/system/media/camera/src/ |
D | camera_metadata_tag_info.c | 712 const char *msg = "error: not an enum"; in camera_metadata_enum_snprint() local 719 msg = "TRANSFORM_MATRIX"; in camera_metadata_enum_snprint() 723 msg = "FAST"; in camera_metadata_enum_snprint() 727 msg = "HIGH_QUALITY"; in camera_metadata_enum_snprint() 731 msg = "error: enum value out of range"; in camera_metadata_enum_snprint() 744 msg = "OFF"; in camera_metadata_enum_snprint() 748 msg = "FAST"; in camera_metadata_enum_snprint() 752 msg = "HIGH_QUALITY"; in camera_metadata_enum_snprint() 756 msg = "error: enum value out of range"; in camera_metadata_enum_snprint() 767 msg = "OFF"; in camera_metadata_enum_snprint() [all …]
|
/system/netd/server/ |
D | NFLogListener.cpp | 55 const nfgenmsg& nfmsg, const Slice msg) { in __anon5a1cf7df0202() argument 57 ss << nlmsg << " " << nfmsg << " " << msg << " " << netdutils::toHex(msg, 32); in __anon5a1cf7df0202() 61 using SendFn = std::function<Status(const Slice msg)>; 70 } __attribute__((packed)) msg = {}; in cfgCmdPfUnbind() local 72 msg.nlhdr.nlmsg_len = sizeof(msg); in cfgCmdPfUnbind() 73 msg.nlhdr.nlmsg_type = kNFLogConfigMsgType; in cfgCmdPfUnbind() 74 msg.nlhdr.nlmsg_flags = NLM_F_REQUEST; in cfgCmdPfUnbind() 75 msg.nfhdr.nfgen_family = AF_UNSPEC; in cfgCmdPfUnbind() 76 msg.attr.nfa_len = sizeof(msg.attr) + sizeof(msg.cmd); in cfgCmdPfUnbind() 77 msg.attr.nfa_type = NFULA_CFG_CMD; in cfgCmdPfUnbind() [all …]
|
D | WakeupControllerTest.cpp | 95 } msg = {}; in TEST_F() local 97 msg.uidAttr.nla_type = NFULA_UID; in TEST_F() 98 msg.uidAttr.nla_len = sizeof(msg.uidAttr) + sizeof(msg.uid); in TEST_F() 99 msg.uid = htobe32(kUid); in TEST_F() 101 msg.gidAttr.nla_type = NFULA_GID; in TEST_F() 102 msg.gidAttr.nla_len = sizeof(msg.gidAttr) + sizeof(msg.gid); in TEST_F() 103 msg.gid = htobe32(kGid); in TEST_F() 105 msg.tsAttr.nla_type = NFULA_TIMESTAMP; in TEST_F() 106 msg.tsAttr.nla_len = sizeof(msg.tsAttr) + sizeof(msg.ts); in TEST_F() 107 msg.ts.tv_sec = htobe32(kTsNs / kNsPerS); in TEST_F() [all …]
|
D | SockDiagTest.cpp | 38 static bool isLoopbackSocket(const inet_diag_msg *msg) { in isLoopbackSocket() argument 39 return SockDiag::isLoopbackSocket(msg); in isLoopbackSocket() 108 auto checkIPv4Dump = [&] (uint8_t /* proto */, const inet_diag_msg *msg) { in TEST_F() argument 109 EXPECT_EQ(htonl(INADDR_LOOPBACK), msg->id.idiag_src[0]); in TEST_F() 111 seenclient46 |= (msg->id.idiag_sport == client46.sin6_port); in TEST_F() 112 inet_ntop(AF_INET, msg->id.idiag_src, src, sizeof(src)); in TEST_F() 113 inet_ntop(AF_INET, msg->id.idiag_src, dst, sizeof(dst)); in TEST_F() 115 src, htons(msg->id.idiag_sport), in TEST_F() 116 dst, htons(msg->id.idiag_dport), in TEST_F() 117 tcpStateName(msg->idiag_state)); in TEST_F() [all …]
|
/system/core/trusty/storage/lib/ |
D | storage.c | 57 static ssize_t check_response(struct storage_msg *msg, ssize_t res) in check_response() argument 62 if ((size_t)res < sizeof(*msg)) { in check_response() 63 ALOGE("invalid msg length (%zd < %zd)\n", res, sizeof(*msg)); in check_response() 67 ALOGV("cmd 0x%x: server returned %u\n", msg->cmd, msg->result); in check_response() 69 switch(msg->result) { in check_response() 71 return res - sizeof(*msg); in check_response() 83 ALOGE("cmd 0x%x: is unhandles command\n", msg->cmd); in check_response() 93 ALOGE("cmd 0x%x: internal server error\n", msg->cmd); in check_response() 98 msg->cmd, msg->result); in check_response() 146 struct storage_msg msg = { .cmd = STORAGE_FILE_OPEN, .flags = _to_msg_flags(opflags)}; in storage_open_file() local [all …]
