Searched refs:action (Results 1 - 25 of 47) sorted by relevance

12

/system/core/init/
H A Dinit_parser.h22 struct action;
25 struct action *action_remove_queue_head(void);
26 void action_add_queue_tail(struct action *act);
28 void (*func)(struct action *act));
H A Dinit.h30 /* list of commands in an action */
47 struct action { struct
120 struct action onrestart; /* Actions to execute on restart. */
141 void build_triggers_string(char *name_str, int length, struct action *cur_action);
H A Dinit_parser.cpp96 action* act = node_to_item(node, struct action, alist);
546 void (*func)(struct action *act))
549 struct action *act;
553 act = node_to_item(node, struct action, alist);
567 struct action *act;
573 act = node_to_item(node, struct action, alist);
625 action* act = (action*) calloc(1, sizeof(*act));
643 void action_add_queue_tail(struct action *ac
[all...]
H A Ddevices.cpp61 const char *action; member in struct:uevent
359 uevent->action = "";
373 uevent->action = msg;
407 uevent->action, uevent->path, uevent->subsystem,
524 static void handle_device(const char *action, const char *devpath, argument
529 if(!strcmp(action, "add")) {
537 if(!strcmp(action, "remove")) {
556 if (!strcmp(uevent->action, "add"))
558 else if (!strcmp(uevent->action, "remove"))
603 handle_device(uevent->action, devpat
[all...]
/system/bt/bta/mce/
H A Dbta_mce_main.c40 /* state machine action enumeration list */
43 /* type for action functions */
46 /* action function list */
68 UINT16 action = (p_msg->event & 0x00ff); local
70 /* execute action functions */
71 if(action < BTA_MCE_NUM_ACTIONS)
73 (*bta_mce_action[action])((tBTA_MCE_MSG*)p_msg);
/system/bt/bta/sdp/
H A Dbta_sdp.c40 /* state machine action enumeration list */
43 /* type for action functions */
46 /* action function list */
67 UINT16 action = (p_msg->event & 0x00ff); local
69 /* execute action functions */
70 if(action < BTA_SDP_NUM_ACTIONS)
72 (*bta_sdp_action[action])((tBTA_SDP_MSG*)p_msg);
/system/bt/bta/jv/
H A Dbta_jv_main.c38 /* state machine action enumeration list */
41 /* type for action functions */
44 /* action function list */
88 UINT16 action = (p_msg->event & 0x00ff); local
89 /* execute action functions */
91 if(action < BTA_JV_NUM_ACTIONS)
93 (*bta_jv_action[action])((tBTA_JV_MSG*)p_msg);
/system/netd/server/
H A DNetlinkHandler.cpp61 NetlinkEvent::Action action = evt->getAction(); local
64 if (action == NetlinkEvent::Action::kAdd) {
66 } else if (action == NetlinkEvent::Action::kRemove) {
68 } else if (action == NetlinkEvent::Action::kChange) {
71 } else if (action == NetlinkEvent::Action::kLinkUp) {
73 } else if (action == NetlinkEvent::Action::kLinkDown) {
75 } else if (action == NetlinkEvent::Action::kAddressUpdated ||
76 action == NetlinkEvent::Action::kAddressRemoved) {
80 if (action == NetlinkEvent::Action::kAddressRemoved && iface && address) {
89 notifyAddressChanged(action, addres
184 notifyAddressChanged(NetlinkEvent::Action action, const char *addr, const char *iface, const char *flags, const char *scope) argument
200 notifyRouteChange(NetlinkEvent::Action action, const char *route, const char *gateway, const char *iface) argument
[all...]
H A DNetlinkHandler.h45 void notifyAddressChanged(NetlinkEvent::Action action, const char *addr, const char *iface,
49 void notifyRouteChange(NetlinkEvent::Action action, const char *route, const char *gateway, const char *iface);
H A DRouteController.cpp181 // The netlink header is generated by this function based on |action| and |flags|.
