Home
last modified time | relevance | path

Searched refs:on (Results 1 – 25 of 1008) sorted by relevance

12345678910>>...41

/system/core/llkd/
Dllkd.rc2 on property:ro.debuggable=*
6 on property:ro.llk.enable=true
9 on property:llk.enable=1
12 on property:llk.enable=0
15 on property:ro.khungtask.enable=true
18 on property:khungtask.enable=1
21 on property:khungtask.enable=0
25 on property:khungtask.enable=true
31 on property:khungtask.enable=false
34 on property:llk.enable=true
Dllkd-debuggable.rc1 on property:ro.debuggable=1
5 on property:ro.llk.enable=eng
8 on property:ro.khungtask.enable=eng
/system/server_configurable_flags/disaster_recovery/
Dflags_health_check.rc1 on load_persist_props_action
2 # check server configurable flags(which is based on persistent properties) related
7 on property:sys.boot_completed=1
10 on property:ro.init.updatable_crashing=1
/system/bt/service/doc/
DIBluetoothGattClientCallback.txt11 * distributed under the License is distributed on an "AS IS" BASIS,
27 * handle and can be used to perform further operations on the
33 * Called for each GATT service that was discovered on the remote device. The
41 * Called for each include definition that was discovered on the remote
47 * Called for each characteristic that was discovered on the remote device.
56 * Called for each descriptor that was discovered on the remote device. The
63 * Called to mark the end of GATT service discovery on the remote device with
71 * will contain BLE_STATUS_SUCCESS (0) on success and an ATT protocol error
73 * this operation was performed on. On success, |value| will contain the
82 * will contain BLE_STATUS_SUCCESS (0) on success and an ATT protocol error
[all …]
/system/core/logcat/
Dlogcatd.rc11 on property:persist.logd.logpersistd.size=256
15 on property:persist.logd.logpersistd.size=*
19 on property:persist.logd.logpersistd.buffer=all
23 on property:persist.logd.logpersistd.buffer=*
27 on property:persist.logd.logpersistd=logcatd
31 on load_persist_props_action
34 on property:logd.logpersistd.enable=true && property:logd.logpersistd=logcatd
40 on property:logd.logpersistd.enable=true && property:logd.logpersistd=clear
48 on property:logd.logpersistd=stop
53 on property:logd.logpersistd.enable=false
/system/core/rootdir/
Dinit.usb.configfs.rc1 on property:sys.usb.config=none && property:sys.usb.configfs=1
14 on property:init.svc.adbd=stopped
17 on property:sys.usb.config=adb && property:sys.usb.configfs=1
20 on property:sys.usb.ffs.ready=1 && property:sys.usb.config=adb && property:sys.usb.configfs=1
26 on property:sys.usb.config=mtp && property:sys.usb.configfs=1
32 on property:sys.usb.config=mtp,adb && property:sys.usb.configfs=1
35 on property:sys.usb.ffs.ready=1 && property:sys.usb.config=mtp,adb && property:sys.usb.configfs=1
42 on property:sys.usb.config=ptp && property:sys.usb.configfs=1
48 on property:sys.usb.config=ptp,adb && property:sys.usb.configfs=1
51 on property:sys.usb.ffs.ready=1 && property:sys.usb.config=ptp,adb && property:sys.usb.configfs=1
[all …]
Dinit.usb.rc6 on post-fs-data
21 on boot
25 on property:sys.usb.config=none && property:sys.usb.configfs=0
34 on property:sys.usb.config=adb && property:sys.usb.configfs=0
44 on property:sys.usb.config=accessory && property:sys.usb.configfs=0
53 on property:sys.usb.config=accessory,adb && property:sys.usb.configfs=0
63 on property:sys.usb.config=audio_source && property:sys.usb.configfs=0
72 on property:sys.usb.config=audio_source,adb && property:sys.usb.configfs=0
82 on property:sys.usb.config=accessory,audio_source && property:sys.usb.configfs=0
91 on property:sys.usb.config=accessory,audio_source,adb && property:sys.usb.configfs=0
[all …]
Dinit-debug.rc1 on property:persist.mmc.max_read_speed=*
4 on property:persist.mmc.max_write_speed=*
7 on property:persist.mmc.cache_size=*
/system/core/bootstat/
Dbootstat.rc6 on post-fs && property:ro.boot.bootreason=*
9 on post-fs-data
50 on post-fs-data && property:init.svc.bootanim=running && property:ro.crypto.type=block
58 # The 'on boot' event occurs once per hard boot (device power on), which
59 # switches the flag on. If the device performs a runtime restart, the flag is
