/bionic/libc/bionic/ |
H A D | eventfd_read.cpp | 33 return (read(fd, value, sizeof(*value)) == sizeof(*value)) ? 0 : -1;
|
H A D | pthread_setname_np.cpp | 65 ssize_t n = TEMP_FAILURE_RETRY(read(fd, buf, buf_size));
|
/bionic/libc/arch-arm/syscalls/ |
H A D | read.S | 5 ENTRY(read) function 16 END(read)
|
/bionic/libc/arch-arm64/syscalls/ |
H A D | read.S | 5 ENTRY(read) function 14 END(read)
|
/bionic/libc/arch-mips/syscalls/ |
H A D | read.S | 5 ENTRY(read) function 19 END(read)
|
/bionic/libc/arch-x86_64/syscalls/ |
H A D | read.S | 5 ENTRY(read) function 15 END(read)
|
/bionic/libc/arch-mips64/syscalls/ |
H A D | read.S | 5 ENTRY(read) function 25 END(read)
|
/bionic/libc/arch-x86/syscalls/ |
H A D | read.S | 5 ENTRY(read) function 39 END(read)
|
/bionic/tests/ |
H A D | sys_sendfile_test.cpp | 41 ASSERT_EQ(2, TEMP_FAILURE_RETRY(read(dst_file.fd, &buf, 2))); 60 ASSERT_EQ(2, TEMP_FAILURE_RETRY(read(dst_file.fd, &buf, 2)));
|
H A D | sys_mman_test.cpp | 88 ASSERT_EQ(STR_SSIZE(STRING_MSG), read(tf.fd, buf, sizeof(STRING_MSG))); 166 ASSERT_EQ(static_cast<ssize_t>(pagesize), read(tf.fd, buf, pagesize)); 169 ASSERT_EQ(static_cast<ssize_t>(pagesize), read(tf.fd, buf, pagesize)); 172 ASSERT_EQ(static_cast<ssize_t>(pagesize), read(tf.fd, buf, pagesize));
|
H A D | fortify_compilation_test.cpp | 201 // GCC: error: call to '__read_dest_size_error' declared with attribute error: read called with size bigger than destination 202 // CLANG: error: call to unavailable function 'read': 'count' bytes overflows the given object 203 read(0, buf, 6);
|
H A D | sys_select_test.cpp | 71 ASSERT_EQ(static_cast<ssize_t>(sizeof(DELAY_MSG)), read(fd, buf, sizeof(DELAY_MSG))); 96 // If there is data to be read on STDIN, then the number of 150 // If there is data to be read on STDIN, then the number of
|
H A D | utils.h | 192 while ((bytes_read = TEMP_FAILURE_RETRY(read(fds[0], buf, sizeof(buf)))) > 0) {
|
H A D | unistd_test.cpp | 227 TEST(UNISTD_TEST, read) { 232 ASSERT_EQ(5, read(fd, buf, 5)); 242 // read returns ssize_t which is 64-bits on LP64, so it's worth explicitly checking that 245 ASSERT_EQ(-1, read(-1, buf, sizeof(buf)));
|
/bionic/libc/tools/ |
H A D | generate-NOTICE.py | 122 content = open(path, 'r').read().decode('utf-8') 125 content = open(path, 'r').read().decode('iso-8859-1')
|
H A D | check-symbols-glibc.py | 45 ignored_symbols |= set(open(f, 'r').read().splitlines())
|
H A D | symbols.py | 25 for line in f.read().splitlines():
|
H A D | genseccomp.py | 229 existing = open(output_path).read()
|
/bionic/tools/versioner/ |
H A D | run_tests.py | 29 expected_output = f.read()
|
/bionic/tools/relocation_packer/src/ |
H A D | main.cc | 109 if (TEMP_FAILURE_RETRY(read(fd.get(), e_ident, EI_NIDENT) != EI_NIDENT)) { 110 LOG(ERROR) << file << ": failed to read elf header:" << strerror(errno);
|
/bionic/libc/include/ |
H A D | unistd.h | 157 ssize_t read(int __fd, void* __buf, size_t __count) __overloadable 158 __RENAME_CLANG(read); 408 ssize_t read(int fd, void* buf, size_t count) __overloadable 412 ssize_t read(int fd, void* buf, size_t count) __overloadable 417 ssize_t read(int fd, void* const __pass_object_size0 buf, size_t count) 422 return __call_bypassing_fortify(read)(fd, buf, count); 505 ssize_t __read_real(int, void*, size_t) __RENAME(read); variable 519 __errordecl(__read_dest_size_error, "read called with size bigger than destination"); 520 __errordecl(__read_count_toobig_error, "read called with count > SSIZE_MAX"); 647 ssize_t read(in function [all...] |
/bionic/tools/versioner/current/ |
H A D | unistd.h | 157 ssize_t read(int __fd, void* __buf, size_t __count) __overloadable 158 __RENAME_CLANG(read); 408 ssize_t read(int fd, void* buf, size_t count) __overloadable 412 ssize_t read(int fd, void* buf, size_t count) __overloadable 417 ssize_t read(int fd, void* const __pass_object_size0 buf, size_t count) 422 return __call_bypassing_fortify(read)(fd, buf, count); 505 ssize_t __read_real(int, void*, size_t) __RENAME(read); variable 519 __errordecl(__read_dest_size_error, "read called with size bigger than destination"); 520 __errordecl(__read_count_toobig_error, "read called with count > SSIZE_MAX"); 647 ssize_t read(in function [all...] |
/bionic/libc/kernel/tools/ |
H A D | utils.py | 101 olddata = f.read()
|
/bionic/libc/dns/resolv/ |
H A D | res_send.c | 874 while ((n = read(statp->_vcsock, (char *)cp, (size_t)len)) > 0) { 881 Perror(statp, stderr, "read failed", errno); 920 while (len != 0 && (n = read(statp->_vcsock, (char *)cp, (size_t)len)) > 0){ 926 Perror(statp, stderr, "read(vc)", errno); 940 n = read(statp->_vcsock, junk,
|
/bionic/libc/arch-mips/string/ |
H A D | strcmp.S | 63 /* Technically strcmp should not read past the end of the strings being 64 compared. We will read a full word that may contain excess bits beyond 66 read the next word after the end of string. Setting ENABLE_READAHEAD will 213 or v0, a3 #replace with all 1s if zeros in unintented read
|