• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1# Copyright (C) 2012 The Android Open Source Project
2#
3# IMPORTANT: Do not create world writable files or directories.
4# This is a common source of Android security bugs.
5#
6
7import /init.environ.rc
8import /system/etc/init/hw/init.usb.rc
9import /init.${ro.hardware}.rc
10import /vendor/etc/init/hw/init.${ro.hardware}.rc
11import /system/etc/init/hw/init.usb.configfs.rc
12import /system/etc/init/hw/init.${ro.zygote}.rc
13
14# Cgroups are mounted right before early-init using list from /etc/cgroups.json
15on early-init
16    # Disable sysrq from keyboard
17    write /proc/sys/kernel/sysrq 0
18
19    # Android doesn't need kernel module autoloading, and it causes SELinux
20    # denials.  So disable it by setting modprobe to the empty string.  Note: to
21    # explicitly set a sysctl to an empty string, a trailing newline is needed.
22    write /proc/sys/kernel/modprobe \n
23
24    # Set the security context of /adb_keys if present.
25    restorecon /adb_keys
26
27    # Set the security context of /postinstall if present.
28    restorecon /postinstall
29
30    # memory.pressure_level used by lmkd
31    chown root system /dev/memcg/memory.pressure_level
32    chmod 0040 /dev/memcg/memory.pressure_level
33    # app mem cgroups, used by activity manager, lmkd and zygote
34    mkdir /dev/memcg/apps/ 0755 system system
35    # cgroup for system_server and surfaceflinger
36    mkdir /dev/memcg/system 0550 system system
37
38    # symlink the Android specific /dev/tun to Linux expected /dev/net/tun
39    mkdir /dev/net 0755 root root
40    symlink ../tun /dev/net/tun
41
42    # set RLIMIT_NICE to allow priorities from 19 to -20
43    setrlimit nice 40 40
44
45    # Allow up to 32K FDs per process
46    setrlimit nofile 32768 32768
47
48    # set RLIMIT_MEMLOCK to 64KB
49    setrlimit memlock 65536 65536
50
51    # Set up linker config subdirectories based on mount namespaces
52    mkdir /linkerconfig/bootstrap 0755
53    mkdir /linkerconfig/default 0755
54
55    # Greatly extend dm-verity's Merkle tree cache timeout.  The default timeout
56    # is much too short and is unnecessary, given that there is also a shrinker.
57    write /sys/module/dm_bufio/parameters/max_age_seconds 86400
58
59    # Disable dm-verity hash prefetching, since it doesn't help performance
60    # Read more in b/136247322
61    write /sys/module/dm_verity/parameters/prefetch_cluster 0
62
63    # Generate empty ld.config.txt for early executed processes which rely on
64    # /system/lib libraries.
65    write /linkerconfig/bootstrap/ld.config.txt \#
66    write /linkerconfig/default/ld.config.txt \#
67    chmod 644 /linkerconfig/bootstrap/ld.config.txt
68    chmod 644 /linkerconfig/default/ld.config.txt
69
70    # Mount bootstrap linker configuration as current
71    mount none /linkerconfig/bootstrap /linkerconfig bind rec
72
73    start ueventd
74
75    # Mount tracefs (with GID=AID_READTRACEFS)
76    mount tracefs tracefs /sys/kernel/tracing gid=3012
77
78    # Run apexd-bootstrap so that APEXes that provide critical libraries
79    # become available. Note that this is executed as exec_start to ensure that
80    # the libraries are available to the processes started after this statement.
81    exec_start apexd-bootstrap
82    perform_apex_config --bootstrap
83
84    # These must already exist by the time boringssl_self_test32 / boringssl_self_test64 run.
85    mkdir /dev/boringssl 0755 root root
86    mkdir /dev/boringssl/selftest 0755 root root
87
88    # create sys dirctory
89    mkdir /dev/sys 0755 system system
90    mkdir /dev/sys/fs 0755 system system
91    mkdir /dev/sys/block 0755 system system
92
93    # Create location for fs_mgr to store abbreviated output from filesystem
94    # checker programs.
95    mkdir /dev/fscklogs 0770 root system
96
97    # Create tmpfs for use by the shell user.
98    mount tmpfs tmpfs /tmp
99    restorecon /tmp
100    chown shell shell /tmp
101    chmod 0771 /tmp
102
103on init
104    sysclktz 0
105
106    # Mix device-specific information into the entropy pool
107    copy /proc/cmdline /dev/urandom
108    copy /proc/bootconfig /dev/urandom
109
110    symlink /proc/self/fd/0 /dev/stdin
111    symlink /proc/self/fd/1 /dev/stdout
112    symlink /proc/self/fd/2 /dev/stderr
113
114    # Create socket dir for ot-daemon
115    mkdir /dev/socket/ot-daemon 0770 thread_network thread_network
116
117    # cpuctl hierarchy for devices using utilclamp
118    mkdir /dev/cpuctl/foreground
119    mkdir /dev/cpuctl/foreground_window
120    mkdir /dev/cpuctl/background
121    mkdir /dev/cpuctl/top-app
122    mkdir /dev/cpuctl/rt
123    mkdir /dev/cpuctl/system
124    mkdir /dev/cpuctl/system-background
125    mkdir /dev/cpuctl/dex2oat
126    chown system system /dev/cpuctl
127    chown system system /dev/cpuctl/foreground
128    chown system system /dev/cpuctl/foreground_window
129    chown system system /dev/cpuctl/background
130    chown system system /dev/cpuctl/top-app
131    chown system system /dev/cpuctl/rt
132    chown system system /dev/cpuctl/system
133    chown system system /dev/cpuctl/system-background
134    chown system system /dev/cpuctl/dex2oat
135    chown system system /dev/cpuctl/tasks
136    chown system system /dev/cpuctl/foreground/tasks
137    chown system system /dev/cpuctl/foreground_window/tasks
138    chown system system /dev/cpuctl/background/tasks
139    chown system system /dev/cpuctl/top-app/tasks
140    chown system system /dev/cpuctl/rt/tasks
141    chown system system /dev/cpuctl/system/tasks
142    chown system system /dev/cpuctl/system-background/tasks
143    chown system system /dev/cpuctl/dex2oat/tasks
144    chown system system /dev/cpuctl/cgroup.procs
145    chown system system /dev/cpuctl/foreground/cgroup.procs
146    chown system system /dev/cpuctl/foreground_window/cgroup.procs
147    chown system system /dev/cpuctl/background/cgroup.procs
148    chown system system /dev/cpuctl/top-app/cgroup.procs
149    chown system system /dev/cpuctl/rt/cgroup.procs
150    chown system system /dev/cpuctl/system/cgroup.procs
151    chown system system /dev/cpuctl/system-background/cgroup.procs
152    chown system system /dev/cpuctl/dex2oat/cgroup.procs
153    chmod 0664 /dev/cpuctl/tasks
154    chmod 0664 /dev/cpuctl/foreground/tasks
155    chmod 0664 /dev/cpuctl/foreground_window/tasks
156    chmod 0664 /dev/cpuctl/background/tasks
157    chmod 0664 /dev/cpuctl/top-app/tasks
158    chmod 0664 /dev/cpuctl/rt/tasks
159    chmod 0664 /dev/cpuctl/system/tasks
160    chmod 0664 /dev/cpuctl/system-background/tasks
161    chmod 0664 /dev/cpuctl/dex2oat/tasks
162    chmod 0664 /dev/cpuctl/cgroup.procs
163    chmod 0664 /dev/cpuctl/foreground/cgroup.procs
164    chmod 0664 /dev/cpuctl/foreground_window/cgroup.procs
165    chmod 0664 /dev/cpuctl/background/cgroup.procs
166    chmod 0664 /dev/cpuctl/top-app/cgroup.procs
167    chmod 0664 /dev/cpuctl/rt/cgroup.procs
168    chmod 0664 /dev/cpuctl/system/cgroup.procs
169    chmod 0664 /dev/cpuctl/system-background/cgroup.procs
170    chmod 0664 /dev/cpuctl/dex2oat/cgroup.procs
171
172    # Create a cpu group for NNAPI HAL processes
173    mkdir /dev/cpuctl/nnapi-hal
174    chown system system /dev/cpuctl/nnapi-hal
175    chown system system /dev/cpuctl/nnapi-hal/tasks
176    chown system system /dev/cpuctl/nnapi-hal/cgroup.procs
177    chmod 0664 /dev/cpuctl/nnapi-hal/tasks
178    chmod 0664 /dev/cpuctl/nnapi-hal/cgroup.procs
179    write /dev/cpuctl/nnapi-hal/cpu.uclamp.min 1
180    write /dev/cpuctl/nnapi-hal/cpu.uclamp.latency_sensitive 1
181
182    # Create a cpu group for camera daemon processes
183    mkdir /dev/cpuctl/camera-daemon
184    chown system system /dev/cpuctl/camera-daemon
185    chown system system /dev/cpuctl/camera-daemon/tasks
186    chown system system /dev/cpuctl/camera-daemon/cgroup.procs
187    chmod 0664 /dev/cpuctl/camera-daemon/tasks
188    chmod 0664 /dev/cpuctl/camera-daemon/cgroup.procs
189
190    # Create blkio group and apply initial settings.
