Lines Matching refs:pathBuffer
1426 KPath pathBuffer;
1428 pathBuffer.LockBuffer(), pathBuffer.BufferSize()) != B_OK)
1431 pathBuffer.UnlockBuffer();
1432 pathBuffer.Append("kernel");
1433 pathBuffer.Append(prefix);
1436 status_t scanStatus = _ScanDirectory(pathBuffer.LockBuffer(), prefix,
1439 pathBuffer.UnlockBuffer();
1570 KPath pathBuffer;
1575 if (pathBuffer.InitCheck() != B_OK
1577 pathBuffer.LockBuffer(), pathBuffer.BufferSize()) != B_OK)
1580 pathBuffer.UnlockBuffer();
1581 path = pathBuffer.Path();
1893 KPath pathBuffer;
1901 pathBuffer.LockBuffer(), pathBuffer.BufferSize())
1903 pathBuffer.UnlockBuffer();
1907 pathBuffer.UnlockBuffer();
1913 if (pathBuffer.Append("kernel/boot") != B_OK
1914 || pathBuffer.Append(image->path) != B_OK
1915 || pathBuffer.Normalize(true) != B_OK
1916 || lstat(pathBuffer.Path(), &st) != 0) {
1926 if (pathBuffer.SetPath(image->path) == B_OK
1927 && pathBuffer.Normalize(true) == B_OK
1928 && lstat(pathBuffer.Path(), &st) == 0) {
1935 "\"%s\"\n", image, image->path, pathBuffer.Path()));
1943 size_t pathLen = pathBuffer.Length();
1944 image->path = (char*)realloc(pathBuffer.DetachBuffer(),
2019 KPath pathBuffer;
2021 pathBuffer.LockBuffer(), pathBuffer.BufferSize()) != B_OK)
2024 pathBuffer.UnlockBuffer();
2025 pathBuffer.Append("kernel");
2028 char* path = strdup(pathBuffer.Path());