/system/netd/server/ |
H A D | NetdCommand.cpp | 19 NetdCommand::NetdCommand(const char *cmd) : argument 20 FrameworkCommand(cmd) {
|
H A D | IptablesBaseTest.cpp | 33 std::string cmd = argv[0]; local 35 cmd += " "; 36 cmd += argv[i]; 38 sCmds.push_back(cmd); 44 std::string cmd = " -w"; local 51 cmd += " "; 52 cmd += arg; 57 sCmds.push_back(IPTABLES_PATH + cmd); 60 sCmds.push_back(IP6TABLES_PATH + cmd); 72 const std::string& cmd) { 71 expectIptablesCommand(IptablesTarget target, int pos, const std::string& cmd) argument 102 auto cmd = expectedCmds[i].second; local [all...] |
H A D | NetdCommand.h | 24 NetdCommand(const char *cmd);
|
/system/vold/ |
H A D | VoldCommand.cpp | 19 VoldCommand::VoldCommand(const char *cmd) : argument 20 FrameworkCommand(cmd) {
|
H A D | VoldCommand.h | 24 VoldCommand(const char *cmd);
|
H A D | MoveTask.cpp | 63 static status_t pushBackContents(const std::string& path, std::vector<std::string>& cmd) { argument 74 cmd.push_back(StringPrintf("%s/%s", path.c_str(), ent->d_name)); 87 std::vector<std::string> cmd; local 88 cmd.push_back(kRmPath); 89 cmd.push_back("-f"); /* force: remove without confirmation, no error if it doesn't exist */ 90 cmd.push_back("-R"); /* recursive: remove directory contents */ 91 if (pushBackContents(path, cmd) != OK) { 96 pid_t pid = ForkExecvpAsync(cmd); 125 std::vector<std::string> cmd; local 126 cmd [all...] |
H A D | Disk.cpp | 291 std::vector<std::string> cmd; local 292 cmd.push_back(kSgdiskPath); 293 cmd.push_back("--android-dump"); 294 cmd.push_back(mDevPath); 297 status_t res = ForkExecvp(cmd, output); 386 std::vector<std::string> cmd; local 387 cmd.push_back(kSgdiskPath); 388 cmd.push_back("--zap-all"); 389 cmd.push_back(mDevPath); 393 if ((res = ForkExecvp(cmd)) ! 445 std::vector<std::string> cmd; local [all...] |
/system/extras/simpleperf/ |
H A D | cmd_help.cpp | 38 void PrintLongHelpForOneCommand(const Command& cmd); 45 std::unique_ptr<Command> cmd = CreateCommandInstance(args[0]); local 46 if (cmd == nullptr) { 51 PrintLongHelpForOneCommand(*cmd); 67 std::unique_ptr<Command> cmd = CreateCommandInstance(cmd_name); local 68 printf(" %-20s%s\n", cmd_name.c_str(), cmd->ShortHelpString().c_str());
|
/system/vold/fs/ |
H A D | F2fs.cpp | 44 std::vector<std::string> cmd; local 45 cmd.push_back(kFsckPath); 46 cmd.push_back("-a"); 47 cmd.push_back(source); 50 return ForkExecvp(cmd, sFsckContext); 73 std::vector<std::string> cmd; local 74 cmd.push_back(kMkfsPath); 75 cmd.push_back(source); 77 return ForkExecvp(cmd);
|
H A D | Ext4.cpp | 117 std::vector<std::string> cmd; local 118 cmd.push_back(kFsckPath); 119 cmd.push_back("-y"); 120 cmd.push_back(c_source); 123 return ForkExecvp(cmd, sFsckContext); 155 std::vector<std::string> cmd; local 156 cmd.push_back(kResizefsPath); 157 cmd.push_back("-f"); 158 cmd.push_back(source); 159 cmd 166 std::vector<std::string> cmd; local [all...] |
H A D | Vfat.cpp | 76 std::vector<std::string> cmd; local 77 cmd.push_back(kFsckPath); 78 cmd.push_back("-p"); 79 cmd.push_back("-f"); 80 cmd.push_back(source); 83 rc = ForkExecvp(cmd, sFsckUntrustedContext); 173 std::vector<std::string> cmd; local 174 cmd.push_back(kMkfsPath); 175 cmd.push_back("-F"); 176 cmd [all...] |
/system/security/keystore/ |
H A D | keystore_cli.cpp | 47 #define NO_ARG_INT_RETURN(cmd) \ 49 if (strcmp(argv[1], #cmd) == 0) { \ 50 int32_t ret = service->cmd(); \ 55 printf(#cmd ": %s (%d)\n", responses[ret], ret); \ 61 #define SINGLE_ARG_INT_RETURN(cmd) \ 63 if (strcmp(argv[1], #cmd) == 0) { \ 65 fprintf(stderr, "Usage: %s " #cmd " <name>\n", argv[0]); \ 68 int32_t ret = service->cmd(String16(argv[2])); \ 73 printf(#cmd ": %s (%d)\n", responses[ret], ret); \ 79 #define SINGLE_INT_ARG_INT_RETURN(cmd) \ [all...] |
