/system/core/libnetutils/ |
H A D | dhcptool.c | 39 int rc = do_dhcp(interface); local 40 if (rc) { 46 return rc ? EXIT_FAILURE : EXIT_SUCCESS;
|
/system/update_engine/payload_generator/ |
H A D | bzip.cc | 45 int rc = BZ2_bzBuffToBuffCompress( local 53 TEST_AND_RETURN_FALSE(rc == BZ_OUTBUFF_FULL || rc == BZ_OK); 54 if (rc == BZ_OK) {
|
/system/core/libcutils/ |
H A D | iosched_policy.c | 45 int rc; local 47 if ((rc = syscall(SYS_ioprio_get, IOPRIO_WHO_PROCESS, pid)) < 0) { 51 *clazz = (rc >> IOPRIO_CLASS_SHIFT); 52 *ioprio = (rc & 0xff);
|
H A D | socket_network_client_unix.c | 75 int rc = connect(s, (const struct sockaddr*) &addr, addr_len); local 76 if (rc == 0) { 78 } else if (rc == -1 && errno != EINPROGRESS) { 91 if ((rc = select(s + 1, &r_set, &w_set, NULL, (timeout != 0) ? &ts : NULL)) == -1) { 95 if (rc == 0) { // we had a timeout
|
/system/core/trusty/libtrusty/ |
H A D | trusty.c | 33 int rc; local 37 rc = -errno; 40 return rc < 0 ? rc : -1; 43 rc = ioctl(fd, TIPC_IOC_CONNECT, srv_name); 44 if (rc < 0) { 45 rc = -errno; 49 return rc < 0 ? rc : -1;
|
/system/bt/btif/test/ |
H A D | btif_storage_test.cpp | 35 bool rc = string_to_uuid(s1, &uuid); local 36 EXPECT_TRUE(rc); 42 bool rc = string_to_uuid("This is not a UUID", &uuid); local 43 EXPECT_FALSE(rc);
|
/system/core/gatekeeperd/ |
H A D | IUserManager.cpp | 37 status_t rc = remote()->transact(GET_CREDENTIAL_OWNER_PROFILE, data, &reply, 0); local 38 if (rc != NO_ERROR) { 39 ALOGE("%s: failed (%d)\n", __func__, rc);
|
/system/core/toolbox/ |
H A D | prlimit.c | 50 int rc; local 69 rc = prlimit64(pid, resource, &rl, NULL); 70 if (rc < 0) {
|
/system/bt/osi/src/ |
H A D | semaphore.c | 86 bool rc = true; local 89 rc = false; 93 return rc;
|
/system/bt/osi/test/ |
H A D | list_test.cpp | 176 list_node_t *rc = list_foreach(list, list_callback_sum, &sum); local 178 EXPECT_TRUE(rc == NULL); 194 list_node_t *rc = list_foreach(list, list_callback_find_int, &find); local 195 EXPECT_TRUE(rc != NULL); 196 int *rc_val = (int *)list_node(rc); 200 rc = list_foreach(list, list_callback_find_int, &find); 201 EXPECT_TRUE(rc != NULL); 202 rc_val = (int *)list_node(rc); 206 rc = list_foreach(list, list_callback_find_int, &find); 207 EXPECT_TRUE(rc ! [all...] |
/system/core/fs_mgr/ |
H A D | fs_mgr_format.c | 37 int fd, rc = 0; local 55 rc = make_ext4fs_internal(fd, NULL, NULL, fs_mnt_point, 0, 0, 0, 0, 0, 0, 0, 0, 0, NULL, NULL, NULL); 56 if (rc) { 57 ERROR("make_ext4fs returned %d.\n", rc); 61 return rc; 68 int rc = 0; local 84 pid_t p = waitpid(pid, &rc, 0); 87 rc = -1; 90 if (WIFEXITED(rc)) { 91 rc 106 int rc = -EINVAL; local [all...] |
/system/core/logwrapper/ |
H A D | logwrapper.c | 57 int rc; local 83 rc = android_fork_execvp_ext(argc, &argv[0], &status, true, 85 if (!rc) { 87 rc = WEXITSTATUS(status); 89 rc = -ECHILD; 97 return rc;
|
/system/core/trusty/gatekeeper/ |
