Home
last modified time | relevance | path

Searched refs:msg (Results 1 – 25 of 204) sorted by relevance

123456789

/system/media/camera/src/
Dcamera_metadata_tag_info.c712 const char *msg = "error: not an enum"; in camera_metadata_enum_snprint() local
719 msg = "TRANSFORM_MATRIX"; in camera_metadata_enum_snprint()
723 msg = "FAST"; in camera_metadata_enum_snprint()
727 msg = "HIGH_QUALITY"; in camera_metadata_enum_snprint()
731 msg = "error: enum value out of range"; in camera_metadata_enum_snprint()
744 msg = "OFF"; in camera_metadata_enum_snprint()
748 msg = "FAST"; in camera_metadata_enum_snprint()
752 msg = "HIGH_QUALITY"; in camera_metadata_enum_snprint()
756 msg = "error: enum value out of range"; in camera_metadata_enum_snprint()
767 msg = "OFF"; in camera_metadata_enum_snprint()
[all …]
/system/netd/server/
DNFLogListener.cpp55 const nfgenmsg& nfmsg, const Slice msg) { in __anon5a1cf7df0202() argument
57 ss << nlmsg << " " << nfmsg << " " << msg << " " << netdutils::toHex(msg, 32); in __anon5a1cf7df0202()
61 using SendFn = std::function<Status(const Slice msg)>;
70 } __attribute__((packed)) msg = {}; in cfgCmdPfUnbind() local
72 msg.nlhdr.nlmsg_len = sizeof(msg); in cfgCmdPfUnbind()
73 msg.nlhdr.nlmsg_type = kNFLogConfigMsgType; in cfgCmdPfUnbind()
74 msg.nlhdr.nlmsg_flags = NLM_F_REQUEST; in cfgCmdPfUnbind()
75 msg.nfhdr.nfgen_family = AF_UNSPEC; in cfgCmdPfUnbind()
76 msg.attr.nfa_len = sizeof(msg.attr) + sizeof(msg.cmd); in cfgCmdPfUnbind()
77 msg.attr.nfa_type = NFULA_CFG_CMD; in cfgCmdPfUnbind()
[all …]
DWakeupControllerTest.cpp95 } msg = {}; in TEST_F() local
97 msg.uidAttr.nla_type = NFULA_UID; in TEST_F()
98 msg.uidAttr.nla_len = sizeof(msg.uidAttr) + sizeof(msg.uid); in TEST_F()
99 msg.uid = htobe32(kUid); in TEST_F()
101 msg.gidAttr.nla_type = NFULA_GID; in TEST_F()
102 msg.gidAttr.nla_len = sizeof(msg.gidAttr) + sizeof(msg.gid); in TEST_F()
103 msg.gid = htobe32(kGid); in TEST_F()
105 msg.tsAttr.nla_type = NFULA_TIMESTAMP; in TEST_F()
106 msg.tsAttr.nla_len = sizeof(msg.tsAttr) + sizeof(msg.ts); in TEST_F()
107 msg.ts.tv_sec = htobe32(kTsNs / kNsPerS); in TEST_F()
[all …]
DSockDiagTest.cpp38 static bool isLoopbackSocket(const inet_diag_msg *msg) { in isLoopbackSocket() argument
39 return SockDiag::isLoopbackSocket(msg); in isLoopbackSocket()
108 auto checkIPv4Dump = [&] (uint8_t /* proto */, const inet_diag_msg *msg) { in TEST_F() argument
109 EXPECT_EQ(htonl(INADDR_LOOPBACK), msg->id.idiag_src[0]); in TEST_F()
111 seenclient46 |= (msg->id.idiag_sport == client46.sin6_port); in TEST_F()
112 inet_ntop(AF_INET, msg->id.idiag_src, src, sizeof(src)); in TEST_F()
113 inet_ntop(AF_INET, msg->id.idiag_src, dst, sizeof(dst)); in TEST_F()
115 src, htons(msg->id.idiag_sport), in TEST_F()
116 dst, htons(msg->id.idiag_dport), in TEST_F()
117 tcpStateName(msg->idiag_state)); in TEST_F()
[all …]
/system/core/trusty/storage/lib/
Dstorage.c57 static ssize_t check_response(struct storage_msg *msg, ssize_t res) in check_response() argument
62 if ((size_t)res < sizeof(*msg)) { in check_response()
63 ALOGE("invalid msg length (%zd < %zd)\n", res, sizeof(*msg)); in check_response()
67 ALOGV("cmd 0x%x: server returned %u\n", msg->cmd, msg->result); in check_response()
69 switch(msg->result) { in check_response()
71 return res - sizeof(*msg); in check_response()
83 ALOGE("cmd 0x%x: is unhandles command\n", msg->cmd); in check_response()
