| /system/core/bootstat/ |
| D | README.md | 3 The bootstat command records boot events (e.g., `firmware_loaded`, 5 command also aggregates boot event metrics locally and logs the metrics for 12 -p, --print Dump the boot event records to the console 13 -r, --record Record the timestamp of a named boot event 22 ## Recording boot events ## 24 To record the relative time of an event during the boot phase, call `bootstat` 25 with the `-r` option and the name of the boot event. 30 the boot event to be persisted. 32 ## Logging boot events ## 34 To log the persisted boot events, call `bootstat` with the `-l` option. [all …]
|
| D | boot_reason_test.sh | 3 # Bootstat boot reason tests 9 # - wait until screen is up, boot has completed, can mean wait for 120 Returns: true if device supports and set boot reason injection" ] 134 adb_su setprop persist.test.boot.reason "'${1}'" 2>/dev/null </dev/null 135 test_reason="`get_property persist.test.boot.reason`" 137 echo "ERROR: can not set persist.test.boot.reason to '${1}'." >&2 230 if [ -n "`get_property sys.boot.reason`" ] 318 if [ 0 != ${local_ret} -a "ro.boot.bootreason" = "${property}" ]; then 345 bootstat: Canonical boot reason: <expected_property_value> 364 bootstat: Canonical boot reason: ${i}" [all …]
|
| D | bootstat.rc | 3 # Mirror bootloader boot reason to system boot reason 4 # ro.boot.bootreason should be set by init already 6 on post-fs && property:ro.boot.bootreason=* 7 setprop sys.boot.reason ${ro.boot.bootreason} 48 # sys.bootstat.first_boot_completed=0 - first boot completed trigger wasn't processed yet. 49 # sys.bootstat.first_boot_completed=1 - first boot completed trigger was processed and 50 # record_boot_complete was called. Subsequent boot completed 60 # Set boot reason 62 # Converts bootloader boot reason and persist.sys.boot.reason to system boot reason 66 # Record boot complete metrics. [all …]
|
| D | bootstat-debug.rc | 4 # For devices w/o bootloader boot reason reported, mirror test boot reason 5 # to bootloader boot reason to allow test to inject reasons 6 on property:persist.test.boot.reason=* 7 setprop ro.boot.bootreason ${persist.test.boot.reason}
|
| D | boot_event_record_store.h | 27 // BootEventRecordStore manages the persistence of boot events to the record 28 // store and the retrieval of all boot event records from the store. 37 // Persists the boot |event| in the record store. 40 // Persists the boot |event| with the associated |value| in the record store. 43 // Queries the named boot |event|. |record| must be non-null. |record| 44 // contains the boot event data on success. Returns true iff the query is 48 // Returns a list of all of the boot events persisted in the record store. 63 // Constructs the full path of the given boot |event|.
|
| /system/tools/mkbootimg/gki/ |
| D | certify_bootimg_test.py | 48 """Generates a test boot.img without a ramdisk.""" 66 '--partition_name', 'boot', 73 """Generates an archive of test boot images. 85 [('boot.img', 4096, 4 * 1024), 86 ('boot-lz4.img', 8192, 8 * 1024)]. 91 The full path of the created archive. e.g., /path/to/boot-img.tar.gz. 149 """Extracts the boot signatures of a boot image. 151 This functions extracts the boot signatures of |boot_img| as: 161 # The boot signature is assumed to be at the end of boot image, after 187 """Extracts boot images and signatures of a boot images archive. [all …]
|
| D | certify_bootimg.py | 18 """Certify a GKI boot image by generating and appending its boot_signature.""" 45 """Appends certificates to the end of the boot image. 48 the 'boot' certificate and the 'generic_kernel' certificate. The former 64 boot_signature_bytes += generate_certificate(boot_img, 'boot') 84 """Erases the boot certificate and avb footer. 86 A boot image might already contain a certificate and/or a AVB footer. 94 # No boot signature to erase, just return. 98 # Checks if the last 16K is a boot signature, then erases it. 139 '--partition_name', 'boot'] 187 e.g., returns ('/path/to/boot-img', 'gztar') if |path| is [all …]
|
| D | boot_signature_info.sh | 19 # Dump boot signature info of a GKI boot image. 54 readonly VBMETA_IMAGE="${TEMP_DIR}/boot.boot_signature" 57 readonly BOOT_IMAGE="${TEMP_DIR}/boot.img" 58 readonly BOOT_IMAGE_DIR="${TEMP_DIR}/boot.unpack_dir" 59 readonly BOOT_IMAGE_ARGS="${TEMP_DIR}/boot.mkbootimg_args" 84 # Keep carving out vbmeta image from the boot signature until we fail or EOF. 85 # Failing is fine because there could be padding trailing the boot signature.
