Home
last modified time | relevance | path

Searched refs:on (Results 1 – 25 of 773) sorted by relevance

12345678910>>...31

/system/bt/service/doc/
DIBluetoothGattClientCallback.txt11 * distributed under the License is distributed on an "AS IS" BASIS,
27 * handle and can be used to perform further operations on the
33 * Called for each GATT service that was discovered on the remote device. The
41 * Called for each include definition that was discovered on the remote
47 * Called for each characteristic that was discovered on the remote device.
56 * Called for each descriptor that was discovered on the remote device. The
63 * Called to mark the end of GATT service discovery on the remote device with
71 * will contain BLE_STATUS_SUCCESS (0) on success and an ATT protocol error
73 * this operation was performed on. On success, |value| will contain the
82 * will contain BLE_STATUS_SUCCESS (0) on success and an ATT protocol error
[all …]
/system/core/logcat/
Dlogcatd.rc11 on property:persist.logd.logpersistd.size=256
15 on property:persist.logd.logpersistd.size=*
19 on property:persist.logd.logpersistd.buffer=all
23 on property:persist.logd.logpersistd.buffer=*
27 on property:persist.logd.logpersistd=logcatd
31 on load_persist_props_action
34 on property:logd.logpersistd.enable=true && property:logd.logpersistd=logcatd
40 on property:logd.logpersistd.enable=true && property:logd.logpersistd=clear
48 on property:logd.logpersistd=stop
53 on property:logd.logpersistd.enable=false
/system/core/rootdir/
Dinit.usb.configfs.rc1 on property:sys.usb.config=none && property:sys.usb.configfs=1
14 on property:init.svc.adbd=stopped
17 on property:sys.usb.config=adb && property:sys.usb.configfs=1
20 on property:sys.usb.ffs.ready=1 && property:sys.usb.config=adb && property:sys.usb.configfs=1
26 on property:sys.usb.config=mtp && property:sys.usb.configfs=1
32 on property:sys.usb.config=mtp,adb && property:sys.usb.configfs=1
35 on property:sys.usb.ffs.ready=1 && property:sys.usb.config=mtp,adb && property:sys.usb.configfs=1
42 on property:sys.usb.config=ptp && property:sys.usb.configfs=1
48 on property:sys.usb.config=ptp,adb && property:sys.usb.configfs=1
51 on property:sys.usb.ffs.ready=1 && property:sys.usb.config=ptp,adb && property:sys.usb.configfs=1
[all …]
Dinit.usb.rc6 on post-fs-data
21 on boot
25 on property:sys.usb.config=none && property:sys.usb.configfs=0
34 on property:sys.usb.config=adb && property:sys.usb.configfs=0
44 on property:sys.usb.config=accessory && property:sys.usb.configfs=0
53 on property:sys.usb.config=accessory,adb && property:sys.usb.configfs=0
63 on property:sys.usb.config=audio_source && property:sys.usb.configfs=0
72 on property:sys.usb.config=audio_source,adb && property:sys.usb.configfs=0
82 on property:sys.usb.config=accessory,audio_source && property:sys.usb.configfs=0
91 on property:sys.usb.config=accessory,audio_source,adb && property:sys.usb.configfs=0
[all …]
Dinit-debug.rc1 on property:persist.mmc.max_read_speed=*
4 on property:persist.mmc.max_write_speed=*
7 on property:persist.mmc.cache_size=*
/system/sepolicy/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
Dfsck.te16 # Run fsck on certain block devices
22 # To determine if it is safe to run fsck on a filesystem, e2fsck
25 # block devices. With that information, it runs stat() on each block
27 # passed in on the command line. If there is a match, then the filesystem
43 # fsck should never be run on these block devices
/system/sepolicy/prebuilts/api/27.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
Dfsck.te16 # Run fsck on certain block devices
22 # To determine if it is safe to run fsck on a filesystem, e2fsck
25 # block devices. With that information, it runs stat() on each block
27 # passed in on the command line. If there is a match, then the filesystem
40 # fsck should never be run on these block devices
/system/sepolicy/prebuilts/api/28.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
Dfsck.te16 # Run fsck on certain block devices
22 # To determine if it is safe to run fsck on a filesystem, e2fsck