191    # This feature needs kernel to support it, and the
192    # device's init.rc must actually set the correct values.
193    mkdir /dev/blkio/background
194    chown system system /dev/blkio
195    chown system system /dev/blkio/background
196    chown system system /dev/blkio/tasks
197    chown system system /dev/blkio/background/tasks
198    chown system system /dev/blkio/cgroup.procs
199    chown system system /dev/blkio/background/cgroup.procs
200    chmod 0664 /dev/blkio/tasks
201    chmod 0664 /dev/blkio/background/tasks
202    chmod 0664 /dev/blkio/cgroup.procs
203    chmod 0664 /dev/blkio/background/cgroup.procs
204    write /dev/blkio/blkio.weight 1000
205    write /dev/blkio/background/blkio.weight 200
206    write /dev/blkio/background/blkio.bfq.weight 10
207    write /dev/blkio/blkio.group_idle 0
208    write /dev/blkio/background/blkio.group_idle 0
209    write /dev/blkio/background/blkio.prio.class restrict-to-be
210
211    restorecon_recursive /mnt
212
213    mount configfs none /config nodev noexec nosuid
214    chmod 0770 /config/sdcardfs
215    chown system package_info /config/sdcardfs
216
217    # Mount binderfs
218    mkdir /dev/binderfs
219    mount binder binder /dev/binderfs stats=global
220    chmod 0755 /dev/binderfs
221
222    # Mount fusectl
223    mount fusectl none /sys/fs/fuse/connections
224
225    symlink /dev/binderfs/binder /dev/binder
226    symlink /dev/binderfs/hwbinder /dev/hwbinder
227    symlink /dev/binderfs/vndbinder /dev/vndbinder
228
229    chmod 0666 /dev/binderfs/hwbinder
230    chmod 0666 /dev/binderfs/binder
231    chmod 0666 /dev/binderfs/vndbinder
232
233    mkdir /mnt/secure 0700 root root
234    mkdir /mnt/secure/asec 0700 root root
235    mkdir /mnt/asec 0755 root system
236    mkdir /mnt/obb 0755 root system
237    mkdir /mnt/media_rw 0750 root external_storage
238    mkdir /mnt/user 0755 root root
239    mkdir /mnt/user/0 0755 root root
240    mkdir /mnt/user/0/self 0755 root root
241    mkdir /mnt/user/0/emulated 0755 root root
242    mkdir /mnt/user/0/emulated/0 0755 root root
243
244    # Prepare directories for pass through processes
245    mkdir /mnt/pass_through 0700 root root
246    mkdir /mnt/pass_through/0 0710 root media_rw
247    mkdir /mnt/pass_through/0/self 0710 root media_rw
248    mkdir /mnt/pass_through/0/emulated 0710 root media_rw
249    mkdir /mnt/pass_through/0/emulated/0 0710 root media_rw
250
251    mkdir /mnt/expand 0771 system system
252    mkdir /mnt/appfuse 0711 root root
253
254    # Storage views to support runtime permissions
255    mkdir /mnt/runtime 0700 root root
256    mkdir /mnt/runtime/default 0755 root root
257    mkdir /mnt/runtime/default/self 0755 root root
258    mkdir /mnt/runtime/read 0755 root root
259    mkdir /mnt/runtime/read/self 0755 root root
260    mkdir /mnt/runtime/write 0755 root root
261    mkdir /mnt/runtime/write/self 0755 root root
262    mkdir /mnt/runtime/full 0755 root root
263    mkdir /mnt/runtime/full/self 0755 root root
264
265    # For Pre-reboot Dexopt
266    mkdir /mnt/pre_reboot_dexopt 0755 artd artd
267
268    # Symlink to keep legacy apps working in multi-user world
269    symlink /storage/self/primary /mnt/sdcard
270    symlink /mnt/user/0/primary /mnt/runtime/default/self/primary
271
272    write /proc/sys/kernel/panic_on_oops 1
273    write /proc/sys/kernel/hung_task_timeout_secs 0
274    write /proc/cpu/alignment 4
275
276    # scheduler tunables
277    # Disable auto-scaling of scheduler tunables with hotplug. The tunables
278    # will vary across devices in unpredictable ways if allowed to scale with
279    # cpu cores.
280    write /proc/sys/kernel/sched_tunable_scaling 0
281    write /proc/sys/kernel/sched_latency_ns 10000000
282    write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000
283    write /proc/sys/kernel/sched_child_runs_first 0
284
285    write /proc/sys/kernel/randomize_va_space 2
286    write /proc/sys/vm/mmap_min_addr 32768
287    write /proc/sys/net/ipv4/ping_group_range "0 2147483647"
288    write /proc/sys/net/unix/max_dgram_qlen 2400
289
290    # Assign reasonable ceiling values for socket rcv/snd buffers.
291    # These should almost always be overridden by the target per the
292    # the corresponding technology maximums.
293    write /proc/sys/net/core/rmem_max  262144
294    write /proc/sys/net/core/wmem_max  262144
295
296    # reflect fwmark from incoming packets onto generated replies
297    write /proc/sys/net/ipv4/fwmark_reflect 1
298    write /proc/sys/net/ipv6/fwmark_reflect 1
299
300    # set fwmark on accepted sockets
301    write /proc/sys/net/ipv4/tcp_fwmark_accept 1
302
303    # disable icmp redirects
304    write /proc/sys/net/ipv4/conf/all/accept_redirects 0
305    write /proc/sys/net/ipv6/conf/all/accept_redirects 0
306
307    # /proc/net/fib_trie leaks interface IP addresses
308    chmod 0400 /proc/net/fib_trie
309
310    # sets up initial cpusets for ActivityManager
311    # this ensures that the cpusets are present and usable, but the device's
312    # init.rc must actually set the correct cpus
313    mkdir /dev/cpuset/foreground
314    copy /dev/cpuset/cpus /dev/cpuset/foreground/cpus
315    copy /dev/cpuset/mems /dev/cpuset/foreground/mems
316    mkdir /dev/cpuset/foreground_window
317    copy /dev/cpuset/cpus /dev/cpuset/foreground_window/cpus
318    copy /dev/cpuset/mems /dev/cpuset/foreground_window/mems
319    mkdir /dev/cpuset/background
320    copy /dev/cpuset/cpus /dev/cpuset/background/cpus
321    copy /dev/cpuset/mems /dev/cpuset/background/mems
322
323    # system-background is for system tasks that should only run on
324    # little cores, not on bigs
325    mkdir /dev/cpuset/system-background
326    copy /dev/cpuset/cpus /dev/cpuset/system-background/cpus
327    copy /dev/cpuset/mems /dev/cpuset/system-background/mems
328
329    # restricted is for system tasks that are being throttled
330    # due to screen off.
