Searched +full:early +full:- +full:boot (Results 1 – 25 of 92) sorted by relevance
1234
| /system/core/init/ |
| D | README.md | 2 --------------------- 7 All of these are line-oriented, consisting of tokens separated by 8 whitespace. The c-style backslash escapes may be used to insert 11 when it is the last character on a line, may be used for line-folding. 29 -------------- 81 ------------------------------- 96 For an APEX module with the following files in /apex/sample-module/apex/etc/: 118 ------- 122 the tail of a to-be-executed queue (unless it is already on the 143 on boot [all …]
|
| /system/extras/simpleperf/ |
| D | simpleperf.rc | 5 on early-init && property:ro.boot.simpleperf.boot_record=* 6 …exec_background u:r:su:s0 root root -- /system/bin/simpleperf record -a -g --exclude-perf -o /tmp/… 8 on property:sys.boot_completed=1 && property:ro.boot.simpleperf.boot_record=* 9 exec u:r:su:s0 root root -- /system/bin/killall simpleperf
|
| /system/extras/simpleperf/doc/ |
| D | android_platform_profiling.md | 19 $ ./app_profiler.py -np surfaceflinger -r "-g --duration 10" 31 $ ./app_profiler.py -np surfaceflinger -r "--call-graph fp --duration 10" 34 $ ./binary_cache_builder.py -lib $ANDROID_PRODUCT_OUT/symbols 37 $ unzip comet-symbols-12488474.zip 38 $ ./binary_cache_builder.py -lib out 44 # Disassembling all binaries can be slow, so you can use the --binary_filter 46 $ ./report_html.py --add_source_code --source_dirs $ANDROID_BUILD_TOP --add_disassembly \ 47 --binary_filter surfaceflinger.so 51 [Show Annotated Source Code and Disassembly](README.md#show-annotated-source-code-and-disassembly). 56 Sometimes we want to profile a process/system-wide when a special situation happens. In this case, [all …]
|
| /system/extras/boottime_tools/bootanalyze/ |
| D | config.yaml | 4 …system_server: SystemServerTiming(Async)?\s*:\s*(?P<name>\S+) took to complete:\s(?P<time>[0-9]+)ms 5 package_manager: PackageSettingsTiming\s*:\s*(?P<name>\S+) took to complete:\s(?P<time>[0-9]+)ms 6 system_ui: SystemUIBootTiming?\s*:\s*(?P<name>\S+) took to complete:\s(?P<time>[0-9]+)ms 7 fs_shutdown: (?P<name>boot_fs_shutdown),(?P<time>[0-9]+),([0-9]+) 8 ueventd_secs: ueventd:\s(?P<name>\S.+)\stook\s(?P<time>[.0-9]+)\sseconds 9 init_command_ms: init:\sCommand\s(?P<name>\S.+)\sreturned.*took\s(?P<time>[.0-9]+)ms 10 …: init:\sService\s.*exec\s\S+\s\((?P<name>\S.+)\).*pid.*\swaiting\stook\s(?P<time>[.0-9]+)\sseconds 11 zygote64_timing: (?P<name>Zygote64Timing\:\s\S+)\stook\sto\scomplete\:\s(?P<time>[0-9]+)ms 12 zygote32_timing: (?P<name>Zygote32Timing\:\s\S+)\stook\sto\scomplete\:\s(?P<time>[0-9]+)ms 13 …P<component>\S+)\sLong\smonitor\scontention\swith\sowner\s(?P<name>\S.+).*\sfor\s(?P<time>[.0-9]+)s [all …]
|
| /system/vold/ |
| D | Keystore.h | 8 * http://www.apache.org/licenses/LICENSE-2.0 25 #include <android-base/macros.h> 59 if (output) output->clear(); in updateCompletely() 90 upgradedBlob = std::optional(std::string(blob->begin(), blob->end())); 115 // Exports a keystore2 key with STORAGE_KEY tag wrapped with a per-boot ephemeral key 119 // Begin a new cryptographic operation, collecting output parameters if pointer is non-null 125 // Tell all Keymint devices that early boot has ended and early boot-only keys can no longer 129 // Tell all Keymint devices to delete all rollback-protected keys.
