Searched refs:ret (Results 126 - 150 of 408) sorted by relevance

1234567891011>>

/system/extras/tests/pagingtest/
H A Dmmap_test.c12 int ret = -1; local
44 ret = 0;
50 return ret;
H A Dthrashing_test.c19 int ret = -1; local
51 ret = madvise((void *)bufs[i], filesize, MADV_RANDOM) ||
53 if (ret) {
76 ret = 0;
86 return ret;
/system/libhidl/libhidlmemory/
H A Dmapping.cpp64 Return<sp<IMemory>> ret = mapper->mapMemory(memory); local
66 if (!ret.isOk()) {
70 return ret;
/system/media/alsa_utils/
H A Dalsa_device_proxy.c45 int ret = 0; local
63 ret = -EINVAL;
75 ret = -EINVAL;
87 ret = -EINVAL;
119 ret = -EINVAL;
122 return ret;
210 int ret = -EPERM; // -1 local
225 ret = 0;
229 return ret;
237 int ret local
[all...]
/system/tools/aidl/
H A Dline_reader.cpp79 unique_ptr<LineReader> ret; local
81 ret.reset(file_reader.release());
83 return ret;
/system/update_engine/
H A Dbinder_service_brillo.cc85 auto ret = CallCommonHandler(&UpdateEngineService::GetStatus, local
92 if (ret.isOk()) {
97 return ret;
114 auto ret = CallCommonHandler( local
118 return ret;
130 auto ret = local
134 return ret;
170 auto ret = local
174 return ret;
180 auto ret local
[all...]
/system/extras/ext4_utils/
H A Dext4_utils.c145 off64_t ret; local
147 ret = lseek64(fd, 1024, SEEK_SET);
148 if (ret < 0)
151 ret = read(fd, sb, sizeof(*sb));
152 if (ret < 0)
154 if (ret != sizeof(*sb))
161 off64_t ret; local
163 ret = lseek64(fd, offset, SEEK_SET);
164 if (ret < 0)
167 ret
530 int ret; local
564 int ret; local
606 off64_t ret; local
[all...]
/system/core/libsparse/
H A Dappend2simg.c63 int ret; local
73 ret = asprintf(&tmp_path, "%s.append2simg", output_path);
74 if (ret < 0) {
131 ret = rename(tmp_path, output_path);
132 if (ret < 0) {
/system/libfmq/benchmarks/
H A Dmsgq_benchmark_client.cpp78 service->configureClientInboxSyncReadWrite([this](bool ret,
80 ASSERT_TRUE(ret);
89 service->configureClientOutboxSyncReadWrite([this](bool ret,
91 ASSERT_TRUE(ret);
154 bool ret = service->requestWrite(kQueueSize); local
155 ASSERT_TRUE(ret);
188 bool ret = service->requestWrite(kQueueSize); local
189 ASSERT_TRUE(ret);
221 bool ret = service->requestWrite(kQueueSize); local
222 ASSERT_TRUE(ret);
253 bool ret = service->requestWrite(kQueueSize); local
299 bool ret = service->requestRead(kQueueSize); local
332 bool ret = service->requestRead(kQueueSize); local
364 bool ret = service->requestRead(kQueueSize); local
400 bool ret = service->requestRead(kQueueSize); local
[all...]
/system/libufdt/tests/src/
H A Dextract_dtb.c97 int ret = 1; local
139 ret = 0;
144 return ret;
158 int ret = extract_dtbs(in_file, out_dtb_file, out_image_file); local
160 return ret;
/system/libufdt/utils/src/
H A Dmkdtimg_cfg_create.c104 int ret = is_entry ? local
107 if (ret != 0) {
121 int ret = -1; local
146 ret = output_img_with_config(img_fp, cfg_fp);
152 return ret;
/system/nfc/halimpl/bcm2079x/adaptation/
H A Duserial_linux.c605 int ret = 0; local
650 ret = TEMP_FAILURE_RETRY(read(fd, pbuf + offset, (size_t)count));
651 if (ret > 0) perf_update(&perf_read, clock() - t2, ret);
653 if (ret <= 0 || !bSerialPortDevice || len < MIN_BUFSIZE) break;
675 offset += ret;
676 count -= ret;
679 ret = offset;
688 if (ret > 0 && len >= MIN_BUFSIZE) {
690 while (count < ret) {
926 int ret = 0; local
1199 int ret = 0, total = 0; local
1568 int ret; local
1607 int ret; local
1615 int ret = -1; local
1685 int ret; local
[all...]
