Searched refs:ip (Results 1 - 25 of 29) sorted by relevance

12

/system/core/libnetutils/
H A Dpacket.c25 #include <netinet/ip.h>
92 struct iphdr ip; local
100 ip.version = IPVERSION;
101 ip.ihl = sizeof(ip) >> 2;
102 ip.tos = 0;
103 ip.tot_len = htons(sizeof(ip) + sizeof(udp) + size);
104 ip.id = 0;
105 ip
161 struct iphdr ip; member in struct:dhcp_packet
[all...]
/system/extras/simpleperf/inferno/
H A Ddata_types.py18 def __init__(self, ip, method, dso):
19 self.ip = ip
38 if entry.ip == 0:
40 chain.append(CallSite(entry.ip, entry.symbol.symbol_name, entry.symbol.dso_name))
42 chain.append(CallSite(sample.ip, symbol.symbol_name, symbol.dso_name))
/system/extras/simpleperf/
H A Dreport_lib_interface.cpp36 uint64_t ip; member in struct:Sample
65 uint64_t ip; member in struct:CallChainEntry
217 current_sample_.ip = r.ip_data.ip;
255 thread_tree_.FindMap(current_thread_, r.ip_data.ip, r.InKernel());
258 thread_tree_.FindSymbol(map, r.ip_data.ip, &vaddr_in_file);
278 uint64_t ip = r.callchain_data.ips[i]; local
279 if (ip >= PERF_CONTEXT_MAX) {
280 switch (ip) {
289 << ip; local
[all...]
H A Dcmd_report_sample.cpp91 bool GetCallEntry(const ThreadEntry* thread, bool in_kernel, uint64_t ip, bool omit_unknown_dso,
93 bool GetCallEntry(const ThreadEntry* thread, bool in_kernel, uint64_t ip, bool omit_unknown_dso,
376 bool ret = GetCallEntry(thread, in_kernel, r.ip_data.ip, false, &vaddr_in_file, &file_id,
387 uint64_t ip = r.callchain_data.ips[i]; local
388 if (ip >= PERF_CONTEXT_MAX) {
389 switch (ip) {
398 << ip << std::dec;
403 // Remove duplication with sample ip.
404 if (ip == r.ip_data.ip) {
430 GetCallEntry(const ThreadEntry* thread, bool in_kernel, uint64_t ip, bool omit_unknown_dso, uint64_t* pvaddr_in_file, uint32_t* pfile_id, int32_t* psymbol_id) argument
454 GetCallEntry(const ThreadEntry* thread, bool in_kernel, uint64_t ip, bool omit_unknown_dso, uint64_t* pvaddr_in_file, Dso** pdso, const Symbol** psymbol) argument
561 uint64_t ip = r.callchain_data.ips[i]; local
572 << ip; local
[all...]
H A Dthread_tree.cpp202 const MapEntry* ThreadTree::FindMap(const ThreadEntry* thread, uint64_t ip, argument
206 result = FindMapByAddr(*thread->maps, ip);
208 result = FindMapByAddr(kernel_maps_, ip);
213 const MapEntry* ThreadTree::FindMap(const ThreadEntry* thread, uint64_t ip) { argument
214 MapEntry* result = FindMapByAddr(*thread->maps, ip);
218 result = FindMapByAddr(kernel_maps_, ip);
222 const Symbol* ThreadTree::FindSymbol(const MapEntry* map, uint64_t ip, argument
226 vaddr_in_file = ip - map->start_addr + map->dso->MinVirtualAddress();
232 vaddr_in_file = ip;
257 const Symbol* ThreadTree::FindKernelSymbol(uint64_t ip) { argument
[all...]
H A Dthread_tree.h96 const MapEntry* FindMap(const ThreadEntry* thread, uint64_t ip,
98 // Find map for an ip address when we don't know whether it is in kernel.
99 const MapEntry* FindMap(const ThreadEntry* thread, uint64_t ip);
100 const Symbol* FindSymbol(const MapEntry* map, uint64_t ip,
102 const Symbol* FindKernelSymbol(uint64_t ip);
H A Dsample_tree.h128 for (auto& ip : ips) {
129 if (ip >= PERF_CONTEXT_MAX) {
130 switch (ip) {
138 LOG(DEBUG) << "Unexpected perf_context in callchain: " << ip;
143 // Remove duplication with sampled ip.
144 if (ip == r.ip_data.ip) {
149 CreateCallChainSample(sample, ip, in_kernel, callchain, acc_info);
192 virtual EntryT* CreateCallChainSample(const EntryT* sample, uint64_t ip,
H A Drecord_equal_test.h36 EXPECT_EQ(r1.ip_data.ip, r2.ip_data.ip);
H A Dcmd_record.cpp1137 thread_tree_.FindMap(thread, r.ip_data.ip, r.InKernel());
1141 symbol = thread_tree_.FindSymbol(map, r.ip_data.ip, nullptr, &dso);
1153 uint64_t ip = r.callchain_data.ips[i]; local
1154 if (ip >= PERF_CONTEXT_MAX) {
1155 switch (ip) {
1164 << ip; local
1169 // Remove duplication with sample ip.
1170 if (ip == r.ip_data.ip) {
1174 map = thread_tree_.FindMap(thread, ip, in_kerne
[all...]
H A Dperf_regs.cpp120 {PERF_REG_X86_BP, "bp"}, {PERF_REG_X86_SP, "sp"}, {PERF_REG_X86_IP, "ip"},
127 {PERF_REG_ARM_FP, "fp"}, {PERF_REG_ARM_IP, "ip"}, {PERF_REG_ARM_SP, "sp"},
