Change init sequence to support file level encryption
File level encryption must get the key between mounting userdata and
calling post_fs_data when the directories are created. This requires
access to keymaster, which in turn is found from a system property.
Split property loaded into system and data, and load in right order.
diff --git a/etc/init.rc b/etc/init.rc
index 6c07c60..4277277 100644
@@ -47,8 +47,8 @@
# Load properties from /system/ + /factory after fs mount.
@@ -63,7 +63,7 @@
# Load properties from /system/ + /factory after fs mount. Place
# this in another action so that the load will be scheduled after the prior
# issued fs triggers have completed.
- trigger load_all_props_action
+ trigger load_system_props_action
# Remove a file to wake up anything waiting for firmware