Searched +full:post +full:- +full:fs +full:- +full:data (Results 1 – 25 of 31) sorted by relevance
12
/system/core/bootstat/ |
D | bootstat.rc | 5 # before post-fs trigger 6 on post-fs && property:ro.boot.bootreason=* 9 on post-fs-data 10 mkdir /data/misc/bootstat 0700 system log 13 chown system log /data/misc/bootstat/absolute_boot_time 14 chown system log /data/misc/bootstat/boot_complete 15 chown system log /data/misc/bootstat/boot_complete_no_encryption 16 chown system log /data/misc/bootstat/boot_reason 17 chown system log /data/misc/bootstat/boottime.bootloader.1BLE 18 chown system log /data/misc/bootstat/boottime.bootloader.1BLL [all …]
|
D | boot_reason_test.sh | 6 # - manual tests can only run on eng/userdebug builds 7 # - watch adb logcat -b all -d -s bootstat 8 # - watch adb logcat -b all -d | audit2allow 9 # - wait until screen is up, boot has completed, can mean wait for 44 …adb devices | grep -v 'List of devices attached' | grep "^${ANDROID_SERIAL}[${SPACE}${TAB}]" > /de… 53 [ -z "${args}" ] || args="${args} " 78 Returns: true if device (likely) has pstore data" ] 80 if inAdb && [ 0 -eq `adb_su ls /sys/fs/pstore </dev/null | wc -l` ]; then 96 if inAdb && [ 1 -ne `get_property ro.debuggable` ]; then 101 [ "USAGE: checkDebugBuild [--noerror] [all …]
|
/system/extras/boottime_tools/bootanalyze/ |
D | config.yaml | 4 …system_server: SystemServerTiming(Async)?\s*:\s*(?P<name>\S+) took to complete:\s(?P<time>[0-9]+)ms 5 system_ui: SystemUIBootTiming?\s*:\s*(?P<name>\S+) took to complete:\s(?P<time>[0-9]+)ms 6 fs_shutdown: (?P<name>boot_fs_shutdown),(?P<time>[0-9]+),([0-9]+) 7 ueventd_secs: ueventd:\s(?P<name>\S.+)\stook\s(?P<time>[.0-9]+)\sseconds 8 init_command_ms: init:\sCommand\s(?P<name>\S.+)\sreturned.*took\s(?P<time>[.0-9]+)ms 9 …: init:\sService\s.*exec\s\S+\s\((?P<name>\S.+)\).*pid.*\swaiting\stook\s(?P<time>[.0-9]+)\sseconds 10 zygote64_timing: (?P<name>Zygote64Timing\:\s\S+)\stook\sto\scomplete\:\s(?P<time>[0-9]+)ms 11 zygote32_timing: (?P<name>Zygote32Timing\:\s\S+)\stook\sto\scomplete\:\s(?P<time>[0-9]+)ms 12 …P<component>\S+)\sLong\smonitor\scontention\swith\sowner\s(?P<name>\S.+).*\sfor\s(?P<time>[.0-9]+)s 13 …<component>\S+)\sLong\smonitor\scontention\swith\sowner\s(?P<name>\S.+).*\sfor\s(?P<time>[.0-9]+)ms [all …]
|
/system/gsid/ |
D | gsid.rc | 8 on post-fs 14 on post-fs-data 15 mkdir /data/gsi 0700 root root encryption=None 16 mkdir /data/gsi/dsu 0700 root root 17 mkdir /data/gsi/ota 0700 root root 18 mkdir /data/gsi/remount 0700 root root 21 exec_background - root root -- /system/bin/gsid run-startup-tasks
|
/system/core/rootdir/ |
D | init.rc | 14 # Cgroups are mounted right before early-init using list from /etc/cgroups.json 15 on early-init 44 # set RLIMIT_NICE to allow priorities from 19 to -20 54 # Disable dm-verity hash prefetching, since it doesn't help performance 59 exec -- /system/bin/linkerconfig --target /linkerconfig/bootstrap 69 # Run apexd-bootstrap so that APEXes that provide critical libraries 72 exec_start apexd-bootstrap 86 mkdir /dev/sys/fs 0755 system system 90 on early-init && property:ro.product.cpu.abilist32=* 92 on early-init && property:ro.product.cpu.abilist64=* [all …]
|
D | asan_extract.rc | 1 # When /data is available, look for /system/asan.tar.gz and potentially extract. 2 on post-fs-data 3 exec - system system -- /system/bin/asan_extract
|
D | init.usb.rc | 6 on post-fs-data 11 mkdir /data/misc/adb 02750 system shell 12 mkdir /data/adb 0700 root root encryption=Require 15 service adbd /system/bin/adbd --root_seclabel=u:r:su:s0 121 # USB data role changes 139 on userspace-reboot-requested
|
/system/core/logd/ |
D | logtagd.rc | 4 on post-fs-data 5 mkdir /data/misc/logd 0750 logd log 6 write /data/misc/logd/event-log-tags "" 7 chown logd log /data/misc/logd/event-log-tags 8 chmod 0600 /data/misc/logd/event-log-tags 9 restorecon /data/misc/logd/event-log-tags
|
/system/nvram/hal/ |
