Searched +full:post +full:- +full:fs (Results 1 – 25 of 34) sorted by relevance
12
/system/extras/boottime_tools/bootanalyze/ |
D | config.yaml | 4 …system_server: SystemServerTiming(Async)?\s*:\s*(?P<name>\S+) took to complete:\s(?P<time>[0-9]+)ms 5 system_ui: SystemUIBootTiming?\s*:\s*(?P<name>\S+) took to complete:\s(?P<time>[0-9]+)ms 6 fs_shutdown: (?P<name>boot_fs_shutdown),(?P<time>[0-9]+),([0-9]+) 7 ueventd_secs: ueventd:\s(?P<name>\S.+)\stook\s(?P<time>[.0-9]+)\sseconds 8 init_command_ms: init:\sCommand\s(?P<name>\S.+)\sreturned.*took\s(?P<time>[.0-9]+)ms 9 …: init:\sService\s.*exec\s\S+\s\((?P<name>\S.+)\).*pid.*\swaiting\stook\s(?P<time>[.0-9]+)\sseconds 10 zygote64_timing: (?P<name>Zygote64Timing\:\s\S+)\stook\sto\scomplete\:\s(?P<time>[0-9]+)ms 11 zygote32_timing: (?P<name>Zygote32Timing\:\s\S+)\stook\sto\scomplete\:\s(?P<time>[0-9]+)ms 12 …P<component>\S+)\sLong\smonitor\scontention\swith\sowner\s(?P<name>\S.+).*\sfor\s(?P<time>[.0-9]+)s 13 …<component>\S+)\sLong\smonitor\scontention\swith\sowner\s(?P<name>\S.+).*\sfor\s(?P<time>[.0-9]+)ms [all …]
|
/system/core/bootstat/ |
D | bootstat.rc | 5 # before post-fs trigger 6 on post-fs && property:ro.boot.bootreason=* 9 on post-fs-data 47 # post-fs-data: /data is writable 50 on post-fs-data && property:init.svc.bootanim=running && property:ro.crypto.type=block 51 exec_background - system log -- /system/bin/bootstat -r post_decrypt_time_elapsed 58 # sys.bootstat.first_boot_completed=0 - first boot completed trigger wasn't processed yet. 59 # sys.bootstat.first_boot_completed=1 - first boot completed trigger was processed and 65 # state machine only once, which as result ensures that bootstat --set_system_boot_reason and 66 # bootstat --record_boot_complete will be called only once per full reboot. [all …]
|
D | boot_reason_test.sh | 6 # - manual tests can only run on eng/userdebug builds 7 # - watch adb logcat -b all -d -s bootstat 8 # - watch adb logcat -b all -d | audit2allow 9 # - wait until screen is up, boot has completed, can mean wait for 44 …adb devices | grep -v 'List of devices attached' | grep "^${ANDROID_SERIAL}[${SPACE}${TAB}]" > /de… 53 [ -z "${args}" ] || args="${args} " 80 if inAdb && [ 0 -eq `adb_su ls /sys/fs/pstore </dev/null | wc -l` ]; then 96 if inAdb && [ 1 -ne `get_property ro.debuggable` ]; then 101 [ "USAGE: checkDebugBuild [--noerror] 107 elif [ -n "${1}" ]; then [all …]
|
/system/gsid/ |
D | gsid.rc | 8 on post-fs 14 on post-fs-data 21 exec_background - root root -- /system/bin/gsid run-startup-tasks
|
/system/core/fs_mgr/ |
D | clean_scratch_files.rc | 1 on post-fs-data && property:ro.debuggable=1 2 exec_background - root root -- /system/bin/clean_scratch_files
|
/system/core/rootdir/ |
D | asan_extract.rc | 2 on post-fs-data 3 exec - system system -- /system/bin/asan_extract
|
D | init.rc | 14 # Cgroups are mounted right before early-init using list from /etc/cgroups.json 15 on early-init 44 # set RLIMIT_NICE to allow priorities from 19 to -20 54 # Disable dm-verity hash prefetching, since it doesn't help performance 59 exec -- /system/bin/linkerconfig --target /linkerconfig/bootstrap 69 # Run apexd-bootstrap so that APEXes that provide critical libraries 72 exec_start apexd-bootstrap 86 mkdir /dev/sys/fs 0755 system system 90 on early-init && property:ro.product.cpu.abilist32=* 92 on early-init && property:ro.product.cpu.abilist64=* [all …]
|
D | init.usb.rc | 6 on post-fs-data 15 service adbd /system/bin/adbd --root_seclabel=u:r:su:s0 139 on userspace-reboot-requested
