[1/2,android/device/linaro/common] Add init.rc in common part of linaro devices

Message ID AANLkTi=rH40UQUyyZ5A5P8Rv3mNJCRH2nff3r4vPWuUL@mail.gmail.com
State New
Headers show

Commit Message

Jeremy Chang March 14, 2011, 2:37 p.m.
Signed-off-by: Jeremy Chang <jeremy.chang@linaro.org>
---
 init.rc |  410 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 files changed, 410 insertions(+), 0 deletions(-)
 create mode 100644 init.rc

+service dumpstate /system/bin/dumpstate -s
+    socket dumpstate stream 0660 shell log
+    disabled
+    oneshot

Comments

Patrik Ryd March 14, 2011, 3:23 p.m. | #1
Looks good to me.

 /Patrik

On 14 March 2011 15:37, Jeremy Chang <jeremy.chang@linaro.org> wrote:

> Signed-off-by: Jeremy Chang <jeremy.chang@linaro.org>
> ---
>  init.rc |  410
> +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
>  1 files changed, 410 insertions(+), 0 deletions(-)
>  create mode 100644 init.rc
>
> diff --git a/init.rc b/init.rc
> new file mode 100644
> index 0000000..b6a92c5
> --- /dev/null
> +++ b/init.rc
> @@ -0,0 +1,410 @@
> +on early-init
> +    start ueventd
> +
> +on init
> +
> +sysclktz 0
> +
> +loglevel 3
> +
> +# setup the global environment
> +    export PATH /sbin:/vendor/bin:/system/sbin:/system/bin:/system/xbin
> +    export LD_LIBRARY_PATH /vendor/lib:/system/lib
> +    export ANDROID_BOOTLOGO 1
> +    export ANDROID_ROOT /system
> +    export ANDROID_ASSETS /system/app
> +    export ANDROID_DATA /data
> +    export EXTERNAL_STORAGE /mnt/sdcard
> +    export ASEC_MOUNTPOINT /mnt/asec
> +    export LOOP_MOUNTPOINT /mnt/obb
> +    export BOOTCLASSPATH
>
> /system/framework/core.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/core-junit.jar
> +
> +# Backward compatibility
> +    symlink /system/etc /etc
> +    symlink /sys/kernel/debug /d
> +
> +# Right now vendor lives on the same filesystem as system,
> +# but someday that may change.
> +    symlink /system/vendor /vendor
> +
> +# create mountpoints
> +    mkdir /mnt 0775 root system
> +    mkdir /mnt/sdcard 0000 system system
> +
> +# Create cgroup mount point for cpu accounting
> +    mkdir /acct
> +    mount cgroup none /acct cpuacct
> +    mkdir /acct/uid
> +
> +# Backwards Compat - XXX: Going away in G*
> +    symlink /mnt/sdcard /sdcard
> +
> +    mkdir /system
> +    mkdir /data 0771 system system
> +    mkdir /cache 0770 system cache
> +    mkdir /config 0500 root root
> +
> +    # Directory for putting things only root should see.
> +    #mkdir /mnt/secure 0700 root root
> +
> +    # Directory for staging bindmounts
> +    #mkdir /mnt/secure/staging 0700 root root
> +
> +    # Directory-target for where the secure container
> +    # imagefile directory will be bind-mounted
> +    #mkdir /mnt/secure/asec  0700 root root
> +
> +    # Secure container public mount points.
> +    #mkdir /mnt/asec  0700 root system
> +    #mount tmpfs tmpfs /mnt/asec mode=0755,gid=1000
> +
> +    # Filesystem image public mount points.
