/system/bt/bta/gatt/ |
D | database_builder.cc | 33 if (database.services.empty() || in AddService() 34 database.services.back().end_handle < handle) { in AddService() 35 database.services.emplace_back(Service{.handle = handle, in AddService() 40 auto& vec = database.services; in AddService() 60 Service* service = FindService(database.services, handle); in AddIncludedService() 68 if (!FindService(database.services, start_handle)) { in AddIncludedService() 82 Service* service = FindService(database.services, handle); in AddCharacteristic() 102 Service* service = FindService(database.services, handle); in AddDescriptor() 146 Service* service = FindService(database.services, pending_service.first); in NextDescriptorRangeToExplore() 178 bool DatabaseBuilder::InProgress() const { return !database.services.empty(); } in InProgress()
|
D | database.cc | 43 Service* FindService(std::list<Service>& services, uint16_t handle) { in FindService() argument 44 for (Service& service : services) { in FindService() 55 for (const Service& service : services) { in ToString() 85 if (services.empty()) return std::vector<StoredAttribute>(); in Serialize() 87 for (const Service& service : services) { in Serialize() 95 for (const Service& service : services) { in Serialize() 130 result.services.emplace_back( in Deserialize() 137 auto current_service_it = result.services.begin(); in Deserialize() 143 while (current_service_it != result.services.end() && in Deserialize() 148 if (current_service_it == result.services.end() || in Deserialize() [all …]
|
D | database.h | 101 bool IsEmpty() const { return services.empty(); } in IsEmpty() 105 void Clear() { std::list<Service>().swap(services); } in Clear() 108 const std::list<Service>& Services() const { return services; } in Services() 120 std::list<Service> services; 125 Service* FindService(std::list<Service>& services, uint16_t handle);
|
D | bta_gattc_cache.cc | 123 const std::list<Service>& services, uint16_t handle) { in bta_gattc_find_matching_service() argument 124 for (const Service& service : services) { in bta_gattc_find_matching_service() 440 const std::list<Service>* services = bta_gattc_get_services_srcb(p_srcb); in bta_gattc_get_service_for_handle_srcb() local 441 if (services == NULL) return NULL; in bta_gattc_get_service_for_handle_srcb() 442 return bta_gattc_find_matching_service(*services, handle); in bta_gattc_get_service_for_handle_srcb() 447 const std::list<Service>* services = bta_gattc_get_services(conn_id); in bta_gattc_get_service_for_handle() local 448 if (services == NULL) return NULL; in bta_gattc_get_service_for_handle() 450 return bta_gattc_find_matching_service(*services, handle); in bta_gattc_get_service_for_handle() 558 static size_t bta_gattc_get_db_size(const std::list<Service>& services, in bta_gattc_get_db_size() argument 561 if (services.empty()) return 0; in bta_gattc_get_db_size() [all …]
|
/system/bt/bta/ag/ |
D | bta_ag_rfc.cc | 245 void bta_ag_start_servers(tBTA_AG_SCB* p_scb, tBTA_SERVICE_MASK services) { in bta_ag_start_servers() argument 246 services >>= BTA_HSP_SERVICE_ID; in bta_ag_start_servers() 247 for (int i = 0; i < BTA_AG_NUM_IDX && services != 0; i++, services >>= 1) { in bta_ag_start_servers() 249 if (services & 1) { in bta_ag_start_servers() 255 << "invalid callback index, services=" << loghex(services) in bta_ag_start_servers() 260 << "callback index out of bound, services=" << loghex(services) in bta_ag_start_servers() 271 << ", p_scb=" << p_scb << ", services=" << loghex(services) in bta_ag_start_servers() 275 __func__, p_scb, services, management_callback_index); in bta_ag_start_servers() 290 void bta_ag_close_servers(tBTA_AG_SCB* p_scb, tBTA_SERVICE_MASK services) { in bta_ag_close_servers() argument 291 services >>= BTA_HSP_SERVICE_ID; in bta_ag_close_servers() [all …]
|
