/system/core/toolbox/ |
D | start.cpp | 39 std::vector<std::string> services = { in ControlDefaultServices() local 49 services.emplace_back("zygote_secondary"); in ControlDefaultServices() 53 for (const auto& service : services) { in ControlDefaultServices() 57 for (auto it = services.crbegin(); it != services.crend(); ++it) { in ControlDefaultServices()
|
/system/chre/java/utils/pigweed/src/com/google/android/chre/utils/pigweed/ |
D | ChreRpcClient.java | 65 long serverNanoappId, @NonNull List<Service> services, in ChreRpcClient() argument 69 Objects.requireNonNull(services); in ChreRpcClient() 75 mRpcClient = Client.create(List.of(mChannel), services); in ChreRpcClient() 91 @NonNull List<Service> services) { in ChreRpcClient() argument 93 Objects.requireNonNull(services); in ChreRpcClient() 97 mRpcClient = Client.create(List.of(mChannel), services); in ChreRpcClient()
|
/system/chre/chpp/ |
D | Android.bp | 70 "services.c", 71 "services/discovery.c", 72 "services/loopback.c", 73 "services/nonhandle.c", 74 "services/timesync.c", 93 // of optional clients and services. 121 "platform/linux/services/platform_gnss.c", 122 "services/gnss.c", 123 "services/wifi.c", 124 "services/wwan.c",
|
D | QUICKSTART.md | 55 …services (including Loopback Test, Service Discovery), as well as three standard services that fol… 61 In order to integrate the standard services using the CHRE PAL API, please refer to each service's …
|
D | README.md | 7 …g of datagrams, while the CHPP Application Layer is responsible for the services, including client… 11 …services that are necessary for debugging and service discovery, defines a number of services for … 19 …services. For example, CHRE may be running on a microcontroller which has a serial connection to a… 176 …services over a single CHPP transport (physical) link. This allows differentiation between traffic… 184 - 0x10 - 0xff: Handles for services negotiated through handshake 197 …out-of-order responses which is optional for clients, and mandatory for services. The Transaction … 201 …can define their own commands and therefore command codes for different services and vendors can o… 205 …services take advantage of reserved handle numbers, ranging from 0x00 - 0x0f to support debugging … 218 …number of coexisting services. In response to a discovery command, the discovery service responds … 222 CHPP supports the following services using the CHRE PAL. The standard UUIDs for these services are …
|
/system/update_engine/init/ |
D | update-engine.conf | 23 start on starting system-services 24 stop on stopping system-services
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | attributes | 152 # services which should be available to all but isolated apps 155 # services which should be available to all ephemeral apps 158 # services which export only system_api 161 # services which are explicitly disallowed for untrusted apps to access 164 # services which served by vendor and also using the copy of libbinder on 165 # system (for instance via libbinder_ndk). services using a different copy 170 # All types used for services managed by servicemanager. 175 # All types used for services managed by hwservicemanager 178 # All HwBinder services guaranteed to be passthrough. These services always run 183 # All HwBinder services guaranteed to be offered only by core domain components [all …]
|
/system/sepolicy/prebuilts/api/32.0/public/ |
D | attributes | 152 # services which should be available to all but isolated apps 155 # services which should be available to all ephemeral apps 158 # services which export only system_api 161 # services which are explicitly disallowed for untrusted apps to access 164 # services which served by vendor and also using the copy of libbinder on 165 # system (for instance via libbinder_ndk). services using a different copy 170 # All types used for services managed by servicemanager. 175 # All types used for services managed by hwservicemanager 178 # All HwBinder services guaranteed to be passthrough. These services always run 183 # All HwBinder services guaranteed to be offered only by core domain components [all …]
|
/system/chre/test/simulation/ |
