Home
last modified time | relevance | path

Searched full:boot (Results 1 – 25 of 802) sorted by relevance

12345678910>>...33

/system/core/bootstat/
DREADME.md3 The bootstat command records boot events (e.g., `firmware_loaded`,
5 command also aggregates boot event metrics locally and logs the metrics for
12 -p, --print Dump the boot event records to the console
13 -r, --record Record the timestamp of a named boot event
22 ## Recording boot events ##
24 To record the relative time of an event during the boot phase, call `bootstat`
25 with the `-r` option and the name of the boot event.
30 the boot event to be persisted.
32 ## Logging boot events ##
34 To log the persisted boot events, call `bootstat` with the `-l` option.
[all …]
Dboot_reason_test.sh3 # Bootstat boot reason tests
9 # - wait until screen is up, boot has completed, can mean wait for
120 Returns: true if device supports and set boot reason injection" ]
134 adb_su setprop persist.test.boot.reason "'${1}'" 2>/dev/null </dev/null
135 test_reason="`get_property persist.test.boot.reason`"
137 echo "ERROR: can not set persist.test.boot.reason to '${1}'." >&2
230 if [ -n "`get_property sys.boot.reason`" ]
318 if [ 0 != ${local_ret} -a "ro.boot.bootreason" = "${property}" ]; then
345 bootstat: Canonical boot reason: <expected_property_value>
364 bootstat: Canonical boot reason: ${i}"
[all …]
Dbootstat.rc3 # Mirror bootloader boot reason to system boot reason
4 # ro.boot.bootreason should be set by init already
6 on post-fs && property:ro.boot.bootreason=*
7 setprop sys.boot.reason ${ro.boot.bootreason}
48 # sys.bootstat.first_boot_completed=0 - first boot completed trigger wasn't processed yet.
49 # sys.bootstat.first_boot_completed=1 - first boot completed trigger was processed and
50 # record_boot_complete was called. Subsequent boot completed
60 # Set boot reason
62 # Converts bootloader boot reason and persist.sys.boot.reason to system boot reason
66 # Record boot complete metrics.
[all …]
Dbootstat-debug.rc4 # For devices w/o bootloader boot reason reported, mirror test boot reason
5 # to bootloader boot reason to allow test to inject reasons
6 on property:persist.test.boot.reason=*
7 setprop ro.boot.bootreason ${persist.test.boot.reason}
Dboot_event_record_store.h27 // BootEventRecordStore manages the persistence of boot events to the record
28 // store and the retrieval of all boot event records from the store.
37 // Persists the boot |event| in the record store.
40 // Persists the boot |event| with the associated |value| in the record store.
43 // Queries the named boot |event|. |record| must be non-null. |record|
44 // contains the boot event data on success. Returns true iff the query is
48 // Returns a list of all of the boot events persisted in the record store.
63 // Constructs the full path of the given boot |event|.
/system/tools/mkbootimg/gki/
Dcertify_bootimg_test.py48 """Generates a test boot.img without a ramdisk."""
66 '--partition_name', 'boot',
73 """Generates an archive of test boot images.
85 [('boot.img', 4096, 4 * 1024),
86 ('boot-lz4.img', 8192, 8 * 1024)].
91 The full path of the created archive. e.g., /path/to/boot-img.tar.gz.
149 """Extracts the boot signatures of a boot image.
151 This functions extracts the boot signatures of |boot_img| as:
161 # The boot signature is assumed to be at the end of boot image, after
187 """Extracts boot images and signatures of a boot images archive.
[all …]
Dcertify_bootimg.py18 """Certify a GKI boot image by generating and appending its boot_signature."""
45 """Appends certificates to the end of the boot image.
48 the 'boot' certificate and the 'generic_kernel' certificate. The former
64 boot_signature_bytes += generate_certificate(boot_img, 'boot')
84 """Erases the boot certificate and avb footer.
86 A boot image might already contain a certificate and/or a AVB footer.
94 # No boot signature to erase, just return.
98 # Checks if the last 16K is a boot signature, then erases it.
139 '--partition_name', 'boot']
187 e.g., returns ('/path/to/boot-img', 'gztar') if |path| is
[all …]
Dboot_signature_info.sh19 # Dump boot signature info of a GKI boot image.
