/system/core/logd/ |
H A D | LogReader.cpp | 52 int len = read(cli->getSocket(), buffer, sizeof(buffer) - 1);
|
/system/core/toolbox/ |
H A D | iftop.c | 112 ret = read(fd, buf, sizeof(buf) - 1); 114 perror("read");
|
H A D | getevent.c | 442 res = read(nfd, event_buf, sizeof(event_buf)); 664 res = read(ufds[i].fd, &event, sizeof(event));
|
/system/extras/boot_control_copy/ |
H A D | boot_control_copy.c | 107 num_read = read(src_fd, copy_buf, num_to_read);
|
/system/extras/tests/directiotest/ |
H A D | directiotest.c | 79 ret = read(fd, (char *)buf + bytes_read, count - bytes_read); 81 perror("read"); 248 fprintf(stderr, "read failed, aborting test\n");
|
/system/extras/tests/kernel.config/ |
H A D | aslr_test.cpp | 88 len = read(fd[0], buff, MAX_ADDR_LEN - 1);
|
/system/extras/tests/net_test/ |
H A D | tcp_nuke_addr_test.py | 69 buffer_size: Size of buffer where to read a message. 134 read = self.sock.recv(4096)
|
H A D | multinetwork_base.py | 320 return open(sysctl, "r").read() 481 packet = posix.read(self.tuns[netid].fileno(), 4096)
|
/system/keymaster/include/keymaster/ |
H A D | serializable.h | 50 * true if successful, and advances *buf past the bytes read. 114 * count so deserialization knows how many values to read. 136 * Copy \p size bytes from \p *buf_ptr into \p dest. If there are fewer than \p size bytes to read, 137 * returns false. Advances *buf_ptr to the next byte to be read. 144 * *buf_ptr, returns false. Advances \p *buf_ptr to the next byte to be read. 153 * four bytes remaining in \p *buf_ptr. Advances \p *buf_ptr to the next byte to be read. 166 * in \p *buf_ptr. Advances \p *buf_ptr to the next byte to be read. 174 * values to read. The count is returned in \p *count and the values returned in newly-allocated 176 * *buf_ptr to the next byte to be read. 228 bool read(uint8_ [all...] |
/system/media/camera/docs/ |
H A D | metadata_parser_xml.py | 99 return MetadataParserXml(file(file_name).read(), file_name)
|
/system/sepolicy/tools/ |
H A D | insertkeys.py | 251 config.read(args[0])
|
/system/update_engine/common/ |
H A D | http_fetcher_unittest.cc | 140 size_t read; local 141 if (!stdout->ReadBlocking(buf.data(), buf.size(), &read, nullptr)) { 145 line.append(buf.data(), read); 146 if (read == 0)
|
H A D | subprocess.cc | 142 // Make sure we read any remaining process output and then close the pipe. 263 int rc = HANDLE_EINTR(read(fd, buffer.data(), buffer.size()));
|
/system/vold/ |
H A D | Loop.cpp | 320 * Try to read superblock. 329 if (read(fd, &buffer, sizeof(struct asec_superblock)) != sizeof(struct asec_superblock)) { 330 SLOGE("superblock read failed (%s)", strerror(errno)); 338 * Superblock successfully read. Copy to caller's struct.
|
H A D | Process.cpp | 73 int length = read(fd, buffer, max - 1);
|
/system/core/adf/libadf/ |
H A D | adf.c | 670 int err = read(fd, &header, sizeof(header)); 684 ssize_t read_size = read(fd, &event_ret->data, data_size);
|
/system/core/liblog/ |
H A D | logd_reader.c | 82 .read = logdRead, 288 while ((ret = TEMP_FAILURE_RETRY(read(sock, cp, len))) > 0) { 620 /* NOTE: SOCK_SEQPACKET guarantees we read exactly one full entry */
|
/system/core/libusbhost/ |
H A D | usbhost.c | 235 ret = read(context->fd, event_buf, sizeof(event_buf)); 329 /* if we fail, see if have read-only access */ 342 D("[ usb open read-only %s fd = %d]\n", dev_name, fd); 366 length = read(fd, device->desc, sizeof(device->desc)); 367 D("usb_device_new read returned %d errno %d\n", length, errno); 465 // read list of supported languages 585 // this usually requires read/write permission
|
/system/extras/ext4_utils/ |
H A D | ext4_utils.c | 140 /* Function to read the primary superblock */ 149 ret = read(fd, sb, sizeof(*sb)); 151 critical_error_errno("failed to read superblock"); 153 critical_error("failed to read all of superblock"); 612 ret = read(fd, aux_info.bg_desc, info.block_size * aux_info.bg_desc_blocks); 614 critical_error_errno("failed to read block group descriptors"); 616 critical_error("failed to read all of block group descriptors");
|
/system/update_engine/ |
H A D | test_http_server.cc | 87 ssize_t r = read(fd, buf, sizeof(buf)); 89 perror("read"); 465 while (HANDLE_EINTR(read(fd, &c, 1)) > 0) {}
|
/system/connectivity/shill/shims/ |
H A D | crypto_util.cc | 91 // as read only, but fails to mark the parameter const. 112 LOG(ERROR) << "Failed to read VerifyCredentialsMessage from stdin."; 294 LOG(ERROR) << "Failed to read VerifyCredentialsMessage from stdin."; 364 const ssize_t bytes_read = HANDLE_EINTR(read(STDIN_FILENO,
|
/system/core/cpio/ |
H A D | mkbootfs.c | 246 if(fd < 0) die("cannot open '%s' for read", in); 251 if(read(fd, tmp, s.st_size) != s.st_size) { 252 die("cannot read %d bytes", s.st_size); 266 if(size < 0) die("cannot read symlink '%s'", in);
|
/system/core/gatekeeperd/ |
H A D | gatekeeperd.cpp | 117 read(fd, &sid, sizeof(sid));
|
/system/core/libprocessgroup/ |
H A D | processgroup.cpp | 134 ssize_t ret = read(ctx->fd, ctx->buf_ptr + ctx->buf_len,
|
/system/core/libsysutils/src/ |
H A D | SocketListener.cpp | 195 TEMP_FAILURE_RETRY(read(mCtrlPipe[0], &c, 1));
|