/system/core/fastboot/ |
D | bootimg_utils.cpp | 64 memcpy(hdr->magic, BOOT_MAGIC, BOOT_MAGIC_SIZE); in mkbootimg() 78 memcpy(hdr->magic + page_size, in mkbootimg() 80 memcpy(hdr->magic + page_size + kernel_actual, in mkbootimg() 82 memcpy(hdr->magic + page_size + kernel_actual + ramdisk_actual, in mkbootimg()
|
/system/extras/ext4_utils/ |
D | ext4fixup.c | 88 unsigned long long magic; in get_fs_fixup_state() local 96 len = read(fd, &magic, sizeof(magic)); in get_fs_fixup_state() 97 if (len != sizeof(magic)) { in get_fs_fixup_state() 101 switch (magic) { in get_fs_fixup_state() 119 unsigned long long magic; in set_fs_fixup_state() local 130 magic = MAGIC_STATE_MARKING_INUMS; in set_fs_fixup_state() 133 magic = MAGIC_STATE_UPDATING_INUMS; in set_fs_fixup_state() 136 magic = MAGIC_STATE_UPDATING_SB; in set_fs_fixup_state() 140 magic = 0ll; in set_fs_fixup_state() 145 len = write(fd, &magic, sizeof(magic)); in set_fs_fixup_state() [all …]
|
/system/core/libsparse/ |
D | simg_dump.py | 58 magic = header[0] 68 if magic != 0xED26FF3A: 70 % (me, path, magic))
|
D | sparse_format.h | 22 __le32 magic; /* 0xed26ff3a */ member
|
D | sparse_read.c | 302 if (sparse_header.magic != SPARSE_HEADER_MAGIC) { in sparse_file_read_sparse() 432 if (sparse_header.magic != SPARSE_HEADER_MAGIC) { in sparse_file_import()
|
/system/extras/perfprofd/quipper/kernel-headers/tools/perf/util/ |
D | header.h | 63 u64 magic; member 74 u64 magic; member
|
/system/extras/perfprofd/quipper/original-kernel-headers/tools/perf/util/ |
D | header.h | 48 u64 magic; member 59 u64 magic; member 152 bool is_perf_magic(u64 magic);
|
/system/vold/ |
D | Asec.h | 22 unsigned int magic; member
|
D | Ext4Crypt.cpp | 54 const char* magic = "magic"; variable 77 bool success = props.Set<int>(tag::magic, crypt_ftr.magic) in put_crypt_ftr_and_key() 109 crypt_ftr.magic = props.Get<int>(tag::magic); in get_crypt_ftr_and_key()
|
D | cryptfs.h | 89 __le32 magic; /* See above */ member
|
D | VolumeManager.cpp | 794 sb.magic = ASEC_SB_MAGIC; in createAsec() 1045 SLOGD("Container sb magic/ver (%.8x/%.2x)", sb.magic, sb.ver); in resizeAsec() 1047 if (sb.magic != ASEC_SB_MAGIC || sb.ver != ASEC_SB_VER) { in resizeAsec() 1048 SLOGE("Bad container magic/version (%.8x/%.2x)", sb.magic, sb.ver); in resizeAsec() 1682 SLOGD("Container sb magic/ver (%.8x/%.2x)", sb.magic, sb.ver); in mountAsec() 1684 if (sb.magic != ASEC_SB_MAGIC || sb.ver != ASEC_SB_VER) { in mountAsec() 1685 SLOGE("Bad container magic/version (%.8x/%.2x)", sb.magic, sb.ver); in mountAsec()
|
/system/core/fs_mgr/ |
D | fs_mgr_verity.c | 523 uint32_t magic; in metadata_find() local 539 fread(&magic, sizeof(magic), 1, fp) != 1) { in metadata_find() 544 if (magic != METADATA_MAGIC) { in metadata_find() 545 magic = METADATA_MAGIC; in metadata_find() 548 fwrite(&magic, sizeof(magic), 1, fp) != 1) { in metadata_find() 553 rc = metadata_add(fp, start + sizeof(magic), stag, slength, offset); in metadata_find() 561 start += sizeof(magic); in metadata_find()