D | rpc_test.cc | 132 struct chreNanoappRpcService services[] = { in TEST_F() local 137 return chrePublishRpcServices(services, 2 /* numServices */); in TEST_F() 190 struct chreNanoappRpcService services[] = { in TEST_F() local 196 chrePublishRpcServices(services, 2 /* numServices */); in TEST_F() 257 struct chreNanoappRpcService services[] = { in TEST_F() local 262 return chrePublishRpcServices(services, 2 /* numServices */); in TEST_F() 388 struct chreNanoappRpcService services[] = {{.id = 1, .version = 2}}; in TEST_F() local 390 return chrePublishRpcServices(services, 1 /* numServices */); in TEST_F()
|
/system/tools/aidl/tests/java/src/android/aidl/service/ |
D | TestServiceServer.java | 341 public boolean VerifyNamesWithInterfaceArray(INamedCallback[] services, String[] names) in VerifyNamesWithInterfaceArray() argument 343 return VerifyNamesWithNullableInterfaceArray(services, names); in VerifyNamesWithInterfaceArray() 349 INamedCallback[] services = new INamedCallback[names.length]; in GetNullableInterfaceArray() 352 services[i] = null; in GetNullableInterfaceArray() 354 services[i] = GetOtherTestService(names[i]); in GetNullableInterfaceArray() 357 return services; in GetNullableInterfaceArray() 360 public boolean VerifyNamesWithNullableInterfaceArray(INamedCallback[] services, String[] names) in VerifyNamesWithNullableInterfaceArray() argument 362 if (services != null && names != null) { in VerifyNamesWithNullableInterfaceArray() 364 if (services[i] != null && names[i] != null) { in VerifyNamesWithNullableInterfaceArray() 365 if (!VerifyName(services[i], names[i])) { in VerifyNamesWithNullableInterfaceArray() [all …]
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | attributes | 135 # services which should be available to all but isolated apps 138 # services which should be available to all ephemeral apps 141 # services which export only system_api 144 # services which served by vendor and also using the copy of libbinder on 145 # system (for instance via libbinder_ndk). services using a different copy 150 # All types used for services managed by servicemanager. 155 # All types used for services managed by hwservicemanager 158 # All HwBinder services guaranteed to be passthrough. These services always run 163 # All HwBinder services guaranteed to be offered only by core domain components 166 # All HwBinder services that untrusted apps can't directly access [all …]
|
/system/sepolicy/private/ |
D | atrace.te | 6 # boottrace services uses /data/misc/boottrace/categories 26 # Allow discovery of binder services. 44 # Allow notifying the processes hosting specific binder services that 61 # Remove logspam from notification attempts to non-allowlisted services.
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | atrace.te | 6 # boottrace services uses /data/misc/boottrace/categories 26 # Allow discovery of binder services. 44 # Allow notifying the processes hosting specific binder services that 62 # Remove logspam from notification attempts to non-allowlisted services.
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | atrace.te | 6 # boottrace services uses /data/misc/boottrace/categories 26 # Allow discovery of binder services. 45 # Allow notifying the processes hosting specific binder services that 62 # Remove logspam from notification attempts to non-allowlisted services.
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | atrace.te | 6 # boottrace services uses /data/misc/boottrace/categories 26 # Allow discovery of binder services. 44 # Allow notifying the processes hosting specific binder services that 62 # Remove logspam from notification attempts to non-allowlisted services.
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | atrace.te | 6 # boottrace services uses /data/misc/boottrace/categories 26 # Allow discovery of binder services. 44 # Allow notifying the processes hosting specific binder services that 61 # Remove logspam from notification attempts to non-allowlisted services.
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | atrace.te | 7 # boottrace services uses /data/misc/boottrace/categories 27 # Allow discovery of binder services. 44 # Allow notifying the processes hosting specific binder services that 62 # Remove logspam from notification attempts to non-allowlisted services.