/system/core/include/cutils/ |
H A D | android_reboot.h | 32 int android_reboot(int cmd, int flags, const char *arg); 34 int cmd, int flags, const char *arg,
|
/system/core/libsysutils/src/ |
H A D | FrameworkCommand.cpp | 26 FrameworkCommand::FrameworkCommand(const char *cmd) { argument 27 mCommand = cmd;
|
/system/core/trusty/gatekeeper/ |
H A D | trusty_gatekeeper_ipc.c | 42 int trusty_gatekeeper_call(uint32_t cmd, void *in, uint32_t in_size, uint8_t *out, argument 51 msg->cmd = cmd; 58 ALOGE("failed to send cmd (%d) to %s: %s\n", cmd, 65 ALOGE("failed to retrieve response for cmd (%d) to %s: %s\n", 66 cmd, GATEKEEPER_PORT, strerror(errno)); 77 if ((cmd | GK_RESP_BIT) != msg->cmd) { 78 ALOGE("invalid command (%d)\n", msg->cmd); [all...] |
H A D | trusty_gatekeeper_ipc.h | 20 int trusty_gatekeeper_call(uint32_t cmd, void *in, uint32_t in_size, uint8_t *out,
|
H A D | gatekeeper_ipc.h | 32 * @cmd: the command, one of ENROLL, VERIFY. Payload must be a serialized 37 uint32_t cmd; member in struct:gatekeeper_message
|
/system/core/logd/ |
H A D | LogCommand.h | 25 LogCommand(const char *cmd);
|
/system/bt/stack/smp/ |
H A D | smp_l2c.c | 150 UINT8 cmd ; local 153 STREAM_TO_UINT8(cmd, p); 156 if ((SMP_OPCODE_MAX < cmd) || (SMP_OPCODE_MIN > cmd)) 158 SMP_TRACE_WARNING( "Ignore received command with RESERVED code 0x%02x", cmd); 164 if (SMP_OPCODE_PAIRING_REQ == cmd || SMP_OPCODE_SEC_REQ == cmd) 187 if (cmd == SMP_OPCODE_CONFIRM) 189 SMP_TRACE_DEBUG ("in %s cmd = 0x%02x, peer_auth_req = 0x%02x," 191 __FUNCTION__, cmd, p_c 301 UINT8 cmd ; local [all...] |
/system/core/reboot/ |
H A D | reboot.c | 29 const char *cmd = "reboot"; local 44 cmd = "shutdown"; 60 prop_len = snprintf(property_val, sizeof(property_val), "%s,%s", cmd, optarg);
|
/system/core/toolbox/ |
H A D | toolbox.c | 59 char *cmd = strrchr(argv[0], '/'); local 60 if (cmd) 61 name = cmd + 1;
|
/system/extras/tests/wifi/stress/ |
H A D | wifiLoadScanAssoc.c | 133 char cmd[MAXCMD]; local 305 rv = snprintf(cmd, sizeof(cmd), "%s", CMD_STATUS); 306 if (rv >= (signed) sizeof(cmd) - 1) { 310 testExecCmd(cmd); 351 rv = snprintf(cmd, sizeof(cmd), "%s", CMD_STATUS); 352 if (rv >= (signed) sizeof(cmd) - 1) { 356 testExecCmd(cmd); 360 rv = snprintf(cmd, sizeo 391 char cmd[MAXCMD]; local [all...] |
/system/core/fastboot/ |
H A D | protocol.cpp | 108 static int _command_start(Transport* transport, const char* cmd, uint32_t size, char* response) { argument 109 size_t cmdsize = strlen(cmd); 119 if (transport->Write(cmd, cmdsize) != static_cast<int>(cmdsize)) { 147 static int _command_send(Transport* transport, const char* cmd, const void* data, uint32_t size, argument 153 int r = _command_start(transport, cmd, size, response); 171 static int _command_send_no_data(Transport* transport, const char* cmd, char* response) { argument 172 return _command_start(transport, cmd, 0, response); 175 int fb_command(Transport* transport, const char* cmd) { argument 176 return _command_send_no_data(transport, cmd, 0); 179 int fb_command_response(Transport* transport, const char* cmd, cha argument 184 char cmd[64]; local 259 char cmd[64]; local [all...] |
/system/bt/bta/include/ |
H A D | bta_gatts_co.h | 49 ** informaiton. The request consists of the cmd and p_req and the 52 ** Parameter cmd - request command 61 extern BOOLEAN bta_gatts_co_srv_chg(tBTA_GATTS_SRV_CHG_CMD cmd,
|
/system/core/include/sysutils/ |
H A D | FrameworkCommand.h | 29 FrameworkCommand(const char *cmd);
|