/tools/testing/selftests/proc/ |
D | proc-self-syscall.c | 33 char buf2[64]; in main() local 46 (long)SYS_read, (long)fd, (long)buf2, (long)sizeof(buf2)); in main() 48 memset(buf2, 0, sizeof(buf2)); in main() 49 rv = sys_read(fd, buf2, sizeof(buf2)); in main() 54 if (strncmp(buf1, buf2, strlen(buf1)) != 0) in main()
|
D | self.c | 26 char buf1[64], buf2[64]; in main() local 33 rv = readlink("/proc/self", buf2, sizeof(buf2)); in main() 35 buf2[rv] = '\0'; in main() 36 assert(streq(buf1, buf2)); in main()
|
D | thread-self.c | 29 char buf1[64], buf2[64]; in f() local 37 rv = readlink("/proc/thread-self", buf2, sizeof(buf2)); in f() 39 buf2[rv] = '\0'; in f() 40 assert(streq(buf1, buf2)); in f()
|
/tools/perf/tests/ |
D | is_printable_array.c | 11 char buf2[] = { 'k', 'r', 'a', 'v', 4, 0 }; in test__is_printable_array() local 23 { buf2, sizeof(buf2), 0 }, in test__is_printable_array()
|
D | code-reading.c | 233 unsigned char buf2[BUFSZ] = {0}; in read_object_code() local 324 ret = read_via_objdump(objdump_name, objdump_addr, buf2, len); in read_object_code() 359 if (memcmp(buf1, buf2, len)) { in read_object_code() 364 dump_buf(buf2, len); in read_object_code()
|
/tools/power/acpi/tools/ec/ |
D | ec_access.c | 128 char buf2[EC_SPACE_SIZE]; in dump_ec() local 154 bytes_read = read(fd, buf2, EC_SPACE_SIZE); in dump_ec() 167 if (buf[byte_off] == buf2[byte_off]) in dump_ec() 168 printf(" %.2x ", (uint8_t)buf2[byte_off]); in dump_ec() 170 printf("*%.2x ", (uint8_t)buf2[byte_off]); in dump_ec()
|
/tools/testing/selftests/net/mptcp/ |
D | mptcp_inq.c | 238 char buf[4096], buf2[4096]; in connect_one_server() local 254 ret = read(unixfd, buf2, 4); in connect_one_server() 257 assert(strncmp(buf2, "xmit", 4) == 0); in connect_one_server() 269 ret = read(unixfd, buf2, 4); in connect_one_server() 270 assert(strncmp(buf2, "huge", 4) == 0); in connect_one_server() 297 ret = read(unixfd, buf2, 4); in connect_one_server() 299 assert(strncmp(buf2, "shut", 4) == 0); in connect_one_server()
|
D | mptcp_sockopt.c | 562 char buf[4096], buf2[4096]; in connect_one_server() local 585 ret = read(pipefd, buf2, 4); in connect_one_server() 589 assert(strncmp(buf2, "xmit", 4) == 0); in connect_one_server() 600 ret = read(fd, buf2 + total, sizeof(buf2) - total); in connect_one_server() 614 if (memcmp(buf, buf2, len)) in connect_one_server()
|
/tools/perf/util/ |
D | stream.c | 228 char buf1[512], buf2[512], cbuf1[256], cbuf2[256]; in print_callchain_pair() local 239 scnprintf(buf2, sizeof(buf2), "cycles: %ld, hits: %.2f%%", in print_callchain_pair() 242 printf("%35s\t%35s\n", buf1, buf2); in print_callchain_pair()
|
/tools/testing/vsock/ |
D | vsock_test.c | 757 unsigned char *buf2; in test_seqpacket_invalid_rec_buffer_client() local 772 buf2 = malloc(buf_size); in test_seqpacket_invalid_rec_buffer_client() 773 if (!buf2) { in test_seqpacket_invalid_rec_buffer_client() 779 memset(buf2, BUF_PATTERN_2, buf_size); in test_seqpacket_invalid_rec_buffer_client() 786 if (send(fd, buf2, buf_size, 0) != buf_size) { in test_seqpacket_invalid_rec_buffer_client()
|
/tools/perf/arch/x86/util/ |
D | intel-pt.c | 1039 void *buf2, size_t offs2, size_t buf2_size) in intel_pt_compare_buffers() argument 1044 return memcmp(buf1, buf2 + offs2, compare_size); in intel_pt_compare_buffers() 1047 if (memcmp(buf1, buf2 + offs2, part_size)) in intel_pt_compare_buffers() 1052 return memcmp(buf1 + part_size, buf2, compare_size); in intel_pt_compare_buffers()
|
/tools/testing/selftests/net/ |
D | tls.c | 2074 char buf[20000], buf2[20000]; in TEST() local 2109 EXPECT_EQ(recv(cfd, buf2, sizeof(buf2), MSG_WAITALL), sizeof(buf2)); in TEST() 2111 EXPECT_EQ(memcmp(buf, buf2, sizeof(buf)), 0); in TEST()
|