Home
last modified time | relevance | path

Searched refs:down (Results 1 – 25 of 31) sorted by relevance

12

/system/sepolicy/private/
Dwificond.te20 # create sockets to set interfaces up and down
22 # setting interface state up/down is a privileged ioctl
Dhal_wifi.te17 # allow hal wifi set interfaces up and down and get the factory MAC
Dlmkd.te35 ## TODO: maybe scope this down?
Dhal_neverallows.te55 # The UWB HAL is not actually a networking HAL but may need to bring up and down
Ddex2oat.te97 # It would be nice to tie this down, but currently, because of how images are written, we can't
Dtraced_probes.te25 # userdebug only until we nail down the denylist/allowlist.
Dsystem_app.te96 # TODO: scope this down? Too broad?
Dapp_neverallows.te246 # (all the way down to hardware) thus increasing opportunities for bypassing
Ddumpstate.te198 # TODO: scope this down.
/system/core/healthd/
Dhealthd_mode_charger.cpp431 int down = !!value; in SetKeyCallback() local
436 if (keys_[code].down == down) return 0; in SetKeyCallback()
440 if (down) keys_[code].timestamp = now; in SetKeyCallback()
441 keys_[code].down = down; in SetKeyCallback()
443 if (down) { in SetKeyCallback()
490 if (key->down) { in ProcessKey()
/system/core/toolbox/
Dgetevent.c174 char down; in print_possible_events() local
176 down = '*'; in print_possible_events()
178 down = ' '; in print_possible_events()
186 … printf(" %.20s%c%*s", bit_label, down, (int) (20 - strlen(bit_label)), ""); in print_possible_events()
188 printf(" %04x%c ", j * 8 + k, down); in print_possible_events()
190 printf(" %04x%c", j * 8 + k, down); in print_possible_events()
/system/sepolicy/vendor/
Dhal_can_socketcan.te20 # Communicating with SocketCAN interfaces and bringing them up/down
/system/core/healthd/include_charger/charger/
Dhealthd_mode_charger.h37 bool down; member
/system/chre/apps/test/common/proto/
Dchre_cross_validation_wifi.proto22 // H2C: Host passing down wifi scan result data to CHRE to validate.
/system/logging/logd/
DREADME.compression.md15 * Add presubmit coverage similar to SELinux violations to keep log spam down
/system/sepolicy/microdroid/system/public/
Dattributes48 # TODO(b/9496886) Lock down access to /proc/net.
/system/core/fs_mgr/libfiemap/
DREADME.md36 We break the problem down into three scenarios.
/system/extras/simpleperf/scripts/purgatorio/
DREADME.md47 …ns of the UI. Multiple sections of the graph can be aggregated by holding down the [ctrl] button d…
/system/sepolicy/public/
Dattributes65 # TODO(b/9496886) Lock down access to /proc/net.
196 # i.e. processes that can read up and write down.
Dservice.te62 # system_server_services broken down
108 # with EMMA_INSTRUMENT=true. We should consider locking this down in the future.
Dfile.te349 # TODO(b/129332765): Narrow down permissions to this.
/system/extras/simpleperf/doc/
Dview_the_profile.md29 # Output all threads, broken down by threadpool.
/system/sepolicy/microdroid/system/private/
Dinit.te11 # since it potentially requires tearing down dm-devices (e.g. dm-bow, dm-crypto)
/system/apex/docs/
DREADME.md194 down-merge from the `android-4.4` branch is strongly recommended. The following
216 To get the required patches for kernel versions 4.9/4.14/4.19, down-merge from
/system/chre/doc/
Dporting_guide.md242 shutting down. It is now the PAL's responsibility to perform cleanup,

12