|
/system/keymaster/ |
D | android_keymaster_messages_test.cpp | 68 EmptyKeymasterResponse msg(ver); in TEST() local 69 msg.error = KM_ERROR_OK; in TEST() 71 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 5)); in TEST() 77 EmptyKeymasterResponse msg(ver); in TEST() local 78 msg.error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in TEST() 80 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 4)); in TEST() 185 GetKeyCharacteristicsResponse msg(ver); in TEST() local 186 msg.error = KM_ERROR_OK; in TEST() 187 msg.enforced.Reinitialize(params, array_length(params)); in TEST() 188 msg.unenforced.Reinitialize(params, array_length(params)); in TEST() [all …]
|
/system/core/adb/ |
D | file_sync_service.cpp | 107 syncmsg msg = {}; in do_lstat_v1() local 108 msg.stat_v1.id = ID_LSTAT_V1; in do_lstat_v1() 112 msg.stat_v1.mode = st.st_mode; in do_lstat_v1() 113 msg.stat_v1.size = st.st_size; in do_lstat_v1() 114 msg.stat_v1.time = st.st_mtime; in do_lstat_v1() 115 return WriteFdExactly(s, &msg.stat_v1, sizeof(msg.stat_v1)); in do_lstat_v1() 119 syncmsg msg = {}; in do_stat_v2() local 120 msg.stat_v2.id = id; in do_stat_v2() 132 msg.stat_v2.error = errno_to_wire(errno); in do_stat_v2() 134 msg.stat_v2.dev = st.st_dev; in do_stat_v2() [all …]
|
D | transport_usb.cpp | 32 static int UsbReadMessage(usb_handle* h, amessage* msg) { in UsbReadMessage() argument 36 CHECK(usb_packet_size >= sizeof(*msg)); in UsbReadMessage() 41 if (n != sizeof(*msg)) { in UsbReadMessage() 42 D("usb_read returned unexpected length %d (expected %zu)", n, sizeof(*msg)); in UsbReadMessage() 45 memcpy(msg, buffer, sizeof(*msg)); in UsbReadMessage() 52 D("UsbReadPayload(%d)", p->msg.data_length); in UsbReadPayload() 60 size_t len = p->msg.data_length; in UsbReadPayload() 70 int n = UsbReadMessage(t->usb, &p->msg); in remote_read() 75 if (static_cast<size_t>(n) != sizeof(p->msg) || !check_header(p, t)) { in remote_read() 82 if (p->msg.command != A_CNXN && p->msg.command != A_AUTH) { in remote_read() [all …]
|
/system/core/init/ |
D | uevent_listener.cpp | 32 static void ParseEvent(const char* msg, Uevent* uevent) { in ParseEvent() argument 43 while (*msg) { in ParseEvent() 44 if (!strncmp(msg, "ACTION=", 7)) { in ParseEvent() 45 msg += 7; in ParseEvent() 46 uevent->action = msg; in ParseEvent() 47 } else if (!strncmp(msg, "DEVPATH=", 8)) { in ParseEvent() 48 msg += 8; in ParseEvent() 49 uevent->path = msg; in ParseEvent() 50 } else if (!strncmp(msg, "SUBSYSTEM=", 10)) { in ParseEvent() 51 msg += 10; in ParseEvent() [all …]
|
/system/core/trusty/storage/proxy/ |
D | proxy.c | 98 static int handle_req(struct storage_msg *msg, const void *req, size_t req_len) in handle_req() argument 102 if ((msg->flags & STORAGE_MSG_FLAG_POST_COMMIT) && in handle_req() 103 (msg->cmd != STORAGE_RPMB_SEND)) { in handle_req() 108 ALOGE("cmd 0x%x: post commit option is not implemented\n", msg->cmd); in handle_req() 109 msg->result = STORAGE_ERR_UNIMPLEMENTED; in handle_req() 110 return ipc_respond(msg, NULL, 0); in handle_req() 113 if (msg->flags & STORAGE_MSG_FLAG_PRE_COMMIT) { in handle_req() 116 msg->result = STORAGE_ERR_GENERIC; in handle_req() 117 return ipc_respond(msg, NULL, 0); in handle_req() 121 switch (msg->cmd) { in handle_req() [all …]