|
/system/extras/verity/ |
D | VerityVerifier.java | 163 int magic = fromle(img.readShort()); in getMetadataPosition() local 165 if (magic != EXT4_SB_MAGIC) { in getMetadataPosition() 270 int magic = fromle(img.readInt()); in readVerityData() local 272 if (magic != VERITY_MAGIC) { in readVerityData()
|
/system/core/mkbootimg/ |
D | bootimg.h | 33 uint8_t magic[BOOT_MAGIC_SIZE]; member
|
/system/extras/simpleperf/ |
D | record_file_format.h | 69 char magic[8]; member
|
D | cmd_dumprecord.cpp | 82 printf("%c", header->magic[i]); in DumpFileHeader()
|
/system/core/include/system/ |
D | window.h | 76 int magic; member 92 common.magic = ANDROID_NATIVE_BUFFER_MAGIC; in ANativeWindowBuffer() 393 common.magic = ANDROID_NATIVE_WINDOW_MAGIC; in ANativeWindow()
|
/system/core/gpttool/ |
D | gpttool.c | 46 u8 magic[8]; member 305 memcpy(hdr->magic, EFI_MAGIC, sizeof(hdr->magic)); in main()
|
/system/core/include/private/ |
D | android_logger.h | 31 uint8_t magic; member
|
/system/core/adb/ |
D | usb_linux_client.cpp | 69 __le32 magic; member 149 .magic = cpu_to_le32(FUNCTIONFS_STRINGS_MAGIC), 280 v2_descriptor.header.magic = cpu_to_le32(FUNCTIONFS_DESCRIPTORS_MAGIC_V2); in init_functionfs() 298 v1_descriptor.header.magic = cpu_to_le32(FUNCTIONFS_DESCRIPTORS_MAGIC); in init_functionfs()
|
D | transport.cpp | 209 p->msg.magic = p->msg.command ^ 0xffffffff; in send_packet() 257 p->msg.magic = A_SYNC ^ 0xffffffff; in output_thread() 288 p->msg.magic = A_SYNC ^ 0xffffffff; in output_thread() 1064 if(p->msg.magic != (p->msg.command ^ 0xffffffff)) { in check_header()
|
/system/bt/gki/common/ |
D | gki_buffer.c | 54 UINT32 *magic; in gki_init_free_queue() local 85 magic = (UINT32 *)((UINT8 *)hdr + BUFFER_HDR_SIZE + tempsize); in gki_init_free_queue() 86 *magic = MAGIC_NO; in gki_init_free_queue()
|
/system/core/liblog/ |
D | log_read.c | 654 &buf.p.magic + preread_count, in android_logger_list_read_pstore() 664 if ((buf.p.magic != LOGGER_MAGIC) in android_logger_list_read_pstore() 670 memmove(&buf.p.magic, &buf.p.magic + 1, --preread_count); in android_logger_list_read_pstore() 671 } while (preread_count && (buf.p.magic != LOGGER_MAGIC)); in android_logger_list_read_pstore()
|
/system/core/libutils/ |
D | README | 238 idmap-magic constant spells "idmp" in ASCII. Offsets are given relative 242 header := idmap-magic <crc32-original-pkg> <crc32-overlay-pkg> 243 idmap-magic := <0x706d6469> 275 0x706d6469 # magic: all idmap files begin with this constant
|
/system/extras/f2fs_utils/ |
D | f2fs_sparseblock.c | 40 D_DISP_u32(sb, magic); in dbg_print_raw_sb_info() 190 if (le32_to_cpu(sb->magic) != F2FS_SUPER_MAGIC) { in read_f2fs_sb() 192 le32_to_cpu(sb->magic), F2FS_SUPER_MAGIC); in read_f2fs_sb()
|