From cd3a61a2a3f95d1c450e5d033009a5e66b7df491 Mon Sep 17 00:00:00 2001 From: Gabriel Corona Date: Thu, 23 Jul 2015 01:10:41 +0200 Subject: [PATCH] Tool to transform JIT_PPC_${address} to JIT_PPC_${symbol} --- Tools/symbolicate-ppc.py | 95 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 95 insertions(+) create mode 100755 Tools/symbolicate-ppc.py diff --git a/Tools/symbolicate-ppc.py b/Tools/symbolicate-ppc.py new file mode 100755 index 0000000000..4a7ddaebcb --- /dev/null +++ b/Tools/symbolicate-ppc.py @@ -0,0 +1,95 @@ +#!/usr/bin/python + +# This filter replace all occurences of JIT_PPC_${address} by a +# corresponding function name JIT_PPC_${symbol} as defined by a .map file. +# TODO, add an option to append the block address (JIT_PPC_${symbol}@${addr}) + +# Example 1: guest function profiling (excluding host callees) +# +# $ perf record -t $tid +# $ perf script | sed 's/.*cycles: *[0-9a-f]* *//' | +# python Tools/symbolicate-ppc.py ~/.dolphin-emu/Maps/${map}.map | +# rankor -r | head +# 10.05% JIT_Loop (/tmp/perf-15936.map) +# 3.73% [unknown] (/tmp/perf-15936.map) +# 1.91% VideoBackendHardware::Video_GatherPipeBursted (/opt/dolphin-2015-05-06/bin/dolphin-emu) +# 1.39% JIT_PPC_PSMTXConcat (/tmp/perf-15936.map) +# 1.00% JIT_PPC_zz_051754c_ (/tmp/perf-15936.map) +# 0.90% JIT_PPC_zz_051751c_ (/tmp/perf-15936.map) +# 0.71% JIT_PPC_zz_04339d4_ (/tmp/perf-15936.map) +# 0.59% JIT_PPC_zz_05173e0_ (/tmp/perf-15936.map) +# 0.57% JIT_PPC_zz_044141c_ (/tmp/perf-15936.map) +# 0.54% JIT_PPC_zz_01839cc_ (/tmp/perf-15936.map) + +# Example 2: guest function profiling (including host callees) +# +# $ perf record --call-graph dwarf -t $tid +# $ perf script | stackcollapse-perf.pl | sed 's/^CPU;//' | +# python Tools/symbolicate-ppc.py ~/.dolphin-emu/Maps/${map}.map | +# perl -pe 's/^([^; ]*).*? ([0-9]+?)$/\1 \2/' | stackcollapse-recursive.pl | +# awk '{printf "%s %s\n", $2, $1}' | sort -rn | head +# 5811 JIT_Loop +# 2396 [unknown] +# 577 JIT_PPC_PSMTXConcat +# 464 JIT_PPC___restore_gpr +# 396 JIT_PPC_zz_0517514_ +# 313 JIT_PPC_zz_04339d4_ +# 290 JIT_PPC_zz_05173e0_ +# 285 JIT_PPC_zz_01839cc_ +# 277 JIT_PPC_zz_04335ac_ +# 269 JIT_PPC_zz_0420b58_ + +import re +import sys + +stdin = sys.stdin +stdout = sys.stdout + +class Symbol: + def __init__(self, start, size, name): + self.start = start + self.end = start + size + self.name = name + +# Read a .map file: this is a line-oriented file containing mapping from +# the (PowerPC) memory addresses to function names. +# The format is: "%08x %08x %08x %i %s" (address, size, address, 0, name). +# They should be already be sorted. +def read_map(filename): + reg = re.compile("^([0-9a-f]{8}) ([0-9a-f]{8}) ([0-9a-f]{8}) ([0-9]*) (.*)$") + res = [] + with open(filename, "r") as f: + for line in f: + match = reg.match(line) + if match: + start = int(match.group(1), 16) + size = int(match.group(2), 16) + name = match.group(5) + res.append(Symbol(start, size, name)) + return res + +map = read_map(sys.argv[1]) + +# Do a binary each in the map file in order to find the symbol: +def lookup(address): + i = 0 + j = len(map) + while(True): + if (j < i): + return "JIT_PPC_[unknown]" + k = round((j + i) // 2) + if (address < map[k].start): + j = k - 1 + elif (address >= map[k].end): + i = k + 1 + else: + return "JIT_PPC_" + map[k].name + +# Function used to replace given match: +def replace(match): + return lookup(int(match.group(1), 16)) + +# Process stdin and write to stdout: +for line in stdin: + modline = re.sub('JIT_PPC_([0-9a-f]*)', replace, line) + stdout.write(modline)