54 readonly VBMETA_IMAGE="${TEMP_DIR}/boot.boot_signature"
57 readonly BOOT_IMAGE="${TEMP_DIR}/boot.img"
58 readonly BOOT_IMAGE_DIR="${TEMP_DIR}/boot.unpack_dir"
59 readonly BOOT_IMAGE_ARGS="${TEMP_DIR}/boot.mkbootimg_args"
84 # Keep carving out vbmeta image from the boot signature until we fail or EOF.
85 # Failing is fine because there could be padding trailing the boot signature.
/system/tools/mkbootimg/include/bootimg/
Dbootimg.h52 /* When a boot header is of version 0, the structure of boot image is as
56 * | boot header | 1 page
96 // Version of the boot image header.
131 * boot image header they need to use.
135 /* When a boot header is of version 1, the structure of boot image is as
139 * | boot header | 1 page
171 uint64_t recovery_dtbo_offset; /* offset to recovery dtbo/acpio in boot image */
175 /* When the boot image header has a version of 2, the structure of the boot
179 * | boot header | 1 page
218 /* When the boot image header has a version of 3, the structure of the boot
[all …]
/system/unwinding/libunwindstack/offline_files/yt_music_arm64/
Doutput.txt4 #03 pc 00000000000adf4c boot.oat (art_jni_trampoline+108)
5 …#04 pc 000000000023c924 boot.oat (java.util.concurrent.locks.AbstractQueuedSynchronizer$Condition…
6 …#05 pc 00000000003d966c boot.oat (java.util.concurrent.ScheduledThreadPoolExecutor$DelayedWorkQue…
7 #06 pc 0000000000394ab8 boot.oat ([DEDUPED]+40)
8 #07 pc 0000000000377574 boot.oat (java.util.concurrent.ThreadPoolExecutor.getTask+484)
9 #08 pc 000000000037b46c boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+236)
10 #09 pc 0000000000374f84 boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+68)
12 #11 pc 00000000001bf0bc boot.oat (java.lang.Thread.run+76)
/system/unwinding/libunwindstack/offline_files/maps_compiled_arm64/28648/
Doutput.txt4 #03 pc 00000000000adf4c boot.oat (art_jni_trampoline+108)
5 …#04 pc 000000000023c924 boot.oat (java.util.concurrent.locks.AbstractQueuedSynchronizer$Condition…
6 …#05 pc 00000000003d966c boot.oat (java.util.concurrent.ScheduledThreadPoolExecutor$DelayedWorkQue…
7 #06 pc 0000000000394ab8 boot.oat ([DEDUPED]+40)
8 #07 pc 0000000000377574 boot.oat (java.util.concurrent.ThreadPoolExecutor.getTask+484)
9 #08 pc 000000000037b46c boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+236)
10 #09 pc 0000000000374f84 boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+68)
12 #11 pc 00000000001bf0bc boot.oat (java.lang.Thread.run+76)
/system/core/fs_mgr/libfs_avb/tests/
Dbasic_test.cpp28 base::FilePath boot_path = GenerateImage("boot.img", image_size); in TEST_F()
73 // Generates a raw boot.img in TEST_F()
76 base::FilePath boot_path = GenerateImage("boot.img", image_size); in TEST_F()
83 AddAvbFooter(boot_path, "hash", "boot", partition_size, "SHA256_RSA4096", 10, in TEST_F()
86 // Extracts boot vbmeta from boot.img into boot-vbmeta.img. in TEST_F()
87 ExtractVBMetaImage(boot_path, "boot-vbmeta.img"); in TEST_F()
103 " Partition Name: boot\n" in TEST_F()
108 InfoImage("boot-vbmeta.img")); in TEST_F()
158 // Generates a raw boot.img in TEST_F()
161 base::FilePath boot_path = GenerateImage("boot.img", boot_image_size); in TEST_F()
[all …]
/system/extras/mtectrl/
Dmtectrl_test.cc45 void Boot(misc_memtag_message m) { in Boot() function
62 Boot(m); in Reboot()
111 Boot({}); in TEST_F()
117 Boot({}); in TEST_F()
123 Boot({}); in TEST_F()
132 Boot(m); in TEST_F()
141 Boot(m); in TEST_F()
147 Boot({}); in TEST_F()
158 Boot({}); in TEST_F()
169 Boot({}); in TEST_F()
[all …]
/system/apex/apexd/aidl/android/apex/
DApexInfo.aidl31 // Will be set to true if during this boot a different APEX package of the APEX was
32 // activated, than in the previous boot.
