/external/e2fsprogs/misc/ |
uuidd.rc | 8 # Short-Description: uuidd daemon 9 # Description: Init script for the uuid generation daemon 17 DAEMON=/usr/sbin/uuidd 20 test -x $DAEMON || exit 0 27 start_daemon -p $PIDFILE $DAEMON 32 killproc -p $PIDFILE $DAEMON 36 if pidofproc -p $PIDFILE $DAEMON >& /dev/null ; then 37 echo "$DAEMON is running"; 40 echo "$DAEMON is NOT running";
|
uuidd.8.in | 7 uuidd \- UUID generation daemon 45 daemon is used by the UUID library to generate 54 in debugging mode. This prevents uuidd from running as a daemon. 57 If a currently uuidd daemon is running, kill it. 76 Test uuidd by trying to connect to a running uuidd daemon and 80 Test uuidd by trying to connect to a running uuidd daemon and 90 daemon was written by Theodore Ts'o <tytso@mit.edu>.
|
/external/dnsmasq/src/ |
dnsmasq.c | 19 struct daemon *daemon; variable in typeref:struct:daemon 117 if (daemon->edns_pktsz < PACKETSZ) 118 daemon->edns_pktsz = PACKETSZ; 119 daemon->packet_buff_sz = daemon->edns_pktsz > DNSMASQ_PACKETSZ ? 120 daemon->edns_pktsz : DNSMASQ_PACKETSZ; 121 daemon->packet = safe_malloc(daemon->packet_buff_sz); 124 if (!daemon->lease_file [all...] |
forward.c | 126 for (serv = daemon->servers; serv; serv=serv->next) 184 (daemon->options & OPT_NODOTS_LOCAL) && !strchr(qdomain, '.') && namelen != 0) 211 unsigned int crc = questions_crc(header, plen, daemon->namebuff); 213 unsigned short gotname = extract_request(header, plen, daemon->namebuff, NULL); 217 if (!daemon->servers) 224 if (!(daemon->options & OPT_ORDER)) 227 daemon->last_server = NULL; 231 start = daemon->servers; /* at end of list, recycle */ 237 flags = search_servers(now, &addrp, gotname, daemon->namebuff, &type, &domain); 263 if (type != 0 || (daemon->options & OPT_ORDER) [all...] |
netlink.c | 54 if ((daemon->netlinkfd = socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE)) != -1) 56 if (bind(daemon->netlinkfd, (struct sockaddr *)&addr, sizeof(addr)) == -1) 59 if (errno != EPERM || bind(daemon->netlinkfd, (struct sockaddr *)&addr, sizeof(addr)) == -1) 60 daemon->netlinkfd = -1; 64 if (daemon->netlinkfd == -1 || 65 getsockname(daemon->netlinkfd, (struct sockaddr *)&addr, &slen) == 1) 91 while ((rc = recvmsg(daemon->netlinkfd, &msg, MSG_PEEK | MSG_TRUNC)) == -1 && errno == EINTR); 108 while ((rc = recvmsg(daemon->netlinkfd, &msg, 0)) == -1 && errno == EINTR); 152 while((len = sendto(daemon->netlinkfd, (void *)&req, sizeof(req), 0, 243 if ((flags = fcntl(daemon->netlinkfd, F_GETFL)) == -1 | [all...] |
lease.c | 34 daemon->dhcp_buff = safe_malloc(256); 35 daemon->dhcp_buff2 = safe_malloc(256); 37 leases_left = daemon->dhcp_max; 39 if (daemon->options & OPT_LEASE_RO) 46 if (daemon->lease_change_command) 48 strcpy(daemon->dhcp_buff, daemon->lease_change_command); 49 strcat(daemon->dhcp_buff, " init"); 50 leasestream = popen(daemon->dhcp_buff, "r"); 63 leasestream = daemon->lease_stream = fopen(daemon->lease_file, "a+") [all...] |
