Home
last modified time | relevance | path

Searched +full:post +full:- +full:fs +full:- +full:data (Results 1 – 25 of 31) sorted by relevance

12

/system/core/bootstat/
Dbootstat.rc5 # before post-fs trigger
6 on post-fs && property:ro.boot.bootreason=*
9 on post-fs-data
10 mkdir /data/misc/bootstat 0700 system log
13 chown system log /data/misc/bootstat/absolute_boot_time
14 chown system log /data/misc/bootstat/boot_complete
15 chown system log /data/misc/bootstat/boot_complete_no_encryption
16 chown system log /data/misc/bootstat/boot_reason
17 chown system log /data/misc/bootstat/boottime.bootloader.1BLE
18 chown system log /data/misc/bootstat/boottime.bootloader.1BLL
[all …]
Dboot_reason_test.sh6 # - manual tests can only run on eng/userdebug builds
7 # - watch adb logcat -b all -d -s bootstat
8 # - watch adb logcat -b all -d | audit2allow
9 # - wait until screen is up, boot has completed, can mean wait for
44 …adb devices | grep -v 'List of devices attached' | grep "^${ANDROID_SERIAL}[${SPACE}${TAB}]" > /de…
53 [ -z "${args}" ] || args="${args} "
78 Returns: true if device (likely) has pstore data" ]
80 if inAdb && [ 0 -eq `adb_su ls /sys/fs/pstore </dev/null | wc -l` ]; then
96 if inAdb && [ 1 -ne `get_property ro.debuggable` ]; then
101 [ "USAGE: checkDebugBuild [--noerror]
[all …]
/system/extras/boottime_tools/bootanalyze/
Dconfig.yaml4 …system_server: SystemServerTiming(Async)?\s*:\s*(?P<name>\S+) took to complete:\s(?P<time>[0-9]+)ms
5 system_ui: SystemUIBootTiming?\s*:\s*(?P<name>\S+) took to complete:\s(?P<time>[0-9]+)ms
6 fs_shutdown: (?P<name>boot_fs_shutdown),(?P<time>[0-9]+),([0-9]+)
7 ueventd_secs: ueventd:\s(?P<name>\S.+)\stook\s(?P<time>[.0-9]+)\sseconds
8 init_command_ms: init:\sCommand\s(?P<name>\S.+)\sreturned.*took\s(?P<time>[.0-9]+)ms
9 …: init:\sService\s.*exec\s\S+\s\((?P<name>\S.+)\).*pid.*\swaiting\stook\s(?P<time>[.0-9]+)\sseconds
10 zygote64_timing: (?P<name>Zygote64Timing\:\s\S+)\stook\sto\scomplete\:\s(?P<time>[0-9]+)ms
11 zygote32_timing: (?P<name>Zygote32Timing\:\s\S+)\stook\sto\scomplete\:\s(?P<time>[0-9]+)ms
12 …P<component>\S+)\sLong\smonitor\scontention\swith\sowner\s(?P<name>\S.+).*\sfor\s(?P<time>[.0-9]+)s
13 …<component>\S+)\sLong\smonitor\scontention\swith\sowner\s(?P<name>\S.+).*\sfor\s(?P<time>[.0-9]+)ms
[all …]
/system/gsid/
Dgsid.rc8 on post-fs
14 on post-fs-data
15 mkdir /data/gsi 0700 root root encryption=None
16 mkdir /data/gsi/dsu 0700 root root
17 mkdir /data/gsi/ota 0700 root root
18 mkdir /data/gsi/remount 0700 root root
21 exec_background - root root -- /system/bin/gsid run-startup-tasks
/system/core/rootdir/
Dinit.rc14 # Cgroups are mounted right before early-init using list from /etc/cgroups.json
15 on early-init
44 # set RLIMIT_NICE to allow priorities from 19 to -20
54 # Disable dm-verity hash prefetching, since it doesn't help performance
59 exec -- /system/bin/linkerconfig --target /linkerconfig/bootstrap
69 # Run apexd-bootstrap so that APEXes that provide critical libraries
72 exec_start apexd-bootstrap
86 mkdir /dev/sys/fs 0755 system system
90 on early-init && property:ro.product.cpu.abilist32=*
92 on early-init && property:ro.product.cpu.abilist64=*
[all …]
Dasan_extract.rc1 # When /data is available, look for /system/asan.tar.gz and potentially extract.
