/system/extras/tests/pagingtest/ |
H A D | mmap_test.c | 12 int ret = -1; local 44 ret = 0; 50 return ret;
|
H A D | thrashing_test.c | 19 int ret = -1; local 51 ret = madvise((void *)bufs[i], filesize, MADV_RANDOM) || 53 if (ret) { 76 ret = 0; 86 return ret;
|
/system/libhidl/libhidlmemory/ |
H A D | mapping.cpp | 64 Return<sp<IMemory>> ret = mapper->mapMemory(memory); local 66 if (!ret.isOk()) { 70 return ret;
|
/system/media/alsa_utils/ |
H A D | alsa_device_proxy.c | 45 int ret = 0; local 63 ret = -EINVAL; 75 ret = -EINVAL; 87 ret = -EINVAL; 119 ret = -EINVAL; 122 return ret; 210 int ret = -EPERM; // -1 local 225 ret = 0; 229 return ret; 237 int ret local [all...] |
/system/tools/aidl/ |
H A D | line_reader.cpp | 79 unique_ptr<LineReader> ret; local 81 ret.reset(file_reader.release()); 83 return ret;
|
/system/update_engine/ |
H A D | binder_service_brillo.cc | 85 auto ret = CallCommonHandler(&UpdateEngineService::GetStatus, local 92 if (ret.isOk()) { 97 return ret; 114 auto ret = CallCommonHandler( local 118 return ret; 130 auto ret = local 134 return ret; 170 auto ret = local 174 return ret; 180 auto ret local [all...] |
/system/extras/ext4_utils/ |
H A D | ext4_utils.c | 145 off64_t ret; local 147 ret = lseek64(fd, 1024, SEEK_SET); 148 if (ret < 0) 151 ret = read(fd, sb, sizeof(*sb)); 152 if (ret < 0) 154 if (ret != sizeof(*sb)) 161 off64_t ret; local 163 ret = lseek64(fd, offset, SEEK_SET); 164 if (ret < 0) 167 ret 530 int ret; local 564 int ret; local 606 off64_t ret; local [all...] |
/system/core/libsparse/ |
H A D | append2simg.c | 63 int ret; local 73 ret = asprintf(&tmp_path, "%s.append2simg", output_path); 74 if (ret < 0) { 131 ret = rename(tmp_path, output_path); 132 if (ret < 0) {
|
/system/libfmq/benchmarks/ |
H A D | msgq_benchmark_client.cpp | 78 service->configureClientInboxSyncReadWrite([this](bool ret, 80 ASSERT_TRUE(ret); 89 service->configureClientOutboxSyncReadWrite([this](bool ret, 91 ASSERT_TRUE(ret); 154 bool ret = service->requestWrite(kQueueSize); local 155 ASSERT_TRUE(ret); 188 bool ret = service->requestWrite(kQueueSize); local 189 ASSERT_TRUE(ret); 221 bool ret = service->requestWrite(kQueueSize); local 222 ASSERT_TRUE(ret); 253 bool ret = service->requestWrite(kQueueSize); local 299 bool ret = service->requestRead(kQueueSize); local 332 bool ret = service->requestRead(kQueueSize); local 364 bool ret = service->requestRead(kQueueSize); local 400 bool ret = service->requestRead(kQueueSize); local [all...] |
/system/libufdt/tests/src/ |
H A D | extract_dtb.c | 97 int ret = 1; local 139 ret = 0; 144 return ret; 158 int ret = extract_dtbs(in_file, out_dtb_file, out_image_file); local 160 return ret;
|
/system/libufdt/utils/src/ |
H A D | mkdtimg_cfg_create.c | 104 int ret = is_entry ? local 107 if (ret != 0) { 121 int ret = -1; local 146 ret = output_img_with_config(img_fp, cfg_fp); 152 return ret;
|
/system/nfc/halimpl/bcm2079x/adaptation/ |
H A D | userial_linux.c | 605 int ret = 0; local 650 ret = TEMP_FAILURE_RETRY(read(fd, pbuf + offset, (size_t)count)); 651 if (ret > 0) perf_update(&perf_read, clock() - t2, ret); 653 if (ret <= 0 || !bSerialPortDevice || len < MIN_BUFSIZE) break; 675 offset += ret; 676 count -= ret; 679 ret = offset; 688 if (ret > 0 && len >= MIN_BUFSIZE) { 690 while (count < ret) { 926 int ret = 0; local 1199 int ret = 0, total = 0; local 1568 int ret; local 1607 int ret; local 1615 int ret = -1; local 1685 int ret; local [all...] |
