blob: f6a7ecc26585a375bb00a378e3f4ea14f2756ea8 [file] [log] [blame]
Inseob Kimdc2af862021-02-17 15:51:56 +09001# Copyright (C) 2021 The Android Open Source Project
2#
3# init.rc for microdroid. This contains a minimal script plus basic service definitions (e.g. apexd)
4# needed for microdroid to run.
5# TODO(b/179340780): support APEX init scripts
6#
7# IMPORTANT: Do not create world writable files or directories.
8# This is a common source of Android security bugs.
9#
10
11import /init.environ.rc
12
13# Cgroups are mounted right before early-init using list from /etc/cgroups.json
14on early-init
Inseob Kimde6b6892021-05-26 12:06:59 +090015 # set RLIMIT_NICE to allow priorities from 19 to -20
16 setrlimit nice 40 40
17
Jooyung Hanc36b18a2021-04-20 03:33:36 +090018 start ueventd
Inseob Kim870e76b2021-02-25 17:38:32 +090019
Jiyong Parkbb4a9872021-09-06 15:59:21 +090020 mkdir /mnt/apk 0755 system system
Jooyung Hane706c9f2021-07-29 17:21:20 +090021 start microdroid_manager
Jooyung Hand4a7a7a2021-06-17 13:05:36 +090022 # TODO(b/190343842) verify apexes/apk before mounting them.
23
Jooyung Han16186d92021-06-01 17:53:28 +090024 # Exec apexd in the VM mode to avoid unnecessary overhead of normal mode.
25 # (e.g. session management)
26 exec - root system -- /system/bin/apexd --vm
Inseob Kimdc2af862021-02-17 15:51:56 +090027
Jooyung Han16186d92021-06-01 17:53:28 +090028 perform_apex_config
Inseob Kim870e76b2021-02-25 17:38:32 +090029
Jiyong Parkbb4a9872021-09-06 15:59:21 +090030 # Notify to microdroid_manager that perform_apex_config is done.
31 # Microdroid_manager shouldn't execute payload before this, because app
32 # payloads are not designed to run with bootstrap bionic
33 setprop apex_config.done true
Jiyong Park9abfc1f2021-05-17 21:57:24 +090034
Inseob Kimdc2af862021-02-17 15:51:56 +090035on init
36 # Mount binderfs
37 mkdir /dev/binderfs
38 mount binder binder /dev/binderfs stats=global
39 chmod 0755 /dev/binderfs
40
41 symlink /dev/binderfs/binder /dev/binder
42 symlink /dev/binderfs/hwbinder /dev/hwbinder
43 symlink /dev/binderfs/vndbinder /dev/vndbinder
44
45 chmod 0666 /dev/binderfs/hwbinder
46 chmod 0666 /dev/binderfs/binder
47 chmod 0666 /dev/binderfs/vndbinder
48
Jiyong Park858c0402021-07-15 16:19:11 +090049 # Prepare cpusets that are pre-defined by Android. Inside Microdroid, these however don't mean
50 # much because the mapping from vCPUs to physical CPUs are quite flexible; a VM can be started
51 # with any number of vCPUs and we in general can't be sure that vCPU N is a big core or a little
52 # core. These nodes are provided just to satisfy the code which puts a PID to a specific cpuset.
53 mkdir /dev/cpuset/foreground
54 copy /dev/cpuset/cpus /dev/cpuset/foreground/cpus
55 copy /dev/cpuset/mems /dev/cpuset/foreground/mems
56 mkdir /dev/cpuset/background
57 copy /dev/cpuset/cpus /dev/cpuset/background/cpus
58 copy /dev/cpuset/mems /dev/cpuset/background/mems
59 mkdir /dev/cpuset/system-background
60 copy /dev/cpuset/cpus /dev/cpuset/system-background/cpus
61 copy /dev/cpuset/mems /dev/cpuset/system-background/mems
62
63 chown system system /dev/cpuset
64 chown system system /dev/cpuset/foreground
65 chown system system /dev/cpuset/background
66 chown system system /dev/cpuset/system-background
67 chown system system /dev/cpuset/tasks
68 chown system system /dev/cpuset/foreground/tasks
69 chown system system /dev/cpuset/background/tasks
70 chown system system /dev/cpuset/system-background/tasks
71
72 chmod 0664 /dev/cpuset/tasks
73 chmod 0664 /dev/cpuset/foreground/tasks
74 chmod 0664 /dev/cpuset/background/tasks
75 chmod 0664 /dev/cpuset/system-background/tasks
76
Inseob Kimdc2af862021-02-17 15:51:56 +090077 # Start logd before any other services run to ensure we capture all of their logs.
78 start logd
79
80 start servicemanager
81
Inseob Kim8f095c92021-05-26 12:04:54 +090082 # TODO(b/185767624): remove hidl after full keymint support
83 start hwservicemanager
84
Jooyung Han16186d92021-06-01 17:53:28 +090085 start adbd
86
Inseob Kimdc2af862021-02-17 15:51:56 +090087on load_persist_props_action
88 start logd
89 start logd-reinit
90
91# Mount filesystems and start core system services.
