Lines Matching +full:post +full:- +full:fs
14 # Cgroups are mounted right before early-init using list from /etc/cgroups.json
15 on early-init
42 # set RLIMIT_NICE to allow priorities from 19 to -20
55 # Greatly extend dm-verity's Merkle tree cache timeout. The default timeout
59 # Disable dm-verity hash prefetching, since it doesn't help performance
78 # Run apexd-bootstrap so that APEXes that provide critical libraries
81 exec_start apexd-bootstrap
82 perform_apex_config --bootstrap
90 mkdir /dev/sys/fs 0755 system system
106 # Mix device-specific information into the entropy pool
114 # Create socket dir for ot-daemon
115 mkdir /dev/socket/ot-daemon 0770 thread_network thread_network
121 mkdir /dev/cpuctl/top-app
124 mkdir /dev/cpuctl/system-background
130 chown system system /dev/cpuctl/top-app
133 chown system system /dev/cpuctl/system-background
139 chown system system /dev/cpuctl/top-app/tasks
142 chown system system /dev/cpuctl/system-background/tasks
148 chown system system /dev/cpuctl/top-app/cgroup.procs
151 chown system system /dev/cpuctl/system-background/cgroup.procs
157 chmod 0664 /dev/cpuctl/top-app/tasks
160 chmod 0664 /dev/cpuctl/system-background/tasks
166 chmod 0664 /dev/cpuctl/top-app/cgroup.procs
169 chmod 0664 /dev/cpuctl/system-background/cgroup.procs
173 mkdir /dev/cpuctl/nnapi-hal
174 chown system system /dev/cpuctl/nnapi-hal
175 chown system system /dev/cpuctl/nnapi-hal/tasks
176 chown system system /dev/cpuctl/nnapi-hal/cgroup.procs
177 chmod 0664 /dev/cpuctl/nnapi-hal/tasks
178 chmod 0664 /dev/cpuctl/nnapi-hal/cgroup.procs
179 write /dev/cpuctl/nnapi-hal/cpu.uclamp.min 1
180 write /dev/cpuctl/nnapi-hal/cpu.uclamp.latency_sensitive 1
183 mkdir /dev/cpuctl/camera-daemon
184 chown system system /dev/cpuctl/camera-daemon
185 chown system system /dev/cpuctl/camera-daemon/tasks
186 chown system system /dev/cpuctl/camera-daemon/cgroup.procs
187 chmod 0664 /dev/cpuctl/camera-daemon/tasks
188 chmod 0664 /dev/cpuctl/camera-daemon/cgroup.procs
209 write /dev/blkio/background/blkio.prio.class restrict-to-be
223 mount fusectl none /sys/fs/fuse/connections
265 # For Pre-reboot Dexopt
268 # Symlink to keep legacy apps working in multi-user world
277 # Disable auto-scaling of scheduler tunables with hotplug. The tunables
323 # system-background is for system tasks that should only run on
325 mkdir /dev/cpuset/system-background
326 copy /dev/cpuset/cpus /dev/cpuset/system-background/cpus
327 copy /dev/cpuset/mems /dev/cpuset/system-background/mems
335 mkdir /dev/cpuset/top-app
336 copy /dev/cpuset/cpus /dev/cpuset/top-app/cpus
337 copy /dev/cpuset/mems /dev/cpuset/top-app/mems
340 mkdir /dev/cpuset/camera-daemon
341 copy /dev/cpuset/cpus /dev/cpuset/camera-daemon/cpus
342 copy /dev/cpuset/mems /dev/cpuset/camera-daemon/mems
349 chown system system /dev/cpuset/system-background
350 chown system system /dev/cpuset/top-app
352 chown system system /dev/cpuset/camera-daemon
357 chown system system /dev/cpuset/system-background/tasks
358 chown system system /dev/cpuset/top-app/tasks
360 chown system system /dev/cpuset/camera-daemon/tasks
365 chown system system /dev/cpuset/system-background/cgroup.procs
366 chown system system /dev/cpuset/top-app/cgroup.procs
368 chown system system /dev/cpuset/camera-daemon/cgroup.procs
370 # set system-background to 0775 so SurfaceFlinger can touch it
371 chmod 0775 /dev/cpuset/system-background
376 chmod 0664 /dev/cpuset/system-background/tasks
377 chmod 0664 /dev/cpuset/top-app/tasks
380 chmod 0664 /dev/cpuset/camera-daemon/tasks
384 chmod 0664 /dev/cpuset/system-background/cgroup.procs
385 chmod 0664 /dev/cpuset/top-app/cgroup.procs
388 chmod 0664 /dev/cpuset/camera-daemon/cgroup.procs
394 mount bpf bpf /sys/fs/bpf nodev noexec nosuid
397 mount pstore pstore /sys/fs/pstore nodev noexec nosuid
398 chown system log /sys/fs/pstore
399 chmod 0550 /sys/fs/pstore
400 chown system log /sys/fs/pstore/console-ramoops
401 chmod 0440 /sys/fs/pstore/console-ramoops
402 chown system log /sys/fs/pstore/console-ramoops-0
403 chmod 0440 /sys/fs/pstore/console-ramoops-0
404 chown system log /sys/fs/pstore/pmsg-ramoops-0
405 chmod 0440 /sys/fs/pstore/pmsg-ramoops-0
416 # This allows the ledtrig-transient properties to be created here so
463 reboot_on_failure reboot,boringssl-self-check-failed
470 reboot_on_failure reboot,boringssl-self-check-failed
477 reboot_on_failure reboot,boringssl-self-check-failed
484 reboot_on_failure reboot,boringssl-self-check-failed
494 trigger late-init
501 on late-init
502 trigger early-fs
505 # '--early' can be specified to skip entries with 'latemount'.
