init.rc revision ca47cef7491caf6072984d9d64c768717baad09a
1on early-init 2 start ueventd 3 4# create mountpoints 5 mkdir /mnt 0775 root system 6 7on init 8 9sysclktz 0 10 11loglevel 3 12 13# setup the global environment 14 export PATH /sbin:/vendor/bin:/system/sbin:/system/bin:/system/xbin 15 export LD_LIBRARY_PATH /vendor/lib:/system/lib 16 export ANDROID_BOOTLOGO 1 17 export ANDROID_ROOT /system 18 export ANDROID_ASSETS /system/app 19 export ANDROID_DATA /data 20 export ASEC_MOUNTPOINT /mnt/asec 21 export LOOP_MOUNTPOINT /mnt/obb 22 export BOOTCLASSPATH /system/framework/core.jar:/system/framework/core-junit.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/apache-xml.jar:/system/framework/filterfw.jar 23 24# Backward compatibility 25 symlink /system/etc /etc 26 symlink /sys/kernel/debug /d 27 28# Right now vendor lives on the same filesystem as system, 29# but someday that may change. 30 symlink /system/vendor /vendor 31 32# Create cgroup mount point for cpu accounting 33 mkdir /acct 34 mount cgroup none /acct cpuacct 35 mkdir /acct/uid 36 37 mkdir /system 38 mkdir /data 0771 system system 39 mkdir /cache 0770 system cache 40 mkdir /config 0500 root root 41 42 # Directory for putting things only root should see. 43 mkdir /mnt/secure 0700 root root 44 45 # Directory for staging bindmounts 46 mkdir /mnt/secure/staging 0700 root root 47 48 # Directory-target for where the secure container 49 # imagefile directory will be bind-mounted 50 mkdir /mnt/secure/asec 0700 root root 51 52 # Secure container public mount points. 53 mkdir /mnt/asec 0700 root system 54 mount tmpfs tmpfs /mnt/asec mode=0755,gid=1000 55 56 # Filesystem image public mount points. 57 mkdir /mnt/obb 0700 root system 58 mount tmpfs tmpfs /mnt/obb mode=0755,gid=1000 59 60 write /proc/sys/kernel/panic_on_oops 1 61 write /proc/sys/kernel/hung_task_timeout_secs 0 62 write /proc/cpu/alignment 4 63 write /proc/sys/kernel/sched_latency_ns 10000000 64 write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000 65 write /proc/sys/kernel/sched_compat_yield 1 66 write /proc/sys/kernel/sched_child_runs_first 0 67 68# Create cgroup mount points for process groups 69 mkdir /dev/cpuctl 70 mount cgroup none /dev/cpuctl cpu 71 chown system system /dev/cpuctl 72 chown system system /dev/cpuctl/tasks 73 chmod 0777 /dev/cpuctl/tasks 74 write /dev/cpuctl/cpu.shares 1024 75 76 mkdir /dev/cpuctl/fg_boost 77 chown system system /dev/cpuctl/fg_boost/tasks 78 chmod 0777 /dev/cpuctl/fg_boost/tasks 79 write /dev/cpuctl/fg_boost/cpu.shares 1024 80 81 mkdir /dev/cpuctl/bg_non_interactive 82 chown system system /dev/cpuctl/bg_non_interactive/tasks 83 chmod 0777 /dev/cpuctl/bg_non_interactive/tasks 84 # 5.0 % 85 write /dev/cpuctl/bg_non_interactive/cpu.shares 52 86 87on fs 88# mount mtd partitions 89 # Mount /system rw first to give the filesystem a chance to save a checkpoint 90 mount yaffs2 mtd@system /system 91 mount yaffs2 mtd@system /system ro remount 92 mount yaffs2 mtd@userdata /data nosuid nodev 93 mount yaffs2 mtd@cache /cache nosuid nodev 94 95on post-fs 96 # once everything is setup, no need to modify / 97 mount rootfs rootfs / ro remount 98 99 # We chown/chmod /cache again so because mount is run as root + defaults 100 chown system cache /cache 101 chmod 0770 /cache 102 103 # This may have been created by the recovery system with odd permissions 104 chown system cache /cache/recovery 105 chmod 0770 /cache/recovery 106 107 #change permissions on vmallocinfo so we can grab it from bugreports 108 chown root log /proc/vmallocinfo 109 chmod 0440 /proc/vmallocinfo 110 111 #change permissions on kmsg & sysrq-trigger so bugreports can grab kthread stacks 112 chown root system /proc/kmsg 113 chmod 0440 /proc/kmsg 114 chown root system /proc/sysrq-trigger 115 chmod 0220 /proc/sysrq-trigger 116 117 # create the lost+found directories, so as to enforce our permissions 118 mkdir /cache/lost+found 0770 root root 119 120on post-fs-data 121 # We chown/chmod /data again so because mount is run as root + defaults 122 chown system system /data 123 chmod 0771 /data 124 125 # Create dump dir and collect dumps. 126 # Do this before we mount cache so eventually we can use cache for 127 # storing dumps on platforms which do not have a dedicated dump partition. 