> +    #mkdir /mnt/obb 0700 root system
> +    #mount tmpfs tmpfs /mnt/obb mode=0755,gid=1000
> +
> +    write /proc/sys/kernel/panic_on_oops 1
> +    write /proc/sys/kernel/hung_task_timeout_secs 0
> +    write /proc/cpu/alignment 4
> +    write /proc/sys/kernel/sched_latency_ns 10000000
> +    write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000
> +    write /proc/sys/kernel/sched_compat_yield 1
> +    write /proc/sys/kernel/sched_child_runs_first 0
> +
> +# Create cgroup mount points for process groups
> +    mkdir /dev/cpuctl
> +    mount cgroup none /dev/cpuctl cpu
> +    chown system system /dev/cpuctl
> +    chown system system /dev/cpuctl/tasks
> +    chmod 0777 /dev/cpuctl/tasks
> +    write /dev/cpuctl/cpu.shares 1024
> +
> +    mkdir /dev/cpuctl/fg_boost
> +    chown system system /dev/cpuctl/fg_boost/tasks
> +    chmod 0777 /dev/cpuctl/fg_boost/tasks
> +    write /dev/cpuctl/fg_boost/cpu.shares 1024
> +
> +    mkdir /dev/cpuctl/bg_non_interactive
> +    chown system system /dev/cpuctl/bg_non_interactive/tasks
> +    chmod 0777 /dev/cpuctl/bg_non_interactive/tasks
> +    # 5.0 %
> +    write /dev/cpuctl/bg_non_interactive/cpu.shares 52
> +
> +on fs
> +# mount mtd partitions
> +    # Mount /system rw first to give the filesystem a chance to save
> a checkpoint
> +    mount yaffs2 mtd@system /system
> +    mount yaffs2 mtd@system /system ro remount
> +    mount yaffs2 mtd@userdata /data nosuid nodev
> +    mount yaffs2 mtd@cache /cache nosuid nodev
> +
> +on post-fs
> +    # once everything is setup, no need to modify /
> +    mount rootfs rootfs / rw remount
> +
> +    # We chown/chmod /data again so because mount is run as root +
> defaults
> +    chown system system /data
> +    chmod 0771 /data
> +
> +    # Create dump dir and collect dumps.
> +    # Do this before we mount cache so eventually we can use cache for
> +    # storing dumps on platforms which do not have a dedicated dump
> partition.
> +
> +    mkdir /data/dontpanic
> +    chown root log /data/dontpanic
> +    chmod 0750 /data/dontpanic
> +
> +    # Collect apanic data, free resources and re-arm trigger
> +    copy /proc/apanic_console /data/dontpanic/apanic_console
> +    chown root log /data/dontpanic/apanic_console
> +    chmod 0640 /data/dontpanic/apanic_console
> +
> +    copy /proc/apanic_threads /data/dontpanic/apanic_threads
> +    chown root log /data/dontpanic/apanic_threads
> +    chmod 0640 /data/dontpanic/apanic_threads
> +
> +    write /proc/apanic_console 1
> +
> +    # Same reason as /data above
> +    chown system cache /cache
> +    chmod 0770 /cache
> +
> +    # This may have been created by the recovery system with odd
> permissions
> +    chown system cache /cache/recovery
> +    chmod 0770 /cache/recovery
> +
> +    #change permissions on vmallocinfo so we can grab it from bugreports
> +    chown root log /proc/vmallocinfo
> +    chmod 0440 /proc/vmallocinfo
> +
> +    #change permissions on kmsg & sysrq-trigger so bugreports can
> grab kthread stacks
> +    chown root system /proc/kmsg
> +    chmod 0440 /proc/kmsg
> +    chown root system /proc/sysrq-trigger
> +    chmod 0220 /proc/sysrq-trigger
> +
> +# create basic filesystem structure
> +    mkdir /data/misc 01771 system misc
> +    mkdir /data/misc/bluetoothd 0770 bluetooth bluetooth
> +    mkdir /data/misc/bluetooth 0770 system system
> +    mkdir /data/misc/keystore 0700 keystore keystore
> +    mkdir /data/misc/vpn 0770 system system
> +    mkdir /data/misc/systemkeys 0700 system system
> +    mkdir /data/misc/vpn/profiles 0770 system system
> +    # give system access to wpa_supplicant.conf for backup and restore
> +    mkdir /data/misc/wifi 0770 wifi wifi
> +    chmod 0770 /data/misc/wifi
> +    chmod 0660 /data/misc/wifi/wpa_supplicant.conf
> +    mkdir /data/local 0771 shell shell
> +    mkdir /data/local/tmp 0771 shell shell
> +    mkdir /data/data 0771 system system
> +    mkdir /data/app-private 0771 system system
> +    mkdir /data/app 0771 system system
> +    mkdir /data/property 0700 root root
> +
> +    # create dalvik-cache and double-check the perms
> +    mkdir /data/dalvik-cache 0771 system system
> +    chown system system /data/dalvik-cache
> +    chmod 0771 /data/dalvik-cache
> +
> +    # create the lost+found directories, so as to enforce our permissions
> +    mkdir /data/lost+found 0770
> +    mkdir /cache/lost+found 0770
> +
> +    # double check the perms, in case lost+found already exists, and set
> owner
> +    chown root root /data/lost+found
> +    chmod 0770 /data/lost+found
> +    chown root root /cache/lost+found
> +    chmod 0770 /cache/lost+found
> +
> +on boot
> +# basic network init
> +    ifup lo
> +    hostname localhost
> +    domainname localdomain
> +
> +# set RLIMIT_NICE to allow priorities from 19 to -20
> +    setrlimit 13 40 40
> +
> +# Define the oom_adj values for the classes of processes that can be
> +# killed by the kernel.  These are used in ActivityManagerService.
