/system/bt/service/doc/ |
D | IBluetoothGattClientCallback.txt | 11 * distributed under the License is distributed on an "AS IS" BASIS, 27 * handle and can be used to perform further operations on the 33 * Called for each GATT service that was discovered on the remote device. The 41 * Called for each include definition that was discovered on the remote 47 * Called for each characteristic that was discovered on the remote device. 56 * Called for each descriptor that was discovered on the remote device. The 63 * Called to mark the end of GATT service discovery on the remote device with 71 * will contain BLE_STATUS_SUCCESS (0) on success and an ATT protocol error 73 * this operation was performed on. On success, |value| will contain the 82 * will contain BLE_STATUS_SUCCESS (0) on success and an ATT protocol error [all …]
|
D | IBluetoothLowEnergy.txt | 11 * distributed under the License is distributed on an "AS IS" BASIS, 41 * |is_direct| is set, use direct connect procedure. Return true on success, 48 * Returns true on success, false otherwise. 63 * filtered using a combination of hardware and software filtering based on 64 * |filters|. Return true on success, false otherwise. 71 * |client_id|. Return true on success, false otherwise. 83 * common/bluetooth/binder for documentation on the AdvertiseData and
|
/system/core/logcat/ |
D | logcatd.rc | 11 on property:persist.logd.logpersistd.size=256 15 on property:persist.logd.logpersistd.size=* 19 on property:persist.logd.logpersistd.buffer=all 23 on property:persist.logd.logpersistd.buffer=* 27 on property:persist.logd.logpersistd=logcatd 31 on load_persist_props_action 34 on property:logd.logpersistd.enable=true && property:logd.logpersistd=logcatd 40 on property:logd.logpersistd.enable=true && property:logd.logpersistd=clear 48 on property:logd.logpersistd=stop 53 on property:logd.logpersistd.enable=false
|
/system/core/rootdir/ |
D | init.usb.rc | 6 on post-fs-data 21 # adbd on at boot in emulator 22 on property:ro.kernel.qemu=1 25 on boot 29 on property:sys.usb.config=none && property:sys.usb.configfs=0 38 on property:sys.usb.config=adb && property:sys.usb.configfs=0 48 on property:sys.usb.config=accessory && property:sys.usb.configfs=0 57 on property:sys.usb.config=accessory,adb && property:sys.usb.configfs=0 67 on property:sys.usb.config=audio_source && property:sys.usb.configfs=0 76 on property:sys.usb.config=audio_source,adb && property:sys.usb.configfs=0 [all …]
|
D | init.usb.configfs.rc | 1 on property:sys.usb.config=none && property:sys.usb.configfs=1 15 on property:init.svc.adbd=stopped 18 on property:sys.usb.config=adb && property:sys.usb.configfs=1 21 on property:sys.usb.ffs.ready=1 && property:sys.usb.config=adb && property:sys.usb.configfs=1 27 on property:sys.usb.ffs.mtp.ready=1 && property:sys.usb.config=mtp && property:sys.usb.configfs=1 33 on property:sys.usb.config=mtp,adb && property:sys.usb.configfs=1 36 on property:sys.usb.ffs.ready=1 && property:sys.usb.ffs.mtp.ready=1 && \ 44 on property:sys.usb.ffs.mtp.ready=1 && property:sys.usb.config=ptp && property:sys.usb.configfs=1 50 on property:sys.usb.config=ptp,adb && property:sys.usb.configfs=1 53 on property:sys.usb.ffs.ready=1 && property:sys.usb.ffs.mtp.ready=1 && \ [all …]
|
D | init-debug.rc | 1 on property:persist.mmc.max_read_speed=* 4 on property:persist.mmc.max_write_speed=* 7 on property:persist.mmc.cache_size=*
|
/system/netd/server/ |
D | InterfaceController.h | 36 static int setEnableIPv6(const char *interface, const int on); 38 static int setAcceptIPv6Ra(const char *interface, const int on); 39 static int setAcceptIPv6Dad(const char *interface, const int on); 41 static int setIPv6PrivacyExtensions(const char *interface, const int on); 42 static int setIPv6NdOffload(char* interface, const int on);
|
D | InterfaceController.cpp | 252 int InterfaceController::setEnableIPv6(const char *interface, const int on) { in setEnableIPv6() argument 260 const char *disable_ipv6 = on ? "0" : "1"; in setEnableIPv6() 289 int InterfaceController::setAcceptIPv6Ra(const char *interface, const int on) { in setAcceptIPv6Ra() argument 296 const char *accept_ra = on ? "2" : "0"; in setAcceptIPv6Ra() 300 int InterfaceController::setAcceptIPv6Dad(const char *interface, const int on) { in setAcceptIPv6Dad() argument 305 const char *accept_dad = on ? "1" : "0"; in setAcceptIPv6Dad() 317 int InterfaceController::setIPv6PrivacyExtensions(const char *interface, const int on) { in setIPv6PrivacyExtensions() argument 324 return writeValueToPath(ipv6_proc_path, interface, "use_tempaddr", on ? "2" : "0"); in setIPv6PrivacyExtensions() 330 int InterfaceController::setIPv6NdOffload(char* interface, const int on) { in setIPv6NdOffload() argument 338 on ? "1" : "0" in setIPv6NdOffload() [all …]
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 11 # Run fsck on vold block devices 17 # To determine if it is safe to run fsck on a filesystem, e2fsck 20 # block devices. With that information, it runs stat() on each block 22 # passed in on the command line. If there is a match, then the filesystem 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