|
D | ipc.c | 67 ssize_t ipc_get_msg(struct storage_msg *msg, void *req_buf, size_t req_buf_len) in ipc_get_msg() argument 70 struct iovec iovs[2] = {{msg, sizeof(*msg)}, {req_buf, req_buf_len}}; in ipc_get_msg() 81 if ((size_t)rc < sizeof(*msg)) { in ipc_get_msg() 87 if (msg->size != (uint32_t)rc) { in ipc_get_msg() 89 msg->cmd, msg->size, (uint32_t)rc); in ipc_get_msg() 93 return rc - sizeof(*msg); in ipc_get_msg() 96 int ipc_respond(struct storage_msg *msg, void *out, size_t out_size) in ipc_respond() argument 99 struct iovec iovs[2] = {{msg, sizeof(*msg)}, {out, out_size}}; in ipc_respond() 103 msg->cmd |= STORAGE_RESP_BIT; in ipc_respond() 108 msg->cmd, strerror(errno)); in ipc_respond()
|
D | storage.c | 162 int storage_file_delete(struct storage_msg *msg, in storage_file_delete() argument 171 msg->result = STORAGE_ERR_NOT_VALID; in storage_file_delete() 179 msg->result = STORAGE_ERR_NOT_VALID; in storage_file_delete() 186 msg->result = STORAGE_ERR_GENERIC; in storage_file_delete() 201 msg->result = translate_errno(rc); in storage_file_delete() 206 msg->result = STORAGE_NO_ERROR; in storage_file_delete() 211 return ipc_respond(msg, NULL, 0); in storage_file_delete() 215 int storage_file_open(struct storage_msg *msg, in storage_file_open() argument 225 msg->result = STORAGE_ERR_NOT_VALID; in storage_file_open() 233 msg->result = STORAGE_ERR_NOT_VALID; in storage_file_open() [all …]
|
D | storage.h | 21 int storage_file_delete(struct storage_msg *msg, 24 int storage_file_open(struct storage_msg *msg, 27 int storage_file_close(struct storage_msg *msg, 30 int storage_file_write(struct storage_msg *msg, 33 int storage_file_read(struct storage_msg *msg, 36 int storage_file_get_size(struct storage_msg *msg, 39 int storage_file_set_size(struct storage_msg *msg,
|
/system/core/libnetutils/ |
D | dhcpmsg.c | 24 static void *init_dhcp_msg(dhcp_msg *msg, int type, void *hwaddr, uint32_t xid) in init_dhcp_msg() argument 28 memset(msg, 0, sizeof(dhcp_msg)); in init_dhcp_msg() 30 msg->op = OP_BOOTREQUEST; in init_dhcp_msg() 31 msg->htype = HTYPE_ETHER; in init_dhcp_msg() 32 msg->hlen = 6; in init_dhcp_msg() 33 msg->hops = 0; in init_dhcp_msg() 35 msg->flags = htons(FLAGS_BROADCAST); in init_dhcp_msg() 37 msg->xid = xid; in init_dhcp_msg() 39 memcpy(msg->chaddr, hwaddr, 6); in init_dhcp_msg() 41 x = msg->options; in init_dhcp_msg() [all …]
|
D | dhcpclient.c | 164 int decode_dhcp_msg(dhcp_msg *msg, int len, dhcp_info *info) in decode_dhcp_msg() argument 175 if (msg->options[0] != OPT_COOKIE1) return -1; in decode_dhcp_msg() 176 if (msg->options[1] != OPT_COOKIE2) return -1; in decode_dhcp_msg() 177 if (msg->options[2] != OPT_COOKIE3) return -1; in decode_dhcp_msg() 178 if (msg->options[3] != OPT_COOKIE4) return -1; in decode_dhcp_msg() 180 x = msg->options + 4; in decode_dhcp_msg() 230 info->ipaddr = msg->yiaddr; in decode_dhcp_msg() 247 void dump_dhcp_msg(dhcp_msg *msg, int len) in dump_dhcp_msg() argument 263 if (msg->op == OP_BOOTREQUEST) in dump_dhcp_msg() 265 else if (msg->op == OP_BOOTREPLY) in dump_dhcp_msg() [all …]
|
/system/extras/simpleperf/ |
