init.rc revision 06787f4089093fed8a01ec3a3d2092e10919b77e
1on early-init 2 start ueventd 3 4# create mountpoints 5 mkdir /mnt 0775 root system 6 7on init 8 9sysclktz 0 10 11loglevel 3 12 13# setup the global environment 14 export PATH /sbin:/vendor/bin:/system/sbin:/system/bin:/system/xbin 15 export LD_LIBRARY_PATH /vendor/lib:/system/lib 16 export ANDROID_BOOTLOGO 1 17 export ANDROID_ROOT /system 18 export ANDROID_ASSETS /system/app 19 export ANDROID_DATA /data 20 export ASEC_MOUNTPOINT /mnt/asec 21 export LOOP_MOUNTPOINT /mnt/obb 22 export BOOTCLASSPATH /system/framework/core.jar:/system/framework/core-junit.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/apache-xml.jar:/system/framework/filterfw.jar 23 24# Backward compatibility 25 symlink /system/etc /etc 26 symlink /sys/kernel/debug /d 27 28# Right now vendor lives on the same filesystem as system, 29# but someday that may change. 30 symlink /system/vendor /vendor 31 32# Create cgroup mount point for cpu accounting 33 mkdir /acct 34 mount cgroup none /acct cpuacct 35 mkdir /acct/uid 36 37 mkdir /system 38 mkdir /data 0771 system system 39 mkdir /cache 0770 system cache 40 mkdir /config 0500 root root 41 42 # Directory for putting things only root should see. 43 mkdir /mnt/secure 0700 root root 44 45 # Directory for staging bindmounts 46 mkdir /mnt/secure/staging 0700 root root 47 48 # Directory-target for where the secure container 49 # imagefile directory will be bind-mounted 50 mkdir /mnt/secure/asec 0700 root root 51 52 # Secure container public mount points. 53 mkdir /mnt/asec 0700 root system 54 mount tmpfs tmpfs /mnt/asec mode=0755,gid=1000 55 56 # Filesystem image public mount points. 57 mkdir /mnt/obb 0700 root system 58 mount tmpfs tmpfs /mnt/obb mode=0755,gid=1000 59 60 write /proc/sys/kernel/panic_on_oops 1 61 write /proc/sys/kernel/hung_task_timeout_secs 0 62 write /proc/cpu/alignment 4 63 write /proc/sys/kernel/sched_latency_ns 10000000 64 write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000 65 write /proc/sys/kernel/sched_compat_yield 1 66 write /proc/sys/kernel/sched_child_runs_first 0 67 68# Create cgroup mount points for process groups 69 mkdir /dev/cpuctl 70 mount cgroup none /dev/cpuctl cpu 71 chown system system /dev/cpuctl 72 chown system system /dev/cpuctl/tasks 73 chmod 0777 /dev/cpuctl/tasks 74 write /dev/cpuctl/cpu.shares 1024 75 76 mkdir /dev/cpuctl/fg_boost 77 chown system system /dev/cpuctl/fg_boost/tasks 78 chmod 0777 /dev/cpuctl/fg_boost/tasks 79 write /dev/cpuctl/fg_boost/cpu.shares 1024 80 81 mkdir /dev/cpuctl/bg_non_interactive 82 chown system system /dev/cpuctl/bg_non_interactive/tasks 83 chmod 0777 /dev/cpuctl/bg_non_interactive/tasks 84 # 5.0 % 85 write /dev/cpuctl/bg_non_interactive/cpu.shares 52 86 87on fs 88# mount mtd partitions 89 # Mount /system rw first to give the filesystem a chance to save a checkpoint 90 mount yaffs2 mtd@system /system 91 mount yaffs2 mtd@system /system ro remount 92 mount yaffs2 mtd@userdata /data nosuid nodev 93 mount yaffs2 mtd@cache /cache nosuid nodev 94 95on post-fs 96 # once everything is setup, no need to modify / 97 mount rootfs rootfs / ro remount 98 99 # We chown/chmod /cache again so because mount is run as root + defaults 100 chown system cache /cache 101 chmod 0770 /cache 102 103 # This may have been created by the recovery system with odd permissions 104 chown system cache /cache/recovery 105 chmod 0770 /cache/recovery 106 107 #change permissions on vmallocinfo so we can grab it from bugreports 108 chown root log /proc/vmallocinfo 109 chmod 0440 /proc/vmallocinfo 110 111 #change permissions on kmsg & sysrq-trigger so bugreports can grab kthread stacks 112 chown root system /proc/kmsg 113 chmod 0440 /proc/kmsg 114 chown root system /proc/sysrq-trigger 115 chmod 0220 /proc/sysrq-trigger 116 117 # create the lost+found directories, so as to enforce our permissions 118 mkdir /cache/lost+found 0770 root root 119 120on post-fs-data 121 # We chown/chmod /data again so because mount is run as root + defaults 122 chown system system /data 123 chmod 0771 /data 124 125 # Create dump dir and collect dumps. 126 # Do this before we mount cache so eventually we can use cache for 127 # storing dumps on platforms which do not have a dedicated dump partition. 