/external/libselinux/src/ |
check_context.c | 22 snprintf(path, sizeof path, "%s/context", selinux_mnt);
|
deny_unknown.c | 23 snprintf(path, sizeof(path), "%s/deny_unknown", selinux_mnt);
|
disable.c | 23 snprintf(path, sizeof path, "%s/disable", selinux_mnt);
|
getenforce.c | 23 snprintf(path, sizeof path, "%s/enforce", selinux_mnt);
|
/external/linux-tools-perf/perf-3.12.0/tools/perf/tests/ |
pmu.c | 89 snprintf(dir, PATH_MAX, "/tmp/perf-pmu-test-format-XXXXXX"); 98 snprintf(name, PATH_MAX, "%s/%s", dir, format->name); 117 snprintf(buf, PATH_MAX, "rm -f %s/*\n", dir); 121 snprintf(buf, PATH_MAX, "rmdir %s\n", dir);
|
/external/lldb/tools/debugserver/source/ |
DNBDataRef.cpp | 348 str_offset += snprintf(str, sizeof(str), "0x%8.8llx:", (uint64_t)(offsetBase + (offset - startOffset))); 354 // The last snprintf consumed our string buffer, we will need to dump this out 362 // the snprintf call each time through this loop 366 case TypeUInt8: str_offset += snprintf(str + str_offset, sizeof(str) - str_offset, format ? format : " %2.2x", Get8(&offset)); break; 370 str_offset += snprintf(str + str_offset, sizeof(str) - str_offset, format ? format : " %c", isprint(ch) ? ch : ' '); 373 case TypeUInt16: str_offset += snprintf(str + str_offset, sizeof(str) - str_offset, format ? format : " %4.4x", Get16(&offset)); break; 374 case TypeUInt32: str_offset += snprintf(str + str_offset, sizeof(str) - str_offset, format ? format : " %8.8x", Get32(&offset)); break; 375 case TypeUInt64: str_offset += snprintf(str + str_offset, sizeof(str) - str_offset, format ? format : " %16.16llx", Get64(&offset)); break; 376 case TypePointer: str_offset += snprintf(str + str_offset, sizeof(str) - str_offset, format ? format : " 0x%llx", GetPointer(&offset)); break; 377 case TypeULEB128: str_offset += snprintf(str + str_offset, sizeof(str) - str_offset, format ? format : " 0x%llx", Get_ULEB128(&offset) (…) [all...] |
/external/qemu/android/ |
hw-lcd.c | 42 snprintf(temp, sizeof temp, "%d", density);
|
/external/qemu/distrib/libselinux/src/ |
check_context.c | 22 snprintf(path, sizeof path, "%s/context", selinux_mnt);
|
deny_unknown.c | 23 snprintf(path, sizeof(path), "%s/deny_unknown", selinux_mnt);
|
disable.c | 23 snprintf(path, sizeof path, "%s/disable", selinux_mnt);
|
getenforce.c | 23 snprintf(path, sizeof path, "%s/enforce", selinux_mnt);
|
/external/tcpdump/ |
print-sunrpc.c | 99 snprintf(srcid, sizeof(srcid), "0x%x", 103 snprintf(srcid, sizeof(srcid), "0x%x", 105 snprintf(dstid, sizeof(dstid), "0x%x", SUNRPC_PMAPPORT); 166 (void) snprintf(buf, sizeof(buf), "#%u", prog);
|
/hardware/libhardware/ |
hardware.c | 132 snprintf(path, path_len, "%s/%s.%s.so", 137 snprintf(path, path_len, "%s/%s.%s.so", 155 snprintf(name, PATH_MAX, "%s.%s", class_id, inst); 167 snprintf(prop_name, sizeof(prop_name), "ro.hardware.%s", name);
|
/hardware/qcom/gps/utils/ |
loc_log.cpp | 144 snprintf(ret, sizeof(ret), " %s with SSC", 148 snprintf(ret, sizeof(ret), " %s without SSC", 179 snprintf(time_string, buf_size, "%s.%03d", hms_string, (int) (now.tv_usec / 1000)); 237 snprintf(str, buf_size, "%02d:%02d:%02d.%06ld", hh, mm, ss, tv.tv_usec);
|
/system/core/libcutils/ |
qtaguid.c | 107 snprintf(lineBuf, sizeof(lineBuf), "t %d %" PRIu64 " %d", sockfd, kTag, uid); 126 snprintf(lineBuf, sizeof(lineBuf), "u %d", sockfd); 141 snprintf(lineBuf, sizeof(lineBuf), "s %d %d", counterSetNum, uid); 155 snprintf(lineBuf, sizeof(lineBuf), "d %" PRIu64 " %d", kTag, uid);
|
/system/core/liblog/tests/ |
benchmark_main.cpp | 63 return snprintf(str, len, "%uGi", arg/(1<<30)); 65 return snprintf(str, len, "%uMi", arg/(1<<20)); 67 return snprintf(str, len, "%uKi", arg/(1<<10)); 69 return snprintf(str, len, "%uG", arg/1000000000); 71 return snprintf(str, len, "%uM", arg/1000000); 73 return snprintf(str, len, "%uK", arg/1000); 75 return snprintf(str, len, "%u", arg); 145 snprintf(throughput, sizeof(throughput), " %8.2f MiB/s", mib_processed/seconds); 149 snprintf(full_name, sizeof(full_name), "%s%s%s", b->Name(),
|
/external/libpcap/ |