|
/system/nvram/hal/ |
D | fake-nvram.rc | 1 on post-fs-data 2 mkdir /data/misc/fake-nvram 0700 nvram nvram 4 service fake-nvram /system/bin/fake-nvram
|
/system/extras/boottime_tools/bootio/ |
D | bootio.rc | 9 on post-fs-data
|
/system/core/debuggerd/tombstoned/ |
D | tombstoned.rc | 8 writepid /dev/cpuset/system-background/tasks 10 on post-fs-data
|
/system/extras/profcollectd/ |
D | profcollectd.rc | 5 writepid /dev/cpuset/system-background/tasks 7 on post-fs-data
|
/system/core/logd/ |
D | logtagd.rc | 4 on post-fs-data 6 write /data/misc/logd/event-log-tags "" 7 chown logd log /data/misc/logd/event-log-tags 8 chmod 0600 /data/misc/logd/event-log-tags 9 restorecon /data/misc/logd/event-log-tags
|
/system/core/trusty/utils/rpmb_dev/ |
D | rpmb_dev.rc | 2 on post-fs-data 13 service storageproxyd /vendor/bin/storageproxyd -d /dev/trusty-ipc-dev0 \ 14 -r /data/vendor/ss/rpmb_sock -p /data/vendor/ss -t sock 19 …dev --dev /data/vendor/ss/RPMB_DATA --init --key "ea df 64 44 ea 65 5d 1c 87 27 d4 20 71 0d 53 42 … 25 service rpmb_mock /vendor/bin/rpmb_dev --dev /data/vendor/ss/RPMB_DATA --sock /data/vendor/ss/rpmb_…
|
/system/iorap/ |
D | iorapd.rc | 7 # http://www.apache.org/licenses/LICENSE-2.0 19 writepid /dev/cpuset/system-background/tasks 27 on post-fs-data
|
/system/apex/apexd/ |
D | apex_shim.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 19 #include <android-base/file.h> 20 #include <android-base/logging.h> 21 #include <android-base/stringprintf.h> 22 #include <android-base/strings.h> 41 namespace fs = std::filesystem; 48 static constexpr const fs::perms kForbiddenFilePermissions = 49 fs::perms::owner_exec | fs::perms::group_exec | fs::perms::others_exec; 55 "priv-app/CtsShimPrivPrebuilt/CtsShimPrivPrebuilt.apk", 116 return Errorf("Shim apex is not allowed to have pre or post install hooks"); in ValidateShimApex() [all …]
|
/system/bpf/bpfloader/ |
D | bpfloader.rc | 1 # zygote-start is what officially starts netd (see //system/core/rootdir/init.rc) 2 # However, on some hardware it's started from post-fs-data as well, which is just 7 # - /sys/fs/bpf is already mounted, 8 # - apex (incl. rollback) is initialized (so that in the future we can load bpf 10 # - system properties have been set, this is because isBpfSupported() calls 13 # - logd is ready for us to log stuff 21 # Enable the eBPF JIT -- but do note that on 64-bit kernels it is likely 35 # However, while the rlimit is per-thread, the accounting is system wide. 38 # if its memlock rlimit is only 8MiB - since there would be none left for it. 60 reboot_on_failure reboot,bpfloader-failed
|
/system/update_engine/init/ |
D | update-engine.conf | 8 # http://www.apache.org/licenses/LICENSE-2.0 18 author "chromium-os-dev@chromium.org" 20 # N.B. The chromeos-factoryinstall ebuild edits the 'start on' line so as 23 start on starting system-services 24 stop on stopping system-services 35 exec ionice -c3 update_engine 39 post-start script 40 cgroup_dir="/sys/fs/cgroup/cpu/${UPSTART_JOB}" 41 mkdir -p "${cgroup_dir}" 42 echo $(status | cut -f 4 -d ' ') > "${cgroup_dir}/tasks"
|
/system/core/logcat/ |
D | logcatd.rc | 5 # post-fs-data state because otherwise behavior is undefined. The exceptions 10 # persist to non-persistent trampolines to permit device properties can be 42 …exec - logd log -- /system/bin/logcat -c -f /data/misc/logd/logcat -n ${logd.logpersistd.size:-256} 55 …-L -b ${logd.logpersistd.buffer:-all} -v threadtime -v usec -v printable -D -f /data/misc/logd/log… 61 writepid /dev/cpuset/system-background/tasks 62 oom_score_adjust -600
