init.rc revision 04e5232ac2b3fc87596c6d82c07c667e52e2d7c2
1on early-init 2 start ueventd 3 4# create mountpoints 5 mkdir /mnt 0775 root system 6 7on init 8 9sysclktz 0 10 11loglevel 3 12 13# setup the global environment 14 export PATH /sbin:/vendor/bin:/system/sbin:/system/bin:/system/xbin 15 export LD_LIBRARY_PATH /vendor/lib:/system/lib 16 export ANDROID_BOOTLOGO 1 17 export ANDROID_ROOT /system 18 export ANDROID_ASSETS /system/app 19 export ANDROID_DATA /data 20 export ASEC_MOUNTPOINT /mnt/asec 21 export LOOP_MOUNTPOINT /mnt/obb 22 export BOOTCLASSPATH /system/framework/core.jar:/system/framework/apache-xml.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/core-junit.jar 23 24# Backward compatibility 25 symlink /system/etc /etc 26 symlink /sys/kernel/debug /d 27 28# Right now vendor lives on the same filesystem as system, 29# but someday that may change. 30 symlink /system/vendor /vendor 31 32# Create cgroup mount point for cpu accounting 33 mkdir /acct 34 mount cgroup none /acct cpuacct 35 mkdir /acct/uid 36 37 mkdir /system 38 mkdir /data 0771 system system 39 mkdir /cache 0770 system cache 40 mkdir /config 0500 root root 41 42 # Directory for putting things only root should see. 43 mkdir /mnt/secure 0700 root root 44 45 # Directory for staging bindmounts 46 mkdir /mnt/secure/staging 0700 root root 47 48 # Directory-target for where the secure container 49 # imagefile directory will be bind-mounted 50 mkdir /mnt/secure/asec 0700 root root 51 52 # Secure container public mount points. 53 mkdir /mnt/asec 0700 root system 54 mount tmpfs tmpfs /mnt/asec mode=0755,gid=1000 55 56 # Filesystem image public mount points. 57 mkdir /mnt/obb 0700 root system 58 mount tmpfs tmpfs /mnt/obb mode=0755,gid=1000 59 60 write /proc/sys/kernel/panic_on_oops 1 61 write /proc/sys/kernel/hung_task_timeout_secs 0 62 write /proc/cpu/alignment 4 63 write /proc/sys/kernel/sched_latency_ns 10000000 64 write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000 65 write /proc/sys/kernel/sched_compat_yield 1 66 write /proc/sys/kernel/sched_child_runs_first 0 67 68# Create cgroup mount points for process groups 69 mkdir /dev/cpuctl 70 mount cgroup none /dev/cpuctl cpu 71 chown system system /dev/cpuctl 72 chown system system /dev/cpuctl/tasks 73 chmod 0777 /dev/cpuctl/tasks 74 write /dev/cpuctl/cpu.shares 1024 75 76 mkdir /dev/cpuctl/fg_boost 77 chown system system /dev/cpuctl/fg_boost/tasks 78 chmod 0777 /dev/cpuctl/fg_boost/tasks 79 write /dev/cpuctl/fg_boost/cpu.shares 1024 80 81 mkdir /dev/cpuctl/bg_non_interactive 82 chown system system /dev/cpuctl/bg_non_interactive/tasks 83 chmod 0777 /dev/cpuctl/bg_non_interactive/tasks 84 # 5.0 % 85 write /dev/cpuctl/bg_non_interactive/cpu.shares 52 86 87on fs 88# mount mtd partitions 89 # Mount /system rw first to give the filesystem a chance to save a checkpoint 90 mount yaffs2 mtd@system /system 91 mount yaffs2 mtd@system /system ro remount 92 mount yaffs2 mtd@userdata /data nosuid nodev 93 mount yaffs2 mtd@cache /cache nosuid nodev 94 95on post-fs 96 # once everything is setup, no need to modify / 97 mount rootfs rootfs / ro remount 98 99 # We chown/chmod /cache again so because mount is run as root + defaults 100 chown system cache /cache 101 chmod 0770 /cache 102 103 # This may have been created by the recovery system with odd permissions 104 chown system cache /cache/recovery 105 chmod 0770 /cache/recovery 106 107 #change permissions on vmallocinfo so we can grab it from bugreports 108 chown root log /proc/vmallocinfo 109 chmod 0440 /proc/vmallocinfo 110 111 #change permissions on kmsg & sysrq-trigger so bugreports can grab kthread stacks 112 chown root system /proc/kmsg 113 chmod 0440 /proc/kmsg 114 chown root system /proc/sysrq-trigger 115 chmod 0220 /proc/sysrq-trigger 116 117 # create the lost+found directories, so as to enforce our permissions 118 mkdir /cache/lost+found 0770 119 120 # double check the perms, in case lost+found already exists, and set owner 121 chown root root /cache/lost+found 122 chmod 0770 /cache/lost+found 123 124on post-fs-data 125 # We chown/chmod /data again so because mount is run as root + defaults 126 chown system system /data 127 chmod 0771 /data 128 129 # Create dump dir and collect dumps. 