Home
last modified time | relevance | path

Searched refs:services (Results 1 – 25 of 385) sorted by relevance

12345678910>>...16

/system/core/toolbox/
Dstart.cpp39 std::vector<std::string> services = { in ControlDefaultServices() local
49 services.emplace_back("zygote_secondary"); in ControlDefaultServices()
53 for (const auto& service : services) { in ControlDefaultServices()
57 for (auto it = services.crbegin(); it != services.crend(); ++it) { in ControlDefaultServices()
/system/chre/java/utils/pigweed/src/com/google/android/chre/utils/pigweed/
DChreRpcClient.java65 long serverNanoappId, @NonNull List<Service> services, in ChreRpcClient() argument
69 Objects.requireNonNull(services); in ChreRpcClient()
75 mRpcClient = Client.create(List.of(mChannel), services); in ChreRpcClient()
91 @NonNull List<Service> services) { in ChreRpcClient() argument
93 Objects.requireNonNull(services); in ChreRpcClient()
97 mRpcClient = Client.create(List.of(mChannel), services); in ChreRpcClient()
/system/chre/chpp/
DAndroid.bp70 "services.c",
71 "services/discovery.c",
72 "services/loopback.c",
73 "services/nonhandle.c",
74 "services/timesync.c",
93 // of optional clients and services.
121 "platform/linux/services/platform_gnss.c",
122 "services/gnss.c",
123 "services/wifi.c",
124 "services/wwan.c",
DQUICKSTART.md55services (including Loopback Test, Service Discovery), as well as three standard services that fol…
61 In order to integrate the standard services using the CHRE PAL API, please refer to each service's …
DREADME.md7 …g of datagrams, while the CHPP Application Layer is responsible for the services, including client…
11services that are necessary for debugging and service discovery, defines a number of services for …
19services. For example, CHRE may be running on a microcontroller which has a serial connection to a…
176services over a single CHPP transport (physical) link. This allows differentiation between traffic…
184 - 0x10 - 0xff: Handles for services negotiated through handshake
197 …out-of-order responses which is optional for clients, and mandatory for services. The Transaction …
201 …can define their own commands and therefore command codes for different services and vendors can o…
205services take advantage of reserved handle numbers, ranging from 0x00 - 0x0f to support debugging …
218 …number of coexisting services. In response to a discovery command, the discovery service responds …
222 CHPP supports the following services using the CHRE PAL. The standard UUIDs for these services are …
/system/update_engine/init/
Dupdate-engine.conf23 start on starting system-services
24 stop on stopping system-services
/system/sepolicy/prebuilts/api/31.0/public/
Dattributes152 # services which should be available to all but isolated apps
155 # services which should be available to all ephemeral apps
158 # services which export only system_api
161 # services which are explicitly disallowed for untrusted apps to access
164 # services which served by vendor and also using the copy of libbinder on
165 # system (for instance via libbinder_ndk). services using a different copy
170 # All types used for services managed by servicemanager.
175 # All types used for services managed by hwservicemanager
178 # All HwBinder services guaranteed to be passthrough. These services always run
183 # All HwBinder services guaranteed to be offered only by core domain components
[all …]
/system/sepolicy/prebuilts/api/32.0/public/
Dattributes152 # services which should be available to all but isolated apps
155 # services which should be available to all ephemeral apps
158 # services which export only system_api
161 # services which are explicitly disallowed for untrusted apps to access
164 # services which served by vendor and also using the copy of libbinder on
165 # system (for instance via libbinder_ndk). services using a different copy
170 # All types used for services managed by servicemanager.
