/system/core/fs_mgr/ |
H A D | fs_mgr_verity.cpp | 238 typedef bool (*format_verity_table_func)(char *buf, const size_t bufsize, 241 static bool format_verity_table(char *buf, const size_t bufsize, argument 255 res = snprintf(buf, bufsize, 260 res = snprintf(buf, bufsize, 266 res = snprintf(buf, bufsize, "%s 2 " VERITY_TABLE_OPT_IGNZERO " %s", params->table, 269 res = snprintf(buf, bufsize, "%s 1 " VERITY_TABLE_OPT_IGNZERO, params->table); 280 static bool format_legacy_verity_table(char *buf, const size_t bufsize, argument 286 res = strlcpy(buf, params->table, bufsize); 288 res = snprintf(buf, bufsize, "%s %d", params->table, params->mode);
|
/system/core/init/ |
H A D | init.cpp | 197 char buf[512]; local 221 while (total_bytes_written < sizeof(buf)) { 223 read(hwrandom_fd, buf, sizeof(buf) - total_bytes_written)); 232 chunk_size = TEMP_FAILURE_RETRY(write(urandom_fd, buf, chunk_size)); 536 static int audit_callback(void *data, security_class_t /*cls*/, char *buf, size_t len) { argument 545 snprintf(buf, len, "property=%s pid=%d uid=%d gid=%d", d->name,
|
H A D | util.cpp | 227 char buf[1024]; local 236 buf[sizeof(buf) - 1] = '\0'; 237 pmtdsize = read(fd, buf, sizeof(buf) - 1); 238 pmtdbufp = buf; 301 char buf[128]; local 315 if ((unsigned int)width > sizeof(buf) - 1) { 319 memcpy(buf, pathname, width); 320 buf[widt 357 char buf[256]; local [all...] |
H A D | devices.cpp | 133 char buf[512]; local 153 if ((strlen(upath) + strlen(dp->attr) + 6) > sizeof(buf)) 156 snprintf(buf, sizeof(buf), "/sys%s/%s", upath, dp->attr); 157 INFO("fixup %s %d %d 0%o\n", buf, dp->uid, dp->gid, dp->perm); 158 chown(buf, dp->uid, dp->gid); 159 chmod(buf, dp->perm); 163 int len = snprintf(buf, sizeof(buf), "/sys%s", upath); 164 if ((len < 0) || ((size_t) len >= sizeof(buf))) { 337 find_pci_device_prefix(const char *path, char *buf, ssize_t buf_sz) argument 479 char buf[256]; local 772 char buf[PAGE_SIZE]; local [all...] |
/system/core/libnetutils/ |
H A D | ifc_utils.c | 280 char buf[NLMSG_ALIGN(sizeof(struct nlmsghdr)) + local 351 len = recv(s, buf, sizeof(buf), 0); 359 nh = (struct nlmsghdr *) buf;
|
/system/core/libsparse/ |
H A D | output_file.c | 90 char *buf; member in struct:output_file 112 int (*write)(void *priv, const void *buf, int len); 318 int read_all(int fd, void *buf, size_t len) argument 322 char *ptr = buf;
|
/system/core/libutils/ |
H A D | RefBase.cpp | 253 char buf[128]; local 254 sprintf(buf, "Strong references on RefBase %p (weakref_type %p):\n", mBase, this); 255 text.append(buf); 257 sprintf(buf, "Weak references on RefBase %p (weakref_type %p):\n", mBase, this); 258 text.append(buf); 354 char buf[128]; local 357 sprintf(buf, "\t%c ID %p (ref %d):\n", 359 out->append(buf);
|
/system/core/logd/ |
H A D | LogKlog.cpp | 217 LogKlog::LogKlog(LogBuffer *buf, LogReader *reader, int fdWrite, int fdRead, bool auditd) : argument 219 logbuf(buf), 330 const char **buf, size_t len, 332 const char *cp = now.strptime(*buf, "[ %s.%q]"); 333 if (cp && (cp >= &(*buf)[len])) { 340 len -= cp - *buf; 345 *buf = cp; 422 static int parseKernelPrio(const char **buf, size_t len) { argument 424 const char *cp = *buf; 433 cp = *buf; 329 sniffTime(log_time &now, const char **buf, size_t len, bool reverse) argument 443 synchronize(const char *buf, size_t len) argument 558 log(const char *buf, size_t len) argument [all...] |