> +    setprop ro.FOREGROUND_APP_ADJ 0
> +    setprop ro.VISIBLE_APP_ADJ 1
> +    setprop ro.PERCEPTIBLE_APP_ADJ 2
> +    setprop ro.HEAVY_WEIGHT_APP_ADJ 3
> +    setprop ro.SECONDARY_SERVER_ADJ 4
> +    setprop ro.BACKUP_APP_ADJ 5
> +    setprop ro.HOME_APP_ADJ 6
> +    setprop ro.HIDDEN_APP_MIN_ADJ 7
> +    setprop ro.EMPTY_APP_ADJ 15
> +
> +# Define the memory thresholds at which the above process classes will
> +# be killed.  These numbers are in pages (4k).
> +    setprop ro.FOREGROUND_APP_MEM 2048
> +    setprop ro.VISIBLE_APP_MEM 3072
> +    setprop ro.PERCEPTIBLE_APP_MEM 4096
> +    setprop ro.HEAVY_WEIGHT_APP_MEM 4096
> +    setprop ro.SECONDARY_SERVER_MEM 6144
> +    setprop ro.BACKUP_APP_MEM 6144
> +    setprop ro.HOME_APP_MEM 6144
> +    setprop ro.HIDDEN_APP_MEM 7168
> +    setprop ro.EMPTY_APP_MEM 8192
> +
> +# Write value must be consistent with the above properties.
> +# Note that the driver only supports 6 slots, so we have combined some of
> +# the classes into the same memory level; the associated processes of
> higher
> +# classes will still be killed first.
> +    write /sys/module/lowmemorykiller/parameters/adj 0,1,2,4,7,15
> +
> +    write /proc/sys/vm/overcommit_memory 1
> +    write /proc/sys/vm/min_free_order_shift 4
> +    write /sys/module/lowmemorykiller/parameters/minfree
> 2048,3072,4096,6144,7168,8192
> +
> +    # Set init its forked children's oom_adj.
> +    write /proc/1/oom_adj -16
> +
> +    # Tweak background writeout
> +    write /proc/sys/vm/dirty_expire_centisecs 200
> +    write /proc/sys/vm/dirty_background_ratio  5
> +
> +    # Permissions for System Server and daemons.