331    mkdir /dev/cpuset/restricted
332    copy /dev/cpuset/cpus /dev/cpuset/restricted/cpus
333    copy /dev/cpuset/mems /dev/cpuset/restricted/mems
334
335    mkdir /dev/cpuset/top-app
336    copy /dev/cpuset/cpus /dev/cpuset/top-app/cpus
337    copy /dev/cpuset/mems /dev/cpuset/top-app/mems
338
339    # create a cpuset for camera daemon processes
340    mkdir /dev/cpuset/camera-daemon
341    copy /dev/cpuset/cpus /dev/cpuset/camera-daemon/cpus
342    copy /dev/cpuset/mems /dev/cpuset/camera-daemon/mems
343
344    # change permissions for all cpusets we'll touch at runtime
345    chown system system /dev/cpuset
346    chown system system /dev/cpuset/foreground
347    chown system system /dev/cpuset/foreground_window
348    chown system system /dev/cpuset/background
349    chown system system /dev/cpuset/system-background
350    chown system system /dev/cpuset/top-app
351    chown system system /dev/cpuset/restricted
352    chown system system /dev/cpuset/camera-daemon
353    chown system system /dev/cpuset/tasks
354    chown system system /dev/cpuset/foreground/tasks
355    chown system system /dev/cpuset/foreground_window/tasks
356    chown system system /dev/cpuset/background/tasks
357    chown system system /dev/cpuset/system-background/tasks
358    chown system system /dev/cpuset/top-app/tasks
359    chown system system /dev/cpuset/restricted/tasks
360    chown system system /dev/cpuset/camera-daemon/tasks
361    chown system system /dev/cpuset/cgroup.procs
362    chown system system /dev/cpuset/foreground/cgroup.procs
363    chown system system /dev/cpuset/foreground_window/cgroup.procs
364    chown system system /dev/cpuset/background/cgroup.procs
365    chown system system /dev/cpuset/system-background/cgroup.procs
366    chown system system /dev/cpuset/top-app/cgroup.procs
367    chown system system /dev/cpuset/restricted/cgroup.procs
368    chown system system /dev/cpuset/camera-daemon/cgroup.procs
369
370    # set system-background to 0775 so SurfaceFlinger can touch it
371    chmod 0775 /dev/cpuset/system-background
372
373    chmod 0664 /dev/cpuset/foreground/tasks
374    chmod 0664 /dev/cpuset/foreground_window/tasks
375    chmod 0664 /dev/cpuset/background/tasks
376    chmod 0664 /dev/cpuset/system-background/tasks
377    chmod 0664 /dev/cpuset/top-app/tasks
378    chmod 0664 /dev/cpuset/restricted/tasks
379    chmod 0664 /dev/cpuset/tasks
380    chmod 0664 /dev/cpuset/camera-daemon/tasks
381    chmod 0664 /dev/cpuset/foreground/cgroup.procs
382    chmod 0664 /dev/cpuset/foreground_window/cgroup.procs
383    chmod 0664 /dev/cpuset/background/cgroup.procs
384    chmod 0664 /dev/cpuset/system-background/cgroup.procs
385    chmod 0664 /dev/cpuset/top-app/cgroup.procs
386    chmod 0664 /dev/cpuset/restricted/cgroup.procs
387    chmod 0664 /dev/cpuset/cgroup.procs
388    chmod 0664 /dev/cpuset/camera-daemon/cgroup.procs
389
390    # make the PSI monitor accessible to others
391    chown system system /proc/pressure/memory
392    chmod 0664 /proc/pressure/memory
393
394    mount bpf bpf /sys/fs/bpf nodev noexec nosuid
395
396    # pstore/ramoops previous console log
397    mount pstore pstore /sys/fs/pstore nodev noexec nosuid
398    chown system log /sys/fs/pstore
399    chmod 0550 /sys/fs/pstore
400    chown system log /sys/fs/pstore/console-ramoops
401    chmod 0440 /sys/fs/pstore/console-ramoops
402    chown system log /sys/fs/pstore/console-ramoops-0
403    chmod 0440 /sys/fs/pstore/console-ramoops-0
404    chown system log /sys/fs/pstore/pmsg-ramoops-0
405    chmod 0440 /sys/fs/pstore/pmsg-ramoops-0
406
407    # enable armv8_deprecated instruction hooks
408    write /proc/sys/abi/swp 1
409
410    # Linux's execveat() syscall may construct paths containing /dev/fd
411    # expecting it to point to /proc/self/fd
412    symlink /proc/self/fd /dev/fd
413
414    export DOWNLOAD_CACHE /data/cache
415
416    # This allows the ledtrig-transient properties to be created here so
417    # that they can be chown'd to system:system later on boot
418    write /sys/class/leds/vibrator/trigger "transient"
419
420    # This is used by Bionic to select optimized routines.
421    write /dev/cpu_variant:${ro.bionic.arch} ${ro.bionic.cpu_variant}
422    chmod 0444 /dev/cpu_variant:${ro.bionic.arch}
423    write /dev/cpu_variant:${ro.bionic.2nd_arch} ${ro.bionic.2nd_cpu_variant}
424    chmod 0444 /dev/cpu_variant:${ro.bionic.2nd_arch}
425
426    # Allow system processes to read / write power state.
427    chown system system /sys/power/state
428    chown system system /sys/power/wakeup_count
429    chmod 0660 /sys/power/state
430
431    chown radio wakelock /sys/power/wake_lock
432    chown radio wakelock /sys/power/wake_unlock
433    chmod 0660 /sys/power/wake_lock
434    chmod 0660 /sys/power/wake_unlock
435
436    # Start logd before any other services run to ensure we capture all of their logs.
437    start logd
438    # Start lmkd before any other services run so that it can register them
439    write /proc/sys/vm/watermark_boost_factor 0
440    chown root system /sys/module/lowmemorykiller/parameters/adj
441    chmod 0664 /sys/module/lowmemorykiller/parameters/adj
442    chown root system /sys/module/lowmemorykiller/parameters/minfree
443    chmod 0664 /sys/module/lowmemorykiller/parameters/minfree
444    start lmkd
445
446    # Start essential services.
447    start servicemanager
448    start hwservicemanager
449    start vndservicemanager
450
451    # Mount /mnt/vm ASAP to allow early VMs to run.
452    mkdir /mnt/vm 0755 root root
453    mount tmpfs tmpfs /mnt/vm nosuid nodev noexec rw
454    restorecon /mnt/vm
455    chown system system /mnt/vm
456    chmod 0770 /mnt/vm
457    mkdir /mnt/vm/early 0770 system system
458
459# Run boringssl self test for each ABI.  Any failures trigger reboot to firmware.
460import /system/etc/init/hw/init.boringssl.${ro.zygote}.rc
461
462service boringssl_self_test32 /system/bin/boringssl_self_test32
463    reboot_on_failure reboot,boringssl-self-check-failed
464    stdio_to_kmsg
465    # Explicitly specify that boringssl_self_test32 doesn't require any capabilities
466    capabilities
467    user nobody
468
469service boringssl_self_test64 /system/bin/boringssl_self_test64
470    reboot_on_failure reboot,boringssl-self-check-failed
471    stdio_to_kmsg
472    # Explicitly specify that boringssl_self_test64 doesn't require any capabilities
473    capabilities
474    user nobody
475
476service boringssl_self_test_apex32 /apex/com.android.conscrypt/bin/boringssl_self_test32
477    reboot_on_failure reboot,boringssl-self-check-failed
478    stdio_to_kmsg
479    # Explicitly specify that boringssl_self_test_apex32 doesn't require any capabilities
480    capabilities
481    user nobody
482
483service boringssl_self_test_apex64 /apex/com.android.conscrypt/bin/boringssl_self_test64
484    reboot_on_failure reboot,boringssl-self-check-failed
485    stdio_to_kmsg
486    # Explicitly specify that boringssl_self_test_apex64 doesn't require any capabilities
487    capabilities
488    user nobody
489
490# Healthd can trigger a full boot from charger mode by signaling this
491# property when the power button is held.
492on property:sys.boot_from_charger_mode=1
493    class_stop charger
494    trigger late-init
495
496# Indicate to fw loaders that the relevant mounts are up.
497on firmware_mounts_complete
498    rm /dev/.booting
499
500# Mount filesystems and start core system services.
501on late-init
502    trigger early-fs
503
504    # Mount fstab in init.{$device}.rc by mount_all command. Optional parameter
505    # '--early' can be specified to skip entries with 'latemount'.
506    # /system and /vendor must be mounted by the end of the fs stage,
507    # while /data is optional.