93 ALOGE("cmd 0x%x: internal server error\n", msg->cmd); in check_response()
98 msg->cmd, msg->result); in check_response()
146 struct storage_msg msg = { .cmd = STORAGE_FILE_OPEN, .flags = _to_msg_flags(opflags)}; in storage_open_file() local
[all …]
/system/keymaster/
Dandroid_keymaster_messages_test.cpp68 EmptyKeymasterResponse msg(ver); in TEST() local
69 msg.error = KM_ERROR_OK; in TEST()
71 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 5)); in TEST()
77 EmptyKeymasterResponse msg(ver); in TEST() local
78 msg.error = KM_ERROR_MEMORY_ALLOCATION_FAILED; in TEST()
80 UniquePtr<EmptyKeymasterResponse> deserialized(round_trip(ver, msg, 4)); in TEST()
185 GetKeyCharacteristicsResponse msg(ver); in TEST() local
186 msg.error = KM_ERROR_OK; in TEST()
187 msg.enforced.Reinitialize(params, array_length(params)); in TEST()
188 msg.unenforced.Reinitialize(params, array_length(params)); in TEST()
[all …]
/system/core/adb/
Dfile_sync_service.cpp107 syncmsg msg = {}; in do_lstat_v1() local
108 msg.stat_v1.id = ID_LSTAT_V1; in do_lstat_v1()
112 msg.stat_v1.mode = st.st_mode; in do_lstat_v1()
113 msg.stat_v1.size = st.st_size; in do_lstat_v1()
114 msg.stat_v1.time = st.st_mtime; in do_lstat_v1()
115 return WriteFdExactly(s, &msg.stat_v1, sizeof(msg.stat_v1)); in do_lstat_v1()
119 syncmsg msg = {}; in do_stat_v2() local
120 msg.stat_v2.id = id; in do_stat_v2()
132 msg.stat_v2.error = errno_to_wire(errno); in do_stat_v2()
134 msg.stat_v2.dev = st.st_dev; in do_stat_v2()
[all …]
Dtransport_usb.cpp32 static int UsbReadMessage(usb_handle* h, amessage* msg) { in UsbReadMessage() argument
36 CHECK(usb_packet_size >= sizeof(*msg)); in UsbReadMessage()
41 if (n != sizeof(*msg)) { in UsbReadMessage()
42 D("usb_read returned unexpected length %d (expected %zu)", n, sizeof(*msg)); in UsbReadMessage()
45 memcpy(msg, buffer, sizeof(*msg)); in UsbReadMessage()
52 D("UsbReadPayload(%d)", p->msg.data_length); in UsbReadPayload()
60 size_t len = p->msg.data_length; in UsbReadPayload()
70 int n = UsbReadMessage(t->usb, &p->msg); in remote_read()
75 if (static_cast<size_t>(n) != sizeof(p->msg) || !check_header(p, t)) { in remote_read()
82 if (p->msg.command != A_CNXN && p->msg.command != A_AUTH) { in remote_read()
[all …]
/system/core/init/
Duevent_listener.cpp32 static void ParseEvent(const char* msg, Uevent* uevent) { in ParseEvent() argument
43 while (*msg) { in ParseEvent()
44 if (!strncmp(msg, "ACTION=", 7)) { in ParseEvent()
45 msg += 7; in ParseEvent()
46 uevent->action = msg; in ParseEvent()
47 } else if (!strncmp(msg, "DEVPATH=", 8)) { in ParseEvent()
48 msg += 8; in ParseEvent()
49 uevent->path = msg; in ParseEvent()
50 } else if (!strncmp(msg, "SUBSYSTEM=", 10)) { in ParseEvent()
51 msg += 10; in ParseEvent()
[all …]
/system/core/trusty/storage/proxy/
Dproxy.c98 static int handle_req(struct storage_msg *msg, const void *req, size_t req_len) in handle_req() argument
102 if ((msg->flags & STORAGE_MSG_FLAG_POST_COMMIT) && in handle_req()
103 (msg->cmd != STORAGE_RPMB_SEND)) { in handle_req()
108 ALOGE("cmd 0x%x: post commit option is not implemented\n", msg->cmd); in handle_req()
109 msg->result = STORAGE_ERR_UNIMPLEMENTED; in handle_req()
110 return ipc_respond(msg, NULL, 0); in handle_req()
113 if (msg->flags & STORAGE_MSG_FLAG_PRE_COMMIT) { in handle_req()