/system/core/logwrapper/ |
H A D | logwrap.c | 60 char *buf; member in struct:beginning_buf 67 /* This is a circular buf that holds up to the last ending_buf->buf_size bytes 73 char *buf; member in struct:ending_buf 83 /* A structure to hold all the abbreviated buf data */ 112 /* Add to the end of the buf */ 113 memcpy(b_buf->buf + b_buf->used_len, line, line_len); 127 if (e_buf->buf == NULL) { 149 memcpy(e_buf->buf + e_buf->write, line, cnt); 151 memcpy(e_buf->buf, line + cnt, line_len - cnt); 170 /* Log to either the abbreviated buf, o 188 print_buf_lines(struct log_info *log_info, char *buf, int buf_size) argument [all...] |
/system/core/toolbox/ |
H A D | top.c | 327 char buf[MAX_LINE], *open_paren, *close_paren; local 331 fgets(buf, MAX_LINE, file); 335 open_paren = strchr(buf, '('); 336 close_paren = strrchr(buf, ')');
|
/system/extras/ANRdaemon/ |
H A D | ANRdaemon.cpp | 215 char buf[64]; local 216 snprintf(buf, 64, "%#" PRIx64, mtag); 217 if (property_set(dfs_tags_property, buf) < 0) {
|
/system/extras/f2fs_utils/ |
H A D | f2fs_sparseblock.c | 159 static int read_structure(int fd, unsigned long long start, void *buf, ssize_t len) argument 169 ret = read(fd, buf, len); 181 static int read_structure_blk(int fd, unsigned long long start_blk, void *buf, size_t len) argument 183 return read_structure(fd, F2FS_BLKSIZE*start_blk, buf, F2FS_BLKSIZE * len); 543 char* buf; member in struct:privdata 558 char *buf; local 566 buf = d->buf; 567 if(read_structure_blk(d->infd, (unsigned long long)pos, d->buf, 1)) { 579 ret = write(d->outfd, d->buf, F2FS_BLKSIZ 617 char *buf = malloc(F2FS_BLKSIZE); local [all...] |
/system/extras/micro_bench/ |
H A D | micro_bench.cpp | 128 void initString(uint8_t *buf, size_t size) { argument 130 buf[i] = static_cast<char>(32 + (i % 96)); 132 buf[size-1] = '\0'; 268 // alignment. The variable "buf" will be a pointer to the buffer and should 275 uint8_t *buf = allocateAlignedMemory(size, cmd_data.dst_align, cmd_data.dst_or_mask); \ 276 if (!buf) \ 304 // the largest cache in the system. The variable "buf" will be one slice 307 // of their "buf" and into the next sequential buffer, the code strides 308 // through the buffer. Specifically, as "buf" values are iterated in BENCH 309 // code, the end of "buf" i [all...] |
/system/keymaster/ |
H A D | soft_keymaster_context.cpp | 733 keymaster_error_t SoftKeymasterContext::AddRngEntropy(const uint8_t* buf, size_t length) const { argument 734 RAND_add(buf, length, 0 /* Don't assume any entropy is added to the pool. */); 738 keymaster_error_t SoftKeymasterContext::GenerateRandom(uint8_t* buf, size_t length) const { argument 739 if (RAND_bytes(buf, length) != 1)
|
/system/media/audio_route/ |
H A D | audio_route.c | 842 void *buf; local 886 buf = XML_GetBuffer(parser, BUF_SIZE); 887 if (buf == NULL) 890 bytes_read = fread(buf, 1, BUF_SIZE, file);
