| Nick Kralevich | f3ef127 | 2012-03-14 15:22:54 -0700 | [diff] [blame] | 1 | # Copyright (C) 2012 The Android Open Source Project | 
|  | 2 | # | 
|  | 3 | # IMPORTANT: Do not create world writable files or directories. | 
|  | 4 | # This is a common source of Android security bugs. | 
|  | 5 | # | 
|  | 6 |  | 
| Ying Wang | 5748ee9 | 2013-07-23 18:03:37 -0700 | [diff] [blame] | 7 | import /init.environ.rc | 
| Tom Cherry | c9f5353 | 2019-11-04 10:30:36 -0800 | [diff] [blame] | 8 | import /system/etc/init/hw/init.usb.rc | 
| Mike Lockwood | 35ea5e4 | 2012-08-28 10:25:13 -0700 | [diff] [blame] | 9 | import /init.${ro.hardware}.rc | 
| Yueyao Zhu | f7c34ad | 2017-05-18 12:46:34 -0700 | [diff] [blame] | 10 | import /vendor/etc/init/hw/init.${ro.hardware}.rc | 
| Tom Cherry | c9f5353 | 2019-11-04 10:30:36 -0800 | [diff] [blame] | 11 | import /system/etc/init/hw/init.usb.configfs.rc | 
|  | 12 | import /system/etc/init/hw/init.${ro.zygote}.rc | 
| Dima Zavin | 7634bf8 | 2011-12-16 14:23:22 -0800 | [diff] [blame] | 13 |  | 
| Suren Baghdasaryan | 192aee7 | 2018-12-21 11:41:50 -0800 | [diff] [blame] | 14 | # Cgroups are mounted right before early-init using list from /etc/cgroups.json | 
| Colin Cross | f83d0b9 | 2010-04-21 12:04:20 -0700 | [diff] [blame] | 15 | on early-init | 
| Nick Kralevich | d28a535 | 2015-10-09 17:09:10 -0700 | [diff] [blame] | 16 | # Disable sysrq from keyboard | 
|  | 17 | write /proc/sys/kernel/sysrq 0 | 
|  | 18 |  | 
| Eric Biggers | 843f46e | 2020-03-11 09:56:15 -0700 | [diff] [blame] | 19 | # Android doesn't need kernel module autoloading, and it causes SELinux | 
|  | 20 | # denials.  So disable it by setting modprobe to the empty string.  Note: to | 
|  | 21 | # explicitly set a sysctl to an empty string, a trailing newline is needed. | 
|  | 22 | write /proc/sys/kernel/modprobe \n | 
|  | 23 |  | 
| Stephen Smalley | deb41e5 | 2013-10-01 09:21:47 -0400 | [diff] [blame] | 24 | # Set the security context of /adb_keys if present. | 
|  | 25 | restorecon /adb_keys | 
|  | 26 |  | 
| Alex Deymo | bb968fb | 2016-02-29 17:23:36 -0800 | [diff] [blame] | 27 | # Set the security context of /postinstall if present. | 
|  | 28 | restorecon /postinstall | 
|  | 29 |  | 
| Robert Benea | c638569 | 2017-05-31 16:07:53 -0700 | [diff] [blame] | 30 | mkdir /acct/uid | 
|  | 31 |  | 
| Mark Salyzyn | 64d97d8 | 2018-04-09 09:50:32 -0700 | [diff] [blame] | 32 | # memory.pressure_level used by lmkd | 
|  | 33 | chown root system /dev/memcg/memory.pressure_level | 
|  | 34 | chmod 0040 /dev/memcg/memory.pressure_level | 
| Robert Benea | c638569 | 2017-05-31 16:07:53 -0700 | [diff] [blame] | 35 | # app mem cgroups, used by activity manager, lmkd and zygote | 
|  | 36 | mkdir /dev/memcg/apps/ 0755 system system | 
| Robert Benea | 3280e48 | 2017-06-27 23:09:03 -0700 | [diff] [blame] | 37 | # cgroup for system_server and surfaceflinger | 
|  | 38 | mkdir /dev/memcg/system 0550 system system | 
| Robert Benea | c638569 | 2017-05-31 16:07:53 -0700 | [diff] [blame] | 39 |  | 
| Maciej Żenczykowski | 00a21e3 | 2020-01-25 00:34:33 -0800 | [diff] [blame] | 40 | # symlink the Android specific /dev/tun to Linux expected /dev/net/tun | 
|  | 41 | mkdir /dev/net 0755 root root | 
|  | 42 | symlink ../tun /dev/net/tun | 
|  | 43 |  | 
| Tom Cherry | fdeca99 | 2019-06-06 11:05:52 -0700 | [diff] [blame] | 44 | # set RLIMIT_NICE to allow priorities from 19 to -20 | 
|  | 45 | setrlimit nice 40 40 | 
|  | 46 |  | 
|  | 47 | # Allow up to 32K FDs per process | 
|  | 48 | setrlimit nofile 32768 32768 | 
|  | 49 |  | 
| Carlos Galo | 1447120 | 2022-12-07 23:39:05 +0000 | [diff] [blame] | 50 | # set RLIMIT_MEMLOCK to 64KB | 
|  | 51 | setrlimit memlock 65536 65536 | 
|  | 52 |  | 
| Kiyoung Kim | e4d3f21 | 2019-12-16 14:31:04 +0900 | [diff] [blame] | 53 | # Set up linker config subdirectories based on mount namespaces | 
|  | 54 | mkdir /linkerconfig/bootstrap 0755 | 
|  | 55 | mkdir /linkerconfig/default 0755 | 
|  | 56 |  | 
| Martijn Coenen | 9226bb3 | 2019-12-16 09:59:08 +0100 | [diff] [blame] | 57 | # Disable dm-verity hash prefetching, since it doesn't help performance | 
|  | 58 | # Read more in b/136247322 | 
|  | 59 | write /sys/module/dm_verity/parameters/prefetch_cluster 0 | 
|  | 60 |  | 
| Jooyung Han | 56bee1f | 2022-12-13 18:04:52 +0900 | [diff] [blame] | 61 | # Generate empty ld.config.txt for early executed processes which rely on | 
|  | 62 | # /system/lib libraries. | 
|  | 63 | write /linkerconfig/bootstrap/ld.config.txt \# | 
|  | 64 | write /linkerconfig/default/ld.config.txt \# | 
| Kiyoung Kim | e4d3f21 | 2019-12-16 14:31:04 +0900 | [diff] [blame] | 65 | chmod 644 /linkerconfig/bootstrap/ld.config.txt | 
| Kiyoung Kim | e4d3f21 | 2019-12-16 14:31:04 +0900 | [diff] [blame] | 66 | chmod 644 /linkerconfig/default/ld.config.txt | 
|  | 67 |  | 
|  | 68 | # Mount bootstrap linker configuration as current | 
|  | 69 | mount none /linkerconfig/bootstrap /linkerconfig bind rec | 
| Kiyoung Kim | 74c2292 | 2019-07-08 18:59:50 +0900 | [diff] [blame] | 70 |  | 
| Colin Cross | f83d0b9 | 2010-04-21 12:04:20 -0700 | [diff] [blame] | 71 | start ueventd | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 72 |  | 
| Jiyong Park | dcbaf9f | 2019-02-22 22:15:25 +0900 | [diff] [blame] | 73 | # Run apexd-bootstrap so that APEXes that provide critical libraries | 
|  | 74 | # become available. Note that this is executed as exec_start to ensure that | 
|  | 75 | # the libraries are available to the processes started after this statement. | 
|  | 76 | exec_start apexd-bootstrap | 
|  | 77 |  | 
| Kiyoung Kim | e4d3f21 | 2019-12-16 14:31:04 +0900 | [diff] [blame] | 78 | # Generate linker config based on apex mounted in bootstrap namespace | 
|  | 79 | update_linker_config | 
|  | 80 |  | 
| Tobias Thierer | bda0554 | 2019-09-11 18:22:10 +0100 | [diff] [blame] | 81 | # These must already exist by the time boringssl_self_test32 / boringssl_self_test64 run. | 
|  | 82 | mkdir /dev/boringssl 0755 root root | 
|  | 83 | mkdir /dev/boringssl/selftest 0755 root root | 
|  | 84 |  | 
| Kalesh Singh | ccf343f | 2021-12-06 16:13:06 -0800 | [diff] [blame] | 85 | # Mount tracefs (with GID=AID_READTRACEFS) | 
|  | 86 | mount tracefs tracefs /sys/kernel/tracing gid=3012 | 
| Kyle Lin | 9d19a05 | 2020-04-23 23:19:25 +0800 | [diff] [blame] | 87 |  | 
| Jaegeuk Kim | 43dca3c | 2020-07-20 17:34:47 -0700 | [diff] [blame] | 88 | # create sys dirctory | 
|  | 89 | mkdir /dev/sys 0755 system system | 
|  | 90 | mkdir /dev/sys/fs 0755 system system | 
|  | 91 | mkdir /dev/sys/block 0755 system system | 
|  | 92 |  | 
| Jaegeuk Kim | 3aca50c | 2022-04-29 11:31:38 -0700 | [diff] [blame] | 93 | # Create location for fs_mgr to store abbreviated output from filesystem | 
|  | 94 | # checker programs. | 
|  | 95 | mkdir /dev/fscklogs 0770 root system | 
|  | 96 |  | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 97 | on init | 
| Riley Andrews | 6dfdc7c | 2014-06-18 20:35:40 -0700 | [diff] [blame] | 98 | sysclktz 0 | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 99 |  | 
| Nick Kralevich | 27cb410 | 2016-01-22 18:02:29 -0800 | [diff] [blame] | 100 | # Mix device-specific information into the entropy pool | 
|  | 101 | copy /proc/cmdline /dev/urandom | 
| Wei Wang | 0d78bfb | 2019-01-25 09:31:28 -0800 | [diff] [blame] | 102 | copy /system/etc/prop.default /dev/urandom | 
| Nick Kralevich | 27cb410 | 2016-01-22 18:02:29 -0800 | [diff] [blame] | 103 |  | 
| Elliott Hughes | 5a0a51b | 2018-08-22 13:21:21 -0700 | [diff] [blame] | 104 | symlink /proc/self/fd/0 /dev/stdin | 
|  | 105 | symlink /proc/self/fd/1 /dev/stdout | 
|  | 106 | symlink /proc/self/fd/2 /dev/stderr | 
|  | 107 |  | 
| Todd Kjos | ba8a475 | 2015-10-26 16:22:11 -0700 | [diff] [blame] | 108 | # Create energy-aware scheduler tuning nodes | 
| Todd Kjos | 11cde56 | 2016-02-23 09:00:36 -0800 | [diff] [blame] | 109 | mkdir /dev/stune/foreground | 
| Tim Murray | 5dcff8f | 2016-07-11 13:57:31 -0700 | [diff] [blame] | 110 | mkdir /dev/stune/background | 
| Tim Murray | 955694b | 2016-07-11 11:40:15 -0700 | [diff] [blame] | 111 | mkdir /dev/stune/top-app | 
| Joel Fernandes | f50d109 | 2016-12-19 11:01:55 -0800 | [diff] [blame] | 112 | mkdir /dev/stune/rt | 
| Todd Kjos | 11cde56 | 2016-02-23 09:00:36 -0800 | [diff] [blame] | 113 | chown system system /dev/stune | 
|  | 114 | chown system system /dev/stune/foreground | 
| Tim Murray | 5dcff8f | 2016-07-11 13:57:31 -0700 | [diff] [blame] | 115 | chown system system /dev/stune/background | 
| Tim Murray | 955694b | 2016-07-11 11:40:15 -0700 | [diff] [blame] | 116 | chown system system /dev/stune/top-app | 
| Joel Fernandes | f50d109 | 2016-12-19 11:01:55 -0800 | [diff] [blame] | 117 | chown system system /dev/stune/rt | 
| Todd Kjos | 11cde56 | 2016-02-23 09:00:36 -0800 | [diff] [blame] | 118 | chown system system /dev/stune/tasks | 
|  | 119 | chown system system /dev/stune/foreground/tasks | 
| Tim Murray | 5dcff8f | 2016-07-11 13:57:31 -0700 | [diff] [blame] | 120 | chown system system /dev/stune/background/tasks | 
| Tim Murray | 955694b | 2016-07-11 11:40:15 -0700 | [diff] [blame] | 121 | chown system system /dev/stune/top-app/tasks | 
| Joel Fernandes | f50d109 | 2016-12-19 11:01:55 -0800 | [diff] [blame] | 122 | chown system system /dev/stune/rt/tasks | 
| Suren Baghdasaryan | 2e7799a | 2022-01-20 17:55:27 -0800 | [diff] [blame] | 123 | chown system system /dev/stune/cgroup.procs | 
|  | 124 | chown system system /dev/stune/foreground/cgroup.procs | 
|  | 125 | chown system system /dev/stune/background/cgroup.procs | 
|  | 126 | chown system system /dev/stune/top-app/cgroup.procs | 
|  | 127 | chown system system /dev/stune/rt/cgroup.procs | 
| Todd Kjos | 11cde56 | 2016-02-23 09:00:36 -0800 | [diff] [blame] | 128 | chmod 0664 /dev/stune/tasks | 
|  | 129 | chmod 0664 /dev/stune/foreground/tasks | 
| Tim Murray | 5dcff8f | 2016-07-11 13:57:31 -0700 | [diff] [blame] | 130 | chmod 0664 /dev/stune/background/tasks | 
| Tim Murray | 955694b | 2016-07-11 11:40:15 -0700 | [diff] [blame] | 131 | chmod 0664 /dev/stune/top-app/tasks | 
| Joel Fernandes | f50d109 | 2016-12-19 11:01:55 -0800 | [diff] [blame] | 132 | chmod 0664 /dev/stune/rt/tasks | 
| Suren Baghdasaryan | 2e7799a | 2022-01-20 17:55:27 -0800 | [diff] [blame] | 133 | chmod 0664 /dev/stune/cgroup.procs | 
|  | 134 | chmod 0664 /dev/stune/foreground/cgroup.procs | 
|  | 135 | chmod 0664 /dev/stune/background/cgroup.procs | 
|  | 136 | chmod 0664 /dev/stune/top-app/cgroup.procs | 
|  | 137 | chmod 0664 /dev/stune/rt/cgroup.procs | 
| Todd Kjos | ba8a475 | 2015-10-26 16:22:11 -0700 | [diff] [blame] | 138 |  | 
| Suren Baghdasaryan | c6baa19 | 2020-10-13 10:41:00 -0700 | [diff] [blame] | 139 | # cpuctl hierarchy for devices using utilclamp | 
|  | 140 | mkdir /dev/cpuctl/foreground | 
|  | 141 | mkdir /dev/cpuctl/background | 
|  | 142 | mkdir /dev/cpuctl/top-app | 
|  | 143 | mkdir /dev/cpuctl/rt | 
| Wei Wang | 77cb6a0 | 2020-11-18 16:04:08 -0800 | [diff] [blame] | 144 | mkdir /dev/cpuctl/system | 
| Wei Wang | ab87979 | 2020-11-24 00:26:40 -0800 | [diff] [blame] | 145 | mkdir /dev/cpuctl/system-background | 
| Rick Yiu | 014446d | 2021-10-20 22:52:43 +0800 | [diff] [blame] | 146 | mkdir /dev/cpuctl/dex2oat | 
| Suren Baghdasaryan | c6baa19 | 2020-10-13 10:41:00 -0700 | [diff] [blame] | 147 | chown system system /dev/cpuctl | 
|  | 148 | chown system system /dev/cpuctl/foreground | 
|  | 149 | chown system system /dev/cpuctl/background | 
|  | 150 | chown system system /dev/cpuctl/top-app | 
|  | 151 | chown system system /dev/cpuctl/rt | 
| Wei Wang | 77cb6a0 | 2020-11-18 16:04:08 -0800 | [diff] [blame] | 152 | chown system system /dev/cpuctl/system | 
| Wei Wang | ab87979 | 2020-11-24 00:26:40 -0800 | [diff] [blame] | 153 | chown system system /dev/cpuctl/system-background | 
| Rick Yiu | 014446d | 2021-10-20 22:52:43 +0800 | [diff] [blame] | 154 | chown system system /dev/cpuctl/dex2oat | 
| Suren Baghdasaryan | c6baa19 | 2020-10-13 10:41:00 -0700 | [diff] [blame] | 155 | chown system system /dev/cpuctl/tasks | 
|  | 156 | chown system system /dev/cpuctl/foreground/tasks | 
|  | 157 | chown system system /dev/cpuctl/background/tasks | 
|  | 158 | chown system system /dev/cpuctl/top-app/tasks | 
|  | 159 | chown system system /dev/cpuctl/rt/tasks | 
| Wei Wang | 77cb6a0 | 2020-11-18 16:04:08 -0800 | [diff] [blame] | 160 | chown system system /dev/cpuctl/system/tasks | 
| Wei Wang | ab87979 | 2020-11-24 00:26:40 -0800 | [diff] [blame] | 161 | chown system system /dev/cpuctl/system-background/tasks | 
| Rick Yiu | 014446d | 2021-10-20 22:52:43 +0800 | [diff] [blame] | 162 | chown system system /dev/cpuctl/dex2oat/tasks | 
| Suren Baghdasaryan | 2e7799a | 2022-01-20 17:55:27 -0800 | [diff] [blame] | 163 | chown system system /dev/cpuctl/cgroup.procs | 
|  | 164 | chown system system /dev/cpuctl/foreground/cgroup.procs | 
|  | 165 | chown system system /dev/cpuctl/background/cgroup.procs | 
|  | 166 | chown system system /dev/cpuctl/top-app/cgroup.procs | 
|  | 167 | chown system system /dev/cpuctl/rt/cgroup.procs | 
|  | 168 | chown system system /dev/cpuctl/system/cgroup.procs | 
|  | 169 | chown system system /dev/cpuctl/system-background/cgroup.procs | 
|  | 170 | chown system system /dev/cpuctl/dex2oat/cgroup.procs | 
| Suren Baghdasaryan | c6baa19 | 2020-10-13 10:41:00 -0700 | [diff] [blame] | 171 | chmod 0664 /dev/cpuctl/tasks | 
|  | 172 | chmod 0664 /dev/cpuctl/foreground/tasks | 
|  | 173 | chmod 0664 /dev/cpuctl/background/tasks | 
|  | 174 | chmod 0664 /dev/cpuctl/top-app/tasks | 
|  | 175 | chmod 0664 /dev/cpuctl/rt/tasks | 
| Wei Wang | 77cb6a0 | 2020-11-18 16:04:08 -0800 | [diff] [blame] | 176 | chmod 0664 /dev/cpuctl/system/tasks | 
| Wei Wang | ab87979 | 2020-11-24 00:26:40 -0800 | [diff] [blame] | 177 | chmod 0664 /dev/cpuctl/system-background/tasks | 
| Rick Yiu | 014446d | 2021-10-20 22:52:43 +0800 | [diff] [blame] | 178 | chmod 0664 /dev/cpuctl/dex2oat/tasks | 
| Suren Baghdasaryan | 2e7799a | 2022-01-20 17:55:27 -0800 | [diff] [blame] | 179 | chmod 0664 /dev/cpuctl/cgroup.procs | 
|  | 180 | chmod 0664 /dev/cpuctl/foreground/cgroup.procs | 
|  | 181 | chmod 0664 /dev/cpuctl/background/cgroup.procs | 
|  | 182 | chmod 0664 /dev/cpuctl/top-app/cgroup.procs | 