D | UnixSocket_test.cpp | 68 Message* msg = reinterpret_cast<Message*>(read_buf.data()); in TEST() local 69 size_t aligned_len = Align(msg->len, UnixSocketMessageAlignment); in TEST() 71 msg = reinterpret_cast<Message*>(read_buf.data()); in TEST() 72 ASSERT_EQ(msg->len, msg->type + sizeof(UnixSocketMessage)); in TEST() 73 read_data.insert(read_data.end(), msg->data, msg->data + msg->type); in TEST() 86 auto receive_message_callback = [&](const UnixSocketMessage& msg) { in ClientToTestUndelayedMessage() argument 87 if (msg.len != sizeof(UnixSocketMessage)) { in ClientToTestUndelayedMessage() 92 reply_msg.type = msg.type + 1; in ClientToTestUndelayedMessage() 116 auto receive_message_callback = [&](const UnixSocketMessage& msg) { in TEST() argument 117 if (msg.len != sizeof(UnixSocketMessage) || msg.type != need_reply_type) { in TEST() [all …]
|
D | inplace_sampler_lib.cpp | 69 bool HandleMessage(const UnixSocketMessage& msg); 70 bool ParseStartProfilingMessage(const UnixSocketMessage& msg); 97 auto read_callback = [&](const UnixSocketMessage& msg) { in Run() argument 98 return HandleMessage(msg); in Run() 109 bool SampleManager::HandleMessage(const UnixSocketMessage& msg) { in HandleMessage() argument 110 if (msg.type == START_PROFILING) { in HandleMessage() 111 if (!ParseStartProfilingMessage(msg)) { in HandleMessage() 122 if (msg.type == END_PROFILING) { in HandleMessage() 126 LOG(ERROR) << "Unexpected msg type: " << msg.type; in HandleMessage() 130 bool SampleManager::ParseStartProfilingMessage(const UnixSocketMessage& msg) { in ParseStartProfilingMessage() argument [all …]
|
D | InplaceSamplerClient.cpp | 75 auto read_callback = [&](const UnixSocketMessage& msg) { in StartPolling() argument 76 return HandleMessage(msg); in StartPolling() 118 UnixSocketMessage* msg = reinterpret_cast<UnixSocketMessage*>(data.get()); in SendStartProfilingMessage() local 119 msg->len = size; in SendStartProfilingMessage() 120 msg->type = START_PROFILING; in SendStartProfilingMessage() 121 strcpy(msg->data, options.c_str()); in SendStartProfilingMessage() 122 return conn_->SendMessage(*msg, true); in SendStartProfilingMessage() 127 auto read_callback = [&](const UnixSocketMessage& msg) { in StopProfiling() argument 128 return HandleMessage(msg); in StopProfiling() 134 UnixSocketMessage msg; in StopProfiling() local [all …]
|
/system/bt/stack/avdt/ |
D | avdt_ccb_act.cc | 149 p_data->msg.discover_rsp.p_sep_info = sep_info; in avdt_ccb_hdl_discover_cmd() 150 p_data->msg.discover_rsp.num_seps = 0; in avdt_ccb_hdl_discover_cmd() 156 sep_info[p_data->msg.discover_rsp.num_seps].in_use = p_scb->in_use; in avdt_ccb_hdl_discover_cmd() 157 sep_info[p_data->msg.discover_rsp.num_seps].seid = i + 1; in avdt_ccb_hdl_discover_cmd() 158 sep_info[p_data->msg.discover_rsp.num_seps].media_type = in avdt_ccb_hdl_discover_cmd() 160 sep_info[p_data->msg.discover_rsp.num_seps].tsep = p_scb->cs.tsep; in avdt_ccb_hdl_discover_cmd() 162 p_data->msg.discover_rsp.num_seps++; in avdt_ccb_hdl_discover_cmd() 188 (tAVDT_CTRL*)(&p_data->msg.discover_rsp)); in avdt_ccb_hdl_discover_rsp() 208 p_scb = avdt_scb_by_hdl(p_data->msg.single.seid); in avdt_ccb_hdl_getcap_cmd() 210 p_data->msg.svccap.p_cfg = &p_scb->cs.cfg; in avdt_ccb_hdl_getcap_cmd() [all …]
|
/system/gatekeeper/tests/ |
