Home
last modified time | relevance | path

Searched +full:early +full:- +full:boot (Results 1 – 25 of 92) sorted by relevance

1234

/system/core/init/
DREADME.md2 ---------------------
7 All of these are line-oriented, consisting of tokens separated by
8 whitespace. The c-style backslash escapes may be used to insert
11 when it is the last character on a line, may be used for line-folding.
29 --------------
81 -------------------------------
96 For an APEX module with the following files in /apex/sample-module/apex/etc/:
118 -------
122 the tail of a to-be-executed queue (unless it is already on the
143 on boot
[all …]
/system/extras/simpleperf/
Dsimpleperf.rc5 on early-init && property:ro.boot.simpleperf.boot_record=*
6 …exec_background u:r:su:s0 root root -- /system/bin/simpleperf record -a -g --exclude-perf -o /tmp/…
8 on property:sys.boot_completed=1 && property:ro.boot.simpleperf.boot_record=*
9 exec u:r:su:s0 root root -- /system/bin/killall simpleperf
/system/extras/simpleperf/doc/
Dandroid_platform_profiling.md19 $ ./app_profiler.py -np surfaceflinger -r "-g --duration 10"
31 $ ./app_profiler.py -np surfaceflinger -r "--call-graph fp --duration 10"
34 $ ./binary_cache_builder.py -lib $ANDROID_PRODUCT_OUT/symbols
37 $ unzip comet-symbols-12488474.zip
38 $ ./binary_cache_builder.py -lib out
44 # Disassembling all binaries can be slow, so you can use the --binary_filter
46 $ ./report_html.py --add_source_code --source_dirs $ANDROID_BUILD_TOP --add_disassembly \
47 --binary_filter surfaceflinger.so
51 [Show Annotated Source Code and Disassembly](README.md#show-annotated-source-code-and-disassembly).
56 Sometimes we want to profile a process/system-wide when a special situation happens. In this case,
[all …]
/system/extras/boottime_tools/bootanalyze/
Dconfig.yaml4 …system_server: SystemServerTiming(Async)?\s*:\s*(?P<name>\S+) took to complete:\s(?P<time>[0-9]+)ms
5 package_manager: PackageSettingsTiming\s*:\s*(?P<name>\S+) took to complete:\s(?P<time>[0-9]+)ms
6 system_ui: SystemUIBootTiming?\s*:\s*(?P<name>\S+) took to complete:\s(?P<time>[0-9]+)ms
7 fs_shutdown: (?P<name>boot_fs_shutdown),(?P<time>[0-9]+),([0-9]+)
8 ueventd_secs: ueventd:\s(?P<name>\S.+)\stook\s(?P<time>[.0-9]+)\sseconds
9 init_command_ms: init:\sCommand\s(?P<name>\S.+)\sreturned.*took\s(?P<time>[.0-9]+)ms
10 …: init:\sService\s.*exec\s\S+\s\((?P<name>\S.+)\).*pid.*\swaiting\stook\s(?P<time>[.0-9]+)\sseconds
11 zygote64_timing: (?P<name>Zygote64Timing\:\s\S+)\stook\sto\scomplete\:\s(?P<time>[0-9]+)ms
12 zygote32_timing: (?P<name>Zygote32Timing\:\s\S+)\stook\sto\scomplete\:\s(?P<time>[0-9]+)ms
13 …P<component>\S+)\sLong\smonitor\scontention\swith\sowner\s(?P<name>\S.+).*\sfor\s(?P<time>[.0-9]+)s
[all …]
/system/vold/
DKeystore.h8 * http://www.apache.org/licenses/LICENSE-2.0
25 #include <android-base/macros.h>
59 if (output) output->clear(); in updateCompletely()
90 upgradedBlob = std::optional(std::string(blob->begin(), blob->end()));
115 // Exports a keystore2 key with STORAGE_KEY tag wrapped with a per-boot ephemeral key
119 // Begin a new cryptographic operation, collecting output parameters if pointer is non-null
125 // Tell all Keymint devices that early boot has ended and early boot-only keys can no longer
129 // Tell all Keymint devices to delete all rollback-protected keys.