H A D | trusty_gatekeeper_ipc.c | 33 int rc = tipc_connect(TRUSTY_DEVICE_NAME, GATEKEEPER_PORT); local 34 if (rc < 0) { 35 return rc; 38 handle_ = rc; 54 ssize_t rc = write(handle_, msg, msg_size); local 57 if (rc < 0) { 63 rc = read(handle_, out, *out_size); 64 if (rc < 0) { 70 if ((size_t) rc < sizeof(struct gatekeeper_message)) { 71 ALOGE("invalid response size (%d)\n", (int) rc); [all...] |
/system/extras/libfec/test/ |
H A D | test_rs.c | 39 int i, rc, neras, errors; local 65 rc = decode_rs_char(rs, corr, NULL, 0); 67 printf("\tno erasures: %d\n", rc); 78 rc = decode_rs_char(rs, dupl, erasures, neras); 80 printf("\terasures: %d\n", rc);
|
/system/extras/tests/pagingtest/ |
H A D | mmap_test.c | 13 int rc; local
|
H A D | pageinout_test.c | 19 int rc; local 62 rc = madvise((void *)buf, file_size, MADV_DONTNEED) || 65 if (rc) {
|
/system/sepolicy/tools/sepolicy-analyze/ |
H A D | sepolicy-analyze.c | 47 int rc; local 57 rc = analyze_components[i].func(argc - 2, argv + 2, &policydb); 58 if (rc && USAGE_ERROR) { 60 return rc;
|
/system/update_engine/payload_consumer/ |
H A D | bzip_extent_writer.cc | 31 int rc = BZ2_bzDecompressInit(&stream_, local 35 TEST_AND_RETURN_FALSE(rc == BZ_OK); 60 int rc = BZ2_bzDecompress(&stream_); local 61 TEST_AND_RETURN_FALSE(rc == BZ_OK || rc == BZ_STREAM_END); 70 if (rc == BZ_STREAM_END)
|
H A D | file_writer.cc | 37 ssize_t rc = write(fd_, char_bytes + bytes_written, local 39 if (rc < 0) 41 bytes_written += rc; 49 int rc = close(fd_); local 55 if (rc < 0) 57 return rc;
|
/system/tpm/trunks/ |
H A D | trunks_client.cc | 83 trunks::TPM_RC rc; local 84 rc = factory->GetTpmUtility()->TakeOwnership(owner_password, 87 if (rc) { 88 LOG(ERROR) << "Error taking ownership: " << trunks::GetErrorString(rc); 89 return rc;
|
/system/vold/ |
H A D | vdc.cpp | 122 int rc = TEMP_FAILURE_RETRY(poll(&poll_sock, 1, timeout)); local 123 if (rc == 0) { 126 } else if (rc < 0) { 137 rc = TEMP_FAILURE_RETRY(read(sock, buffer, sizeof(buffer))); 138 if (rc == 0) { 141 } else if (rc < 0) { 147 for (int i = 0; i < rc; i++) {
|
/system/bt/btcore/test/ |
H A D | device_class_test.cpp | 86 int rc = device_class_to_stream(&dc, dc_stream1, sizeof(dc_stream1)); local 87 EXPECT_EQ(3, rc); 104 int rc = device_class_to_stream(&dc, dc_stream1, sizeof(dc_stream1)); local 105 EXPECT_EQ(3, rc); 121 int rc = device_class_to_stream(&dc, dc_stream1, sizeof(dc_stream1)); local 122 EXPECT_EQ(3, rc);
|
/system/bt/utils/src/ |
H A D | bt_utils.c | 119 int rc = 0; local 129 rc = -1; 134 rc = set_sched_policy(tid, SP_AUDIO_SYS); 141 if (rc) {
|
/system/core/debuggerd/ |
H A D | signal_sender.cpp | 89 int rc = TEMP_FAILURE_RETRY(read(sfd[0], &msg, sizeof(msg))); local 90 if (rc < 0) { 93 } else if (rc != sizeof(msg)) { 94 ALOGE("debuggerd: signal sender read unexpected number of bytes: %d", rc); 163 ssize_t rc = TEMP_FAILURE_RETRY(read(signal_fd, &response, sizeof(response))); local 164 if (rc == 0) { 168 } else if (rc < 0) {
|
/system/core/libmemtrack/ |
H A D | memtrack_test.c | 31 int rc = 0; local 39 rc = 1; 45 rc = 2; 50 rc = 3; 59 if (rc != 0) { 66 rc = 4; 70 return rc;
|