|
| /system/extras/kcmdlinectrl/ |
| D | kcmdlinectrl.rc | 7 # http://www.apache.org/licenses/LICENSE-2.0 17 on early-boot 18 exec_background -- /system/bin/kcmdlinectrl update-props 22 exec -- /system/bin/kcmdlinectrl store binder ${kcmdline.binder:-c}
|
| /system/core/rootdir/ |
| D | init.rc | 14 # Cgroups are mounted right before early-init using list from /etc/cgroups.json 15 on early-init 42 # set RLIMIT_NICE to allow priorities from 19 to -20 55 # Greatly extend dm-verity's Merkle tree cache timeout. The default timeout 59 # Disable dm-verity hash prefetching, since it doesn't help performance 63 # Generate empty ld.config.txt for early executed processes which rely on 78 # Run apexd-bootstrap so that APEXes that provide critical libraries 81 exec_start apexd-bootstrap 82 perform_apex_config --bootstrap 106 # Mix device-specific information into the entropy pool [all …]
|
| /system/core/trusty/utils/rpmb_dev/ |
| D | rpmb_dev.wv.system.rc | 2 -d VSOCK:${trusty.widevine_vm.vm_cid}:1 \ 3 -r /dev/socket/rpmb_mock_wv_system \ 4 -p /data/secure_storage_wv_system \ 5 -t sock 11 --dev /mnt/secure_storage_rpmb_wv_system/persist/RPMB_DATA --init --size 2048 18 --dev /mnt/secure_storage_rpmb_wv_system/persist/RPMB_DATA \ 19 --sock rpmb_mock_wv_system 26 on early-boot 50 on post-fs-data && \
|
| /system/security/keystore2/aidl/android/security/maintenance/ |
| D | IKeystoreMaintenance.aidl | 7 // http://www.apache.org/licenses/LICENSE-2.0 33 * `ResponseCode::PERMISSION_DENIED` - if the callers do not have the 'ChangeUser' permission. 34 * `ResponseCode::SYSTEM_ERROR` - if failed to delete the keys of an existing user with the same 37 * @param userId - Android user id 46 * `ResponseCode::PERMISSION_DENIED` - if caller does not have the 'ChangeUser' permission 47 * `ResponseCode::SYSTEM_ERROR` - if failed to initialize the user's super keys 49 * @param userId - Android user id 50 * @param password - a secret derived from the synthetic password of the user 51 * @param allowExisting - if true, then the keys already existing is not considered an error 60 * `ResponseCode::PERMISSION_DENIED` - if the callers do not have the 'ChangeUser' permission. [all …]
|
| /system/security/keystore2/src/ |
| D | boot_level_keys.rs | 7 // http://www.apache.org/licenses/LICENSE-2.0 15 //! Offer keys based on the "boot level" for superencryption. 31 /// Strategies used to prevent later boot stages from using the KM key that protects the level 0 36 /// itself, and therefore create artifacts which appear to come from early boot. 39 /// it ensures that the level 0 key was genuinely created in early boot 50 fn lookup_level_zero_km_and_strategy() -> Result<Option<(SecurityLevel, DenyLaterStrategy)>> { in lookup_level_zero_km_and_strategy() 86 fn get_level_zero_key_km_and_strategy() -> Result<(KeyMintDevice, DenyLaterStrategy)> { in get_level_zero_key_km_and_strategy() 112 pub fn get_level_zero_key(db: &mut KeystoreDB) -> Result<ZVec> { in get_level_zero_key() 172 b"Create boot level key", in get_level_zero_key() 182 /// Holds the key for the current boot level, and a cache of future keys generated as required. [all …]
|
| /system/sepolicy/prebuilts/api/202504/private/ |
| D | vold_prepare_subdirs.te | 85 -storage_area_dir 98 # /data/misc is unlabeled during early boot.
