/external/ltp/testcases/kernel/mem/lib/ |
mem.c | 116 * @retcode: expected return code of child process 123 void oom(int testcase, int lite, int retcode, int allow_sigkill) 130 if (errno == retcode) { 157 if (WEXITSTATUS(status) == retcode) { 158 tst_resm(TPASS, "victim retcode: (%d) %s", 159 retcode, strerror(retcode)); 162 "retcode: %d, expected: %d", 163 WEXITSTATUS(status), retcode); 215 void testoom(int mempolicy, int lite, int retcode, int allow_sigkill [all...] |
/external/mesa3d/src/glx/ |
glxhash.c | 380 int retcode = __glxHashLookup(table, key, &retval); local 382 switch (retcode) { 398 printf("Bad retcode = %d: key = %lu, expected = %lu, returned = %lu\n", 399 retcode, key, value, retval);
|
/external/autotest/client/site_tests/platform_CompressedSwapPerf/ |
platform_CompressedSwapPerf.py | 342 retcode = hogs[selection].poll() 345 if retcode is None: 391 retcode = hog.poll() 392 if retcode is None:
|
/external/skia/infra/bots/recipe_modules/perf/ |
example.py | 194 '/sdcard/revenge_of_the_skiabot/resources', retcode=1)
|
/external/syslinux/core/lwip/src/netif/ppp/ |
pap.c | 394 u_char retcode; local 442 retcode = check_passwd(u->us_unit, ruser, ruserlen, rpasswd, rpasswdlen, &msg, &msglen); 443 /* lwip: currently retcode is always UPAP_AUTHACK */ 446 upap_sresp(u, retcode, id, msg, msglen); 448 if (retcode == UPAP_AUTHACK) {
|
/external/valgrind/drd/tests/ |
tsan_thread_wrappers_pthread.h | 238 int retcode = 0; local 243 while (cond.Eval() == false && retcode == 0) { 244 retcode = pthread_cond_timedwait(&cv_, &mu_, &timeout); 246 if(retcode == 0) {
|
/external/skia/infra/bots/recipes/ |
swarm_ct_skps.py | 430 api.step_data('ct-dm-3', retcode=1) + 447 api.step_data('ct-dm-1', retcode=1) + 448 api.step_data('ct-dm-3', retcode=1) +
|
swarm_RecreateSKPs.py | 182 api.step_data('Upload SKPs', retcode=1)
|
/external/syslinux/core/fs/pxe/ |
pxe.c | 642 uint16_t *retcode; 644 retcode = GET_PTR(*(far_ptr_t *)((char *)GET_PTR(InitStack) + 44)); 647 if (*retcode != 0x18cd) {
|
/external/curl/lib/vtls/ |
polarssl.c | 560 CURLcode retcode = CURLE_OK; local 588 retcode = Curl_ssl_addsessionid(conn, our_ssl_sessionid, 0); 590 if(retcode) { 593 return retcode;
|
/external/valgrind/coregrind/ |
pub_core_threadstate.h | 433 const HChar* VG_(name_of_VgSchedReturnCode) ( VgSchedReturnCode retcode );
|
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.2/Modules/ |
_ssl.c | 591 int retcode;
local 616 retcode = PyList_Append(dn, rdnt);
618 if (retcode < 0)
640 retcode = PyList_Append(rdn, attr);
642 if (retcode < 0)
651 retcode = PyList_Append(dn, rdnt);
653 if (retcode < 0)
[all...] |
/external/dnsmasq/src/ |
dnsmasq.c | 993 int retcode = 0; local 1017 retcode = -1; 1024 retcode = -1; 1028 retcode = -1; 1033 return retcode; [all...] |
/system/update_engine/ |
libcurl_http_fetcher.cc | 405 CURLMcode retcode = CURLM_CALL_MULTI_PERFORM; local 409 while (CURLM_CALL_MULTI_PERFORM == retcode) { 410 retcode = curl_multi_perform(curl_multi_handle_, &running_handles);