|
/system/update_engine/ |
H A D | test_http_server.cc | 86 char buf[1024]; local 87 ssize_t r = read(fd, buf, sizeof(buf)); 92 headers.append(buf, r); 153 char buf[100] = {0}; local 154 snprintf(buf, sizeof(buf), "%" PRIi64, num); 155 return buf;
|
/system/bt/bta/ag/ |
H A D | bta_ag_cmd.c | 338 char buf[BTA_AG_AT_MAX_LEN + 16]; local 339 char *p = buf; 343 memset(buf, NULL, sizeof(buf)); 350 strlcpy(p, bta_ag_result_tbl[code].p_res, sizeof(buf) - 2); 388 APPL_TRACE_DEBUG("bta_ag_send_result: %s", buf); 392 PORT_WriteData(p_scb->conn_handle, buf, (UINT16) (p - buf), &len); 408 char buf[BTA_AG_AT_MAX_LEN * BTA_AG_AT_MULTI_LEN + 16]; local 409 char *p = buf; [all...] |
/system/bt/btif/src/ |
H A D | btif_core.c | 683 bt_status_t btif_dut_mode_send(uint16_t opcode, uint8_t *buf, uint8_t len) argument 691 BTM_VendorSpecificCommand(opcode, len, buf, btif_dut_mode_cback); 835 char buf[512]; local 838 prop.val = (void*)buf; 839 prop.len = sizeof(buf); 903 char buf[1024]; local 906 prop.val = (void*) buf; 907 prop.len = sizeof(buf);
|
H A D | btif_sock_l2cap.c | 139 uint8_t *buf = osi_malloc(len); local 141 p->data = buf; 237 uint8_t *buf; local 262 while (packet_get_head_l(sock, &buf, NULL)) 263 osi_free(buf); 997 uint8_t *buf; local 1000 while (packet_get_head_l(sock, &buf, &len)) { 1002 OSI_NO_INTR(sent = send(sock->our_fd, buf, len, MSG_DONTWAIT)); 1006 osi_free(buf); 1008 packet_put_head_l(sock, buf [all...] |
H A D | btif_storage.c | 225 char buf[64]; local 230 memset(buf, 0, sizeof(buf)); 231 uuid_to_string_legacy(p_uuid, buf); 232 strcat(value, buf);
|
/system/core/adb/ |
H A D | transport.cpp | 938 char buf[32]; local 939 snprintf(buf, sizeof(buf), "T-%p", t); 940 serial = buf;
|
/system/core/healthd/ |
H A D | healthd_mode_charger.cpp | 196 char *buf; local 204 buf = (char *)load_file(LAST_KMSG_PSTORE_PATH, &sz); 206 if (!buf || !sz) { 207 buf = (char *)load_file(LAST_KMSG_PATH, &sz); 208 if (!buf || !sz) { 215 ptr = buf + (sz - len); 235 free(buf);
|
/system/core/libbacktrace/ |
H A D | BacktraceOffline.cpp | 638 char buf[4]; local 639 if (fread(buf, 4, 1, fp) != 1) { 644 return memcmp(buf, elf_magic, 4) == 0; 657 char buf[4]; local 658 if (fread(buf, 4, 1, fp) != 1) { 663 return memcmp(buf, zip_preamble, 4) == 0;
|
H A D | backtrace_test.cpp | 1172 struct stat buf; local 1173 ASSERT_TRUE(stat(tmp_so_name, &buf) != -1); 1174 uintptr_t map_size = buf.st_size; 1216 struct stat buf; local 1217 ASSERT_TRUE(stat(tmp_so_name, &buf) != -1); 1218 uintptr_t map_size = buf.st_size;
|
/system/core/liblog/tests/ |
H A D | liblog_test.cpp | 1303 char buf[2]; local 1304 buf[0] = levels[j].type; 1305 buf[1] = '\0'; 1309 i, j, key, buf); 1310 property_set(key, buf); 1338 i, j, key + base_offset, buf); 1339 property_set(key + base_offset, buf); 1369 i, j, key, buf); 1370 property_set(key, buf); 1398 i, j, key + base_offset, buf); 1438 char buf[2]; local 2472 __pmsg_fn(log_id_t logId, char prio, const char *filename, const char *buf, size_t len, void *arg) argument [all...] |