Home
last modified time | relevance | path

Searched refs:services (Results 1 – 25 of 318) sorted by relevance

12345678910>>...13

/system/bt/bta/gatt/
Ddatabase_builder.cc40 if (database.services.empty() || in AddService()
41 database.services.back().end_handle < handle) { in AddService()
42 database.services.emplace_back(Service{ in AddService()
49 auto& vec = database.services; in AddService()
71 Service* service = FindService(database.services, handle); in AddIncludedService()
79 if (!FindService(database.services, start_handle)) { in AddIncludedService()
93 Service* service = FindService(database.services, handle); in AddCharacteristic()
114 Service* service = FindService(database.services, handle); in AddDescriptor()
163 Service* service = FindService(database.services, pending_service.first); in NextDescriptorRangeToExplore()
195 Descriptor* FindDescriptorByHandle(std::list<Service>& services, in FindDescriptorByHandle() argument
[all …]
Ddatabase.h106 bool IsEmpty() const { return services.empty(); } in IsEmpty()
110 void Clear() { std::list<Service>().swap(services); } in Clear()
113 const std::list<Service>& Services() const { return services; } in Services()
128 std::list<Service> services;
133 Service* FindService(std::list<Service>& services, uint16_t handle);
Ddatabase.cc51 Service* FindService(std::list<Service>& services, uint16_t handle) { in FindService() argument
52 for (Service& service : services) { in FindService()
63 for (const Service& service : services) { in ToString()
93 if (services.empty()) return std::vector<StoredAttribute>(); in Serialize()
95 for (const Service& service : services) { in Serialize()
103 for (const Service& service : services) { in Serialize()
145 result.services.emplace_back(Service{ in Deserialize()
153 auto current_service_it = result.services.begin(); in Deserialize()
159 while (current_service_it != result.services.end() && in Deserialize()
164 if (current_service_it == result.services.end() || in Deserialize()
[all …]
/system/core/toolbox/
Dstart.cpp39 std::vector<std::string> services = { in ControlDefaultServices() local
49 services.emplace_back("zygote_secondary"); in ControlDefaultServices()
53 for (const auto& service : services) { in ControlDefaultServices()
57 for (auto it = services.crbegin(); it != services.crend(); ++it) { in ControlDefaultServices()
/system/bt/bta/ag/
Dbta_ag_rfc.cc239 void bta_ag_start_servers(tBTA_AG_SCB* p_scb, tBTA_SERVICE_MASK services) { in bta_ag_start_servers() argument
240 services >>= BTA_HSP_SERVICE_ID; in bta_ag_start_servers()
241 for (int i = 0; i < BTA_AG_NUM_IDX && services != 0; i++, services >>= 1) { in bta_ag_start_servers()
243 if (services & 1) { in bta_ag_start_servers()
246 << "invalid callback index, services=" << loghex(services) in bta_ag_start_servers()
251 << "callback index out of bound, services=" << loghex(services) in bta_ag_start_servers()
264 << ", services=" << loghex(services) in bta_ag_start_servers()
268 __func__, p_scb, services, management_callback_index); in bta_ag_start_servers()
283 void bta_ag_close_servers(tBTA_AG_SCB* p_scb, tBTA_SERVICE_MASK services) { in bta_ag_close_servers() argument
284 services >>= BTA_HSP_SERVICE_ID; in bta_ag_close_servers()
[all …]
Dbta_ag_sdp.cc213 tBTA_SERVICE_MASK services; in bta_ag_create_records() local
215 services = p_scb->reg_services >> BTA_HSP_SERVICE_ID; in bta_ag_create_records()
216 for (i = 0; i < BTA_AG_NUM_IDX && services != 0; i++, services >>= 1) { in bta_ag_create_records()
218 if (services & 1) { in bta_ag_create_records()
244 tBTA_SERVICE_MASK services; in bta_ag_del_records() local
260 services = p_scb->reg_services >> BTA_HSP_SERVICE_ID; in bta_ag_del_records()
261 for (i = 0; i < BTA_AG_NUM_IDX && services != 0; in bta_ag_del_records()
262 i++, services >>= 1, others >>= 1) { in bta_ag_del_records()
265 if (((services & 1) == 1) && ((others & 1) == 0)) { in bta_ag_del_records()
/system/chre/chpp/clients/
Ddiscovery.c134 chppFindMatchingClient(context, &response->services[i]); in chppDiscoveryProcessDiscoverAll()