116 msg->result = STORAGE_ERR_GENERIC; in handle_req()
117 return ipc_respond(msg, NULL, 0); in handle_req()
121 switch (msg->cmd) { in handle_req()
[all …]
Dipc.c67 ssize_t ipc_get_msg(struct storage_msg *msg, void *req_buf, size_t req_buf_len) in ipc_get_msg() argument
70 struct iovec iovs[2] = {{msg, sizeof(*msg)}, {req_buf, req_buf_len}}; in ipc_get_msg()
81 if ((size_t)rc < sizeof(*msg)) { in ipc_get_msg()
87 if (msg->size != (uint32_t)rc) { in ipc_get_msg()
89 msg->cmd, msg->size, (uint32_t)rc); in ipc_get_msg()
93 return rc - sizeof(*msg); in ipc_get_msg()
96 int ipc_respond(struct storage_msg *msg, void *out, size_t out_size) in ipc_respond() argument
99 struct iovec iovs[2] = {{msg, sizeof(*msg)}, {out, out_size}}; in ipc_respond()
103 msg->cmd |= STORAGE_RESP_BIT; in ipc_respond()
108 msg->cmd, strerror(errno)); in ipc_respond()
Dstorage.c162 int storage_file_delete(struct storage_msg *msg, in storage_file_delete() argument
171 msg->result = STORAGE_ERR_NOT_VALID; in storage_file_delete()
179 msg->result = STORAGE_ERR_NOT_VALID; in storage_file_delete()
186 msg->result = STORAGE_ERR_GENERIC; in storage_file_delete()
201 msg->result = translate_errno(rc); in storage_file_delete()
206 msg->result = STORAGE_NO_ERROR; in storage_file_delete()
211 return ipc_respond(msg, NULL, 0); in storage_file_delete()
215 int storage_file_open(struct storage_msg *msg, in storage_file_open() argument
225 msg->result = STORAGE_ERR_NOT_VALID; in storage_file_open()
233 msg->result = STORAGE_ERR_NOT_VALID; in storage_file_open()
[all …]
Dstorage.h21 int storage_file_delete(struct storage_msg *msg,
24 int storage_file_open(struct storage_msg *msg,
27 int storage_file_close(struct storage_msg *msg,
30 int storage_file_write(struct storage_msg *msg,
33 int storage_file_read(struct storage_msg *msg,
36 int storage_file_get_size(struct storage_msg *msg,
39 int storage_file_set_size(struct storage_msg *msg,
/system/core/libnetutils/
Ddhcpmsg.c24 static void *init_dhcp_msg(dhcp_msg *msg, int type, void *hwaddr, uint32_t xid) in init_dhcp_msg() argument
28 memset(msg, 0, sizeof(dhcp_msg)); in init_dhcp_msg()
30 msg->op = OP_BOOTREQUEST; in init_dhcp_msg()
31 msg->htype = HTYPE_ETHER; in init_dhcp_msg()
32 msg->hlen = 6; in init_dhcp_msg()
33 msg->hops = 0; in init_dhcp_msg()
35 msg->flags = htons(FLAGS_BROADCAST); in init_dhcp_msg()
37 msg->xid = xid; in init_dhcp_msg()
39 memcpy(msg->chaddr, hwaddr, 6); in init_dhcp_msg()
41 x = msg->options; in init_dhcp_msg()
[all …]
Ddhcpclient.c164 int decode_dhcp_msg(dhcp_msg *msg, int len, dhcp_info *info) in decode_dhcp_msg() argument
175 if (msg->options[0] != OPT_COOKIE1) return -1; in decode_dhcp_msg()
176 if (msg->options[1] != OPT_COOKIE2) return -1; in decode_dhcp_msg()
177 if (msg->options[2] != OPT_COOKIE3) return -1; in decode_dhcp_msg()
178 if (msg->options[3] != OPT_COOKIE4) return -1; in decode_dhcp_msg()
180 x = msg->options + 4; in decode_dhcp_msg()
230 info->ipaddr = msg->yiaddr; in decode_dhcp_msg()
247 void dump_dhcp_msg(dhcp_msg *msg, int len) in dump_dhcp_msg() argument
263 if (msg->op == OP_BOOTREQUEST) in dump_dhcp_msg()
265 else if (msg->op == OP_BOOTREPLY) in dump_dhcp_msg()
[all …]
/system/extras/simpleperf/
DUnixSocket_test.cpp68 Message* msg = reinterpret_cast<Message*>(read_buf.data()); in TEST() local
69 size_t aligned_len = Align(msg->len, UnixSocketMessageAlignment); in TEST()