508    trigger fs
509    trigger post-fs
510
511    # Mount fstab in init.{$device}.rc by mount_all with '--late' parameter
512    # to only mount entries with 'latemount'. This is needed if '--early' is
513    # specified in the previous mount_all command on the fs stage.
514    # With /system mounted and properties form /system + /factory available,
515    # some services can be started.
516    trigger late-fs
517
518    # Now we can mount /data. File encryption requires keymaster to decrypt
519    # /data, which in turn can only be loaded when system properties are present.
520    trigger post-fs-data
521
522    # Should be before netd, but after apex, properties and logging is available.
523    trigger load-bpf-programs
524    trigger bpf-progs-loaded
525
526    # Now we can start zygote.
527    trigger zygote-start
528
529    # Remove a file to wake up anything waiting for firmware.
530    trigger firmware_mounts_complete
531
532    trigger early-boot
533    trigger boot
534
535on early-fs
536    # Once metadata has been mounted, we'll need vold to deal with userdata checkpointing
537    start vold
538
539on post-fs
540    exec - system system -- /system/bin/vdc checkpoint markBootAttempt
541
542    # Once everything is setup, no need to modify /.
543    # The bind+remount combination allows this to work in containers.
544    mount rootfs rootfs / remount bind ro nodev
545
546    # Mount default storage into root namespace
547    mount none /mnt/user/0 /storage bind rec
548    mount none none /storage slave rec
549
550    # Make sure /sys/kernel/debug (if present) is labeled properly
551    # Note that tracefs may be mounted under debug, so we need to cross filesystems
552    restorecon --recursive --cross-filesystems /sys/kernel/debug
553
554    # We chown/chmod /cache again so because mount is run as root + defaults
555    chown system cache /cache
556    chmod 0770 /cache
557    # We restorecon /cache in case the cache partition has been reset.
558    restorecon_recursive /cache
559
560    # Create /cache/recovery in case it's not there. It'll also fix the odd
561    # permissions if created by the recovery system.
562    mkdir /cache/recovery 0770 system cache
563
564    # Backup/restore mechanism uses the cache partition
565    mkdir /cache/backup_stage 0700 system system
566    mkdir /cache/backup 0700 system system
567
568    #change permissions on vmallocinfo so we can grab it from bugreports
569    chown root log /proc/vmallocinfo
570    chmod 0440 /proc/vmallocinfo
571
572    chown root log /proc/allocinfo
573    chmod 0440 /proc/allocinfo
574
575    chown root log /proc/slabinfo
576    chmod 0440 /proc/slabinfo
577
578    chown root log /proc/pagetypeinfo
579    chmod 0440 /proc/pagetypeinfo
580
581    #change permissions on kmsg & sysrq-trigger so bugreports can grab kthread stacks
582    chown root system /proc/kmsg
583    chmod 0440 /proc/kmsg
584    chown root system /proc/sysrq-trigger
585    chmod 0220 /proc/sysrq-trigger
586    chown system log /proc/last_kmsg
587    chmod 0440 /proc/last_kmsg
588
589    # make the selinux kernel policy world-readable
590    chmod 0444 /sys/fs/selinux/policy
591
592    # create the lost+found directories, so as to enforce our permissions
593    mkdir /cache/lost+found 0770 root root
594
595    restorecon_recursive /metadata
596    mkdir /metadata/vold
597    chmod 0700 /metadata/vold
598    mkdir /metadata/password_slots 0771 root system
599    mkdir /metadata/bootstat 0750 system log
600    mkdir /metadata/ota 0750 root system
601    mkdir /metadata/ota/snapshots 0750 root system
602    mkdir /metadata/watchdog 0770 root system
603    mkdir /metadata/tradeinmode 0770 root system
604    mkdir /metadata/prefetch 0770 root system
605
606    mkdir /metadata/apex 0700 root system
607    mkdir /metadata/apex/sessions 0700 root system
608    # On some devices we see a weird behaviour in which /metadata/apex doesn't
609    # have a correct label. To workaround this bug, explicitly call restorecon
610    # on /metadata/apex. For most of the boot sequences /metadata/apex will
611    # already have a correct selinux label, meaning that this call will be a
612    # no-op.
613    restorecon_recursive /metadata/apex
614
615    mkdir /metadata/staged-install 0770 root system
616
617on late-fs
618    # Ensure that tracefs has the correct permissions.
619    # This does not work correctly if it is called in post-fs.
620    chmod 0755 /sys/kernel/tracing
621    chmod 0755 /sys/kernel/debug/tracing
622
623    # HALs required before storage encryption can get unlocked (FBE)
624    class_start early_hal
625
626# Only enable the bootreceiver tracing instance for kernels 5.10 and above.
627on late-fs && property:ro.kernel.version=4.19
628    setprop bootreceiver.enable 0
629on late-fs && property:ro.kernel.version=5.4
630    setprop bootreceiver.enable 0
631on late-fs
632    # Bootreceiver tracing instance is enabled by default.
633    setprop bootreceiver.enable ${bootreceiver.enable:-1}
634
635on property:ro.product.cpu.abilist64=* && property:bootreceiver.enable=1
636    # Set up a tracing instance for system_server to monitor error_report_end events.
637    # These are sent by kernel tools like KASAN and KFENCE when a memory corruption
638    # is detected. This is only needed for 64-bit systems.
639    mkdir /sys/kernel/tracing/instances/bootreceiver 0700 system system
640    restorecon_recursive /sys/kernel/tracing/instances/bootreceiver
641    write /sys/kernel/tracing/instances/bootreceiver/buffer_size_kb 1
642    write /sys/kernel/tracing/instances/bootreceiver/trace_options disable_on_free
643    write /sys/kernel/tracing/instances/bootreceiver/events/error_report/error_report_end/enable 1
644
645on post-fs-data
646
647    # Start checkpoint before we touch data
648    exec - system system -- /system/bin/vdc checkpoint prepareCheckpoint
649
650    # We chown/chmod /data again so because mount is run as root + defaults
651    chown system system /data
652    chmod 0771 /data
653    # We restorecon /data in case the userdata partition has been reset.
654    restorecon /data
655
656    # Make sure we have the device encryption key.
657    installkey /data
658
659    # Start bootcharting as soon as possible after the data partition is
660    # mounted to collect more data.
661    mkdir /data/bootchart 0755 shell shell encryption=Require
662    bootchart start
663
664    # Avoid predictable entropy pool. Carry over entropy from previous boot.
665    copy /data/system/entropy.dat /dev/urandom
666
667    mkdir /data/vendor 0771 root root encryption=Require
668    mkdir /data/vendor/hardware 0771 root root
669
670    # Start tombstoned early to be able to store tombstones.
671    mkdir /data/anr 0775 system system encryption=Require
672    mkdir /data/tombstones 0775 system system encryption=Require
673    mkdir /data/vendor/tombstones 0771 root root
674    mkdir /data/vendor/tombstones/wifi 0771 wifi wifi
675    start tombstoned
676
677    # Make sure that apexd is started in the default namespace
678    enter_default_mount_ns
679
680    # set up keystore directory structure first so that we can end early boot
681    # and start apexd
682    mkdir /data/misc 01771 system misc encryption=Require
683    mkdir /data/misc/keystore 0700 keystore keystore
684    # work around b/183668221
685    restorecon /data/misc /data/misc/keystore
686
687    # Boot level 30
688    # odsign signing keys have MAX_BOOT_LEVEL=30
689    # This is currently the earliest boot level, but we start at 30
690    # to leave room for earlier levels.
691    setprop keystore.boot_level 30
692
693    # Now that /data is mounted and we have created /data/misc/keystore,
694    # we can tell keystore to stop allowing use of early-boot keys,
695    # and access its database for the first time to support creation and
696    # use of MAX_BOOT_LEVEL keys.
697    exec - system system -- /system/bin/vdc keymaster earlyBootEnded
698
699    # Multi-installed APEXes are selected using persist props.
700    # Load persist properties and override properties (if enabled) from /data,
701    # before starting apexd.
702    # /data/property should be created before `load_persist_props`
703    mkdir /data/property 0700 root root encryption=Require
704    load_persist_props
705
706    start logd
707    start logd-reinit
708
709    # Some existing vendor rc files use 'on load_persist_props_action' to know
710    # when persist props are ready. These are difficult to change due to GRF,
711    # so continue triggering this action here even though props are already loaded
712    # by the 'load_persist_props' call above.