> +    chown radio system /sys/android_power/state
> +    chown radio system /sys/android_power/request_state
> +    chown radio system /sys/android_power/acquire_full_wake_lock
> +    chown radio system /sys/android_power/acquire_partial_wake_lock
> +    chown radio system /sys/android_power/release_wake_lock
> +    chown radio system /sys/power/state
> +    chown radio system /sys/power/wake_lock
> +    chown radio system /sys/power/wake_unlock
> +    chmod 0660 /sys/power/state
> +    chmod 0660 /sys/power/wake_lock
> +    chmod 0660 /sys/power/wake_unlock
> +    chown system system /sys/class/timed_output/vibrator/enable
> +    chown system system /sys/class/leds/keyboard-backlight/brightness
> +    chown system system /sys/class/leds/lcd-backlight/brightness
> +    chown system system /sys/class/leds/button-backlight/brightness
> +    chown system system /sys/class/leds/jogball-backlight/brightness
> +    chown system system /sys/class/leds/red/brightness
> +    chown system system /sys/class/leds/green/brightness
> +    chown system system /sys/class/leds/blue/brightness
> +    chown system system /sys/class/leds/red/device/grpfreq
> +    chown system system /sys/class/leds/red/device/grppwm
> +    chown system system /sys/class/leds/red/device/blink
> +    chown system system /sys/class/leds/red/brightness
> +    chown system system /sys/class/leds/green/brightness
> +    chown system system /sys/class/leds/blue/brightness
> +    chown system system /sys/class/leds/red/device/grpfreq
> +    chown system system /sys/class/leds/red/device/grppwm
> +    chown system system /sys/class/leds/red/device/blink
> +    chown system system /sys/class/timed_output/vibrator/enable
> +    chown system system /sys/module/sco/parameters/disable_esco
> +    chown system system /sys/kernel/ipv4/tcp_wmem_min
> +    chown system system /sys/kernel/ipv4/tcp_wmem_def
> +    chown system system /sys/kernel/ipv4/tcp_wmem_max
> +    chown system system /sys/kernel/ipv4/tcp_rmem_min
> +    chown system system /sys/kernel/ipv4/tcp_rmem_def
> +    chown system system /sys/kernel/ipv4/tcp_rmem_max
> +    chown root radio /proc/cmdline
> +
> +# Define TCP buffer sizes for various networks
> +#   ReadMin, ReadInitial, ReadMax, WriteMin, WriteInitial, WriteMax,
> +    setprop net.tcp.buffersize.default 4096,87380,110208,4096,16384,110208
> +    setprop net.tcp.buffersize.wifi    4095,87380,110208,4096,16384,110208
> +    setprop net.tcp.buffersize.umts    4094,87380,110208,4096,16384,110208
> +    setprop net.tcp.buffersize.edge    4093,26280,35040,4096,16384,35040
> +    setprop net.tcp.buffersize.gprs    4092,8760,11680,4096,8760,11680
> +
> +    class_start default
> +
> +## Daemon processes to be run by init.
> +##
> +service ueventd /sbin/ueventd
> +    critical
> +
> +service console /system/bin/sh
> +    console
> +    #disabled
> +    #user shell
> +    group log
> +
> +#on property:ro.secure=0
> +#    start console
> +
> +# adbd is controlled by the persist.service.adb.enable system property
> +service adbd /sbin/adbd
> +    disabled
> +
> +# adbd on at boot in emulator
> +on property:ro.kernel.qemu=1
> +    start adbd
> +
> +on property:persist.service.adb.enable=1
> +    start adbd
> +
> +on property:persist.service.adb.enable=0
> +    stop adbd
> +
> +service servicemanager /system/bin/servicemanager
> +    user system
> +    critical
> +    onrestart restart zygote
> +    onrestart restart media
> +
> +service vold /system/bin/vold
> +    socket vold stream 0660 root mount
> +    ioprio be 2
> +
> +service netd /system/bin/netd
> +    socket netd stream 0660 root system
> +
> +service debuggerd /system/bin/debuggerd
> +
> +service ril-daemon /system/bin/rild
> +    socket rild stream 660 root radio
> +    socket rild-debug stream 660 radio system
> +    user root
> +    group radio cache inet misc audio sdcard_rw
> +
> +service zygote /system/bin/app_process -Xzygote /system/bin --zygote
> --start-system-server
> +    socket zygote stream 666
> +    onrestart write /sys/android_power/request_state wake
> +    onrestart write /sys/power/state on