130 # Do this before we mount cache so eventually we can use cache for 131 # storing dumps on platforms which do not have a dedicated dump partition. 132 133 mkdir /data/dontpanic 134 chown root log /data/dontpanic 135 chmod 0750 /data/dontpanic 136 137 # Collect apanic data, free resources and re-arm trigger 138 copy /proc/apanic_console /data/dontpanic/apanic_console 139 chown root log /data/dontpanic/apanic_console 140 chmod 0640 /data/dontpanic/apanic_console 141 142 copy /proc/apanic_threads /data/dontpanic/apanic_threads 143 chown root log /data/dontpanic/apanic_threads 144 chmod 0640 /data/dontpanic/apanic_threads 145 146 write /proc/apanic_console 1 147 148 # create basic filesystem structure 149 mkdir /data/misc 01771 system misc 150 mkdir /data/misc/bluetoothd 0770 bluetooth bluetooth 151 mkdir /data/misc/bluetooth 0770 system system 152 mkdir /data/misc/keystore 0700 keystore keystore 153 mkdir /data/misc/vpn 0770 system system 154 mkdir /data/misc/systemkeys 0700 system system 155 mkdir /data/misc/vpn/profiles 0770 system system 156 # give system access to wpa_supplicant.conf for backup and restore 157 mkdir /data/misc/wifi 0770 wifi wifi 158 chmod 0770 /data/misc/wifi 159 chmod 0660 /data/misc/wifi/wpa_supplicant.conf 160 mkdir /data/local 0771 shell shell 161 mkdir /data/local/tmp 0771 shell shell 162 mkdir /data/data 0771 system system 163 mkdir /data/app-private 0771 system system 164 mkdir /data/app 0771 system system 165 mkdir /data/property 0700 root root 166 167 # create dalvik-cache and double-check the perms 168 mkdir /data/dalvik-cache 0771 system system 169 chown system system /data/dalvik-cache 170 chmod 0771 /data/dalvik-cache 171 172 # create the lost+found directories, so as to enforce our permissions 173 mkdir /data/lost+found 0770 174 175 # double check the perms, in case lost+found already exists, and set owner 176 chown root root /data/lost+found 177 chmod 0770 /data/lost+found 178 179 # create directory for DRM plug-ins 180 mkdir /data/drm 0774 drm drm 181 mkdir /data/drm/plugins 0774 drm drm 182 mkdir /data/drm/plugins/native 0774 drm drm 183 184 # If there is no fs-post-data action in the init.<device>.rc file, you 185 # must uncomment this line, otherwise encrypted filesystems 186 # won't work. 187 # Set indication (checked by vold) that we have finished this action 188 #setprop vold.post_fs_data_done 1 189 190on boot 191# basic network init 192 ifup lo 193 hostname localhost 194 domainname localdomain 195 196# set RLIMIT_NICE to allow priorities from 19 to -20 197 setrlimit 13 40 40 198 199# Define the oom_adj values for the classes of processes that can be 200# killed by the kernel. These are used in ActivityManagerService. 201 setprop ro.FOREGROUND_APP_ADJ 0 202 setprop ro.VISIBLE_APP_ADJ 1 203 setprop ro.PERCEPTIBLE_APP_ADJ 2 204 setprop ro.HEAVY_WEIGHT_APP_ADJ 3 205 setprop ro.SECONDARY_SERVER_ADJ 4 206 setprop ro.BACKUP_APP_ADJ 5 207 setprop ro.HOME_APP_ADJ 6 208 setprop ro.HIDDEN_APP_MIN_ADJ 7 209 setprop ro.EMPTY_APP_ADJ 15 210 211# Define the memory thresholds at which the above process classes will 212# be killed. These numbers are in pages (4k). 