/system/bt/bta/gatt/ |
D | database_builder.cc | 40 if (database.services.empty() || in AddService() 41 database.services.back().end_handle < handle) { in AddService() 42 database.services.emplace_back(Service{ in AddService() 49 auto& vec = database.services; in AddService() 71 Service* service = FindService(database.services, handle); in AddIncludedService() 79 if (!FindService(database.services, start_handle)) { in AddIncludedService() 93 Service* service = FindService(database.services, handle); in AddCharacteristic() 114 Service* service = FindService(database.services, handle); in AddDescriptor() 163 Service* service = FindService(database.services, pending_service.first); in NextDescriptorRangeToExplore() 195 Descriptor* FindDescriptorByHandle(std::list<Service>& services, in FindDescriptorByHandle() argument [all …]
|
D | database.h | 106 bool IsEmpty() const { return services.empty(); } in IsEmpty() 110 void Clear() { std::list<Service>().swap(services); } in Clear() 113 const std::list<Service>& Services() const { return services; } in Services() 128 std::list<Service> services; 133 Service* FindService(std::list<Service>& services, uint16_t handle);
|
D | database.cc | 51 Service* FindService(std::list<Service>& services, uint16_t handle) { in FindService() argument 52 for (Service& service : services) { in FindService() 63 for (const Service& service : services) { in ToString() 93 if (services.empty()) return std::vector<StoredAttribute>(); in Serialize() 95 for (const Service& service : services) { in Serialize() 103 for (const Service& service : services) { in Serialize() 145 result.services.emplace_back(Service{ in Deserialize() 153 auto current_service_it = result.services.begin(); in Deserialize() 159 while (current_service_it != result.services.end() && in Deserialize() 164 if (current_service_it == result.services.end() || in Deserialize() [all …]
|
/system/core/toolbox/ |
D | start.cpp | 39 std::vector<std::string> services = { in ControlDefaultServices() local 49 services.emplace_back("zygote_secondary"); in ControlDefaultServices() 53 for (const auto& service : services) { in ControlDefaultServices() 57 for (auto it = services.crbegin(); it != services.crend(); ++it) { in ControlDefaultServices()
|
/system/bt/bta/ag/ |
D | bta_ag_rfc.cc | 239 void bta_ag_start_servers(tBTA_AG_SCB* p_scb, tBTA_SERVICE_MASK services) { in bta_ag_start_servers() argument 240 services >>= BTA_HSP_SERVICE_ID; in bta_ag_start_servers() 241 for (int i = 0; i < BTA_AG_NUM_IDX && services != 0; i++, services >>= 1) { in bta_ag_start_servers() 243 if (services & 1) { in bta_ag_start_servers() 246 << "invalid callback index, services=" << loghex(services) in bta_ag_start_servers() 251 << "callback index out of bound, services=" << loghex(services) in bta_ag_start_servers() 264 << ", services=" << loghex(services) in bta_ag_start_servers() 268 __func__, p_scb, services, management_callback_index); in bta_ag_start_servers() 283 void bta_ag_close_servers(tBTA_AG_SCB* p_scb, tBTA_SERVICE_MASK services) { in bta_ag_close_servers() argument 284 services >>= BTA_HSP_SERVICE_ID; in bta_ag_close_servers() [all …]
|
D | bta_ag_sdp.cc | 213 tBTA_SERVICE_MASK services; in bta_ag_create_records() local 215 services = p_scb->reg_services >> BTA_HSP_SERVICE_ID; in bta_ag_create_records() 216 for (i = 0; i < BTA_AG_NUM_IDX && services != 0; i++, services >>= 1) { in bta_ag_create_records() 218 if (services & 1) { in bta_ag_create_records() 244 tBTA_SERVICE_MASK services; in bta_ag_del_records() local 260 services = p_scb->reg_services >> BTA_HSP_SERVICE_ID; in bta_ag_del_records() 261 for (i = 0; i < BTA_AG_NUM_IDX && services != 0; in bta_ag_del_records() 262 i++, services >>= 1, others >>= 1) { in bta_ag_del_records() 265 if (((services & 1) == 1) && ((others & 1) == 0)) { in bta_ag_del_records()
|
/system/chre/chpp/clients/ |
D | discovery.c | 134 chppFindMatchingClient(context, &response->services[i]); in chppDiscoveryProcessDiscoverAll() 137 chppUuidToStr(response->services[i].uuid, uuidText); in chppDiscoveryProcessDiscoverAll() 143 CHPP_SERVICE_HANDLE_OF_INDEX(i), response->services[i].name, uuidText, in chppDiscoveryProcessDiscoverAll() 144 response->services[i].version.major, in chppDiscoveryProcessDiscoverAll() 145 response->services[i].version.minor, in chppDiscoveryProcessDiscoverAll() 146 response->services[i].version.patch); in chppDiscoveryProcessDiscoverAll() 156 CHPP_SERVICE_HANDLE_OF_INDEX(i), response->services[i].name, uuidText, in chppDiscoveryProcessDiscoverAll() 163 response->services[i].version.major, in chppDiscoveryProcessDiscoverAll() 164 response->services[i].version.minor, in chppDiscoveryProcessDiscoverAll() 165 response->services[i].version.patch); in chppDiscoveryProcessDiscoverAll() [all …]