> +    onrestart restart media
> +    onrestart restart netd
> +
> +service media /system/bin/mediaserver
> +    user media
> +    group system audio camera graphics inet net_bt net_bt_admin net_raw
> +    ioprio rt 4
> +
> +service bootanim /system/bin/bootanimation
> +    user graphics
> +    group graphics
> +    disabled
> +    oneshot
> +
> +service dbus /system/bin/dbus-daemon --system --nofork
> +    socket dbus stream 660 bluetooth bluetooth
> +    user bluetooth
> +    group bluetooth net_bt_admin
> +
> +service bluetoothd /system/bin/bluetoothd -n
> +    socket bluetooth stream 660 bluetooth bluetooth
> +    socket dbus_bluetooth stream 660 bluetooth bluetooth
> +    # init.rc does not yet support applying capabilities, so run as root
> and
> +    # let bluetoothd drop uid to bluetooth with the right linux
> capabilities
> +    group bluetooth net_bt_admin misc
> +    disabled
> +
> +service hfag /system/bin/sdptool add --channel=10 HFAG
> +    user bluetooth
> +    group bluetooth net_bt_admin
> +    disabled
> +    oneshot
> +
> +service hsag /system/bin/sdptool add --channel=11 HSAG
> +    user bluetooth
> +    group bluetooth net_bt_admin
> +    disabled
> +    oneshot
> +
> +service opush /system/bin/sdptool add --channel=12 OPUSH
> +    user bluetooth
> +    group bluetooth net_bt_admin
> +    disabled
> +    oneshot
> +
> +service pbap /system/bin/sdptool add --channel=19 PBAP
> +    user bluetooth
> +    group bluetooth net_bt_admin
> +    disabled
> +    oneshot
> +
> +service installd /system/bin/installd
> +    socket installd stream 600 system system
> +
> +service flash_recovery /system/etc/install-recovery.sh
> +    oneshot
> +
> +service racoon /system/bin/racoon
> +    socket racoon stream 600 system system
> +    # racoon will setuid to vpn after getting necessary resources.
> +    group net_admin
> +    disabled
> +    oneshot
> +
> +service mtpd /system/bin/mtpd
> +    socket mtpd stream 600 system system
> +    user vpn
> +    group vpn net_admin net_raw
> +    disabled
> +    oneshot
> +
> +service keystore /system/bin/keystore /data/misc/keystore
> +    user keystore
> +    group keystore
> +    socket keystore stream 666
> +
> +service dumpstate /system/bin/dumpstate -s
> +    socket dumpstate stream 0660 shell log
> +    disabled
> +    oneshot
> --
> 1.7.1
>

Patch

diff --git a/init.rc b/init.rc
new file mode 100644
index 0000000..b6a92c5
--- /dev/null
+++ b/init.rc
@@ -0,0 +1,410 @@ 
+on early-init
+    start ueventd
+
+on init
+
+sysclktz 0
+
+loglevel 3
+
+# setup the global environment
+    export PATH /sbin:/vendor/bin:/system/sbin:/system/bin:/system/xbin
+    export LD_LIBRARY_PATH /vendor/lib:/system/lib
+    export ANDROID_BOOTLOGO 1
+    export ANDROID_ROOT /system
+    export ANDROID_ASSETS /system/app
+    export ANDROID_DATA /data
+    export EXTERNAL_STORAGE /mnt/sdcard
+    export ASEC_MOUNTPOINT /mnt/asec
+    export LOOP_MOUNTPOINT /mnt/obb
+    export BOOTCLASSPATH
/system/framework/core.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/core-junit.jar
+
+# Backward compatibility
+    symlink /system/etc /etc
+    symlink /sys/kernel/debug /d
+
+# Right now vendor lives on the same filesystem as system,
+# but someday that may change.
+    symlink /system/vendor /vendor
+
+# create mountpoints
+    mkdir /mnt 0775 root system
+    mkdir /mnt/sdcard 0000 system system
+
+# Create cgroup mount point for cpu accounting
+    mkdir /acct
+    mount cgroup none /acct cpuacct
+    mkdir /acct/uid
+
+# Backwards Compat - XXX: Going away in G*
+    symlink /mnt/sdcard /sdcard
+
+    mkdir /system
+    mkdir /data 0771 system system
+    mkdir /cache 0770 system cache
+    mkdir /config 0500 root root
+
+    # Directory for putting things only root should see.
+    #mkdir /mnt/secure 0700 root root
+
+    # Directory for staging bindmounts
+    #mkdir /mnt/secure/staging 0700 root root
+
+    # Directory-target for where the secure container
+    # imagefile directory will be bind-mounted
+    #mkdir /mnt/secure/asec  0700 root root
+
+    # Secure container public mount points.