60 # switched off and cannot be switched on until the device hard boots again.
62 # Enable bootstat logging on boot.
63 on boot
66 # Disable further bootstat logging on a runtime restart. A runtime restart is
68 on property:init.svc.zygote=stopping
[all …]
/system/sepolicy/prebuilts/api/27.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
/system/sepolicy/prebuilts/api/29.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
Dupdate_engine_common.te7 # Allow read/write on system and boot partitions.
32 # Allow update_engine_common to mount on the /postinstall directory and reset the
33 # labels on the mounted filesystem to postinstall_file.
59 # read / write on /dev/device-mapper to map / unmap devices
62 # apply / verify updates on devices mapped via device mapper
65 # read / write metadata on super device to resize partitions
68 # ioctl on super device to get block device alignment and alignment offset
71 # get physical block device to map logical partitions on device mapper
/system/sepolicy/prebuilts/api/26.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
/system/sepolicy/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
Dupdate_engine_common.te7 # Allow read/write on system and boot partitions.
32 # Allow update_engine_common to mount on the /postinstall directory and reset the
33 # labels on the mounted filesystem to postinstall_file.
59 # read / write on /dev/device-mapper to map / unmap devices
62 # apply / verify updates on devices mapped via device mapper
65 # read / write metadata on super device to resize partitions
68 # ioctl on super device to get block device alignment and alignment offset
71 # get physical block device to map logical partitions on device mapper
/system/sepolicy/prebuilts/api/28.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
/system/gsid/
Dgsid.rc6 on post-fs
10 on post-fs-data
14 on boot
/system/netd/libnetdutils/
DSocketOption.cpp31 const int on = 1; in enableSockopt() local
32 return sys.setsockopt(sock, level, optname, &on, sizeof(on)); in enableSockopt()
/system/netd/server/
DInterfaceController.h37 static int setEnableIPv6(const char* ifName, const int on);
39 static int setAcceptIPv6Ra(const char* ifName, const int on);
40 static int setAcceptIPv6Dad(const char* ifName, const int on);
42 static int setIPv6PrivacyExtensions(const char* ifName, const int on);
/system/core/adb/
DSERVICES.TXT3 to understand what's going on here.
44 be sent directly to the adbd daemon running on the device.
59 either the device or emulator connect to/running on the host.
75 running on the host. This will fail if there is none or more than one.
79 interpreted as 'any single device or emulator connected to/running on
97 to the <remote> address on a given device.
105 tcp:<port> -> TCP connection on localhost:<port>
106 local:<path> -> Unix local domain socket on <path>
110 tcp:<port> -> TCP localhost:<port> on device
111 local:<path> -> Unix local domain socket on device
[all …]
/system/sepolicy/prebuilts/api/29.0/private/
Dsu.te5 # Allow dumpstate to call su on userdebug / eng builds to collect
13 # Put the incident command into its domain so it is the same on user, userdebug and eng.
16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
/system/vold/
DNetlinkManager.cpp50 int on = 1; in start() local
71 if (setsockopt(mSock, SOL_SOCKET, SO_PASSCRED, &on, sizeof(on)) < 0) { in start()
/system/sepolicy/private/
Dsu.te5 # Allow dumpstate to call su on userdebug / eng builds to collect
13 # Put the incident command into its domain so it is the same on user, userdebug and eng.
16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
/system/sepolicy/prebuilts/api/28.0/private/
Dsu.te5 # Allow dumpstate to call su on userdebug / eng builds to collect
13 # Put the incident command into its domain so it is the same on user, userdebug and eng.
16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
/system/chre/host/msm/daemon/idl/
Dchre_slpi.idl11 * distributed under the License is distributed on an "AS IS" BASIS,
18 * Defines the FastRPC interface between CHRE running on the SLPI and the host
19 * daemon running on the AP.
24 * Refer to the implementations of these functions in the CHRE code that runs on

12345678910>>...41