128 mkdir /data/dontpanic 0750 root log 129 130 # Collect apanic data, free resources and re-arm trigger 131 copy /proc/apanic_console /data/dontpanic/apanic_console 132 chown root log /data/dontpanic/apanic_console 133 chmod 0640 /data/dontpanic/apanic_console 134 135 copy /proc/apanic_threads /data/dontpanic/apanic_threads 136 chown root log /data/dontpanic/apanic_threads 137 chmod 0640 /data/dontpanic/apanic_threads 138 139 write /proc/apanic_console 1 140 141 # create basic filesystem structure 142 mkdir /data/misc 01771 system misc 143 mkdir /data/misc/bluetoothd 0770 bluetooth bluetooth 144 mkdir /data/misc/bluetooth 0770 system system 145 mkdir /data/misc/keystore 0700 keystore keystore 146 mkdir /data/misc/keychain 0771 system system 147 mkdir /data/misc/vpn 0770 system vpn 148 mkdir /data/misc/systemkeys 0700 system system 149 # give system access to wpa_supplicant.conf for backup and restore 150 mkdir /data/misc/wifi 0770 wifi wifi 151 chmod 0660 /data/misc/wifi/wpa_supplicant.conf 152 mkdir /data/local 0771 shell shell 153 mkdir /data/local/tmp 0771 shell shell 154 mkdir /data/data 0771 system system 155 mkdir /data/app-private 0771 system system 156 mkdir /data/app 0771 system system 157 mkdir /data/property 0700 root root 158 159 # create dalvik-cache, so as to enforce our permissions 160 mkdir /data/dalvik-cache 0771 system system 161 162 # create resource-cache and double-check the perms 163 mkdir /data/resource-cache 0771 system system 164 chown system system /data/resource-cache 165 chmod 0771 /data/resource-cache 166 167 # create the lost+found directories, so as to enforce our permissions 168 mkdir /data/lost+found 0770 root root 169 170 # create directory for DRM plug-ins 171 mkdir /data/drm 0774 drm drm 172 173 # If there is no fs-post-data action in the init.<device>.rc file, you 174 # must uncomment this line, otherwise encrypted filesystems 175 # won't work. 176 # Set indication (checked by vold) that we have finished this action 177 #setprop vold.post_fs_data_done 1 178 179 chown system system /sys/class/android_usb/android0/f_mass_storage/lun/file 180 chmod 0660 /sys/class/android_usb/android0/f_mass_storage/lun/file 181 chown system system /sys/class/android_usb/android0/f_rndis/ethaddr 182 chmod 0660 /sys/class/android_usb/android0/f_rndis/ethaddr 183 184on boot 185# basic network init 186 ifup lo 187 hostname localhost 188 domainname localdomain 189 190# set RLIMIT_NICE to allow priorities from 19 to -20 191 setrlimit 13 40 40 192 193# Memory management. Basic kernel parameters, and allow the high 194# level system server to be able to adjust the kernel OOM driver 195# paramters to match how it is managing things. 196 write /proc/sys/vm/overcommit_memory 1 197 write /proc/sys/vm/min_free_order_shift 4 198 chown root system /sys/module/lowmemorykiller/parameters/adj 199 chmod 0664 /sys/module/lowmemorykiller/parameters/adj 200 chown root system /sys/module/lowmemorykiller/parameters/minfree 201 chmod 0664 /sys/module/lowmemorykiller/parameters/minfree 202 203 # Set init and its forked children's oom_adj. 204 write /proc/1/oom_adj -16 205 206 # Tweak background writeout 207 write /proc/sys/vm/dirty_expire_centisecs 200 208 write /proc/sys/vm/dirty_background_ratio 5 209 210 # Permissions for System Server and daemons. 211 chown radio system /sys/android_power/state 212 chown radio system /sys/android_power/request_state 213 chown radio system /sys/android_power/acquire_full_wake_lock 214 chown radio system /sys/android_power/acquire_partial_wake_lock 215 chown radio system /sys/android_power/release_wake_lock 216 chown radio system /sys/power/state 217 chown radio system /sys/power/wake_lock 218 chown radio system /sys/power/wake_unlock 219 chmod 0660 /sys/power/state 220 chmod 0660 /sys/power/wake_lock 221 chmod 0660 /sys/power/wake_unlock 222 chown system system /sys/class/timed_output/vibrator/enable 223 chown system system /sys/class/leds/keyboard-backlight/brightness 224 chown system system /sys/class/leds/lcd-backlight/brightness 225 chown system system /sys/class/leds/button-backlight/brightness 226 chown system system /sys/class/leds/jogball-backlight/brightness 227 chown system system /sys/class/leds/red/brightness 228 chown system system /sys/class/leds/green/brightness 229 chown system system /sys/class/leds/blue/brightness 230 chown system system /sys/class/leds/red/device/grpfreq 231 chown system system /sys/class/leds/red/device/grppwm 232 chown system system /sys/class/leds/red/device/blink 233 chown system system /sys/class/leds/red/brightness 234 chown system system /sys/class/leds/green/brightness 235 chown system system /sys/class/leds/blue/brightness 236 chown system system /sys/class/leds/red/device/grpfreq 237 chown system system /sys/class/leds/red/device/grppwm 238 chown system system /sys/class/leds/red/device/blink 239 chown system system /sys/class/timed_output/vibrator/enable 240 chown system system /sys/module/sco/parameters/disable_esco 241 chown system system /sys/kernel/ipv4/tcp_wmem_min 242 chown system system /sys/kernel/ipv4/tcp_wmem_def 243 chown system system /sys/kernel/ipv4/tcp_wmem_max 244 chown system system /sys/kernel/ipv4/tcp_rmem_min 245 chown system system /sys/kernel/ipv4/tcp_rmem_def 246 chown system system /sys/kernel/ipv4/tcp_rmem_max 247 chown root radio /proc/cmdline 248 249# Define TCP buffer sizes for various networks 250# ReadMin, ReadInitial, ReadMax, WriteMin, WriteInitial, WriteMax, 251 setprop net.tcp.buffersize.default 4096,87380,110208,4096,16384,110208 252 setprop net.tcp.buffersize.wifi 4095,87380,110208,4096,16384,110208 253 setprop net.tcp.buffersize.umts 4094,87380,110208,4096,16384,110208 254 setprop net.tcp.buffersize.edge 4093,26280,35040,4096,16384,35040 255 setprop net.tcp.buffersize.gprs 4092,8760,11680,4096,8760,11680 256 257# Set this property so surfaceflinger is not started by system_init 258 setprop system_init.startsurfaceflinger 0 259 260 class_start core 261 class_start main 262 263on nonencrypted 264 class_start late_start 265 266on property:vold.decrypt=trigger_reset_main 267 class_reset main 268 269on property:vold.decrypt=trigger_load_persist_props 270 load_persist_props 271 272on property:vold.decrypt=trigger_post_fs_data 273 trigger post-fs-data 274 275on property:vold.decrypt=trigger_restart_min_framework 276 class_start main 277 278on property:vold.decrypt=trigger_restart_framework 279 class_start main 280 class_start late_start 281 282on property:vold.decrypt=trigger_shutdown_framework 283 class_reset late_start 284 class_reset main 285 286# Used to disable USB when switching states 287on property:sys.usb.config=none 288 stop adbd 289 write /sys/class/android_usb/android0/enable 0 290 write /sys/class/android_usb/android0/bDeviceClass 0 291 setprop sys.usb.state $sys.usb.config 292 293# adb only USB configuration 294# This should only be used during device bringup 295# and as a fallback if the USB manager fails to set a standard configuration 296on property:sys.usb.config=adb 297 write /sys/class/android_usb/android0/enable 0 298 write /sys/class/android_usb/android0/idVendor 18d1 299 write /sys/class/android_usb/android0/idProduct D002 300 write /sys/class/android_usb/android0/functions $sys.usb.config 301 write /sys/class/android_usb/android0/enable 1 302 start adbd 303 setprop sys.usb.state $sys.usb.config 304 305# USB accessory configuration 306on property:sys.usb.config=accessory 307 write /sys/class/android_usb/android0/enable 0 308 write /sys/class/android_usb/android0/idVendor 18d1 309 write /sys/class/android_usb/android0/idProduct 2d00 310 write /sys/class/android_usb/android0/functions $sys.usb.config 311 write /sys/class/android_usb/android0/enable 1 312 setprop sys.usb.state $sys.usb.config 313 314# USB accessory configuration, with adb 315on property:sys.usb.config=accessory,adb 316 write /sys/class/android_usb/android0/enable 0 317 write /sys/class/android_usb/android0/idVendor 18d1 318 write /sys/class/android_usb/android0/idProduct 2d01 319 write /sys/class/android_usb/android0/functions $sys.usb.config 320 write /sys/class/android_usb/android0/enable 1 321 start adbd 322 setprop sys.usb.state $sys.usb.config 323 324# Used to set USB configuration at boot and to switch the configuration 325# when changing the default configuration 326on property:persist.sys.usb.config=* 327 setprop sys.usb.config $persist.sys.usb.config 328 329## Daemon processes to be run by init. 330## 331service ueventd /sbin/ueventd 332 class core 333 critical 334 335service console /system/bin/sh 336 class core 337 console 338 disabled 339 user shell 340 group log 341 342on property:ro.debuggable=1 343 start console 344 345# adbd is controlled via property triggers in init.