/system/core/init/ |
H A D | init_parser.h | 22 struct action; 25 struct action *action_remove_queue_head(void); 26 void action_add_queue_tail(struct action *act); 28 void (*func)(struct action *act));
|
H A D | init.h | 30 /* list of commands in an action */ 47 struct action { struct 120 struct action onrestart; /* Actions to execute on restart. */ 141 void build_triggers_string(char *name_str, int length, struct action *cur_action);
|
H A D | init_parser.cpp | 96 action* act = node_to_item(node, struct action, alist); 546 void (*func)(struct action *act)) 549 struct action *act; 553 act = node_to_item(node, struct action, alist); 567 struct action *act; 573 act = node_to_item(node, struct action, alist); 625 action* act = (action*) calloc(1, sizeof(*act)); 643 void action_add_queue_tail(struct action *ac [all...] |
H A D | devices.cpp | 61 const char *action; member in struct:uevent 359 uevent->action = ""; 373 uevent->action = msg; 407 uevent->action, uevent->path, uevent->subsystem, 524 static void handle_device(const char *action, const char *devpath, argument 529 if(!strcmp(action, "add")) { 537 if(!strcmp(action, "remove")) { 556 if (!strcmp(uevent->action, "add")) 558 else if (!strcmp(uevent->action, "remove")) 603 handle_device(uevent->action, devpat [all...] |
/system/bt/bta/mce/ |
H A D | bta_mce_main.c | 40 /* state machine action enumeration list */ 43 /* type for action functions */ 46 /* action function list */ 68 UINT16 action = (p_msg->event & 0x00ff); local 70 /* execute action functions */ 71 if(action < BTA_MCE_NUM_ACTIONS) 73 (*bta_mce_action[action])((tBTA_MCE_MSG*)p_msg);
|
/system/bt/bta/sdp/ |
H A D | bta_sdp.c | 40 /* state machine action enumeration list */ 43 /* type for action functions */ 46 /* action function list */ 67 UINT16 action = (p_msg->event & 0x00ff); local 69 /* execute action functions */ 70 if(action < BTA_SDP_NUM_ACTIONS) 72 (*bta_sdp_action[action])((tBTA_SDP_MSG*)p_msg);
|
/system/bt/bta/jv/ |
H A D | bta_jv_main.c | 38 /* state machine action enumeration list */ 41 /* type for action functions */ 44 /* action function list */ 88 UINT16 action = (p_msg->event & 0x00ff); local 89 /* execute action functions */ 91 if(action < BTA_JV_NUM_ACTIONS) 93 (*bta_jv_action[action])((tBTA_JV_MSG*)p_msg);
|
/system/netd/server/ |
H A D | NetlinkHandler.cpp | 61 NetlinkEvent::Action action = evt->getAction(); local 64 if (action == NetlinkEvent::Action::kAdd) { 66 } else if (action == NetlinkEvent::Action::kRemove) { 68 } else if (action == NetlinkEvent::Action::kChange) { 71 } else if (action == NetlinkEvent::Action::kLinkUp) { 73 } else if (action == NetlinkEvent::Action::kLinkDown) { 75 } else if (action == NetlinkEvent::Action::kAddressUpdated || 76 action == NetlinkEvent::Action::kAddressRemoved) { 80 if (action == NetlinkEvent::Action::kAddressRemoved && iface && address) { 89 notifyAddressChanged(action, addres 184 notifyAddressChanged(NetlinkEvent::Action action, const char *addr, const char *iface, const char *flags, const char *scope) argument 200 notifyRouteChange(NetlinkEvent::Action action, const char *route, const char *gateway, const char *iface) argument [all...] |
H A D | NetlinkHandler.h | 45 void notifyAddressChanged(NetlinkEvent::Action action, const char *addr, const char *iface, 49 void notifyRouteChange(NetlinkEvent::Action action, const char *route, const char *gateway, const char *iface);
|