|
| /system/tools/mkbootimg/include/bootimg/ |
| D | bootimg.h | 52 /* When a boot header is of version 0, the structure of boot image is as 56 * | boot header | 1 page 96 // Version of the boot image header. 131 * boot image header they need to use. 135 /* When a boot header is of version 1, the structure of boot image is as 139 * | boot header | 1 page 171 uint64_t recovery_dtbo_offset; /* offset to recovery dtbo/acpio in boot image */ 175 /* When the boot image header has a version of 2, the structure of the boot 179 * | boot header | 1 page 218 /* When the boot image header has a version of 3, the structure of the boot [all …]
|
| /system/unwinding/libunwindstack/offline_files/yt_music_arm64/ |
| D | output.txt | 4 #03 pc 00000000000adf4c boot.oat (art_jni_trampoline+108) 5 …#04 pc 000000000023c924 boot.oat (java.util.concurrent.locks.AbstractQueuedSynchronizer$Condition… 6 …#05 pc 00000000003d966c boot.oat (java.util.concurrent.ScheduledThreadPoolExecutor$DelayedWorkQue… 7 #06 pc 0000000000394ab8 boot.oat ([DEDUPED]+40) 8 #07 pc 0000000000377574 boot.oat (java.util.concurrent.ThreadPoolExecutor.getTask+484) 9 #08 pc 000000000037b46c boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+236) 10 #09 pc 0000000000374f84 boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+68) 12 #11 pc 00000000001bf0bc boot.oat (java.lang.Thread.run+76)
|
| /system/unwinding/libunwindstack/offline_files/maps_compiled_arm64/28648/ |
| D | output.txt | 4 #03 pc 00000000000adf4c boot.oat (art_jni_trampoline+108) 5 …#04 pc 000000000023c924 boot.oat (java.util.concurrent.locks.AbstractQueuedSynchronizer$Condition… 6 …#05 pc 00000000003d966c boot.oat (java.util.concurrent.ScheduledThreadPoolExecutor$DelayedWorkQue… 7 #06 pc 0000000000394ab8 boot.oat ([DEDUPED]+40) 8 #07 pc 0000000000377574 boot.oat (java.util.concurrent.ThreadPoolExecutor.getTask+484) 9 #08 pc 000000000037b46c boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+236) 10 #09 pc 0000000000374f84 boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+68) 12 #11 pc 00000000001bf0bc boot.oat (java.lang.Thread.run+76)
|
| /system/core/fs_mgr/libfs_avb/tests/ |
| D | basic_test.cpp | 28 base::FilePath boot_path = GenerateImage("boot.img", image_size); in TEST_F() 73 // Generates a raw boot.img in TEST_F() 76 base::FilePath boot_path = GenerateImage("boot.img", image_size); in TEST_F() 83 AddAvbFooter(boot_path, "hash", "boot", partition_size, "SHA256_RSA4096", 10, in TEST_F() 86 // Extracts boot vbmeta from boot.img into boot-vbmeta.img. in TEST_F() 87 ExtractVBMetaImage(boot_path, "boot-vbmeta.img"); in TEST_F() 103 " Partition Name: boot\n" in TEST_F() 108 InfoImage("boot-vbmeta.img")); in TEST_F() 158 // Generates a raw boot.img in TEST_F() 161 base::FilePath boot_path = GenerateImage("boot.img", boot_image_size); in TEST_F() [all …]
|
| /system/extras/mtectrl/ |
| D | mtectrl_test.cc | 45 void Boot(misc_memtag_message m) { in Boot() function 62 Boot(m); in Reboot() 111 Boot({}); in TEST_F() 117 Boot({}); in TEST_F() 123 Boot({}); in TEST_F() 132 Boot(m); in TEST_F() 141 Boot(m); in TEST_F() 147 Boot({}); in TEST_F() 158 Boot({}); in TEST_F() 169 Boot({}); in TEST_F() [all …]
