Observe new apexd status value of "activated" as required.
As of aosp/1224611, there is a new step in the preparation of APEXes where init calls back into apexd after DE user data is unencrypted to allow DE apex data to be snapshotted or restored. aosp/1228581 introduces a new apexd.status value of "activated" that is set once APEXes are activated but before this snapshot has occurred. init may execute "perform_apex_config" once this has occurred, so this CL changes init to wait for "activated" rather than "ready" before doing this. Bug: 148672144 Test: build & flash, check boot completes and check in logs that init waits on the correct status value. Change-Id: I339580bf593d3b09a5dff749ac2a5d1952bcb210
This commit is contained in:
parent
e6211eb978
commit
3cb185e4a1
1 changed files with 2 additions and 2 deletions
|
@ -728,7 +728,7 @@ on post-fs-data
|
|||
mkdir /data/incremental 0771 system system encryption=Require
|
||||
|
||||
# Wait for apexd to finish activating APEXes before starting more processes.
|
||||
wait_for_prop apexd.status ready
|
||||
wait_for_prop apexd.status activated
|
||||
perform_apex_config
|
||||
|
||||
# Special-case /data/media/obb per b/64566063
|
||||
|
@ -743,7 +743,7 @@ on post-fs-data
|
|||
# Allow apexd to snapshot and restore device encrypted apex data in the case
|
||||
# of a rollback. This should be done immediately after DE_user data keys
|
||||
# are loaded. APEXes should not access this data until this has been
|
||||
# completed.
|
||||
# completed and apexd.status becomes "ready".
|
||||
exec_start apexd-snapshotde
|
||||
|
||||
# Set SELinux security contexts on upgrade or policy update.
|
||||
|
|
Loading…
Reference in a new issue