Home
last modified time | relevance | path

Searched refs:on (Results 1 – 25 of 1281) sorted by relevance

12345678910>>...52

/system/core/llkd/
Dllkd.rc2 on property:ro.debuggable=*
6 on property:ro.llk.enable=true
9 on property:llk.enable=1
12 on property:llk.enable=0
15 on property:ro.khungtask.enable=true
18 on property:khungtask.enable=1
21 on property:khungtask.enable=0
25 on property:khungtask.enable=true
31 on property:khungtask.enable=false
34 on property:llk.enable=true
Dllkd-debuggable.rc1 on property:ro.debuggable=1
5 on property:ro.llk.enable=eng
8 on property:ro.khungtask.enable=eng
/system/server_configurable_flags/disaster_recovery/
Dflags_health_check.rc1 on load_persist_props_action
2 # check server configurable flags(which is based on persistent properties) related
7 on property:sys.boot_completed=1
10 on property:sys.init.updatable_crashing=1
/system/bt/service/doc/
DIBluetoothGattClientCallback.txt11 * distributed under the License is distributed on an "AS IS" BASIS,
27 * handle and can be used to perform further operations on the
33 * Called for each GATT service that was discovered on the remote device. The
41 * Called for each include definition that was discovered on the remote
47 * Called for each characteristic that was discovered on the remote device.
56 * Called for each descriptor that was discovered on the remote device. The
63 * Called to mark the end of GATT service discovery on the remote device with
71 * will contain BLE_STATUS_SUCCESS (0) on success and an ATT protocol error
73 * this operation was performed on. On success, |value| will contain the
82 * will contain BLE_STATUS_SUCCESS (0) on success and an ATT protocol error
[all …]
/system/core/logcat/
Dlogcatd.rc12 on property:persist.logd.logpersistd.count=*
16 on property:persist.logd.logpersistd.size=*
19 on property:persist.logd.logpersistd.rotate_kbytes=*
22 on property:persist.logd.logpersistd.buffer=*
25 on property:persist.logd.logpersistd=logcatd
29 on load_persist_props_action
32 on property:logd.logpersistd.enable=true && property:logd.logpersistd=logcatd
38 on property:logd.logpersistd.enable=true && property:logd.logpersistd=clear
46 on property:logd.logpersistd=stop
51 on property:logd.logpersistd.enable=false
/system/extras/simpleperf/doc/
DREADME.md4 both Android applications and native processes running on Android. It can
5 profile both Java and C++ code on Android. The simpleperf executable can run on Android >=L,
6 and Python scripts can be used on Android >= N.
23 …- [Why we suggest profiling on Android >= N devices?](#why-we-suggest-profiling-on-android--n-devi…
38 1. It collects more info in profiling data. Since the common workflow is "record on the device, and
39 report on the host", simpleperf not only collects samples in profiling data, but also collects
44 to file. This is to save storage space on the device.
45 b. Support tracing both on CPU time and off CPU time with --trace-offcpu option.
46 c. Support recording callgraphs of JITed and interpreted Java code on Android >= P.
58 a. Builds static executables on the device. Since static executables don't rely on any library,
[all …]
/system/core/rootdir/
Dinit.usb.rc6 on post-fs-data
22 # Set default value on sys.usb.configfs early in boot sequence. It will be
23 # overridden in `on boot` action of init.hardware.rc.
24 on init
28 on property:sys.usb.config=none && property:sys.usb.configfs=0
37 on property:sys.usb.config=adb && property:sys.usb.configfs=0
47 on property:sys.usb.config=accessory && property:sys.usb.configfs=0
56 on property:sys.usb.config=accessory,adb && property:sys.usb.configfs=0
66 on property:sys.usb.config=audio_source && property:sys.usb.configfs=0
75 on property:sys.usb.config=audio_source,adb && property:sys.usb.configfs=0
[all …]
Dinit.usb.configfs.rc1 on property:sys.usb.config=none && property:sys.usb.configfs=1
14 on property:init.svc.adbd=stopped
17 on property:sys.usb.config=adb && property:sys.usb.configfs=1
20 on property:sys.usb.ffs.ready=1 && property:sys.usb.config=adb && property:sys.usb.configfs=1
26 on property:sys.usb.config=mtp && property:sys.usb.configfs=1
32 on property:sys.usb.config=mtp,adb && property:sys.usb.configfs=1
35 on property:sys.usb.ffs.ready=1 && property:sys.usb.config=mtp,adb && property:sys.usb.configfs=1
42 on property:sys.usb.config=ptp && property:sys.usb.configfs=1
48 on property:sys.usb.config=ptp,adb && property:sys.usb.configfs=1
51 on property:sys.usb.ffs.ready=1 && property:sys.usb.config=ptp,adb && property:sys.usb.configfs=1
[all …]
Dinit-debug.rc1 on property:persist.mmc.max_read_speed=*
4 on property:persist.mmc.max_write_speed=*
7 on property:persist.mmc.cache_size=*
/system/apex/tests/testdata/
Dtrigger_watchdog.rc2 on boot && property:persist.debug.trigger_watchdog.apex=*
8 on boot && property:debug.trigger_reboot_once_after_activation=1 && property:persist.debug.trigger_…
