Home
last modified time | relevance | path

Searched +full:post +full:- +full:fs (Results 1 – 25 of 34) sorted by relevance

12

/system/extras/boottime_tools/bootanalyze/
Dconfig.yaml4 …system_server: SystemServerTiming(Async)?\s*:\s*(?P<name>\S+) took to complete:\s(?P<time>[0-9]+)ms
5 system_ui: SystemUIBootTiming?\s*:\s*(?P<name>\S+) took to complete:\s(?P<time>[0-9]+)ms
6 fs_shutdown: (?P<name>boot_fs_shutdown),(?P<time>[0-9]+),([0-9]+)
7 ueventd_secs: ueventd:\s(?P<name>\S.+)\stook\s(?P<time>[.0-9]+)\sseconds
8 init_command_ms: init:\sCommand\s(?P<name>\S.+)\sreturned.*took\s(?P<time>[.0-9]+)ms
9 …: init:\sService\s.*exec\s\S+\s\((?P<name>\S.+)\).*pid.*\swaiting\stook\s(?P<time>[.0-9]+)\sseconds
10 zygote64_timing: (?P<name>Zygote64Timing\:\s\S+)\stook\sto\scomplete\:\s(?P<time>[0-9]+)ms
11 zygote32_timing: (?P<name>Zygote32Timing\:\s\S+)\stook\sto\scomplete\:\s(?P<time>[0-9]+)ms
12 …P<component>\S+)\sLong\smonitor\scontention\swith\sowner\s(?P<name>\S.+).*\sfor\s(?P<time>[.0-9]+)s
13 …<component>\S+)\sLong\smonitor\scontention\swith\sowner\s(?P<name>\S.+).*\sfor\s(?P<time>[.0-9]+)ms
[all …]
/system/core/bootstat/
Dbootstat.rc5 # before post-fs trigger
6 on post-fs && property:ro.boot.bootreason=*
9 on post-fs-data
47 # post-fs-data: /data is writable
50 on post-fs-data && property:init.svc.bootanim=running && property:ro.crypto.type=block
51 exec_background - system log -- /system/bin/bootstat -r post_decrypt_time_elapsed
58 # sys.bootstat.first_boot_completed=0 - first boot completed trigger wasn't processed yet.
59 # sys.bootstat.first_boot_completed=1 - first boot completed trigger was processed and
65 # state machine only once, which as result ensures that bootstat --set_system_boot_reason and
66 # bootstat --record_boot_complete will be called only once per full reboot.
[all …]
Dboot_reason_test.sh6 # - manual tests can only run on eng/userdebug builds
7 # - watch adb logcat -b all -d -s bootstat
8 # - watch adb logcat -b all -d | audit2allow
9 # - wait until screen is up, boot has completed, can mean wait for
44 …adb devices | grep -v 'List of devices attached' | grep "^${ANDROID_SERIAL}[${SPACE}${TAB}]" > /de…
53 [ -z "${args}" ] || args="${args} "
80 if inAdb && [ 0 -eq `adb_su ls /sys/fs/pstore </dev/null | wc -l` ]; then
96 if inAdb && [ 1 -ne `get_property ro.debuggable` ]; then
101 [ "USAGE: checkDebugBuild [--noerror]
107 elif [ -n "${1}" ]; then
[all …]
/system/gsid/
Dgsid.rc8 on post-fs
14 on post-fs-data
21 exec_background - root root -- /system/bin/gsid run-startup-tasks
/system/core/fs_mgr/
Dclean_scratch_files.rc1 on post-fs-data && property:ro.debuggable=1
2 exec_background - root root -- /system/bin/clean_scratch_files
/system/core/rootdir/
Dasan_extract.rc2 on post-fs-data
3 exec - system system -- /system/bin/asan_extract
Dinit.rc14 # Cgroups are mounted right before early-init using list from /etc/cgroups.json
15 on early-init
44 # set RLIMIT_NICE to allow priorities from 19 to -20