|  | 183 | chmod 0664 /dev/cpuctl/rt/cgroup.procs | 
|  | 184 | chmod 0664 /dev/cpuctl/system/cgroup.procs | 
|  | 185 | chmod 0664 /dev/cpuctl/system-background/cgroup.procs | 
|  | 186 | chmod 0664 /dev/cpuctl/dex2oat/cgroup.procs | 
| Wei Wang | 77cb6a0 | 2020-11-18 16:04:08 -0800 | [diff] [blame] | 187 |  | 
|  | 188 | # Create a cpu group for NNAPI HAL processes | 
|  | 189 | mkdir /dev/cpuctl/nnapi-hal | 
|  | 190 | chown system system /dev/cpuctl/nnapi-hal | 
|  | 191 | chown system system /dev/cpuctl/nnapi-hal/tasks | 
| Suren Baghdasaryan | 2e7799a | 2022-01-20 17:55:27 -0800 | [diff] [blame] | 192 | chown system system /dev/cpuctl/nnapi-hal/cgroup.procs | 
| Wei Wang | 77cb6a0 | 2020-11-18 16:04:08 -0800 | [diff] [blame] | 193 | chmod 0664 /dev/cpuctl/nnapi-hal/tasks | 
| Suren Baghdasaryan | 2e7799a | 2022-01-20 17:55:27 -0800 | [diff] [blame] | 194 | chmod 0664 /dev/cpuctl/nnapi-hal/cgroup.procs | 
| Wei Wang | 77cb6a0 | 2020-11-18 16:04:08 -0800 | [diff] [blame] | 195 | write /dev/cpuctl/nnapi-hal/cpu.uclamp.min 1 | 
|  | 196 | write /dev/cpuctl/nnapi-hal/cpu.uclamp.latency_sensitive 1 | 
|  | 197 |  | 
| Rick Yiu | a983f8a | 2020-12-01 15:45:01 +0800 | [diff] [blame] | 198 | # Create a cpu group for camera daemon processes | 
|  | 199 | mkdir /dev/cpuctl/camera-daemon | 
|  | 200 | chown system system /dev/cpuctl/camera-daemon | 
|  | 201 | chown system system /dev/cpuctl/camera-daemon/tasks | 
| Suren Baghdasaryan | 2e7799a | 2022-01-20 17:55:27 -0800 | [diff] [blame] | 202 | chown system system /dev/cpuctl/camera-daemon/cgroup.procs | 
| Rick Yiu | a983f8a | 2020-12-01 15:45:01 +0800 | [diff] [blame] | 203 | chmod 0664 /dev/cpuctl/camera-daemon/tasks | 
| Suren Baghdasaryan | 2e7799a | 2022-01-20 17:55:27 -0800 | [diff] [blame] | 204 | chmod 0664 /dev/cpuctl/camera-daemon/cgroup.procs | 
| Rick Yiu | a983f8a | 2020-12-01 15:45:01 +0800 | [diff] [blame] | 205 |  | 
| Wei Wang | 6a28572 | 2020-11-30 10:56:29 -0800 | [diff] [blame] | 206 | # Create an stune group for camera-specific processes | 
|  | 207 | mkdir /dev/stune/camera-daemon | 
|  | 208 | chown system system /dev/stune/camera-daemon | 
|  | 209 | chown system system /dev/stune/camera-daemon/tasks | 
| Suren Baghdasaryan | 2e7799a | 2022-01-20 17:55:27 -0800 | [diff] [blame] | 210 | chown system system /dev/stune/camera-daemon/cgroup.procs | 
| Wei Wang | 6a28572 | 2020-11-30 10:56:29 -0800 | [diff] [blame] | 211 | chmod 0664 /dev/stune/camera-daemon/tasks | 
| Suren Baghdasaryan | 2e7799a | 2022-01-20 17:55:27 -0800 | [diff] [blame] | 212 | chmod 0664 /dev/stune/camera-daemon/cgroup.procs | 
| Wei Wang | 6a28572 | 2020-11-30 10:56:29 -0800 | [diff] [blame] | 213 |  | 
| Miao Wang | c3991a7 | 2020-02-07 15:01:24 -0800 | [diff] [blame] | 214 | # Create an stune group for NNAPI HAL processes | 
|  | 215 | mkdir /dev/stune/nnapi-hal | 
|  | 216 | chown system system /dev/stune/nnapi-hal | 
|  | 217 | chown system system /dev/stune/nnapi-hal/tasks | 
| Suren Baghdasaryan | 2e7799a | 2022-01-20 17:55:27 -0800 | [diff] [blame] | 218 | chown system system /dev/stune/nnapi-hal/cgroup.procs | 
| Miao Wang | c3991a7 | 2020-02-07 15:01:24 -0800 | [diff] [blame] | 219 | chmod 0664 /dev/stune/nnapi-hal/tasks | 
| Suren Baghdasaryan | 2e7799a | 2022-01-20 17:55:27 -0800 | [diff] [blame] | 220 | chmod 0664 /dev/stune/nnapi-hal/cgroup.procs | 
| Miao Wang | c3991a7 | 2020-02-07 15:01:24 -0800 | [diff] [blame] | 221 | write /dev/stune/nnapi-hal/schedtune.boost 1 | 
|  | 222 | write /dev/stune/nnapi-hal/schedtune.prefer_idle 1 | 
|  | 223 |  | 
| Jeff Sharkey | fc00048 | 2015-03-16 10:17:47 -0700 | [diff] [blame] | 224 | restorecon_recursive /mnt | 
| Jeff Sharkey | 5dd0f86 | 2012-08-17 16:01:16 -0700 | [diff] [blame] | 225 |  | 
| Luis Hector Chavez | 8774945 | 2018-02-14 08:35:01 -0800 | [diff] [blame] | 226 | mount configfs none /config nodev noexec nosuid | 
| Daniel Rosenberg | 7903523 | 2017-11-29 14:49:08 -0800 | [diff] [blame] | 227 | chmod 0770 /config/sdcardfs | 
| Daniel Rosenberg | 4edec25 | 2016-02-18 19:48:31 -0800 | [diff] [blame] | 228 | chown system package_info /config/sdcardfs | 
|  | 229 |  | 
| Hridya Valsaraju | b237d76 | 2020-02-03 12:33:57 -0800 | [diff] [blame] | 230 | # Mount binderfs | 
|  | 231 | mkdir /dev/binderfs | 
|  | 232 | mount binder binder /dev/binderfs stats=global | 
|  | 233 | chmod 0755 /dev/binderfs | 
|  | 234 |  | 
| Martijn Coenen | 959dcf1 | 2020-04-28 22:27:10 +0200 | [diff] [blame] | 235 | # Mount fusectl | 
|  | 236 | mount fusectl none /sys/fs/fuse/connections | 
|  | 237 |  | 
| Hridya Valsaraju | b237d76 | 2020-02-03 12:33:57 -0800 | [diff] [blame] | 238 | symlink /dev/binderfs/binder /dev/binder | 
|  | 239 | symlink /dev/binderfs/hwbinder /dev/hwbinder | 
|  | 240 | symlink /dev/binderfs/vndbinder /dev/vndbinder | 
|  | 241 |  | 
|  | 242 | chmod 0666 /dev/binderfs/hwbinder | 
|  | 243 | chmod 0666 /dev/binderfs/binder | 
|  | 244 | chmod 0666 /dev/binderfs/vndbinder | 
|  | 245 |  | 
| San Mehat | 6ea3cc6 | 2010-02-19 18:25:22 -0800 | [diff] [blame] | 246 | mkdir /mnt/secure 0700 root root | 
| Jeff Sharkey | fc00048 | 2015-03-16 10:17:47 -0700 | [diff] [blame] | 247 | mkdir /mnt/secure/asec 0700 root root | 
|  | 248 | mkdir /mnt/asec 0755 root system | 
|  | 249 | mkdir /mnt/obb 0755 root system | 
| Zim | c1b53de | 2020-01-24 22:13:58 +0000 | [diff] [blame] | 250 | mkdir /mnt/media_rw 0750 root external_storage | 
| Jeff Sharkey | fc00048 | 2015-03-16 10:17:47 -0700 | [diff] [blame] | 251 | mkdir /mnt/user 0755 root root | 
|  | 252 | mkdir /mnt/user/0 0755 root root | 
| Zim | c9f8e5d | 2019-08-09 20:02:49 +0100 | [diff] [blame] | 253 | mkdir /mnt/user/0/self 0755 root root | 
|  | 254 | mkdir /mnt/user/0/emulated 0755 root root | 
|  | 255 | mkdir /mnt/user/0/emulated/0 0755 root root | 
| Zim | fc64dad | 2019-09-23 14:21:27 +0100 | [diff] [blame] | 256 |  | 
|  | 257 | # Prepare directories for pass through processes | 
| Zim | 6ca090e | 2020-01-20 14:16:14 +0000 | [diff] [blame] | 258 | mkdir /mnt/pass_through 0700 root root | 
| Zim | a67b40b | 2020-01-31 16:26:13 +0000 | [diff] [blame] | 259 | mkdir /mnt/pass_through/0 0710 root media_rw | 
|  | 260 | mkdir /mnt/pass_through/0/self 0710 root media_rw | 
|  | 261 | mkdir /mnt/pass_through/0/emulated 0710 root media_rw | 
|  | 262 | mkdir /mnt/pass_through/0/emulated/0 0710 root media_rw | 
| Zim | fc64dad | 2019-09-23 14:21:27 +0100 | [diff] [blame] | 263 |  | 
| Jeff Sharkey | ae0a5ac | 2015-04-06 14:08:54 -0700 | [diff] [blame] | 264 | mkdir /mnt/expand 0771 system system | 
| Daichi Hirono | 7abc71e | 2015-12-11 13:29:04 +0900 | [diff] [blame] | 265 | mkdir /mnt/appfuse 0711 root root | 
| San Mehat | 6ea3cc6 | 2010-02-19 18:25:22 -0800 | [diff] [blame] | 266 |  | 
| Jeff Sharkey | f38f29c | 2015-06-23 14:30:37 -0700 | [diff] [blame] | 267 | # Storage views to support runtime permissions | 
| Jeff Sharkey | b9f438f | 2015-08-06 11:39:44 -0700 | [diff] [blame] | 268 | mkdir /mnt/runtime 0700 root root | 
|  | 269 | mkdir /mnt/runtime/default 0755 root root | 
|  | 270 | mkdir /mnt/runtime/default/self 0755 root root | 
|  | 271 | mkdir /mnt/runtime/read 0755 root root | 
|  | 272 | mkdir /mnt/runtime/read/self 0755 root root | 
|  | 273 | mkdir /mnt/runtime/write 0755 root root | 
|  | 274 | mkdir /mnt/runtime/write/self 0755 root root | 
| Sudheer Shanka | 81c687d | 2019-01-16 23:25:28 -0800 | [diff] [blame] | 275 | mkdir /mnt/runtime/full 0755 root root | 
|  | 276 | mkdir /mnt/runtime/full/self 0755 root root | 
| San Mehat | 6ea3cc6 | 2010-02-19 18:25:22 -0800 | [diff] [blame] | 277 |  | 
| Jeff Sharkey | fc00048 | 2015-03-16 10:17:47 -0700 | [diff] [blame] | 278 | # Symlink to keep legacy apps working in multi-user world | 
| Nick Kralevich | d2f0a2c | 2016-04-12 20:36:01 -0700 | [diff] [blame] | 279 | symlink /storage/self/primary /mnt/sdcard | 
| Jeff Sharkey | b9f438f | 2015-08-06 11:39:44 -0700 | [diff] [blame] | 280 | symlink /mnt/user/0/primary /mnt/runtime/default/self/primary | 
| Kenny Root | c7858a3 | 2010-07-15 12:14:44 -0700 | [diff] [blame] | 281 |  | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 282 | write /proc/sys/kernel/panic_on_oops 1 | 
|  | 283 | write /proc/sys/kernel/hung_task_timeout_secs 0 | 
|  | 284 | write /proc/cpu/alignment 4 | 
| Riley Andrews | e850f57 | 2015-07-20 16:01:48 -0700 | [diff] [blame] | 285 |  | 
|  | 286 | # scheduler tunables | 
|  | 287 | # Disable auto-scaling of scheduler tunables with hotplug. The tunables | 
|  | 288 | # will vary across devices in unpredictable ways if allowed to scale with | 
|  | 289 | # cpu cores. | 
|  | 290 | write /proc/sys/kernel/sched_tunable_scaling 0 | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 291 | write /proc/sys/kernel/sched_latency_ns 10000000 | 
|  | 292 | write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000 | 
| San Mehat | 7baff71 | 2009-09-16 13:32:23 -0700 | [diff] [blame] | 293 | write /proc/sys/kernel/sched_child_runs_first 0 | 
| Riley Andrews | e850f57 | 2015-07-20 16:01:48 -0700 | [diff] [blame] | 294 |  | 
| Nick Kralevich | d707fb3 | 2011-10-06 11:47:11 -0700 | [diff] [blame] | 295 | write /proc/sys/kernel/randomize_va_space 2 | 
| Nick Kralevich | 27cca21 | 2011-12-05 14:48:08 -0800 | [diff] [blame] | 296 | write /proc/sys/vm/mmap_min_addr 32768 | 
| Nick Kralevich | be341cc | 2013-02-21 18:36:43 -0800 | [diff] [blame] | 297 | write /proc/sys/net/ipv4/ping_group_range "0 2147483647" | 
| Mark Salyzyn | 39944c8 | 2015-09-08 11:24:07 -0700 | [diff] [blame] | 298 | write /proc/sys/net/unix/max_dgram_qlen 600 | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 299 |  | 
| Sandeep Patil | 5fee496 | 2016-12-07 10:55:45 -0800 | [diff] [blame] | 300 | # Assign reasonable ceiling values for socket rcv/snd buffers. | 
|  | 301 | # These should almost always be overridden by the target per the | 
|  | 302 | # the corresponding technology maximums. | 
|  | 303 | write /proc/sys/net/core/rmem_max  262144 | 
|  | 304 | write /proc/sys/net/core/wmem_max  262144 | 
|  | 305 |  | 
| Sreeram Ramachandran | fd94922 | 2014-04-09 17:44:56 -0700 | [diff] [blame] | 306 | # reflect fwmark from incoming packets onto generated replies | 
|  | 307 | write /proc/sys/net/ipv4/fwmark_reflect 1 | 
|  | 308 | write /proc/sys/net/ipv6/fwmark_reflect 1 | 
|  | 309 |  | 
|  | 310 | # set fwmark on accepted sockets | 
|  | 311 | write /proc/sys/net/ipv4/tcp_fwmark_accept 1 | 
|  | 312 |  | 
| Greg Hackmann | f3fd122 | 2014-12-03 09:57:00 -0800 | [diff] [blame] | 313 | # disable icmp redirects | 
|  | 314 | write /proc/sys/net/ipv4/conf/all/accept_redirects 0 | 
|  | 315 | write /proc/sys/net/ipv6/conf/all/accept_redirects 0 | 
|  | 316 |  | 
| Nick Kralevich | 15ffc53 | 2017-08-25 12:55:52 -0700 | [diff] [blame] | 317 | # /proc/net/fib_trie leaks interface IP addresses | 
|  | 318 | chmod 0400 /proc/net/fib_trie | 
|  | 319 |  | 
| Tim Murray | b769c8d | 2015-06-08 14:56:29 -0700 | [diff] [blame] | 320 | # sets up initial cpusets for ActivityManager | 
| Tim Murray | b769c8d | 2015-06-08 14:56:29 -0700 | [diff] [blame] | 321 | # this ensures that the cpusets are present and usable, but the device's | 
|  | 322 | # init.rc must actually set the correct cpus | 
| Tim Murray | f429d37 | 2015-10-15 12:38:15 -0700 | [diff] [blame] | 323 | mkdir /dev/cpuset/foreground | 
| Wei Wang | 8dbd12b | 2017-04-13 18:27:35 -0700 | [diff] [blame] | 324 | copy /dev/cpuset/cpus /dev/cpuset/foreground/cpus | 
|  | 325 | copy /dev/cpuset/mems /dev/cpuset/foreground/mems | 
| Tim Murray | f429d37 | 2015-10-15 12:38:15 -0700 | [diff] [blame] | 326 | mkdir /dev/cpuset/background | 
| Wei Wang | 8dbd12b | 2017-04-13 18:27:35 -0700 | [diff] [blame] | 327 | copy /dev/cpuset/cpus /dev/cpuset/background/cpus | 
|  | 328 | copy /dev/cpuset/mems /dev/cpuset/background/mems | 
| Tim Murray | f429d37 | 2015-10-15 12:38:15 -0700 | [diff] [blame] | 329 |  | 
|  | 330 | # system-background is for system tasks that should only run on | 
|  | 331 | # little cores, not on bigs | 
| Tim Murray | f429d37 | 2015-10-15 12:38:15 -0700 | [diff] [blame] | 332 | mkdir /dev/cpuset/system-background | 
| Wei Wang | 8dbd12b | 2017-04-13 18:27:35 -0700 | [diff] [blame] | 333 | copy /dev/cpuset/cpus /dev/cpuset/system-background/cpus | 
|  | 334 | copy /dev/cpuset/mems /dev/cpuset/system-background/mems | 
| Tim Murray | f429d37 | 2015-10-15 12:38:15 -0700 | [diff] [blame] | 335 |  | 
| Tim Murray | 658ae90 | 2018-04-13 10:15:49 -0700 | [diff] [blame] | 336 | # restricted is for system tasks that are being throttled | 
|  | 337 | # due to screen off. | 
|  | 338 | mkdir /dev/cpuset/restricted | 
|  | 339 | copy /dev/cpuset/cpus /dev/cpuset/restricted/cpus | 
|  | 340 | copy /dev/cpuset/mems /dev/cpuset/restricted/mems | 
|  | 341 |  | 
| Tim Murray | 6647bb5 | 2016-01-11 16:16:35 -0800 | [diff] [blame] | 342 | mkdir /dev/cpuset/top-app | 
| Wei Wang | 8dbd12b | 2017-04-13 18:27:35 -0700 | [diff] [blame] | 343 | copy /dev/cpuset/cpus /dev/cpuset/top-app/cpus | 
|  | 344 | copy /dev/cpuset/mems /dev/cpuset/top-app/mems | 
| Tim Murray | 6647bb5 | 2016-01-11 16:16:35 -0800 | [diff] [blame] | 345 |  | 
| Rick Yiu | a983f8a | 2020-12-01 15:45:01 +0800 | [diff] [blame] | 346 | # create a cpuset for camera daemon processes | 
|  | 347 | mkdir /dev/cpuset/camera-daemon | 
|  | 348 | copy /dev/cpuset/cpus /dev/cpuset/camera-daemon/cpus | 
|  | 349 | copy /dev/cpuset/mems /dev/cpuset/camera-daemon/mems | 
|  | 350 |  | 
| Tim Murray | f429d37 | 2015-10-15 12:38:15 -0700 | [diff] [blame] | 351 | # change permissions for all cpusets we'll touch at runtime | 
| Tim Murray | b769c8d | 2015-06-08 14:56:29 -0700 | [diff] [blame] | 352 | chown system system /dev/cpuset | 
|  | 353 | chown system system /dev/cpuset/foreground | 
|  | 354 | chown system system /dev/cpuset/background | 
| Todd Kjos | ba8a475 | 2015-10-26 16:22:11 -0700 | [diff] [blame] | 355 | chown system system /dev/cpuset/system-background | 
| Tim Murray | 6647bb5 | 2016-01-11 16:16:35 -0800 | [diff] [blame] | 356 | chown system system /dev/cpuset/top-app | 
| Tim Murray | 658ae90 | 2018-04-13 10:15:49 -0700 | [diff] [blame] | 357 | chown system system /dev/cpuset/restricted | 
| Rick Yiu | a983f8a | 2020-12-01 15:45:01 +0800 | [diff] [blame] | 358 | chown system system /dev/cpuset/camera-daemon | 