D | bta_ag_sdp.cc | 216 tBTA_SERVICE_MASK services; in bta_ag_create_records() local 218 services = p_scb->reg_services >> BTA_HSP_SERVICE_ID; in bta_ag_create_records() 219 for (i = 0; i < BTA_AG_NUM_IDX && services != 0; i++, services >>= 1) { in bta_ag_create_records() 221 if (services & 1) { in bta_ag_create_records() 247 tBTA_SERVICE_MASK services; in bta_ag_del_records() local 263 services = p_scb->reg_services >> BTA_HSP_SERVICE_ID; in bta_ag_del_records() 264 for (i = 0; i < BTA_AG_NUM_IDX && services != 0; in bta_ag_del_records() 265 i++, services >>= 1, others >>= 1) { in bta_ag_del_records() 268 if (((services & 1) == 1) && ((others & 1) == 0)) { in bta_ag_del_records()
|
/system/update_engine/init/ |
D | update-engine.conf | 23 start on starting system-services 24 stop on stopping system-services
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | attributes | 70 # services which should be available to all but isolated apps 73 # services which should be available to all ephemeral apps 76 # services which export only system_api 79 # All types used for services managed by servicemanager. 84 # All types used for services managed by hwservicemanager 87 # All HwBinder services guaranteed to be passthrough. These services always run 92 # All HwBinder services guaranteed to be offered only by core domain components 95 # All types used for services managed by vndservicemanager 156 # PDX services 283 # HwBinder services offered across the core-vendor boundary
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | atrace.te | 7 # boottrace services uses /data/misc/boottrace/categories 27 # Allow discovery of binder services. 43 # Allow notifying the processes hosting specific binder services that 60 # Remove logspam from notification attempts to non-whitelisted services.
|
D | binderservicedomain.te | 3 # Allow dumpstate and incidentd to collect information from binder services 17 # allow all services to run permission checks
|
/system/sepolicy/private/ |
D | atrace.te | 7 # boottrace services uses /data/misc/boottrace/categories 27 # Allow discovery of binder services. 43 # Allow notifying the processes hosting specific binder services that 60 # Remove logspam from notification attempts to non-whitelisted services.
|
D | binderservicedomain.te | 3 # Allow dumpstate and incidentd to collect information from binder services 17 # allow all services to run permission checks
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | attributes | 92 # services which should be available to all but isolated apps 95 # services which should be available to all ephemeral apps 98 # services which export only system_api 101 # All types used for services managed by servicemanager. 106 # All types used for services managed by hwservicemanager 109 # All HwBinder services guaranteed to be passthrough. These services always run 114 # All HwBinder services guaranteed to be offered only by core domain components 117 # All types used for services managed by vndservicemanager 217 # PDX services 300 # HwBinder services offered across the core-vendor boundary
|
/system/sepolicy/public/ |
D | attributes | 92 # services which should be available to all but isolated apps 95 # services which should be available to all ephemeral apps 98 # services which export only system_api 101 # All types used for services managed by servicemanager. 106 # All types used for services managed by hwservicemanager 109 # All HwBinder services guaranteed to be passthrough. These services always run 114 # All HwBinder services guaranteed to be offered only by core domain components 117 # All types used for services managed by vndservicemanager 217 # PDX services 300 # HwBinder services offered across the core-vendor boundary
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | attributes | 81 # services which should be available to all but isolated apps 84 # services which should be available to all ephemeral apps 87 # services which export only system_api 90 # All types used for services managed by servicemanager. 95 # All types used for services managed by hwservicemanager 98 # All HwBinder services guaranteed to be passthrough. These services always run 103 # All HwBinder services guaranteed to be offered only by core domain components 106 # All types used for services managed by vndservicemanager 201 # PDX services 303 # HwBinder services offered across the core-vendor boundary
|
D | audioserver.te | 1 # audioserver - audio services daemon