/system/update_engine/update_manager/
H A Dboxed_value.cc106 string ret = ""; local
111 if (ret.size() > 0)
112 ret += ",";
113 ret += StringForConnectionType(type);
115 return ret;
/system/core/libsysutils/src/
H A DSocketClient.cpp77 int ret = 0; local
81 ret = asprintf(&buf, "%d %d %s (%s)", code, getCmdNum(), msg, strerror(errno));
83 ret = asprintf(&buf, "%d %s (%s)", code, msg, strerror(errno));
87 ret = asprintf(&buf, "%d %d %s", code, getCmdNum(), msg);
89 ret = asprintf(&buf, "%d %s", code, msg);
93 if (ret != -1) {
94 ret = sendMsg(buf);
97 return ret;
201 int ret = 0; local
235 ret
[all...]
/system/extras/iotop/
H A Dtaskstats.cpp38 int ret = genl_connect(nl.get()); local
39 if (ret < 0) {
40 LOG(FATAL) << nl_geterror(ret) << std::endl << "Unable to open netlink socket (are you root?)";
101 pid_t ret; local
103 ret = ParseAggregateTaskStats(nested_attr, nla_len(attr), &stats);
104 if (ret < 0) {
106 } else if (ret == taskstats_request->requested_pid) {
109 LOG(WARNING) << "got taskstats for unexpected pid " << ret <<
160 bool ret = GetStats(tgid, TASKSTATS_CMD_ATTR_TGID, stats); local
161 if (ret) {
[all...]
/system/bt/hci/src/
H A Dhci_packet_factory.cc188 BT_HDR* ret = (BT_HDR*)buffer_allocator->alloc(sizeof(BT_HDR) + data_size); local
189 CHECK(ret);
190 ret->event = 0;
191 ret->offset = 0;
192 ret->layer_specific = 0;
193 ret->len = data_size;
194 return ret;
/system/core/adf/libadf/
H A Dadf.cpp44 auto ret = static_cast<adf_id_t *>(malloc(size)); local
45 if (!ret)
48 std::copy(in.begin(), in.end(), ret);
49 *out = ret;
106 int ret = 0; local
126 ret = -errno;
129 return ret;
259 auto ret = adf_get_interface_data(fd, &data); local
261 if (ret < 0)
262 return ret;
314 int ret = 0; local
397 int ret; local
416 int ret; local
473 auto ret = adf_get_overlay_engine_data(fd, &data); local
529 int ret = 0; local
560 bool ret = false; local
[all...]
/system/core/healthd/
H A DBatteryMonitor.cpp90 int ret; local
100 ret = mapSysfsString(status, batteryStatusMap);
101 if (ret < 0) {
103 ret = BATTERY_STATUS_UNKNOWN;
106 return ret;
110 int ret; local
122 ret = mapSysfsString(status, batteryHealthMap);
123 if (ret < 0) {
125 ret = BATTERY_HEALTH_UNKNOWN;
128 return ret;
140 BatteryMonitor::PowerSupplyType ret; local
349 status_t ret = BAD_VALUE; local
[all...]
/system/core/libcrypto_utils/
H A Dandroid_pubkey.c66 bool ret = false; local
104 ret = true;
107 if (!ret && new_key) {
110 return ret;
124 bool ret = false; local
161 ret = true;
168 return ret;
/system/netd/server/
H A DNetworkController.cpp101 if (int ret = RouteController::addVirtualNetworkFallthrough(vpnNetId,
106 return ret;
109 if (int ret = RouteController::removeVirtualNetworkFallthrough(vpnNetId,
114 return ret;
134 if (int ret = modifyFallthrough(entry.first, physicalInterface, permission, add)) {
135 return ret;
171 if (int ret = static_cast<PhysicalNetwork*>(network)->addAsDefault()) {
172 return ret;
182 if (int ret = static_cast<PhysicalNetwork*>(network)->removeAsDefault()) {
183 return ret;
385 int ret = network->clearInterfaces(); local
[all...]