| Tim Murray | b769c8d | 2015-06-08 14:56:29 -0700 | [diff] [blame] | 359 | chown system system /dev/cpuset/tasks | 
|  | 360 | chown system system /dev/cpuset/foreground/tasks | 
|  | 361 | chown system system /dev/cpuset/background/tasks | 
| Todd Kjos | ba8a475 | 2015-10-26 16:22:11 -0700 | [diff] [blame] | 362 | chown system system /dev/cpuset/system-background/tasks | 
| Tim Murray | 6647bb5 | 2016-01-11 16:16:35 -0800 | [diff] [blame] | 363 | chown system system /dev/cpuset/top-app/tasks | 
| Tim Murray | 658ae90 | 2018-04-13 10:15:49 -0700 | [diff] [blame] | 364 | chown system system /dev/cpuset/restricted/tasks | 
| Rick Yiu | a983f8a | 2020-12-01 15:45:01 +0800 | [diff] [blame] | 365 | chown system system /dev/cpuset/camera-daemon/tasks | 
| Suren Baghdasaryan | 2e7799a | 2022-01-20 17:55:27 -0800 | [diff] [blame] | 366 | chown system system /dev/cpuset/cgroup.procs | 
|  | 367 | chown system system /dev/cpuset/foreground/cgroup.procs | 
|  | 368 | chown system system /dev/cpuset/background/cgroup.procs | 
|  | 369 | chown system system /dev/cpuset/system-background/cgroup.procs | 
|  | 370 | chown system system /dev/cpuset/top-app/cgroup.procs | 
|  | 371 | chown system system /dev/cpuset/restricted/cgroup.procs | 
|  | 372 | chown system system /dev/cpuset/camera-daemon/cgroup.procs | 
| Tim Murray | 4284f9f | 2015-11-10 14:31:09 -0800 | [diff] [blame] | 373 |  | 
|  | 374 | # set system-background to 0775 so SurfaceFlinger can touch it | 
|  | 375 | chmod 0775 /dev/cpuset/system-background | 
|  | 376 |  | 
| Jeff Vander Stoep | 3f62a02 | 2015-07-23 15:18:36 -0700 | [diff] [blame] | 377 | chmod 0664 /dev/cpuset/foreground/tasks | 
|  | 378 | chmod 0664 /dev/cpuset/background/tasks | 
| Todd Kjos | ba8a475 | 2015-10-26 16:22:11 -0700 | [diff] [blame] | 379 | chmod 0664 /dev/cpuset/system-background/tasks | 
| Tim Murray | 6647bb5 | 2016-01-11 16:16:35 -0800 | [diff] [blame] | 380 | chmod 0664 /dev/cpuset/top-app/tasks | 
| Tim Murray | 658ae90 | 2018-04-13 10:15:49 -0700 | [diff] [blame] | 381 | chmod 0664 /dev/cpuset/restricted/tasks | 
| Jeff Vander Stoep | 3f62a02 | 2015-07-23 15:18:36 -0700 | [diff] [blame] | 382 | chmod 0664 /dev/cpuset/tasks | 
| Rick Yiu | a983f8a | 2020-12-01 15:45:01 +0800 | [diff] [blame] | 383 | chmod 0664 /dev/cpuset/camera-daemon/tasks | 
| Suren Baghdasaryan | 2e7799a | 2022-01-20 17:55:27 -0800 | [diff] [blame] | 384 | chmod 0664 /dev/cpuset/foreground/cgroup.procs | 
|  | 385 | chmod 0664 /dev/cpuset/background/cgroup.procs | 
|  | 386 | chmod 0664 /dev/cpuset/system-background/cgroup.procs | 
|  | 387 | chmod 0664 /dev/cpuset/top-app/cgroup.procs | 
|  | 388 | chmod 0664 /dev/cpuset/restricted/cgroup.procs | 
|  | 389 | chmod 0664 /dev/cpuset/cgroup.procs | 
|  | 390 | chmod 0664 /dev/cpuset/camera-daemon/cgroup.procs | 
| Tim Murray | b769c8d | 2015-06-08 14:56:29 -0700 | [diff] [blame] | 391 |  | 
| Tim Murray | 1504cb5 | 2019-02-15 11:51:09 -0800 | [diff] [blame] | 392 | # make the PSI monitor accessible to others | 
|  | 393 | chown system system /proc/pressure/memory | 
|  | 394 | chmod 0664 /proc/pressure/memory | 
| Tim Murray | b769c8d | 2015-06-08 14:56:29 -0700 | [diff] [blame] | 395 |  | 
| Riley Andrews | 6dfdc7c | 2014-06-18 20:35:40 -0700 | [diff] [blame] | 396 | # qtaguid will limit access to specific data based on group memberships. | 
|  | 397 | #   net_bw_acct grants impersonation of socket owners. | 
|  | 398 | #   net_bw_stats grants access to other apps' detailed tagged-socket stats. | 
| JP Abgrall | 3e54aab | 2013-01-04 14:34:58 -0800 | [diff] [blame] | 399 | chown root net_bw_acct /proc/net/xt_qtaguid/ctrl | 
|  | 400 | chown root net_bw_stats /proc/net/xt_qtaguid/stats | 
|  | 401 |  | 
| Riley Andrews | 6dfdc7c | 2014-06-18 20:35:40 -0700 | [diff] [blame] | 402 | # Allow everybody to read the xt_qtaguid resource tracking misc dev. | 
|  | 403 | # This is needed by any process that uses socket tagging. | 
| JP Abgrall | 8e3ff70 | 2011-09-11 16:12:27 -0700 | [diff] [blame] | 404 | chmod 0644 /dev/xt_qtaguid | 
|  | 405 |  | 
| Luis Hector Chavez | f8a7e37 | 2018-02-12 11:30:46 -0800 | [diff] [blame] | 406 | mount bpf bpf /sys/fs/bpf nodev noexec nosuid | 
| Chenbo Feng | 2cba6f2 | 2017-10-23 11:57:59 -0700 | [diff] [blame] | 407 |  | 
| Riley Andrews | 6dfdc7c | 2014-06-18 20:35:40 -0700 | [diff] [blame] | 408 | # pstore/ramoops previous console log | 
| Luis Hector Chavez | f8a7e37 | 2018-02-12 11:30:46 -0800 | [diff] [blame] | 409 | mount pstore pstore /sys/fs/pstore nodev noexec nosuid | 
| Mark Salyzyn | 7ab805e | 2018-06-29 10:32:11 -0700 | [diff] [blame] | 410 | chown system log /sys/fs/pstore | 
|  | 411 | chmod 0550 /sys/fs/pstore | 
| Todd Poynor | 479efb5 | 2013-11-21 20:23:54 -0800 | [diff] [blame] | 412 | chown system log /sys/fs/pstore/console-ramoops | 
|  | 413 | chmod 0440 /sys/fs/pstore/console-ramoops | 
| Mark Salyzyn | 4eb0ba0 | 2017-06-27 09:32:32 -0700 | [diff] [blame] | 414 | chown system log /sys/fs/pstore/console-ramoops-0 | 
|  | 415 | chmod 0440 /sys/fs/pstore/console-ramoops-0 | 
| Mark Salyzyn | 4b0313e | 2014-12-15 07:52:19 -0800 | [diff] [blame] | 416 | chown system log /sys/fs/pstore/pmsg-ramoops-0 | 
|  | 417 | chmod 0440 /sys/fs/pstore/pmsg-ramoops-0 | 
| Todd Poynor | 479efb5 | 2013-11-21 20:23:54 -0800 | [diff] [blame] | 418 |  | 
| Greg Hackmann | cee8757 | 2015-01-26 10:40:29 -0800 | [diff] [blame] | 419 | # enable armv8_deprecated instruction hooks | 
|  | 420 | write /proc/sys/abi/swp 1 | 
|  | 421 |  | 
| Greg Hackmann | 40a96e4 | 2016-02-01 09:59:44 -0800 | [diff] [blame] | 422 | # Linux's execveat() syscall may construct paths containing /dev/fd | 
|  | 423 | # expecting it to point to /proc/self/fd | 
|  | 424 | symlink /proc/self/fd /dev/fd | 
|  | 425 |  | 
| Yueyao (Nathan) Zhu | 60c6dac | 2016-06-21 12:04:54 -0700 | [diff] [blame] | 426 | export DOWNLOAD_CACHE /data/cache | 
|  | 427 |  | 
| David Lin | 27b2c1e | 2017-03-08 17:36:18 -0800 | [diff] [blame] | 428 | # This allows the ledtrig-transient properties to be created here so | 
|  | 429 | # that they can be chown'd to system:system later on boot | 
|  | 430 | write /sys/class/leds/vibrator/trigger "transient" | 
|  | 431 |  | 
| Haibo Huang | d60a19b | 2018-11-04 09:50:05 -0800 | [diff] [blame] | 432 | # This is used by Bionic to select optimized routines. | 
|  | 433 | write /dev/cpu_variant:${ro.bionic.arch} ${ro.bionic.cpu_variant} | 
|  | 434 | chmod 0444 /dev/cpu_variant:${ro.bionic.arch} | 
|  | 435 | write /dev/cpu_variant:${ro.bionic.2nd_arch} ${ro.bionic.2nd_cpu_variant} | 
|  | 436 | chmod 0444 /dev/cpu_variant:${ro.bionic.2nd_arch} | 
|  | 437 |  | 
| Yifan Hong | c9a9d27 | 2019-04-08 13:29:07 -0700 | [diff] [blame] | 438 | # Allow system processes to read / write power state. | 
|  | 439 | chown system system /sys/power/state | 
|  | 440 | chown system system /sys/power/wakeup_count | 
|  | 441 | chmod 0660 /sys/power/state | 
|  | 442 |  | 
| Tri Vo | c6a84e8 | 2019-07-16 14:31:55 -0700 | [diff] [blame] | 443 | chown radio wakelock /sys/power/wake_lock | 
|  | 444 | chown radio wakelock /sys/power/wake_unlock | 
|  | 445 | chmod 0660 /sys/power/wake_lock | 
|  | 446 | chmod 0660 /sys/power/wake_unlock | 
|  | 447 |  | 
| Tom Cherry | f18b748 | 2018-10-17 13:14:55 -0700 | [diff] [blame] | 448 | # Start logd before any other services run to ensure we capture all of their logs. | 
|  | 449 | start logd | 
| Suren Baghdasaryan | c29c2ba | 2019-10-22 17:18:42 -0700 | [diff] [blame] | 450 | # Start lmkd before any other services run so that it can register them | 
| Martin Liu | 9f8b024 | 2021-07-01 11:55:02 +0800 | [diff] [blame] | 451 | write /proc/sys/vm/watermark_boost_factor 0 | 
| Suren Baghdasaryan | 6898682 | 2020-02-13 16:17:10 -0800 | [diff] [blame] | 452 | chown root system /sys/module/lowmemorykiller/parameters/adj | 
|  | 453 | chmod 0664 /sys/module/lowmemorykiller/parameters/adj | 
|  | 454 | chown root system /sys/module/lowmemorykiller/parameters/minfree | 
|  | 455 | chmod 0664 /sys/module/lowmemorykiller/parameters/minfree | 
| Suren Baghdasaryan | c29c2ba | 2019-10-22 17:18:42 -0700 | [diff] [blame] | 456 | start lmkd | 
| Jiyong Park | 407b000 | 2019-02-02 19:45:23 +0900 | [diff] [blame] | 457 |  | 
| Tom Cherry | f18b748 | 2018-10-17 13:14:55 -0700 | [diff] [blame] | 458 | # Start essential services. | 
|  | 459 | start servicemanager | 
|  | 460 | start hwservicemanager | 
|  | 461 | start vndservicemanager | 
|  | 462 |  | 
| Pete Bentley | c017e2c | 2022-07-07 15:18:55 +0100 | [diff] [blame] | 463 | # Run boringssl self test for each ABI.  Any failures trigger reboot to firmware. | 
|  | 464 | on init && property:ro.product.cpu.abilist32=* | 
|  | 465 | exec_start boringssl_self_test32 | 
|  | 466 | on init && property:ro.product.cpu.abilist64=* | 
|  | 467 | exec_start boringssl_self_test64 | 
|  | 468 | on property:apexd.status=ready && property:ro.product.cpu.abilist32=* | 
|  | 469 | exec_start boringssl_self_test_apex32 | 
|  | 470 | on property:apexd.status=ready && property:ro.product.cpu.abilist64=* | 
|  | 471 | exec_start boringssl_self_test_apex64 | 
|  | 472 |  | 
|  | 473 | service boringssl_self_test32 /system/bin/boringssl_self_test32 | 
|  | 474 | reboot_on_failure reboot,boringssl-self-check-failed | 
|  | 475 | stdio_to_kmsg | 
| Nikita Ioffe | b728ecd | 2022-12-29 23:12:33 +0000 | [diff] [blame] | 476 | # Explicitly specify that boringssl_self_test32 doesn't require any capabilities | 
|  | 477 | capabilities | 
| Pete Bentley | c017e2c | 2022-07-07 15:18:55 +0100 | [diff] [blame] | 478 |  | 
|  | 479 | service boringssl_self_test64 /system/bin/boringssl_self_test64 | 
|  | 480 | reboot_on_failure reboot,boringssl-self-check-failed | 
|  | 481 | stdio_to_kmsg | 
| Nikita Ioffe | b728ecd | 2022-12-29 23:12:33 +0000 | [diff] [blame] | 482 | # Explicitly specify that boringssl_self_test64 doesn't require any capabilities | 
|  | 483 | capabilities | 
| Pete Bentley | c017e2c | 2022-07-07 15:18:55 +0100 | [diff] [blame] | 484 |  | 
|  | 485 | service boringssl_self_test_apex32 /apex/com.android.conscrypt/bin/boringssl_self_test32 | 
|  | 486 | reboot_on_failure reboot,boringssl-self-check-failed | 
|  | 487 | stdio_to_kmsg | 
| Nikita Ioffe | b728ecd | 2022-12-29 23:12:33 +0000 | [diff] [blame] | 488 | # Explicitly specify that boringssl_self_test_apex32 doesn't require any capabilities | 
|  | 489 | capabilities | 
| Pete Bentley | c017e2c | 2022-07-07 15:18:55 +0100 | [diff] [blame] | 490 |  | 
|  | 491 | service boringssl_self_test_apex64 /apex/com.android.conscrypt/bin/boringssl_self_test64 | 
|  | 492 | reboot_on_failure reboot,boringssl-self-check-failed | 
|  | 493 | stdio_to_kmsg | 
| Nikita Ioffe | b728ecd | 2022-12-29 23:12:33 +0000 | [diff] [blame] | 494 | # Explicitly specify that boringssl_self_test_apex64 doesn't require any capabilities | 
|  | 495 | capabilities | 
| Pete Bentley | c017e2c | 2022-07-07 15:18:55 +0100 | [diff] [blame] | 496 |  | 
|  | 497 |  | 
| Riley Andrews | e4b7b29 | 2014-06-16 15:06:21 -0700 | [diff] [blame] | 498 | # Healthd can trigger a full boot from charger mode by signaling this | 
|  | 499 | # property when the power button is held. | 
|  | 500 | on property:sys.boot_from_charger_mode=1 | 
|  | 501 | class_stop charger | 
|  | 502 | trigger late-init | 
|  | 503 |  | 
| Riley Andrews | 80c7a5e | 2014-07-11 15:05:23 -0700 | [diff] [blame] | 504 | # Indicate to fw loaders that the relevant mounts are up. | 
|  | 505 | on firmware_mounts_complete | 
|  | 506 | rm /dev/.booting | 
|  | 507 |  | 
| Riley Andrews | e4b7b29 | 2014-06-16 15:06:21 -0700 | [diff] [blame] | 508 | # Mount filesystems and start core system services. | 
|  | 509 | on late-init | 
|  | 510 | trigger early-fs | 
| Wei Wang | abfbec3 | 2016-08-23 11:58:09 -0700 | [diff] [blame] | 511 |  | 
|  | 512 | # Mount fstab in init.{$device}.rc by mount_all command. Optional parameter | 
|  | 513 | # '--early' can be specified to skip entries with 'latemount'. | 
|  | 514 | # /system and /vendor must be mounted by the end of the fs stage, | 
|  | 515 | # while /data is optional. | 
| Riley Andrews | e4b7b29 | 2014-06-16 15:06:21 -0700 | [diff] [blame] | 516 | trigger fs | 
|  | 517 | trigger post-fs | 
| Riley Andrews | e4b7b29 | 2014-06-16 15:06:21 -0700 | [diff] [blame] | 518 |  | 
| Wei Wang | abfbec3 | 2016-08-23 11:58:09 -0700 | [diff] [blame] | 519 | # Mount fstab in init.{$device}.rc by mount_all with '--late' parameter | 
|  | 520 | # to only mount entries with 'latemount'. This is needed if '--early' is | 
|  | 521 | # specified in the previous mount_all command on the fs stage. | 
|  | 522 | # With /system mounted and properties form /system + /factory available, | 
|  | 523 | # some services can be started. | 
|  | 524 | trigger late-fs | 
|  | 525 |  | 
| Paul Lawrence | 948410a | 2015-07-01 14:40:56 -0700 | [diff] [blame] | 526 | # Now we can mount /data. File encryption requires keymaster to decrypt | 
| Wei Wang | abfbec3 | 2016-08-23 11:58:09 -0700 | [diff] [blame] | 527 | # /data, which in turn can only be loaded when system properties are present. | 
| Paul Lawrence | 948410a | 2015-07-01 14:40:56 -0700 | [diff] [blame] | 528 | trigger post-fs-data | 
| Wei Wang | abfbec3 | 2016-08-23 11:58:09 -0700 | [diff] [blame] | 529 |  | 
| Maciej Żenczykowski | 6c72c16 | 2020-06-22 01:11:24 -0700 | [diff] [blame] | 530 | # Should be before netd, but after apex, properties and logging is available. | 
|  | 531 | trigger load_bpf_programs | 
|  | 532 |  | 
| Wei Wang | fa14d21 | 2018-09-05 10:12:40 -0700 | [diff] [blame] | 533 | # Now we can start zygote for devices with file based encryption | 
|  | 534 | trigger zygote-start | 
|  | 535 |  | 
| Riley Andrews | 67cb1ae | 2014-07-15 20:39:41 -0700 | [diff] [blame] | 536 | # Remove a file to wake up anything waiting for firmware. | 
|  | 537 | trigger firmware_mounts_complete | 
|  | 538 |  | 
| Riley Andrews | e4b7b29 | 2014-06-16 15:06:21 -0700 | [diff] [blame] | 539 | trigger early-boot | 
|  | 540 | trigger boot | 
|  | 541 |  | 
| Daniel Rosenberg | 1be83e3 | 2019-06-17 13:23:05 -0700 | [diff] [blame] | 542 | on early-fs | 
|  | 543 | # Once metadata has been mounted, we'll need vold to deal with userdata checkpointing | 