183 WARN_UNUSED_RESULT int sendNetlinkRequest(uint16_t action, uint16_t flags, iovec* iov, int iovlen) { argument
185 .nlmsg_type = action,
246 // action of FR_ACT_UNREACHABLE). Otherwise, the rule specifies an action of FR_ACT_TO_TBL.
257 WARN_UNUSED_RESULT int modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, argument
287 .action = static_cast<uint8_t>(priority != RULE_PRIORITY_UNREACHABLE ? FR_ACT_TO_TBL :
296 if (table == RT_TABLE_UNSPEC && rule.action == FR_ACT_TO_TBL && action != RTM_DELRULE) {
327 uint16_t flags = (action
338 modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, uint32_t fwmark, uint32_t mask) argument
346 modifyIpRoute(uint16_t action, uint32_t table, const char* interface, const char* destination, const char* nexthop) argument
601 modifyVpnFallthroughRule(uint16_t action, unsigned vpnNetId, const char* physicalInterface, Permission permission) argument
795 modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission) argument
815 modifyTetheredNetwork(uint16_t action, const char* inputInterface, const char* outputInterface) argument
846 modifyRoute(uint16_t action, const char* interface, const char* destination, const char* nexthop, RouteController::TableType tableType) argument
[all...]
/system/bt/stack/btm/
H A Dbtm_ble_adv_filter.c40 /* BLE meta vsc header: 1 bytes of sub_code, 1 byte of PCF action */
55 static UINT8 btm_ble_cs_update_pf_counter(tBTM_BLE_SCAN_COND_OP action,
112 void btm_ble_advfilt_enq_op_q(UINT8 action, UINT8 ocf, tBTM_BLE_FILT_CB_EVT cb_evt, argument
116 btm_ble_adv_filt_cb.op_q.action_ocf[btm_ble_adv_filt_cb.op_q.next_idx] = (action |(ocf << 4));
122 BTM_TRACE_DEBUG("btm_ble_advfilt_enq_op_q: act_ocf:%d, action:%d, ocf:%d,cb_evt;%d, cback:%x",
123 btm_ble_adv_filt_cb.op_q.action_ocf[btm_ble_adv_filt_cb.op_q.next_idx], action,
154 BTM_TRACE_DEBUG("btm_ble_advfilt_deq_op_q: ocf:%d, action:%d, ref_value:%d, cb_evt:%x",
259 UINT8 *p = p_params->p_param_buf, op_subcode = 0, action = 0xff; local
271 btm_ble_advfilt_deq_op_q(&action, &ocf, &cb_evt, &ref_value, &p_scan_cfg_cback,
276 btm_ble_advfilt_deq_op_q(&action,
457 btm_ble_update_pf_local_name(tBTM_BLE_SCAN_COND_OP action, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_COND_PARAM *p_cond) argument
517 btm_ble_update_srvc_data_change(tBTM_BLE_SCAN_COND_OP action, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_COND_PARAM *p_cond) argument
544 btm_ble_update_pf_manu_data(tBTM_BLE_SCAN_COND_OP action, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_COND_PARAM *p_data, tBTM_BLE_PF_COND_TYPE cond_type, tBTM_BLE_FILT_CB_EVT cb_evt, tBTM_BLE_REF_VALUE ref_value) argument
666 btm_ble_cs_update_pf_counter(tBTM_BLE_SCAN_COND_OP action, UINT8 cond_type, tBLE_BD_ADDR *p_bd_addr, UINT8 num_available) argument
736 btm_ble_update_addr_filter(tBTM_BLE_SCAN_COND_OP action, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_COND_PARAM *p_cond) argument
788 btm_ble_update_uuid_filter(tBTM_BLE_SCAN_COND_OP action, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_COND_TYPE filter_type, tBTM_BLE_PF_COND_PARAM *p_cond, tBTM_BLE_FILT_CB_EVT cb_evt, tBTM_BLE_REF_VALUE ref_value) argument
940 btm_ble_clear_scan_pf_filter(tBTM_BLE_SCAN_COND_OP action, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_COND_PARAM *p_cond, tBTM_BLE_PF_CFG_CBACK *p_cmpl_cback, tBTM_BLE_FILT_CB_EVT cb_evt, tBTM_BLE_REF_VALUE ref_value) argument
1053 BTM_BleAdvFilterParamSetup(int action, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_FILT_PARAMS *p_filt_params, tBLE_BD_ADDR *p_target, tBTM_BLE_PF_PARAM_CBACK *p_cmpl_cback, tBTM_BLE_REF_VALUE ref_value) argument
1236 BTM_BleCfgFilterCondition(tBTM_BLE_SCAN_COND_OP action, tBTM_BLE_PF_COND_TYPE cond_type, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_COND_PARAM *p_cond, tBTM_BLE_PF_CFG_CBACK *p_cmpl_cback, tBTM_BLE_REF_VALUE ref_value) argument
[all...]
