Home
last modified time | relevance | path

Searched refs:services (Results 1 – 25 of 172) sorted by relevance

1234567

/system/bt/bta/ag/
Dbta_ag_rfc.cc244 void bta_ag_start_servers(tBTA_AG_SCB* p_scb, tBTA_SERVICE_MASK services) { in bta_ag_start_servers() argument
245 services >>= BTA_HSP_SERVICE_ID; in bta_ag_start_servers()
246 for (int i = 0; i < BTA_AG_NUM_IDX && services != 0; i++, services >>= 1) { in bta_ag_start_servers()
248 if (services & 1) { in bta_ag_start_servers()
254 << "invalid callback index, services=" << loghex(services) in bta_ag_start_servers()
259 << "callback index out of bound, services=" << loghex(services) in bta_ag_start_servers()
270 << ", p_scb=" << p_scb << ", services=" << loghex(services) in bta_ag_start_servers()
274 __func__, p_scb, services, management_callback_index); in bta_ag_start_servers()
289 void bta_ag_close_servers(tBTA_AG_SCB* p_scb, tBTA_SERVICE_MASK services) { in bta_ag_close_servers() argument
290 services >>= BTA_HSP_SERVICE_ID; in bta_ag_close_servers()
[all …]
Dbta_ag_sdp.cc215 tBTA_SERVICE_MASK services; in bta_ag_create_records() local
217 services = p_scb->reg_services >> BTA_HSP_SERVICE_ID; in bta_ag_create_records()
218 for (i = 0; i < BTA_AG_NUM_IDX && services != 0; i++, services >>= 1) { in bta_ag_create_records()
220 if (services & 1) { in bta_ag_create_records()
246 tBTA_SERVICE_MASK services; in bta_ag_del_records() local
262 services = p_scb->reg_services >> BTA_HSP_SERVICE_ID; in bta_ag_del_records()
263 for (i = 0; i < BTA_AG_NUM_IDX && services != 0; in bta_ag_del_records()
264 i++, services >>= 1, others >>= 1) { in bta_ag_del_records()
267 if (((services & 1) == 1) && ((others & 1) == 0)) { in bta_ag_del_records()
/system/tpm/trunks/
Dtrunksd.conf20 start on starting system-services
21 stop on stopping system-services
/system/tpm/tpm_manager/server/
Dtpm_managerd.conf20 start on starting system-services
21 stop on stopping system-services
/system/update_engine/init/
Dupdate-engine.conf23 start on starting system-services
24 stop on stopping system-services
/system/tpm/attestation/server/
Dattestationd.conf20 start on started tcsd and started boot-services
21 stop on stopping boot-services
/system/sepolicy/prebuilts/api/26.0/public/
Dattributes70 # services which should be available to all but isolated apps
73 # services which should be available to all ephemeral apps
76 # services which export only system_api
79 # All types used for services managed by servicemanager.
84 # All types used for services managed by hwservicemanager
87 # All HwBinder services guaranteed to be passthrough. These services always run
92 # All HwBinder services guaranteed to be offered only by core domain components
95 # All types used for services managed by vndservicemanager
156 # PDX services
283 # HwBinder services offered across the core-vendor boundary
Daudioserver.te1 # audioserver - audio services daemon
/system/sepolicy/public/
Dattributes81 # services which should be available to all but isolated apps
84 # services which should be available to all ephemeral apps
87 # services which export only system_api
90 # All types used for services managed by servicemanager.
95 # All types used for services managed by hwservicemanager
98 # All HwBinder services guaranteed to be passthrough. These services always run
103 # All HwBinder services guaranteed to be offered only by core domain components
106 # All types used for services managed by vndservicemanager
201 # PDX services
303 # HwBinder services offered across the core-vendor boundary
Daudioserver.te1 # audioserver - audio services daemon
/system/sepolicy/prebuilts/api/28.0/public/
Dattributes81 # services which should be available to all but isolated apps
84 # services which should be available to all ephemeral apps
87 # services which export only system_api
90 # All types used for services managed by servicemanager.
95 # All types used for services managed by hwservicemanager
98 # All HwBinder services guaranteed to be passthrough. These services always run
103 # All HwBinder services guaranteed to be offered only by core domain components
106 # All types used for services managed by vndservicemanager
201 # PDX services
303 # HwBinder services offered across the core-vendor boundary
Daudioserver.te1 # audioserver - audio services daemon
/system/bt/bta/dm/
Dbta_dm_api.cc127 void BTA_DmSearch(tBTA_DM_INQ* p_dm_inq, tBTA_SERVICE_MASK services, in BTA_DmSearch() argument
134 p_msg->services = services; in BTA_DmSearch()
169 void BTA_DmDiscover(const RawAddress& bd_addr, tBTA_SERVICE_MASK services, in BTA_DmDiscover() argument
176 p_msg->services = services; in BTA_DmDiscover()
201 p_msg->services = BTA_USER_SERVICE_MASK; // Not exposed at API level in BTA_DmDiscoverUUID()