/system/extras/kcmdlinectrl/
Dkcmdlinectrl.rc7 # http://www.apache.org/licenses/LICENSE-2.0
17 on early-boot
18 exec_background -- /system/bin/kcmdlinectrl update-props
22 exec -- /system/bin/kcmdlinectrl store binder ${kcmdline.binder:-c}
/system/core/rootdir/
Dinit.rc14 # Cgroups are mounted right before early-init using list from /etc/cgroups.json
15 on early-init
42 # set RLIMIT_NICE to allow priorities from 19 to -20
55 # Greatly extend dm-verity's Merkle tree cache timeout. The default timeout
59 # Disable dm-verity hash prefetching, since it doesn't help performance
63 # Generate empty ld.config.txt for early executed processes which rely on
78 # Run apexd-bootstrap so that APEXes that provide critical libraries
81 exec_start apexd-bootstrap
82 perform_apex_config --bootstrap
106 # Mix device-specific information into the entropy pool
[all …]
/system/core/trusty/utils/rpmb_dev/
Drpmb_dev.wv.system.rc2 -d VSOCK:${trusty.widevine_vm.vm_cid}:1 \
3 -r /dev/socket/rpmb_mock_wv_system \
4 -p /data/secure_storage_wv_system \
5 -t sock
11 --dev /mnt/secure_storage_rpmb_wv_system/persist/RPMB_DATA --init --size 2048
18 --dev /mnt/secure_storage_rpmb_wv_system/persist/RPMB_DATA \
19 --sock rpmb_mock_wv_system
26 on early-boot
50 on post-fs-data && \
/system/security/keystore2/aidl/android/security/maintenance/
DIKeystoreMaintenance.aidl7 // http://www.apache.org/licenses/LICENSE-2.0
33 * `ResponseCode::PERMISSION_DENIED` - if the callers do not have the 'ChangeUser' permission.
34 * `ResponseCode::SYSTEM_ERROR` - if failed to delete the keys of an existing user with the same
37 * @param userId - Android user id
46 * `ResponseCode::PERMISSION_DENIED` - if caller does not have the 'ChangeUser' permission
47 * `ResponseCode::SYSTEM_ERROR` - if failed to initialize the user's super keys
49 * @param userId - Android user id
50 * @param password - a secret derived from the synthetic password of the user
51 * @param allowExisting - if true, then the keys already existing is not considered an error
60 * `ResponseCode::PERMISSION_DENIED` - if the callers do not have the 'ChangeUser' permission.
[all …]
/system/security/keystore2/src/
Dboot_level_keys.rs7 // http://www.apache.org/licenses/LICENSE-2.0
15 //! Offer keys based on the "boot level" for superencryption.
31 /// Strategies used to prevent later boot stages from using the KM key that protects the level 0
36 /// itself, and therefore create artifacts which appear to come from early boot.
39 /// it ensures that the level 0 key was genuinely created in early boot
50 fn lookup_level_zero_km_and_strategy() -> Result<Option<(SecurityLevel, DenyLaterStrategy)>> { in lookup_level_zero_km_and_strategy()
86 fn get_level_zero_key_km_and_strategy() -> Result<(KeyMintDevice, DenyLaterStrategy)> { in get_level_zero_key_km_and_strategy()
112 pub fn get_level_zero_key(db: &mut KeystoreDB) -> Result<ZVec> { in get_level_zero_key()
172 b"Create boot level key", in get_level_zero_key()
182 /// Holds the key for the current boot level, and a cache of future keys generated as required.
[all …]
/system/sepolicy/prebuilts/api/202504/private/
Dvold_prepare_subdirs.te85 -storage_area_dir
98 # /data/misc is unlabeled during early boot.