| Daniel Rosenberg | 6156b9b | 2018-10-11 15:35:07 -0700 | [diff] [blame] | 544 | start vold | 
| Daniel Rosenberg | 1be83e3 | 2019-06-17 13:23:05 -0700 | [diff] [blame] | 545 |  | 
|  | 546 | on post-fs | 
| Daniel Rosenberg | 6156b9b | 2018-10-11 15:35:07 -0700 | [diff] [blame] | 547 | exec - system system -- /system/bin/vdc checkpoint markBootAttempt | 
| Steven Moreland | d627502 | 2017-03-24 16:23:07 +0000 | [diff] [blame] | 548 |  | 
| Luis Hector Chavez | 30780a7 | 2018-02-14 08:36:16 -0800 | [diff] [blame] | 549 | # Once everything is setup, no need to modify /. | 
| Luis Hector Chavez | d07d094 | 2018-07-11 08:13:34 -0700 | [diff] [blame] | 550 | # The bind+remount combination allows this to work in containers. | 
|  | 551 | mount rootfs rootfs / remount bind ro nodev | 
| Brian Swetland | 56de7a1 | 2010-09-08 15:06:45 -0700 | [diff] [blame] | 552 |  | 
| Zim | c46c235 | 2020-09-11 11:06:29 +0100 | [diff] [blame] | 553 | # Mount default storage into root namespace | 
|  | 554 | mount none /mnt/user/0 /storage bind rec | 
|  | 555 | mount none none /storage slave rec | 
|  | 556 |  | 
| Nick Kralevich | 715c4dc | 2015-12-07 16:57:08 -0800 | [diff] [blame] | 557 | # Make sure /sys/kernel/debug (if present) is labeled properly | 
| Paul Lawrence | a8d8434 | 2016-11-14 15:40:18 -0800 | [diff] [blame] | 558 | # Note that tracefs may be mounted under debug, so we need to cross filesystems | 
|  | 559 | restorecon --recursive --cross-filesystems /sys/kernel/debug | 
| Paul Lawrence | d2abcbd | 2016-11-02 14:23:31 -0700 | [diff] [blame] | 560 |  | 
| Ken Sumrall | 752923c | 2010-12-03 16:33:31 -0800 | [diff] [blame] | 561 | # We chown/chmod /cache again so because mount is run as root + defaults | 
|  | 562 | chown system cache /cache | 
|  | 563 | chmod 0770 /cache | 
| Stephen Smalley | 1eee419 | 2012-01-13 08:54:34 -0500 | [diff] [blame] | 564 | # We restorecon /cache in case the cache partition has been reset. | 
| Nick Kralevich | e169591 | 2014-07-09 12:39:21 -0700 | [diff] [blame] | 565 | restorecon_recursive /cache | 
| Ken Sumrall | 752923c | 2010-12-03 16:33:31 -0800 | [diff] [blame] | 566 |  | 
| Tao Bao | e48aed0 | 2015-05-11 14:08:18 -0700 | [diff] [blame] | 567 | # Create /cache/recovery in case it's not there. It'll also fix the odd | 
|  | 568 | # permissions if created by the recovery system. | 
|  | 569 | mkdir /cache/recovery 0770 system cache | 
| Ken Sumrall | 752923c | 2010-12-03 16:33:31 -0800 | [diff] [blame] | 570 |  | 
| Christopher Tate | 63c463f | 2016-01-28 17:09:42 -0800 | [diff] [blame] | 571 | # Backup/restore mechanism uses the cache partition | 
|  | 572 | mkdir /cache/backup_stage 0700 system system | 
|  | 573 | mkdir /cache/backup 0700 system system | 
|  | 574 |  | 
| Ken Sumrall | 752923c | 2010-12-03 16:33:31 -0800 | [diff] [blame] | 575 | #change permissions on vmallocinfo so we can grab it from bugreports | 
|  | 576 | chown root log /proc/vmallocinfo | 
|  | 577 | chmod 0440 /proc/vmallocinfo | 
|  | 578 |  | 
| Dima Zavin | 9481266 | 2012-09-25 14:22:02 -0700 | [diff] [blame] | 579 | chown root log /proc/slabinfo | 
|  | 580 | chmod 0440 /proc/slabinfo | 
|  | 581 |  | 
| Martin Liu | 0abd0d6 | 2020-06-14 17:21:13 +0800 | [diff] [blame] | 582 | chown root log /proc/pagetypeinfo | 
|  | 583 | chmod 0440 /proc/pagetypeinfo | 
|  | 584 |  | 
| Ken Sumrall | 752923c | 2010-12-03 16:33:31 -0800 | [diff] [blame] | 585 | #change permissions on kmsg & sysrq-trigger so bugreports can grab kthread stacks | 
|  | 586 | chown root system /proc/kmsg | 
|  | 587 | chmod 0440 /proc/kmsg | 
|  | 588 | chown root system /proc/sysrq-trigger | 
|  | 589 | chmod 0220 /proc/sysrq-trigger | 
| Colin Cross | b35e36e | 2012-08-02 18:14:33 -0700 | [diff] [blame] | 590 | chown system log /proc/last_kmsg | 
|  | 591 | chmod 0440 /proc/last_kmsg | 
| Ken Sumrall | 752923c | 2010-12-03 16:33:31 -0800 | [diff] [blame] | 592 |  | 
| dcashman | 5822a4a | 2014-03-25 16:31:07 -0700 | [diff] [blame] | 593 | # make the selinux kernel policy world-readable | 
|  | 594 | chmod 0444 /sys/fs/selinux/policy | 
|  | 595 |  | 
| Ken Sumrall | 752923c | 2010-12-03 16:33:31 -0800 | [diff] [blame] | 596 | # create the lost+found directories, so as to enforce our permissions | 
| Chia-chi Yeh | ea74414 | 2011-07-08 16:52:18 -0700 | [diff] [blame] | 597 | mkdir /cache/lost+found 0770 root root | 
| Ken Sumrall | 752923c | 2010-12-03 16:33:31 -0800 | [diff] [blame] | 598 |  | 
| Paul Crowley | fe305ab | 2018-05-17 10:12:34 -0700 | [diff] [blame] | 599 | restorecon_recursive /metadata | 
|  | 600 | mkdir /metadata/vold | 
|  | 601 | chmod 0700 /metadata/vold | 
| David Anderson | 0664f31 | 2019-03-05 22:16:36 -0800 | [diff] [blame] | 602 | mkdir /metadata/password_slots 0771 root system | 
| Mark Salyzyn | ee016ce | 2019-05-23 10:00:34 -0700 | [diff] [blame] | 603 | mkdir /metadata/bootstat 0750 system log | 
| David Anderson | 001747e | 2019-07-03 15:10:53 -0700 | [diff] [blame] | 604 | mkdir /metadata/ota 0700 root system | 
| David Anderson | 456e501 | 2019-08-01 14:37:35 -0700 | [diff] [blame] | 605 | mkdir /metadata/ota/snapshots 0700 root system | 
| Gavin Corkery | 8c92256 | 2020-05-11 14:10:09 +0100 | [diff] [blame] | 606 | mkdir /metadata/userspacereboot 0770 root system | 
| Gavin Corkery | badf396 | 2020-12-05 17:25:09 +0000 | [diff] [blame] | 607 | mkdir /metadata/watchdog 0770 root system | 
| Paul Crowley | fe305ab | 2018-05-17 10:12:34 -0700 | [diff] [blame] | 608 |  | 
| Martijn Coenen | 4517e57 | 2019-03-12 22:05:20 +0100 | [diff] [blame] | 609 | mkdir /metadata/apex 0700 root system | 
|  | 610 | mkdir /metadata/apex/sessions 0700 root system | 
| Nikita Ioffe | a462044 | 2020-06-22 17:47:23 +0100 | [diff] [blame] | 611 | # On some devices we see a weird behaviour in which /metadata/apex doesn't | 
|  | 612 | # have a correct label. To workaround this bug, explicitly call restorecon | 
|  | 613 | # on /metadata/apex. For most of the boot sequences /metadata/apex will | 
|  | 614 | # already have a correct selinux label, meaning that this call will be a | 
|  | 615 | # no-op. | 
|  | 616 | restorecon_recursive /metadata/apex | 
|  | 617 |  | 
| Mohammad Samiul Islam | d192d54 | 2020-05-07 15:52:48 +0100 | [diff] [blame] | 618 | mkdir /metadata/staged-install 0770 root system | 
| Jeff Vander Stoep | 75d0b33 | 2021-11-17 08:55:35 +0100 | [diff] [blame] | 619 | mkdir /metadata/sepolicy 0700 root root | 
| Janis Danisevskis | 1ad8d21 | 2017-04-06 12:44:59 -0700 | [diff] [blame] | 620 | on late-fs | 
| Joel Galenson | d48c4cf | 2017-06-13 10:15:05 -0700 | [diff] [blame] | 621 | # Ensure that tracefs has the correct permissions. | 
|  | 622 | # This does not work correctly if it is called in post-fs. | 
| Alistair Delva | ebb5b3b | 2020-01-29 09:10:47 -0800 | [diff] [blame] | 623 | chmod 0755 /sys/kernel/tracing | 
| Joel Galenson | d48c4cf | 2017-06-13 10:15:05 -0700 | [diff] [blame] | 624 | chmod 0755 /sys/kernel/debug/tracing | 
|  | 625 |  | 
| Eric Biggers | 5265b8d | 2023-01-18 02:17:13 +0000 | [diff] [blame] | 626 | # HALs required before storage encryption can get unlocked (FBE) | 
| Janis Danisevskis | 1ad8d21 | 2017-04-06 12:44:59 -0700 | [diff] [blame] | 627 | class_start early_hal | 
|  | 628 |  | 
| Martijn Coenen | 3b68bf2 | 2020-11-30 10:05:40 +0100 | [diff] [blame] | 629 | # Load trusted keys from dm-verity protected partitions | 
|  | 630 | exec -- /system/bin/fsverity_init --load-verified-keys | 
|  | 631 |  | 
| Alexander Potapenko | 53cd1e9 | 2021-09-29 13:30:02 +0000 | [diff] [blame] | 632 | # Only enable the bootreceiver tracing instance for kernels 5.10 and above. | 
|  | 633 | on late-fs && property:ro.kernel.version=4.9 | 
|  | 634 | setprop bootreceiver.enable 0 | 
|  | 635 | on late-fs && property:ro.kernel.version=4.14 | 
|  | 636 | setprop bootreceiver.enable 0 | 
|  | 637 | on late-fs && property:ro.kernel.version=4.19 | 
|  | 638 | setprop bootreceiver.enable 0 | 
|  | 639 | on late-fs && property:ro.kernel.version=5.4 | 
|  | 640 | setprop bootreceiver.enable 0 | 
|  | 641 | on late-fs | 
|  | 642 | # Bootreceiver tracing instance is enabled by default. | 
|  | 643 | setprop bootreceiver.enable ${bootreceiver.enable:-1} | 
|  | 644 |  | 
|  | 645 | on property:ro.product.cpu.abilist64=* && property:bootreceiver.enable=1 | 
| Alexander Potapenko | 439608b | 2021-03-02 16:50:16 +0100 | [diff] [blame] | 646 | # Set up a tracing instance for system_server to monitor error_report_end events. | 
|  | 647 | # These are sent by kernel tools like KASAN and KFENCE when a memory corruption | 
| Alexander Potapenko | ec37ba8 | 2021-08-03 07:47:40 +0000 | [diff] [blame] | 648 | # is detected. This is only needed for 64-bit systems. | 
| Alexander Potapenko | 439608b | 2021-03-02 16:50:16 +0100 | [diff] [blame] | 649 | mkdir /sys/kernel/tracing/instances/bootreceiver 0700 system system | 
|  | 650 | restorecon_recursive /sys/kernel/tracing/instances/bootreceiver | 
|  | 651 | write /sys/kernel/tracing/instances/bootreceiver/buffer_size_kb 1 | 
|  | 652 | write /sys/kernel/tracing/instances/bootreceiver/trace_options disable_on_free | 
|  | 653 | write /sys/kernel/tracing/instances/bootreceiver/events/error_report/error_report_end/enable 1 | 
|  | 654 |  | 
| Ken Sumrall | 752923c | 2010-12-03 16:33:31 -0800 | [diff] [blame] | 655 | on post-fs-data | 
| Martijn Coenen | e94b366 | 2021-03-09 10:57:00 +0100 | [diff] [blame] | 656 |  | 
| Martijn Coenen | f0bc58a | 2019-04-23 16:26:01 +0200 | [diff] [blame] | 657 | mark_post_data | 
|  | 658 |  | 
| Paul Lawrence | b920cb4 | 2018-10-04 08:37:17 -0700 | [diff] [blame] | 659 | # Start checkpoint before we touch data | 
| Paul Lawrence | b920cb4 | 2018-10-04 08:37:17 -0700 | [diff] [blame] | 660 | exec - system system -- /system/bin/vdc checkpoint prepareCheckpoint | 
|  | 661 |  | 
| Colin Cross | 31712be | 2010-04-09 12:26:06 -0700 | [diff] [blame] | 662 | # We chown/chmod /data again so because mount is run as root + defaults | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 663 | chown system system /data | 
|  | 664 | chmod 0771 /data | 
| Stephen Smalley | 1eee419 | 2012-01-13 08:54:34 -0500 | [diff] [blame] | 665 | # We restorecon /data in case the userdata partition has been reset. | 
|  | 666 | restorecon /data | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 667 |  | 
| Elliott Hughes | 2f74a5d | 2016-02-02 09:15:59 -0800 | [diff] [blame] | 668 | # Make sure we have the device encryption key. | 
| Paul Lawrence | 806d10b | 2015-04-28 22:07:10 +0000 | [diff] [blame] | 669 | installkey /data | 
|  | 670 |  | 
| Yongqin Liu | a197ff1 | 2014-12-05 13:45:02 +0800 | [diff] [blame] | 671 | # Start bootcharting as soon as possible after the data partition is | 
|  | 672 | # mounted to collect more data. | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 673 | mkdir /data/bootchart 0755 shell shell encryption=Require | 
| Elliott Hughes | a3641af | 2016-11-10 17:43:47 -0800 | [diff] [blame] | 674 | bootchart start | 
| Yongqin Liu | a197ff1 | 2014-12-05 13:45:02 +0800 | [diff] [blame] | 675 |  | 
| Paul Crowley | 7583da1 | 2021-04-08 17:04:43 +0000 | [diff] [blame] | 676 | # Avoid predictable entropy pool. Carry over entropy from previous boot. | 
|  | 677 | copy /data/system/entropy.dat /dev/urandom | 
|  | 678 |  | 
| Tom Cherry | 2c9c8eb | 2020-10-16 10:02:40 -0700 | [diff] [blame] | 679 | mkdir /data/vendor 0771 root root encryption=Require | 
| Tom Cherry | 2c9c8eb | 2020-10-16 10:02:40 -0700 | [diff] [blame] | 680 | mkdir /data/vendor/hardware 0771 root root | 
|  | 681 |  | 
| Josh Gao | 81c94cd | 2020-10-01 13:01:15 -0700 | [diff] [blame] | 682 | # Start tombstoned early to be able to store tombstones. | 
| Kevin Brodsky | 13d86ad | 2020-12-17 15:32:50 +0000 | [diff] [blame] | 683 | mkdir /data/anr 0775 system system encryption=Require | 
| Josh Gao | 81c94cd | 2020-10-01 13:01:15 -0700 | [diff] [blame] | 684 | mkdir /data/tombstones 0771 system system encryption=Require | 
|  | 685 | mkdir /data/vendor/tombstones 0771 root root | 
|  | 686 | mkdir /data/vendor/tombstones/wifi 0771 wifi wifi | 
|  | 687 | start tombstoned | 
|  | 688 |  | 
| Kevin Brodsky | 13d86ad | 2020-12-17 15:32:50 +0000 | [diff] [blame] | 689 | # Make sure that apexd is started in the default namespace | 
|  | 690 | enter_default_mount_ns | 
|  | 691 |  | 
| Paul Crowley | 7583da1 | 2021-04-08 17:04:43 +0000 | [diff] [blame] | 692 | # set up keystore directory structure first so that we can end early boot | 
|  | 693 | # and start apexd | 
|  | 694 | mkdir /data/misc 01771 system misc encryption=Require | 
|  | 695 | mkdir /data/misc/keystore 0700 keystore keystore | 
|  | 696 | # work around b/183668221 | 
|  | 697 | restorecon /data/misc /data/misc/keystore | 
|  | 698 |  | 
|  | 699 | # Boot level 30 | 
|  | 700 | # odsign signing keys have MAX_BOOT_LEVEL=30 | 
|  | 701 | # This is currently the earliest boot level, but we start at 30 | 
|  | 702 | # to leave room for earlier levels. | 
|  | 703 | setprop keystore.boot_level 30 | 
|  | 704 |  | 
|  | 705 | # Now that /data is mounted and we have created /data/misc/keystore, | 
|  | 706 | # we can tell keystore to stop allowing use of early-boot keys, | 
|  | 707 | # and access its database for the first time to support creation and | 
|  | 708 | # use of MAX_BOOT_LEVEL keys. | 
|  | 709 | exec - system system -- /system/bin/vdc keymaster earlyBootEnded | 
|  | 710 |  | 
| Daniel Norman | ebaa3e5 | 2021-11-16 20:28:29 +0000 | [diff] [blame] | 711 | # Multi-installed APEXes are selected using persist props. | 
|  | 712 | # Load persist properties and override properties (if enabled) from /data, | 
|  | 713 | # before starting apexd. | 
| Jooyung Han | 9561496 | 2022-08-18 09:56:18 +0900 | [diff] [blame] | 714 | # /data/property should be created before `load_persist_props` | 
|  | 715 | mkdir /data/property 0700 root root encryption=Require | 
| Daniel Norman | ebaa3e5 | 2021-11-16 20:28:29 +0000 | [diff] [blame] | 716 | load_persist_props | 
| Jooyung Han | 9561496 | 2022-08-18 09:56:18 +0900 | [diff] [blame] | 717 |  | 
| Daniel Norman | ebaa3e5 | 2021-11-16 20:28:29 +0000 | [diff] [blame] | 718 | start logd | 
|  | 719 | start logd-reinit | 
| Jooyung Han | 9561496 | 2022-08-18 09:56:18 +0900 | [diff] [blame] | 720 |  | 