tftp.c | 44 char *packet = daemon->packet; 53 int port = daemon->start_tftp_port; /* may be zero to use ephemeral port */ 78 iov.iov_len = daemon->packet_buff_sz; 81 daemon->srv_save = NULL; 86 if (daemon->options & OPT_NOWILD) 129 for (tmp = daemon->dhcp_except; tmp; tmp = tmp->next) 172 if (errno == EADDRINUSE && daemon->start_tftp_port != 0) 174 if (++port <= daemon->end_tftp_port) 205 !(daemon->options & OPT_TFTP_NOBLOCK)) 210 if (transfer->blocksize > (unsigned)daemon->packet_buff_sz - 4 [all...] |
option.c | 35 { "daemon", LOG_DAEMON }, 116 { "no-daemon", 0, 0, 'd' }, 299 { '8', ARG_ONE, "<facilty>|<file>", gettext_noop("Log to this syslog facility or file. (defaults to DAEMON)"), NULL }, 587 r->next = daemon->txt; 588 daemon->txt = r; 962 new->next = daemon->dhcp_match; 963 daemon->dhcp_match = new; 968 new->next = daemon->dhcp_opts; 969 daemon->dhcp_opts = new; [all...] |
network.c | 64 for (bridge = daemon->bridges; bridge; bridge = bridge->next) 88 if (daemon->if_names || (addr && daemon->if_addrs)) 92 for (tmp = daemon->if_names; tmp; tmp = tmp->next) 96 for (tmp = daemon->if_addrs; tmp; tmp = tmp->next) 111 for (tmp = daemon->if_except; tmp; tmp = tmp->next) 155 if (daemon->if_names && loopback) 158 for (lo = daemon->if_names; lo; lo = lo->next) 171 lo->next = daemon->if_names; 172 daemon->if_names = lo [all...] |
dbus.c | 69 for (w = daemon->watches; w; w = w->next) 77 w->next = daemon->watches; 78 daemon->watches = w; 88 for (up = &(daemon->watches), w = daemon->watches; w; w = w->next) 110 for (serv = daemon->servers; serv; serv = serv->next) 132 source_addr.in.sin_port = htons(daemon->query_port); 163 source_addr.in6.sin6_port = htons(daemon->query_port); 184 for (serv = daemon->servers; serv; serv = serv->next) 217 serv->next = daemon->servers [all...] |
dhcp.c | 57 if (daemon->options & OPT_NOWILD) 70 saddr.sin_port = htons(daemon->dhcp_server_port); 79 daemon->dhcpfd = fd; 86 if (daemon->options & OPT_NO_PING) 87 daemon->dhcp_icmp_fd = -1; 88 else if ((daemon->dhcp_icmp_fd = make_icmp_sock()) == -1 || 89 setsockopt(daemon->dhcp_icmp_fd, SOL_SOCKET, SO_RCVBUF, &oneopt, sizeof(oneopt)) == -1 ) 98 daemon->dhcp_packet.iov_len = sizeof(struct dhcp_packet); 99 daemon->dhcp_packet.iov_base = safe_malloc(daemon->dhcp_packet.iov_len) [all...] |
/external/oprofile/daemon/ |
opd_pipe.h | 2 * @file daemon/opd_pipe.h 18 * Creates the Oprofile daemon fifo pipe to enable communication between 19 * the daemon and the 'opcontrol --dump' command. Failure to create the pipe 32 * Closes the Oprofile daemon fifo pipe. 39 * Checks the Oprofile daemon fifo pipe for do_jitconv request.