+    #mkdir /mnt/asec  0700 root system
+    #mount tmpfs tmpfs /mnt/asec mode=0755,gid=1000
+
+    # Filesystem image public mount points.
+    #mkdir /mnt/obb 0700 root system
+    #mount tmpfs tmpfs /mnt/obb mode=0755,gid=1000
+
+    write /proc/sys/kernel/panic_on_oops 1
+    write /proc/sys/kernel/hung_task_timeout_secs 0
+    write /proc/cpu/alignment 4
+    write /proc/sys/kernel/sched_latency_ns 10000000
+    write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000
+    write /proc/sys/kernel/sched_compat_yield 1
+    write /proc/sys/kernel/sched_child_runs_first 0
+
+# Create cgroup mount points for process groups
+    mkdir /dev/cpuctl
+    mount cgroup none /dev/cpuctl cpu
+    chown system system /dev/cpuctl
+    chown system system /dev/cpuctl/tasks
+    chmod 0777 /dev/cpuctl/tasks
+    write /dev/cpuctl/cpu.shares 1024
+
+    mkdir /dev/cpuctl/fg_boost
+    chown system system /dev/cpuctl/fg_boost/tasks
+    chmod 0777 /dev/cpuctl/fg_boost/tasks
+    write /dev/cpuctl/fg_boost/cpu.shares 1024
+
+    mkdir /dev/cpuctl/bg_non_interactive
+    chown system system /dev/cpuctl/bg_non_interactive/tasks
+    chmod 0777 /dev/cpuctl/bg_non_interactive/tasks
+    # 5.0 %
+    write /dev/cpuctl/bg_non_interactive/cpu.shares 52
+
+on fs
+# mount mtd partitions
+    # Mount /system rw first to give the filesystem a chance to save
a checkpoint
+    mount yaffs2 mtd@system /system
+    mount yaffs2 mtd@system /system ro remount
+    mount yaffs2 mtd@userdata /data nosuid nodev
+    mount yaffs2 mtd@cache /cache nosuid nodev
+
+on post-fs
+    # once everything is setup, no need to modify /
+    mount rootfs rootfs / rw remount
+
+    # We chown/chmod /data again so because mount is run as root + defaults
+    chown system system /data
+    chmod 0771 /data
+
+    # Create dump dir and collect dumps.
+    # Do this before we mount cache so eventually we can use cache for
+    # storing dumps on platforms which do not have a dedicated dump partition.
+
+    mkdir /data/dontpanic
+    chown root log /data/dontpanic
+    chmod 0750 /data/dontpanic
+
+    # Collect apanic data, free resources and re-arm trigger
+    copy /proc/apanic_console /data/dontpanic/apanic_console
+    chown root log /data/dontpanic/apanic_console
+    chmod 0640 /data/dontpanic/apanic_console
+
+    copy /proc/apanic_threads /data/dontpanic/apanic_threads
+    chown root log /data/dontpanic/apanic_threads
+    chmod 0640 /data/dontpanic/apanic_threads
+
+    write /proc/apanic_console 1
+
+    # Same reason as /data above
+    chown system cache /cache
+    chmod 0770 /cache
+
+    # This may have been created by the recovery system with odd permissions
+    chown system cache /cache/recovery
+    chmod 0770 /cache/recovery
+
+    #change permissions on vmallocinfo so we can grab it from bugreports
+    chown root log /proc/vmallocinfo
+    chmod 0440 /proc/vmallocinfo
+
+    #change permissions on kmsg & sysrq-trigger so bugreports can
grab kthread stacks
+    chown root system /proc/kmsg
+    chmod 0440 /proc/kmsg
+    chown root system /proc/sysrq-trigger
+    chmod 0220 /proc/sysrq-trigger
+
+# create basic filesystem structure
+    mkdir /data/misc 01771 system misc
+    mkdir /data/misc/bluetoothd 0770 bluetooth bluetooth
+    mkdir /data/misc/bluetooth 0770 system system
+    mkdir /data/misc/keystore 0700 keystore keystore
+    mkdir /data/misc/vpn 0770 system system
