/developtools/profiler/device/plugins/native_daemon/src/
H A Dvirtual_runtime.cpp338 const DfxSymbol VirtualRuntime::GetKernelSymbol(uint64_t ip, const std::vector<std::shared_ptr<DfxMap>> &maps, in GetKernelSymbol() argument
341 DfxSymbol vaddrSymbol(ip, thread.name_); in GetKernelSymbol()
343 if (ip > map->begin && ip < map->end) { in GetKernelSymbol()
345 ip, map->begin, map->end, map->name.c_str()); in GetKernelSymbol()
352 symbolsFile->GetVaddrInSymbols(ip, map->begin, map->offset); in GetKernelSymbol()
355 vaddrSymbol.fileVaddr_, ip, map->name.c_str()); in GetKernelSymbol()
360 foundSymbols.taskVaddr_ = ip; in GetKernelSymbol()
363 ip, vaddrSymbol.fileVaddr_, map->name.c_str()); in GetKernelSymbol()
369 HLOGW("addr 0x%" PRIx64 " in map but NOT found the symbol file %s", ip, in GetKernelSymbol()
379 GetUserSymbol(uint64_t ip, const VirtualThread &thread) GetUserSymbol() argument
427 GetSymbolCache(uint64_t ip, DfxSymbol &symbol, const VirtualThread &thread) GetSymbolCache() argument
440 UpdateSymbolCache(uint64_t ip, DfxSymbol &symbol, HashList<uint64_t, DfxSymbol> &cache) UpdateSymbolCache() argument
[all...]
H A Dcall_stack.cpp169 UnwindInfo *unwindInfoPtr, unw_addr_space_t as, unw_word_t ip, in FindUnwindTable()
220 tdep_search_unwind_table(as, ip, &di, pi, need_unwind_info, arg)); in FindUnwindTable()
239 int CallStack::FindProcInfo(unw_addr_space_t as, unw_word_t ip, unw_proc_info_t *pi, in FindProcInfo() argument
244 HLOGM("need_unwind_info ret %d ip %" UNW_WORD_PFLAG "", need_unwind_info, ip); in FindProcInfo()
245 auto map = unwindInfoPtr->thread.FindMapByAddr(ip); in FindProcInfo()
249 return FindUnwindTable(symbolsFile, map, unwindInfoPtr, as, ip, pi, need_unwind_info, in FindProcInfo()
256 HLOGE("ip 0x%016" UNW_WORD_PFLAG " not found in thread %d:%s", ip, in FindProcInfo()
359 unw_word_t ip in UnwindStep() local
168 FindUnwindTable(SymbolsFile *symbolsFile, std::shared_ptr<DfxMap> map, UnwindInfo *unwindInfoPtr, unw_addr_space_t as, unw_word_t ip, unw_proc_info_t *pi, int need_unwind_info, void *arg) FindUnwindTable() argument
394 GetIpSP(uint64_t &ip, uint64_t &sp, const u64 *regs, size_t regNum) const GetIpSP() argument
458 uint64_t ip = 0; UnwindCallStack() local
[all...]
H A Dsymbols_file.cpp419 uint64_t GetVaddrInSymbols(uint64_t ip, uint64_t mapStart,
428 if ip is 0x46e6ab
430 2. ip - map start(002c5000) = map section offset
433 = ip offset (ip always in exec file offset)
434 5. ip offset + exec begin vaddr(2c5000) = virtual ip in elf
436 uint64_t vaddr = ip - mapStart + mapPageOffset - textExecVaddrFileOffset_ + textExecVaddr_;
437 HLOGM(" ip :0x%016" PRIx64 " -> elf offset :0x%016" PRIx64 " -> vaddr :0x%016" PRIx64 " ",
438 ip, i
1113 GetVaddrInSymbols(uint64_t ip, uint64_t, uint64_t) const GetVaddrInSymbols() argument
[all...]