175 # All types used for services managed by hwservicemanager
178 # All HwBinder services guaranteed to be passthrough. These services always run
183 # All HwBinder services guaranteed to be offered only by core domain components
[all …]
/system/chre/test/simulation/
Drpc_test.cc132 struct chreNanoappRpcService services[] = { in TEST_F() local
137 return chrePublishRpcServices(services, 2 /* numServices */); in TEST_F()
190 struct chreNanoappRpcService services[] = { in TEST_F() local
196 chrePublishRpcServices(services, 2 /* numServices */); in TEST_F()
257 struct chreNanoappRpcService services[] = { in TEST_F() local
262 return chrePublishRpcServices(services, 2 /* numServices */); in TEST_F()
388 struct chreNanoappRpcService services[] = {{.id = 1, .version = 2}}; in TEST_F() local
390 return chrePublishRpcServices(services, 1 /* numServices */); in TEST_F()
/system/tools/aidl/tests/java/src/android/aidl/service/
DTestServiceServer.java341 public boolean VerifyNamesWithInterfaceArray(INamedCallback[] services, String[] names) in VerifyNamesWithInterfaceArray() argument
343 return VerifyNamesWithNullableInterfaceArray(services, names); in VerifyNamesWithInterfaceArray()
349 INamedCallback[] services = new INamedCallback[names.length]; in GetNullableInterfaceArray()
352 services[i] = null; in GetNullableInterfaceArray()
354 services[i] = GetOtherTestService(names[i]); in GetNullableInterfaceArray()
357 return services; in GetNullableInterfaceArray()
360 public boolean VerifyNamesWithNullableInterfaceArray(INamedCallback[] services, String[] names) in VerifyNamesWithNullableInterfaceArray() argument
362 if (services != null && names != null) { in VerifyNamesWithNullableInterfaceArray()
364 if (services[i] != null && names[i] != null) { in VerifyNamesWithNullableInterfaceArray()
365 if (!VerifyName(services[i], names[i])) { in VerifyNamesWithNullableInterfaceArray()
[all …]
/system/sepolicy/prebuilts/api/30.0/public/
Dattributes135 # services which should be available to all but isolated apps
138 # services which should be available to all ephemeral apps
141 # services which export only system_api
144 # services which served by vendor and also using the copy of libbinder on
145 # system (for instance via libbinder_ndk). services using a different copy
150 # All types used for services managed by servicemanager.
155 # All types used for services managed by hwservicemanager
158 # All HwBinder services guaranteed to be passthrough. These services always run
163 # All HwBinder services guaranteed to be offered only by core domain components
166 # All HwBinder services that untrusted apps can't directly access
[all …]
/system/sepolicy/private/
Datrace.te6 # boottrace services uses /data/misc/boottrace/categories
26 # Allow discovery of binder services.
44 # Allow notifying the processes hosting specific binder services that
61 # Remove logspam from notification attempts to non-allowlisted services.
/system/sepolicy/prebuilts/api/32.0/private/
Datrace.te6 # boottrace services uses /data/misc/boottrace/categories
26 # Allow discovery of binder services.
44 # Allow notifying the processes hosting specific binder services that
62 # Remove logspam from notification attempts to non-allowlisted services.
/system/sepolicy/prebuilts/api/33.0/private/
Datrace.te6 # boottrace services uses /data/misc/boottrace/categories
26 # Allow discovery of binder services.
45 # Allow notifying the processes hosting specific binder services that
62 # Remove logspam from notification attempts to non-allowlisted services.
/system/sepolicy/prebuilts/api/31.0/private/
Datrace.te6 # boottrace services uses /data/misc/boottrace/categories
26 # Allow discovery of binder services.
44 # Allow notifying the processes hosting specific binder services that
62 # Remove logspam from notification attempts to non-allowlisted services.
/system/sepolicy/prebuilts/api/34.0/private/
Datrace.te6 # boottrace services uses /data/misc/boottrace/categories
26 # Allow discovery of binder services.
44 # Allow notifying the processes hosting specific binder services that
61 # Remove logspam from notification attempts to non-allowlisted services.
/system/sepolicy/prebuilts/api/30.0/private/
Datrace.te7 # boottrace services uses /data/misc/boottrace/categories
27 # Allow discovery of binder services.
44 # Allow notifying the processes hosting specific binder services that
62 # Remove logspam from notification attempts to non-allowlisted services.
/system/chre/chpp/services/
Ddiscovery.c56 context->registeredServiceCount, services); in chppDiscoveryDiscoverAll()
69 response->services[i] = context->registeredServices[i]->descriptor; in chppDiscoveryDiscoverAll()
/system/sepolicy/prebuilts/api/33.0/public/
Dattributes164 # services which should be available to all but isolated apps
167 # services which should be available to all ephemeral apps
170 # services which export only system_api
173 # services which are explicitly disallowed for untrusted apps to access
176 # services which served by vendor and also using the copy of libbinder on
177 # system (for instance via libbinder_ndk). services using a different copy
182 # All types used for services managed by servicemanager.
187 # All types used for services managed by hwservicemanager
190 # All HwBinder services guaranteed to be passthrough. These services always run
195 # All HwBinder services guaranteed to be offered only by core domain components
[all …]
/system/sepolicy/prebuilts/api/29.0/public/
Dattributes92 # services which should be available to all but isolated apps
95 # services which should be available to all ephemeral apps
98 # services which export only system_api
101 # All types used for services managed by servicemanager.