604 p_msg->services = p_services->srvc_mask; in bta_dm_discover_send_msg()
695 p_msg->services = p_services->srvc_mask; in BTA_DmSearchExt()
/system/sepolicy/prebuilts/api/27.0/private/
Dapp_neverallows.te24 # Do not allow untrusted apps to register services.
26 # services.
124 # other than find actions for services listed below
127 # Do not permit access from apps which host arbitrary code to HwBinder services,
132 # HwBinder services either operate at a level below that of apps (e.g., HALs)
136 # 2. HAL servers (a subset of HwBinder services) contain code with higher
141 # Safe services include:
142 # - same process services: because they by definition run in the process
164 # Make sure that the following services are never accessible by untrusted_apps
203 # HwBinder services offered by core components (as opposed to vendor components)
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
/system/sepolicy/prebuilts/api/26.0/private/
Dapp_neverallows.te19 # Do not allow untrusted apps to register services.
21 # services.
119 # other than find actions for services listed below
122 # Do not permit access from apps which host arbitrary code to HwBinder services,
127 # HwBinder services either operate at a level below that of apps (e.g., HALs)
131 # 2. HAL servers (a subset of HwBinder services) contain code with higher
136 # Safe services include:
137 # - same process services: because they by definition run in the process
158 # Make sure that the following services are never accessible by untrusted_apps
193 # HwBinder services offered by core components (as opposed to vendor components)
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
/system/libhwbinder/vts/performance/
DBenchmark_throughput.cpp311 int services = -1; in main() local
337 services = atoi(argv[i + 1]); in main()
343 if (services == -1) { in main()
344 services = workers; in main()
349 for (int i = 0; i < services; i++) { in main()
361 worker_pipes.push_back(make_worker(i, iterations, services, get_stub)); in main()
395 for (int i = 0; i < services; i++) { in main()
/system/core/adb/
DOVERVIEW.TXT12 DDMS). These commands are called 'services' in ADB.
28 services and devices.
36 few services for clients that run on the host.
60 There are essentially two kinds of services that a client can talk to.
63 These services run within the ADB Server and thus do not need to
66 states. They are a few other services though.
69 These services either run within the adbd daemon, or are started by
118 The file SERVICES.TXT lists all services currently implemented by ADB.
/system/sepolicy/prebuilts/api/28.0/private/
Dapp_neverallows.te25 # Do not allow untrusted apps to register services.
27 # services.
147 # other than find actions for services listed below
150 # Do not permit access from apps which host arbitrary code to HwBinder services,
155 # HwBinder services either operate at a level below that of apps (e.g., HALs)
159 # 2. HAL servers (a subset of HwBinder services) contain code with higher
164 # Safe services include:
165 # - same process services: because they by definition run in the process
190 # Make sure that the following services are never accessible by untrusted_apps
231 # HwBinder services offered by core components (as opposed to vendor components)
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
/system/sepolicy/private/
Dapp_neverallows.te25 # Do not allow untrusted apps to register services.
27 # services.
147 # other than find actions for services listed below
150 # Do not permit access from apps which host arbitrary code to HwBinder services,
155 # HwBinder services either operate at a level below that of apps (e.g., HALs)
159 # 2. HAL servers (a subset of HwBinder services) contain code with higher
164 # Safe services include:
165 # - same process services: because they by definition run in the process
190 # Make sure that the following services are never accessible by untrusted_apps
231 # HwBinder services offered by core components (as opposed to vendor components)
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
/system/sepolicy/prebuilts/api/27.0/public/
Dattributes71 # services which should be available to all but isolated apps
74 # services which should be available to all ephemeral apps
77 # services which export only system_api
80 # All types used for services managed by servicemanager.
85 # All types used for services managed by hwservicemanager
88 # All HwBinder services guaranteed to be passthrough. These services always run
93 # All HwBinder services guaranteed to be offered only by core domain components
96 # All types used for services managed by vndservicemanager
172 # PDX services
422 # HwBinder services offered across the core-vendor boundary
Daudioserver.te1 # audioserver - audio services daemon

1234567