dolphin/Tools/symbolicate-ppc.py

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

96 lines
3.1 KiB
Python
Raw Permalink Normal View History

#!/usr/bin/python
# This filter replace all occurences of JIT_PPC_${address} by a
# corresponding function name JIT_PPC_${symbol} as defined by a .map file.
# TODO, add an option to append the block address (JIT_PPC_${symbol}@${addr})
# Example 1: guest function profiling (excluding host callees)
#
# $ perf record -t $tid
# $ perf script | sed 's/.*cycles: *[0-9a-f]* *//' |
# python Tools/symbolicate-ppc.py ~/.dolphin-emu/Maps/${map}.map |
# rankor -r | head
# 10.05% JIT_Loop (/tmp/perf-15936.map)
# 3.73% [unknown] (/tmp/perf-15936.map)
# 1.91% VideoBackendHardware::Video_GatherPipeBursted (/opt/dolphin-2015-05-06/bin/dolphin-emu)
# 1.39% JIT_PPC_PSMTXConcat (/tmp/perf-15936.map)
# 1.00% JIT_PPC_zz_051754c_ (/tmp/perf-15936.map)
# 0.90% JIT_PPC_zz_051751c_ (/tmp/perf-15936.map)
# 0.71% JIT_PPC_zz_04339d4_ (/tmp/perf-15936.map)
# 0.59% JIT_PPC_zz_05173e0_ (/tmp/perf-15936.map)
# 0.57% JIT_PPC_zz_044141c_ (/tmp/perf-15936.map)
# 0.54% JIT_PPC_zz_01839cc_ (/tmp/perf-15936.map)
# Example 2: guest function profiling (including host callees)
#
# $ perf record --call-graph dwarf -t $tid
# $ perf script | stackcollapse-perf.pl | sed 's/^CPU;//' |
# python Tools/symbolicate-ppc.py ~/.dolphin-emu/Maps/${map}.map |
# perl -pe 's/^([^; ]*).*? ([0-9]+?)$/\1 \2/' | stackcollapse-recursive.pl |
# awk '{printf "%s %s\n", $2, $1}' | sort -rn | head
# 5811 JIT_Loop
# 2396 [unknown]
# 577 JIT_PPC_PSMTXConcat
# 464 JIT_PPC___restore_gpr
# 396 JIT_PPC_zz_0517514_
# 313 JIT_PPC_zz_04339d4_
# 290 JIT_PPC_zz_05173e0_
# 285 JIT_PPC_zz_01839cc_
# 277 JIT_PPC_zz_04335ac_
# 269 JIT_PPC_zz_0420b58_
import re
import sys
stdin = sys.stdin
stdout = sys.stdout
class Symbol:
def __init__(self, start, size, name):
self.start = start
self.end = start + size
self.name = name
# Read a .map file: this is a line-oriented file containing mapping from
# the (PowerPC) memory addresses to function names.
# The format is: "%08x %08x %08x %i %s" (address, size, address, 0, name).
# They should be already be sorted.
def read_map(filename):
reg = re.compile("^([0-9a-f]{8}) ([0-9a-f]{8}) ([0-9a-f]{8}) ([0-9]*) (.*)$")
res = []
with open(filename, "r") as f:
for line in f:
match = reg.match(line)
if match:
start = int(match.group(1), 16)
size = int(match.group(2), 16)
name = match.group(5)
res.append(Symbol(start, size, name))
return res
map = read_map(sys.argv[1])
# Do a binary each in the map file in order to find the symbol:
def lookup(address):
i = 0
j = len(map)
while(True):
if (j < i):
return "JIT_PPC_[unknown]"
k = round((j + i) // 2)
if (address < map[k].start):
j = k - 1
elif (address >= map[k].end):
i = k + 1
else:
return "JIT_PPC_" + map[k].name
# Function used to replace given match:
def replace(match):
return lookup(int(match.group(1), 16))
# Process stdin and write to stdout:
for line in stdin:
modline = re.sub('JIT_PPC_([0-9a-f]*)', replace, line)
stdout.write(modline)