Home
last modified time | relevance | path

Searched refs:kallsyms (Results 1 – 25 of 29) sorted by relevance

12

/system/extras/simpleperf/
Dkallsyms_test.cpp42 TEST(kallsyms, ProcessKernelSymbols) { in TEST() argument
68 TEST(kallsyms, GetKernelStartAddress) { in TEST() argument
73 TEST(kallsyms, LoadKernelSymbols) { in TEST() argument
75 std::string kallsyms; in TEST() local
76 ASSERT_TRUE(LoadKernelSymbols(&kallsyms)); in TEST()
79 TEST(kallsyms, print_warning) { in TEST() argument
93 std::string kallsyms; in TEST() local
94 ASSERT_FALSE(LoadKernelSymbols(&kallsyms)); in TEST()
112 ASSERT_FALSE(LoadKernelSymbols(&kallsyms)); in TEST()
Dkallsyms.h50 bool LoadKernelSymbols(std::string* kallsyms);
Ddso.h123 static void SetKallsyms(std::string kallsyms) { in SetKallsyms() argument
124 if (!kallsyms.empty()) { in SetKallsyms()
125 kallsyms_ = std::move(kallsyms); in SetKallsyms()
Dkallsyms.cpp228 bool LoadKernelSymbols(std::string* kallsyms) { in LoadKernelSymbols() argument
231 return android::base::ReadFileToString(kKallsymsPath, kallsyms); in LoadKernelSymbols()
Dcmd_monitor.cpp260 std::string kallsyms; in PrepareMonitoring() local
261 if (LoadKernelSymbols(&kallsyms)) { in PrepareMonitoring()
262 Dso::SetKallsyms(std::move(kallsyms)); in PrepareMonitoring()
Dreport_lib_interface.cpp194 std::string kallsyms; in SetKallsymsFile() local
195 if (!android::base::ReadFileToString(kallsyms_file, &kallsyms)) { in SetKallsymsFile()
199 Dso::SetKallsyms(std::move(kallsyms)); in SetKallsymsFile()
Ddso.cpp689 void ReadSymbolsFromKallsyms(std::string& kallsyms, std::vector<Symbol>* symbols) { in ReadSymbolsFromKallsyms() argument
701 ProcessKernelSymbols(kallsyms, symbol_callback); in ReadSymbolsFromKallsyms()
723 std::string kallsyms; in ReadSymbolsFromProc() local
724 if (LoadKernelSymbols(&kallsyms)) { in ReadSymbolsFromProc()
725 ReadSymbolsFromKallsyms(kallsyms, symbols); in ReadSymbolsFromProc()
Drecord.cpp1010 kallsyms = p; in KernelSymbolRecord()
1016 PrintIndented(indent, "kallsyms: %s\n", std::string(kallsyms, kallsyms + kallsyms_size).c_str()); in DumpData()
1019 KernelSymbolRecord::KernelSymbolRecord(const std::string& kallsyms) { in KernelSymbolRecord() argument
1021 kallsyms_size = kallsyms.size(); in KernelSymbolRecord()
1022 SetSize(header_size() + 4 + Align(kallsyms.size(), 8)); in KernelSymbolRecord()
1027 this->kallsyms = p; in KernelSymbolRecord()
1028 memcpy(p, kallsyms.data(), kallsyms_size); in KernelSymbolRecord()
Dcmd_record.cpp1246 std::string kallsyms; in DumpKernelSymbol() local
1247 if (!LoadKernelSymbols(&kallsyms)) { in DumpKernelSymbol()
1252 KernelSymbolRecord r(kallsyms); in DumpKernelSymbol()
1749 std::string kallsyms; in DumpAdditionalFeatures() local
1750 if (event_selection_set_.NeedKernelSymbol() && LoadKernelSymbols(&kallsyms)) { in DumpAdditionalFeatures()
1751 Dso::SetKallsyms(kallsyms); in DumpAdditionalFeatures()
Drecord.h511 const char* kallsyms; member
515 explicit KernelSymbolRecord(const std::string& kallsyms);
Dcmd_report.cpp581 std::string kallsyms; in ParseOptions() local
582 if (!android::base::ReadFileToString(*value->str_value, &kallsyms)) { in ParseOptions()
586 Dso::SetKallsyms(kallsyms); in ParseOptions()
DAndroid.bp222 "kallsyms.cpp",
Dthread_tree.cpp401 Dso::SetKallsyms(std::move(r.kallsyms)); in Update()
Dcmd_record_test.cpp329 std::string kallsyms; in CheckKernelSymbol() local
330 bool require_kallsyms = need_kallsyms && LoadKernelSymbols(&kallsyms); in CheckKernelSymbol()
/system/extras/simpleperf/scripts/
Dannotate.py156 kallsyms = 'binary_cache/kallsyms'
157 if not os.path.isfile(kallsyms):
158 kallsyms = None
163 self.kallsyms = kallsyms
202 if self.kallsyms:
203 lib.SetKallsymsFile(self.kallsyms)
254 if self.kallsyms:
255 lib.SetKallsymsFile(self.kallsyms)
Dreport_sample.py74 report_sample(args.record_file, args.symfs, args.kallsyms, args.show_tracing_data)
Dpprof_proto_generator.py287 kallsyms = os.path.join(self.config['binary_cache_dir'], 'kallsyms')
288 if os.path.isfile(kallsyms):
289 self.lib.SetKallsymsFile(kallsyms)
/system/sepolicy/prebuilts/api/31.0/private/
Dprofcollectd.te54 # by reading /proc/kallsyms, get module start address by reading /proc/modules.
Dtraced_perf.te37 # map reading /proc/kallsyms.
Dtraced_probes.te39 # map reading /proc/kallsyms.
/system/sepolicy/private/
Dprofcollectd.te54 # by reading /proc/kallsyms, get module start address by reading /proc/modules.
Dtraced_perf.te37 # map reading /proc/kallsyms.
Dtraced_probes.te39 # map reading /proc/kallsyms.
/system/bpf/bpfloader/
Dbpfloader.rc21 # Enable JIT kallsyms export for privileged users only
/system/extras/simpleperf/scripts/inferno/
Dinferno.py101 kallsyms_file = args.kallsyms

12