pcap-win32.c | 135 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "PacketGetStats error: %s", pcap_win32strerror()); 148 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "driver error: not enough memory to allocate the kernel buffer"); 160 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "driver error: working mode not recognized"); 173 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "driver error: unable to set the requested mintocopy size"); 210 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "read error: PacketReceivePacket failed"); 292 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "read error: PacketReceivePacket failed"); 441 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "send error: PacketAllocatePacket failed"); 447 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "send error: PacketSendPacket failed"); 499 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "Error opening adapter: %s", pcap_win32strerror()); 506 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "Cannot determine the network type: %s", pcap_win32strerror()) [all...] |
pcap-snit.c | 138 snprintf(p->errbuf, sizeof(p->errbuf), "pcap_read: %s", 231 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "send: %s", 255 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "NIOCSCHUNK: %s", 268 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "NIOCSTIME: %s", 280 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "NIOCSFLAGS: %s", 328 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "%s: %s", dev, 335 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "I_SRDOPT: %s", 340 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "push nbuf: %s", 350 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "NIOCSCHUNK: %s", 362 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "NIOCBIND: %s: %s" [all...] |
pcap-snoop.c | 102 snprintf(p->errbuf, sizeof(p->errbuf), 157 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "send: %s", 174 snprintf(p->errbuf, sizeof(p->errbuf), 219 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "snoop socket: %s", 228 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "snoop bind: %s", 234 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "SIOCADDSNOOP: %s", 310 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, 332 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "SIOCGIFMTU: %s", 366 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "SIOCSNOOPLEN: %s", 372 snprintf(p->errbuf, PCAP_ERRBUF_SIZE, "SIOCSNOOPING: %s" [all...] |
/hardware/ti/omap4-aah/test/CameraHal/ |
camera_test_menu.cpp | [all...] |
/system/core/adb/ |
services.c | 66 snprintf(buf, sizeof(buf), "adbd is already running as root\n"); 72 snprintf(buf, sizeof(buf), "adbd cannot run as root in production builds\n"); 79 snprintf(buf, sizeof(buf), "restarting adbd as root\n"); 92 snprintf(buf, sizeof(buf), "invalid port\n"); 98 snprintf(value, sizeof(value), "%d", port); 100 snprintf(buf, sizeof(buf), "restarting in TCP mode port: %d\n", port); 110 snprintf(buf, sizeof(buf), "restarting in USB mode\n"); 123 ret = snprintf(property_val, sizeof(property_val), "reboot,%s", (char *) arg); 125 snprintf(buf, sizeof(buf), "reboot string too long. length=%d\n", ret); 132 snprintf(buf, sizeof(buf), "reboot failed: %d\n", ret) [all...] |
/external/elfutils/0.153/libcpu/ |
i386_data.h | 185 n = snprintf (tmpbuf, sizeof (tmpbuf), "0x%" PRIx16, disp); 190 n = snprintf (tmpbuf, sizeof (tmpbuf), "%s0x%" PRIx16, 194 n += snprintf (tmpbuf + n, sizeof (tmpbuf) - n, "(%%b%c,%%%ci)", 197 n += snprintf (tmpbuf + n, sizeof (tmpbuf) - n, "(%%%s)", 228 n = snprintf (tmpbuf, sizeof (tmpbuf), "(%%%s)", 246 n = snprintf (tmpbuf, sizeof (tmpbuf), "%s0x%" PRIx32 "(%%%n%s)", 265 n = snprintf (tmpbuf, sizeof (tmpbuf), "%s0x%" PRIx32 "(%%rip)", 271 n = snprintf (tmpbuf, sizeof (tmpbuf), "0x%" PRIx32, disp); 309 n = snprintf (cp, sizeof (tmpbuf), "%s0x%" PRIx32, 365 n = snprintf (cp, sizeof (tmpbuf), "0x%" PRIx64 [all...] |
/bionic/libc/bionic/ |
pty.cpp | 66 if (snprintf(buf, len, "/dev/pts/%u", pty_num) >= static_cast<int>(len)) { 90 snprintf(path, sizeof(path), "/proc/self/fd/%d", fd);
|
/external/chromium_org/sandbox/linux/suid/ |
process_util_linux.c | 38 snprintf(oom_adj, sizeof(oom_adj), "/proc/%" PRIdMAX, (intmax_t)process); 72 snprintf(buf, sizeof(buf), "%d", score);
|
/external/chromium_org/third_party/leveldatabase/src/util/ |
logging.cc | 18 snprintf(buf, sizeof(buf), "%llu", (unsigned long long) num); 29 snprintf(buf, sizeof(buf), "\\x%02x",
|