/system/update_engine/update_manager/ |
H A D | boxed_value.cc | 106 string ret = ""; local 111 if (ret.size() > 0) 112 ret += ","; 113 ret += StringForConnectionType(type); 115 return ret;
|
/system/core/libsysutils/src/ |
H A D | SocketClient.cpp | 77 int ret = 0; local 81 ret = asprintf(&buf, "%d %d %s (%s)", code, getCmdNum(), msg, strerror(errno)); 83 ret = asprintf(&buf, "%d %s (%s)", code, msg, strerror(errno)); 87 ret = asprintf(&buf, "%d %d %s", code, getCmdNum(), msg); 89 ret = asprintf(&buf, "%d %s", code, msg); 93 if (ret != -1) { 94 ret = sendMsg(buf); 97 return ret; 201 int ret = 0; local 235 ret [all...] |
/system/extras/iotop/ |
H A D | taskstats.cpp | 38 int ret = genl_connect(nl.get()); local 39 if (ret < 0) { 40 LOG(FATAL) << nl_geterror(ret) << std::endl << "Unable to open netlink socket (are you root?)"; 101 pid_t ret; local 103 ret = ParseAggregateTaskStats(nested_attr, nla_len(attr), &stats); 104 if (ret < 0) { 106 } else if (ret == taskstats_request->requested_pid) { 109 LOG(WARNING) << "got taskstats for unexpected pid " << ret << 160 bool ret = GetStats(tgid, TASKSTATS_CMD_ATTR_TGID, stats); local 161 if (ret) { [all...] |
/system/bt/hci/src/ |
H A D | hci_packet_factory.cc | 188 BT_HDR* ret = (BT_HDR*)buffer_allocator->alloc(sizeof(BT_HDR) + data_size); local 189 CHECK(ret); 190 ret->event = 0; 191 ret->offset = 0; 192 ret->layer_specific = 0; 193 ret->len = data_size; 194 return ret;
|
/system/core/adf/libadf/ |
H A D | adf.cpp | 44 auto ret = static_cast<adf_id_t *>(malloc(size)); local 45 if (!ret) 48 std::copy(in.begin(), in.end(), ret); 49 *out = ret; 106 int ret = 0; local 126 ret = -errno; 129 return ret; 259 auto ret = adf_get_interface_data(fd, &data); local 261 if (ret < 0) 262 return ret; 314 int ret = 0; local 397 int ret; local 416 int ret; local 473 auto ret = adf_get_overlay_engine_data(fd, &data); local 529 int ret = 0; local 560 bool ret = false; local [all...] |
/system/core/healthd/ |
H A D | BatteryMonitor.cpp | 90 int ret; local 100 ret = mapSysfsString(status, batteryStatusMap); 101 if (ret < 0) { 103 ret = BATTERY_STATUS_UNKNOWN; 106 return ret; 110 int ret; local 122 ret = mapSysfsString(status, batteryHealthMap); 123 if (ret < 0) { 125 ret = BATTERY_HEALTH_UNKNOWN; 128 return ret; 140 BatteryMonitor::PowerSupplyType ret; local 349 status_t ret = BAD_VALUE; local [all...] |
/system/core/libcrypto_utils/ |
H A D | android_pubkey.c | 66 bool ret = false; local 104 ret = true; 107 if (!ret && new_key) { 110 return ret; 124 bool ret = false; local 161 ret = true; 168 return ret;
|
/system/netd/server/ |
H A D | NetworkController.cpp | 101 if (int ret = RouteController::addVirtualNetworkFallthrough(vpnNetId, 106 return ret; 109 if (int ret = RouteController::removeVirtualNetworkFallthrough(vpnNetId, 114 return ret; 134 if (int ret = modifyFallthrough(entry.first, physicalInterface, permission, add)) { 135 return ret; 171 if (int ret = static_cast<PhysicalNetwork*>(network)->addAsDefault()) { 172 return ret; 182 if (int ret = static_cast<PhysicalNetwork*>(network)->removeAsDefault()) { 183 return ret; 385 int ret = network->clearInterfaces(); local [all...] |
/system/sepolicy/tests/ |
H A D | policy.py | 41 ret = self.__libsepolwrap.get_type(buf, c_int(2048), 43 if ret == 0: 46 if ret == 1: 83 ret = 0 85 ret = self.__libsepolwrap.get_allow_rule(buf, c_int(2048), 87 if ret == 0: 91 if ret == 1:
|
H A D | treble_sepolicy_tests.py | 184 ret = "" 191 ret += "The following domain(s) must be associated with the " 192 ret += "\"coredomain\" attribute because they are executed off of " 193 ret += "/system:\n" 194 ret += " ".join(str(x) for x in sorted(violators)) + "\n" 204 ret += "The following domains must not be associated with the " 205 ret += "\"coredomain\" attribute because they are executed off of " 206 ret += "/vendor or /system/vendor:\n" 207 ret += " ".join(str(x) for x in sorted(violators)) + "\n" 209 return ret [all...] |
/system/core/liblog/ |
H A D | logger_write.c | 197 int i = 0, ret = 0; local 213 ++ret; 230 if (!ret && !i) { 234 return ret; 246 int ret; local 265 ret = check_log_uid_permissions(); 266 if (ret < 0) { 267 return ret; 288 ret = __android_log_trylock(); 292 if (ret) { /* tryloc 381 int ret; local 657 int ret = LOGGER_DEFAULT; local [all...] |
/system/bt/btif/co/ |
H A D | bta_hh_co.cc | 62 ssize_t ret; local 63 OSI_NO_INTR(ret = write(fd, ev, sizeof(*ev))); 65 if (ret < 0) { 69 } else if (ret != (ssize_t)sizeof(*ev)) { 71 ret, sizeof(*ev)); 85 ssize_t ret; local 86 OSI_NO_INTR(ret = read(p_dev->fd, &ev, sizeof(ev))); 88 if (ret == 0) { 91 } else if (ret < 0) { 115 if (ret < (ssize_ 204 int ret; local [all...] |
/system/security/keystore/ |
H A D | IKeystoreService.cpp | 129 ResponseCode ret = ResponseCode(reply.readInt32()); variable 134 return ret; 588 ResponseCode ret = ResponseCode(reply.readInt32()); variable 596 return ret; 615 ResponseCode ret = ResponseCode(reply.readInt32()); variable 623 return ret; 643 ResponseCode ret = ResponseCode(reply.readInt32()); variable 651 return ret; 870 ResponseCode ret = ResponseCode(reply.readInt32()); variable 878 return ret; 895 ResponseCode ret = ResponseCode(reply.readInt32()); variable 933 int32_t ret = getState(userId); local 943 auto ret = get(name, uid, &out); local 959 int32_t ret = insert(name, in.value(), uid, flags); local 968 int32_t ret = del(name, uid); local 977 int32_t ret = exist(name, uid); local 987 int32_t ret = list(prefix, uid, &matches); local 999 int32_t ret = reset(); local 1008 int32_t ret = onUserPasswordChanged(userId, pass); local 1016 int32_t ret = lock(userId); local 1025 int32_t ret = unlock(userId, pass); local 1033 bool ret = isEmpty(userId); local 1064 int32_t ret = generate(name, uid, keyType, keySize, flags, &args); local 1075 auto ret = import(name, in.value(), uid, flags); local 1085 auto ret = sign(name, in.value(), &out); local 1096 auto ret = verify(name, in.value(), signature.value()); local 1105 auto ret = get_pubkey(name, &out); local 1115 int32_t ret = grant(name, granteeUid); local 1124 int32_t ret = ungrant(name, granteeUid); local 1133 int64_t ret = getmtime(name, uid); local 1144 int32_t ret = duplicate(srcKey, srcUid, destKey, destUid); local 1152 int32_t ret = is_hardware_backed(keyType); local 1160 int32_t ret = clear_uid(uid); local 1168 auto ret = addRngEntropy(entropy.value()); local 1181 int32_t ret = local 1195 int ret = getKeyCharacteristics(name, clientId.value(), appData.value(), uid, local 1211 int32_t ret = local 1326 int ret = attestKey(name, params.value(), &chain); local 1338 int ret = attestDeviceIds(params.value(), &chain); local 1348 int32_t ret = onDeviceOffBody(); local [all...] |