/system/netd/server/ |
H A D | oem_iptables_hook.cpp | 67 int ret = system(OEM_SCRIPT_PATH); local 68 if ((-1 == ret) || (0 != WEXITSTATUS(ret))) {
|
H A D | SockDiag.cpp | 139 int ret; local 143 if ((ret = getaddrinfo(addrstr, nullptr, &hints, &res)) != 0) { 262 int ret = checkError(mWriteSock); local 263 if (!ret) mSocketsDestroyed++; 264 return ret; 272 if (int ret = sendDumpRequest(proto, family, addrstr)) { 273 return ret; 286 if (int ret = destroySockets(IPPROTO_TCP, AF_INET, addrstr)) { 287 ALOGE("Failed to destroy IPv4 sockets on %s: %s", addrstr, strerror(-ret)); 288 return ret; [all...] |
/system/bt/osi/src/ |
H A D | semaphore.cc | 44 semaphore_t* ret = static_cast<semaphore_t*>(osi_malloc(sizeof(semaphore_t))); local 45 ret->fd = eventfd(value, EFD_SEMAPHORE); 46 if (ret->fd == INVALID_FD) { 49 osi_free(ret); 50 ret = NULL; 52 return ret;
|
H A D | reactor.cc | 70 reactor_t* ret = (reactor_t*)osi_calloc(sizeof(reactor_t)); local 72 ret->epoll_fd = INVALID_FD; 73 ret->event_fd = INVALID_FD; 75 ret->epoll_fd = epoll_create(MAX_EVENTS); 76 if (ret->epoll_fd == INVALID_FD) { 82 ret->event_fd = eventfd(0, 0); 83 if (ret->event_fd == INVALID_FD) { 89 ret->list_mutex = new std::mutex; 90 ret->invalidation_list = list_new(NULL); 91 if (!ret 247 int ret; local [all...] |
/system/core/init/ |
H A D | keychords.cpp | 68 int ret; local 71 ret = read(keychord_fd, &id, sizeof(id)); 72 if (ret != sizeof(id)) { 106 int ret = write(keychord_fd, keychords, keychords_length); local 107 if (ret != keychords_length) { 108 PLOG(ERROR) << "could not configure /dev/keychord " << ret;
|
H A D | import_parser.cpp | 35 bool ret = expand_props(args[1], &conf_file); local 36 if (!ret) {
|
/system/core/liblog/tests/ |
H A D | log_id_test.cpp | 75 int ret = __android_log_buf_print( local 78 return reinterpret_cast<void*>(ret); 92 int ret = 0; local 97 if ((0 == ret) && (0 != this_result)) { 98 ret = this_result; 101 ASSERT_LT(0, ret);
|
/system/core/libprocessgroup/ |
H A D | processgroup.cpp | 110 int ret; local 117 ret = -errno; 119 return ret; 137 ssize_t ret = read(ctx->fd, ctx->buf_ptr + ctx->buf_len, local 139 if (ret < 0) { 141 } else if (ret == 0) { 145 ctx->buf_len += ret; 147 LOG(VERBOSE) << "Read " << ret << " to buffer: " << ctx->buf; 151 return ret; 157 int ret local 165 int ret = refillBuffer(ctx); local 193 int ret; local 359 int ret = -errno; local 367 int ret = 0; local [all...] |
/system/hardware/interfaces/wifi/keystore/1.0/default/ |
H A D | keystore.cpp | 25 auto ret = service->get(String16(key.c_str()), AID_WIFI, &value); local 26 if (!ret.isOk()) { 44 auto ret = service->get_pubkey(String16(keyId.c_str()), &pubkey); local 45 if (!ret.isOk()) { 64 auto ret = service->sign(String16(keyId.c_str()), dataToSign, &signedData); local 65 if (!ret.isOk()) {
|
/system/netd/tests/ |
H A D | tun_interface.cpp | 70 int ret = ioctl(mFd, TUNSETIFF, &ifr, sizeof(ifr)); local 71 if (ret == -1) { 72 ret = -errno; 74 return ret; 79 ret = -errno; 81 return ret;
|
/system/core/fs_mgr/ |
H A D | fs_mgr.cpp | 97 int ret; local 99 ret = clock_gettime(CLOCK_MONOTONIC, &ts); 100 if (ret < 0) { 112 int ret = -1; local 114 while (gettime() < timeout_time && ((ret = stat(filename, &info)) < 0)) 117 return ret; 140 int ret; local 170 ret = mount(blk_device, target, fs_type, tmpmnt_flags, tmpmnt_opts); 172 << ")=" << ret; local 173 if (!ret) { 248 off64_t ret; local 291 int ret = 0; local 377 int ret = 0; local 468 int ret; local 494 int ret; local 511 int ret = -1; local 631 int ret = -1; local 761 int ret = -1; local 989 int ret = __mount(rec->blk_device, rec->mount_point, rec); local 1006 int ret = FS_MGR_DOMNT_FAILED; local 1120 int ret; local 1136 int ret = 0; local 1162 int ret = 0; local [all...] |
/system/bt/btif/src/ |
H A D | btif_sock_util.cc | 67 ssize_t ret; local 68 OSI_NO_INTR(ret = send(sock_fd, buf, s, 0)); 69 if (ret <= 0) { 70 BTIF_TRACE_ERROR("sock fd:%d send errno:%d, ret:%d", sock_fd, errno, ret); 73 buf += ret; 74 s -= ret; 82 ssize_t ret; local 83 OSI_NO_INTR(ret = recv(sock_fd, buf, r, MSG_WAITALL)); 84 if (ret < 125 ssize_t ret; local [all...] |