D | gatekeeper_messages_test.cpp | 54 EnrollRequest msg(USER_ID, NULL, provided_password, NULL); in TEST() local 55 SizedBuffer serialized_msg(msg.GetSerializedSize()); in TEST() 56 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length); in TEST() 68 …ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), passw… in TEST() 83 EnrollRequest msg(USER_ID, &handle, provided_password, &enrolled); in TEST() local 84 SizedBuffer serialized_msg(msg.GetSerializedSize()); in TEST() 85 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length); in TEST() 97 …ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), passw… in TEST() 114 EnrollRequest msg(USER_ID, password_handle, provided_password, enrolled_password); in TEST() local 115 SizedBuffer serialized_msg(msg.GetSerializedSize()); in TEST() [all …]
|
/system/extras/tests/uevents/ |
D | uevents.c | 25 char msg[UEVENT_MSG_LEN+2]; in main() local 33 while ((n = uevent_kernel_multicast_recv(device_fd, msg, UEVENT_MSG_LEN)) > 0) { in main() 34 msg[n] = '\0'; in main() 35 msg[n+1] = '\0'; in main() 38 if (msg[i] == '\0') in main() 39 msg[i] = ' '; in main() 41 printf("%s\n", msg); in main()
|
/system/core/libunwindstack/ |
D | ArmExidx.cpp | 198 std::string msg = "pop {"; in DecodePrefix_10_00() local 202 msg += ", "; in DecodePrefix_10_00() 204 msg += android::base::StringPrintf("r%zu", i + 4); in DecodePrefix_10_00() 208 log(log_indent_, "%s}", msg.c_str()); in DecodePrefix_10_00() 269 std::string msg = "pop {r4"; in DecodePrefix_10_10() local 272 msg += android::base::StringPrintf("-r%d", 4 + end_reg); in DecodePrefix_10_10() 275 log(log_indent_, "%s, r14}", msg.c_str()); in DecodePrefix_10_10() 277 log(log_indent_, "%s}", msg.c_str()); in DecodePrefix_10_10() 340 std::string msg = "pop {"; in DecodePrefix_10_11_0001() local 344 msg += ", "; in DecodePrefix_10_11_0001() [all …]
|
/system/core/debuggerd/ |
D | signal_sender.cpp | 91 signal_message msg; in start_signal_sender() local 92 int rc = TEMP_FAILURE_RETRY(read(sfd[0], &msg, sizeof(msg))); in start_signal_sender() 96 } else if (rc != sizeof(msg)) { in start_signal_sender() 103 if (msg.tid > 0) { in start_signal_sender() 104 if (syscall(SYS_tgkill, msg.pid, msg.tid, msg.signal) != 0) { in start_signal_sender() 108 if (kill(msg.pid, msg.signal) != 0) { in start_signal_sender() 158 signal_message msg = {.pid = pid, .tid = tid, .signal = signal }; in send_signal() local 159 if (TEMP_FAILURE_RETRY(write(signal_fd, &msg, sizeof(msg))) < 0) { in send_signal()
|
/system/core/libsysutils/src/ |
D | FrameworkClient.cpp | 32 int FrameworkClient::sendMsg(const char *msg) { in sendMsg() argument 40 ret = TEMP_FAILURE_RETRY(write(mSocket, msg, strlen(msg) +1)); in sendMsg() 42 SLOGW("Unable to send msg '%s' (%s)", msg, strerror(errno)); in sendMsg() 48 int FrameworkClient::sendMsg(const char *msg, const char *data) { in sendMsg() argument 49 size_t bufflen = strlen(msg) + strlen(data) + 1; in sendMsg() 55 snprintf(buffer, bufflen, "%s%s", msg, data); in sendMsg()
|
/system/core/trusty/gatekeeper/ |
D | trusty_gatekeeper_ipc.c | 53 struct gatekeeper_message *msg = malloc(msg_size); in trusty_gatekeeper_call() local 54 msg->cmd = cmd; in trusty_gatekeeper_call() 55 memcpy(msg->payload, in, in_size); in trusty_gatekeeper_call() 57 ssize_t rc = write(handle_, msg, msg_size); in trusty_gatekeeper_call() 58 free(msg); in trusty_gatekeeper_call() 78 msg = (struct gatekeeper_message *) out; in trusty_gatekeeper_call() 80 if ((cmd | GK_RESP_BIT) != msg->cmd) { in trusty_gatekeeper_call() 81 ALOGE("invalid command (%d)\n", msg->cmd); in trusty_gatekeeper_call()
|