| Daniel Norman | ebaa3e5 | 2021-11-16 20:28:29 +0000 | [diff] [blame] | 721 | # Some existing vendor rc files use 'on load_persist_props_action' to know | 
|  | 722 | # when persist props are ready. These are difficult to change due to GRF, | 
|  | 723 | # so continue triggering this action here even though props are already loaded | 
|  | 724 | # by the 'load_persist_props' call above. | 
|  | 725 | trigger load_persist_props_action | 
|  | 726 |  | 
| Jiyong Park | dcbaf9f | 2019-02-22 22:15:25 +0900 | [diff] [blame] | 727 | # /data/apex is now available. Start apexd to scan and activate APEXes. | 
| Eric Biggers | 915b8d7 | 2021-04-28 10:15:38 -0700 | [diff] [blame] | 728 | # | 
| Eric Biggers | 5265b8d | 2023-01-18 02:17:13 +0000 | [diff] [blame] | 729 | # To handle userspace reboots, make sure that apexd is started cleanly here | 
|  | 730 | # (set apexd.status="") and that it is restarted if it's already running. | 
| Eric Biggers | 72c781d | 2022-05-11 23:31:08 +0000 | [diff] [blame] | 731 | # | 
|  | 732 | # /data/apex uses encryption=None because direct I/O support is needed on | 
|  | 733 | # APEX files, but some devices don't support direct I/O on encrypted files. | 
|  | 734 | # Also, APEXes are public information, similar to the system image. | 
|  | 735 | # /data/apex/decompressed and /data/apex/ota_reserved override this setting; | 
|  | 736 | # they are encrypted so that files in them can be hard-linked into | 
|  | 737 | # /data/rollback which is encrypted. | 
| Nikita Ioffe | b8591b5 | 2020-04-21 20:50:53 +0100 | [diff] [blame] | 738 | mkdir /data/apex 0755 root system encryption=None | 
|  | 739 | mkdir /data/apex/active 0755 root system | 
| Jiyong Park | dcbaf9f | 2019-02-22 22:15:25 +0900 | [diff] [blame] | 740 | mkdir /data/apex/backup 0700 root system | 
| Mohammad Samiul Islam | 60e30a5 | 2021-04-27 21:44:10 +0100 | [diff] [blame] | 741 | mkdir /data/apex/decompressed 0755 root system encryption=Require | 
| Jooyung Han | baa7c13 | 2019-04-18 11:01:35 +0900 | [diff] [blame] | 742 | mkdir /data/apex/hashtree 0700 root system | 
| Jiyong Park | dcbaf9f | 2019-02-22 22:15:25 +0900 | [diff] [blame] | 743 | mkdir /data/apex/sessions 0700 root system | 
| Mohammad Samiul Islam | 64fe2c6 | 2020-12-09 21:05:28 +0000 | [diff] [blame] | 744 | mkdir /data/app-staging 0751 system system encryption=DeleteIfNecessary | 
| Kelvin Zhang | 1f455c8 | 2021-02-10 09:32:17 -0500 | [diff] [blame] | 745 | mkdir /data/apex/ota_reserved 0700 root system encryption=Require | 
| Eric Biggers | 915b8d7 | 2021-04-28 10:15:38 -0700 | [diff] [blame] | 746 | setprop apexd.status "" | 
|  | 747 | restart apexd | 
| Martijn Coenen | 3848e1b | 2018-08-17 13:52:25 +0200 | [diff] [blame] | 748 |  | 
| Paul Crowley | 7583da1 | 2021-04-08 17:04:43 +0000 | [diff] [blame] | 749 | # create rest of basic filesystem structure | 
| Mark Salyzyn | 9339403 | 2017-07-14 10:37:57 -0700 | [diff] [blame] | 750 | mkdir /data/misc/recovery 0770 system log | 
| Siqi Lin | b9b76de | 2017-07-26 13:18:15 -0700 | [diff] [blame] | 751 | copy /data/misc/recovery/ro.build.fingerprint /data/misc/recovery/ro.build.fingerprint.1 | 
|  | 752 | chmod 0440 /data/misc/recovery/ro.build.fingerprint.1 | 
|  | 753 | chown system log /data/misc/recovery/ro.build.fingerprint.1 | 
|  | 754 | write /data/misc/recovery/ro.build.fingerprint ${ro.build.fingerprint} | 
|  | 755 | chmod 0440 /data/misc/recovery/ro.build.fingerprint | 
|  | 756 | chown system log /data/misc/recovery/ro.build.fingerprint | 
| Mark Salyzyn | 9339403 | 2017-07-14 10:37:57 -0700 | [diff] [blame] | 757 | mkdir /data/misc/recovery/proc 0770 system log | 
|  | 758 | copy /data/misc/recovery/proc/version /data/misc/recovery/proc/version.1 | 
|  | 759 | chmod 0440 /data/misc/recovery/proc/version.1 | 
|  | 760 | chown system log /data/misc/recovery/proc/version.1 | 
|  | 761 | copy /proc/version /data/misc/recovery/proc/version | 
|  | 762 | chmod 0440 /data/misc/recovery/proc/version | 
|  | 763 | chown system log /data/misc/recovery/proc/version | 
| Ajay Panicker | 604208e | 2016-09-20 11:52:14 -0700 | [diff] [blame] | 764 | mkdir /data/misc/bluedroid 02770 bluetooth bluetooth | 
| Pavlin Radoslavov | 8175bb2 | 2015-06-19 19:12:46 -0700 | [diff] [blame] | 765 | # Fix the access permissions and group ownership for 'bt_config.conf' | 
|  | 766 | chmod 0660 /data/misc/bluedroid/bt_config.conf | 
| Ajay Panicker | 604208e | 2016-09-20 11:52:14 -0700 | [diff] [blame] | 767 | chown bluetooth bluetooth /data/misc/bluedroid/bt_config.conf | 
|  | 768 | mkdir /data/misc/bluetooth 0770 bluetooth bluetooth | 
|  | 769 | mkdir /data/misc/bluetooth/logs 0770 bluetooth bluetooth | 
| Jack Yu | 6097da8 | 2020-07-08 17:08:16 +0800 | [diff] [blame] | 770 | mkdir /data/misc/nfc 0770 nfc nfc | 
|  | 771 | mkdir /data/misc/nfc/logs 0770 nfc nfc | 
| David Zeuthen | e83f386 | 2019-10-28 13:42:14 -0400 | [diff] [blame] | 772 | mkdir /data/misc/credstore 0700 credstore credstore | 
| Andres Morales | 6a49c2f | 2015-04-16 13:16:24 -0700 | [diff] [blame] | 773 | mkdir /data/misc/gatekeeper 0700 system system | 
| Brian Carlstrom | 0491893 | 2011-06-30 22:50:29 -0700 | [diff] [blame] | 774 | mkdir /data/misc/keychain 0771 system system | 
| Sreeram Ramachandran | b46efdb | 2014-07-07 22:09:54 -0700 | [diff] [blame] | 775 | mkdir /data/misc/net 0750 root shell | 
| Robert Greenwalt | 2aa33a3 | 2013-07-16 09:46:17 -0700 | [diff] [blame] | 776 | mkdir /data/misc/radio 0770 system radio | 
| Robert Greenwalt | d6d4780 | 2012-09-26 16:04:27 -0700 | [diff] [blame] | 777 | mkdir /data/misc/sms 0770 system radio | 
| fionaxu | 06b8e2e | 2017-11-21 12:31:57 -0800 | [diff] [blame] | 778 | mkdir /data/misc/carrierid 0770 system radio | 
| Niklas Lindgren | fd66538 | 2018-05-21 16:53:00 +0200 | [diff] [blame] | 779 | mkdir /data/misc/apns 0770 system radio | 
| Shuo Qian | f0e65d8 | 2019-10-14 13:24:58 -0700 | [diff] [blame] | 780 | mkdir /data/misc/emergencynumberdb 0770 system radio | 
| Ricky Wai | 88d5dcb | 2017-10-27 16:35:35 +0100 | [diff] [blame] | 781 | mkdir /data/misc/network_watchlist 0774 system system | 
| Abodunrinwa Toki | d6ab645 | 2017-04-27 18:46:59 +0100 | [diff] [blame] | 782 | mkdir /data/misc/textclassifier 0771 system system | 
| Chia-chi Yeh | 9bb4d41 | 2011-07-08 20:03:03 -0700 | [diff] [blame] | 783 | mkdir /data/misc/vpn 0770 system vpn | 
| Torne (Richard Coles) | 234f696 | 2014-05-22 18:40:21 +0100 | [diff] [blame] | 784 | mkdir /data/misc/shared_relro 0771 shared_relro shared_relro | 
| Oscar Montemayor | d0aa32c | 2010-01-06 13:18:12 -0800 | [diff] [blame] | 785 | mkdir /data/misc/systemkeys 0700 system system | 
| zhanglongxia | 40e1666 | 2022-09-22 10:51:25 +0800 | [diff] [blame] | 786 | mkdir /data/misc/threadnetwork 0770 thread_network thread_network | 
| Mike Lockwood | 48d116e | 2009-07-08 18:42:08 -0400 | [diff] [blame] | 787 | mkdir /data/misc/wifi 0770 wifi wifi | 
| Stephen Smalley | 82e87ed | 2014-01-29 13:53:03 -0500 | [diff] [blame] | 788 | mkdir /data/misc/wifi/sockets 0770 wifi wifi | 
| Stephen Smalley | 82e87ed | 2014-01-29 13:53:03 -0500 | [diff] [blame] | 789 | mkdir /data/misc/wifi/wpa_supplicant 0770 wifi wifi | 
| Jaewan Kim | 373d9fa | 2014-03-10 17:13:07 +0900 | [diff] [blame] | 790 | mkdir /data/misc/ethernet 0770 system system | 
| Stephen Smalley | 82e87ed | 2014-01-29 13:53:03 -0500 | [diff] [blame] | 791 | mkdir /data/misc/dhcp 0770 dhcp dhcp | 
| Robin Lee | 3094f82 | 2014-04-25 15:21:35 +0100 | [diff] [blame] | 792 | mkdir /data/misc/user 0771 root root | 
| Stephen Smalley | 82e87ed | 2014-01-29 13:53:03 -0500 | [diff] [blame] | 793 | # give system access to wpa_supplicant.conf for backup and restore | 
| Amith Yamasani | eefef32 | 2009-07-02 12:08:13 -0700 | [diff] [blame] | 794 | chmod 0660 /data/misc/wifi/wpa_supplicant.conf | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 795 | mkdir /data/local 0751 root root encryption=Require | 
| Glenn Kasten | b0f908a | 2013-02-22 14:54:45 -0800 | [diff] [blame] | 796 | mkdir /data/misc/media 0700 media media | 
| Glenn Kasten | 845a4ff | 2016-02-23 15:23:46 -0800 | [diff] [blame] | 797 | mkdir /data/misc/audioserver 0700 audioserver audioserver | 
| Keun Soo Yim | be54c54 | 2016-03-01 12:45:27 -0800 | [diff] [blame] | 798 | mkdir /data/misc/cameraserver 0700 cameraserver cameraserver | 
| Paul Crowley | f8a6fa5 | 2015-06-03 13:33:43 +0100 | [diff] [blame] | 799 | mkdir /data/misc/vold 0700 root root | 
| Yasuhiro Matsuda | f93db4b | 2015-06-15 18:49:35 +0900 | [diff] [blame] | 800 | mkdir /data/misc/boottrace 0771 system shell | 
| David Zeuthen | 1591478 | 2015-10-07 14:00:55 -0400 | [diff] [blame] | 801 | mkdir /data/misc/update_engine 0700 root root | 
| Tianjie Xu | 74fa3ca | 2017-11-03 10:59:36 -0700 | [diff] [blame] | 802 | mkdir /data/misc/update_engine_log 02750 root log | 
| Calin Juravle | 9b3e5d5 | 2015-11-10 19:16:43 +0000 | [diff] [blame] | 803 | mkdir /data/misc/trace 0700 root root | 
| Vishnu Nair | d09ab7a | 2017-11-27 09:54:31 -0800 | [diff] [blame] | 804 | # create location to store surface and window trace files | 
|  | 805 | mkdir /data/misc/wmtrace 0700 system system | 
| Hongming Jin | 87f55fe | 2021-02-09 11:54:46 -0800 | [diff] [blame] | 806 | # create location to store accessibility trace files | 
|  | 807 | mkdir /data/misc/a11ytrace 0700 system system | 
| Calin Juravle | 807f23a | 2016-02-01 19:27:01 +0000 | [diff] [blame] | 808 | # profile file layout | 
|  | 809 | mkdir /data/misc/profiles 0771 system system | 
|  | 810 | mkdir /data/misc/profiles/cur 0771 system system | 
| Calin Juravle | 11197dd | 2021-05-14 11:28:04 -0700 | [diff] [blame] | 811 | mkdir /data/misc/profiles/ref 0771 system system | 
| David Sehr | 0eb24e1 | 2016-05-28 14:10:38 -0700 | [diff] [blame] | 812 | mkdir /data/misc/profman 0770 system shell | 
| Ryan Campbell | 0b36473 | 2017-02-21 17:27:02 -0800 | [diff] [blame] | 813 | mkdir /data/misc/gcov 0770 root root | 
| Paul Crowley | 26aabfd | 2019-08-16 12:39:17 -0700 | [diff] [blame] | 814 | mkdir /data/misc/installd 0700 root root | 
| Oli Lan | 90c523b | 2020-01-17 11:41:04 +0000 | [diff] [blame] | 815 | mkdir /data/misc/apexdata 0711 root root | 
| Oli Lan | 4370ff5 | 2019-12-02 18:24:12 +0000 | [diff] [blame] | 816 | mkdir /data/misc/apexrollback 0700 root root | 
| Andrei Onea | 3c50588 | 2020-12-23 15:26:11 +0000 | [diff] [blame] | 817 | mkdir /data/misc/appcompat/ 0700 system system | 
| Yifan Hong | 7d28688 | 2020-02-08 16:38:56 -0800 | [diff] [blame] | 818 | mkdir /data/misc/snapshotctl_log 0755 root root | 
| Jerry Chang | aedac7e | 2020-01-02 10:57:30 +0800 | [diff] [blame] | 819 | # create location to store pre-reboot information | 
|  | 820 | mkdir /data/misc/prereboot 0700 system system | 
| Orion Hodson | 44bedf6 | 2021-04-09 15:04:15 +0100 | [diff] [blame] | 821 | # directory used for on-device refresh metrics file. | 
|  | 822 | mkdir /data/misc/odrefresh 0777 system system | 
| Martijn Coenen | 00e51a4 | 2020-11-27 12:21:34 +0100 | [diff] [blame] | 823 | # directory used for on-device signing key blob | 
| Shikha Panwar | 4b91af7 | 2022-03-09 18:35:33 +0000 | [diff] [blame] | 824 | mkdir /data/misc/odsign 0710 root system | 
|  | 825 | # directory used for odsign metrics | 
|  | 826 | mkdir /data/misc/odsign/metrics 0770 root system | 
| Christopher Ferris | 3fa3f86 | 2022-07-14 21:53:47 +0000 | [diff] [blame] | 827 |  | 
| Alan Stokes | df84dd9 | 2022-04-27 17:27:19 +0100 | [diff] [blame] | 828 | # Directory for VirtualizationService temporary image files. | 
|  | 829 | # Delete any stale files owned by the old virtualizationservice uid (b/230056726). | 
|  | 830 | chmod 0770 /data/misc/virtualizationservice | 
|  | 831 | exec - virtualizationservice system -- /bin/rm -rf /data/misc/virtualizationservice | 
| David Brazdil | bc491e2 | 2022-12-17 13:41:25 +0000 | [diff] [blame] | 832 | mkdir /data/misc/virtualizationservice 0771 system system | 
| Stephen Smalley | deb41e5 | 2013-10-01 09:21:47 -0400 | [diff] [blame] | 833 |  | 
| Eric Biggers | 72c781d | 2022-05-11 23:31:08 +0000 | [diff] [blame] | 834 | # /data/preloads uses encryption=None because it only contains preloaded | 
|  | 835 | # files that are public information, similar to the system image. | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 836 | mkdir /data/preloads 0775 system system encryption=None | 
| Anton Hansson | c38a636 | 2018-10-24 15:29:16 +0100 | [diff] [blame] | 837 |  | 
| Nick Kralevich | f3ef127 | 2012-03-14 15:22:54 -0700 | [diff] [blame] | 838 | # For security reasons, /data/local/tmp should always be empty. | 
|  | 839 | # Do not place files or directories in /data/local/tmp | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 840 | mkdir /data/local/tmp 0771 shell shell | 
| Max Bires | 181d11c | 2018-01-18 14:23:51 -0800 | [diff] [blame] | 841 | mkdir /data/local/traces 0777 shell shell | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 842 | mkdir /data/app-private 0771 system system encryption=Require | 
|  | 843 | mkdir /data/app-ephemeral 0771 system system encryption=Require | 
|  | 844 | mkdir /data/app-asec 0700 root root encryption=Require | 
|  | 845 | mkdir /data/app-lib 0771 system system encryption=Require | 
|  | 846 | mkdir /data/app 0771 system system encryption=Require | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 847 |  | 
| Seigo Nonaka | 18e4372 | 2020-11-17 20:06:49 -0800 | [diff] [blame] | 848 | # create directory for updated font files. | 
|  | 849 | mkdir /data/fonts/ 0771 root root encryption=Require | 
|  | 850 | mkdir /data/fonts/files 0771 system system | 
|  | 851 | mkdir /data/fonts/config 0770 system system | 
|  | 852 |  | 
| Colin Cross | 7201ef8 | 2020-08-31 16:15:28 -0700 | [diff] [blame] | 853 | # Create directories to push tests to for each linker namespace. | 
|  | 854 | # Create the subdirectories in case the first test is run as root | 
|  | 855 | # so it doesn't end up owned by root. | 
| Christopher Ferris | 2163bbb | 2021-09-08 12:36:24 -0700 | [diff] [blame] | 856 | # Set directories to be executable by any process so that debuggerd, | 
|  | 857 | # aka crash_dump, can read any executables/shared libraries. | 
|  | 858 | mkdir /data/local/tests 0701 shell shell | 