506 # /system and /vendor must be mounted by the end of the fs stage,
508 trigger fs
509 trigger post-fs
511 # Mount fstab in init.{$device}.rc by mount_all with '--late' parameter
512 # to only mount entries with 'latemount'. This is needed if '--early' is
513 # specified in the previous mount_all command on the fs stage.
516 trigger late-fs
520 trigger post-fs-data
523 trigger load-bpf-programs
524 trigger bpf-progs-loaded
527 trigger zygote-start
532 trigger early-boot
535 on early-fs
539 on post-fs
540 exec - system system -- /system/bin/vdc checkpoint markBootAttempt
552 restorecon --recursive --cross-filesystems /sys/kernel/debug
581 #change permissions on kmsg & sysrq-trigger so bugreports can grab kthread stacks
584 chown root system /proc/sysrq-trigger
585 chmod 0220 /proc/sysrq-trigger
589 # make the selinux kernel policy world-readable
590 chmod 0444 /sys/fs/selinux/policy
612 # no-op.
615 mkdir /metadata/staged-install 0770 root system
617 on late-fs
619 # This does not work correctly if it is called in post-fs.
627 on late-fs && property:ro.kernel.version=4.19
629 on late-fs && property:ro.kernel.version=5.4
631 on late-fs
633 setprop bootreceiver.enable ${bootreceiver.enable:-1}
638 # is detected. This is only needed for 64-bit systems.
645 on post-fs-data
648 exec - system system -- /system/bin/vdc checkpoint prepareCheckpoint
694 # we can tell keystore to stop allowing use of early-boot keys,
697 exec - system system -- /system/bin/vdc keymaster earlyBootEnded
699 # Multi-installed APEXes are selected using persist props.
707 start logd-reinit
724 # they are encrypted so that files in them can be hard-linked into
730 mkdir /data/app-staging 0751 system system encryption=DeleteIfNecessary
807 mkdir /data/misc/uprobestats-configs/ 0777 uprobestats uprobestats
809 # create location to store pre-reboot information
811 # directory used for on-device refresh metrics file.
813 # directory used for on-device signing key blob
823 exec - virtualizationservice system -- /bin/rm -rf /data/misc/virtualizationservice
834 mkdir /data/app-private 0771 system system encryption=Require
835 mkdir /data/app-ephemeral 0771 system system encryption=Require
836 mkdir /data/app-asec 0700 root root encryption=Require
837 mkdir /data/app-lib 0771 system system encryption=Require
841 mkdir /data/app-metadata 0700 system system encryption=Require
859 # create dalvik-cache, so as to enforce our permissions
860 mkdir /data/dalvik-cache 0771 root root encryption=Require
868 # create resource-cache and double-check the perms
869 mkdir /data/resource-cache 0771 system system encryption=Require
870 chown system system /data/resource-cache
871 chmod 0771 /data/resource-cache
879 # create directory for DRM plug-ins - give drm the read/write access to
883 # create directory for MediaDrm plug-ins - give drm the read/write access to
903 # Mkdir and set SELinux security contexts for shutdown-checkpoints.