13 on boot && property:persist.debug.trigger_reboot_twice_after_activation=1 && property:persist.debug…
18 on boot && property:persist.debug.trigger_updatable_crashing_for_testing=1
23 on boot && property:test.apex_revert_test_force_reboot=1
28 # executed init already executed `on userspace-reboot-fs-remount` trigger in rootdir/init.rc,
30 on userspace-reboot-fs-remount && property:test.apex_userspace_reboot_simulate_remount_failed=1
35 on userspace-reboot-requested && property:test.apex_userspace_reboot_simulate_shutdown_failed=1
/system/sepolicy/prebuilts/api/26.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
/system/sepolicy/prebuilts/api/27.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
/system/sepolicy/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
Dupdate_engine_common.te7 # Allow read/write on system and boot partitions.
32 # Allow update_engine_common to mount on the /postinstall directory and reset the
33 # labels on the mounted filesystem to postinstall_file.
62 # read / write on /dev/device-mapper to map / unmap devices
65 # apply / verify updates on devices mapped via device mapper
68 # read / write metadata on super device to resize partitions
71 # ioctl on super device to get block device alignment and alignment offset
74 # get physical block device to map logical partitions on device mapper
/system/sepolicy/prebuilts/api/28.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
/system/sepolicy/prebuilts/api/29.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
Dupdate_engine_common.te7 # Allow read/write on system and boot partitions.
32 # Allow update_engine_common to mount on the /postinstall directory and reset the
33 # labels on the mounted filesystem to postinstall_file.
59 # read / write on /dev/device-mapper to map / unmap devices
62 # apply / verify updates on devices mapped via device mapper
65 # read / write metadata on super device to resize partitions
68 # ioctl on super device to get block device alignment and alignment offset
71 # get physical block device to map logical partitions on device mapper
/system/sepolicy/prebuilts/api/30.0/public/
Dfsck_untrusted.te1 # Any fsck program run on untrusted block devices
11 # Run fsck on vold block devices
17 # To determine if it is safe to run fsck on a filesystem, e2fsck
20 # block devices. With that information, it runs stat() on each block
22 # passed in on the command line. If there is a match, then the filesystem
32 # Untrusted fsck should never be run on block devices holding sensitive data
Dupdate_engine_common.te7 # Allow read/write on system and boot partitions.
32 # Allow update_engine_common to mount on the /postinstall directory and reset the
33 # labels on the mounted filesystem to postinstall_file.
62 # read / write on /dev/device-mapper to map / unmap devices
65 # apply / verify updates on devices mapped via device mapper
68 # read / write metadata on super device to resize partitions
71 # ioctl on super device to get block device alignment and alignment offset
74 # get physical block device to map logical partitions on device mapper
/system/bt/gd/docs/testing/
Dcert_test.md8 automate test operations on certain peripherals. For example, although an user
9 can automate API calls on Android with tools like
11 commands, they often struggle with automating corresponding operations on
48 on any platform. The server need to expose an IP address and 3 ports
60 implementations on the test device
75 ### Run GD cert tests on host machine
89 ### Run GD cert tests on devices for the first time
91 Connect at least two Android devices and follow on-screen instructions after
98 ### Run GD cert tests on devices for the second time and after
108 * `--host`: Run tests on host only using `root-canal`
[all …]
/system/netd/libnetdutils/
DSocketOption.cpp31 const int on = 1; in enableSockopt() local
32 return sys.setsockopt(sock, level, optname, &on, sizeof(on)); in enableSockopt()
/system/gsid/
Dgsid.rc8 on post-fs
14 on post-fs-data
20 on boot
/system/netd/server/
DInterfaceController.h37 static int setEnableIPv6(const char* ifName, const int on);
39 static int setAcceptIPv6Ra(const char* ifName, const int on);
40 static int setAcceptIPv6Dad(const char* ifName, const int on);
42 static int setIPv6PrivacyExtensions(const char* ifName, const int on);
/system/sepolicy/private/
Dsu.te5 # Allow dumpstate to call su on userdebug / eng builds to collect
13 # Put the incident command into its domain so it is the same on user, userdebug and eng.
16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.
/system/sepolicy/prebuilts/api/30.0/private/
Dsu.te5 # Allow dumpstate to call su on userdebug / eng builds to collect
13 # Put the incident command into its domain so it is the same on user, userdebug and eng.
16 # Put the perfetto command into its domain so it is the same on user, userdebug and eng.

12345678910>>...52