|
| D | bpfloader.te | 5 # allow bpfloader to write to the kernel log (starts early) 12 allow { bpffs_type -fs_bpf } fs_bpf:filesystem associate; 33 neverallow { domain -bpfloader } bpffs_type:dir { add_name create open read remove_name setattr wri… 36 neverallow { domain -bpfloader } bpffs_type:file { create map open rename setattr }; 37 neverallow { domain -bpfloader -gpuservice -lmkd -mediaprovider_app -netd -netutils_wrapper … 38 neverallow { domain -bpfloader … 39 neverallow { domain -bpfloader -networ… 40 neverallow { domain -bpfloader -networ… 41 neverallow { domain -bpfloader -netd -networ… 42 neverallow { domain -bpfloader -netd -netutils_wrapper -networ… [all …]
|
| /system/sepolicy/private/ |
| D | vold_prepare_subdirs.te | 85 -storage_area_dir 98 # /data/misc is unlabeled during early boot.
|
| D | bpfloader.te | 5 # allow bpfloader to write to the kernel log (starts early) 12 allow { bpffs_type -fs_bpf } fs_bpf:filesystem associate; 33 neverallow { domain -bpfloader } bpffs_type:dir { add_name create open read remove_name setattr wri… 36 neverallow { domain -bpfloader } bpffs_type:file { create map open rename setattr }; 37 neverallow { domain -bpfloader -gpuservice -lmkd -mediaprovider_app -netd -netutils_wrapper … 38 neverallow { domain -bpfloader … 39 neverallow { domain -bpfloader -networ… 40 neverallow { domain -bpfloader -networ… 41 neverallow { domain -bpfloader -netd -networ… 42 neverallow { domain -bpfloader -netd -netutils_wrapper -networ… [all …]
|
| D | boringssl_self_test.te | 5 # per device boot, also run a series of Known Answer Tests (KAT) to verify functionality. 12 # gives access to and which are run during early-init. 62 -vendor_boringssl_self_test 63 -boringssl_self_test 64 -init 65 -vendor_init 70 -vendor_boringssl_self_test 71 -boringssl_self_test 72 -init 73 -vendor_init
|
| /system/extras/mtectrl/ |
| D | mtectrl.rc | 7 # http://www.apache.org/licenses/LICENSE-2.0 17 …exec -- /system/bin/mtectrl ${arm64.memtag.bootctl:-none} ${persist.device_config.runtime_native_b… 21 …exec -- /system/bin/mtectrl ${arm64.memtag.bootctl:-none} ${persist.device_config.runtime_native_b… 25 on early-boot && property:ro.arm64.memtag.bootctl_supported=1 26 exec_background -- /system/bin/mtectrl -s arm64.memtag.bootctl -f arm64.memtag.bootctl_loaded 30 …exec -- /system/bin/mtectrl ${arm64.memtag.bootctl:-none} ${persist.device_config.runtime_native_b…
|
| /system/core/bootstat/ |
| D | bootstat.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 17 // The bootstat command provides options to persist boot events with the current 40 #include <android-base/chrono_utils.h> 41 #include <android-base/file.h> 42 #include <android-base/logging.h> 43 #include <android-base/parseint.h> 44 #include <android-base/properties.h> 45 #include <android-base/strings.h> 139 // Scans the boot event record store for record files and logs each boot event 149 if (info->second.atom == android::util::BOOT_TIME_EVENT_ERROR_CODE_REPORTED) { in LogBootEvents() [all …]
|
| /system/keymaster/include/keymaster/ |
| D | keymaster_enforcement.h | 8 * http://www.apache.org/licenses/LICENSE-2.0 98 // The time-related methods address the fact that different enforcement contexts may have 99 // different time-related capabilities. In particular: 101 // - They may or may not be able to check dates against real-world clocks. 103 // - They may or may not be able to check timestampls against authentication trustlets (minters 106 // - They must have some time source for relative times, but may not be able to provide more 133 * this method. On non-Linux POSIX systems, CLOCK_MONOTONIC is good, assuming the device does 139 * Get whether or not we're in early boot. See early_boot_ended() below. 206 * Inform the KeymasterEnforcement object that early boot stage has ended.
