/system/bt/bta/gatt/ |
D | database_builder.cc | 33 if (database.services.empty() || in AddService() 34 database.services.back().end_handle < handle) { in AddService() 35 database.services.emplace_back(Service{ in AddService() 42 auto& vec = database.services; in AddService() 64 Service* service = FindService(database.services, handle); in AddIncludedService() 72 if (!FindService(database.services, start_handle)) { in AddIncludedService() 86 Service* service = FindService(database.services, handle); in AddCharacteristic() 107 Service* service = FindService(database.services, handle); in AddDescriptor() 151 Service* service = FindService(database.services, pending_service.first); in NextDescriptorRangeToExplore() 183 bool DatabaseBuilder::InProgress() const { return !database.services.empty(); } in InProgress()
|
D | database.cc | 43 Service* FindService(std::list<Service>& services, uint16_t handle) { in FindService() argument 44 for (Service& service : services) { in FindService() 55 for (const Service& service : services) { in ToString() 85 if (services.empty()) return std::vector<StoredAttribute>(); in Serialize() 87 for (const Service& service : services) { in Serialize() 95 for (const Service& service : services) { in Serialize() 130 result.services.emplace_back(Service{ in Deserialize() 138 auto current_service_it = result.services.begin(); in Deserialize() 144 while (current_service_it != result.services.end() && in Deserialize() 149 if (current_service_it == result.services.end() || in Deserialize() [all …]
|
D | database.h | 101 bool IsEmpty() const { return services.empty(); } in IsEmpty() 105 void Clear() { std::list<Service>().swap(services); } in Clear() 108 const std::list<Service>& Services() const { return services; } in Services() 120 std::list<Service> services; 125 Service* FindService(std::list<Service>& services, uint16_t handle);
|
/system/core/toolbox/ |
D | start.cpp | 39 std::vector<std::string> services = { in ControlDefaultServices() local 49 services.emplace_back("zygote_secondary"); in ControlDefaultServices() 53 for (const auto& service : services) { in ControlDefaultServices() 57 for (auto it = services.crbegin(); it != services.crend(); ++it) { in ControlDefaultServices()
|
/system/bt/bta/ag/ |
D | bta_ag_rfc.cc | 245 void bta_ag_start_servers(tBTA_AG_SCB* p_scb, tBTA_SERVICE_MASK services) { in bta_ag_start_servers() argument 246 services >>= BTA_HSP_SERVICE_ID; in bta_ag_start_servers() 247 for (int i = 0; i < BTA_AG_NUM_IDX && services != 0; i++, services >>= 1) { in bta_ag_start_servers() 249 if (services & 1) { in bta_ag_start_servers() 255 << "invalid callback index, services=" << loghex(services) in bta_ag_start_servers() 260 << "callback index out of bound, services=" << loghex(services) in bta_ag_start_servers() 271 << ", p_scb=" << p_scb << ", services=" << loghex(services) in bta_ag_start_servers() 275 __func__, p_scb, services, management_callback_index); in bta_ag_start_servers() 290 void bta_ag_close_servers(tBTA_AG_SCB* p_scb, tBTA_SERVICE_MASK services) { in bta_ag_close_servers() argument 291 services >>= BTA_HSP_SERVICE_ID; in bta_ag_close_servers() [all …]
|
D | bta_ag_sdp.cc | 216 tBTA_SERVICE_MASK services; in bta_ag_create_records() local 218 services = p_scb->reg_services >> BTA_HSP_SERVICE_ID; in bta_ag_create_records() 219 for (i = 0; i < BTA_AG_NUM_IDX && services != 0; i++, services >>= 1) { in bta_ag_create_records() 221 if (services & 1) { in bta_ag_create_records() 247 tBTA_SERVICE_MASK services; in bta_ag_del_records() local 263 services = p_scb->reg_services >> BTA_HSP_SERVICE_ID; in bta_ag_del_records() 264 for (i = 0; i < BTA_AG_NUM_IDX && services != 0; in bta_ag_del_records() 265 i++, services >>= 1, others >>= 1) { in bta_ag_del_records() 268 if (((services & 1) == 1) && ((others & 1) == 0)) { in bta_ag_del_records()
|
/system/core/adb/client/ |
D | transport_mdns.cpp | 258 ServiceRegistry* services = nullptr; in AddToServiceRegistry() local 261 services = sAdbTransportServices; in AddToServiceRegistry() 264 services = sAdbSecurePairingServices; in AddToServiceRegistry() 267 services = sAdbSecureConnectServices; in AddToServiceRegistry() 274 services->push_back(std::unique_ptr<ResolvedService>(this)); in AddToServiceRegistry() 320 static void forEachService(const ServiceRegistry& services, std::string_view hostname, 323 static bool connectByServiceName(const ServiceRegistry& services, 364 void ResolvedService::forEachService(const ServiceRegistry& services, in forEachService() argument 369 for (const auto& service : services) { in forEachService() 384 bool ResolvedService::connectByServiceName(const ServiceRegistry& services, in connectByServiceName() argument [all …]
|
/system/update_engine/init/ |
D | update-engine.conf | 23 start on starting system-services 24 stop on stopping system-services
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | attributes | 70 # services which should be available to all but isolated apps 73 # services which should be available to all ephemeral apps 76 # services which export only system_api 79 # All types used for services managed by servicemanager. 84 # All types used for services managed by hwservicemanager 87 # All HwBinder services guaranteed to be passthrough. These services always run 92 # All HwBinder services guaranteed to be offered only by core domain components 95 # All types used for services managed by vndservicemanager 156 # PDX services 283 # HwBinder services offered across the core-vendor boundary
|
/system/sepolicy/private/ |
D | atrace.te | 7 # boottrace services uses /data/misc/boottrace/categories 27 # Allow discovery of binder services. 44 # Allow notifying the processes hosting specific binder services that 62 # Remove logspam from notification attempts to non-allowlisted services.