713    trigger load_persist_props_action
714
715    # /data/apex is now available. Start apexd to scan and activate APEXes.
716    #
717    # To handle userspace reboots, make sure that apexd is started cleanly here
718    # (set apexd.status="") and that it is restarted if it's already running.
719    #
720    # /data/apex uses encryption=None because direct I/O support is needed on
721    # APEX files, but some devices don't support direct I/O on encrypted files.
722    # Also, APEXes are public information, similar to the system image.
723    # /data/apex/decompressed and /data/apex/ota_reserved override this setting;
724    # they are encrypted so that files in them can be hard-linked into
725    # /data/rollback which is encrypted.
726    mkdir /data/apex 0755 root system encryption=None
727    mkdir /data/apex/active 0755 root system
728    mkdir /data/apex/backup 0700 root system
729    mkdir /data/apex/decompressed 0755 root system encryption=Require
730    mkdir /data/app-staging 0751 system system encryption=DeleteIfNecessary
731    mkdir /data/apex/ota_reserved 0700 root system encryption=Require
732    setprop apexd.status ""
733    restart apexd
734
735    # create rest of basic filesystem structure
736    mkdir /data/misc/recovery 0770 system log
737    copy /data/misc/recovery/ro.build.fingerprint /data/misc/recovery/ro.build.fingerprint.1
738    chmod 0440 /data/misc/recovery/ro.build.fingerprint.1
739    chown system log /data/misc/recovery/ro.build.fingerprint.1
740    write /data/misc/recovery/ro.build.fingerprint ${ro.build.fingerprint}
741    chmod 0440 /data/misc/recovery/ro.build.fingerprint
742    chown system log /data/misc/recovery/ro.build.fingerprint
743    mkdir /data/misc/recovery/proc 0770 system log
744    copy /data/misc/recovery/proc/version /data/misc/recovery/proc/version.1
745    chmod 0440 /data/misc/recovery/proc/version.1
746    chown system log /data/misc/recovery/proc/version.1
747    copy /proc/version /data/misc/recovery/proc/version
748    chmod 0440 /data/misc/recovery/proc/version
749    chown system log /data/misc/recovery/proc/version
750    mkdir /data/misc/bluedroid 02770 bluetooth bluetooth
751    # Fix the access permissions and group ownership for 'bt_config.conf'
752    chmod 0660 /data/misc/bluedroid/bt_config.conf
753    chown bluetooth bluetooth /data/misc/bluedroid/bt_config.conf
754    mkdir /data/misc/bluetooth 0770 bluetooth bluetooth
755    mkdir /data/misc/bluetooth/logs 0770 bluetooth bluetooth
756    mkdir /data/misc/nfc 0770 nfc nfc
757    mkdir /data/misc/nfc/logs 0770 nfc nfc
758    mkdir /data/misc/credstore 0700 credstore credstore
759    mkdir /data/misc/gatekeeper 0700 system system
760    mkdir /data/misc/keychain 0771 system system
761    mkdir /data/misc/net 0750 root shell
762    mkdir /data/misc/radio 0770 system radio
763    mkdir /data/misc/sms 0770 system radio
764    mkdir /data/misc/carrierid 0770 system radio
765    mkdir /data/misc/apns 0770 system radio
766    mkdir /data/misc/emergencynumberdb 0770 system radio
767    mkdir /data/misc/network_watchlist 0774 system system
768    mkdir /data/misc/telephonyconfig 0770 system radio
769    mkdir /data/misc/textclassifier 0771 system system
770    mkdir /data/misc/vpn 0770 system vpn
771    mkdir /data/misc/shared_relro 0771 shared_relro shared_relro
772    mkdir /data/misc/systemkeys 0700 system system
773    mkdir /data/misc/wifi 0770 wifi wifi
774    mkdir /data/misc/wifi/mainline_supplicant 0770 wifi wifi
775    mkdir /data/misc/wifi/mainline_supplicant/sockets 0770 wifi wifi
776    mkdir /data/misc/wifi/sockets 0770 wifi wifi
777    mkdir /data/misc/wifi/wpa_supplicant 0770 wifi wifi
778    mkdir /data/misc/ethernet 0770 system system
779    mkdir /data/misc/dhcp 0770 dhcp dhcp
780    mkdir /data/misc/user 0771 root root
781    # give system access to wpa_supplicant.conf for backup and restore
782    chmod 0660 /data/misc/wifi/wpa_supplicant.conf
783    mkdir /data/local 0751 root root encryption=Require
784    mkdir /data/misc/media 0700 media media
785    mkdir /data/misc/audioserver 0700 audioserver audioserver
786    mkdir /data/misc/cameraserver 0700 cameraserver cameraserver
787    mkdir /data/misc/vold 0700 root root
788    mkdir /data/misc/boottrace 0771 system shell
789    mkdir /data/misc/update_engine 0700 root root
790    mkdir /data/misc/update_engine_log 02750 root update_engine_log
791    chown root update_engine_log /data/misc/update_engine_log
792    mkdir /data/misc/trace 0700 root root
793    # create location to store surface and window trace files
794    mkdir /data/misc/wmtrace 0700 system system
795    # create location to store accessibility trace files
796    mkdir /data/misc/a11ytrace 0700 system system
797    # profile file layout
798    mkdir /data/misc/profiles 0771 system system
799    mkdir /data/misc/profiles/cur 0771 system system
800    mkdir /data/misc/profiles/ref 0771 system system
801    mkdir /data/misc/profman 0770 system shell
802    mkdir /data/misc/gcov 0770 root root
803    mkdir /data/misc/installd 0700 root root
804    mkdir /data/misc/apexdata 0711 root root
805    mkdir /data/misc/apexrollback 0700 root root
806    mkdir /data/misc/appcompat/ 0700 system system
807    mkdir /data/misc/uprobestats-configs/ 0777 uprobestats uprobestats
808    mkdir /data/misc/snapshotctl_log 0755 root root
809    # create location to store pre-reboot information
810    mkdir /data/misc/prereboot 0700 system system
811    # directory used for on-device refresh metrics file.
812    mkdir /data/misc/odrefresh 0777 system system
813    # directory used for on-device signing key blob
814    mkdir /data/misc/odsign 0710 root system
815    # directory used for odsign metrics
816    mkdir /data/misc/odsign/metrics 0770 root system
817    # directory used for connectivity blob store.
818    mkdir /data/misc/connectivityblobdb 0770 system system
819
820    # Directory for VirtualizationService temporary image files.
821    # Delete any stale files owned by the old virtualizationservice uid (b/230056726).
822    chmod 0770 /data/misc/virtualizationservice
823    exec - virtualizationservice system -- /bin/rm -rf /data/misc/virtualizationservice
824    mkdir /data/misc/virtualizationservice 0771 system system
825
826    # /data/preloads uses encryption=None because it only contains preloaded
827    # files that are public information, similar to the system image.
828    mkdir /data/preloads 0775 system system encryption=None
829
830    # For security reasons, /data/local/tmp should always be empty.
831    # Do not place files or directories in /data/local/tmp
832    mkdir /data/local/tmp 0771 shell shell
833    mkdir /data/local/traces 0777 shell shell
834    mkdir /data/app-private 0771 system system encryption=Require
835    mkdir /data/app-ephemeral 0771 system system encryption=Require
836    mkdir /data/app-asec 0700 root root encryption=Require
837    mkdir /data/app-lib 0771 system system encryption=Require
838    mkdir /data/app 0771 system system encryption=Require
839
840    # Create directory for app metadata files
841    mkdir /data/app-metadata 0700 system system encryption=Require
842
843    # create directory for updated font files.
844    mkdir /data/fonts/ 0771 root root encryption=Require
845    mkdir /data/fonts/files 0771 system system
846    mkdir /data/fonts/config 0770 system system
847
848    # Create directories to push tests to for each linker namespace.
849    # Create the subdirectories in case the first test is run as root
850    # so it doesn't end up owned by root.
851    # Set directories to be executable by any process so that debuggerd,
852    # aka crash_dump, can read any executables/shared libraries.