|
/prebuilts/gdb/darwin-x86/lib/python2.7/ |
subprocess.py | 118 retcode = call(["ls", "-l"]) 261 retcode = call("mycmd" + " myarg", shell=True) 262 if retcode < 0: 263 print >>sys.stderr, "Child was terminated by signal", -retcode 265 print >>sys.stderr, "Child returned", retcode 281 retcode = os.spawnlp(os.P_WAIT, "/bin/mycmd", "mycmd", "myarg") 283 retcode = call(["/bin/mycmd", "myarg"]) 522 retcode = call(["ls", "-l"]) 537 retcode = call(*popenargs, **kwargs) 538 if retcode [all...] |
/prebuilts/gdb/linux-x86/lib/python2.7/ |
subprocess.py | 118 retcode = call(["ls", "-l"]) 261 retcode = call("mycmd" + " myarg", shell=True) 262 if retcode < 0: 263 print >>sys.stderr, "Child was terminated by signal", -retcode 265 print >>sys.stderr, "Child returned", retcode 281 retcode = os.spawnlp(os.P_WAIT, "/bin/mycmd", "mycmd", "myarg") 283 retcode = call(["/bin/mycmd", "myarg"]) 522 retcode = call(["ls", "-l"]) 537 retcode = call(*popenargs, **kwargs) 538 if retcode [all...] |
/prebuilts/python/darwin-x86/2.7.5/lib/python2.7/ |
subprocess.py | 118 retcode = call(["ls", "-l"]) 261 retcode = call("mycmd" + " myarg", shell=True) 262 if retcode < 0: 263 print >>sys.stderr, "Child was terminated by signal", -retcode 265 print >>sys.stderr, "Child returned", retcode 281 retcode = os.spawnlp(os.P_WAIT, "/bin/mycmd", "mycmd", "myarg") 283 retcode = call(["/bin/mycmd", "myarg"]) 522 retcode = call(["ls", "-l"]) 537 retcode = call(*popenargs, **kwargs) 538 if retcode [all...] |
/prebuilts/python/linux-x86/2.7.5/lib/python2.7/ |
subprocess.py | 118 retcode = call(["ls", "-l"]) 261 retcode = call("mycmd" + " myarg", shell=True) 262 if retcode < 0: 263 print >>sys.stderr, "Child was terminated by signal", -retcode 265 print >>sys.stderr, "Child returned", retcode 281 retcode = os.spawnlp(os.P_WAIT, "/bin/mycmd", "mycmd", "myarg") 283 retcode = call(["/bin/mycmd", "myarg"]) 522 retcode = call(["ls", "-l"]) 537 retcode = call(*popenargs, **kwargs) 538 if retcode [all...] |
/external/libvpx/libvpx/vp9/decoder/ |
vp9_decoder.c | 274 int retcode = 0; local 408 return retcode;
|
/external/valgrind/coregrind/m_sigframe/ |
sigframe-arm64-linux.c | 71 unsigned long retcode[2]; member in struct:sigframe
|
sigframe-arm-linux.c | 74 unsigned long retcode[2]; member in struct:sigframe
|
/external/antlr/antlr-3.4/runtime/C/src/ |
antlr3baserecognizer.c | 554 ANTLR3_BOOLEAN retcode; local 613 retcode = ANTLR3_TRUE; 617 retcode = ANTLR3_FALSE; 629 return retcode; [all...] |
/external/llvm/utils/ |
llvm-compilers-check | 309 retcode = proc.wait() 311 return retcode
|
/external/chromium-trace/catapult/telemetry/third_party/web-page-replay/ |
platformsettings.py | 244 retcode = process.poll() 245 if retcode: 246 raise CalledProcessError(retcode, command_args)
|
/frameworks/compile/libbcc/gdb_plugin/ |
android-commands.py | 57 retcode = p.poll() 58 if retcode != 0: 62 e = subprocess.CalledProcessError(retcode, c)
|