|
| /system/apex/apexd/aidl/android/apex/ |
| D | ApexInfo.aidl | 31 // Will be set to true if during this boot a different APEX package of the APEX was 32 // activated, than in the previous boot. 34 // 1. It was part of the staged session that was applied during this boot. 35 // 2. A compressed system APEX was decompressed during this boot. 37 // activated during last boot) and needed to fallback to pre-installed counterpart. 38 // Note: this field can only be set to true during boot, after boot is completed
|
| /system/extras/ioblame/ |
| D | ioblame-gmail-launch.example | 65 File: /framework/arm/boot-android.hidl.base-V1.0-java.vdex 68 File: /framework/arm/boot.art 71 File: /framework/arm/boot-core-libart.oat 74 File: /framework/arm/boot-core-libart.vdex 77 File: /framework/arm/boot-framework.oat 83 File: /framework/arm/boot-framework.vdex 89 File: /framework/arm/boot.oat 93 File: /framework/arm/boot-okhttp.oat 96 File: /framework/arm/boot-okhttp.vdex 99 File: /framework/arm/boot-org.apache.http.legacy.boot.vdex [all …]
|
| /system/sepolicy/microdroid/system/private/ |
| D | property_contexts | 77 ro.boot.adb.enabled u:object_r:bootloader_prop:s0 exact bool 78 ro.boot.avb_version u:object_r:bootloader_prop:s0 exact string 79 ro.boot.boot_devices u:object_r:bootloader_prop:s0 exact string 80 ro.boot.first_stage_console u:object_r:bootloader_prop:s0 exact string 81 ro.boot.force_normal_boot u:object_r:bootloader_prop:s0 exact string 82 ro.boot.hardware u:object_r:bootloader_prop:s0 exact string 83 ro.boot.microdroid.debuggable u:object_r:bootloader_prop:s0 exact bool 84 ro.boot.slot_suffix u:object_r:bootloader_prop:s0 exact string 85 ro.boot.vbmeta.avb_version u:object_r:bootloader_prop:s0 exact string 86 ro.boot.vbmeta.device_state u:object_r:bootloader_prop:s0 exact string [all …]
|
| /system/security/keystore2/src/ |
| D | boot_level_keys.rs | 15 //! Offer keys based on the "boot level" for superencryption. 31 /// Strategies used to prevent later boot stages from using the KM key that protects the level 0 36 /// itself, and therefore create artifacts which appear to come from early boot. 39 /// it ensures that the level 0 key was genuinely created in early boot 172 b"Create boot level key", in get_level_zero_key() 182 /// Holds the key for the current boot level, and a cache of future keys generated as required. 183 /// When the boot level advances, keys prior to the current boot level are securely dropped. 185 /// Least boot level currently accessible, if any is. 187 /// Invariant: cache entry *i*, if it exists, holds the HKDF key for boot level 208 // If the requested boot level is lower than the current boot level in level_accessible() [all …]
|
| /system/libsysprop/srcs/android/sysprop/ |
| D | CrashRecoveryProperties.sysprop | 26 # Below two properties track individual system server boot events, and are reset once the boot 27 # threshold is met, or the boot loop trigger window is exceeded between boot events. 44 # Below two properties track multiple calls made to observers tracking boot loops. They are reset 45 # when the de-escalation window is exceeded between boot events.