34 // 1. It was part of the staged session that was applied during this boot.
35 // 2. A compressed system APEX was decompressed during this boot.
37 // activated during last boot) and needed to fallback to pre-installed counterpart.
38 // Note: this field can only be set to true during boot, after boot is completed
/system/extras/ioblame/
Dioblame-gmail-launch.example65 File: /framework/arm/boot-android.hidl.base-V1.0-java.vdex
68 File: /framework/arm/boot.art
71 File: /framework/arm/boot-core-libart.oat
74 File: /framework/arm/boot-core-libart.vdex
77 File: /framework/arm/boot-framework.oat
83 File: /framework/arm/boot-framework.vdex
89 File: /framework/arm/boot.oat
93 File: /framework/arm/boot-okhttp.oat
96 File: /framework/arm/boot-okhttp.vdex
99 File: /framework/arm/boot-org.apache.http.legacy.boot.vdex
[all …]
/system/sepolicy/microdroid/system/private/
Dproperty_contexts77 ro.boot.adb.enabled u:object_r:bootloader_prop:s0 exact bool
78 ro.boot.avb_version u:object_r:bootloader_prop:s0 exact string
79 ro.boot.boot_devices u:object_r:bootloader_prop:s0 exact string
80 ro.boot.first_stage_console u:object_r:bootloader_prop:s0 exact string
81 ro.boot.force_normal_boot u:object_r:bootloader_prop:s0 exact string
82 ro.boot.hardware u:object_r:bootloader_prop:s0 exact string
83 ro.boot.microdroid.debuggable u:object_r:bootloader_prop:s0 exact bool
84 ro.boot.slot_suffix u:object_r:bootloader_prop:s0 exact string
85 ro.boot.vbmeta.avb_version u:object_r:bootloader_prop:s0 exact string
86 ro.boot.vbmeta.device_state u:object_r:bootloader_prop:s0 exact string
[all …]
/system/security/keystore2/src/
Dboot_level_keys.rs15 //! Offer keys based on the "boot level" for superencryption.
31 /// Strategies used to prevent later boot stages from using the KM key that protects the level 0
36 /// itself, and therefore create artifacts which appear to come from early boot.
39 /// it ensures that the level 0 key was genuinely created in early boot
172 b"Create boot level key", in get_level_zero_key()
182 /// Holds the key for the current boot level, and a cache of future keys generated as required.
183 /// When the boot level advances, keys prior to the current boot level are securely dropped.
185 /// Least boot level currently accessible, if any is.
187 /// Invariant: cache entry *i*, if it exists, holds the HKDF key for boot level
208 // If the requested boot level is lower than the current boot level in level_accessible()
[all …]
/system/libsysprop/srcs/android/sysprop/
DCrashRecoveryProperties.sysprop26 # Below two properties track individual system server boot events, and are reset once the boot
27 # threshold is met, or the boot loop trigger window is exceeded between boot events.
44 # Below two properties track multiple calls made to observers tracking boot loops. They are reset
45 # when the de-escalation window is exceeded between boot events.
/system/unwinding/libunwindstack/offline_files/maps_compiled_arm64/28656_oat_odex_jar/
Doutput.txt4 #03 pc 00000000000adf4c boot.oat (art_jni_trampoline+108)
5 …#04 pc 000000000023c924 boot.oat (java.util.concurrent.locks.AbstractQueuedSynchronizer$Condition…
10 #09 pc 0000000000377574 boot.oat (java.util.concurrent.ThreadPoolExecutor.getTask+484)
11 #10 pc 000000000037b46c boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+236)
12 #11 pc 0000000000374f84 boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+68)
14 #13 pc 00000000001bf0bc boot.oat (java.lang.Thread.run+76)
/system/apex/tests/src/com/android/tests/apex/
DApexRollbackTests.java45 * Test for automatic recovery of apex update that causes boot loop.
101 * Test for automatic recovery of apex update that causes boot loop.