|
/system/bt/bta/dm/ |
D | bta_dm_api.cc | 127 void BTA_DmSearch(tBTA_DM_INQ* p_dm_inq, tBTA_SERVICE_MASK services, in BTA_DmSearch() argument 134 p_msg->services = services; in BTA_DmSearch() 169 void BTA_DmDiscover(const RawAddress& bd_addr, tBTA_SERVICE_MASK services, in BTA_DmDiscover() argument 176 p_msg->services = services; in BTA_DmDiscover() 201 p_msg->services = BTA_USER_SERVICE_MASK; // Not exposed at API level in BTA_DmDiscoverUUID() 597 p_msg->services = p_services->srvc_mask; in bta_dm_discover_send_msg() 688 p_msg->services = p_services->srvc_mask; in BTA_DmSearchExt()
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | app_neverallows.te | 19 # Do not allow untrusted apps to register services. 21 # services. 119 # other than find actions for services listed below 122 # Do not permit access from apps which host arbitrary code to HwBinder services, 127 # HwBinder services either operate at a level below that of apps (e.g., HALs) 131 # 2. HAL servers (a subset of HwBinder services) contain code with higher 136 # Safe services include: 137 # - same process services: because they by definition run in the process 158 # Make sure that the following services are never accessible by untrusted_apps 193 # HwBinder services offered by core components (as opposed to vendor components)
|
D | binderservicedomain.te | 3 # Allow dumpstate and incidentd to collect information from binder services 17 # allow all services to run permission checks
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | app_neverallows.te | 24 # Do not allow untrusted apps to register services. 26 # services. 124 # other than find actions for services listed below 127 # Do not permit access from apps which host arbitrary code to HwBinder services, 132 # HwBinder services either operate at a level below that of apps (e.g., HALs) 136 # 2. HAL servers (a subset of HwBinder services) contain code with higher 141 # Safe services include: 142 # - same process services: because they by definition run in the process 164 # Make sure that the following services are never accessible by untrusted_apps 203 # HwBinder services offered by core components (as opposed to vendor components)
|
D | binderservicedomain.te | 3 # Allow dumpstate and incidentd to collect information from binder services 17 # allow all services to run permission checks
|
/system/libhwbinder/vts/performance/ |
D | Benchmark_throughput.cpp | 311 int services = -1; in main() local 337 services = atoi(argv[i + 1]); in main() 343 if (services == -1) { in main() 344 services = workers; in main() 349 for (int i = 0; i < services; i++) { in main() 361 worker_pipes.push_back(make_worker(i, iterations, services, get_stub)); in main() 395 for (int i = 0; i < services; i++) { in main()
|
/system/core/adb/ |
D | OVERVIEW.TXT | 12 DDMS). These commands are called 'services' in ADB. 28 services and devices. 36 few services for clients that run on the host. 60 There are essentially two kinds of services that a client can talk to. 63 These services run within the ADB Server and thus do not need to 66 states. They are a few other services though. 69 These services either run within the adbd daemon, or are started by 115 The file SERVICES.TXT lists all services currently implemented by ADB.
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | binderservicedomain.te | 3 # Allow dumpstate and incidentd to collect information from binder services 17 # allow all services to run permission checks
|
D | app_neverallows.te | 25 # Do not allow untrusted apps to register services. 27 # services. 147 # other than find actions for services listed below 150 # Do not permit access from apps which host arbitrary code to HwBinder services, 155 # HwBinder services either operate at a level below that of apps (e.g., HALs) 159 # 2. HAL servers (a subset of HwBinder services) contain code with higher 164 # Safe services include: 165 # - same process services: because they by definition run in the process 190 # Make sure that the following services are never accessible by untrusted_apps 231 # HwBinder services offered by core components (as opposed to vendor components)
|