Dbpfloader.te5 # allow bpfloader to write to the kernel log (starts early)
12 allow { bpffs_type -fs_bpf } fs_bpf:filesystem associate;
33 neverallow { domain -bpfloader } bpffs_type:dir { add_name create open read remove_name setattr wri…
36 neverallow { domain -bpfloader } bpffs_type:file { create map open rename setattr };
37 neverallow { domain -bpfloader -gpuservice -lmkd -mediaprovider_app -netd -netutils_wrapper …
38 neverallow { domain -bpfloader …
39 neverallow { domain -bpfloader -networ…
40 neverallow { domain -bpfloader -networ…
41 neverallow { domain -bpfloader -netd -networ…
42 neverallow { domain -bpfloader -netd -netutils_wrapper -networ…
[all …]
/system/sepolicy/private/
Dvold_prepare_subdirs.te85 -storage_area_dir
98 # /data/misc is unlabeled during early boot.
Dbpfloader.te5 # allow bpfloader to write to the kernel log (starts early)
12 allow { bpffs_type -fs_bpf } fs_bpf:filesystem associate;
33 neverallow { domain -bpfloader } bpffs_type:dir { add_name create open read remove_name setattr wri…
36 neverallow { domain -bpfloader } bpffs_type:file { create map open rename setattr };
37 neverallow { domain -bpfloader -gpuservice -lmkd -mediaprovider_app -netd -netutils_wrapper …
38 neverallow { domain -bpfloader …
39 neverallow { domain -bpfloader -networ…
40 neverallow { domain -bpfloader -networ…
41 neverallow { domain -bpfloader -netd -networ…
42 neverallow { domain -bpfloader -netd -netutils_wrapper -networ…
[all …]
Dboringssl_self_test.te5 # per device boot, also run a series of Known Answer Tests (KAT) to verify functionality.
12 # gives access to and which are run during early-init.
62 -vendor_boringssl_self_test
63 -boringssl_self_test
64 -init
65 -vendor_init
70 -vendor_boringssl_self_test
71 -boringssl_self_test
72 -init
73 -vendor_init
/system/extras/mtectrl/
Dmtectrl.rc7 # http://www.apache.org/licenses/LICENSE-2.0
17 …exec -- /system/bin/mtectrl ${arm64.memtag.bootctl:-none} ${persist.device_config.runtime_native_b…
21 …exec -- /system/bin/mtectrl ${arm64.memtag.bootctl:-none} ${persist.device_config.runtime_native_b…
25 on early-boot && property:ro.arm64.memtag.bootctl_supported=1
26 exec_background -- /system/bin/mtectrl -s arm64.memtag.bootctl -f arm64.memtag.bootctl_loaded
30 …exec -- /system/bin/mtectrl ${arm64.memtag.bootctl:-none} ${persist.device_config.runtime_native_b…
/system/core/bootstat/
Dbootstat.cpp8 * http://www.apache.org/licenses/LICENSE-2.0
17 // The bootstat command provides options to persist boot events with the current
40 #include <android-base/chrono_utils.h>
41 #include <android-base/file.h>
42 #include <android-base/logging.h>
43 #include <android-base/parseint.h>
44 #include <android-base/properties.h>
45 #include <android-base/strings.h>
139 // Scans the boot event record store for record files and logs each boot event
149 if (info->second.atom == android::util::BOOT_TIME_EVENT_ERROR_CODE_REPORTED) { in LogBootEvents()
[all …]
/system/keymaster/include/keymaster/
Dkeymaster_enforcement.h8 * http://www.apache.org/licenses/LICENSE-2.0
98 // The time-related methods address the fact that different enforcement contexts may have
99 // different time-related capabilities. In particular:
101 // - They may or may not be able to check dates against real-world clocks.
103 // - They may or may not be able to check timestampls against authentication trustlets (minters
106 // - They must have some time source for relative times, but may not be able to provide more
133 * this method. On non-Linux POSIX systems, CLOCK_MONOTONIC is good, assuming the device does
139 * Get whether or not we're in early boot. See early_boot_ended() below.