128 mkdir /data/dontpanic 0750 root log 129 130 # Collect apanic data, free resources and re-arm trigger 131 copy /proc/apanic_console /data/dontpanic/apanic_console 132 chown root log /data/dontpanic/apanic_console 133 chmod 0640 /data/dontpanic/apanic_console 134 135 copy /proc/apanic_threads /data/dontpanic/apanic_threads 136 chown root log /data/dontpanic/apanic_threads 137 chmod 0640 /data/dontpanic/apanic_threads 138 139 write /proc/apanic_console 1 140 141 # create basic filesystem structure 142 mkdir /data/misc 01771 system misc 143 mkdir /data/misc/bluetoothd 0770 bluetooth bluetooth 144 mkdir /data/misc/bluetooth 0770 system system 145 mkdir /data/misc/keystore 0700 keystore keystore 146 mkdir /data/misc/keychain 0771 system system 147 mkdir /data/misc/vpn 0770 system vpn 148 mkdir /data/misc/systemkeys 0700 system system 149 # give system access to wpa_supplicant.conf for backup and restore 150 mkdir /data/misc/wifi 0770 wifi wifi 151 chmod 0660 /data/misc/wifi/wpa_supplicant.conf 152 mkdir /data/local 0771 shell shell 153 mkdir /data/local/tmp 0771 shell shell 154 mkdir /data/data 0771 system system 155 mkdir /data/app-private 0771 system system 156 mkdir /data/app 0771 system system 157 mkdir /data/property 0700 root root 158 159 # create dalvik-cache, so as to enforce our permissions 160 mkdir /data/dalvik-cache 0771 system system 161 162 # create resource-cache and double-check the perms 163 mkdir /data/resource-cache 0771 system system 164 chown system system /data/resource-cache 165 chmod 0771 /data/resource-cache 166 167 # create the lost+found directories, so as to enforce our permissions 168 mkdir /data/lost+found 0770 root root 169 170 # create directory for DRM plug-ins 171 mkdir /data/drm 0774 drm drm 172 173 # If there is no fs-post-data action in the init.<device>.rc file, you 174 # must uncomment this line, otherwise encrypted filesystems 175 # won't work. 176 # Set indication (checked by vold) that we have finished this action 177 #setprop vold.post_fs_data_done 1 178 179 chown system system /sys/class/android_usb/android0/f_mass_storage/lun/file 180 chmod 0660 /sys/class/android_usb/android0/f_mass_storage/lun/file 181 chown system system /sys/class/android_usb/android0/f_rndis/ethaddr 182 chmod 0660 /sys/class/android_usb/android0/f_rndis/ethaddr 183 184on boot 185# basic network init 186 ifup lo 187 hostname localhost 188 domainname localdomain 189 190# set RLIMIT_NICE to allow priorities from 19 to -20 191 setrlimit 13 40 40 192 193# Memory management. Basic kernel parameters, and allow the high 194# level system server to be able to adjust the kernel OOM driver 195# paramters to match how it is managing things. 196 write /proc/sys/vm/overcommit_memory 1 197 write /proc/sys/vm/min_free_order_shift 4 198 chown root system /sys/module/lowmemorykiller/parameters/adj 199 chmod 0664 /sys/module/lowmemorykiller/parameters/adj 200 chown root system /sys/module/lowmemorykiller/parameters/minfree 201 chmod 0664 /sys/module/lowmemorykiller/parameters/minfree 202 203 # Set init and its forked children's oom_adj. 204 write /proc/1/oom_adj -16 205 206 # Tweak background writeout 207 write /proc/sys/vm/dirty_expire_centisecs 200 208 write /proc/sys/vm/dirty_background_ratio 5 209 210 # Permissions for System Server and daemons. 211 chown radio system /sys/android_power/state 212 chown radio system /sys/android_power/request_state 213 chown radio system /sys/android_power/acquire_full_wake_lock 214 chown radio system /sys/android_power/acquire_partial_wake_lock 215 chown radio system /sys/android_power/release_wake_lock 216 chown radio system /sys/power/state 217 chown radio system /sys/power/wake_lock 218 chown radio system /sys/power/wake_unlock 219 chmod 0660 /sys/power/state 220 chmod 0660 /sys/power/wake_lock 221 chmod 0660 /sys/power/wake_unlock 222 chown system system /sys/class/timed_output/vibrator/enable 223 chown system system /sys/class/leds/keyboard-backlight/brightness 224 chown system system /sys/class/leds/lcd-backlight/brightness 225 chown system system /sys/class/leds/button-backlight/brightness 226 chown system system /sys/class/leds/jogball-backlight/brightness 