137 chppUuidToStr(response->services[i].uuid, uuidText); in chppDiscoveryProcessDiscoverAll()
143 CHPP_SERVICE_HANDLE_OF_INDEX(i), response->services[i].name, uuidText, in chppDiscoveryProcessDiscoverAll()
144 response->services[i].version.major, in chppDiscoveryProcessDiscoverAll()
145 response->services[i].version.minor, in chppDiscoveryProcessDiscoverAll()
146 response->services[i].version.patch); in chppDiscoveryProcessDiscoverAll()
156 CHPP_SERVICE_HANDLE_OF_INDEX(i), response->services[i].name, uuidText, in chppDiscoveryProcessDiscoverAll()
163 response->services[i].version.major, in chppDiscoveryProcessDiscoverAll()
164 response->services[i].version.minor, in chppDiscoveryProcessDiscoverAll()
165 response->services[i].version.patch); in chppDiscoveryProcessDiscoverAll()
[all …]
/system/chre/chpp/
DAndroid.bp70 "services.c",
81 "services/discovery.c",
82 "services/loopback.c",
83 "services/nonhandle.c",
84 "services/timesync.c",
85 "services/gnss.c",
86 "services/wifi.c",
87 "services/wwan.c",
/system/bt/gd/rust/facade/src/
Dlib.rs78 let mut services = Vec::new(); in start() localVariable
81 services.push(stack.get_grpc::<HciHalFacadeService>().await); in start()
84 services.push(stack.get_grpc::<HciFacadeService>().await); in start()
87 services.push(stack.get_grpc::<HciFacadeService>().await); in start()
88 services.push(stack.get_grpc::<ControllerFacadeService>().await); in start()
95 for service in services { in start()
/system/update_engine/init/
Dupdate-engine.conf23 start on starting system-services
24 stop on stopping system-services
/system/sepolicy/prebuilts/api/26.0/public/
Dattributes70 # services which should be available to all but isolated apps
73 # services which should be available to all ephemeral apps
76 # services which export only system_api
79 # All types used for services managed by servicemanager.
84 # All types used for services managed by hwservicemanager
87 # All HwBinder services guaranteed to be passthrough. These services always run
92 # All HwBinder services guaranteed to be offered only by core domain components
95 # All types used for services managed by vndservicemanager
156 # PDX services
283 # HwBinder services offered across the core-vendor boundary
/system/chre/chpp/services/
Ddiscovery.c56 context->registeredServiceCount, services); in chppDiscoveryDiscoverAll()
69 response->services[i] = context->registeredServices[i]->descriptor; in chppDiscoveryDiscoverAll()
/system/sepolicy/public/
Dattributes152 # services which should be available to all but isolated apps
155 # services which should be available to all ephemeral apps
158 # services which export only system_api
161 # services which are explicitly disallowed for untrusted apps to access
164 # services which served by vendor and also using the copy of libbinder on
165 # system (for instance via libbinder_ndk). services using a different copy
170 # All types used for services managed by servicemanager.
175 # All types used for services managed by hwservicemanager
178 # All HwBinder services guaranteed to be passthrough. These services always run
183 # All HwBinder services guaranteed to be offered only by core domain components
[all …]
/system/sepolicy/prebuilts/api/31.0/public/
Dattributes152 # services which should be available to all but isolated apps
155 # services which should be available to all ephemeral apps
158 # services which export only system_api
161 # services which are explicitly disallowed for untrusted apps to access
164 # services which served by vendor and also using the copy of libbinder on
165 # system (for instance via libbinder_ndk). services using a different copy
170 # All types used for services managed by servicemanager.
175 # All types used for services managed by hwservicemanager
178 # All HwBinder services guaranteed to be passthrough. These services always run
183 # All HwBinder services guaranteed to be offered only by core domain components
[all …]
/system/sepolicy/private/
Datrace.te6 # boottrace services uses /data/misc/boottrace/categories
26 # Allow discovery of binder services.