H A D | RouteController.cpp | 181 // The netlink header is generated by this function based on |action| and |flags|. 183 WARN_UNUSED_RESULT int sendNetlinkRequest(uint16_t action, uint16_t flags, iovec* iov, int iovlen) { argument 185 .nlmsg_type = action, 246 // action of FR_ACT_UNREACHABLE). Otherwise, the rule specifies an action of FR_ACT_TO_TBL. 257 WARN_UNUSED_RESULT int modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, argument 287 .action = static_cast<uint8_t>(priority != RULE_PRIORITY_UNREACHABLE ? FR_ACT_TO_TBL : 296 if (table == RT_TABLE_UNSPEC && rule.action == FR_ACT_TO_TBL && action != RTM_DELRULE) { 327 uint16_t flags = (action 338 modifyIpRule(uint16_t action, uint32_t priority, uint32_t table, uint32_t fwmark, uint32_t mask) argument 346 modifyIpRoute(uint16_t action, uint32_t table, const char* interface, const char* destination, const char* nexthop) argument 601 modifyVpnFallthroughRule(uint16_t action, unsigned vpnNetId, const char* physicalInterface, Permission permission) argument 795 modifyDefaultNetwork(uint16_t action, const char* interface, Permission permission) argument 815 modifyTetheredNetwork(uint16_t action, const char* inputInterface, const char* outputInterface) argument 846 modifyRoute(uint16_t action, const char* interface, const char* destination, const char* nexthop, RouteController::TableType tableType) argument [all...] |
/system/bt/stack/btm/ |
H A D | btm_ble_adv_filter.c | 40 /* BLE meta vsc header: 1 bytes of sub_code, 1 byte of PCF action */ 55 static UINT8 btm_ble_cs_update_pf_counter(tBTM_BLE_SCAN_COND_OP action, 112 void btm_ble_advfilt_enq_op_q(UINT8 action, UINT8 ocf, tBTM_BLE_FILT_CB_EVT cb_evt, argument 116 btm_ble_adv_filt_cb.op_q.action_ocf[btm_ble_adv_filt_cb.op_q.next_idx] = (action |(ocf << 4)); 122 BTM_TRACE_DEBUG("btm_ble_advfilt_enq_op_q: act_ocf:%d, action:%d, ocf:%d,cb_evt;%d, cback:%x", 123 btm_ble_adv_filt_cb.op_q.action_ocf[btm_ble_adv_filt_cb.op_q.next_idx], action, 154 BTM_TRACE_DEBUG("btm_ble_advfilt_deq_op_q: ocf:%d, action:%d, ref_value:%d, cb_evt:%x", 259 UINT8 *p = p_params->p_param_buf, op_subcode = 0, action = 0xff; local 271 btm_ble_advfilt_deq_op_q(&action, &ocf, &cb_evt, &ref_value, &p_scan_cfg_cback, 276 btm_ble_advfilt_deq_op_q(&action, 457 btm_ble_update_pf_local_name(tBTM_BLE_SCAN_COND_OP action, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_COND_PARAM *p_cond) argument 517 btm_ble_update_srvc_data_change(tBTM_BLE_SCAN_COND_OP action, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_COND_PARAM *p_cond) argument 544 btm_ble_update_pf_manu_data(tBTM_BLE_SCAN_COND_OP action, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_COND_PARAM *p_data, tBTM_BLE_PF_COND_TYPE cond_type, tBTM_BLE_FILT_CB_EVT cb_evt, tBTM_BLE_REF_VALUE ref_value) argument 666 btm_ble_cs_update_pf_counter(tBTM_BLE_SCAN_COND_OP action, UINT8 cond_type, tBLE_BD_ADDR *p_bd_addr, UINT8 num_available) argument 736 btm_ble_update_addr_filter(tBTM_BLE_SCAN_COND_OP action, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_COND_PARAM *p_cond) argument 788 btm_ble_update_uuid_filter(tBTM_BLE_SCAN_COND_OP action, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_COND_TYPE filter_type, tBTM_BLE_PF_COND_PARAM *p_cond, tBTM_BLE_FILT_CB_EVT cb_evt, tBTM_BLE_REF_VALUE ref_value) argument 940 btm_ble_clear_scan_pf_filter(tBTM_BLE_SCAN_COND_OP action, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_COND_PARAM *p_cond, tBTM_BLE_PF_CFG_CBACK *p_cmpl_cback, tBTM_BLE_FILT_CB_EVT