71 msg = reinterpret_cast<Message*>(read_buf.data()); in TEST()
72 ASSERT_EQ(msg->len, msg->type + sizeof(UnixSocketMessage)); in TEST()
73 read_data.insert(read_data.end(), msg->data, msg->data + msg->type); in TEST()
86 auto receive_message_callback = [&](const UnixSocketMessage& msg) { in ClientToTestUndelayedMessage() argument
87 if (msg.len != sizeof(UnixSocketMessage)) { in ClientToTestUndelayedMessage()
92 reply_msg.type = msg.type + 1; in ClientToTestUndelayedMessage()
116 auto receive_message_callback = [&](const UnixSocketMessage& msg) { in TEST() argument
117 if (msg.len != sizeof(UnixSocketMessage) || msg.type != need_reply_type) { in TEST()
[all …]
Dinplace_sampler_lib.cpp69 bool HandleMessage(const UnixSocketMessage& msg);
70 bool ParseStartProfilingMessage(const UnixSocketMessage& msg);
97 auto read_callback = [&](const UnixSocketMessage& msg) { in Run() argument
98 return HandleMessage(msg); in Run()
109 bool SampleManager::HandleMessage(const UnixSocketMessage& msg) { in HandleMessage() argument
110 if (msg.type == START_PROFILING) { in HandleMessage()
111 if (!ParseStartProfilingMessage(msg)) { in HandleMessage()
122 if (msg.type == END_PROFILING) { in HandleMessage()
126 LOG(ERROR) << "Unexpected msg type: " << msg.type; in HandleMessage()
130 bool SampleManager::ParseStartProfilingMessage(const UnixSocketMessage& msg) { in ParseStartProfilingMessage() argument
[all …]
DInplaceSamplerClient.cpp75 auto read_callback = [&](const UnixSocketMessage& msg) { in StartPolling() argument
76 return HandleMessage(msg); in StartPolling()
118 UnixSocketMessage* msg = reinterpret_cast<UnixSocketMessage*>(data.get()); in SendStartProfilingMessage() local
119 msg->len = size; in SendStartProfilingMessage()
120 msg->type = START_PROFILING; in SendStartProfilingMessage()
121 strcpy(msg->data, options.c_str()); in SendStartProfilingMessage()
122 return conn_->SendMessage(*msg, true); in SendStartProfilingMessage()
127 auto read_callback = [&](const UnixSocketMessage& msg) { in StopProfiling() argument
128 return HandleMessage(msg); in StopProfiling()
134 UnixSocketMessage msg; in StopProfiling() local
[all …]
/system/bt/stack/avdt/
Davdt_ccb_act.cc149 p_data->msg.discover_rsp.p_sep_info = sep_info; in avdt_ccb_hdl_discover_cmd()
150 p_data->msg.discover_rsp.num_seps = 0; in avdt_ccb_hdl_discover_cmd()
156 sep_info[p_data->msg.discover_rsp.num_seps].in_use = p_scb->in_use; in avdt_ccb_hdl_discover_cmd()
157 sep_info[p_data->msg.discover_rsp.num_seps].seid = i + 1; in avdt_ccb_hdl_discover_cmd()
158 sep_info[p_data->msg.discover_rsp.num_seps].media_type = in avdt_ccb_hdl_discover_cmd()
160 sep_info[p_data->msg.discover_rsp.num_seps].tsep = p_scb->cs.tsep; in avdt_ccb_hdl_discover_cmd()
162 p_data->msg.discover_rsp.num_seps++; in avdt_ccb_hdl_discover_cmd()
188 (tAVDT_CTRL*)(&p_data->msg.discover_rsp)); in avdt_ccb_hdl_discover_rsp()
208 p_scb = avdt_scb_by_hdl(p_data->msg.single.seid); in avdt_ccb_hdl_getcap_cmd()
210 p_data->msg.svccap.p_cfg = &p_scb->cs.cfg; in avdt_ccb_hdl_getcap_cmd()
[all …]
/system/gatekeeper/tests/
Dgatekeeper_messages_test.cpp54 EnrollRequest msg(USER_ID, NULL, provided_password, NULL); in TEST() local
55 SizedBuffer serialized_msg(msg.GetSerializedSize()); in TEST()
56 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length); in TEST()
