Home
last modified time | relevance | path

Searched refs:To (Results 1 – 25 of 159) sorted by relevance

1234567

/system/extras/boottime_tools/bootio/
DREADME.md4 To use bootio kernel must be compiled with this flags:
11 To use bootio make sure it's included in product config for the board.
22 To see collected logs run:
/system/linkerconfig/contents/tests/configuration/
Dsphal_test.cc33 return link.To() == "rs"; in TEST()
36 return link.To() == "vndk"; in TEST()
/system/sepolicy/private/
Dsystem_suspend.te6 # To serve ISuspendControlService.
17 # To resolve arbitrary sysfs paths from /sys/class/wakeup/* symlinks.
23 # To call BTAA registered callbacks
/system/sepolicy/prebuilts/api/31.0/private/
Dsystem_suspend.te6 # To serve ISuspendControlService.
17 # To resolve arbitrary sysfs paths from /sys/class/wakeup/* symlinks.
23 # To call BTAA registered callbacks
/system/extras/tests/mmc_tracepoints/
DREADME2 in the kernel. To turn on mmc tracing, do this:
7 To get the trace:
11 To turn it back off, do:
/system/sepolicy/prebuilts/api/30.0/private/
Dsystem_suspend.te6 # To serve ISuspendControlService.aidl.
16 # To resolve arbitrary sysfs paths from /sys/class/wakeup/* symlinks.
/system/logging/logd/
DREADME.auditd8 To enable the audit subsystem, you must add this to your
12 To enable a LSM, you must consult that LSM's documentation, the
/system/bt/doc/
Dpts_guide.md10 `persist.bluetooth.pts` to check if the PTS test mode is enabled. To enable it:
16 To disable it:
30 `conf/bt_stack.conf`. To enable a flag, uncomment the corresponding line and
/system/core/bootstat/
DREADME.md24 To record the relative time of an event during the boot phase, call `bootstat`
34 To log the persisted boot events, call `bootstat` with the `-l` option.
45 To print the set of persisted boot events, call `bootstat` with the `-p` option.
/system/chre/apps/test/pts/proto/
Dpts_chre.proto9 // (Host-To-CHRE) and others are C2H (CHRE-To-Host). One message type must be
/system/sepolicy/prebuilts/api/29.0/public/
Dsystem_suspend_server.te5 # To serve ISystemSuspend.hal.
Dfsck_untrusted.te17 # To determine if it is safe to run fsck on a filesystem, e2fsck
18 # must first determine if the filesystem is mounted. To do that,
/system/sepolicy/public/
Dsystem_suspend_server.te5 # To serve ISystemSuspend.hal.
Dsystem_suspend_internal_server.te1 # To serve ISuspendControlServiceInternal.
Dfsck_untrusted.te17 # To determine if it is safe to run fsck on a filesystem, e2fsck
18 # must first determine if the filesystem is mounted. To do that,
/system/sepolicy/prebuilts/api/31.0/public/
Dsystem_suspend_server.te5 # To serve ISystemSuspend.hal.
Dsystem_suspend_internal_server.te1 # To serve ISuspendControlServiceInternal.
Dfsck_untrusted.te17 # To determine if it is safe to run fsck on a filesystem, e2fsck
18 # must first determine if the filesystem is mounted. To do that,
/system/sepolicy/prebuilts/api/30.0/public/
Dsystem_suspend_server.te5 # To serve ISystemSuspend.hal.
Dfsck_untrusted.te17 # To determine if it is safe to run fsck on a filesystem, e2fsck
18 # must first determine if the filesystem is mounted. To do that,
/system/sepolicy/prebuilts/api/29.0/private/
Dhal_allocator_default.te7 # To talk to ashmemd
/system/netd/
D.editorconfig1 # To use this config with your editor, follow the instructions at:
/system/sepolicy/prebuilts/api/26.0/public/
Dfsck_untrusted.te17 # To determine if it is safe to run fsck on a filesystem, e2fsck
18 # must first determine if the filesystem is mounted. To do that,
/system/sepolicy/prebuilts/api/28.0/public/
Dfsck_untrusted.te17 # To determine if it is safe to run fsck on a filesystem, e2fsck
18 # must first determine if the filesystem is mounted. To do that,
/system/sepolicy/prebuilts/api/27.0/public/
Dfsck_untrusted.te17 # To determine if it is safe to run fsck on a filesystem, e2fsck
18 # must first determine if the filesystem is mounted. To do that,

1234567