D | fsck.te | 16 # Run fsck on certain block devices 22 # To determine if it is safe to run fsck on a filesystem, e2fsck 25 # block devices. With that information, it runs stat() on each block 27 # passed in on the command line. If there is a match, then the filesystem 40 # fsck should never be run on these block devices
|
D | update_engine_common.te | 7 # Allow read/write on system and boot partitions. 16 # Allow update_engine_common to mount on the /postinstall directory and reset the 17 # labels on the mounted filesystem to postinstall_file. 41 # read directories on /system and /vendor
|
/system/sepolicy/public/ |
D | fsck_untrusted.te | 1 # Any fsck program run on untrusted block devices 11 # Run fsck on vold block devices 17 # To determine if it is safe to run fsck on a filesystem, e2fsck 20 # block devices. With that information, it runs stat() on each block 22 # passed in on the command line. If there is a match, then the filesystem 32 # Untrusted fsck should never be run on block devices holding sensitive data
|
D | fsck.te | 16 # Run fsck on certain block devices 22 # To determine if it is safe to run fsck on a filesystem, e2fsck 25 # block devices. With that information, it runs stat() on each block 27 # passed in on the command line. If there is a match, then the filesystem 40 # fsck should never be run on these block devices
|
/system/core/bootstat/ |
D | bootstat.rc | 3 on post-fs-data 44 on post-fs-data && property:init.svc.bootanim=running && property:ro.crypto.type=block 52 # The 'on boot' event occurs once per hard boot (device power on), which 53 # switches the flag on. If the device performs a runtime restart, the flag is 54 # switched off and cannot be switched on until the device hard boots again. 56 # Enable bootstat logging on boot. 57 on boot 60 # Disable further bootstat logging on a runtime restart. A runtime restart is 62 on property:init.svc.zygote=stopping 66 on property:sys.boot_completed=1 && property:sys.logbootcomplete=1
|
/system/extras/ioshark/ |
D | README | 2 can find more documentation on IOshark at : 8 compiler runs on a Linux host. The second component (which runs on the 10 files) and executes them on the device. 19 device (on /data/local/tmp say). Explode the tarfile. 32 /vendor. Instead do reads on those files.
|
/system/core/trusty/keymaster/ |
D | Android.bp | 11 // distributed under the License is distributed on an "AS IS" BASIS, 17 // WARNING: Everything listed here will be built on ALL platforms, 20 // to only building on ARM if they include assembly. Individual makefiles 23 // trusty_keymaster is a binary used only for on-device testing. It 46 // keystore.trusty is the HAL used by keystore on Trusty devices.
|
/system/core/adb/ |
D | SERVICES.TXT | 3 to understand what's going on here. 48 be sent directly to the adbd daemon running on the device. 63 either the device or emulator connect to/running on the host. 79 running on the host. This will fail if there is none or more than one. 83 interpreted as 'any single device or emulator connected to/running on 101 to the <remote> address on a given device. 109 tcp:<port> -> TCP connection on localhost:<port> 110 local:<path> -> Unix local domain socket on <path> 114 tcp:<port> -> TCP localhost:<port> on device 115 local:<path> -> Unix local domain socket on device [all …]
|
/system/tpm/trunks/ |
D | trunksd.conf | 20 start on starting system-services 21 stop on stopping system-services
|
/system/chre/host/msm/daemon/idl/ |
D | chre_slpi.idl | 11 * distributed under the License is distributed on an "AS IS" BASIS, 18 * Defines the FastRPC interface between CHRE running on the SLPI and the host 19 * daemon running on the AP. 24 * Refer to the implementations of these functions in the CHRE code that runs on
|
/system/vold/ |
D | NetlinkManager.cpp | 54 int on = 1; in start() local 75 if (setsockopt(mSock, SOL_SOCKET, SO_PASSCRED, &on, sizeof(on)) < 0) { in start()
|
/system/update_engine/init/ |
D | update-engine.conf | 23 start on starting system-services 24 stop on stopping system-services
|
/system/tpm/tpm_manager/server/ |
D | tpm_managerd.conf | 20 start on starting system-services 21 stop on stopping system-services
|
/system/tpm/attestation/server/ |
D | attestationd.conf | 20 start on started tcsd and started boot-services 21 stop on stopping boot-services
|
/system/libhidl/transport/base/1.0/ |
D | IBase.hal | 11 * distributed under the License is distributed on an "AS IS" BASIS, 44 * Calling interfaceChain on an IChild object must yield the following: 60 * Calling interfaceDescriptor on an IChild object must yield 98 * on system property hal.instrumentation.enable. 103 * Get debug information on references on this interface. 122 * runtime type information on the object. 127 * Calling interfaceChain on an IChild object must yield the following:
|
/system/extras/tests/sdcard/ |
D | sysutil.h | 95 void setNewFairSleepers(bool on); 101 void setNormalizedSleepers(bool on);
|