/developtools/hiperf/src/
H A Dvirtual_runtime.cpp39 // if ip is 0 , 1 both not useful
386 HLOGW("Hashtable size limit, ip compress failed!"); in DedupFromRecord()
420 uint64_t ip = node->section.ip | KERNEL_PREFIX; in CollectDedupSymbol() local
421 if (ip == PERF_CONTEXT_KERNEL || ip == PERF_CONTEXT_USER) { in CollectDedupSymbol()
424 kernelSymbolsHits.insert(ip); in CollectDedupSymbol()
426 userSymbolsHits[pid].insert(node->section.ip); in CollectDedupSymbol()
490 void VirtualRuntime::SymbolicCallFrame(PerfRecordSample &recordSample, uint64_t ip, in SymbolicCallFrame() argument
498 auto symbol = GetSymbol(ip, pi in SymbolicCallFrame()
531 uint64_t ip = recordSample.data_.ips[i]; SymbolicRecord() local
922 GetKernelSymbol(uint64_t ip, const std::vector<DfxMap> &memMaps, const VirtualThread &thread) GetKernelSymbol() argument
968 GetKernelThreadSymbol(uint64_t ip, const VirtualThread &thread) GetKernelThreadSymbol() argument
1014 GetUserSymbol(uint64_t ip, const VirtualThread &thread) GetUserSymbol() argument
1095 GetSymbol(uint64_t ip, pid_t pid, pid_t tid, const perf_callchain_context &context) GetSymbol() argument
[all...]
H A Dcallstack.cpp187 UnwindInfo *unwindInfoPtr, unw_addr_space_t as, unw_word_t ip, in FindUnwindTable()
241 tdep_search_unwind_table(as, ip, &di, pi, need_unwind_info, arg)); in FindUnwindTable()
260 int CallStack::FindProcInfo(unw_addr_space_t as, unw_word_t ip, unw_proc_info_t *pi, in FindProcInfo() argument
265 HLOGM("need_unwind_info ret %d ip %" UNW_WORD_PFLAG "", need_unwind_info, ip); in FindProcInfo()
266 auto map = unwindInfoPtr->thread.FindMapByAddr(ip); in FindProcInfo()
270 return FindUnwindTable(symbolsFile, map, unwindInfoPtr, as, ip, pi, need_unwind_info, arg); in FindProcInfo()
276 HLOGE("ip 0x%016" UNW_WORD_PFLAG " not found in thread %d:%s", ip, in FindProcInfo()
384 unw_word_t ip; in UnwindStep() local
186 FindUnwindTable(SymbolsFile *symbolsFile, std::shared_ptr<DfxMap> map, UnwindInfo *unwindInfoPtr, unw_addr_space_t as, unw_word_t ip, unw_proc_info_t *pi, int need_unwind_info, void *arg) FindUnwindTable() argument
419 GetIpSP(uint64_t &ip, uint64_t &sp, const u64 *regs, size_t regNum) const GetIpSP() argument
486 uint64_t ip; UnwindCallStack() local
[all...]
H A Dsymbols_file.cpp461 uint64_t GetVaddrInSymbols(uint64_t ip, uint64_t mapStart,
470 if ip is 0x46e6ab
472 2. ip - map start(002c5000) = map section offset
475 = ip offset (ip always in exec file offset)
476 5. ip offset + exec begin vaddr(2c5000) = virtual ip in elf
478 uint64_t vaddr = ip - mapStart + mapPageOffset - textExecVaddrFileOffset_ + textExecVaddr_;
479 HLOGM(" ip :0x%016" PRIx64 " -> elf offset :0x%016" PRIx64 " -> vaddr :0x%016" PRIx64 " ",
480 ip, i
1297 GetVaddrInSymbols(uint64_t ip, uint64_t mapStart, uint64_t mapOffset) const GetVaddrInSymbols() argument
[all...]
/developtools/profiler/device/plugins/hiebpf_plugin/tools/src/
H A Debpf_converter.cpp235 for (const auto &ip : efs.userIPs) { in EventFsParsing()
236 if (ip == 0) { in EventFsParsing()
239 outData_ << " 0x" << std::hex << ip << std::dec << ":"; in EventFsParsing()
240 auto itm = GetSymbolInfo(efs.pid, ip); in EventFsParsing()
241 outData_ << "\n vAddr_: 0x" << std::hex << vAddr_[ip] << std::dec << '\n'; in EventFsParsing()
394 for (const auto &ip : mem.userIPs) { in EventMemParsing()
395 if (ip == 0) { in EventMemParsing()
398 outData_ << " 0x" << std::hex << ip << std::dec << ":"; in EventMemParsing()
399 auto itm = GetSymbolInfo(mem.pid, ip); in EventMemParsing()
400 outData_ << "\n vAddr_: 0x" << std::hex << vAddr_[ip] << st in EventMemParsing()
474 GetSymbolInfo(uint64_t pid, uint64_t ip) GetSymbolInfo() argument
[all...]