|
/system/chre/chpp/ |
D | Android.bp | 70 "services.c", 81 "services/discovery.c", 82 "services/loopback.c", 83 "services/nonhandle.c", 84 "services/timesync.c", 85 "services/gnss.c", 86 "services/wifi.c", 87 "services/wwan.c",
|
/system/bt/gd/rust/facade/src/ |
D | lib.rs | 78 let mut services = Vec::new(); in start() localVariable 81 services.push(stack.get_grpc::<HciHalFacadeService>().await); in start() 84 services.push(stack.get_grpc::<HciFacadeService>().await); in start() 87 services.push(stack.get_grpc::<HciFacadeService>().await); in start() 88 services.push(stack.get_grpc::<ControllerFacadeService>().await); in start() 95 for service in services { in start()
|
/system/update_engine/init/ |
D | update-engine.conf | 23 start on starting system-services 24 stop on stopping system-services
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | attributes | 70 # services which should be available to all but isolated apps 73 # services which should be available to all ephemeral apps 76 # services which export only system_api 79 # All types used for services managed by servicemanager. 84 # All types used for services managed by hwservicemanager 87 # All HwBinder services guaranteed to be passthrough. These services always run 92 # All HwBinder services guaranteed to be offered only by core domain components 95 # All types used for services managed by vndservicemanager 156 # PDX services 283 # HwBinder services offered across the core-vendor boundary
|
/system/chre/chpp/services/ |
D | discovery.c | 56 context->registeredServiceCount, services); in chppDiscoveryDiscoverAll() 69 response->services[i] = context->registeredServices[i]->descriptor; in chppDiscoveryDiscoverAll()
|
/system/sepolicy/public/ |
D | attributes | 152 # services which should be available to all but isolated apps 155 # services which should be available to all ephemeral apps 158 # services which export only system_api 161 # services which are explicitly disallowed for untrusted apps to access 164 # services which served by vendor and also using the copy of libbinder on 165 # system (for instance via libbinder_ndk). services using a different copy 170 # All types used for services managed by servicemanager. 175 # All types used for services managed by hwservicemanager 178 # All HwBinder services guaranteed to be passthrough. These services always run 183 # All HwBinder services guaranteed to be offered only by core domain components [all …]
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | attributes | 152 # services which should be available to all but isolated apps 155 # services which should be available to all ephemeral apps 158 # services which export only system_api 161 # services which are explicitly disallowed for untrusted apps to access 164 # services which served by vendor and also using the copy of libbinder on 165 # system (for instance via libbinder_ndk). services using a different copy 170 # All types used for services managed by servicemanager. 175 # All types used for services managed by hwservicemanager 178 # All HwBinder services guaranteed to be passthrough. These services always run 183 # All HwBinder services guaranteed to be offered only by core domain components [all …]
|
/system/sepolicy/private/ |
D | atrace.te | 6 # boottrace services uses /data/misc/boottrace/categories 26 # Allow discovery of binder services. 44 # Allow notifying the processes hosting specific binder services that 62 # Remove logspam from notification attempts to non-allowlisted services.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | atrace.te | 6 # boottrace services uses /data/misc/boottrace/categories 26 # Allow discovery of binder services. 44 # Allow notifying the processes hosting specific binder services that 62 # Remove logspam from notification attempts to non-allowlisted services.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | atrace.te | 7 # boottrace services uses /data/misc/boottrace/categories 27 # Allow discovery of binder services. 44 # Allow notifying the processes hosting specific binder services that 62 # Remove logspam from notification attempts to non-allowlisted services.