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | apexd.te | 14 # allow apexd to create loop devices with /dev/loop-control 30 # allow apexd to access /dev/block/dm-* (device-mapper entries) 34 # sys_admin is required to access the device-mapper and mount 45 # note that apexd won't be able to unlink files in /data/app-staging/session_XXXX, 49 # allow apexd to read files from /data/app-staging and hardlink them to /data/apex. 58 # Configure read-ahead of dm-verity and loop devices 59 # for dm-X 79 # Find the vold service, and call into vold to manage FS checkpoints 83 # Apex pre- & post-install permission. 85 # Allow self-execute for the fork mount helper. [all …]
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | apexd.te | 28 # allow apexd to create loop devices with /dev/loop-control 44 # allow apexd to access /dev/block/dm-* (device-mapper entries) 48 # sys_admin is required to access the device-mapper and mount 68 # note that apexd won't be able to unlink files in /data/app-staging/session_XXXX, 72 # allow apexd to read files from /data/app-staging and hardlink them to /data/apex. 85 # Configure read-ahead of dm-verity and loop devices 86 # for dm-X 103 # Find the vold service, and call into vold to manage FS checkpoints 107 # Apex pre- & post-install permission. 109 # Allow self-execute for the fork mount helper. [all …]
|
/system/sepolicy/private/ |
D | apexd.te | 28 # allow apexd to create loop devices with /dev/loop-control 44 # allow apexd to access /dev/block/dm-* (device-mapper entries) 48 # sys_admin is required to access the device-mapper and mount 67 # allow apexd to create /apex/apex-info-list.xml and relabel to apex_info_file 71 # note that apexd won't be able to unlink files in /data/app-staging/session_XXXX, 75 # allow apexd to read files from /data/app-staging and hardlink them to /data/apex. 88 # Configure read-ahead of dm-verity and loop devices 89 # for dm-X 106 # Find the vold service, and call into vold to manage FS checkpoints 110 # Apex pre- & post-install permission. [all …]
|
/system/core/init/ |
D | README.ueventd.md | 2 ------- 17 ---- 25 `/dev/block/<type>/<parent device>/by-name/<uevent PARTNAME>`, and `/dev/block/by-name/<uevent 68 ---- 84 ---------------- 100 Ueventd will wait until after `post-fs` in init, to keep retrying before believing the firmwares are 124 --------
|
D | reboot.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 21 #include <linux/fs.h> 42 #include <android-base/chrono_utils.h> 43 #include <android-base/file.h> 44 #include <android-base/logging.h> 45 #include <android-base/macros.h> 46 #include <android-base/properties.h> 47 #include <android-base/scopeguard.h> 48 #include <android-base/strings.h> 49 #include <android-base/unique_fd.h> [all …]
|
/system/core/adb/daemon/ |
D | main.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 37 #include <android-base/logging.h> 38 #include <android-base/macros.h> 39 #include <android-base/properties.h> 40 #include <android-base/stringprintf.h> 41 #include <android-base/strings.h> 127 // minijail_enter() will abort if any priv-dropping step fails. in drop_privileges() 137 if (cap_clear_flag(caps.get(), CAP_INHERITABLE) == -1) { in drop_privileges() 140 if (cap_clear_flag(caps.get(), CAP_EFFECTIVE) == -1) { in drop_privileges() 143 if (cap_clear_flag(caps.get(), CAP_PERMITTED) == -1) { in drop_privileges() [all …]
|
12