227 chown system system /sys/class/leds/red/brightness 228 chown system system /sys/class/leds/green/brightness 229 chown system system /sys/class/leds/blue/brightness 230 chown system system /sys/class/leds/red/device/grpfreq 231 chown system system /sys/class/leds/red/device/grppwm 232 chown system system /sys/class/leds/red/device/blink 233 chown system system /sys/class/leds/red/brightness 234 chown system system /sys/class/leds/green/brightness 235 chown system system /sys/class/leds/blue/brightness 236 chown system system /sys/class/leds/red/device/grpfreq 237 chown system system /sys/class/leds/red/device/grppwm 238 chown system system /sys/class/leds/red/device/blink 239 chown system system /sys/class/timed_output/vibrator/enable 240 chown system system /sys/module/sco/parameters/disable_esco 241 chown system system /sys/kernel/ipv4/tcp_wmem_min 242 chown system system /sys/kernel/ipv4/tcp_wmem_def 243 chown system system /sys/kernel/ipv4/tcp_wmem_max 244 chown system system /sys/kernel/ipv4/tcp_rmem_min 245 chown system system /sys/kernel/ipv4/tcp_rmem_def 246 chown system system /sys/kernel/ipv4/tcp_rmem_max 247 chown root radio /proc/cmdline 248 249# Define TCP buffer sizes for various networks 250# ReadMin, ReadInitial, ReadMax, WriteMin, WriteInitial, WriteMax, 251 setprop net.tcp.buffersize.default 4096,87380,110208,4096,16384,110208 252 setprop net.tcp.buffersize.wifi 4095,87380,110208,4096,16384,110208 253 setprop net.tcp.buffersize.umts 4094,87380,110208,4096,16384,110208 254 setprop net.tcp.buffersize.edge 4093,26280,35040,4096,16384,35040 255 setprop net.tcp.buffersize.gprs 4092,8760,11680,4096,8760,11680 256 257# Set this property so surfaceflinger is not started by system_init 258 setprop system_init.startsurfaceflinger 0 259 260 class_start core 261 class_start main 262 263on nonencrypted 264 class_start late_start 265 266on charger 267 class_start charger 268 269on property:vold.decrypt=trigger_reset_main 270 class_reset main 271 272on property:vold.decrypt=trigger_load_persist_props 273 load_persist_props 274 275on property:vold.decrypt=trigger_post_fs_data 276 trigger post-fs-data 277 278on property:vold.decrypt=trigger_restart_min_framework 279 class_start main 280 281on property:vold.decrypt=trigger_restart_framework 282 class_start main 283 class_start late_start 284 285on property:vold.decrypt=trigger_shutdown_framework 286 class_reset late_start 287 class_reset main 288 289# Used to disable USB when switching states 290on property:sys.usb.config=none 291 stop adbd 292 write /sys/class/android_usb/android0/enable 0 293 write /sys/class/android_usb/android0/bDeviceClass 0 294 setprop sys.usb.state $sys.usb.config 295 296# adb only USB configuration 297# This should only be used during device bringup 298# and as a fallback if the USB manager fails to set a standard configuration 299on property:sys.usb.config=adb 300 write /sys/class/android_usb/android0/enable 0 301 write /sys/class/android_usb/android0/idVendor 18d1 302 write /sys/class/android_usb/android0/idProduct D002 303 write /sys/class/android_usb/android0/functions $sys.usb.config 304 write /sys/class/android_usb/android0/enable 1 305 start adbd 306 setprop sys.usb.state $sys.usb.config 307 308# USB accessory configuration 309on property:sys.usb.config=accessory 310 write /sys/class/android_usb/android0/enable 0 311 write /sys/class/android_usb/android0/idVendor 18d1 312 write /sys/class/android_usb/android0/idProduct 2d00 313 write /sys/class/android_usb/android0/functions $sys.usb.config 314 write /sys/class/android_usb/android0/enable 1 315 setprop sys.usb.state $sys.usb.config 316 317# USB accessory configuration, with adb 318on property:sys.usb.config=accessory,adb 319 write /sys/class/android_usb/android0/enable 0 320 write /sys/class/android_usb/android0/idVendor 18d1 321 write /sys/class/android_usb/android0/idProduct 2d01 322 write /sys/class/android_usb/android0/functions $sys.usb.config 323 write /sys/class/android_usb/android0/enable 1 324 start adbd 325 setprop sys.usb.state $sys.usb.config 326 327# Used to set USB configuration at boot and to switch the configuration 328# when changing the default configuration 329on property:persist.sys.usb.config=* 330 setprop sys.usb.config $persist.sys.usb.config 331 332## Daemon processes to be run by init. 333## 334service ueventd /sbin/ueventd 335 class core 336 critical 337 338service console /system/bin/sh 339 class core 340 console 341 disabled 342 user shell 343 group log 344 345on property:ro.debuggable=1 346 start console 347 348# adbd is controlled via property triggers in init.