54 # Disable dm-verity hash prefetching, since it doesn't help performance
59 exec -- /system/bin/linkerconfig --target /linkerconfig/bootstrap
69 # Run apexd-bootstrap so that APEXes that provide critical libraries
72 exec_start apexd-bootstrap
86 mkdir /dev/sys/fs 0755 system system
90 on early-init && property:ro.product.cpu.abilist32=*
92 on early-init && property:ro.product.cpu.abilist64=*
[all …]
Dinit.usb.rc6 on post-fs-data
15 service adbd /system/bin/adbd --root_seclabel=u:r:su:s0
139 on userspace-reboot-requested
/system/nvram/hal/
Dfake-nvram.rc1 on post-fs-data
2 mkdir /data/misc/fake-nvram 0700 nvram nvram
4 service fake-nvram /system/bin/fake-nvram
/system/extras/boottime_tools/bootio/
Dbootio.rc9 on post-fs-data
/system/core/debuggerd/tombstoned/
Dtombstoned.rc8 writepid /dev/cpuset/system-background/tasks
10 on post-fs-data
/system/extras/profcollectd/
Dprofcollectd.rc5 writepid /dev/cpuset/system-background/tasks
7 on post-fs-data
/system/core/logd/
Dlogtagd.rc4 on post-fs-data
6 write /data/misc/logd/event-log-tags ""
7 chown logd log /data/misc/logd/event-log-tags
8 chmod 0600 /data/misc/logd/event-log-tags
9 restorecon /data/misc/logd/event-log-tags
/system/core/trusty/utils/rpmb_dev/
Drpmb_dev.rc2 on post-fs-data
13 service storageproxyd /vendor/bin/storageproxyd -d /dev/trusty-ipc-dev0 \
14 -r /data/vendor/ss/rpmb_sock -p /data/vendor/ss -t sock
19 …dev --dev /data/vendor/ss/RPMB_DATA --init --key "ea df 64 44 ea 65 5d 1c 87 27 d4 20 71 0d 53 42 …
25 service rpmb_mock /vendor/bin/rpmb_dev --dev /data/vendor/ss/RPMB_DATA --sock /data/vendor/ss/rpmb_…
/system/iorap/
Diorapd.rc7 # http://www.apache.org/licenses/LICENSE-2.0
19 writepid /dev/cpuset/system-background/tasks
27 on post-fs-data
/system/apex/apexd/
Dapex_shim.cpp8 * http://www.apache.org/licenses/LICENSE-2.0
19 #include <android-base/file.h>
20 #include <android-base/logging.h>
21 #include <android-base/stringprintf.h>
22 #include <android-base/strings.h>
41 namespace fs = std::filesystem;
48 static constexpr const fs::perms kForbiddenFilePermissions =
49 fs::perms::owner_exec | fs::perms::group_exec | fs::perms::others_exec;
55 "priv-app/CtsShimPrivPrebuilt/CtsShimPrivPrebuilt.apk",
116 return Errorf("Shim apex is not allowed to have pre or post install hooks"); in ValidateShimApex()
[all …]
/system/bpf/bpfloader/
Dbpfloader.rc1 # zygote-start is what officially starts netd (see //system/core/rootdir/init.rc)
2 # However, on some hardware it's started from post-fs-data as well, which is just
7 # - /sys/fs/bpf is already mounted,
8 # - apex (incl. rollback) is initialized (so that in the future we can load bpf
10 # - system properties have been set, this is because isBpfSupported() calls
13 # - logd is ready for us to log stuff
21 # Enable the eBPF JIT -- but do note that on 64-bit kernels it is likely
35 # However, while the rlimit is per-thread, the accounting is system wide.
38 # if its memlock rlimit is only 8MiB - since there would be none left for it.