/system/sepolicy/tests/
H A Dpolicy.py41 ret = self.__libsepolwrap.get_type(buf, c_int(2048),
43 if ret == 0:
46 if ret == 1:
83 ret = 0
85 ret = self.__libsepolwrap.get_allow_rule(buf, c_int(2048),
87 if ret == 0:
91 if ret == 1:
H A Dtreble_sepolicy_tests.py184 ret = ""
191 ret += "The following domain(s) must be associated with the "
192 ret += "\"coredomain\" attribute because they are executed off of "
193 ret += "/system:\n"
194 ret += " ".join(str(x) for x in sorted(violators)) + "\n"
204 ret += "The following domains must not be associated with the "
205 ret += "\"coredomain\" attribute because they are executed off of "
206 ret += "/vendor or /system/vendor:\n"
207 ret += " ".join(str(x) for x in sorted(violators)) + "\n"
209 return ret
[all...]
/system/core/liblog/
H A Dlogger_write.c197 int i = 0, ret = 0; local
213 ++ret;
230 if (!ret && !i) {
234 return ret;
246 int ret; local
265 ret = check_log_uid_permissions();
266 if (ret < 0) {
267 return ret;
288 ret = __android_log_trylock();
292 if (ret) { /* tryloc
381 int ret; local
657 int ret = LOGGER_DEFAULT; local
[all...]
/system/bt/btif/co/
H A Dbta_hh_co.cc62 ssize_t ret; local
63 OSI_NO_INTR(ret = write(fd, ev, sizeof(*ev)));
65 if (ret < 0) {
69 } else if (ret != (ssize_t)sizeof(*ev)) {
71 ret, sizeof(*ev));
85 ssize_t ret; local
86 OSI_NO_INTR(ret = read(p_dev->fd, &ev, sizeof(ev)));
88 if (ret == 0) {
91 } else if (ret < 0) {
115 if (ret < (ssize_
204 int ret; local
[all...]
/system/security/keystore/
H A DIKeystoreService.cpp129 ResponseCode ret = ResponseCode(reply.readInt32()); variable
134 return ret;
588 ResponseCode ret = ResponseCode(reply.readInt32()); variable
596 return ret;
615 ResponseCode ret = ResponseCode(reply.readInt32()); variable
623 return ret;
643 ResponseCode ret = ResponseCode(reply.readInt32()); variable
651 return ret;
870 ResponseCode ret = ResponseCode(reply.readInt32()); variable
878 return ret;
895 ResponseCode ret = ResponseCode(reply.readInt32()); variable
933 int32_t ret = getState(userId); local
943 auto ret = get(name, uid, &out); local
959 int32_t ret = insert(name, in.value(), uid, flags); local
968 int32_t ret = del(name, uid); local
977 int32_t ret = exist(name, uid); local
987 int32_t ret = list(prefix, uid, &matches); local
999 int32_t ret = reset(); local
1008 int32_t ret = onUserPasswordChanged(userId, pass); local
1016 int32_t ret = lock(userId); local
1025 int32_t ret = unlock(userId, pass); local
1033 bool ret = isEmpty(userId); local
1064 int32_t ret = generate(name, uid, keyType, keySize, flags, &args); local
1075 auto ret = import(name, in.value(), uid, flags); local
1085 auto ret = sign(name, in.value(), &out); local
1096 auto ret = verify(name, in.value(), signature.value()); local
1105 auto ret = get_pubkey(name, &out); local
1115 int32_t ret = grant(name, granteeUid); local
1124 int32_t ret = ungrant(name, granteeUid); local
1133 int64_t ret = getmtime(name, uid); local
1144 int32_t ret = duplicate(srcKey, srcUid, destKey, destUid); local
1152 int32_t ret = is_hardware_backed(keyType); local
1160 int32_t ret = clear_uid(uid); local
1168 auto ret = addRngEntropy(entropy.value()); local
1181 int32_t ret = local
1195 int ret = getKeyCharacteristics(name, clientId.value(), appData.value(), uid, local
1211 int32_t ret = local
1326 int ret = attestKey(name, params.value(), &chain); local
1338 int ret = attestDeviceIds(params.value(), &chain); local
1348 int32_t ret = onDeviceOffBody(); local
[all...]

Completed in 827 milliseconds

1234567891011>>