44 # Allow notifying the processes hosting specific binder services that
62 # Remove logspam from notification attempts to non-allowlisted services.
/system/sepolicy/prebuilts/api/31.0/private/
Datrace.te6 # boottrace services uses /data/misc/boottrace/categories
26 # Allow discovery of binder services.
44 # Allow notifying the processes hosting specific binder services that
62 # Remove logspam from notification attempts to non-allowlisted services.
/system/sepolicy/prebuilts/api/30.0/private/
Datrace.te7 # boottrace services uses /data/misc/boottrace/categories
27 # Allow discovery of binder services.
44 # Allow notifying the processes hosting specific binder services that
62 # Remove logspam from notification attempts to non-allowlisted services.
/system/sepolicy/prebuilts/api/30.0/public/
Dattributes127 # services which should be available to all but isolated apps
130 # services which should be available to all ephemeral apps
133 # services which export only system_api
136 # services which served by vendor and also using the copy of libbinder on
137 # system (for instance via libbinder_ndk). services using a different copy
142 # All types used for services managed by servicemanager.
147 # All types used for services managed by hwservicemanager
150 # All HwBinder services guaranteed to be passthrough. These services always run
155 # All HwBinder services guaranteed to be offered only by core domain components
158 # All HwBinder services that untrusted apps can't directly access
[all …]
/system/sepolicy/prebuilts/api/29.0/public/
Dattributes92 # services which should be available to all but isolated apps
95 # services which should be available to all ephemeral apps
98 # services which export only system_api
101 # All types used for services managed by servicemanager.
106 # All types used for services managed by hwservicemanager
109 # All HwBinder services guaranteed to be passthrough. These services always run
114 # All HwBinder services guaranteed to be offered only by core domain components
117 # All types used for services managed by vndservicemanager
217 # PDX services
300 # HwBinder services offered across the core-vendor boundary
/system/sepolicy/prebuilts/api/28.0/public/
Dattributes81 # services which should be available to all but isolated apps
84 # services which should be available to all ephemeral apps
87 # services which export only system_api
90 # All types used for services managed by servicemanager.
95 # All types used for services managed by hwservicemanager
98 # All HwBinder services guaranteed to be passthrough. These services always run
103 # All HwBinder services guaranteed to be offered only by core domain components
106 # All types used for services managed by vndservicemanager
201 # PDX services
303 # HwBinder services offered across the core-vendor boundary
/system/sepolicy/prebuilts/api/27.0/private/
Dapp_neverallows.te24 # Do not allow untrusted apps to register services.
26 # services.
124 # other than find actions for services listed below
127 # Do not permit access from apps which host arbitrary code to HwBinder services,
132 # HwBinder services either operate at a level below that of apps (e.g., HALs)
136 # 2. HAL servers (a subset of HwBinder services) contain code with higher
141 # Safe services include:
142 # - same process services: because they by definition run in the process
164 # Make sure that the following services are never accessible by untrusted_apps
203 # HwBinder services offered by core components (as opposed to vendor components)
/system/sepolicy/prebuilts/api/26.0/private/
Dapp_neverallows.te19 # Do not allow untrusted apps to register services.
21 # services.
119 # other than find actions for services listed below
122 # Do not permit access from apps which host arbitrary code to HwBinder services,
127 # HwBinder services either operate at a level below that of apps (e.g., HALs)
131 # 2. HAL servers (a subset of HwBinder services) contain code with higher
136 # Safe services include:
137 # - same process services: because they by definition run in the process
158 # Make sure that the following services are never accessible by untrusted_apps
193 # HwBinder services offered by core components (as opposed to vendor components)
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
/system/libhwbinder/vts/performance/
DBenchmark_throughput.cpp312 int services = -1; in main() local
338 services = atoi(argv[i + 1]); in main()
344 if (services == -1) { in main()
345 services = workers; in main()
350 for (int i = 0; i < services; i++) { in main()
362 worker_pipes.push_back(make_worker(i, iterations, services, get_stub)); in main()
396 for (int i = 0; i < services; i++) { in main()
/system/sepolicy/prebuilts/api/28.0/private/
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks

12345678910>>...13