68 …ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), passw… in TEST()
83 EnrollRequest msg(USER_ID, &handle, provided_password, &enrolled); in TEST() local
84 SizedBuffer serialized_msg(msg.GetSerializedSize()); in TEST()
85 msg.Serialize(serialized_msg.buffer.get(), serialized_msg.buffer.get() + serialized_msg.length); in TEST()
97 …ASSERT_EQ(0, memcmp(msg.provided_password.buffer.get(), deserialized_password->buffer.get(), passw… in TEST()
114 EnrollRequest msg(USER_ID, password_handle, provided_password, enrolled_password); in TEST() local
115 SizedBuffer serialized_msg(msg.GetSerializedSize()); in TEST()
[all …]
/system/extras/tests/uevents/
Duevents.c25 char msg[UEVENT_MSG_LEN+2]; in main() local
33 while ((n = uevent_kernel_multicast_recv(device_fd, msg, UEVENT_MSG_LEN)) > 0) { in main()
34 msg[n] = '\0'; in main()
35 msg[n+1] = '\0'; in main()
38 if (msg[i] == '\0') in main()
39 msg[i] = ' '; in main()
41 printf("%s\n", msg); in main()
/system/core/libunwindstack/
DArmExidx.cpp198 std::string msg = "pop {"; in DecodePrefix_10_00() local
202 msg += ", "; in DecodePrefix_10_00()
204 msg += android::base::StringPrintf("r%zu", i + 4); in DecodePrefix_10_00()
208 log(log_indent_, "%s}", msg.c_str()); in DecodePrefix_10_00()
269 std::string msg = "pop {r4"; in DecodePrefix_10_10() local
272 msg += android::base::StringPrintf("-r%d", 4 + end_reg); in DecodePrefix_10_10()
275 log(log_indent_, "%s, r14}", msg.c_str()); in DecodePrefix_10_10()
277 log(log_indent_, "%s}", msg.c_str()); in DecodePrefix_10_10()
340 std::string msg = "pop {"; in DecodePrefix_10_11_0001() local
344 msg += ", "; in DecodePrefix_10_11_0001()
[all …]
/system/core/debuggerd/
Dsignal_sender.cpp91 signal_message msg; in start_signal_sender() local
92 int rc = TEMP_FAILURE_RETRY(read(sfd[0], &msg, sizeof(msg))); in start_signal_sender()
96 } else if (rc != sizeof(msg)) { in start_signal_sender()
103 if (msg.tid > 0) { in start_signal_sender()
104 if (syscall(SYS_tgkill, msg.pid, msg.tid, msg.signal) != 0) { in start_signal_sender()
108 if (kill(msg.pid, msg.signal) != 0) { in start_signal_sender()
158 signal_message msg = {.pid = pid, .tid = tid, .signal = signal }; in send_signal() local
159 if (TEMP_FAILURE_RETRY(write(signal_fd, &msg, sizeof(msg))) < 0) { in send_signal()
/system/core/libsysutils/src/
DFrameworkClient.cpp32 int FrameworkClient::sendMsg(const char *msg) { in sendMsg() argument
40 ret = TEMP_FAILURE_RETRY(write(mSocket, msg, strlen(msg) +1)); in sendMsg()
42 SLOGW("Unable to send msg '%s' (%s)", msg, strerror(errno)); in sendMsg()
48 int FrameworkClient::sendMsg(const char *msg, const char *data) { in sendMsg() argument
49 size_t bufflen = strlen(msg) + strlen(data) + 1; in sendMsg()
55 snprintf(buffer, bufflen, "%s%s", msg, data); in sendMsg()
/system/core/trusty/gatekeeper/
Dtrusty_gatekeeper_ipc.c53 struct gatekeeper_message *msg = malloc(msg_size); in trusty_gatekeeper_call() local
54 msg->cmd = cmd; in trusty_gatekeeper_call()
55 memcpy(msg->payload, in, in_size); in trusty_gatekeeper_call()
57 ssize_t rc = write(handle_, msg, msg_size); in trusty_gatekeeper_call()
58 free(msg); in trusty_gatekeeper_call()
78 msg = (struct gatekeeper_message *) out; in trusty_gatekeeper_call()
80 if ((cmd | GK_RESP_BIT) != msg->cmd) { in trusty_gatekeeper_call()
81 ALOGE("invalid command (%d)\n", msg->cmd); in trusty_gatekeeper_call()

123456789