|  | 859 | mkdir /data/local/tests/product 0701 shell shell | 
|  | 860 | mkdir /data/local/tests/system 0701 shell shell | 
|  | 861 | mkdir /data/local/tests/unrestricted 0701 shell shell | 
|  | 862 | mkdir /data/local/tests/vendor 0701 shell shell | 
| Colin Cross | 7201ef8 | 2020-08-31 16:15:28 -0700 | [diff] [blame] | 863 |  | 
| Chia-chi Yeh | ea74414 | 2011-07-08 16:52:18 -0700 | [diff] [blame] | 864 | # create dalvik-cache, so as to enforce our permissions | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 865 | mkdir /data/dalvik-cache 0771 root root encryption=Require | 
| Andreas Gampe | 7dfcc92 | 2015-12-08 09:33:07 -0800 | [diff] [blame] | 866 | # create the A/B OTA directory, so as to enforce our permissions | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 867 | mkdir /data/ota 0771 root root encryption=Require | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 868 |  | 
| Tao Bao | 380d6b1 | 2016-05-25 16:41:08 -0700 | [diff] [blame] | 869 | # create the OTA package directory. It will be accessed by GmsCore (cache | 
|  | 870 | # group), update_engine and update_verifier. | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 871 | mkdir /data/ota_package 0770 system cache encryption=Require | 
| Tao Bao | 380d6b1 | 2016-05-25 16:41:08 -0700 | [diff] [blame] | 872 |  | 
| Mårten Kongstad | b45280d | 2011-05-30 10:24:54 +0200 | [diff] [blame] | 873 | # create resource-cache and double-check the perms | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 874 | mkdir /data/resource-cache 0771 system system encryption=Require | 
| Mårten Kongstad | b45280d | 2011-05-30 10:24:54 +0200 | [diff] [blame] | 875 | chown system system /data/resource-cache | 
|  | 876 | chmod 0771 /data/resource-cache | 
|  | 877 |  | 
| Eric Biggers | 72c781d | 2022-05-11 23:31:08 +0000 | [diff] [blame] | 878 | # Ensure that lost+found exists and has the correct permissions.  Linux | 
|  | 879 | # filesystems expect this directory to exist; it's where the fsck tool puts | 
|  | 880 | # any recovered files that weren't present in any directory.  It must be | 
|  | 881 | # unencrypted, as fsck must be able to write to it. | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 882 | mkdir /data/lost+found 0770 root root encryption=None | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 883 |  | 
| James Dong | 09cdc0e | 2012-01-06 15:19:26 -0800 | [diff] [blame] | 884 | # create directory for DRM plug-ins - give drm the read/write access to | 
|  | 885 | # the following directory. | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 886 | mkdir /data/drm 0770 drm drm encryption=Require | 
| aimitakeshi | e572d59 | 2010-07-27 08:38:35 +0900 | [diff] [blame] | 887 |  | 
| Jeff Tinker | 08d6430 | 2013-04-23 19:54:17 -0700 | [diff] [blame] | 888 | # create directory for MediaDrm plug-ins - give drm the read/write access to | 
|  | 889 | # the following directory. | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 890 | mkdir /data/mediadrm 0770 mediadrm mediadrm encryption=Require | 
| Jeff Tinker | 08d6430 | 2013-04-23 19:54:17 -0700 | [diff] [blame] | 891 |  | 
| Tom Cherry | c319310 | 2017-11-21 10:40:25 -0800 | [diff] [blame] | 892 | # NFC: create data/nfc for nv storage | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 893 | mkdir /data/nfc 0770 nfc nfc encryption=Require | 
| Tom Cherry | c319310 | 2017-11-21 10:40:25 -0800 | [diff] [blame] | 894 | mkdir /data/nfc/param 0770 nfc nfc | 
|  | 895 |  | 
| Paul Lawrence | c410b3b | 2015-03-26 15:49:42 +0000 | [diff] [blame] | 896 | # Create all remaining /data root dirs so that they are made through init | 
|  | 897 | # and get proper encryption policy installed | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 898 | mkdir /data/backup 0700 system system encryption=Require | 
|  | 899 | mkdir /data/ss 0700 system system encryption=Require | 
| Jeff Sharkey | 1170586 | 2015-11-09 17:07:35 -0800 | [diff] [blame] | 900 |  | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 901 | mkdir /data/system 0775 system system encryption=Require | 
| Artur Satayev | 441e6b9 | 2021-03-30 11:49:05 +0100 | [diff] [blame] | 902 | mkdir /data/system/environ 0700 system system | 
|  | 903 | # b/183861600 attempt to fix selinux label before running derive_classpath service | 
|  | 904 | restorecon /data/system/environ | 
| Jeff Vander Stoep | 148dea7 | 2018-04-16 16:04:38 -0700 | [diff] [blame] | 905 | mkdir /data/system/dropbox 0700 system system | 
| Nick Kralevich | 9c0437f | 2015-04-07 16:44:08 -0700 | [diff] [blame] | 906 | mkdir /data/system/heapdump 0700 system system | 
| Jeff Sharkey | c9b84a3 | 2016-04-14 21:09:34 -0600 | [diff] [blame] | 907 | mkdir /data/system/users 0775 system system | 
| Woody Lin | 0bcf0bf | 2023-02-08 11:25:21 +0800 | [diff] [blame] | 908 | # Mkdir and set SELinux security contexts for shutdown-checkpoints. | 
|  | 909 | # TODO(b/270286197): remove these after couple releases. | 
|  | 910 | mkdir /data/system/shutdown-checkpoints 0700 system system | 
|  | 911 | restorecon_recursive /data/system/shutdown-checkpoints | 
| Jeff Sharkey | 3b9c83a | 2016-02-03 14:44:44 -0700 | [diff] [blame] | 912 |  | 
| Eric Biggers | 72c781d | 2022-05-11 23:31:08 +0000 | [diff] [blame] | 913 | # Create the parent directories of the user CE and DE storage directories. | 
|  | 914 | # These parent directories must use encryption=None, since each of their | 
|  | 915 | # subdirectories uses a different encryption policy (a per-user one), and | 
|  | 916 | # encryption policies apply recursively.  These directories should never | 
|  | 917 | # contain any subdirectories other than the per-user ones.  /data/media/obb | 
|  | 918 | # is an exception that exists for legacy reasons. | 
|  | 919 | mkdir /data/media 0770 media_rw media_rw encryption=None | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 920 | mkdir /data/misc_ce 01771 system misc encryption=None | 
| Eric Biggers | 72c781d | 2022-05-11 23:31:08 +0000 | [diff] [blame] | 921 | mkdir /data/misc_de 01771 system misc encryption=None | 
|  | 922 | mkdir /data/system_ce 0770 system system encryption=None | 
|  | 923 | mkdir /data/system_de 0770 system system encryption=None | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 924 | mkdir /data/user 0711 system system encryption=None | 
|  | 925 | mkdir /data/user_de 0711 system system encryption=None | 
| Eric Biggers | 72c781d | 2022-05-11 23:31:08 +0000 | [diff] [blame] | 926 | mkdir /data/vendor_ce 0771 root root encryption=None | 
|  | 927 | mkdir /data/vendor_de 0771 root root encryption=None | 
| Ricky Wai | 3cca270 | 2019-12-12 12:55:03 +0000 | [diff] [blame] | 928 |  | 
| Eric Biggers | dce8ba2 | 2022-05-17 02:26:16 +0000 | [diff] [blame] | 929 | # Set the casefold flag on /data/media.  For upgrades, a restorecon can be | 
|  | 930 | # needed first to relabel the directory from media_rw_data_file. | 
|  | 931 | restorecon /data/media | 
|  | 932 | exec - media_rw media_rw -- /system/bin/chattr +F /data/media | 
|  | 933 |  | 
| Sanjana Sunil | 5c7ff88 | 2022-03-28 19:05:36 +0000 | [diff] [blame] | 934 | # A tmpfs directory, which will contain all apps and sdk sandbox CE and DE | 
|  | 935 | # data directory that bind mount from the original source. | 
| Ricky Wai | 1a5ae50 | 2020-03-04 13:30:09 +0000 | [diff] [blame] | 936 | mount tmpfs tmpfs /data_mirror nodev noexec nosuid mode=0700,uid=0,gid=1000 | 
| Ricky Wai | 3cca270 | 2019-12-12 12:55:03 +0000 | [diff] [blame] | 937 | restorecon /data_mirror | 
|  | 938 | mkdir /data_mirror/data_ce 0700 root root | 
|  | 939 | mkdir /data_mirror/data_de 0700 root root | 
| Sanjana Sunil | 5c7ff88 | 2022-03-28 19:05:36 +0000 | [diff] [blame] | 940 | mkdir /data_mirror/misc_ce 0700 root root | 
|  | 941 | mkdir /data_mirror/misc_de 0700 root root | 
| Ricky Wai | 3cca270 | 2019-12-12 12:55:03 +0000 | [diff] [blame] | 942 |  | 
|  | 943 | # Create CE and DE data directory for default volume | 
|  | 944 | mkdir /data_mirror/data_ce/null 0700 root root | 
|  | 945 | mkdir /data_mirror/data_de/null 0700 root root | 
| Sanjana Sunil | 5c7ff88 | 2022-03-28 19:05:36 +0000 | [diff] [blame] | 946 | mkdir /data_mirror/misc_ce/null 0700 root root | 
|  | 947 | mkdir /data_mirror/misc_de/null 0700 root root | 
| Ricky Wai | 3cca270 | 2019-12-12 12:55:03 +0000 | [diff] [blame] | 948 |  | 
| Eric Biggers | ef92752 | 2022-05-11 05:33:21 +0000 | [diff] [blame] | 949 | # Bind mount CE and DE data directory to mirror's default volume directory. | 
| Eric Biggers | 28a1969 | 2022-10-26 17:49:01 +0000 | [diff] [blame] | 950 | # Note that because the /data mount has the "shared" propagation type, the | 
|  | 951 | # later bind mount of /data/data onto /data/user/0 will automatically | 
|  | 952 | # propagate to /data_mirror/data_ce/null/0 as well. | 
|  | 953 | mount none /data/user /data_mirror/data_ce/null bind rec | 
| Ricky Wai | 3cca270 | 2019-12-12 12:55:03 +0000 | [diff] [blame] | 954 | mount none /data/user_de /data_mirror/data_de/null bind rec | 
| Sanjana Sunil | 5c7ff88 | 2022-03-28 19:05:36 +0000 | [diff] [blame] | 955 | mount none /data/misc_ce /data_mirror/misc_ce/null bind rec | 
|  | 956 | mount none /data/misc_de /data_mirror/misc_de/null bind rec | 
| Ricky Wai | 3cca270 | 2019-12-12 12:55:03 +0000 | [diff] [blame] | 957 |  | 
| Ricky Wai | fdc0986 | 2019-12-13 17:32:18 +0000 | [diff] [blame] | 958 | # Create mirror directory for jit profiles | 
|  | 959 | mkdir /data_mirror/cur_profiles 0700 root root | 
|  | 960 | mount none /data/misc/profiles/cur /data_mirror/cur_profiles bind rec | 
| Ricky Wai | 420830f | 2021-06-08 12:15:14 +0100 | [diff] [blame] | 961 | mkdir /data_mirror/ref_profiles 0700 root root | 
|  | 962 | mount none /data/misc/profiles/ref /data_mirror/ref_profiles bind rec | 
| Ricky Wai | fdc0986 | 2019-12-13 17:32:18 +0000 | [diff] [blame] | 963 |  | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 964 | mkdir /data/cache 0770 system cache encryption=Require | 
| Yueyao (Nathan) Zhu | 60c6dac | 2016-06-21 12:04:54 -0700 | [diff] [blame] | 965 | mkdir /data/cache/recovery 0770 system cache | 
|  | 966 | mkdir /data/cache/backup_stage 0700 system system | 
|  | 967 | mkdir /data/cache/backup 0700 system system | 
|  | 968 |  | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 969 | # Delete these if need be, per b/139193659 | 
|  | 970 | mkdir /data/rollback 0700 system system encryption=DeleteIfNecessary | 
|  | 971 | mkdir /data/rollback-observer 0700 system system encryption=DeleteIfNecessary | 
| JW Wang | 5fc74a4 | 2020-11-13 15:45:49 +0800 | [diff] [blame] | 972 | mkdir /data/rollback-history 0700 system system encryption=DeleteIfNecessary | 
| Paul Crowley | 8184d7c | 2019-08-09 14:13:41 -0700 | [diff] [blame] | 973 |  | 
| Songchun Fan | 2849624 | 2019-12-17 12:41:34 -0800 | [diff] [blame] | 974 | # Create root dir for Incremental Service | 
| Songchun Fan | 73d9e7d | 2019-12-19 16:04:11 -0800 | [diff] [blame] | 975 | mkdir /data/incremental 0771 system system encryption=Require | 
| Songchun Fan | 2849624 | 2019-12-17 12:41:34 -0800 | [diff] [blame] | 976 |  | 
| Jeffrey Huang | 8dccf3f | 2020-02-19 10:56:17 -0800 | [diff] [blame] | 977 | # Create directories for statsd | 
| Jeffrey Huang | 8dccf3f | 2020-02-19 10:56:17 -0800 | [diff] [blame] | 978 | mkdir /data/misc/stats-active-metric/ 0770 statsd system | 
| Jeffrey Huang | 58c8861 | 2020-03-05 08:53:11 -0800 | [diff] [blame] | 979 | mkdir /data/misc/stats-data/ 0770 statsd system | 
| Jeffrey Huang | 01a73d7 | 2023-02-13 15:01:07 -0800 | [diff] [blame] | 980 | mkdir /data/misc/stats-data/restricted-data 0770 statsd system | 
| Jeffrey Huang | 58c8861 | 2020-03-05 08:53:11 -0800 | [diff] [blame] | 981 | mkdir /data/misc/stats-metadata/ 0770 statsd system | 
|  | 982 | mkdir /data/misc/stats-service/ 0770 statsd system | 
| Jeffrey Huang | 8dccf3f | 2020-02-19 10:56:17 -0800 | [diff] [blame] | 983 | mkdir /data/misc/train-info/ 0770 statsd system | 
|  | 984 |  | 
| Jiyong Park | dcbaf9f | 2019-02-22 22:15:25 +0900 | [diff] [blame] | 985 | # Wait for apexd to finish activating APEXes before starting more processes. | 
| Oli Lan | 3cb185e | 2020-02-06 11:55:51 +0000 | [diff] [blame] | 986 | wait_for_prop apexd.status activated | 
| Oli Lan | 13e51e7 | 2019-11-19 18:08:45 +0000 | [diff] [blame] | 987 | perform_apex_config | 
|  | 988 |  | 
| Josh Yang | ef76c81 | 2021-12-23 14:40:00 -0800 | [diff] [blame] | 989 | # Create directories for boot animation. | 
| Josh Yang | a1039f9 | 2022-05-12 18:03:24 -0700 | [diff] [blame] | 990 | mkdir /data/bootanim 0755 system system encryption=DeleteIfNecessary | 
| Josh Yang | ef76c81 | 2021-12-23 14:40:00 -0800 | [diff] [blame] | 991 |  | 
| Anton Hansson | 3c5cc31 | 2019-12-05 15:38:37 +0000 | [diff] [blame] | 992 | exec_start derive_sdk | 
| Jiyong Park | dcbaf9f | 2019-02-22 22:15:25 +0900 | [diff] [blame] | 993 |  | 
| Paul Crowley | 5949745 | 2016-02-01 16:37:13 +0000 | [diff] [blame] | 994 | init_user0 | 
|  | 995 |  | 
| Martijn Coenen | c7a26dc | 2021-01-18 11:14:22 +0100 | [diff] [blame] | 996 | # Set SELinux security contexts on upgrade or policy update. | 
|  | 997 | restorecon --recursive --skip-ce /data | 
|  | 998 |  | 
| Artur Satayev | 7df7997 | 2021-03-30 11:56:40 +0100 | [diff] [blame] | 999 | # Define and export *CLASSPATH variables | 
|  | 1000 | # Must start before 'odsign', as odsign depends on *CLASSPATH variables | 
|  | 1001 | exec_start derive_classpath | 
|  | 1002 | load_exports /data/system/environ/classpath | 
| Artur Satayev | 7df7997 | 2021-03-30 11:56:40 +0100 | [diff] [blame] | 1003 |  | 
| Martijn Coenen | 00e51a4 | 2020-11-27 12:21:34 +0100 | [diff] [blame] | 1004 | # Start the on-device signing daemon, and wait for it to finish, to ensure | 
|  | 1005 | # ART artifacts are generated if needed. | 
| satayev | 52cc896 | 2021-03-19 11:08:49 +0000 | [diff] [blame] | 1006 | # Must start after 'derive_classpath' to have *CLASSPATH variables set. | 
| Martijn Coenen | 648dec6 | 2021-03-17 08:44:55 +0100 | [diff] [blame] | 1007 | start odsign | 
|  | 1008 |  | 
|  | 1009 | # Before we can lock keys and proceed to the next boot stage, wait for | 
|  | 1010 | # odsign to be done with the key | 
|  | 1011 | wait_for_prop odsign.key.done 1 | 