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | attributes | 127 # services which should be available to all but isolated apps 130 # services which should be available to all ephemeral apps 133 # services which export only system_api 136 # services which served by vendor and also using the copy of libbinder on 137 # system (for instance via libbinder_ndk). services using a different copy 142 # All types used for services managed by servicemanager. 147 # All types used for services managed by hwservicemanager 150 # All HwBinder services guaranteed to be passthrough. These services always run 155 # All HwBinder services guaranteed to be offered only by core domain components 158 # All HwBinder services that untrusted apps can't directly access [all …]
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | attributes | 92 # services which should be available to all but isolated apps 95 # services which should be available to all ephemeral apps 98 # services which export only system_api 101 # All types used for services managed by servicemanager. 106 # All types used for services managed by hwservicemanager 109 # All HwBinder services guaranteed to be passthrough. These services always run 114 # All HwBinder services guaranteed to be offered only by core domain components 117 # All types used for services managed by vndservicemanager 217 # PDX services 300 # HwBinder services offered across the core-vendor boundary
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | attributes | 81 # services which should be available to all but isolated apps 84 # services which should be available to all ephemeral apps 87 # services which export only system_api 90 # All types used for services managed by servicemanager. 95 # All types used for services managed by hwservicemanager 98 # All HwBinder services guaranteed to be passthrough. These services always run 103 # All HwBinder services guaranteed to be offered only by core domain components 106 # All types used for services managed by vndservicemanager 201 # PDX services 303 # HwBinder services offered across the core-vendor boundary
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | app_neverallows.te | 24 # Do not allow untrusted apps to register services. 26 # services. 124 # other than find actions for services listed below 127 # Do not permit access from apps which host arbitrary code to HwBinder services, 132 # HwBinder services either operate at a level below that of apps (e.g., HALs) 136 # 2. HAL servers (a subset of HwBinder services) contain code with higher 141 # Safe services include: 142 # - same process services: because they by definition run in the process 164 # Make sure that the following services are never accessible by untrusted_apps 203 # HwBinder services offered by core components (as opposed to vendor components)
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | app_neverallows.te | 19 # Do not allow untrusted apps to register services. 21 # services. 119 # other than find actions for services listed below 122 # Do not permit access from apps which host arbitrary code to HwBinder services, 127 # HwBinder services either operate at a level below that of apps (e.g., HALs) 131 # 2. HAL servers (a subset of HwBinder services) contain code with higher 136 # Safe services include: 137 # - same process services: because they by definition run in the process 158 # Make sure that the following services are never accessible by untrusted_apps 193 # HwBinder services offered by core components (as opposed to vendor components)
|
D | binderservicedomain.te | 3 # Allow dumpstate and incidentd to collect information from binder services 17 # allow all services to run permission checks
|
/system/libhwbinder/vts/performance/ |
D | Benchmark_throughput.cpp | 312 int services = -1; in main() local 338 services = atoi(argv[i + 1]); in main() 344 if (services == -1) { in main() 345 services = workers; in main() 350 for (int i = 0; i < services; i++) { in main() 362 worker_pipes.push_back(make_worker(i, iterations, services, get_stub)); in main() 396 for (int i = 0; i < services; i++) { in main()
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | binderservicedomain.te | 3 # Allow dumpstate and incidentd to collect information from binder services 17 # allow all services to run permission checks
|