206 * Inform the KeymasterEnforcement object that early boot stage has ended.
/system/sepolicy/prebuilts/api/202404/private/
Dbpfloader.te5 # allow bpfloader to write to the kernel log (starts early)
12 allow { bpffs_type -fs_bpf } fs_bpf:filesystem associate;
33 neverallow { domain -bpfloader } bpffs_type:dir { add_name create remove_name write };
36 neverallow { domain -bpfloader } bpffs_type:file { create map open rename setattr };
37 neverallow { domain -bpfloader -gpuservice -lmkd -mediaprovider_app -netd -netutils_wrapper …
38 neverallow { domain -bpfloader …
39 neverallow { domain -bpfloader -networ…
40 neverallow { domain -bpfloader -networ…
41 neverallow { domain -bpfloader -netd -networ…
42 neverallow { domain -bpfloader -netd -netutils_wrapper -networ…
[all …]
Dboringssl_self_test.te5 # per device boot, also run a series of Known Answer Tests (KAT) to verify functionality.
12 # gives access to and which are run during early-init.
62 -vendor_boringssl_self_test
63 -boringssl_self_test
64 -init
65 -vendor_init
70 -vendor_boringssl_self_test
71 -boringssl_self_test
72 -init
73 -vendor_init
/system/sepolicy/prebuilts/api/34.0/private/
Dbpfloader.te5 # allow bpfloader to write to the kernel log (starts early)
12 allow { bpffs_type -fs_bpf } fs_bpf:filesystem associate;
33 neverallow { domain -bpfloader } bpffs_type:dir { add_name create remove_name write };
36 neverallow { domain -bpfloader } bpffs_type:file { create map open rename setattr };
37 neverallow { domain -bpfloader -gpuservice -lmkd -mediaprovider_app -netd -netutils_wrapper …
38 neverallow { domain -bpfloader …
39 neverallow { domain -bpfloader -networ…
40 neverallow { domain -bpfloader -networ…
41 neverallow { domain -bpfloader -netd -networ…
42 neverallow { domain -bpfloader -netd -netutils_wrapper -networ…
[all …]
Dboringssl_self_test.te5 # per device boot, also run a series of Known Answer Tests (KAT) to verify functionality.
12 # gives access to and which are run during early-init.
62 -vendor_boringssl_self_test
63 -boringssl_self_test
64 -init
65 -vendor_init
70 -vendor_boringssl_self_test
71 -boringssl_self_test
72 -init
73 -vendor_init
/system/sepolicy/prebuilts/api/33.0/private/
Dboringssl_self_test.te5 # per device boot, also run a series of Known Answer Tests (KAT) to verify functionality.
12 # gives access to and which are run during early-init.
62 -vendor_boringssl_self_test
63 -boringssl_self_test
64 -init
65 -vendor_init
70 -vendor_boringssl_self_test
71 -boringssl_self_test
72 -init
73 -vendor_init
/system/sepolicy/prebuilts/api/32.0/private/
Dboringssl_self_test.te5 # per device boot, also run a series of Known Answer Tests (KAT) to verify functionality.
12 # gives access to and which are run during early-init.
62 -vendor_boringssl_self_test
63 -boringssl_self_test
64 -init
65 -vendor_init
70 -vendor_boringssl_self_test
71 -boringssl_self_test
72 -init
73 -vendor_init
/system/sepolicy/prebuilts/api/30.0/private/
Dboringssl_self_test.te5 # per device boot, also run a series of Known Answer Tests (KAT) to verify functionality.
12 # gives access to and which are run during early-init.
62 -vendor_boringssl_self_test
63 -boringssl_self_test
64 -init
65 -vendor_init
70 -vendor_boringssl_self_test
71 -boringssl_self_test
72 -init
73 -vendor_init

1234