/system/core/libnetutils/ |
H A D | packet.c | 25 #include <netinet/ip.h> 92 struct iphdr ip; local 100 ip.version = IPVERSION; 101 ip.ihl = sizeof(ip) >> 2; 102 ip.tos = 0; 103 ip.tot_len = htons(sizeof(ip) + sizeof(udp) + size); 104 ip.id = 0; 105 ip 161 struct iphdr ip; member in struct:dhcp_packet [all...] |
/system/extras/simpleperf/ |
H A D | report_lib_interface.cpp | 36 uint64_t ip; member in struct:Sample 65 uint64_t ip; member in struct:CallChainEntry 217 current_sample_.ip = r.ip_data.ip; 255 thread_tree_.FindMap(current_thread_, r.ip_data.ip, r.InKernel()); 258 thread_tree_.FindSymbol(map, r.ip_data.ip, &vaddr_in_file); 278 uint64_t ip = r.callchain_data.ips[i]; local 279 if (ip >= PERF_CONTEXT_MAX) { 280 switch (ip) { 289 << ip; local [all...] |
H A D | cmd_report_sample.cpp | 91 void GetCallEntry(const ThreadEntry* thread, bool in_kernel, uint64_t ip, 94 void GetCallEntry(const ThreadEntry* thread, bool in_kernel, uint64_t ip, 367 GetCallEntry(thread, in_kernel, r.ip_data.ip, &vaddr_in_file, &file_id, 377 uint64_t ip = r.callchain_data.ips[i]; local 378 if (ip >= PERF_CONTEXT_MAX) { 379 switch (ip) { 388 << ip << std::dec; 393 // Remove duplication with sample ip. 394 if (ip == r.ip_data.ip) { 415 GetCallEntry(const ThreadEntry* thread, bool in_kernel, uint64_t ip, uint64_t* pvaddr_in_file, uint32_t* pfile_id, int32_t* psymbol_id) argument 435 GetCallEntry(const ThreadEntry* thread, bool in_kernel, uint64_t ip, uint64_t* pvaddr_in_file, Dso** pdso, const Symbol** psymbol) argument 523 uint64_t ip = r.callchain_data.ips[i]; local 534 << ip; local [all...] |
H A D | thread_tree.cpp | 201 const MapEntry* ThreadTree::FindMap(const ThreadEntry* thread, uint64_t ip, argument 205 result = FindMapByAddr(*thread->maps, ip); 207 result = FindMapByAddr(kernel_maps_, ip); 212 const MapEntry* ThreadTree::FindMap(const ThreadEntry* thread, uint64_t ip) { argument 213 MapEntry* result = FindMapByAddr(*thread->maps, ip); 217 result = FindMapByAddr(kernel_maps_, ip); 221 const Symbol* ThreadTree::FindSymbol(const MapEntry* map, uint64_t ip, argument 225 vaddr_in_file = ip - map->start_addr + map->dso->MinVirtualAddress(); 231 vaddr_in_file = ip; 256 const Symbol* ThreadTree::FindKernelSymbol(uint64_t ip) { argument [all...] |
H A D | thread_tree.h | 96 const MapEntry* FindMap(const ThreadEntry* thread, uint64_t ip, 98 // Find map for an ip address when we don't know whether it is in kernel. 99 const MapEntry* FindMap(const ThreadEntry* thread, uint64_t ip); 100 const Symbol* FindSymbol(const MapEntry* map, uint64_t ip, 102 const Symbol* FindKernelSymbol(uint64_t ip);
|
H A D | sample_tree.h | 126 for (auto& ip : ips) { 127 if (ip >= PERF_CONTEXT_MAX) { 128 switch (ip) { 136 LOG(DEBUG) << "Unexpected perf_context in callchain: " << ip; 141 // Remove duplication with sampled ip. 142 if (ip == r.ip_data.ip) { 147 CreateCallChainSample(sample, ip, in_kernel, callchain, acc_info); 187 virtual EntryT* CreateCallChainSample(const EntryT* sample, uint64_t ip,
|
H A D | record_equal_test.h | 36 EXPECT_EQ(r1.ip_data.ip, r2.ip_data.ip);
|
H A D | cmd_record.cpp | 1056 thread_tree_.FindMap(thread, r.ip_data.ip, r.InKernel()); 1060 symbol = thread_tree_.FindSymbol(map, r.ip_data.ip, nullptr, &dso); 1072 uint64_t ip = r.callchain_data.ips[i]; local 1073 if (ip >= PERF_CONTEXT_MAX) { 1074 switch (ip) { 1083 << ip; local 1088 // Remove duplication with sample ip. 1089 if (ip == r.ip_data.ip) { 1093 map = thread_tree_.FindMap(thread, ip, in_kerne [all...] |
H A D | perf_regs.cpp | 119 {PERF_REG_X86_BP, "bp"}, {PERF_REG_X86_SP, "sp"}, {PERF_REG_X86_IP, "ip"}, 126 {PERF_REG_ARM_FP, "fp"}, {PERF_REG_ARM_IP, "ip"}, {PERF_REG_ARM_SP, "sp"}, 186 void SetIpReg(ArchType arch, uint64_t ip, RegSet* regs) { argument 203 regs->data[regno] = ip;
|
H A D | sample_tree_test.cpp | 64 void AddSample(int pid, int tid, uint64_t ip, bool in_kernel) { argument 66 const MapEntry* map = thread_tree_->FindMap(thread, ip, in_kernel);
|
H A D | inplace_sampler_lib.cpp | 312 uint64_t ip = static_cast<uint64_t>(reinterpret_cast<uintptr_t>(&FakeFunction)); local 320 MoveToBinaryFormat(ip, p);