187 void SetIpReg(ArchType arch, uint64_t ip, RegSet* regs) { argument
204 regs->data[regno] = ip;
H A Dsample_tree_test.cpp64 void AddSample(int pid, int tid, uint64_t ip, bool in_kernel) { argument
66 const MapEntry* map = thread_tree_->FindMap(thread, ip, in_kernel);
H A Dinplace_sampler_lib.cpp312 uint64_t ip = static_cast<uint64_t>(reinterpret_cast<uintptr_t>(&FakeFunction)); local
320 MoveToBinaryFormat(ip, p);
H A Dcmd_report.cpp147 thread_tree_->FindMap(thread, r.ip_data.ip, in_kernel);
150 thread_tree_->FindSymbol(map, r.ip_data.ip, &vaddr_in_file);
179 SampleEntry* CreateCallChainSample(const SampleEntry* sample, uint64_t ip,
184 const MapEntry* map = thread_tree_->FindMap(thread, ip, in_kernel);
186 // The unwinders can give wrong ip addresses, which can't map to a valid dso. Skip them.
191 const Symbol* symbol = thread_tree_->FindSymbol(map, ip, &vaddr_in_file);
328 "--no-show-ip Don't show vaddr in file for unknown symbols.\n"
506 } else if (args[i] == "--no-show-ip") {
H A Dcmd_kmem.cpp150 // events all happen in kernel. But if r.ip_data.ip == 0, it may be
151 // a kernel record failed to dump ip register and is still useful.
152 if (r.ip_data.ip == 0) {
215 const SlabSample* sample, uint64_t ip, bool in_kernel,
221 const Symbol* symbol = thread_tree_->FindKernelSymbol(ip);
H A Drecord.h66 uint64_t ip; member in struct:PerfSampleIpType
385 SampleRecord(const perf_event_attr& attr, uint64_t id, uint64_t ip,
/system/extras/simpleperf/scripts/
H A Dreport_sample.py53 print('%16x\t%s (%s)' % (sample.ip, symbol.symbol_name, symbol.dso_name))
56 print('%16x\t%s (%s)' % (entry.ip, entry.symbol.symbol_name, entry.symbol.dso_name))
H A Dsimpleperf_report_lib.py48 _fields_ = [('ip', ct.c_uint64),
77 _fields_ = [('ip', ct.c_uint64),
89 self.ip = sample.ip
115 self.ip = entry.ip
275 if sample.ip == 0x4004ff and sample.time == 7637889424953:
/system/extras/perfprofd/quipper/
H A Dperf_parser.cc156 // previously-endian-swapped location. This used to log ip.
269 const uint64_t unmapped_event_ip = sample_info.ip;
272 if (!MapIPAndPidAndGetNameAndOffset(sample_info.ip,
274 &sample_info.ip,
280 !MapCallchain(sample_info.ip,
308 bool PerfParser::MapCallchain(const uint64_t ip, argument
335 callchain->ips[j] = ip;
414 uint64_t ip,
428 bool mapped = mapper->GetMappedAddress(ip, &mapped_addr);
431 mapped = mapper->GetMappedAddress(ip,
413 MapIPAndPidAndGetNameAndOffset( uint64_t ip, uint32_t pid, uint64_t* new_ip, ParsedEvent::DSOAndOffset* dso_and_offset) argument
[all...]
H A Dperf_parser.h212 bool MapCallchain(const uint64_t ip,
229 uint64_t ip,
/system/core/libbacktrace/
H A DBacktraceOffline.h65 bool FindProcInfo(unw_addr_space_t addr_space, uint64_t ip, unw_proc_info_t* proc_info,
H A DBacktraceOffline.cpp110 static int FindProcInfo(unw_addr_space_t addr_space, unw_word_t ip, unw_proc_info* proc_info, argument
113 bool result = backtrace->FindProcInfo(addr_space, ip, proc_info, need_unwind_info);
264 bool BacktraceOffline::FindProcInfo(unw_addr_space_t addr_space, uint64_t ip, argument
267 FillInMap(ip, &map);
283 uint64_t ip_vaddr = ip - map.start + debug_frame->min_vaddr;
287 // function range for each entry, by matching ip address with the function range, we know exactly
288 // whether the ip address hits an entry. But .ARM.exidx doesn't have function range for each
289 // entry, it thinks that an ip address hits an entry when (entry.addr <= ip < next_entry.addr).
290 // To prevent ip addresse
[all...]
/system/core/debuggerd/libdebuggerd/arm/
H A Dmachine.cpp61 _LOG(log, logtype::REGISTERS, " ip %08x sp %08x lr %08x pc %08x cpsr %08x\n", \
62 static_cast<uint32_t>(reg_prefix##ip), static_cast<uint32_t>(reg_prefix##sp), \
/system/netd/netutils_wrappers/
H A DAndroid.mk34 ln -sf netutils-wrapper-1.0 $(TARGET_OUT)/bin/ip-wrapper-1.0;
/system/extras/perfprofd/quipper/kernel-headers/tools/perf/util/
H A Devent.h115 u64 ip; member in struct:perf_sample
/system/extras/perfprofd/quipper/original-kernel-headers/tools/perf/util/
H A Devent.h106 u64 ip; member in struct:perf_sample

Completed in 308 milliseconds

12