2 on post-fs-data
3 exec - system system -- /system/bin/asan_extract
Dinit.usb.rc6 on post-fs-data
11 mkdir /data/misc/adb 02750 system shell
12 mkdir /data/adb 0700 root root encryption=Require
15 service adbd /system/bin/adbd --root_seclabel=u:r:su:s0
121 # USB data role changes
139 on userspace-reboot-requested
/system/core/logd/
Dlogtagd.rc4 on post-fs-data
5 mkdir /data/misc/logd 0750 logd log
6 write /data/misc/logd/event-log-tags ""
7 chown logd log /data/misc/logd/event-log-tags
8 chmod 0600 /data/misc/logd/event-log-tags
9 restorecon /data/misc/logd/event-log-tags
/system/nvram/hal/
Dfake-nvram.rc1 on post-fs-data
2 mkdir /data/misc/fake-nvram 0700 nvram nvram
4 service fake-nvram /system/bin/fake-nvram
/system/extras/profcollectd/
Dprofcollectd.rc5 writepid /dev/cpuset/system-background/tasks
7 on post-fs-data
9 mkdir /data/misc/profcollectd 0770 root root
10 mkdir /data/misc/profcollectd/trace 0770 root root
11 mkdir /data/misc/profcollectd/output 0770 root root
/system/extras/boottime_tools/bootio/
Dbootio.rc9 on post-fs-data
10 mkdir /data/misc/bootio 0755 root shell
/system/core/fs_mgr/
Dclean_scratch_files.rc1 on post-fs-data && property:ro.debuggable=1
2 exec_background - root root -- /system/bin/clean_scratch_files
Dfs_mgr.cpp8 * http://www.apache.org/licenses/LICENSE-2.0
46 #include <android-base/chrono_utils.h>
47 #include <android-base/file.h>
48 #include <android-base/properties.h>
49 #include <android-base/stringprintf.h>
50 #include <android-base/strings.h>
51 #include <android-base/unique_fd.h>
67 #include <linux/fs.h>
90 #define SYSFS_EXT4_VERITY "/sys/fs/ext4/features/verity"
91 #define SYSFS_EXT4_CASEFOLD "/sys/fs/ext4/features/casefold"
[all …]
/system/core/debuggerd/tombstoned/
Dtombstoned.rc8 writepid /dev/cpuset/system-background/tasks
10 on post-fs-data
/system/core/trusty/utils/rpmb_dev/
Drpmb_dev.rc2 on post-fs-data
3 mkdir /data/vendor/ss
4 chown root system /data/vendor/ss
5 chmod 0770 /data/vendor/ss
6 rm /data/vendor/ss/rpmb_sock
13 service storageproxyd /vendor/bin/storageproxyd -d /dev/trusty-ipc-dev0 \
14 -r /data/vendor/ss/rpmb_sock -p /data/vendor/ss -t sock
19 …dev --dev /data/vendor/ss/RPMB_DATA --init --key "ea df 64 44 ea 65 5d 1c 87 27 d4 20 71 0d 53 42 …
25 service rpmb_mock /vendor/bin/rpmb_dev --dev /data/vendor/ss/RPMB_DATA --sock /data/vendor/ss/rpmb_…
/system/iorap/
Diorapd.rc7 # http://www.apache.org/licenses/LICENSE-2.0
19 writepid /dev/cpuset/system-background/tasks
27 on post-fs-data
29 mkdir /data/misc/iorapd/ 0770 iorapd iorapd
/system/bpf/bpfloader/
Dbpfloader.rc1 # zygote-start is what officially starts netd (see //system/core/rootdir/init.rc)
2 # However, on some hardware it's started from post-fs-data as well, which is just
7 # - /sys/fs/bpf is already mounted,
8 # - apex (incl. rollback) is initialized (so that in the future we can load bpf
10 # - system properties have been set, this is because isBpfSupported() calls
13 # - logd is ready for us to log stuff
21 # Enable the eBPF JIT -- but do note that on 64-bit kernels it is likely
35 # However, while the rlimit is per-thread, the accounting is system wide.
37 # memlock data before bpfloader even gets a chance to run, it would fail
38 # if its memlock rlimit is only 8MiB - since there would be none left for it.
[all …]
/system/core/logcat/
Dlogcatd.rc4 # Make sure any property changes are only performed with /data mounted, after
5 # post-fs-data state because otherwise behavior is undefined. The exceptions
10 # persist to non-persistent trampolines to permit device properties can be
11 # overridden when /data mounts, or during runtime.
