Home
last modified time | relevance | path

Searched refs:on (Results 1 – 25 of 529) sorted by relevance

12345678910>>...22

/system/bt/service/doc/
DIBluetoothGattClientCallback.txt11 * distributed under the License is distributed on an "AS IS" BASIS,
27 * handle and can be used to perform further operations on the
33 * Called for each GATT service that was discovered on the remote device. The
41 * Called for each include definition that was discovered on the remote
47 * Called for each characteristic that was discovered on the remote device.
56 * Called for each descriptor that was discovered on the remote device. The
63 * Called to mark the end of GATT service discovery on the remote device with
71 * will contain BLE_STATUS_SUCCESS (0) on success and an ATT protocol error
73 * this operation was performed on. On success, |value| will contain the
82 * will contain BLE_STATUS_SUCCESS (0) on success and an ATT protocol error
[all …]
DIBluetoothLowEnergy.txt11 * distributed under the License is distributed on an "AS IS" BASIS,
41 * |is_direct| is set, use direct connect procedure. Return true on success,
48 * Returns true on success, false otherwise.
63 * filtered using a combination of hardware and software filtering based on
64 * |filters|. Return true on success, false otherwise.
71 * |client_id|. Return true on success, false otherwise.
83 * common/bluetooth/binder for documentation on the AdvertiseData and
/system/core/logcat/
Dlogcatd.rc11 on property:persist.logd.logpersistd.size=256
15 on property:persist.logd.logpersistd.size=*
19 on property:persist.logd.logpersistd.buffer=all
23 on property:persist.logd.logpersistd.buffer=*
27 on property:persist.logd.logpersistd=logcatd
31 on load_persist_props_action
34 on property:logd.logpersistd.enable=true && property:logd.logpersistd=logcatd
40 on property:logd.logpersistd.enable=true && property:logd.logpersistd=clear
48 on property:logd.logpersistd=stop
53 on property:logd.logpersistd.enable=false
/system/core/rootdir/
Dinit.usb.rc6 on post-fs-data
21 # adbd on at boot in emulator
22 on property:ro.kernel.qemu=1
25 on boot
29 on property:sys.usb.config=none && property:sys.usb.configfs=0
38 on property:sys.usb.config=adb && property:sys.usb.configfs=0
48 on property:sys.usb.config=accessory && property:sys.usb.configfs=0
57 on property:sys.usb.config=accessory,adb && property:sys.usb.configfs=0
67 on property:sys.usb.config=audio_source && property:sys.usb.configfs=0
76 on property:sys.usb.config=audio_source,adb && property:sys.usb.configfs=0
[all …]
Dinit.usb.configfs.rc1 on property:sys.usb.config=none && property:sys.usb.configfs=1
15 on property:init.svc.adbd=stopped
18 on property:sys.usb.config=adb && property:sys.usb.configfs=1
21 on property:sys.usb.ffs.ready=1 && property:sys.usb.config=adb && property:sys.usb.configfs=1
27 on property:sys.usb.ffs.mtp.ready=1 && property:sys.usb.config=mtp && property:sys.usb.configfs=1
33 on property:sys.usb.config=mtp,adb && property:sys.usb.configfs=1
36 on property:sys.usb.ffs.ready=1 && property:sys.usb.ffs.mtp.ready=1 && \
44 on property:sys.usb.ffs.mtp.ready=1 && property:sys.usb.config=ptp && property:sys.usb.configfs=1
50 on property:sys.usb.config=ptp,adb && property:sys.usb.configfs=1
53 on property:sys.usb.ffs.ready=1 && property:sys.usb.ffs.mtp.ready=1 && \
[all …]
Dinit-debug.rc1 on property:persist.mmc.max_read_speed=*
4 on property:persist.mmc.max_write_speed=*
7 on property:persist.mmc.cache_size=*
/system/netd/server/
DInterfaceController.h36 static int setEnableIPv6(const char *interface, const int on);
38 static int setAcceptIPv6Ra(const char *interface, const int on);
39 static int setAcceptIPv6Dad(const char *interface, const int on);
41 static int setIPv6PrivacyExtensions(const char *interface, const int on);
42 static int setIPv6NdOffload(char* interface, const int on);
DInterfaceController.cpp252 int InterfaceController::setEnableIPv6(const char *interface, const int on) { in setEnableIPv6() argument
260 const char *disable_ipv6 = on ? "0" : "1"; in setEnableIPv6()
289 int InterfaceController::setAcceptIPv6Ra(const char *interface, const int on) { in setAcceptIPv6Ra() argument
296 const char *accept_ra = on ? "2" : "0"; in setAcceptIPv6Ra()
300 int InterfaceController::setAcceptIPv6Dad(const char *interface, const int on) { in setAcceptIPv6Dad() argument
305 const char *accept_dad = on ? "1" : "0"; in setAcceptIPv6Dad()
317 int InterfaceController::setIPv6PrivacyExtensions(const char *interface, const int on) { in setIPv6PrivacyExtensions() argument
324 return writeValueToPath(ipv6_proc_path, interface, "use_tempaddr", on ? "2" : "0"); in setIPv6PrivacyExtensions()