106 # All types used for services managed by hwservicemanager
109 # All HwBinder services guaranteed to be passthrough. These services always run
114 # All HwBinder services guaranteed to be offered only by core domain components
117 # All types used for services managed by vndservicemanager
217 # PDX services
300 # HwBinder services offered across the core-vendor boundary
/system/tools/aidl/tests/rust/
Dtest_service_async.rs256 services: &[binder::Strong<dyn INamedCallback::INamedCallback>], in VerifyNamesWithInterfaceArray()
259 if services.len() == names.len() { in VerifyNamesWithInterfaceArray()
260 for (s, n) in services.iter().zip(names) { in VerifyNamesWithInterfaceArray()
277 let mut services = vec![]; in GetNullableInterfaceArray() localVariable
280 services.push(Some(self.GetOtherTestService(name).await?)); in GetNullableInterfaceArray()
282 services.push(None); in GetNullableInterfaceArray()
285 Ok(Some(services)) in GetNullableInterfaceArray()
293 services: Option<&[Option<binder::Strong<dyn INamedCallback::INamedCallback>>]>, in VerifyNamesWithNullableInterfaceArray()
296 if let (Some(services), Some(names)) = (services, names) { in VerifyNamesWithNullableInterfaceArray()
297 for (s, n) in services.iter().zip(names) { in VerifyNamesWithNullableInterfaceArray()
[all …]
Dtest_service.rs222 services: &[binder::Strong<dyn INamedCallback::INamedCallback>], in VerifyNamesWithInterfaceArray()
225 if services.len() == names.len() { in VerifyNamesWithInterfaceArray()
226 for (s, n) in services.iter().zip(names) { in VerifyNamesWithInterfaceArray()
243 let mut services = vec![]; in GetNullableInterfaceArray() localVariable
246 services.push(Some(self.GetOtherTestService(name)?)); in GetNullableInterfaceArray()
248 services.push(None); in GetNullableInterfaceArray()
251 Ok(Some(services)) in GetNullableInterfaceArray()
259 services: Option<&[Option<binder::Strong<dyn INamedCallback::INamedCallback>>]>, in VerifyNamesWithNullableInterfaceArray()
262 if let (Some(services), Some(names)) = (services, names) { in VerifyNamesWithNullableInterfaceArray()
263 for (s, n) in services.iter().zip(names) { in VerifyNamesWithNullableInterfaceArray()
[all …]
/system/libhwbinder/vts/performance/
DBenchmark_throughput.cpp312 int services = -1; in main() local
338 services = atoi(argv[i + 1]); in main()
344 if (services == -1) { in main()
345 services = workers; in main()
350 for (int i = 0; i < services; i++) { in main()
362 worker_pipes.push_back(make_worker(i, iterations, services, get_stub)); in main()
396 for (int i = 0; i < services; i++) { in main()
/system/tools/aidl/tests/
Daidl_test_service.cpp467 vector<sp<INamedCallback>> services(names.size()); in GetInterfaceArray() local
469 if (auto st = GetOtherTestService(names[i], &services[i]); !st.isOk()) { in GetInterfaceArray()
473 *_aidl_return = std::move(services); in GetInterfaceArray()
477 Status VerifyNamesWithInterfaceArray(const vector<sp<INamedCallback>>& services, in VerifyNamesWithInterfaceArray() argument
479 if (services.size() == names.size()) { in VerifyNamesWithInterfaceArray()
480 for (size_t i = 0; i < services.size(); i++) { in VerifyNamesWithInterfaceArray()
481 if (auto st = VerifyName(services[i], names[i], _aidl_ret); !st.isOk() || !*_aidl_ret) { in VerifyNamesWithInterfaceArray()
494 vector<sp<INamedCallback>> services; in GetNullableInterfaceArray() local
502 services.push_back(std::move(ret)); in GetNullableInterfaceArray()
504 services.emplace_back(); in GetNullableInterfaceArray()
[all …]
/system/sepolicy/prebuilts/api/34.0/public/
Dattributes158 # services which should be available to all but isolated apps
161 # services which should be available to all ephemeral apps
164 # services which export only system_api
167 # services which are explicitly disallowed for untrusted apps to access
170 # All types used for services managed by servicemanager.
175 # All types used for services managed by hwservicemanager
178 # All HwBinder services guaranteed to be passthrough. These services always run
183 # All HwBinder services guaranteed to be offered only by core domain components
186 # All HwBinder services that untrusted apps can't directly access
189 # All types used for services managed by vndservicemanager
[all …]

12345678910>>...16