|
/system/chre/chpp/services/ |
D | discovery.c | 56 context->registeredServiceCount, services); in chppDiscoveryDiscoverAll() 69 response->services[i] = context->registeredServices[i]->descriptor; in chppDiscoveryDiscoverAll()
|
/system/sepolicy/prebuilts/api/33.0/public/ |
D | attributes | 164 # services which should be available to all but isolated apps 167 # services which should be available to all ephemeral apps 170 # services which export only system_api 173 # services which are explicitly disallowed for untrusted apps to access 176 # services which served by vendor and also using the copy of libbinder on 177 # system (for instance via libbinder_ndk). services using a different copy 182 # All types used for services managed by servicemanager. 187 # All types used for services managed by hwservicemanager 190 # All HwBinder services guaranteed to be passthrough. These services always run 195 # All HwBinder services guaranteed to be offered only by core domain components [all …]
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | attributes | 92 # services which should be available to all but isolated apps 95 # services which should be available to all ephemeral apps 98 # services which export only system_api 101 # All types used for services managed by servicemanager. 106 # All types used for services managed by hwservicemanager 109 # All HwBinder services guaranteed to be passthrough. These services always run 114 # All HwBinder services guaranteed to be offered only by core domain components 117 # All types used for services managed by vndservicemanager 217 # PDX services 300 # HwBinder services offered across the core-vendor boundary
|
/system/tools/aidl/tests/rust/ |
D | test_service_async.rs | 256 services: &[binder::Strong<dyn INamedCallback::INamedCallback>], in VerifyNamesWithInterfaceArray() 259 if services.len() == names.len() { in VerifyNamesWithInterfaceArray() 260 for (s, n) in services.iter().zip(names) { in VerifyNamesWithInterfaceArray() 277 let mut services = vec![]; in GetNullableInterfaceArray() localVariable 280 services.push(Some(self.GetOtherTestService(name).await?)); in GetNullableInterfaceArray() 282 services.push(None); in GetNullableInterfaceArray() 285 Ok(Some(services)) in GetNullableInterfaceArray() 293 services: Option<&[Option<binder::Strong<dyn INamedCallback::INamedCallback>>]>, in VerifyNamesWithNullableInterfaceArray() 296 if let (Some(services), Some(names)) = (services, names) { in VerifyNamesWithNullableInterfaceArray() 297 for (s, n) in services.iter().zip(names) { in VerifyNamesWithNullableInterfaceArray() [all …]
|
D | test_service.rs | 222 services: &[binder::Strong<dyn INamedCallback::INamedCallback>], in VerifyNamesWithInterfaceArray() 225 if services.len() == names.len() { in VerifyNamesWithInterfaceArray() 226 for (s, n) in services.iter().zip(names) { in VerifyNamesWithInterfaceArray() 243 let mut services = vec![]; in GetNullableInterfaceArray() localVariable 246 services.push(Some(self.GetOtherTestService(name)?)); in GetNullableInterfaceArray() 248 services.push(None); in GetNullableInterfaceArray() 251 Ok(Some(services)) in GetNullableInterfaceArray() 259 services: Option<&[Option<binder::Strong<dyn INamedCallback::INamedCallback>>]>, in VerifyNamesWithNullableInterfaceArray() 262 if let (Some(services), Some(names)) = (services, names) { in VerifyNamesWithNullableInterfaceArray() 263 for (s, n) in services.iter().zip(names) { in VerifyNamesWithNullableInterfaceArray() [all …]
|
/system/libhwbinder/vts/performance/ |
D | Benchmark_throughput.cpp | 312 int services = -1; in main() local 338 services = atoi(argv[i + 1]); in main() 344 if (services == -1) { in main() 345 services = workers; in main() 350 for (int i = 0; i < services; i++) { in main() 362 worker_pipes.push_back(make_worker(i, iterations, services, get_stub)); in main() 396 for (int i = 0; i < services; i++) { in main()
|
/system/tools/aidl/tests/ |
D | aidl_test_service.cpp | 467 vector<sp<INamedCallback>> services(names.size()); in GetInterfaceArray() local 469 if (auto st = GetOtherTestService(names[i], &services[i]); !st.isOk()) { in GetInterfaceArray() 473 *_aidl_return = std::move(services); in GetInterfaceArray() 477 Status VerifyNamesWithInterfaceArray(const vector<sp<INamedCallback>>& services, in VerifyNamesWithInterfaceArray() argument 479 if (services.size() == names.size()) { in VerifyNamesWithInterfaceArray() 480 for (size_t i = 0; i < services.size(); i++) { in VerifyNamesWithInterfaceArray() 481 if (auto st = VerifyName(services[i], names[i], _aidl_ret); !st.isOk() || !*_aidl_ret) { in VerifyNamesWithInterfaceArray() 494 vector<sp<INamedCallback>> services; in GetNullableInterfaceArray() local 502 services.push_back(std::move(ret)); in GetNullableInterfaceArray() 504 services.emplace_back(); in GetNullableInterfaceArray() [all …]
|
/system/sepolicy/prebuilts/api/34.0/public/ |
D | attributes | 158 # services which should be available to all but isolated apps 161 # services which should be available to all ephemeral apps 164 # services which export only system_api 167 # services which are explicitly disallowed for untrusted apps to access 170 # All types used for services managed by servicemanager. 175 # All types used for services managed by hwservicemanager 178 # All HwBinder services guaranteed to be passthrough. These services always run 183 # All HwBinder services guaranteed to be offered only by core domain components 186 # All HwBinder services that untrusted apps can't directly access 189 # All types used for services managed by vndservicemanager [all …]
|