|
opd_stats.h | 2 * @file daemon/opd_stats.h 3 * Management of daemon statistics
|
/external/bluetooth/bluez/compat/ |
hidd.1 | 2 .TH HIDD "1" "May 2004" "hidd - Bluetooth HID daemon" "User Commands" 4 hidd \- Bluetooth HID daemon 6 hidd - Bluetooth HID daemon 19 Don't fork daemon to background
|
dund.1 | 2 .TH BlueZ "1" "February 2003" "DUN daemon" "User Commands" 4 dund \- BlueZ Bluetooth dial-up networking daemon 6 DUN daemon 57 Do not become a daemon 63 Location of the PPP daemon (pppd)
|
pand.1 | 2 .TH BlueZ "1" "February 2003" "PAN daemon" "User Commands" 4 pand \- BlueZ Bluetooth PAN daemon 6 The pand PAN daemon allows your computer to connect to ethernet 55 Do not become a daemon
|
/external/dbus/bus/ |
rc.messagebus.in | 6 # description: This is a daemon which broadcasts notifications of system events \ 9 # processname: dbus-daemon 14 #[ -x @EXPANDED_BINDIR@/dbus-daemon ] || exit 0 20 #processname=dbus-daemon 31 if [ -x @EXPANDED_BINDIR@/dbus-daemon ];then 32 @EXPANDED_BINDIR@/dbus-daemon --system 34 #daemon --check $servicename $processname --system 46 killall dbus-daemon
|
messagebus.in | 6 # description: This is a daemon which broadcasts notifications of system events \ 9 # processname: dbus-daemon 14 [ -x @EXPANDED_BINDIR@/dbus-daemon ] || exit 0 20 processname=dbus-daemon 31 daemon --check $servicename $processname --system
|
Android.mk | 12 LOCAL_CFLAGS+=-DDAEMON_NAME=\"dbus-daemon\" 39 LOCAL_MODULE:=dbus-daemon
|
/external/dropbear/debian/ |
dropbear.init | 7 DAEMON=/usr/sbin/dropbear 19 test -x "$DAEMON" || cancel "$DAEMON does not exist or is not executable." 34 start-stop-daemon --start --quiet --pidfile /var/run/"$NAME".pid \ 35 --exec "$DAEMON" -- -d "$DROPBEAR_DSSKEY" -r "$DROPBEAR_RSAKEY" \ 41 start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/"$NAME".pid 47 start-stop-daemon --stop --quiet --oknodo --pidfile /var/run/"$NAME".pid 49 start-stop-daemon --start --quiet --pidfile /var/run/"$NAME".pid \ 50 --exec "$DAEMON" -- -d "$DROPBEAR_DSSKEY" -r "$DROPBEAR_RSAKEY" \
|
/external/dnsmasq/contrib/try-all-ns/ |
dnsmasq-2.47_no_nxdomain_until_end.patch | 9 + if ( (header->rcode == NXDOMAIN) && ((daemon->options & OPT_ORDER) != 0) && (server->next != NULL) ) 13 - !(daemon->options & OPT_ORDER) && 14 + ((daemon->options & OPT_ORDER) != 0) &&
|
/frameworks/base/core/java/android/os/ |
SystemService.java | 22 /** Request that the init daemon start a named service. */ 27 /** Request that the init daemon stop a named service. */
|
/external/oprofile/libop/ |
op_config_24.h | 27 * we don't try to wake-up daemon until it remains more than this free entry 34 /** minimal buffer water mark before we try to wakeup daemon */ 44 * we don't try to wake-up daemon until it remains more than this free entry 51 /** minimal note buffer water mark before we try to wakeup daemon */
|
/external/qemu/docs/ |
ANDROID-QEMUD.TXT | 1 THE ANDROID "QEMUD" MULTIPLEXING DAEMON 6 The Android system image includes a small daemon program named "qemud" 54 'qemud' daemon started at boot by /system/etc/init.goldfish.rc 56 The daemon also opens an emulated serial port (e.g. /dev/ttyS1) and 76 Where each client gets a 'channel' number allocated by the daemon 87 Channel 0 is reserved for control messages between the daemon and the 91 name to the daemon, the later sends to the emulator: 115 But if the client disconnects from the socket, the daemon will 121 a client, the emulator will send to the daemon (on channel 0): 125 The daemon deals with this gracefully (e.g. it will wait that th [all...] |
/external/bluetooth/bluez/doc/ |
agent-api.txt | 17 This method gets called when the service daemon 25 This method gets called when the service daemon 36 This method gets called when the service daemon 47 This method gets called when the service daemon 62 This method gets called when the service daemon 73 This method gets called when the service daemon 84 This method gets called when the service daemon
|