853    mkdir /data/local/tests 0701 shell shell
854    mkdir /data/local/tests/product 0701 shell shell
855    mkdir /data/local/tests/system 0701 shell shell
856    mkdir /data/local/tests/unrestricted 0701 shell shell
857    mkdir /data/local/tests/vendor 0701 shell shell
858
859    # create dalvik-cache, so as to enforce our permissions
860    mkdir /data/dalvik-cache 0771 root root encryption=Require
861    # create the A/B OTA directory, so as to enforce our permissions
862    mkdir /data/ota 0771 root root encryption=Require
863
864    # create the OTA package directory. It will be accessed by GmsCore (cache
865    # group), update_engine and update_verifier.
866    mkdir /data/ota_package 0770 system cache encryption=Require
867
868    # create resource-cache and double-check the perms
869    mkdir /data/resource-cache 0771 system system encryption=Require
870    chown system system /data/resource-cache
871    chmod 0771 /data/resource-cache
872
873    # Ensure that lost+found exists and has the correct permissions.  Linux
874    # filesystems expect this directory to exist; it's where the fsck tool puts
875    # any recovered files that weren't present in any directory.  It must be
876    # unencrypted, as fsck must be able to write to it.
877    mkdir /data/lost+found 0770 root root encryption=None
878
879    # create directory for DRM plug-ins - give drm the read/write access to
880    # the following directory.
881    mkdir /data/drm 0770 drm drm encryption=Require
882
883    # create directory for MediaDrm plug-ins - give drm the read/write access to
884    # the following directory.
885    mkdir /data/mediadrm 0770 mediadrm mediadrm encryption=Require
886
887    # NFC: create data/nfc for nv storage
888    mkdir /data/nfc 0770 nfc nfc encryption=Require
889    mkdir /data/nfc/param 0770 nfc nfc
890
891    # Create all remaining /data root dirs so that they are made through init
892    # and get proper encryption policy installed
893    mkdir /data/backup 0700 system system encryption=Require
894    mkdir /data/ss 0700 system system encryption=Require
895
896    mkdir /data/system 0775 system system encryption=Require
897    mkdir /data/system/environ 0700 system system
898    # b/183861600 attempt to fix selinux label before running derive_classpath service
899    restorecon /data/system/environ
900    mkdir /data/system/dropbox 0700 system system
901    mkdir /data/system/heapdump 0700 system system
902    mkdir /data/system/users 0775 system system
903    # Mkdir and set SELinux security contexts for shutdown-checkpoints.
904    # TODO(b/270286197): remove these after couple releases.
905    mkdir /data/system/shutdown-checkpoints 0755 system system
906    restorecon_recursive /data/system/shutdown-checkpoints
907
908    # Create the parent directories of the user CE and DE storage directories.
909    # These parent directories must use encryption=None, since each of their
910    # subdirectories uses a different encryption policy (a per-user one), and
911    # encryption policies apply recursively.  These directories should never
912    # contain any subdirectories other than the per-user ones.  /data/media/obb
913    # is an exception that exists for legacy reasons.
914    #
915    # Don't use any write mode bits (0222) for any of these directories, since
916    # the only process that should write to them directly is vold (since it
917    # needs to set up file-based encryption on the subdirectories), which runs
918    # as root with CAP_DAC_OVERRIDE.  This is also fully enforced via the
919    # SELinux policy.  But we also set the DAC file modes accordingly, to try to
920    # minimize differences in behavior if SELinux is set to permissive mode.
921    mkdir /data/media 0550 media_rw media_rw encryption=None
922    mkdir /data/misc_ce 0551 system misc encryption=None
923    mkdir /data/misc_de 0551 system misc encryption=None
924    mkdir /data/system_ce 0550 system system encryption=None
925    mkdir /data/system_de 0550 system system encryption=None
926    mkdir /data/user 0511 system system encryption=None
927    mkdir /data/user_de 0511 system system encryption=None
928    mkdir /data/vendor_ce 0551 root root encryption=None
929    mkdir /data/vendor_de 0551 root root encryption=None
930
931    # Similar to the top-level CE and DE directories, /data/storage_area must
932    # itself be unencrypted, since it contains encrypted directories.
933    mkdir /data/storage_area 0551 root root encryption=None
934
935    # Set the casefold flag on /data/media.  For upgrades, a restorecon can be
936    # needed first to relabel the directory from media_rw_data_file.
937    restorecon /data/media
938    exec - media_rw media_rw -- /system/bin/chattr +F /data/media
939
940    # A tmpfs directory, which will contain all apps and sdk sandbox CE and DE
941    # data directory that bind mount from the original source.
942    mount tmpfs tmpfs /data_mirror nodev noexec nosuid mode=0700,uid=0,gid=1000
943    restorecon /data_mirror
944    mkdir /data_mirror/data_ce 0700 root root
945    mkdir /data_mirror/data_de 0700 root root
946    mkdir /data_mirror/misc_ce 0700 root root
947    mkdir /data_mirror/misc_de 0700 root root
948    mkdir /data_mirror/storage_area 0700 root root
949
950    # Create CE and DE data directory for default volume
951    # Not needed for storage_area directory, since this is
952    # not supported for non-default volumes and the path
953    # does not include the volume ID
954    mkdir /data_mirror/data_ce/null 0700 root root
955    mkdir /data_mirror/data_de/null 0700 root root
956    mkdir /data_mirror/misc_ce/null 0700 root root
957    mkdir /data_mirror/misc_de/null 0700 root root
958
959    # Bind mount CE and DE data directory to mirror's default volume directory.
960    # Note that because the /data mount has the "shared" propagation type, the
961    # later bind mount of /data/data onto /data/user/0 will automatically
962    # propagate to /data_mirror/data_ce/null/0 as well.
963    mount none /data/user /data_mirror/data_ce/null bind rec
964    mount none /data/user_de /data_mirror/data_de/null bind rec
965    mount none /data/misc_ce /data_mirror/misc_ce/null bind rec
966    mount none /data/misc_de /data_mirror/misc_de/null bind rec
967
968    # Also bind mount for the storage area directory (minus the volume ID)
969    mount none /data/storage_area /data_mirror/storage_area bind rec
970
971    # Create mirror directory for jit profiles
972    mkdir /data_mirror/cur_profiles 0700 root root
973    mount none /data/misc/profiles/cur /data_mirror/cur_profiles bind rec
974    mkdir /data_mirror/ref_profiles 0700 root root
975    mount none /data/misc/profiles/ref /data_mirror/ref_profiles bind rec
976
977    mkdir /data/cache 0770 system cache encryption=Require
978    mkdir /data/cache/recovery 0770 system cache
979    mkdir /data/cache/backup_stage 0700 system system
980    mkdir /data/cache/backup 0700 system system
981
982    # Delete these if need be, per b/139193659
983    mkdir /data/rollback 0700 system system encryption=DeleteIfNecessary
984    mkdir /data/rollback-observer 0700 system system encryption=DeleteIfNecessary
985    mkdir /data/rollback-history 0700 system system encryption=DeleteIfNecessary
986
987    # Create root dir for Incremental Service
988    mkdir /data/incremental 0771 system system encryption=Require
989
990    # Create directories for statsd
991    mkdir /data/misc/stats-active-metric/ 0770 statsd system
992    mkdir /data/misc/stats-data/ 0770 statsd system
993    mkdir /data/misc/stats-data/restricted-data 0770 statsd system
994    mkdir /data/misc/stats-metadata/ 0770 statsd system
995    mkdir /data/misc/stats-service/ 0770 statsd system
996    mkdir /data/misc/train-info/ 0770 statsd system
997
998    # TODO(b/400439023): Remove once attest modules flagging is removed.
999    wait_for_prop apexd.status activated
1000    # Wait for KeyMints to receive APEX module info before starting code from updateable APEXes.
1001    # This is to prevent APEX modules from interfering in module measurement.
1002    wait_for_prop keystore.module_hash.sent true
1003    perform_apex_config
1004
1005    exec_start system_aconfigd_mainline_init
1006    start system_aconfigd_socket_service
1007
1008    # start mainline aconfigd init, after transition, the above system_aconfigd_mainline_init
1009    # will be deprecated
1010    exec_start mainline_aconfigd_init
1011    start mainline_aconfigd_socket_service
1012
1013    # Create directories for boot animation.