213 setprop ro.FOREGROUND_APP_MEM 2048 214 setprop ro.VISIBLE_APP_MEM 3072 215 setprop ro.PERCEPTIBLE_APP_MEM 4096 216 setprop ro.HEAVY_WEIGHT_APP_MEM 4096 217 setprop ro.SECONDARY_SERVER_MEM 6144 218 setprop ro.BACKUP_APP_MEM 6144 219 setprop ro.HOME_APP_MEM 6144 220 setprop ro.HIDDEN_APP_MEM 7168 221 setprop ro.EMPTY_APP_MEM 8192 222 223# Write value must be consistent with the above properties. 224# Note that the driver only supports 6 slots, so we have combined some of 225# the classes into the same memory level; the associated processes of higher 226# classes will still be killed first. 227 write /sys/module/lowmemorykiller/parameters/adj 0,1,2,4,7,15 228 229 write /proc/sys/vm/overcommit_memory 1 230 write /proc/sys/vm/min_free_order_shift 4 231 write /sys/module/lowmemorykiller/parameters/minfree 2048,3072,4096,6144,7168,8192 232 233 # Set init its forked children's oom_adj. 234 write /proc/1/oom_adj -16 235 236 # Tweak background writeout 237 write /proc/sys/vm/dirty_expire_centisecs 200 238 write /proc/sys/vm/dirty_background_ratio 5 239 240 # Permissions for System Server and daemons. 241 chown radio system /sys/android_power/state 242 chown radio system /sys/android_power/request_state 243 chown radio system /sys/android_power/acquire_full_wake_lock 244 chown radio system /sys/android_power/acquire_partial_wake_lock 245 chown radio system /sys/android_power/release_wake_lock 246 chown radio system /sys/power/state 247 chown radio system /sys/power/wake_lock 248 chown radio system /sys/power/wake_unlock 249 chmod 0660 /sys/power/state 250 chmod 0660 /sys/power/wake_lock 251 chmod 0660 /sys/power/wake_unlock 252 chown system system /sys/class/timed_output/vibrator/enable 253 chown system system /sys/class/leds/keyboard-backlight/brightness 254 chown system system /sys/class/leds/lcd-backlight/brightness 255 chown system system /sys/class/leds/button-backlight/brightness 256 chown system system /sys/class/leds/jogball-backlight/brightness 257 chown system system /sys/class/leds/red/brightness 258 chown system system /sys/class/leds/green/brightness 259 chown system system /sys/class/leds/blue/brightness 260 chown system system /sys/class/leds/red/device/grpfreq 261 chown system system /sys/class/leds/red/device/grppwm 262 chown system system /sys/class/leds/red/device/blink 263 chown system system /sys/class/leds/red/brightness 264 chown system system /sys/class/leds/green/brightness 265 chown system system /sys/class/leds/blue/brightness 266 chown system system /sys/class/leds/red/device/grpfreq 267 chown system system /sys/class/leds/red/device/grppwm 268 chown system system /sys/class/leds/red/device/blink 269 chown system system /sys/class/timed_output/vibrator/enable 270 chown system system /sys/module/sco/parameters/disable_esco 271 chown system system /sys/kernel/ipv4/tcp_wmem_min 272 chown system system /sys/kernel/ipv4/tcp_wmem_def 273 chown system system /sys/kernel/ipv4/tcp_wmem_max 274 chown system system /sys/kernel/ipv4/tcp_rmem_min 275 chown system system /sys/kernel/ipv4/tcp_rmem_def 276 chown system system /sys/kernel/ipv4/tcp_rmem_max 277 chown root radio /proc/cmdline 278 279# Define TCP buffer sizes for various networks 280# ReadMin, ReadInitial, ReadMax, WriteMin, WriteInitial, WriteMax, 281 setprop net.tcp.buffersize.default 4096,87380,110208,4096,16384,110208 282 setprop net.tcp.buffersize.wifi 4095,87380,110208,4096,16384,110208 283 setprop net.tcp.buffersize.umts 4094,87380,110208,4096,16384,110208 284 setprop net.tcp.buffersize.edge 4093,26280,35040,4096,16384,35040 285 setprop net.tcp.buffersize.gprs 4092,8760,11680,4096,8760,11680 286 287 class_start core 288 class_start main 289 290on nonencrypted 291 class_start late_start 292 293on property:vold.decrypt=trigger_reset_main 294 class_reset main 295 296on