/system/update_engine/ |
H A D | test_http_server.cc | 182 ssize_t written = 0, ret; local 184 ret = WriteString(fd, 189 if (ret < 0) 191 written += ret; 199 ret = WriteString(fd, 205 if (ret < 0) 207 written += ret; 210 ret = WriteString(fd, string("Content-Length: ") + Itoa(content_length) + 212 if (ret < 0) 214 written += ret; 248 ssize_t ret = WriteString(fd, partial); local 255 ssize_t ret = WriteString(fd, line); local 263 ssize_t ret = WriteString(fd, partial); local 292 ssize_t ret; local 395 ssize_t ret; local 407 ssize_t ret; local 433 ssize_t ret; local 472 ssize_t ret; local [all...] |
/system/core/libbacktrace/ |
H A D | UnwindPtrace.cpp | 102 int ret = unw_init_remote(&cursor, addr_space_, upt_info_); local 103 if (ret < 0) { 104 BACK_LOGW("unw_init_remote failed %d", ret); 112 ret = unw_get_reg(&cursor, UNW_REG_IP, &pc); 113 if (ret < 0) { 114 BACK_LOGW("Failed to read IP %d", ret); 118 ret = unw_get_reg(&cursor, UNW_REG_SP, &sp); 119 if (ret < 0) { 120 BACK_LOGW("Failed to read SP %d", ret); 161 ret [all...] |
/system/core/libion/ |
H A D | ion_test.c | 43 int ret; local 49 ret = ion_alloc(*fd, len, align, heap_mask, alloc_flags, handle); 51 if (ret) 52 printf("%s failed: %s\n", __func__, strerror(ret)); 53 return ret; 58 int fd, ret; local 64 ret = ion_free(fd, handle); 65 if (ret) { 66 printf("%s failed: %s %d\n", __func__, strerror(ret), handle); 75 int fd, map_fd, ret; local 136 int fd, share_fd, ret; local [all...] |
/system/bt/btcore/test/ |
H A D | bdaddr_test.cc | 37 char ret[19]; local 48 bdaddr_to_string(&bdaddr, ret, sizeof(ret)); 50 ASSERT_STREQ(test_addr, ret);
|
/system/core/libmemunreachable/ |
H A D | ScopedSignalHandler.h | 53 int ret = sigaction(signal, &act, &old_act_); local 54 if (ret < 0) { 63 int ret = sigaction(signal_, &old_act_, NULL); local 64 if (ret < 0) {
|
/system/extras/squashfs_utils/ |
H A D | squashfs_utils.c | 62 int ret = 0; local 75 ret = -1; 81 ret = -1; 87 return ret;
|
/system/libufdt/tests/src/ |
H A D | util.c | 63 int ret = 0; local 68 ret = 1; 72 ret = 2; 79 return ret;
|
/system/security/keystore-engine/ |
H A D | keystore_backend_binder.cpp | 52 auto ret = service->sign(String16(key_id), inBlob, &reply_vec); local 53 if (!ret.isOk()) { 74 auto ret = service->get_pubkey(String16(key_id), &pubkey_vec); local 75 if (!ret.isOk()) {
|
/system/core/gatekeeperd/ |
H A D | gatekeeperd.cpp | 146 int ret; local 171 [&ret, enrolled_password_handle, enrolled_password_handle_length] 173 ret = static_cast<int>(rsp.code); // propagate errors 182 ret = 0; // all success states are reported as 0 184 ret = rsp.timeout; 189 ret = -1; 192 ret = soft_device->enroll(uid, 199 if (ret == GATEKEEPER_RESPONSE_OK && (*enrolled_password_handle == nullptr || 201 ret = GATEKEEPER_RESPONSE_ERROR; 206 if (ret 246 int ret; local 307 auto ret = service->addAuthToken(*auth_token, *auth_token_length); local 395 android::status_t ret = sm->addService( local [all...] |
/system/core/libsparse/ |
H A D | simg2simg.c | 47 int ret; local 92 ret = snprintf(filename, sizeof(filename), "%s.%d", argv[2], i); 93 if (ret >= (int)sizeof(filename)) { 104 ret = sparse_file_write(out_s[i], out, false, true, false); 105 if (ret) {
|
/system/libufdt/utils/src/ |
H A D | mkdtimg_create.c | 79 int ret = is_entry ? local 82 if (ret != 0) { 113 int ret = -1; local 131 ret = output_img_with_args(img_fp, argc, argv, arg_start + 1); 136 return ret;
|
/system/update_engine/common/ |
H A D | http_fetcher.cc | 85 bool ret = false; local 87 ret = MessageLoop::current()->CancelTask(no_resolver_idle_id_); 91 ret = proxy_resolver_->CancelProxyRequest(proxy_request_) || ret; 94 return ret;
|
/system/update_engine/payload_consumer/ |
H A D | xz_extent_writer.cc | 87 xz_ret ret = xz_dec_run(stream_, &request); local 88 if (ret != XZ_OK && ret != XZ_STREAM_END) { 89 LOG(ERROR) << "xz_dec_run returned " << XzErrorString(ret); 98 if (ret == XZ_STREAM_END)
|