905 mkdir /data/system/shutdown-checkpoints 0755 system system
906 restorecon_recursive /data/system/shutdown-checkpoints
910 # subdirectories uses a different encryption policy (a per-user one), and
912 # contain any subdirectories other than the per-user ones. /data/media/obb
917 # needs to set up file-based encryption on the subdirectories), which runs
931 # Similar to the top-level CE and DE directories, /data/storage_area must
938 exec - media_rw media_rw -- /system/bin/chattr +F /data/media
952 # not supported for non-default volumes and the path
984 mkdir /data/rollback-observer 0700 system system encryption=DeleteIfNecessary
985 mkdir /data/rollback-history 0700 system system encryption=DeleteIfNecessary
991 mkdir /data/misc/stats-active-metric/ 0770 statsd system
992 mkdir /data/misc/stats-data/ 0770 statsd system
993 mkdir /data/misc/stats-data/restricted-data 0770 statsd system
994 mkdir /data/misc/stats-metadata/ 0770 statsd system
995 mkdir /data/misc/stats-service/ 0770 statsd system
996 mkdir /data/misc/train-info/ 0770 statsd system
1021 restorecon --recursive --skip-ce /data
1030 # validates those properties against the signed cache-info.xml.
1033 # Start the on-device signing daemon, and wait for it to finish, to ensure
1041 # Bump the boot level to 1000000000; this prevents further on-device signing.
1050 exec_start apexd-snapshotde
1064 # Update dm-verity state and set partition.*.verified properties.
1068 trigger post-fs-data-checkpointed
1071 # - /sys/fs/bpf is already mounted,
1072 # - apex (incl. rollback) is initialized (so that we can load bpf
1074 # - logd is ready for us to log stuff
1080 on load-bpf-programs
1083 on bpf-progs-loaded
1086 # It is recommended to put unnecessary data/ initialization from post-fs-data
1087 # to start-zygote in device's init.rc to unblock zygote start.
1088 on zygote-start
1125 # to access F2FS sysfs on dm-<num> directly
1126 mkdir /dev/sys/fs/by-name 0755 system system
1127 symlink /sys/fs/f2fs/${dev.mnt.dev.data} /dev/sys/fs/by-name/userdata
1129 # dev.mnt.dev.data=dm-N, dev.mnt.blk.data=sdaN/mmcblk0pN, dev.mnt.rootdisk.data=sda/mmcblk0, or
1131 mkdir /dev/sys/block/by-name 0755 system system
1132 symlink /sys/class/block/${dev.mnt.dev.data} /dev/sys/block/by-name/userdata
1133 symlink /sys/class/block/${dev.mnt.rootdisk.data} /dev/sys/block/by-name/rootdisk
1138 # are not aware of using fsync()/sync() to prepare sudden power-cut.
1139 write /dev/sys/fs/by-name/userdata/cp_interval 200
1140 write /dev/sys/fs/by-name/userdata/gc_urgent_sleep_time 50
1141 write /dev/sys/fs/by-name/userdata/iostat_period_ms 1000
1142 write /dev/sys/fs/by-name/userdata/iostat_enable 1
1145 write /dev/sys/fs/by-name/userdata/seq_file_ra_mul 128
1150 write /dev/sys/block/by-name/userdata/queue/discard_max_bytes 134217728
1151 write /dev/sys/block/by-name/rootdisk/queue/discard_max_bytes 134217728
1186 chown system system /sys/class/leds/keyboard-backlight/brightness
1187 chown system system /sys/class/leds/lcd-backlight/brightness
1188 chown system system /sys/class/leds/button-backlight/brightness
1189 chown system system /sys/class/leds/jogball-backlight/brightness
1230 exec - system system -- /bin/rm -rf /data/per_boot
1237 exec_background -- /system/bin/extra_free_kbytes.sh ${sys.sysctl.extra_free_kbytes}
1251 # kernel has the hooks. In this case, the system-wide perf_event_paranoid
1252 # sysctl is set to -1 (unrestricted use), and the SELinux policy is used for
1255 # can lower it to 1 (allowing thread-scoped pofiling) via security.perf_harden.
1256 on load-bpf-programs && property:sys.init.perf_lsm_hooks=1
1257 write /proc/sys/kernel/perf_event_paranoid -1
1266 write /proc/sys/kernel/perf_event_max_sample_rate ${debug.perf_event_max_sample_rate:-100000}
1267 write /proc/sys/kernel/perf_cpu_time_max_percent ${debug.perf_cpu_time_max_percent:-25}
1268 write /proc/sys/kernel/perf_event_mlock_kb ${debug.perf_event_mlock_kb:-516}
1285 # In device's init.rc, this trigger can be used to do device-specific actions
1321 # Multi-Gen LRU Experiment
1339 exec - root root system -- /system/bin/snapshotctl map
1343 exec - root root system -- /system/bin/snapshotctl unmap