property:vold.decrypt=trigger_post_fs_data 297 trigger post-fs-data 298 299on property:vold.decrypt=trigger_restart_min_framework 300 class_start main 301 302on property:vold.decrypt=trigger_restart_framework 303 class_start main 304 class_start late_start 305 306on property:vold.decrypt=trigger_shutdown_framework 307 class_reset late_start 308 class_reset main 309 310## Daemon processes to be run by init. 311## 312service ueventd /sbin/ueventd 313 class core 314 critical 315 316service console /system/bin/sh 317 class core 318 console 319 disabled 320 user shell 321 group log 322 323on property:ro.debuggable=1 324 start console 325 326# adbd is controlled by the persist.service.adb.enable system property 327service adbd /sbin/adbd 328 class core 329 disabled 330 331# adbd on at boot in emulator 332on property:ro.kernel.qemu=1 333 start adbd 334 335on property:persist.service.adb.enable=1 336 start adbd 337 338on property:persist.service.adb.enable=0 339 stop adbd 340 341service servicemanager /system/bin/servicemanager 342 class core 343 user system 344 group system 345 critical 346 onrestart restart zygote 347 onrestart restart media 348 349service vold /system/bin/vold 350 class core 351 socket vold stream 0660 root mount 352 ioprio be 2 353 354service netd /system/bin/netd 355 class main 356 socket netd stream 0660 root system 357 socket dnsproxyd stream 0660 root inet 358 359service debuggerd /system/bin/debuggerd 360 class main 361 362service ril-daemon /system/bin/rild 363 class late_start 364 socket rild stream 660 root radio 365 socket rild-debug stream 660 radio system 366 user root 367 group radio cache inet misc audio sdcard_rw 368 369service zygote /system/bin/app_process -Xzygote /system/bin --zygote --start-system-server 370 class main 371 socket zygote stream 666 372 onrestart write /sys/android_power/request_state wake 373 onrestart write /sys/power/state on 374 onrestart restart media 375 onrestart restart netd 376 377service drm /system/bin/drmserver 378 class main 379 user drm 380 group inet 381 382service media /system/bin/mediaserver 383 class main 384 user media 385 group system audio camera graphics inet net_bt net_bt_admin net_raw 386 ioprio rt 4 387 388service bootanim /system/bin/bootanimation 389 class main 390 user graphics 391 group graphics 392 disabled 393 oneshot 394 395service dbus /system/bin/dbus-daemon --system --nofork 396 class main 397 socket dbus stream 660 bluetooth bluetooth 398 user bluetooth 399 group bluetooth net_bt_admin 400 401service bluetoothd /system/bin/bluetoothd -n 402 class main 403 socket bluetooth stream 660 bluetooth bluetooth 404 socket dbus_bluetooth stream 660 bluetooth bluetooth 405 # init.rc does not yet support applying capabilities, so run as root and 406 # let bluetoothd drop uid to bluetooth with the right linux capabilities 407 group bluetooth net_bt_admin misc 408 disabled 409 410service installd /system/bin/installd 411 class main 412 socket installd stream 600 system system 413 414service flash_recovery /system/etc/install-recovery.sh 415 class main 416 oneshot 417 418service racoon /system/bin/racoon 419 class main 420 socket racoon stream 600 system system 421 # racoon will setuid to vpn after getting necessary resources. 422 group net_admin 423 disabled 424 oneshot 425 426service mtpd /system/bin/mtpd 427 class main 428 socket mtpd stream 600 system system 429 user vpn 430 group vpn net_admin net_raw 431 disabled 432 oneshot 433 434service keystore /system/bin/keystore /data/misc/keystore 435 class main 436 user keystore 437 group keystore 438 socket keystore stream 666 439 440service dumpstate /system/bin/dumpstate -s 441 class main 442 socket dumpstate stream 0660 shell log 443 disabled 444 oneshot 445