60 reboot_on_failure reboot,bpfloader-failed
/system/update_engine/init/
Dupdate-engine.conf8 # http://www.apache.org/licenses/LICENSE-2.0
18 author "chromium-os-dev@chromium.org"
20 # N.B. The chromeos-factoryinstall ebuild edits the 'start on' line so as
23 start on starting system-services
24 stop on stopping system-services
35 exec ionice -c3 update_engine
39 post-start script
40 cgroup_dir="/sys/fs/cgroup/cpu/${UPSTART_JOB}"
41 mkdir -p "${cgroup_dir}"
42 echo $(status | cut -f 4 -d ' ') > "${cgroup_dir}/tasks"
/system/core/logcat/
Dlogcatd.rc5 # post-fs-data state because otherwise behavior is undefined. The exceptions
10 # persist to non-persistent trampolines to permit device properties can be
42 …exec - logd log -- /system/bin/logcat -c -f /data/misc/logd/logcat -n ${logd.logpersistd.size:-256}
55-L -b ${logd.logpersistd.buffer:-all} -v threadtime -v usec -v printable -D -f /data/misc/logd/log…
61 writepid /dev/cpuset/system-background/tasks
62 oom_score_adjust -600
/system/sepolicy/prebuilts/api/29.0/private/
Dapexd.te14 # allow apexd to create loop devices with /dev/loop-control
30 # allow apexd to access /dev/block/dm-* (device-mapper entries)
34 # sys_admin is required to access the device-mapper and mount
45 # note that apexd won't be able to unlink files in /data/app-staging/session_XXXX,
49 # allow apexd to read files from /data/app-staging and hardlink them to /data/apex.
58 # Configure read-ahead of dm-verity and loop devices
59 # for dm-X
79 # Find the vold service, and call into vold to manage FS checkpoints
83 # Apex pre- & post-install permission.
85 # Allow self-execute for the fork mount helper.
[all …]
/system/sepolicy/prebuilts/api/30.0/private/
Dapexd.te28 # allow apexd to create loop devices with /dev/loop-control
44 # allow apexd to access /dev/block/dm-* (device-mapper entries)
48 # sys_admin is required to access the device-mapper and mount
68 # note that apexd won't be able to unlink files in /data/app-staging/session_XXXX,
72 # allow apexd to read files from /data/app-staging and hardlink them to /data/apex.
85 # Configure read-ahead of dm-verity and loop devices
86 # for dm-X
103 # Find the vold service, and call into vold to manage FS checkpoints
107 # Apex pre- & post-install permission.
109 # Allow self-execute for the fork mount helper.
[all …]
/system/sepolicy/private/
Dapexd.te28 # allow apexd to create loop devices with /dev/loop-control
44 # allow apexd to access /dev/block/dm-* (device-mapper entries)
48 # sys_admin is required to access the device-mapper and mount
67 # allow apexd to create /apex/apex-info-list.xml and relabel to apex_info_file
71 # note that apexd won't be able to unlink files in /data/app-staging/session_XXXX,
75 # allow apexd to read files from /data/app-staging and hardlink them to /data/apex.
88 # Configure read-ahead of dm-verity and loop devices
89 # for dm-X
106 # Find the vold service, and call into vold to manage FS checkpoints
110 # Apex pre- & post-install permission.
[all …]
/system/core/init/
DREADME.ueventd.md2 -------
17 ----
25 `/dev/block/<type>/<parent device>/by-name/<uevent PARTNAME>`, and `/dev/block/by-name/<uevent
68 ----
84 ----------------
100 Ueventd will wait until after `post-fs` in init, to keep retrying before believing the firmwares are
124 --------
Dreboot.cpp8 * http://www.apache.org/licenses/LICENSE-2.0
21 #include <linux/fs.h>
42 #include <android-base/chrono_utils.h>
43 #include <android-base/file.h>
44 #include <android-base/logging.h>
45 #include <android-base/macros.h>
46 #include <android-base/properties.h>
47 #include <android-base/scopeguard.h>
48 #include <android-base/strings.h>
49 #include <android-base/unique_fd.h>
[all …]
/system/core/adb/daemon/
Dmain.cpp8 * http://www.apache.org/licenses/LICENSE-2.0
37 #include <android-base/logging.h>
38 #include <android-base/macros.h>
39 #include <android-base/properties.h>
40 #include <android-base/stringprintf.h>
41 #include <android-base/strings.h>
127 // minijail_enter() will abort if any priv-dropping step fails. in drop_privileges()
137 if (cap_clear_flag(caps.get(), CAP_INHERITABLE) == -1) { in drop_privileges()
140 if (cap_clear_flag(caps.get(), CAP_EFFECTIVE) == -1) { in drop_privileges()
143 if (cap_clear_flag(caps.get(), CAP_PERMITTED) == -1) { in drop_privileges()
[all …]

12