D | fake-nvram.rc | 1 on post-fs-data 2 mkdir /data/misc/fake-nvram 0700 nvram nvram 4 service fake-nvram /system/bin/fake-nvram
|
/system/extras/profcollectd/ |
D | profcollectd.rc | 5 writepid /dev/cpuset/system-background/tasks 7 on post-fs-data 9 mkdir /data/misc/profcollectd 0770 root root 10 mkdir /data/misc/profcollectd/trace 0770 root root 11 mkdir /data/misc/profcollectd/output 0770 root root
|
/system/extras/boottime_tools/bootio/ |
D | bootio.rc | 9 on post-fs-data 10 mkdir /data/misc/bootio 0755 root shell
|
/system/core/fs_mgr/ |
D | clean_scratch_files.rc | 1 on post-fs-data && property:ro.debuggable=1 2 exec_background - root root -- /system/bin/clean_scratch_files
|
D | fs_mgr.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 46 #include <android-base/chrono_utils.h> 47 #include <android-base/file.h> 48 #include <android-base/properties.h> 49 #include <android-base/stringprintf.h> 50 #include <android-base/strings.h> 51 #include <android-base/unique_fd.h> 67 #include <linux/fs.h> 90 #define SYSFS_EXT4_VERITY "/sys/fs/ext4/features/verity" 91 #define SYSFS_EXT4_CASEFOLD "/sys/fs/ext4/features/casefold" [all …]
|
/system/core/debuggerd/tombstoned/ |
D | tombstoned.rc | 8 writepid /dev/cpuset/system-background/tasks 10 on post-fs-data
|
/system/core/trusty/utils/rpmb_dev/ |
D | rpmb_dev.rc | 2 on post-fs-data 3 mkdir /data/vendor/ss 4 chown root system /data/vendor/ss 5 chmod 0770 /data/vendor/ss 6 rm /data/vendor/ss/rpmb_sock 13 service storageproxyd /vendor/bin/storageproxyd -d /dev/trusty-ipc-dev0 \ 14 -r /data/vendor/ss/rpmb_sock -p /data/vendor/ss -t sock 19 …dev --dev /data/vendor/ss/RPMB_DATA --init --key "ea df 64 44 ea 65 5d 1c 87 27 d4 20 71 0d 53 42 … 25 service rpmb_mock /vendor/bin/rpmb_dev --dev /data/vendor/ss/RPMB_DATA --sock /data/vendor/ss/rpmb_…
|
/system/iorap/ |
D | iorapd.rc | 7 # http://www.apache.org/licenses/LICENSE-2.0 19 writepid /dev/cpuset/system-background/tasks 27 on post-fs-data 29 mkdir /data/misc/iorapd/ 0770 iorapd iorapd
|
/system/bpf/bpfloader/ |
D | bpfloader.rc | 1 # zygote-start is what officially starts netd (see //system/core/rootdir/init.rc) 2 # However, on some hardware it's started from post-fs-data as well, which is just 7 # - /sys/fs/bpf is already mounted, 8 # - apex (incl. rollback) is initialized (so that in the future we can load bpf 10 # - system properties have been set, this is because isBpfSupported() calls 13 # - logd is ready for us to log stuff 21 # Enable the eBPF JIT -- but do note that on 64-bit kernels it is likely 35 # However, while the rlimit is per-thread, the accounting is system wide. 37 # memlock data before bpfloader even gets a chance to run, it would fail 38 # if its memlock rlimit is only 8MiB - since there would be none left for it. [all …]
|
/system/core/logcat/ |
D | logcatd.rc | 4 # Make sure any property changes are only performed with /data mounted, after 5 # post-fs-data state because otherwise behavior is undefined. The exceptions 10 # persist to non-persistent trampolines to permit device properties can be 11 # overridden when /data mounts, or during runtime. 34 mkdir /data/misc/logd 0750 logd log 37 # stop logcatd service and clear data 41 # logd for clear of only our files in /data/misc/logd 42 …exec - logd log -- /system/bin/logcat -c -f /data/misc/logd/logcat -n ${logd.logpersistd.size:-256} 55 …-L -b ${logd.logpersistd.buffer:-all} -v threadtime -v usec -v printable -D -f /data/misc/logd/log… 58 # logd for write to /data/misc/logd, log group for read from log daemon [all …]
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | apexd.te | 5 # Allow creating, reading and writing of APEX files/dirs in the APEX data dir 14 # allow apexd to create loop devices with /dev/loop-control 30 # allow apexd to access /dev/block/dm-* (device-mapper entries) 34 # sys_admin is required to access the device-mapper and mount 44 # allow apexd to unlink apex files in /data/apex/active 45 # note that apexd won't be able to unlink files in /data/app-staging/session_XXXX, 49 # allow apexd to read files from /data/app-staging and hardlink them to /data/apex. 58 # Configure read-ahead of dm-verity and loop devices 59 # for dm-X 79 # Find the vold service, and call into vold to manage FS checkpoints [all …]