<platform>.usb.rc 346service adbd /sbin/adbd 347 class core 348 disabled 349 350# adbd on at boot in emulator 351on property:ro.kernel.qemu=1 352 start adbd 353 354# This property trigger has added to imitiate the previous behavior of "adb root". 355# The adb gadget driver used to reset the USB bus when the adbd daemon exited, 356# and the host side adb relied on this behavior to force it to reconnect with the 357# new adbd instance after init relaunches it. So now we force the USB bus to reset 358# here when adbd sets the service.adb.root property to 1. We also restart adbd here 359# rather than waiting for init to notice its death and restarting it so the timing 360# of USB resetting and adb restarting more closely matches the previous behavior. 361on property:service.adb.root=1 362 write /sys/class/android_usb/android0/enable 0 363 restart adbd 364 write /sys/class/android_usb/android0/enable 1 365 366service servicemanager /system/bin/servicemanager 367 class core 368 user system 369 group system 370 critical 371 onrestart restart zygote 372 onrestart restart media 373 374service vold /system/bin/vold 375 class core 376 socket vold stream 0660 root mount 377 ioprio be 2 378 379service netd /system/bin/netd 380 class main 381 socket netd stream 0660 root system 382 socket dnsproxyd stream 0660 root inet 383 384service debuggerd /system/bin/debuggerd 385 class main 386 387service ril-daemon /system/bin/rild 388 class main 389 socket rild stream 660 root radio 390 socket rild-debug stream 660 radio system 391 user root 392 group radio cache inet misc audio sdcard_rw 393 394service surfaceflinger /system/bin/surfaceflinger 395 class main 396 user system 397 group graphics 398 onrestart restart zygote 399 400service zygote /system/bin/app_process -Xzygote /system/bin --zygote --start-system-server 401 class main 402 socket zygote stream 666 403 onrestart write /sys/android_power/request_state wake 404 onrestart write /sys/power/state on 405 onrestart restart media 406 onrestart restart netd 407 408service drm /system/bin/drmserver 409 class main 410 user drm 411 group system inet 412 413service media /system/bin/mediaserver 414 class main 415 user media 416 group audio camera inet net_bt net_bt_admin 417 ioprio rt 4 418 419service bootanim /system/bin/bootanimation 420 class main 421 user graphics 422 group graphics 423 disabled 424 oneshot 425 426service dbus /system/bin/dbus-daemon --system --nofork 427 class main 428 socket dbus stream 660 bluetooth bluetooth 429 user bluetooth 430 group bluetooth net_bt_admin 431 432service bluetoothd /system/bin/bluetoothd -n 433 class main 434 socket bluetooth stream 660 bluetooth bluetooth 435 socket dbus_bluetooth stream 660 bluetooth bluetooth 436 # init.rc does not yet support applying capabilities, so run as root and 437 # let bluetoothd drop uid to bluetooth with the right linux capabilities 438 group bluetooth net_bt_admin misc 439 disabled 440 441service installd /system/bin/installd 442 class main 443 socket installd stream 600 system system 444 445service flash_recovery /system/etc/install-recovery.sh 446 class main 447 oneshot 448 449service racoon /system/bin/racoon 450 class main 451 socket racoon stream 600 system system 452 # IKE uses UDP port 500. Racoon will setuid to vpn after binding the port. 453 group vpn net_admin 454 disabled 455 oneshot 456 457service mtpd /system/bin/mtpd 458 class main 459 socket mtpd stream 600 system system 460 user vpn 461 group vpn net_admin net_raw 462 disabled 463 oneshot 464 465service keystore /system/bin/keystore /data/misc/keystore 466 class main 467 user keystore 468 group keystore 469 socket keystore stream 666 470 471service dumpstate /system/bin/dumpstate -s 472 class main 473 socket dumpstate stream 0660 shell log 474 disabled 475 oneshot 476