cb_evt, tBTM_BLE_REF_VALUE ref_value) argument 1053 BTM_BleAdvFilterParamSetup(int action, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_FILT_PARAMS *p_filt_params, tBLE_BD_ADDR *p_target, tBTM_BLE_PF_PARAM_CBACK *p_cmpl_cback, tBTM_BLE_REF_VALUE ref_value) argument 1236 BTM_BleCfgFilterCondition(tBTM_BLE_SCAN_COND_OP action, tBTM_BLE_PF_COND_TYPE cond_type, tBTM_BLE_PF_FILT_INDEX filt_index, tBTM_BLE_PF_COND_PARAM *p_cond, tBTM_BLE_PF_CFG_CBACK *p_cmpl_cback, tBTM_BLE_REF_VALUE ref_value) argument [all...] |
/system/core/debuggerd/ |
H A D | debuggerd.cpp | 59 debugger_action_t action; member in struct:debugger_request_t 149 static bool selinux_action_allowed(int s, pid_t tid, debugger_action_t action) argument 159 if (action <= 0 || action >= (sizeof(debuggerd_perms)/sizeof(debuggerd_perms[0]))) { 160 ALOGE("SELinux: No permission defined for debugger action %d", action); 164 perm = debuggerd_perms[action]; 218 out_request->action = static_cast<debugger_action_t>(msg.action); 226 if (msg.action [all...] |
/system/core/include/cutils/ |
H A D | debugger.h | 43 int32_t action; member in struct:__anon1323
|
/system/core/libcutils/ |
H A D | debugger.c | 45 static int make_dump_request(debugger_action_t action, pid_t tid, int timeout_secs) { argument 49 msg.action = action;
|
/system/bt/stack/avct/ |
H A D | avct_lcb.c | 70 /* state machine action enumeration list */ 93 /* type for action functions */ 96 /* action function list */ 197 UINT8 action; local 212 /* execute action functions */ 215 if ((action = state_table[event][i]) != AVCT_LCB_IGNORE) 217 (*avct_lcb_action[action])(p_lcb, p_data); 240 UINT8 action; local 255 /* execute action functions */ 258 if ((action [all...] |
/system/bt/doc/ |
H A D | power_management.md | 36 policy is determined by the greatest allowable power action defined across all 38 it's willing to go to into SNIFF and specifies that as an action, and say, a PAN 39 connection is up which specifies it is willing to go into SNIFF, but its action 54 The action constants are defined in `bta_api.h` and are defined as a series of 62 action that `bta_dm_pm_set_mode` will take, the connection will be removed 68 action is still the same, however -- SNIFF mode is attempted. There are 100 returns with no action taken. 104 there's no action to be performed (`BTA_DM_PM_NO_ACTION`), and if so, 105 returns with no action taken. 123 the first power management action did [all...] |
/system/bt/bta/pan/ |
H A D | bta_pan_main.c | 44 /* state machine action enumeration list */ 60 /* type for action functions */ 66 /* action function list */ 201 UINT8 action; local 214 /* execute action functions */ 217 if ((action = state_table[event][i]) != BTA_PAN_IGNORE) 219 (*bta_pan_action[action])(p_scb, p_data);
|
/system/bt/stack/smp/ |
H A D | smp_br_main.c | 326 ** if not NULL state. Execute the action function according to the 327 ** state table. If the state returned by action function is not NULL 337 UINT8 action, entry; local 381 /* If action is not ignore, clear param, exec action and get next state. 382 * The action function may set the Param for cback. 384 /* execute action functions */ 387 if ((action = state_table[entry - 1][i]) != SMP_BR_SM_NO_ACTION) 389 (*smp_br_sm_action[action])(p_cb, (tSMP_INT_DATA *)p_data);
|
/system/bt/btif/src/ |