|
H A D | cmd_report.cpp | 143 thread_tree_->FindMap(thread, r.ip_data.ip, in_kernel); 146 thread_tree_->FindSymbol(map, r.ip_data.ip, &vaddr_in_file); 175 SampleEntry* CreateCallChainSample(const SampleEntry* sample, uint64_t ip, 180 const MapEntry* map = thread_tree_->FindMap(thread, ip, in_kernel); 182 const Symbol* symbol = thread_tree_->FindSymbol(map, ip, &vaddr_in_file); 315 "--no-show-ip Don't show vaddr in file for unknown symbols.\n" 490 } else if (args[i] == "--no-show-ip") {
|
H A D | cmd_kmem.cpp | 150 // events all happen in kernel. But if r.ip_data.ip == 0, it may be 151 // a kernel record failed to dump ip register and is still useful. 152 if (r.ip_data.ip == 0) { 215 const SlabSample* sample, uint64_t ip, bool in_kernel, 221 const Symbol* symbol = thread_tree_->FindKernelSymbol(ip);
|
H A D | record.h | 66 uint64_t ip; member in struct:PerfSampleIpType 385 SampleRecord(const perf_event_attr& attr, uint64_t id, uint64_t ip,
|
H A D | record.cpp | 463 uint64_t ip, uint32_t pid, uint32_t tid, 472 ip_data.ip = ip; 600 PrintIndented(indent, "ip %p\n", reinterpret_cast<void*>(ip_data.ip)); 462 SampleRecord(const perf_event_attr& attr, uint64_t id, uint64_t ip, uint32_t pid, uint32_t tid, uint64_t time, uint32_t cpu, uint64_t period, const std::vector<uint64_t>& ips) argument
|
/system/extras/simpleperf/scripts/ |
H A D | report_sample.py | 53 print('%16x\t%s (%s)' % (sample.ip, symbol.symbol_name, symbol.dso_name)) 56 print('%16x\t%s (%s)' % (entry.ip, entry.symbol.symbol_name, entry.symbol.dso_name))
|
H A D | simpleperf_report_lib.py | 54 _fields_ = [('ip', ct.c_uint64), 83 _fields_ = [('ip', ct.c_uint64), 95 self.ip = sample.ip 121 self.ip = entry.ip 286 if sample.ip == 0x4004ff and sample.time == 7637889424953:
|
/system/extras/perfprofd/quipper/ |
H A D | perf_parser.cc | 156 // previously-endian-swapped location. This used to log ip. 269 const uint64_t unmapped_event_ip = sample_info.ip; 272 if (!MapIPAndPidAndGetNameAndOffset(sample_info.ip, 274 &sample_info.ip, 280 !MapCallchain(sample_info.ip, 308 bool PerfParser::MapCallchain(const uint64_t ip, argument 335 callchain->ips[j] = ip; 414 uint64_t ip, 428 bool mapped = mapper->GetMappedAddress(ip, &mapped_addr); 431 mapped = mapper->GetMappedAddress(ip, 413 MapIPAndPidAndGetNameAndOffset( uint64_t ip, uint32_t pid, uint64_t* new_ip, ParsedEvent::DSOAndOffset* dso_and_offset) argument [all...] |
H A D | perf_parser.h | 212 bool MapCallchain(const uint64_t ip, 229 uint64_t ip,
|
/system/core/libbacktrace/ |
H A D | BacktraceOffline.h | 65 bool FindProcInfo(unw_addr_space_t addr_space, uint64_t ip, unw_proc_info_t* proc_info,
|
H A D | BacktraceOffline.cpp | 110 static int FindProcInfo(unw_addr_space_t addr_space, unw_word_t ip, unw_proc_info* proc_info, argument 113 bool result = backtrace->FindProcInfo(addr_space, ip, proc_info, need_unwind_info); 264 bool BacktraceOffline::FindProcInfo(unw_addr_space_t addr_space, uint64_t ip, argument 267 FillInMap(ip, &map); 283 uint64_t ip_vaddr = ip - map.start + debug_frame->min_vaddr; 287 // function range for each entry, by matching ip address with the function range, we know exactly 288 // whether the ip address hits an entry. But .ARM.exidx doesn't have function range for each 289 // entry, it thinks that an ip address hits an entry when (entry.addr <= ip < next_entry.addr). 290 // To prevent ip addresse [all...] |
/system/core/debuggerd/libdebuggerd/arm/ |
H A D | machine.cpp | 61 _LOG(log, logtype::REGISTERS, " ip %08x sp %08x lr %08x pc %08x cpsr %08x\n", \ 62 static_cast<uint32_t>(reg_prefix##ip), static_cast<uint32_t>(reg_prefix##sp), \
|
/system/netd/netutils_wrappers/ |
H A D | Android.mk | 34 ln -sf netutils-wrapper-1.0 $(TARGET_OUT)/bin/ip-wrapper-1.0;
|
/system/extras/perfprofd/quipper/kernel-headers/tools/perf/util/ |
H A D | event.h | 115 u64 ip; member in struct:perf_sample
|
/system/extras/perfprofd/quipper/original-kernel-headers/tools/perf/util/ |
H A D | event.h | 106 u64 ip; member in struct:perf_sample
|