113 // To simulate an apex update that causes a boot loop, we install a in testAutomaticBootLoopRecovery()
115 // script to be run at boot. The trigger_watchdog.sh script checks if in testAutomaticBootLoopRecovery()
119 // boot loop. in testAutomaticBootLoopRecovery()
129 // After we reboot the device, we expect the device to go into boot in testAutomaticBootLoopRecovery()
131 // report the boot loop, causing apexd to roll back to the previous in testAutomaticBootLoopRecovery()
134 // version of the apex and refrain from forcing a boot loop, so the in testAutomaticBootLoopRecovery()
152 * if it reboots during boot.
213 // will kick in, and at the next boot any non-finalized sessions will be reverted. in testCheckpointingRevertsSession()
[all …]
/system/update_engine/common/
Dhardware_interface.h33 // such as the firmware version, hwid, verified boot mode.
45 // Returns true if the boot mode is normal or if it's unable to
46 // determine the boot mode. Returns false if the boot mode is
47 // developer. A dev-mode boot will allow the user to access developer-only
71 // Returns the minimum kernel key version that verified boot on Chrome OS
72 // will allow to boot. This is the value of crossystem tpm_kernver. Returns
76 // Returns the minimum firmware key version that verified boot on Chrome OS
77 // will allow to boot. This is the value of crossystem tpm_fwver. Returns
81 // Returns the maximum firmware key version that verified boot should roll
87 // Sets the maximum firmware key version that verified boot should roll
[all …]
/system/unwinding/libunwindstack/offline_files/maps_compiled_arm64/28613_main-thread/
Dlinks.txt2 ../../common/boot-framework.oat_6da45a084bf1f153be922249096389b66d69b6e6 boot-framework.oat
3 ../../common/boot.oat_c3e0e6503935c4103ec839d45f3a2183bd910e3c boot.oat
/system/extras/partition_tools/
Dlpdumpd.rc23 # On Launch devices, assume "super". On virtual devices, ${ro.boot.super_partition}
25 file /dev/block/by-name/${ro.boot.super_partition:-super} r
26 # On retrofit devices, ${ro.boot.super_partition} is slot-suffixed.
29 …file /dev/block/by-name/${ro.boot.super_partition:-NO_SUCH_DEVICE}${ro.boot.slot_suffix:-_NO_SUCH_…
/system/unwinding/libunwindstack/offline_files/photos_reset_arm64/
Doutput.txt5 #04 pc 00000000000ab35c boot.oat (art_jni_trampoline+108)
6 #05 pc 00000000000cc278 boot.oat (java.lang.ref.ReferenceQueue.remove+360)
7 #06 pc 00000000000cc0ec boot.oat (java.lang.ref.ReferenceQueue.remove+44)
10 #09 pc 000000000037b75c boot.oat (java.util.concurrent.ThreadPoolExecutor.runWorker+988)
11 #10 pc 0000000000374f84 boot.oat (java.util.concurrent.ThreadPoolExecutor$Worker.run+68)
14 #13 pc 00000000001bf0bc boot.oat (java.lang.Thread.run+76)
/system/extras/boot_control_copy/
Dboot_control_copy.cpp134 fprintf(stderr, "WARNING: Error loading boot-info. Resetting.\n"); in module_setActiveBootSlot()
138 fprintf(stderr, "WARNING: boot-info is invalid. Resetting.\n"); in module_setActiveBootSlot()
148 fprintf(stderr, "Error saving boot-info.\n"); in module_setActiveBootSlot()
152 // Finally copy the contents of boot_X into boot. in module_setActiveBootSlot()
160 dst_fd = boot_info_open_partition("boot", &dst_size, O_RDWR); in module_setActiveBootSlot()
162 fprintf(stderr, "Error opening \"boot\" partition.\n"); in module_setActiveBootSlot()
200 fprintf(stderr, "WARNING: Error loading boot-info. Resetting.\n"); in module_setSlotAsUnbootable()
204 fprintf(stderr, "WARNING: boot-info is invalid. Resetting.\n"); in module_setSlotAsUnbootable()
212 fprintf(stderr, "Error saving boot-info.\n"); in module_setSlotAsUnbootable()
225 fprintf(stderr, "WARNING: Error loading boot-info. Resetting.\n"); in module_isSlotBootable()
[all …]

12345678910>>...33