1014    mkdir /data/misc/bootanim 0755 system system
1015
1016    exec_start derive_sdk
1017
1018    init_user0
1019
1020    # Set SELinux security contexts on upgrade or policy update.
1021    restorecon --recursive --skip-ce /data
1022
1023    # Define and export *CLASSPATH variables
1024    # Must start before 'odsign', as odsign depends on *CLASSPATH variables
1025    exec_start derive_classpath
1026    load_exports /data/system/environ/classpath
1027
1028    # Start ART's oneshot boot service to propagate boot experiment flags to
1029    # dalvik.vm.*. This needs to be done before odsign since odrefresh uses and
1030    # validates those properties against the signed cache-info.xml.
1031    exec_start art_boot
1032
1033    # Start the on-device signing daemon, and wait for it to finish, to ensure
1034    # ART artifacts are generated if needed.
1035    # Must start after 'derive_classpath' to have *CLASSPATH variables set.
1036    start odsign
1037
1038    # Wait for odsign to be done with the key.
1039    wait_for_prop odsign.key.done 1
1040
1041    # Bump the boot level to 1000000000; this prevents further on-device signing.
1042    # This is a special value that shuts down the thread which listens for
1043    # further updates.
1044    setprop keystore.boot_level 1000000000
1045
1046    # Allow apexd to snapshot and restore device encrypted apex data in the case
1047    # of a rollback. This should be done immediately after DE_user data keys
1048    # are loaded. APEXes should not access this data until this has been
1049    # completed and apexd.status becomes "ready".
1050    exec_start apexd-snapshotde
1051
1052    # sys.memfd_use set to false by default, which keeps it disabled
1053    # until it is confirmed that apps and vendor processes don't make
1054    # IOCTLs on ashmem fds any more.
1055    setprop sys.use_memfd false
1056
1057    # Set fscklog permission
1058    chown root system /dev/fscklogs/log
1059    chmod 0770 /dev/fscklogs/log
1060
1061    # Enable FUSE by default
1062    setprop persist.sys.fuse true
1063
1064    # Update dm-verity state and set partition.*.verified properties.
1065    verity_update_state
1066
1067on property:vold.checkpoint_committed=1
1068    trigger post-fs-data-checkpointed
1069
1070# It is important that we start bpfloader after:
1071#   - /sys/fs/bpf is already mounted,
1072#   - apex (incl. rollback) is initialized (so that we can load bpf
1073#     programs shipped as part of apex mainline modules)
1074#   - logd is ready for us to log stuff
1075#
1076# At the same time we want to be as early as possible to reduce races and thus
1077# failures (before memory is fragmented, and cpu is busy running tons of other
1078# stuff) and we absolutely want to be before netd and the system boot slot is
1079# considered to have booted successfully.
1080on load-bpf-programs
1081    exec_start bpfloader
1082
1083on bpf-progs-loaded
1084    start netd
1085
1086# It is recommended to put unnecessary data/ initialization from post-fs-data
1087# to start-zygote in device's init.rc to unblock zygote start.
1088on zygote-start
1089    wait_for_prop odsign.verification.done 1
1090    # A/B update verifier that marks a successful boot.
1091    exec_start update_verifier
1092    start statsd
1093    start zygote
1094    start zygote_secondary
1095
1096on boot && property:ro.config.low_ram=true
1097    # Tweak background writeout
1098    write /proc/sys/vm/dirty_expire_centisecs 200
1099    write /proc/sys/vm/dirty_background_ratio  5
1100
1101on boot && property:suspend.disable_sync_on_suspend=true
1102    write /sys/power/sync_on_suspend 0
1103
1104on boot
1105    # basic network init
1106    ifup lo
1107    hostname localhost
1108    domainname localdomain
1109
1110    # IPsec SA default expiration length
1111    write /proc/sys/net/core/xfrm_acq_expires 3600
1112
1113    # Memory management.  Basic kernel parameters, and allow the high
1114    # level system server to be able to adjust the kernel OOM driver
1115    # parameters to match how it is managing things.
1116    write /proc/sys/vm/overcommit_memory 1
1117    write /proc/sys/vm/min_free_order_shift 4
1118
1119    # System server manages zram writeback
1120    chown root system /sys/block/zram0/idle
1121    chmod 0220 /sys/block/zram0/idle
1122    chown root system /sys/block/zram0/writeback
1123    chmod 0220 /sys/block/zram0/writeback
1124
1125    # to access F2FS sysfs on dm-<num> directly
1126    mkdir /dev/sys/fs/by-name 0755 system system
1127    symlink /sys/fs/f2fs/${dev.mnt.dev.data} /dev/sys/fs/by-name/userdata
1128
1129    # dev.mnt.dev.data=dm-N, dev.mnt.blk.data=sdaN/mmcblk0pN, dev.mnt.rootdisk.data=sda/mmcblk0, or
1130    # dev.mnt.dev.data=sdaN/mmcblk0pN, dev.mnt.blk.data=sdaN/mmcblk0pN, dev.mnt.rootdisk.data=sda/mmcblk0
1131    mkdir /dev/sys/block/by-name 0755 system system
1132    symlink /sys/class/block/${dev.mnt.dev.data} /dev/sys/block/by-name/userdata
1133    symlink /sys/class/block/${dev.mnt.rootdisk.data} /dev/sys/block/by-name/rootdisk
1134
1135    # F2FS tuning. Set cp_interval larger than dirty_expire_centisecs, 30 secs,
1136    # to avoid power consumption when system becomes mostly idle. Be careful
1137    # to make it too large, since it may bring userdata loss, if they
1138    # are not aware of using fsync()/sync() to prepare sudden power-cut.
1139    write /dev/sys/fs/by-name/userdata/cp_interval 200
1140    write /dev/sys/fs/by-name/userdata/gc_urgent_sleep_time 50
1141    write /dev/sys/fs/by-name/userdata/iostat_period_ms 1000
1142    write /dev/sys/fs/by-name/userdata/iostat_enable 1
1143
1144    # set readahead multiplier for POSIX_FADV_SEQUENTIAL files
1145    write /dev/sys/fs/by-name/userdata/seq_file_ra_mul 128
1146
1147    # limit discard size to 128MB in order to avoid long IO latency
1148    # for filesystem tuning first (dm or sda)
1149    # this requires enabling selinux entry for sda/mmcblk0 in vendor side
1150    write /dev/sys/block/by-name/userdata/queue/discard_max_bytes 134217728
1151    write /dev/sys/block/by-name/rootdisk/queue/discard_max_bytes 134217728
1152
1153    # Permissions for System Server and daemons.