/system/core/debuggerd/
H A Ddebuggerd.cpp59 debugger_action_t action; member in struct:debugger_request_t
149 static bool selinux_action_allowed(int s, pid_t tid, debugger_action_t action) argument
159 if (action <= 0 || action >= (sizeof(debuggerd_perms)/sizeof(debuggerd_perms[0]))) {
160 ALOGE("SELinux: No permission defined for debugger action %d", action);
164 perm = debuggerd_perms[action];
218 out_request->action = static_cast<debugger_action_t>(msg.action);
226 if (msg.action
[all...]
/system/core/include/cutils/
H A Ddebugger.h43 int32_t action; member in struct:__anon1323
/system/core/libcutils/
H A Ddebugger.c45 static int make_dump_request(debugger_action_t action, pid_t tid, int timeout_secs) { argument
49 msg.action = action;
/system/bt/stack/avct/
H A Davct_lcb.c70 /* state machine action enumeration list */
93 /* type for action functions */
96 /* action function list */
197 UINT8 action; local
212 /* execute action functions */
215 if ((action = state_table[event][i]) != AVCT_LCB_IGNORE)
217 (*avct_lcb_action[action])(p_lcb, p_data);
240 UINT8 action; local
255 /* execute action functions */
258 if ((action
[all...]
/system/bt/doc/
H A Dpower_management.md36 policy is determined by the greatest allowable power action defined across all
38 it's willing to go to into SNIFF and specifies that as an action, and say, a PAN
39 connection is up which specifies it is willing to go into SNIFF, but its action
54 The action constants are defined in `bta_api.h` and are defined as a series of
62 action that `bta_dm_pm_set_mode` will take, the connection will be removed
68 action is still the same, however -- SNIFF mode is attempted. There are
100 returns with no action taken.
104 there's no action to be performed (`BTA_DM_PM_NO_ACTION`), and if so,
105 returns with no action taken.
123 the first power management action did
[all...]
/system/bt/bta/pan/
H A Dbta_pan_main.c44 /* state machine action enumeration list */
60 /* type for action functions */
66 /* action function list */
201 UINT8 action; local
214 /* execute action functions */
217 if ((action = state_table[event][i]) != BTA_PAN_IGNORE)
219 (*bta_pan_action[action])(p_scb, p_data);
/system/bt/stack/smp/
H A Dsmp_br_main.c326 ** if not NULL state. Execute the action function according to the
327 ** state table. If the state returned by action function is not NULL
337 UINT8 action, entry; local
381 /* If action is not ignore, clear param, exec action and get next state.
382 * The action function may set the Param for cback.