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | apexd.te | 5 # Allow creating, reading and writing of APEX files/dirs in the APEX data dir 14 # Allow apexd to create files and directories for snapshots of apex data 24 # Allow apexd to read directories under /data/misc_de in order to snapshot and 25 # restore apex data for all users. 28 # allow apexd to create loop devices with /dev/loop-control 44 # allow apexd to access /dev/block/dm-* (device-mapper entries) 48 # sys_admin is required to access the device-mapper and mount 67 # allow apexd to unlink apex files in /data/apex/active 68 # note that apexd won't be able to unlink files in /data/app-staging/session_XXXX, 72 # allow apexd to read files from /data/app-staging and hardlink them to /data/apex. [all …]
|
/system/sepolicy/private/ |
D | apexd.te | 5 # Allow creating, reading and writing of APEX files/dirs in the APEX data dir 14 # Allow apexd to create files and directories for snapshots of apex data 24 # Allow apexd to read directories under /data/misc_de in order to snapshot and 25 # restore apex data for all users. 28 # allow apexd to create loop devices with /dev/loop-control 44 # allow apexd to access /dev/block/dm-* (device-mapper entries) 48 # sys_admin is required to access the device-mapper and mount 67 # allow apexd to create /apex/apex-info-list.xml and relabel to apex_info_file 70 # allow apexd to unlink apex files in /data/apex/active 71 # note that apexd won't be able to unlink files in /data/app-staging/session_XXXX, [all …]
|
/system/core/adb/daemon/ |
D | main.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 37 #include <android-base/logging.h> 38 #include <android-base/macros.h> 39 #include <android-base/properties.h> 40 #include <android-base/stringprintf.h> 41 #include <android-base/strings.h> 127 // minijail_enter() will abort if any priv-dropping step fails. in drop_privileges() 137 if (cap_clear_flag(caps.get(), CAP_INHERITABLE) == -1) { in drop_privileges() 140 if (cap_clear_flag(caps.get(), CAP_EFFECTIVE) == -1) { in drop_privileges() 143 if (cap_clear_flag(caps.get(), CAP_PERMITTED) == -1) { in drop_privileges() [all …]
|
/system/core/init/ |
D | reboot.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 21 #include <linux/fs.h> 42 #include <android-base/chrono_utils.h> 43 #include <android-base/file.h> 44 #include <android-base/logging.h> 45 #include <android-base/macros.h> 46 #include <android-base/properties.h> 47 #include <android-base/scopeguard.h> 48 #include <android-base/strings.h> 49 #include <android-base/unique_fd.h> [all …]
|
/system/apex/apexd/ |
D | apexd.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 38 #include <android-base/file.h> 39 #include <android-base/logging.h> 40 #include <android-base/macros.h> 41 #include <android-base/parseint.h> 42 #include <android-base/properties.h> 43 #include <android-base/scopeguard.h> 44 #include <android-base/stringprintf.h> 45 #include <android-base/strings.h> 46 #include <android-base/unique_fd.h> [all …]
|
/system/vold/ |
D | cryptfs.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 32 #include <android-base/parseint.h> 33 #include <android-base/properties.h> 34 #include <android-base/stringprintf.h> 35 #include <android-base/strings.h> 124 * Must be zero to be compatible with pre-L \ 173 __le64 fs_size; /* Size of the encrypted fs, in 512 byte sectors */ 187 * persistent data table*/ 205 * data, which is acceptable but only if the key is not reused elsewhere. */ 218 Note also that there is no need to worry about migration. If this data is [all …]
|
12