H A D | btif_gatt_client.c | 140 uint8_t action; member in struct:__anon657 160 uint8_t action; member in struct:__anon658 197 uint8_t action; member in struct:__anon659 798 HAL_CBACK(bt_gatt_callbacks, client->scan_filter_cfg_cb, p_btif_cb->action, 808 p_data->action, p_data->avbl_space, p_data->status); 810 , p_data->action, p_data->client_if, p_data->status 819 p_data->action, p_data->status); 821 , p_data->action, p_data->client_if, p_data->status); 914 btif_cb.action = 0; 1087 static void bta_scan_filt_cfg_cb(tBTA_DM_BLE_PF_ACTION action, tBTA_DM_BLE_SCAN_COND_O argument 1115 bta_scan_filt_status_cb(UINT8 action, tBTA_STATUS status, tBTA_DM_BLE_REF_VALUE ref_value) argument 2124 btif_gattc_scan_filter_add_remove(int client_if, int action, int filt_type, int filt_index, int company_id, int company_id_mask, const bt_uuid_t *p_uuid, const bt_uuid_t *p_uuid_mask, const bt_bdaddr_t *bd_addr, char addr_type, int data_len, char* p_data, int mask_len, char* p_mask) argument 2183 int action = 0; local [all...] |
/system/bt/bta/dm/ |
H A D | bta_dm_main.c | 43 /* type for action functions */ 46 /* action function list */ 127 /* state machine action enumeration list */ 155 /* action function list */ 308 /* execute action functions */ 347 UINT8 action; local 359 /* execute action functions */ 362 if ((action = state_table[p_msg->event & 0x00ff][i]) != BTA_DM_SEARCH_IGNORE) 364 (*bta_dm_search_action[action])( (tBTA_DM_MSG*) p_msg);
|
H A D | bta_dm_api.c | 1663 ** Parameters action: to read/write/clear 1673 void BTA_DmBleCfgFilterCondition(tBTA_DM_BLE_SCAN_COND_OP action, argument 1682 APPL_TRACE_API ("BTA_DmBleCfgFilterCondition: %d, %d", action, cond_type); 1719 p_msg->action = action; 1784 UNUSED(action); 1803 ** action - Add, delete or clear 1809 void BTA_DmBleScanFilterSetup(UINT8 action, tBTA_DM_BLE_PF_FILT_INDEX filt_index, argument 1817 APPL_TRACE_API ("BTA_DmBleScanFilterSetup: %d", action); 1826 p_msg->action 1891 BTA_DmEnableScanFilter(UINT8 action, tBTA_DM_BLE_PF_STATUS_CBACK *p_cmpl_cback, tBTA_DM_BLE_REF_VALUE ref_value) argument [all...] |
/system/bt/bta/gatt/ |
H A D | bta_gattc_main.c | 40 /* state machine action enumeration list */ 76 /* type for action functions */ 79 /* action function list */ 298 UINT8 action; local 319 /* execute action functions */ 322 if ((action = state_table[event][i]) != BTA_GATTC_IGNORE) 324 (*bta_gattc_action[action])(p_clcb, p_data);
|
/system/bt/stack/mcap/ |
H A D | mca_csm.c | 53 /* action function list */ 70 #define MCA_CCB_ACT_COL 0 /* position of action function */ 181 ** It uses the state and action function tables to execute 182 ** action functions. 190 UINT8 action; local 204 /* execute action functions */ 205 if ((action = state_table[event][MCA_CCB_ACT_COL]) != MCA_CCB_IGNORE) 207 (*mca_ccb_action[action])(p_ccb, p_data); 314 /* non-NULL -> an action function -> report disconnect event */
|
H A D | mca_dsm.c | 47 /* action function list */ 60 #define MCA_DCB_ACT_COL 0 /* position of action function */ 131 ** It uses the state and action function tables to execute 132 ** action functions. 140 UINT8 action; local 156 /* execute action functions */ 157 if ((action = state_table[event][MCA_DCB_ACT_COL]) != MCA_DCB_IGNORE) 159 (*mca_dcb_action[action])(p_dcb, p_data); 266 /* non-NULL -> an action function -> report disconnect event */
|
/system/bt/stack/avdt/ |
H A D | avdt_ccb.c | 84 /* action function list */ 301 UINT8 action; local 316 /* execute action functions */ 319 if ((action = state_table[event][i]) != AVDT_CCB_IGNORE) 321 (*avdt_cb.p_ccb_act[action])(p_ccb, p_data);
|