92on late-init
93 trigger early-fs
94
95 # Mount fstab in init.{$device}.rc by mount_all command. Optional parameter
96 # '--early' can be specified to skip entries with 'latemount'.
97 # /system and /vendor must be mounted by the end of the fs stage,
98 # while /data is optional.
99 trigger fs
100 trigger post-fs
101
102 # Mount fstab in init.{$device}.rc by mount_all with '--late' parameter
103 # to only mount entries with 'latemount'. This is needed if '--early' is
104 # specified in the previous mount_all command on the fs stage.
105 # With /system mounted and properties form /system + /factory available,
106 # some services can be started.
107 trigger late-fs
108
Inseob Kimafd9dc02021-04-23 14:47:44 +0900109 trigger post-fs-data
110
Inseob Kimdc2af862021-02-17 15:51:56 +0900111 # Load persist properties and override properties (if enabled) from /data.
112 trigger load_persist_props_action
113
Inseob Kimdc2af862021-02-17 15:51:56 +0900114 trigger early-boot
115 trigger boot
116
117on post-fs
118 # Once everything is setup, no need to modify /.
119 # The bind+remount combination allows this to work in containers.
120 mount rootfs rootfs / remount bind ro nodev
121
Inseob Kim17d0db12021-06-09 14:30:47 +0900122 # TODO(b/185767624): change the hard-coded size?
123 mount tmpfs tmpfs /data noatime nosuid nodev rw size=128M
Inseob Kim67ab4362021-05-11 16:51:03 +0900124
Inseob Kim67ab4362021-05-11 16:51:03 +0900125 # We chown/chmod /data again so because mount is run as root + defaults
126 chown system system /data
127 chmod 0771 /data
128
129 # We restorecon /data in case the userdata partition has been reset.
Inseob Kimafd9dc02021-04-23 14:47:44 +0900130 restorecon /data
131
Inseob Kima920f9e2021-08-04 03:33:43 +0000132 # set up keystore directory structure first so that we can end early boot
133 # and start apexd
134 mkdir /data/misc 01771 system misc
135 mkdir /data/misc/keystore 0700 keystore keystore
136 # work around b/183668221
137 restorecon /data/misc /data/misc/keystore
138
139 start keystore2
140
Victor Hsieh8bb67b62021-08-04 12:10:58 -0700141 mkdir /data/misc/authfs 0700 root root
142 start authfs_service
143
Inseob Kima920f9e2021-08-04 03:33:43 +0000144on late-fs
145 start vendor.keymint-microdroid
146
147on post-fs-data
148 mark_post_data
149
Inseob Kim17d0db12021-06-09 14:30:47 +0900150 mkdir /data/vendor 0771 root root
151 mkdir /data/vendor_ce 0771 root root
152 mkdir /data/vendor_de 0771 root root
Inseob Kimcd13c692021-04-23 15:56:33 +0900153 mkdir /data/vendor/hardware 0771 root root
154
155 # Start tombstoned early to be able to store tombstones.
Inseob Kim7f8ac322021-04-29 22:41:37 +0900156 # microdroid doesn't have anr, but tombstoned requires it
Inseob Kim17d0db12021-06-09 14:30:47 +0900157 mkdir /data/anr 0775 system system
158 mkdir /data/tombstones 0771 system system
Inseob Kimcd13c692021-04-23 15:56:33 +0900159 mkdir /data/vendor/tombstones 0771 root root
Inseob Kimcd13c692021-04-23 15:56:33 +0900160
161 start tombstoned
162
Inseob Kimde6b6892021-05-26 12:06:59 +0900163 # Boot level 30
164 # odsign signing keys have MAX_BOOT_LEVEL=30
165 # This is currently the earliest boot level, but we start at 30
166 # to leave room for earlier levels.
167 setprop keystore.boot_level 30
168
Inseob Kim87ba1f12021-04-27 14:56:05 +0900169 # For security reasons, /data/local/tmp should always be empty.
170 # Do not place files or directories in /data/local/tmp
Inseob Kim17d0db12021-06-09 14:30:47 +0900171 mkdir /data/local 0751 root root
Inseob Kim87ba1f12021-04-27 14:56:05 +0900172 mkdir /data/local/tmp 0771 shell shell
173
Inseob Kimdc2af862021-02-17 15:51:56 +0900174service ueventd /system/bin/ueventd
175 class core
176 critical
177 seclabel u:r:ueventd:s0
178 shutdown critical
179
180service console /system/bin/sh
181 class core
182 console
183 disabled
184 user shell
185 group shell log readproc
186 seclabel u:r:shell:s0
187 setenv HOSTNAME console
188
Inseob Kimdc2af862021-02-17 15:51:56 +0900189on fs
190 write /dev/event-log-tags "# content owned by logd
191"
192 chown logd logd /dev/event-log-tags
193 chmod 0644 /dev/event-log-tags
194
195on property:sys.boot_completed=1
196 start logd-auditctl