1154    chown system system /sys/power/autosleep
1155
1156    chown system system /sys/devices/system/cpu/cpufreq/interactive/timer_rate
1157    chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/timer_rate
1158    chown system system /sys/devices/system/cpu/cpufreq/interactive/timer_slack
1159    chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/timer_slack
1160    chown system system /sys/devices/system/cpu/cpufreq/interactive/min_sample_time
1161    chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/min_sample_time
1162    chown system system /sys/devices/system/cpu/cpufreq/interactive/hispeed_freq
1163    chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/hispeed_freq
1164    chown system system /sys/devices/system/cpu/cpufreq/interactive/target_loads
1165    chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/target_loads
1166    chown system system /sys/devices/system/cpu/cpufreq/interactive/go_hispeed_load
1167    chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/go_hispeed_load
1168    chown system system /sys/devices/system/cpu/cpufreq/interactive/above_hispeed_delay
1169    chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/above_hispeed_delay
1170    chown system system /sys/devices/system/cpu/cpufreq/interactive/boost
1171    chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/boost
1172    chown system system /sys/devices/system/cpu/cpufreq/interactive/boostpulse
1173    chown system system /sys/devices/system/cpu/cpufreq/interactive/input_boost
1174    chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/input_boost
1175    chown system system /sys/devices/system/cpu/cpufreq/interactive/boostpulse_duration
1176    chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/boostpulse_duration
1177    chown system system /sys/devices/system/cpu/cpufreq/interactive/io_is_busy
1178    chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/io_is_busy
1179
1180    chown system system /sys/class/leds/vibrator/trigger
1181    chown system system /sys/class/leds/vibrator/activate
1182    chown system system /sys/class/leds/vibrator/brightness
1183    chown system system /sys/class/leds/vibrator/duration
1184    chown system system /sys/class/leds/vibrator/state
1185    chown system system /sys/class/timed_output/vibrator/enable
1186    chown system system /sys/class/leds/keyboard-backlight/brightness
1187    chown system system /sys/class/leds/lcd-backlight/brightness
1188    chown system system /sys/class/leds/button-backlight/brightness
1189    chown system system /sys/class/leds/jogball-backlight/brightness
1190    chown system system /sys/class/leds/red/brightness
1191    chown system system /sys/class/leds/green/brightness
1192    chown system system /sys/class/leds/blue/brightness
1193    chown system system /sys/class/leds/red/device/grpfreq
1194    chown system system /sys/class/leds/red/device/grppwm
1195    chown system system /sys/class/leds/red/device/blink
1196    chown system system /sys/module/sco/parameters/disable_esco
1197    chown system system /sys/kernel/ipv4/tcp_wmem_min
1198    chown system system /sys/kernel/ipv4/tcp_wmem_def
1199    chown system system /sys/kernel/ipv4/tcp_wmem_max
1200    chown system system /sys/kernel/ipv4/tcp_rmem_min
1201    chown system system /sys/kernel/ipv4/tcp_rmem_def
1202    chown system system /sys/kernel/ipv4/tcp_rmem_max
1203    chown system system /sys/firmware/acpi/tables
1204    chown system system /sys/firmware/acpi/tables/BERT
1205    chown system system /sys/firmware/acpi/tables/data/BERT
1206    chown root radio /proc/cmdline
1207    chown root system /proc/bootconfig
1208
1209    # Define default initial receive window size in segments.
1210    setprop net.tcp_def_init_rwnd 60
1211
1212    # Start standard binderized HAL daemons
1213    class_start hal
1214
1215    class_start core
1216
1217on nonencrypted
1218    class_start main
1219    class_start late_start
1220
1221on property:sys.init_log_level=*
1222    loglevel ${sys.init_log_level}
1223
1224on charger
1225    class_start charger
1226
1227on property:sys.boot_completed=1
1228    bootchart stop
1229    # Setup per_boot directory so other .rc could start to use it on boot_completed
1230    exec - system system -- /bin/rm -rf /data/per_boot
1231    mkdir /data/per_boot 0700 system system encryption=Require key=per_boot_ref
1232
1233# system server cannot write to /proc/sys files,
1234# and chown/chmod does not work for /proc/sys/ entries.
1235# So proxy writes through init.
1236on property:sys.sysctl.extra_free_kbytes=*
1237    exec_background -- /system/bin/extra_free_kbytes.sh ${sys.sysctl.extra_free_kbytes}
1238
1239# Allow users to drop caches
1240on property:perf.drop_caches=3
1241    write /proc/sys/vm/drop_caches 3
1242    setprop perf.drop_caches 0
1243
1244# "tcp_default_init_rwnd" Is too long!
1245on property:net.tcp_def_init_rwnd=*
1246    write /proc/sys/net/ipv4/tcp_default_init_rwnd ${net.tcp_def_init_rwnd}
1247
1248# perf_event_open syscall security:
1249# Newer kernels have the ability to control the use of the syscall via SELinux
1250# hooks. init tests for this, and sets sys_init.perf_lsm_hooks to 1 if the
1251# kernel has the hooks. In this case, the system-wide perf_event_paranoid
1252# sysctl is set to -1 (unrestricted use), and the SELinux policy is used for
1253# controlling access. On older kernels, the paranoid value is the only means of
1254# controlling access. It is normally 3 (allow only root), but the shell user
1255# can lower it to 1 (allowing thread-scoped pofiling) via security.perf_harden.
1256on load-bpf-programs && property:sys.init.perf_lsm_hooks=1
1257    write /proc/sys/kernel/perf_event_paranoid -1
1258on property:security.perf_harden=0 && property:sys.init.perf_lsm_hooks=""
1259    write /proc/sys/kernel/perf_event_paranoid 1
1260on property:security.perf_harden=1 && property:sys.init.perf_lsm_hooks=""
1261    write /proc/sys/kernel/perf_event_paranoid 3
1262
1263# Additionally, simpleperf profiler uses debug.* and security.perf_harden
1264# sysprops to be able to indirectly set these sysctls.
1265on property:security.perf_harden=0
1266    write /proc/sys/kernel/perf_event_max_sample_rate ${debug.perf_event_max_sample_rate:-100000}
1267    write /proc/sys/kernel/perf_cpu_time_max_percent ${debug.perf_cpu_time_max_percent:-25}
1268    write /proc/sys/kernel/perf_event_mlock_kb ${debug.perf_event_mlock_kb:-516}
1269# Default values.
1270on property:security.perf_harden=1
1271    write /proc/sys/kernel/perf_event_max_sample_rate 100000
1272    write /proc/sys/kernel/perf_cpu_time_max_percent 25
1273    write /proc/sys/kernel/perf_event_mlock_kb 516
1274
1275# This property can be set only on userdebug/eng. See neverallow rule in
1276# /system/sepolicy/private/property.te .
1277on property:security.lower_kptr_restrict=1
1278    write /proc/sys/kernel/kptr_restrict 0
1279
1280on property:security.lower_kptr_restrict=0
1281    write /proc/sys/kernel/kptr_restrict 2
1282
1283
1284# on shutdown
1285# In device's init.rc, this trigger can be used to do device-specific actions
1286# before shutdown. e.g disable watchdog and mask error handling
1287
1288## Daemon processes to be run by init.
1289##
1290service ueventd /system/bin/ueventd
1291    class core
1292    critical
1293    seclabel u:r:ueventd:s0
1294    user root
1295    shutdown critical
1296
1297service console /system/bin/sh
1298    class core
1299    console
1300    disabled
1301    user shell
1302    group shell log readproc
1303    seclabel u:r:shell:s0
1304    setenv HOSTNAME console
1305    shutdown critical
1306
1307on property:ro.debuggable=1
1308    # Give writes to the same group for the trace folder on debug builds,
1309    # it's further protected by selinux policy.
1310    # The folder is used to store method traces.
1311    chmod 0773 /data/misc/trace
1312    # Give writes and reads to anyone for the window trace folder on debug builds,
1313    # it's further protected by selinux policy.
1314    chmod 0777 /data/misc/wmtrace
1315    # Give reads to anyone for the accessibility trace folder on debug builds.
1316    chmod 0775 /data/misc/a11ytrace
1317
1318on init && property:ro.debuggable=1
1319    start console
1320
1321# Multi-Gen LRU Experiment
1322on property:persist.device_config.mglru_native.lru_gen_config=none
1323  write /sys/kernel/mm/lru_gen/enabled 0
1324on property:persist.device_config.mglru_native.lru_gen_config=core
1325  write /sys/kernel/mm/lru_gen/enabled 1
1326on property:persist.device_config.mglru_native.lru_gen_config=core_and_mm_walk
1327  write /sys/kernel/mm/lru_gen/enabled 3
1328on property:persist.device_config.mglru_native.lru_gen_config=core_and_nonleaf_young
1329  write /sys/kernel/mm/lru_gen/enabled 5
1330on property:persist.device_config.mglru_native.lru_gen_config=all
1331  write /sys/kernel/mm/lru_gen/enabled 7
1332
1333# Allow other processes to run `snapshotctl` through `init`. This requires
1334# `set_prop` permission on `snapshotctl_prop`.
1335on property:sys.snapshotctl.map=requested
1336    # "root" is needed to talk to gsid and pass its check on uid.
1337    # "system" is needed to write to "/dev/socket/snapuserd" to talk to
1338    # snapuserd.
1339    exec - root root system -- /system/bin/snapshotctl map
1340    setprop sys.snapshotctl.map "finished"
1341
1342on property:sys.snapshotctl.unmap=requested
1343    exec - root root system -- /system/bin/snapshotctl unmap
1344    setprop sys.snapshotctl.unmap "finished"
1345