25 # block devices. With that information, it runs stat() on each block
27 # passed in on the command line. If there is a match, then the filesystem
43 # fsck should never be run on these block devices
/system/sepolicy/prebuilts/api/26.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
Dfsck.te16 # Run fsck on certain block devices
22 # To determine if it is safe to run fsck on a filesystem, e2fsck
25 # block devices. With that information, it runs stat() on each block
27 # passed in on the command line. If there is a match, then the filesystem
40 # fsck should never be run on these block devices
/system/core/bootstat/
Dbootstat.rc4 on property:ro.boot.bootreason=*
7 on post-fs-data
48 on post-fs-data && property:init.svc.bootanim=running && property:ro.crypto.type=block
56 # The 'on boot' event occurs once per hard boot (device power on), which
57 # switches the flag on. If the device performs a runtime restart, the flag is
58 # switched off and cannot be switched on until the device hard boots again.
60 # Enable bootstat logging on boot.
61 on boot
64 # Disable further bootstat logging on a runtime restart. A runtime restart is
66 on property:init.svc.zygote=stopping
[all …]
/system/netd/libnetdutils/
DSocketOption.cpp31 const int on = 1; in enableSockopt() local
32 return sys.setsockopt(sock, level, optname, &on, sizeof(on)); in enableSockopt()
/system/netd/server/
DInterfaceController.h37 static int setEnableIPv6(const char *interface, const int on);
39 static int setAcceptIPv6Ra(const char *interface, const int on);
40 static int setAcceptIPv6Dad(const char *interface, const int on);
42 static int setIPv6PrivacyExtensions(const char *interface, const int on);
/system/core/trusty/keymaster/
DAndroid.bp11 // distributed under the License is distributed on an "AS IS" BASIS,
17 // WARNING: Everything listed here will be built on ALL platforms,
20 // to only building on ARM if they include assembly. Individual makefiles
23 // trusty_keymaster is a binary used only for on-device testing. It
49 // keystore.trusty is the HAL used by keystore on Trusty devices.
/system/tpm/trunks/
Dtrunksd.conf20 start on starting system-services
21 stop on stopping system-services
/system/core/adb/
DSERVICES.TXT3 to understand what's going on here.
48 be sent directly to the adbd daemon running on the device.
63 either the device or emulator connect to/running on the host.
79 running on the host. This will fail if there is none or more than one.
83 interpreted as 'any single device or emulator connected to/running on
101 to the <remote> address on a given device.
109 tcp:<port> -> TCP connection on localhost:<port>
110 local:<path> -> Unix local domain socket on <path>
114 tcp:<port> -> TCP localhost:<port> on device
115 local:<path> -> Unix local domain socket on device
[all …]
/system/chre/host/msm/daemon/idl/
Dchre_slpi.idl11 * distributed under the License is distributed on an "AS IS" BASIS,
18 * Defines the FastRPC interface between CHRE running on the SLPI and the host
19 * daemon running on the AP.
24 * Refer to the implementations of these functions in the CHRE code that runs on
/system/sepolicy/prebuilts/api/28.0/private/
Dsu.te5 # Allow dumpstate to call su on userdebug / eng builds to collect
13 # Put the incident command into its domain so it is the same on user, userdebug and eng.
16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
/system/sepolicy/private/
Dsu.te5 # Allow dumpstate to call su on userdebug / eng builds to collect
13 # Put the incident command into its domain so it is the same on user, userdebug and eng.
16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
/system/vold/
DNetlinkManager.cpp52 int on = 1; in start() local
74 if (setsockopt(mSock, SOL_SOCKET, SO_PASSCRED, &on, sizeof(on)) < 0) { in start()
/system/tpm/tpm_manager/server/
Dtpm_managerd.conf20 start on starting system-services
21 stop on stopping system-services
/system/update_engine/init/
Dupdate-engine.conf23 start on starting system-services
24 stop on stopping system-services

12345678910>>...31