<platform>.usb.rc 349service adbd /sbin/adbd 350 class core 351 disabled 352 353# adbd on at boot in emulator 354on property:ro.kernel.qemu=1 355 start adbd 356 357# This property trigger has added to imitiate the previous behavior of "adb root". 358# The adb gadget driver used to reset the USB bus when the adbd daemon exited, 359# and the host side adb relied on this behavior to force it to reconnect with the 360# new adbd instance after init relaunches it. So now we force the USB bus to reset 361# here when adbd sets the service.adb.root property to 1. We also restart adbd here 362# rather than waiting for init to notice its death and restarting it so the timing 363# of USB resetting and adb restarting more closely matches the previous behavior. 364on property:service.adb.root=1 365 write /sys/class/android_usb/android0/enable 0 366 restart adbd 367 write /sys/class/android_usb/android0/enable 1 368 369service servicemanager /system/bin/servicemanager 370 class core 371 user system 372 group system 373 critical 374 onrestart restart zygote 375 onrestart restart media 376 377service vold /system/bin/vold 378 class core 379 socket vold stream 0660 root mount 380 ioprio be 2 381 382service netd /system/bin/netd 383 class main 384 socket netd stream 0660 root system 385 socket dnsproxyd stream 0660 root inet 386 387service debuggerd /system/bin/debuggerd 388 class main 389 390service ril-daemon /system/bin/rild 391 class main 392 socket rild stream 660 root radio 393 socket rild-debug stream 660 radio system 394 user root 395 group radio cache inet misc audio sdcard_rw 396 397service surfaceflinger /system/bin/surfaceflinger 398 class main 399 user system 400 group graphics 401 onrestart restart zygote 402 403service zygote /system/bin/app_process -Xzygote /system/bin --zygote --start-system-server 404 class main 405 socket zygote stream 666 406 onrestart write /sys/android_power/request_state wake 407 onrestart write /sys/power/state on 408 onrestart restart media 409 onrestart restart netd 410 411service drm /system/bin/drmserver 412 class main 413 user drm 414 group system inet 415 416service media /system/bin/mediaserver 417 class main 418 user media 419 group audio camera inet net_bt net_bt_admin net_bw_acct 420 ioprio rt 4 421 422service bootanim /system/bin/bootanimation 423 class main 424 user graphics 425 group graphics 426 disabled 427 oneshot 428 429service dbus /system/bin/dbus-daemon --system --nofork 430 class main 431 socket dbus stream 660 bluetooth bluetooth 432 user bluetooth 433 group bluetooth net_bt_admin 434 435service bluetoothd /system/bin/bluetoothd -n 436 class main 437 socket bluetooth stream 660 bluetooth bluetooth 438 socket dbus_bluetooth stream 660 bluetooth bluetooth 439 # init.rc does not yet support applying capabilities, so run as root and 440 # let bluetoothd drop uid to bluetooth with the right linux capabilities 441 group bluetooth net_bt_admin misc 442 disabled 443 444service installd /system/bin/installd 445 class main 446 socket installd stream 600 system system 447 448service flash_recovery /system/etc/install-recovery.sh 449 class main 450 oneshot 451 452service racoon /system/bin/racoon 453 class main 454 socket racoon stream 600 system system 455 # IKE uses UDP port 500. Racoon will setuid to vpn after binding the port. 456 group vpn net_admin inet 457 disabled 458 oneshot 459 460service mtpd /system/bin/mtpd 461 class main 462 socket mtpd stream 600 system system 463 user vpn 464 group vpn net_admin inet net_raw 465 disabled 466 oneshot 467 468service keystore /system/bin/keystore /data/misc/keystore 469 class main 470 user keystore 471 group keystore 472 socket keystore stream 666 473 474service dumpstate /system/bin/dumpstate -s 475 class main 476 socket dumpstate stream 0660 shell log 477 disabled 478 oneshot 479