|
| /system/unwinding/libunwindstack/offline_files/maps_compiled_arm64/28656_oat_odex_jar/ |
| D | output.txt | 4 #03 pc 00000000000adf4c boot.oat (art_jni_trampoline+108) 5 …#04 pc 000000000023c924 boot.oat (java.util.concurrent.locks.AbstractQueuedSynchronizer$Condition… 10 #09 pc 0000000000377574 boot.oat (java.util.concurrent.ThreadPoolExecutor.getTask+484) 11 #10 pc 000000000037b46c boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+236) 12 #11 pc 0000000000374f84 boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+68) 14 #13 pc 00000000001bf0bc boot.oat (java.lang.Thread.run+76)
|
| /system/apex/tests/src/com/android/tests/apex/ |
| D | ApexRollbackTests.java | 45 * Test for automatic recovery of apex update that causes boot loop. 101 * Test for automatic recovery of apex update that causes boot loop. 113 // To simulate an apex update that causes a boot loop, we install a in testAutomaticBootLoopRecovery() 115 // script to be run at boot. The trigger_watchdog.sh script checks if in testAutomaticBootLoopRecovery() 119 // boot loop. in testAutomaticBootLoopRecovery() 129 // After we reboot the device, we expect the device to go into boot in testAutomaticBootLoopRecovery() 131 // report the boot loop, causing apexd to roll back to the previous in testAutomaticBootLoopRecovery() 134 // version of the apex and refrain from forcing a boot loop, so the in testAutomaticBootLoopRecovery() 152 * if it reboots during boot. 213 // will kick in, and at the next boot any non-finalized sessions will be reverted. in testCheckpointingRevertsSession() [all …]
|
| /system/update_engine/common/ |
| D | hardware_interface.h | 33 // such as the firmware version, hwid, verified boot mode. 45 // Returns true if the boot mode is normal or if it's unable to 46 // determine the boot mode. Returns false if the boot mode is 47 // developer. A dev-mode boot will allow the user to access developer-only 71 // Returns the minimum kernel key version that verified boot on Chrome OS 72 // will allow to boot. This is the value of crossystem tpm_kernver. Returns 76 // Returns the minimum firmware key version that verified boot on Chrome OS 77 // will allow to boot. This is the value of crossystem tpm_fwver. Returns 81 // Returns the maximum firmware key version that verified boot should roll 87 // Sets the maximum firmware key version that verified boot should roll [all …]
|
| /system/unwinding/libunwindstack/offline_files/maps_compiled_arm64/28613_main-thread/ |
| D | links.txt | 2 ../../common/boot-framework.oat_6da45a084bf1f153be922249096389b66d69b6e6 boot-framework.oat 3 ../../common/boot.oat_c3e0e6503935c4103ec839d45f3a2183bd910e3c boot.oat
|
| /system/extras/partition_tools/ |
| D | lpdumpd.rc | 23 # On Launch devices, assume "super". On virtual devices, ${ro.boot.super_partition} 25 file /dev/block/by-name/${ro.boot.super_partition:-super} r 26 # On retrofit devices, ${ro.boot.super_partition} is slot-suffixed. 29 …file /dev/block/by-name/${ro.boot.super_partition:-NO_SUCH_DEVICE}${ro.boot.slot_suffix:-_NO_SUCH_…
|
| /system/unwinding/libunwindstack/offline_files/photos_reset_arm64/ |
| D | output.txt | 5 #04 pc 00000000000ab35c boot.oat (art_jni_trampoline+108) 6 #05 pc 00000000000cc278 boot.oat (java.lang.ref.ReferenceQueue.remove+360) 7 #06 pc 00000000000cc0ec boot.oat (java.lang.ref.ReferenceQueue.remove+44) 10 #09 pc 000000000037b75c boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+988) 11 #10 pc 0000000000374f84 boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+68) 14 #13 pc 00000000001bf0bc boot.oat (java.lang.Thread.run+76)
|
| /system/extras/boot_control_copy/ |
| D | boot_control_copy.cpp | 134 fprintf(stderr, "WARNING: Error loading boot-info. Resetting.\n"); in module_setActiveBootSlot() 138 fprintf(stderr, "WARNING: boot-info is invalid. Resetting.\n"); in module_setActiveBootSlot() 148 fprintf(stderr, "Error saving boot-info.\n"); in module_setActiveBootSlot() 152 // Finally copy the contents of boot_X into boot. in module_setActiveBootSlot() 160 dst_fd = boot_info_open_partition("boot", &dst_size, O_RDWR); in module_setActiveBootSlot() 162 fprintf(stderr, "Error opening \"boot\" partition.\n"); in module_setActiveBootSlot() 200 fprintf(stderr, "WARNING: Error loading boot-info. Resetting.\n"); in module_setSlotAsUnbootable() 204 fprintf(stderr, "WARNING: boot-info is invalid. Resetting.\n"); in module_setSlotAsUnbootable() 212 fprintf(stderr, "Error saving boot-info.\n"); in module_setSlotAsUnbootable() 225 fprintf(stderr, "WARNING: Error loading boot-info. Resetting.\n"); in module_isSlotBootable() [all …]
|