/developtools/hdc/src/host/
H A Dtranslate.cpp110 " tconn key - Connect device via key, TCP use ip:port\n" in Verbose()
124 " -s [ip:]port - Set hdc server listen config\n" in Verbose()
187 "extconn key - Connect external device via key, TCP use ip:port(remian)\n" in Verbose()
188 "-S [ip:]port - Set hdc external server listen config\n" in Verbose()
210 string ip = outCmd->parameters.substr(0, pos); in TargetConnect() local
211 if (!Base::IsValidIpv4(ip)) { in TargetConnect()
222 if (ip == "localhost") { in TargetConnect()
223 ip = "127.0.0.1"; in TargetConnect()
224 outCmd->parameters.replace(0, pos, ip); in TargetConnect()
228 if ((port <= 0 || port > MAX_IP_PORT) || uv_ip4_addr(ip in TargetConnect()
[all...]
H A Dhost_tcp.cpp128 char ip[BUF_SIZE_TINY] = ""; in ConnectDaemon() local
130 if (Base::ConnectKey2IPPort(connectKey.c_str(), ip, &port, sizeof(ip)) < 0) { in ConnectDaemon()
144 uv_ip4_addr(ip, port, &dest); in ConnectDaemon()
H A Dclient.cpp337 char ip[BUF_SIZE_TINY] = ""; in ExecuteCommand() local
339 int ret = Base::ConnectKey2IPPort(channelHostPort.c_str(), ip, &port, sizeof(ip)); in ExecuteCommand()
362 ConnectServerForClient(ip, port); in ExecuteCommand()
380 int HdcClient::ConnectServerForClient(const char *ip, uint16_t port) in ConnectServerForClient() argument
386 WRITE_LOG(LOG_DEBUG, "Try to connect %s:%d", ip, port); in ConnectServerForClient()
396 if (strchr(ip, '.')) { in ConnectServerForClient()
398 std::string s = ip; in ConnectServerForClient()
409 WRITE_LOG(LOG_DEBUG, "ConnectServerForClient ipv6 %s:%d", ip, port); in ConnectServerForClient()
410 uv_ip6_addr(ip, por in ConnectServerForClient()
[all...]
/developtools/integration_verification/DeployDevice/src/aw/Common/
H A DCommon.py77 # @Func: 返回机器ip
80 # @return: ip
83 ip = ""
87 ip = s.getsockname()[0]
92 return ip
/developtools/hiperf/include/
H A Dvirtual_runtime.h36 It mainly receives data is ip pointer (virtual address), pid
132 DfxSymbol GetSymbol(uint64_t ip, pid_t pid, pid_t tid,
215 const DfxSymbol GetKernelSymbol(uint64_t ip, const std::vector<DfxMap> &memMaps,
217 const DfxSymbol GetUserSymbol(uint64_t ip, const VirtualThread &thread);
218 const DfxSymbol GetKernelThreadSymbol(uint64_t ip, const VirtualThread &thread);
222 void SymbolicCallFrame(PerfRecordSample &recordSample, uint64_t ip,
H A Dcallstack.h80 bool GetIpSP(uint64_t &ip, uint64_t &sp, const u64 *regs, size_t regNum) const;
89 static int FindProcInfo(unw_addr_space_t as, unw_word_t ip, unw_proc_info_t *pi,
103 UnwindInfo *unwindInfoPtr, unw_addr_space_t as, unw_word_t ip,
/developtools/profiler/device/plugins/native_daemon/test/unittest/common/native/
H A Dregister_test.cpp150 size_t ip = RegisterGetIP(buildArchType); in HWTEST_F() local
151 registers[ip] = 0x1234; in HWTEST_F()
153 EXPECT_EQ(RegisterGetValue(value, registers, ip, sizeof(registers)), in HWTEST_F()
/developtools/hiperf/test/unittest/common/native/
H A Dregister_test.cpp150 size_t ip = RegisterGetIP(BUILD_ARCH_TYPE); in HWTEST_F() local
151 registers[ip] = 0x1234; in HWTEST_F()
153 EXPECT_EQ(RegisterGetValue(value, registers, ip, sizeof(registers)), in HWTEST_F()
/developtools/profiler/device/plugins/ftrace_plugin/tools/device_kernel_version/default/event_formatters/
H A Dftrace_ftrace_event_formatter.cpp34 if (kernelSymbols.count(msg.ip()) > 0) {
35 functionStr = kernelSymbols[msg.ip()];
41 len = snprintf_s(buffer, BUFFER_SIZE, BUFFER_SIZE - 1, "bputs: %p: %s", (void*)msg.ip(), msg.str().c_str());
139 if (kernelSymbols.count(msg.ip()) > 0) {
140 functionStr = kernelSymbols[msg.ip()];
147 buffer, BUFFER_SIZE, BUFFER_SIZE - 1, "function: %p <-- %p", (void*)msg.ip(), (void*)msg.parent_ip());

Completed in 15 milliseconds

123