384 /* execute action functions */
387 if ((action = state_table[entry - 1][i]) != SMP_BR_SM_NO_ACTION)
389 (*smp_br_sm_action[action])(p_cb, (tSMP_INT_DATA *)p_data);
/system/bt/btif/src/
H A Dbtif_gatt_client.c140 uint8_t action; member in struct:__anon657
160 uint8_t action; member in struct:__anon658
197 uint8_t action; member in struct:__anon659
798 HAL_CBACK(bt_gatt_callbacks, client->scan_filter_cfg_cb, p_btif_cb->action,
808 p_data->action, p_data->avbl_space, p_data->status);
810 , p_data->action, p_data->client_if, p_data->status
819 p_data->action, p_data->status);
821 , p_data->action, p_data->client_if, p_data->status);
914 btif_cb.action = 0;
1087 static void bta_scan_filt_cfg_cb(tBTA_DM_BLE_PF_ACTION action, tBTA_DM_BLE_SCAN_COND_O argument
1115 bta_scan_filt_status_cb(UINT8 action, tBTA_STATUS status, tBTA_DM_BLE_REF_VALUE ref_value) argument
2124 btif_gattc_scan_filter_add_remove(int client_if, int action, int filt_type, int filt_index, int company_id, int company_id_mask, const bt_uuid_t *p_uuid, const bt_uuid_t *p_uuid_mask, const bt_bdaddr_t *bd_addr, char addr_type, int data_len, char* p_data, int mask_len, char* p_mask) argument
2183 int action = 0; local
[all...]
/system/bt/bta/dm/
H A Dbta_dm_main.c43 /* type for action functions */
46 /* action function list */
127 /* state machine action enumeration list */
155 /* action function list */
308 /* execute action functions */
347 UINT8 action; local
359 /* execute action functions */
362 if ((action = state_table[p_msg->event & 0x00ff][i]) != BTA_DM_SEARCH_IGNORE)
364 (*bta_dm_search_action[action])( (tBTA_DM_MSG*) p_msg);
H A Dbta_dm_api.c1663 ** Parameters action: to read/write/clear
1673 void BTA_DmBleCfgFilterCondition(tBTA_DM_BLE_SCAN_COND_OP action, argument
1682 APPL_TRACE_API ("BTA_DmBleCfgFilterCondition: %d, %d", action, cond_type);
1719 p_msg->action = action;
1784 UNUSED(action);
1803 ** action - Add, delete or clear
1809 void BTA_DmBleScanFilterSetup(UINT8 action, tBTA_DM_BLE_PF_FILT_INDEX filt_index, argument
1817 APPL_TRACE_API ("BTA_DmBleScanFilterSetup: %d", action);
1826 p_msg->action
1891 BTA_DmEnableScanFilter(UINT8 action, tBTA_DM_BLE_PF_STATUS_CBACK *p_cmpl_cback, tBTA_DM_BLE_REF_VALUE ref_value) argument
[all...]
/system/bt/bta/gatt/
H A Dbta_gattc_main.c40 /* state machine action enumeration list */
76 /* type for action functions */
79 /* action function list */
298 UINT8 action; local
319 /* execute action functions */
322 if ((action = state_table[event][i]) != BTA_GATTC_IGNORE)
324 (*bta_gattc_action[action])(p_clcb, p_data);
/system/bt/stack/mcap/
H A Dmca_csm.c53 /* action function list */
70 #define MCA_CCB_ACT_COL 0 /* position of action function */
181 ** It uses the state and action function tables to execute
182 ** action functions.
190 UINT8 action; local
204 /* execute action functions */
205 if ((action = state_table[event][MCA_CCB_ACT_COL]) != MCA_CCB_IGNORE)
207 (*mca_ccb_action[action])(p_ccb, p_data);
314 /* non-NULL -> an action function -> report disconnect event */
H A Dmca_dsm.c47 /* action function list */
60 #define MCA_DCB_ACT_COL 0 /* position of action function */
131 ** It uses the state and action function tables to execute
132 ** action functions.
140 UINT8 action; local
156 /* execute action functions */
157 if ((action = state_table[event][MCA_DCB_ACT_COL]) != MCA_DCB_IGNORE)
159 (*mca_dcb_action[action])(p_dcb, p_data);
266 /* non-NULL -> an action function -> report disconnect event */
/system/bt/stack/avdt/
H A Davdt_ccb.c84 /* action function list */
301 UINT8 action; local
316 /* execute action functions */
319 if ((action = state_table[event][i]) != AVDT_CCB_IGNORE)
321 (*avdt_cb.p_ccb_act[action])(p_ccb, p_data);

Completed in 437 milliseconds

12