330 int InterfaceController::setIPv6NdOffload(char* interface, const int on) { in setIPv6NdOffload() argument
338 on ? "1" : "0" in setIPv6NdOffload()
[all …]
/system/sepolicy/prebuilts/api/26.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
Dfsck.te16 # Run fsck on certain block devices
22 # To determine if it is safe to run fsck on a filesystem, e2fsck
25 # block devices. With that information, it runs stat() on each block
27 # passed in on the command line. If there is a match, then the filesystem
40 # fsck should never be run on these block devices
Dupdate_engine_common.te7 # Allow read/write on system and boot partitions.
16 # Allow update_engine_common to mount on the /postinstall directory and reset the
17 # labels on the mounted filesystem to postinstall_file.
41 # read directories on /system and /vendor
/system/sepolicy/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
Dfsck.te16 # Run fsck on certain block devices
22 # To determine if it is safe to run fsck on a filesystem, e2fsck
25 # block devices. With that information, it runs stat() on each block
27 # passed in on the command line. If there is a match, then the filesystem
40 # fsck should never be run on these block devices
/system/core/bootstat/
Dbootstat.rc3 on post-fs-data
44 on post-fs-data && property:init.svc.bootanim=running && property:ro.crypto.type=block
52 # The 'on boot' event occurs once per hard boot (device power on), which
53 # switches the flag on. If the device performs a runtime restart, the flag is
54 # switched off and cannot be switched on until the device hard boots again.
56 # Enable bootstat logging on boot.
57 on boot
60 # Disable further bootstat logging on a runtime restart. A runtime restart is
62 on property:init.svc.zygote=stopping
66 on property:sys.boot_completed=1 && property:sys.logbootcomplete=1
/system/extras/ioshark/
DREADME2 can find more documentation on IOshark at :
8 compiler runs on a Linux host. The second component (which runs on the
10 files) and executes them on the device.
19 device (on /data/local/tmp say). Explode the tarfile.
32 /vendor. Instead do reads on those files.
/system/core/trusty/keymaster/
DAndroid.bp11 // distributed under the License is distributed on an "AS IS" BASIS,
17 // WARNING: Everything listed here will be built on ALL platforms,
20 // to only building on ARM if they include assembly. Individual makefiles
23 // trusty_keymaster is a binary used only for on-device testing. It
46 // keystore.trusty is the HAL used by keystore on Trusty devices.
/system/core/adb/
DSERVICES.TXT3 to understand what's going on here.
48 be sent directly to the adbd daemon running on the device.
63 either the device or emulator connect to/running on the host.
79 running on the host. This will fail if there is none or more than one.
83 interpreted as 'any single device or emulator connected to/running on
101 to the <remote> address on a given device.
109 tcp:<port> -> TCP connection on localhost:<port>
110 local:<path> -> Unix local domain socket on <path>
114 tcp:<port> -> TCP localhost:<port> on device
115 local:<path> -> Unix local domain socket on device
[all …]
/system/tpm/trunks/
Dtrunksd.conf20 start on starting system-services
21 stop on stopping system-services
/system/chre/host/msm/daemon/idl/
Dchre_slpi.idl11 * distributed under the License is distributed on an "AS IS" BASIS,
18 * Defines the FastRPC interface between CHRE running on the SLPI and the host
19 * daemon running on the AP.
24 * Refer to the implementations of these functions in the CHRE code that runs on
/system/vold/
DNetlinkManager.cpp54 int on = 1; in start() local
75 if (setsockopt(mSock, SOL_SOCKET, SO_PASSCRED, &on, sizeof(on)) < 0) { in start()
/system/update_engine/init/
Dupdate-engine.conf23 start on starting system-services
24 stop on stopping system-services
/system/tpm/tpm_manager/server/
Dtpm_managerd.conf20 start on starting system-services
21 stop on stopping system-services
/system/tpm/attestation/server/
Dattestationd.conf20 start on started tcsd and started boot-services
21 stop on stopping boot-services
/system/libhidl/transport/base/1.0/
DIBase.hal11 * distributed under the License is distributed on an "AS IS" BASIS,
44 * Calling interfaceChain on an IChild object must yield the following:
60 * Calling interfaceDescriptor on an IChild object must yield
98 * on system property hal.instrumentation.enable.
103 * Get debug information on references on this interface.
122 * runtime type information on the object.
127 * Calling interfaceChain on an IChild object must yield the following:
/system/extras/tests/sdcard/
Dsysutil.h95 void setNewFairSleepers(bool on);
101 void setNormalizedSleepers(bool on);

12345678910>>...22