|
D | binderservicedomain.te | 3 # Allow dumpstate and incidentd to collect information from binder services 17 # allow all services to run permission checks
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | atrace.te | 7 # boottrace services uses /data/misc/boottrace/categories 27 # Allow discovery of binder services. 44 # Allow notifying the processes hosting specific binder services that 62 # Remove logspam from notification attempts to non-allowlisted services.
|
D | binderservicedomain.te | 3 # Allow dumpstate and incidentd to collect information from binder services 17 # allow all services to run permission checks
|
/system/sepolicy/public/ |
D | attributes | 127 # services which should be available to all but isolated apps 130 # services which should be available to all ephemeral apps 133 # services which export only system_api 136 # services which served by vendor and also using the copy of libbinder on 137 # system (for instance via libbinder_ndk). services using a different copy 142 # All types used for services managed by servicemanager. 147 # All types used for services managed by hwservicemanager 150 # All HwBinder services guaranteed to be passthrough. These services always run 155 # All HwBinder services guaranteed to be offered only by core domain components 158 # All HwBinder services that untrusted apps can't directly access [all …]
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | attributes | 127 # services which should be available to all but isolated apps 130 # services which should be available to all ephemeral apps 133 # services which export only system_api 136 # services which served by vendor and also using the copy of libbinder on 137 # system (for instance via libbinder_ndk). services using a different copy 142 # All types used for services managed by servicemanager. 147 # All types used for services managed by hwservicemanager 150 # All HwBinder services guaranteed to be passthrough. These services always run 155 # All HwBinder services guaranteed to be offered only by core domain components 158 # All HwBinder services that untrusted apps can't directly access [all …]
|
/system/bt/bta/dm/ |
D | bta_dm_api.cc | 127 void BTA_DmSearch(tBTA_DM_INQ* p_dm_inq, tBTA_SERVICE_MASK services, in BTA_DmSearch() argument 134 p_msg->services = services; in BTA_DmSearch() 169 void BTA_DmDiscover(const RawAddress& bd_addr, tBTA_SERVICE_MASK services, in BTA_DmDiscover() argument 176 p_msg->services = services; in BTA_DmDiscover() 201 p_msg->services = BTA_USER_SERVICE_MASK; // Not exposed at API level in BTA_DmDiscoverUUID() 574 p_msg->services = p_services->srvc_mask; in bta_dm_discover_send_msg()
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | attributes | 81 # services which should be available to all but isolated apps 84 # services which should be available to all ephemeral apps 87 # services which export only system_api 90 # All types used for services managed by servicemanager. 95 # All types used for services managed by hwservicemanager 98 # All HwBinder services guaranteed to be passthrough. These services always run 103 # All HwBinder services guaranteed to be offered only by core domain components 106 # All types used for services managed by vndservicemanager 201 # PDX services 303 # HwBinder services offered across the core-vendor boundary
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | attributes | 92 # services which should be available to all but isolated apps 95 # services which should be available to all ephemeral apps 98 # services which export only system_api 101 # All types used for services managed by servicemanager. 106 # All types used for services managed by hwservicemanager 109 # All HwBinder services guaranteed to be passthrough. These services always run 114 # All HwBinder services guaranteed to be offered only by core domain components 117 # All types used for services managed by vndservicemanager 217 # PDX services 300 # HwBinder services offered across the core-vendor boundary
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | app_neverallows.te | 24 # Do not allow untrusted apps to register services. 26 # services. 124 # other than find actions for services listed below 127 # Do not permit access from apps which host arbitrary code to HwBinder services, 132 # HwBinder services either operate at a level below that of apps (e.g., HALs) 136 # 2. HAL servers (a subset of HwBinder services) contain code with higher 141 # Safe services include: 142 # - same process services: because they by definition run in the process 164 # Make sure that the following services are never accessible by untrusted_apps 203 # HwBinder services offered by core components (as opposed to vendor components)
|
D | binderservicedomain.te | 3 # Allow dumpstate and incidentd to collect information from binder services 17 # allow all services to run permission checks
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | app_neverallows.te | 19 # Do not allow untrusted apps to register services. 21 # services. 119 # other than find actions for services listed below 122 # Do not permit access from apps which host arbitrary code to HwBinder services, 127 # HwBinder services either operate at a level below that of apps (e.g., HALs) 131 # 2. HAL servers (a subset of HwBinder services) contain code with higher 136 # Safe services include: 137 # - same process services: because they by definition run in the process 158 # Make sure that the following services are never accessible by untrusted_apps 193 # HwBinder services offered by core components (as opposed to vendor components)
|
D | binderservicedomain.te | 3 # Allow dumpstate and incidentd to collect information from binder services 17 # allow all services to run permission checks
|
/system/libhwbinder/vts/performance/ |
D | Benchmark_throughput.cpp | 312 int services = -1; in main() local 338 services = atoi(argv[i + 1]); in main() 344 if (services == -1) { in main() 345 services = workers; in main() 350 for (int i = 0; i < services; i++) { in main() 362 worker_pipes.push_back(make_worker(i, iterations, services, get_stub)); in main() 396 for (int i = 0; i < services; i++) { in main()
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | binderservicedomain.te | 3 # Allow dumpstate and incidentd to collect information from binder services 17 # allow all services to run permission checks
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | binderservicedomain.te | 3 # Allow dumpstate and incidentd to collect information from binder services 17 # allow all services to run permission checks
|