| Martijn Coenen | 00e51a4 | 2020-11-27 12:21:34 +0100 | [diff] [blame] | 1012 |  | 
| Martijn Coenen | c7a26dc | 2021-01-18 11:14:22 +0100 | [diff] [blame] | 1013 | # Lock the fs-verity keyring, so no more keys can be added | 
|  | 1014 | exec -- /system/bin/fsverity_init --lock | 
|  | 1015 |  | 
| Paul Crowley | 7583da1 | 2021-04-08 17:04:43 +0000 | [diff] [blame] | 1016 | # Bump the boot level to 1000000000; this prevents further on-device signing. | 
|  | 1017 | # This is a special value that shuts down the thread which listens for | 
|  | 1018 | # further updates. | 
|  | 1019 | setprop keystore.boot_level 1000000000 | 
| Martijn Coenen | e94b366 | 2021-03-09 10:57:00 +0100 | [diff] [blame] | 1020 |  | 
| Oli Lan | a466ca8 | 2020-01-23 19:52:42 +0000 | [diff] [blame] | 1021 | # Allow apexd to snapshot and restore device encrypted apex data in the case | 
|  | 1022 | # of a rollback. This should be done immediately after DE_user data keys | 
|  | 1023 | # are loaded. APEXes should not access this data until this has been | 
| Oli Lan | 3cb185e | 2020-02-06 11:55:51 +0000 | [diff] [blame] | 1024 | # completed and apexd.status becomes "ready". | 
| Oli Lan | a466ca8 | 2020-01-23 19:52:42 +0000 | [diff] [blame] | 1025 | exec_start apexd-snapshotde | 
|  | 1026 |  | 
| Joel Fernandes | ae7f052 | 2019-01-31 19:27:23 -0500 | [diff] [blame] | 1027 | # sys.memfd_use set to false by default, which keeps it disabled | 
|  | 1028 | # until it is confirmed that apps and vendor processes don't make | 
|  | 1029 | # IOCTLs on ashmem fds any more. | 
|  | 1030 | setprop sys.use_memfd false | 
|  | 1031 |  | 
| Wei Wang | ec78cca | 2019-04-19 10:58:39 -0700 | [diff] [blame] | 1032 | # Set fscklog permission | 
|  | 1033 | chown root system /dev/fscklogs/log | 
|  | 1034 | chmod 0770 /dev/fscklogs/log | 
|  | 1035 |  | 
| Zim | 8dacabe | 2020-02-10 20:24:40 +0000 | [diff] [blame] | 1036 | # Enable FUSE by default | 
|  | 1037 | setprop persist.sys.fuse true | 
|  | 1038 |  | 
| Nathan Huckleberry | 8f6fcd1 | 2022-10-21 00:45:05 +0000 | [diff] [blame] | 1039 | # Update dm-verity state and set partition.*.verified properties. | 
|  | 1040 | verity_update_state | 
|  | 1041 |  | 
| Wei Wang | 53842e7 | 2017-04-20 14:37:55 -0700 | [diff] [blame] | 1042 | # It is recommended to put unnecessary data/ initialization from post-fs-data | 
|  | 1043 | # to start-zygote in device's init.rc to unblock zygote start. | 
|  | 1044 | on zygote-start && property:ro.crypto.state=unencrypted | 
| Martijn Coenen | 648dec6 | 2021-03-17 08:44:55 +0100 | [diff] [blame] | 1045 | wait_for_prop odsign.verification.done 1 | 
| Wei Wang | 53842e7 | 2017-04-20 14:37:55 -0700 | [diff] [blame] | 1046 | # A/B update verifier that marks a successful boot. | 
|  | 1047 | exec_start update_verifier_nonencrypted | 
| Keun young Park | 6423ccd | 2020-06-23 20:32:54 -0700 | [diff] [blame] | 1048 | start statsd | 
| Wei Wang | 53842e7 | 2017-04-20 14:37:55 -0700 | [diff] [blame] | 1049 | start netd | 
| Christopher Ferris | 3fa3f86 | 2022-07-14 21:53:47 +0000 | [diff] [blame] | 1050 | start zygote | 
|  | 1051 | start zygote_secondary | 
| Wei Wang | 53842e7 | 2017-04-20 14:37:55 -0700 | [diff] [blame] | 1052 |  | 
|  | 1053 | on zygote-start && property:ro.crypto.state=unsupported | 
| Martijn Coenen | 648dec6 | 2021-03-17 08:44:55 +0100 | [diff] [blame] | 1054 | wait_for_prop odsign.verification.done 1 | 
| Wei Wang | 53842e7 | 2017-04-20 14:37:55 -0700 | [diff] [blame] | 1055 | # A/B update verifier that marks a successful boot. | 
|  | 1056 | exec_start update_verifier_nonencrypted | 
| Keun young Park | 6423ccd | 2020-06-23 20:32:54 -0700 | [diff] [blame] | 1057 | start statsd | 
| Wei Wang | 53842e7 | 2017-04-20 14:37:55 -0700 | [diff] [blame] | 1058 | start netd | 
| Christopher Ferris | 3fa3f86 | 2022-07-14 21:53:47 +0000 | [diff] [blame] | 1059 | start zygote | 
|  | 1060 | start zygote_secondary | 
| Wei Wang | 53842e7 | 2017-04-20 14:37:55 -0700 | [diff] [blame] | 1061 |  | 
| Wei Wang | bae9ba3 | 2017-03-09 12:35:02 -0800 | [diff] [blame] | 1062 | on zygote-start && property:ro.crypto.state=encrypted && property:ro.crypto.type=file | 
| Martijn Coenen | 648dec6 | 2021-03-17 08:44:55 +0100 | [diff] [blame] | 1063 | wait_for_prop odsign.verification.done 1 | 
| Wei Wang | 53842e7 | 2017-04-20 14:37:55 -0700 | [diff] [blame] | 1064 | # A/B update verifier that marks a successful boot. | 
|  | 1065 | exec_start update_verifier_nonencrypted | 
| Keun young Park | 6423ccd | 2020-06-23 20:32:54 -0700 | [diff] [blame] | 1066 | start statsd | 
| Wei Wang | 53842e7 | 2017-04-20 14:37:55 -0700 | [diff] [blame] | 1067 | start netd | 
|  | 1068 | start zygote | 
|  | 1069 | start zygote_secondary | 
| Wei Wang | bae9ba3 | 2017-03-09 12:35:02 -0800 | [diff] [blame] | 1070 |  | 
| Jaegeuk Kim | 58ff507 | 2019-04-02 07:01:43 -0700 | [diff] [blame] | 1071 | on boot && property:ro.config.low_ram=true | 
|  | 1072 | # Tweak background writeout | 
|  | 1073 | write /proc/sys/vm/dirty_expire_centisecs 200 | 
|  | 1074 | write /proc/sys/vm/dirty_background_ratio  5 | 
|  | 1075 |  | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 1076 | on boot | 
| Riley Andrews | 6dfdc7c | 2014-06-18 20:35:40 -0700 | [diff] [blame] | 1077 | # basic network init | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 1078 | ifup lo | 
|  | 1079 | hostname localhost | 
|  | 1080 | domainname localdomain | 
|  | 1081 |  | 
| Benedict Wong | 00308f8 | 2018-03-12 19:00:50 -0700 | [diff] [blame] | 1082 | # IPsec SA default expiration length | 
|  | 1083 | write /proc/sys/net/core/xfrm_acq_expires 3600 | 
|  | 1084 |  | 
| Riley Andrews | 6dfdc7c | 2014-06-18 20:35:40 -0700 | [diff] [blame] | 1085 | # Memory management.  Basic kernel parameters, and allow the high | 
|  | 1086 | # level system server to be able to adjust the kernel OOM driver | 
|  | 1087 | # parameters to match how it is managing things. | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 1088 | write /proc/sys/vm/overcommit_memory 1 | 
| The Android Open Source Project | e037fd7 | 2009-03-13 13:04:37 -0700 | [diff] [blame] | 1089 | write /proc/sys/vm/min_free_order_shift 4 | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 1090 |  | 
| Srinivas Paladugu | 3a63283 | 2019-01-09 11:28:59 -0800 | [diff] [blame] | 1091 | # System server manages zram writeback | 
|  | 1092 | chown root system /sys/block/zram0/idle | 
|  | 1093 | chmod 0664 /sys/block/zram0/idle | 
|  | 1094 | chown root system /sys/block/zram0/writeback | 
|  | 1095 | chmod 0664 /sys/block/zram0/writeback | 
|  | 1096 |  | 
| Jaegeuk Kim | 43dca3c | 2020-07-20 17:34:47 -0700 | [diff] [blame] | 1097 | # to access F2FS sysfs on dm-<num> directly | 
|  | 1098 | mkdir /dev/sys/fs/by-name 0755 system system | 
| Guo Weichao | bcefbb1 | 2021-05-26 11:12:11 +0800 | [diff] [blame] | 1099 | symlink /sys/fs/f2fs/${dev.mnt.dev.data} /dev/sys/fs/by-name/userdata | 
| Jaegeuk Kim | 43dca3c | 2020-07-20 17:34:47 -0700 | [diff] [blame] | 1100 |  | 
| Jaegeuk Kim | 120f6b2 | 2022-03-04 15:06:02 -0800 | [diff] [blame] | 1101 | # dev.mnt.dev.data=dm-N, dev.mnt.blk.data=sdaN/mmcblk0pN, dev.mnt.rootdisk.data=sda/mmcblk0, or | 
|  | 1102 | # dev.mnt.dev.data=sdaN/mmcblk0pN, dev.mnt.blk.data=sdaN/mmcblk0pN, dev.mnt.rootdisk.data=sda/mmcblk0 | 
| Jaegeuk Kim | 43dca3c | 2020-07-20 17:34:47 -0700 | [diff] [blame] | 1103 | mkdir /dev/sys/block/by-name 0755 system system | 
| Juhyung Park | 852111e | 2022-02-15 18:05:06 +0900 | [diff] [blame] | 1104 | symlink /sys/class/block/${dev.mnt.dev.data} /dev/sys/block/by-name/userdata | 
| Jaegeuk Kim | 120f6b2 | 2022-03-04 15:06:02 -0800 | [diff] [blame] | 1105 | symlink /sys/class/block/${dev.mnt.rootdisk.data} /dev/sys/block/by-name/rootdisk | 
| Jaegeuk Kim | 43dca3c | 2020-07-20 17:34:47 -0700 | [diff] [blame] | 1106 |  | 
| Jaegeuk Kim | 58ff507 | 2019-04-02 07:01:43 -0700 | [diff] [blame] | 1107 | # F2FS tuning. Set cp_interval larger than dirty_expire_centisecs, 30 secs, | 
| Jaegeuk Kim | f65df96 | 2019-03-29 09:16:51 -0700 | [diff] [blame] | 1108 | # to avoid power consumption when system becomes mostly idle. Be careful | 
|  | 1109 | # to make it too large, since it may bring userdata loss, if they | 
|  | 1110 | # are not aware of using fsync()/sync() to prepare sudden power-cut. | 
| Jaegeuk Kim | 43dca3c | 2020-07-20 17:34:47 -0700 | [diff] [blame] | 1111 | write /dev/sys/fs/by-name/userdata/cp_interval 200 | 
|  | 1112 | write /dev/sys/fs/by-name/userdata/gc_urgent_sleep_time 50 | 
| Daeho Jeong | 2accf5b | 2022-11-29 21:04:12 +0000 | [diff] [blame] | 1113 | write /dev/sys/fs/by-name/userdata/iostat_period_ms 1000 | 
| Jaegeuk Kim | 43dca3c | 2020-07-20 17:34:47 -0700 | [diff] [blame] | 1114 | write /dev/sys/fs/by-name/userdata/iostat_enable 1 | 
| Jaegeuk Kim | f65df96 | 2019-03-29 09:16:51 -0700 | [diff] [blame] | 1115 |  | 
| Daeho Jeong | 431e35e | 2022-04-29 11:49:07 -0700 | [diff] [blame] | 1116 | # set readahead multiplier for POSIX_FADV_SEQUENTIAL files | 
|  | 1117 | write /dev/sys/fs/by-name/userdata/seq_file_ra_mul 16 | 
|  | 1118 |  | 
| Jaegeuk Kim | fe9e8a3 | 2019-11-27 15:42:10 -0800 | [diff] [blame] | 1119 | # limit discard size to 128MB in order to avoid long IO latency | 
|  | 1120 | # for filesystem tuning first (dm or sda) | 
| Jaegeuk Kim | 120f6b2 | 2022-03-04 15:06:02 -0800 | [diff] [blame] | 1121 | # this requires enabling selinux entry for sda/mmcblk0 in vendor side | 
| Jaegeuk Kim | 43dca3c | 2020-07-20 17:34:47 -0700 | [diff] [blame] | 1122 | write /dev/sys/block/by-name/userdata/queue/discard_max_bytes 134217728 | 
| Jaegeuk Kim | 120f6b2 | 2022-03-04 15:06:02 -0800 | [diff] [blame] | 1123 | write /dev/sys/block/by-name/rootdisk/queue/discard_max_bytes 134217728 | 
| Jaegeuk Kim | fe9e8a3 | 2019-11-27 15:42:10 -0800 | [diff] [blame] | 1124 |  | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 1125 | # Permissions for System Server and daemons. | 
| Arve Hjønnevåg | 70a163f | 2012-05-02 17:57:50 -0700 | [diff] [blame] | 1126 | chown system system /sys/power/autosleep | 
| Todd Poynor | 0653b97 | 2012-04-11 14:48:51 -0700 | [diff] [blame] | 1127 |  | 
|  | 1128 | chown system system /sys/devices/system/cpu/cpufreq/interactive/timer_rate | 
|  | 1129 | chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/timer_rate | 
| Todd Poynor | 2b5b3bb | 2012-12-20 18:52:03 -0800 | [diff] [blame] | 1130 | chown system system /sys/devices/system/cpu/cpufreq/interactive/timer_slack | 
|  | 1131 | chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/timer_slack | 
| Todd Poynor | 0653b97 | 2012-04-11 14:48:51 -0700 | [diff] [blame] | 1132 | chown system system /sys/devices/system/cpu/cpufreq/interactive/min_sample_time | 
|  | 1133 | chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/min_sample_time | 
|  | 1134 | chown system system /sys/devices/system/cpu/cpufreq/interactive/hispeed_freq | 
|  | 1135 | chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/hispeed_freq | 
| Todd Poynor | 2b5b3bb | 2012-12-20 18:52:03 -0800 | [diff] [blame] | 1136 | chown system system /sys/devices/system/cpu/cpufreq/interactive/target_loads | 
|  | 1137 | chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/target_loads | 
| Todd Poynor | 0653b97 | 2012-04-11 14:48:51 -0700 | [diff] [blame] | 1138 | chown system system /sys/devices/system/cpu/cpufreq/interactive/go_hispeed_load | 
|  | 1139 | chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/go_hispeed_load | 
| Todd Poynor | f35c203 | 2012-04-19 13:17:24 -0700 | [diff] [blame] | 1140 | chown system system /sys/devices/system/cpu/cpufreq/interactive/above_hispeed_delay | 
|  | 1141 | chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/above_hispeed_delay | 
| Todd Poynor | 8d3ea1d | 2012-04-24 15:37:13 -0700 | [diff] [blame] | 1142 | chown system system /sys/devices/system/cpu/cpufreq/interactive/boost | 
|  | 1143 | chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/boost | 
| Todd Poynor | 4ff10e6 | 2012-05-03 15:20:48 -0700 | [diff] [blame] | 1144 | chown system system /sys/devices/system/cpu/cpufreq/interactive/boostpulse | 
| Todd Poynor | 33045a6 | 2012-04-27 20:21:18 -0700 | [diff] [blame] | 1145 | chown system system /sys/devices/system/cpu/cpufreq/interactive/input_boost | 
|  | 1146 | chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/input_boost | 
| Todd Poynor | 4f247d7 | 2012-12-19 17:43:06 -0800 | [diff] [blame] | 1147 | chown system system /sys/devices/system/cpu/cpufreq/interactive/boostpulse_duration | 
|  | 1148 | chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/boostpulse_duration | 
| Todd Poynor | 6b5de1c | 2013-03-25 13:17:13 -0700 | [diff] [blame] | 1149 | chown system system /sys/devices/system/cpu/cpufreq/interactive/io_is_busy | 
|  | 1150 | chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/io_is_busy | 
| Todd Poynor | 0653b97 | 2012-04-11 14:48:51 -0700 | [diff] [blame] | 1151 |  | 
| David Lin | 27b2c1e | 2017-03-08 17:36:18 -0800 | [diff] [blame] | 1152 | chown system system /sys/class/leds/vibrator/trigger | 
|  | 1153 | chown system system /sys/class/leds/vibrator/activate | 
|  | 1154 | chown system system /sys/class/leds/vibrator/brightness | 
|  | 1155 | chown system system /sys/class/leds/vibrator/duration | 
|  | 1156 | chown system system /sys/class/leds/vibrator/state | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 1157 | chown system system /sys/class/timed_output/vibrator/enable | 
|  | 1158 | chown system system /sys/class/leds/keyboard-backlight/brightness | 
|  | 1159 | chown system system /sys/class/leds/lcd-backlight/brightness | 
|  | 1160 | chown system system /sys/class/leds/button-backlight/brightness | 
| The Android Open Source Project | f614d64 | 2009-03-18 17:39:49 -0700 | [diff] [blame] | 1161 | chown system system /sys/class/leds/jogball-backlight/brightness | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 1162 | chown system system /sys/class/leds/red/brightness | 
|  | 1163 | chown system system /sys/class/leds/green/brightness | 
|  | 1164 | chown system system /sys/class/leds/blue/brightness | 
|  | 1165 | chown system system /sys/class/leds/red/device/grpfreq | 
|  | 1166 | chown system system /sys/class/leds/red/device/grppwm | 