|
| /system/sepolicy/prebuilts/api/202404/private/ |
| D | bpfloader.te | 5 # allow bpfloader to write to the kernel log (starts early) 12 allow { bpffs_type -fs_bpf } fs_bpf:filesystem associate; 33 neverallow { domain -bpfloader } bpffs_type:dir { add_name create remove_name write }; 36 neverallow { domain -bpfloader } bpffs_type:file { create map open rename setattr }; 37 neverallow { domain -bpfloader -gpuservice -lmkd -mediaprovider_app -netd -netutils_wrapper … 38 neverallow { domain -bpfloader … 39 neverallow { domain -bpfloader -networ… 40 neverallow { domain -bpfloader -networ… 41 neverallow { domain -bpfloader -netd -networ… 42 neverallow { domain -bpfloader -netd -netutils_wrapper -networ… [all …]
|
| D | boringssl_self_test.te | 5 # per device boot, also run a series of Known Answer Tests (KAT) to verify functionality. 12 # gives access to and which are run during early-init. 62 -vendor_boringssl_self_test 63 -boringssl_self_test 64 -init 65 -vendor_init 70 -vendor_boringssl_self_test 71 -boringssl_self_test 72 -init 73 -vendor_init
|
| /system/sepolicy/prebuilts/api/34.0/private/ |
| D | bpfloader.te | 5 # allow bpfloader to write to the kernel log (starts early) 12 allow { bpffs_type -fs_bpf } fs_bpf:filesystem associate; 33 neverallow { domain -bpfloader } bpffs_type:dir { add_name create remove_name write }; 36 neverallow { domain -bpfloader } bpffs_type:file { create map open rename setattr }; 37 neverallow { domain -bpfloader -gpuservice -lmkd -mediaprovider_app -netd -netutils_wrapper … 38 neverallow { domain -bpfloader … 39 neverallow { domain -bpfloader -networ… 40 neverallow { domain -bpfloader -networ… 41 neverallow { domain -bpfloader -netd -networ… 42 neverallow { domain -bpfloader -netd -netutils_wrapper -networ… [all …]
|
| D | boringssl_self_test.te | 5 # per device boot, also run a series of Known Answer Tests (KAT) to verify functionality. 12 # gives access to and which are run during early-init. 62 -vendor_boringssl_self_test 63 -boringssl_self_test 64 -init 65 -vendor_init 70 -vendor_boringssl_self_test 71 -boringssl_self_test 72 -init 73 -vendor_init
|
| /system/sepolicy/prebuilts/api/33.0/private/ |
| D | boringssl_self_test.te | 5 # per device boot, also run a series of Known Answer Tests (KAT) to verify functionality. 12 # gives access to and which are run during early-init. 62 -vendor_boringssl_self_test 63 -boringssl_self_test 64 -init 65 -vendor_init 70 -vendor_boringssl_self_test 71 -boringssl_self_test 72 -init 73 -vendor_init
|
| /system/sepolicy/prebuilts/api/32.0/private/ |
| D | boringssl_self_test.te | 5 # per device boot, also run a series of Known Answer Tests (KAT) to verify functionality. 12 # gives access to and which are run during early-init. 62 -vendor_boringssl_self_test 63 -boringssl_self_test 64 -init 65 -vendor_init 70 -vendor_boringssl_self_test 71 -boringssl_self_test 72 -init 73 -vendor_init
|
| /system/sepolicy/prebuilts/api/30.0/private/ |
| D | boringssl_self_test.te | 5 # per device boot, also run a series of Known Answer Tests (KAT) to verify functionality. 12 # gives access to and which are run during early-init. 62 -vendor_boringssl_self_test 63 -boringssl_self_test 64 -init 65 -vendor_init 70 -vendor_boringssl_self_test 71 -boringssl_self_test 72 -init 73 -vendor_init
|
1234