34 mkdir /data/misc/logd 0750 logd log
37 # stop logcatd service and clear data
41 # logd for clear of only our files in /data/misc/logd
42 …exec - logd log -- /system/bin/logcat -c -f /data/misc/logd/logcat -n ${logd.logpersistd.size:-256}
55-L -b ${logd.logpersistd.buffer:-all} -v threadtime -v usec -v printable -D -f /data/misc/logd/log…
58 # logd for write to /data/misc/logd, log group for read from log daemon
[all …]
/system/sepolicy/prebuilts/api/29.0/private/
Dapexd.te5 # Allow creating, reading and writing of APEX files/dirs in the APEX data dir
14 # allow apexd to create loop devices with /dev/loop-control
30 # allow apexd to access /dev/block/dm-* (device-mapper entries)
34 # sys_admin is required to access the device-mapper and mount
44 # allow apexd to unlink apex files in /data/apex/active
45 # note that apexd won't be able to unlink files in /data/app-staging/session_XXXX,
49 # allow apexd to read files from /data/app-staging and hardlink them to /data/apex.
58 # Configure read-ahead of dm-verity and loop devices
59 # for dm-X
79 # Find the vold service, and call into vold to manage FS checkpoints
[all …]
/system/sepolicy/prebuilts/api/30.0/private/
Dapexd.te5 # Allow creating, reading and writing of APEX files/dirs in the APEX data dir
14 # Allow apexd to create files and directories for snapshots of apex data
24 # Allow apexd to read directories under /data/misc_de in order to snapshot and
25 # restore apex data for all users.
28 # allow apexd to create loop devices with /dev/loop-control
44 # allow apexd to access /dev/block/dm-* (device-mapper entries)
48 # sys_admin is required to access the device-mapper and mount
67 # allow apexd to unlink apex files in /data/apex/active
68 # note that apexd won't be able to unlink files in /data/app-staging/session_XXXX,
72 # allow apexd to read files from /data/app-staging and hardlink them to /data/apex.
[all …]
/system/sepolicy/private/
Dapexd.te5 # Allow creating, reading and writing of APEX files/dirs in the APEX data dir
14 # Allow apexd to create files and directories for snapshots of apex data
24 # Allow apexd to read directories under /data/misc_de in order to snapshot and
25 # restore apex data for all users.
28 # allow apexd to create loop devices with /dev/loop-control
44 # allow apexd to access /dev/block/dm-* (device-mapper entries)
48 # sys_admin is required to access the device-mapper and mount
67 # allow apexd to create /apex/apex-info-list.xml and relabel to apex_info_file
70 # allow apexd to unlink apex files in /data/apex/active
71 # note that apexd won't be able to unlink files in /data/app-staging/session_XXXX,
[all …]
/system/core/adb/daemon/
Dmain.cpp8 * http://www.apache.org/licenses/LICENSE-2.0
37 #include <android-base/logging.h>
38 #include <android-base/macros.h>
39 #include <android-base/properties.h>
40 #include <android-base/stringprintf.h>
41 #include <android-base/strings.h>
127 // minijail_enter() will abort if any priv-dropping step fails. in drop_privileges()
137 if (cap_clear_flag(caps.get(), CAP_INHERITABLE) == -1) { in drop_privileges()
140 if (cap_clear_flag(caps.get(), CAP_EFFECTIVE) == -1) { in drop_privileges()
143 if (cap_clear_flag(caps.get(), CAP_PERMITTED) == -1) { in drop_privileges()
[all …]
/system/core/init/
Dreboot.cpp8 * http://www.apache.org/licenses/LICENSE-2.0
21 #include <linux/fs.h>
42 #include <android-base/chrono_utils.h>
43 #include <android-base/file.h>
44 #include <android-base/logging.h>
45 #include <android-base/macros.h>
46 #include <android-base/properties.h>
47 #include <android-base/scopeguard.h>
48 #include <android-base/strings.h>
49 #include <android-base/unique_fd.h>
[all …]
/system/apex/apexd/
Dapexd.cpp8 * http://www.apache.org/licenses/LICENSE-2.0
38 #include <android-base/file.h>
39 #include <android-base/logging.h>
40 #include <android-base/macros.h>
41 #include <android-base/parseint.h>
42 #include <android-base/properties.h>
43 #include <android-base/scopeguard.h>
44 #include <android-base/stringprintf.h>
45 #include <android-base/strings.h>
46 #include <android-base/unique_fd.h>
[all …]
/system/vold/
Dcryptfs.cpp8 * http://www.apache.org/licenses/LICENSE-2.0
32 #include <android-base/parseint.h>
33 #include <android-base/properties.h>
34 #include <android-base/stringprintf.h>
35 #include <android-base/strings.h>
124 * Must be zero to be compatible with pre-L \
173 __le64 fs_size; /* Size of the encrypted fs, in 512 byte sectors */
187 * persistent data table*/
205 * data, which is acceptable but only if the key is not reused elsewhere. */
218 Note also that there is no need to worry about migration. If this data is
[all …]

12