|  | 1167 | chown system system /sys/class/leds/red/device/blink | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 1168 | chown system system /sys/module/sco/parameters/disable_esco | 
|  | 1169 | chown system system /sys/kernel/ipv4/tcp_wmem_min | 
|  | 1170 | chown system system /sys/kernel/ipv4/tcp_wmem_def | 
|  | 1171 | chown system system /sys/kernel/ipv4/tcp_wmem_max | 
|  | 1172 | chown system system /sys/kernel/ipv4/tcp_rmem_min | 
|  | 1173 | chown system system /sys/kernel/ipv4/tcp_rmem_def | 
|  | 1174 | chown system system /sys/kernel/ipv4/tcp_rmem_max | 
|  | 1175 | chown root radio /proc/cmdline | 
| zexin.hou | 4631485 | 2022-06-09 16:41:18 +0800 | [diff] [blame] | 1176 | chown root system /proc/bootconfig | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 1177 |  | 
| Riley Andrews | 6dfdc7c | 2014-06-18 20:35:40 -0700 | [diff] [blame] | 1178 | # Define default initial receive window size in segments. | 
| paulhu | f8cdebf | 2021-03-17 13:59:02 +0800 | [diff] [blame] | 1179 | setprop net.tcp_def_init_rwnd 60 | 
| JP Abgrall | 7c862c8 | 2014-02-21 12:05:01 -0800 | [diff] [blame] | 1180 |  | 
| Steven Moreland | d627502 | 2017-03-24 16:23:07 +0000 | [diff] [blame] | 1181 | # Start standard binderized HAL daemons | 
|  | 1182 | class_start hal | 
|  | 1183 |  | 
| Ken Sumrall | 752923c | 2010-12-03 16:33:31 -0800 | [diff] [blame] | 1184 | class_start core | 
| Ken Sumrall | 752923c | 2010-12-03 16:33:31 -0800 | [diff] [blame] | 1185 |  | 
|  | 1186 | on nonencrypted | 
| Paul Lawrence | 13d5bb4 | 2014-01-30 10:43:52 -0800 | [diff] [blame] | 1187 | class_start main | 
| Ken Sumrall | 752923c | 2010-12-03 16:33:31 -0800 | [diff] [blame] | 1188 | class_start late_start | 
|  | 1189 |  | 
| Riley Andrews | 1bbef88 | 2014-06-26 13:55:03 -0700 | [diff] [blame] | 1190 | on property:sys.init_log_level=* | 
|  | 1191 | loglevel ${sys.init_log_level} | 
|  | 1192 |  | 
| Dima Zavin | ca47cef | 2011-08-24 15:28:23 -0700 | [diff] [blame] | 1193 | on charger | 
|  | 1194 | class_start charger | 
|  | 1195 |  | 
| Elliott Hughes | a3641af | 2016-11-10 17:43:47 -0800 | [diff] [blame] | 1196 | on property:sys.boot_completed=1 | 
|  | 1197 | bootchart stop | 
| Paul Crowley | 570d20d | 2019-09-11 15:02:44 -0700 | [diff] [blame] | 1198 | # Setup per_boot directory so other .rc could start to use it on boot_completed | 
|  | 1199 | exec - system system -- /bin/rm -rf /data/per_boot | 
| Paul Crowley | 68258e8 | 2019-10-28 07:55:03 -0700 | [diff] [blame] | 1200 | mkdir /data/per_boot 0700 system system encryption=Require key=per_boot_ref | 
| Elliott Hughes | a3641af | 2016-11-10 17:43:47 -0800 | [diff] [blame] | 1201 |  | 
| JP Abgrall | 7c862c8 | 2014-02-21 12:05:01 -0800 | [diff] [blame] | 1202 | # system server cannot write to /proc/sys files, | 
|  | 1203 | # and chown/chmod does not work for /proc/sys/ entries. | 
|  | 1204 | # So proxy writes through init. | 
| Colin Cross | 57fdb5c | 2013-07-25 10:34:30 -0700 | [diff] [blame] | 1205 | on property:sys.sysctl.extra_free_kbytes=* | 
| Suren Baghdasaryan | 92cb2e8 | 2021-07-21 15:16:20 -0700 | [diff] [blame] | 1206 | exec -- /system/bin/extra_free_kbytes.sh ${sys.sysctl.extra_free_kbytes} | 
| Riley Andrews | 6dfdc7c | 2014-06-18 20:35:40 -0700 | [diff] [blame] | 1207 |  | 
| Michael Rosenfeld | e853d37 | 2021-02-10 18:38:05 -0800 | [diff] [blame] | 1208 | # Allow users to drop caches | 
|  | 1209 | on property:perf.drop_caches=3 | 
|  | 1210 | write /proc/sys/vm/drop_caches 3 | 
|  | 1211 | setprop perf.drop_caches 0 | 
|  | 1212 |  | 
| JP Abgrall | 7c862c8 | 2014-02-21 12:05:01 -0800 | [diff] [blame] | 1213 | # "tcp_default_init_rwnd" Is too long! | 
| Chiachang Wang | 7396fed | 2020-10-15 21:09:25 +0800 | [diff] [blame] | 1214 | on property:net.tcp_def_init_rwnd=* | 
|  | 1215 | write /proc/sys/net/ipv4/tcp_default_init_rwnd ${net.tcp_def_init_rwnd} | 
| JP Abgrall | 7c862c8 | 2014-02-21 12:05:01 -0800 | [diff] [blame] | 1216 |  | 
| Ryan Savitski | f0f7e70 | 2020-01-14 22:02:53 +0000 | [diff] [blame] | 1217 | # perf_event_open syscall security: | 
|  | 1218 | # Newer kernels have the ability to control the use of the syscall via SELinux | 
|  | 1219 | # hooks. init tests for this, and sets sys_init.perf_lsm_hooks to 1 if the | 
|  | 1220 | # kernel has the hooks. In this case, the system-wide perf_event_paranoid | 
|  | 1221 | # sysctl is set to -1 (unrestricted use), and the SELinux policy is used for | 
|  | 1222 | # controlling access. On older kernels, the paranoid value is the only means of | 
|  | 1223 | # controlling access. It is normally 3 (allow only root), but the shell user | 
|  | 1224 | # can lower it to 1 (allowing thread-scoped pofiling) via security.perf_harden. | 
| chenyc5 | 7e357eb | 2022-11-03 09:57:47 +0800 | [diff] [blame] | 1225 | on load_bpf_programs && property:sys.init.perf_lsm_hooks=1 | 
| Ryan Savitski | f0f7e70 | 2020-01-14 22:02:53 +0000 | [diff] [blame] | 1226 | write /proc/sys/kernel/perf_event_paranoid -1 | 
|  | 1227 | on property:security.perf_harden=0 && property:sys.init.perf_lsm_hooks="" | 
| Daniel Micay | 2b22a66 | 2015-09-04 16:23:01 -0400 | [diff] [blame] | 1228 | write /proc/sys/kernel/perf_event_paranoid 1 | 
| Ryan Savitski | f0f7e70 | 2020-01-14 22:02:53 +0000 | [diff] [blame] | 1229 | on property:security.perf_harden=1 && property:sys.init.perf_lsm_hooks="" | 
|  | 1230 | write /proc/sys/kernel/perf_event_paranoid 3 | 
|  | 1231 |  | 
|  | 1232 | # Additionally, simpleperf profiler uses debug.* and security.perf_harden | 
|  | 1233 | # sysprops to be able to indirectly set these sysctls. | 
|  | 1234 | on property:security.perf_harden=0 | 
| Yabin Cui | 4f0da7c | 2018-06-29 14:52:47 -0700 | [diff] [blame] | 1235 | write /proc/sys/kernel/perf_event_max_sample_rate ${debug.perf_event_max_sample_rate:-100000} | 
|  | 1236 | write /proc/sys/kernel/perf_cpu_time_max_percent ${debug.perf_cpu_time_max_percent:-25} | 
|  | 1237 | write /proc/sys/kernel/perf_event_mlock_kb ${debug.perf_event_mlock_kb:-516} | 
| Ryan Savitski | f0f7e70 | 2020-01-14 22:02:53 +0000 | [diff] [blame] | 1238 | # Default values. | 
| Daniel Micay | 2b22a66 | 2015-09-04 16:23:01 -0400 | [diff] [blame] | 1239 | on property:security.perf_harden=1 | 
| Ryan Savitski | f0f7e70 | 2020-01-14 22:02:53 +0000 | [diff] [blame] | 1240 | write /proc/sys/kernel/perf_event_max_sample_rate 100000 | 
|  | 1241 | write /proc/sys/kernel/perf_cpu_time_max_percent 25 | 
|  | 1242 | write /proc/sys/kernel/perf_event_mlock_kb 516 | 
|  | 1243 |  | 
| Primiano Tucci | 253289f | 2020-10-09 13:59:41 +0100 | [diff] [blame] | 1244 | # This property can be set only on userdebug/eng. See neverallow rule in | 
|  | 1245 | # /system/sepolicy/private/property.te . | 
|  | 1246 | on property:security.lower_kptr_restrict=1 | 
|  | 1247 | write /proc/sys/kernel/kptr_restrict 0 | 
|  | 1248 |  | 
|  | 1249 | on property:security.lower_kptr_restrict=0 | 
|  | 1250 | write /proc/sys/kernel/kptr_restrict 2 | 
|  | 1251 |  | 
| Colin Cross | 57fdb5c | 2013-07-25 10:34:30 -0700 | [diff] [blame] | 1252 |  | 
| Wei Wang | eeab491 | 2017-06-27 22:08:45 -0700 | [diff] [blame] | 1253 | # on shutdown | 
|  | 1254 | # In device's init.rc, this trigger can be used to do device-specific actions | 
|  | 1255 | # before shutdown. e.g disable watchdog and mask error handling | 
|  | 1256 |  | 
| The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 1257 | ## Daemon processes to be run by init. | 
|  | 1258 | ## | 
| Tom Cherry | 3143848 | 2018-07-20 14:57:00 -0700 | [diff] [blame] | 1259 | service ueventd /system/bin/ueventd | 
| Ken Sumrall | 752923c | 2010-12-03 16:33:31 -0800 | [diff] [blame] | 1260 | class core | 
| Colin Cross | f83d0b9 | 2010-04-21 12:04:20 -0700 | [diff] [blame] | 1261 | critical | 
| Stephen Smalley | 1eee419 | 2012-01-13 08:54:34 -0500 | [diff] [blame] | 1262 | seclabel u:r:ueventd:s0 | 
| Keun-young Park | cccb34f | 2017-07-05 11:38:44 -0700 | [diff] [blame] | 1263 | shutdown critical | 
| Colin Cross | f83d0b9 | 2010-04-21 12:04:20 -0700 | [diff] [blame] | 1264 |  | 
| Brian Swetland | b4d6539 | 2010-10-27 15:40:23 -0700 | [diff] [blame] | 1265 | service console /system/bin/sh | 
| Ken Sumrall | 752923c | 2010-12-03 16:33:31 -0800 | [diff] [blame] | 1266 | class core | 
| Brian Swetland | b4d6539 | 2010-10-27 15:40:23 -0700 | [diff] [blame] | 1267 | console | 
|  | 1268 | disabled | 
|  | 1269 | user shell | 
| Nick Kralevich | c39ba5a | 2015-11-07 16:52:17 -0800 | [diff] [blame] | 1270 | group shell log readproc | 
| Stephen Smalley | 610653f | 2013-12-23 14:11:02 -0500 | [diff] [blame] | 1271 | seclabel u:r:shell:s0 | 
| Dmitry Shmidt | d0fb251 | 2017-10-11 11:18:51 -0700 | [diff] [blame] | 1272 | setenv HOSTNAME console | 
| Gabriel Jacobo | 12f9ff8 | 2020-06-02 14:19:38 -0300 | [diff] [blame] | 1273 | shutdown critical | 
| Brian Swetland | b4d6539 | 2010-10-27 15:40:23 -0700 | [diff] [blame] | 1274 |  | 
| Mike Lockwood | d49b4ef | 2010-11-19 09:12:27 -0500 | [diff] [blame] | 1275 | on property:ro.debuggable=1 | 
| Hongwei Wang | 231e80d | 2023-01-20 12:15:28 -0800 | [diff] [blame] | 1276 | # Give writes to the same group for the trace folder on debug builds, | 
|  | 1277 | # it's further protected by selinux policy. | 
| Calin Juravle | 9b3e5d5 | 2015-11-10 19:16:43 +0000 | [diff] [blame] | 1278 | # The folder is used to store method traces. | 
|  | 1279 | chmod 0773 /data/misc/trace | 
| Hongwei Wang | 231e80d | 2023-01-20 12:15:28 -0800 | [diff] [blame] | 1280 | # Give writes and reads to anyone for the window trace folder on debug builds, | 
|  | 1281 | # it's further protected by selinux policy. | 
|  | 1282 | chmod 0777 /data/misc/wmtrace | 
| Hongming Jin | 87f55fe | 2021-02-09 11:54:46 -0800 | [diff] [blame] | 1283 | # Give reads to anyone for the accessibility trace folder on debug builds. | 
|  | 1284 | chmod 0775 /data/misc/a11ytrace | 
| Tom Cherry | 71c3ef1 | 2019-08-27 14:57:32 -0700 | [diff] [blame] | 1285 |  | 
|  | 1286 | on init && property:ro.debuggable=1 | 
| Brian Swetland | b4d6539 | 2010-10-27 15:40:23 -0700 | [diff] [blame] | 1287 | start console | 
| Nikita Ioffe | ba6968e | 2019-10-07 16:26:33 +0100 | [diff] [blame] | 1288 |  | 
| Nikita Ioffe | ac69214 | 2019-11-01 20:56:33 +0000 | [diff] [blame] | 1289 | on userspace-reboot-requested | 
| Nikita Ioffe | ba6968e | 2019-10-07 16:26:33 +0100 | [diff] [blame] | 1290 | # TODO(b/135984674): reset all necessary properties here. | 
| Nikita Ioffe | 018ddd7 | 2019-12-20 16:34:48 +0000 | [diff] [blame] | 1291 | setprop sys.boot_completed "" | 
| Nikita Ioffe | c2bc1a3 | 2020-02-07 17:42:27 +0000 | [diff] [blame] | 1292 | setprop dev.bootcomplete "" | 
| Nikita Ioffe | 018ddd7 | 2019-12-20 16:34:48 +0000 | [diff] [blame] | 1293 | setprop sys.init.updatable_crashing "" | 
|  | 1294 | setprop sys.init.updatable_crashing_process_name "" | 
| Nikita Ioffe | 018ddd7 | 2019-12-20 16:34:48 +0000 | [diff] [blame] | 1295 | setprop sys.user.0.ce_available "" | 
| Nikita Ioffe | 1131a21 | 2019-12-30 16:05:11 +0000 | [diff] [blame] | 1296 | setprop sys.shutdown.requested "" | 
| Nikita Ioffe | 764c1ac | 2020-01-27 17:14:46 +0000 | [diff] [blame] | 1297 | setprop service.bootanim.exit "" | 
| Nicolas Geoffray | e106f0a | 2020-12-15 18:34:47 +0000 | [diff] [blame] | 1298 | setprop service.bootanim.progress "" | 
| Nikita Ioffe | ba6968e | 2019-10-07 16:26:33 +0100 | [diff] [blame] | 1299 |  | 
| Nikita Ioffe | 12a3607 | 2019-10-23 20:11:32 +0100 | [diff] [blame] | 1300 | on userspace-reboot-fs-remount | 
|  | 1301 | # Make sure that vold is running. | 
|  | 1302 | # This is mostly a precaution measure in case vold for some reason wasn't running when | 
|  | 1303 | # userspace reboot was initiated. | 
|  | 1304 | start vold | 
|  | 1305 | exec - system system -- /system/bin/vdc checkpoint resetCheckpoint | 
|  | 1306 | exec - system system -- /system/bin/vdc checkpoint markBootAttempt | 
| Nikita Ioffe | bf66f43 | 2020-04-07 00:26:15 +0100 | [diff] [blame] | 1307 | # Unmount /data_mirror mounts in the reverse order of corresponding mounts. | 
|  | 1308 | umount /data_mirror/data_ce/null/0 | 
|  | 1309 | umount /data_mirror/data_ce/null | 
|  | 1310 | umount /data_mirror/data_de/null | 
|  | 1311 | umount /data_mirror/cur_profiles | 
| Ricky Wai | 420830f | 2021-06-08 12:15:14 +0100 | [diff] [blame] | 1312 | umount /data_mirror/ref_profiles | 
| Nikita Ioffe | bf66f43 | 2020-04-07 00:26:15 +0100 | [diff] [blame] | 1313 | umount /data_mirror | 
| Nikita Ioffe | 12a3607 | 2019-10-23 20:11:32 +0100 | [diff] [blame] | 1314 | remount_userdata | 
| Nikita Ioffe | 764c1ac | 2020-01-27 17:14:46 +0000 | [diff] [blame] | 1315 | start bootanim | 
| Nikita Ioffe | 12a3607 | 2019-10-23 20:11:32 +0100 | [diff] [blame] | 1316 |  | 
| Nikita Ioffe | 3f4b0d6 | 2019-10-09 15:23:02 +0100 | [diff] [blame] | 1317 | on userspace-reboot-resume | 
| Nikita Ioffe | 12a3607 | 2019-10-23 20:11:32 +0100 | [diff] [blame] | 1318 | trigger userspace-reboot-fs-remount | 
| Nikita Ioffe | ba6968e | 2019-10-07 16:26:33 +0100 | [diff] [blame] | 1319 | trigger post-fs-data | 
|  | 1320 | trigger zygote-start | 
|  | 1321 | trigger early-boot | 
|  | 1322 | trigger boot | 
| Nikita Ioffe | c0df187 | 2019-11-13 21:47:06 +0000 | [diff] [blame] | 1323 |  | 
|  | 1324 | on property:sys.boot_completed=1 && property:sys.init.userspace_reboot.in_progress=1 | 
| Nikita Ioffe | 85ff4ab | 2020-02-06 23:33:42 +0000 | [diff] [blame] | 1325 | setprop sys.init.userspace_reboot.in_progress "" | 
| Kalesh Singh | bd42559 | 2022-04-06 15:07:38 -0700 | [diff] [blame] | 1326 |  | 
|  | 1327 | # Multi-Gen LRU Experiment | 
|  | 1328 | on property:persist.device_config.mglru_native.lru_gen_config=none | 
|  | 1329 | write /sys/kernel/mm/lru_gen/enabled 0 | 
|  | 1330 | on property:persist.device_config.mglru_native.lru_gen_config=core | 
|  | 1331 | write /sys/kernel/mm/lru_gen/enabled 1 | 
|  | 1332 | on property:persist.device_config.mglru_native.lru_gen_config=core_and_mm_walk | 
|  | 1333 | write /sys/kernel/mm/lru_gen/enabled 3 | 
|  | 1334 | on property:persist.device_config.mglru_native.lru_gen_config=core_and_nonleaf_young | 
|  | 1335 | write /sys/kernel/mm/lru_gen/enabled 5 | 
|  | 1336 | on property:persist.device_config.mglru_native.lru_gen_config=all | 
|  | 1337 | write /sys/kernel/mm/lru_gen/enabled 7 |