+    mkdir /data/misc/systemkeys 0700 system system
+    mkdir /data/misc/vpn/profiles 0770 system system
+    # give system access to wpa_supplicant.conf for backup and restore
+    mkdir /data/misc/wifi 0770 wifi wifi
+    chmod 0770 /data/misc/wifi
+    chmod 0660 /data/misc/wifi/wpa_supplicant.conf
+    mkdir /data/local 0771 shell shell
+    mkdir /data/local/tmp 0771 shell shell
+    mkdir /data/data 0771 system system
+    mkdir /data/app-private 0771 system system
+    mkdir /data/app 0771 system system
+    mkdir /data/property 0700 root root
+
+    # create dalvik-cache and double-check the perms
+    mkdir /data/dalvik-cache 0771 system system
+    chown system system /data/dalvik-cache
+    chmod 0771 /data/dalvik-cache
+
+    # create the lost+found directories, so as to enforce our permissions
+    mkdir /data/lost+found 0770
+    mkdir /cache/lost+found 0770
+
+    # double check the perms, in case lost+found already exists, and set owner
+    chown root root /data/lost+found
+    chmod 0770 /data/lost+found
+    chown root root /cache/lost+found
+    chmod 0770 /cache/lost+found
+
+on boot
+# basic network init
+    ifup lo
+    hostname localhost
+    domainname localdomain
+
+# set RLIMIT_NICE to allow priorities from 19 to -20
+    setrlimit 13 40 40
+
+# Define the oom_adj values for the classes of processes that can be
+# killed by the kernel.  These are used in ActivityManagerService.
+    setprop ro.FOREGROUND_APP_ADJ 0
+    setprop ro.VISIBLE_APP_ADJ 1
+    setprop ro.PERCEPTIBLE_APP_ADJ 2
+    setprop ro.HEAVY_WEIGHT_APP_ADJ 3
+    setprop ro.SECONDARY_SERVER_ADJ 4
+    setprop ro.BACKUP_APP_ADJ 5
+    setprop ro.HOME_APP_ADJ 6
+    setprop ro.HIDDEN_APP_MIN_ADJ 7
+    setprop ro.EMPTY_APP_ADJ 15
+
+# Define the memory thresholds at which the above process classes will
+# be killed.  These numbers are in pages (4k).
+    setprop ro.FOREGROUND_APP_MEM 2048
+    setprop ro.VISIBLE_APP_MEM 3072
+    setprop ro.PERCEPTIBLE_APP_MEM 4096
+    setprop ro.HEAVY_WEIGHT_APP_MEM 4096
+    setprop ro.SECONDARY_SERVER_MEM 6144
+    setprop ro.BACKUP_APP_MEM 6144
+    setprop ro.HOME_APP_MEM 6144
+    setprop ro.HIDDEN_APP_MEM 7168
+    setprop ro.EMPTY_APP_MEM 8192
+
+# Write value must be consistent with the above properties.
+# Note that the driver only supports 6 slots, so we have combined some of
+# the classes into the same memory level; the associated processes of higher
+# classes will still be killed first.
+    write /sys/module/lowmemorykiller/parameters/adj 0,1,2,4,7,15
+
+    write /proc/sys/vm/overcommit_memory 1
+    write /proc/sys/vm/min_free_order_shift 4
+    write /sys/module/lowmemorykiller/parameters/minfree
2048,3072,4096,6144,7168,8192
+
+    # Set init its forked children's oom_adj.
+    write /proc/1/oom_adj -16
+
+    # Tweak background writeout
+    write /proc/sys/vm/dirty_expire_centisecs 200
+    write /proc/sys/vm/dirty_background_ratio  5
+
+    # Permissions for System Server and daemons.
+    chown radio system /sys/android_power/state
+    chown radio system /sys/android_power/request_state
+    chown radio system /sys/android_power/acquire_full_wake_lock
+    chown radio system /sys/android_power/acquire_partial_wake_lock
+    chown radio system /sys/android_power/release_wake_lock
+    chown radio system /sys/power/state
+    chown radio system /sys/power/wake_lock
+    chown radio system /sys/power/wake_unlock
+    chmod 0660 /sys/power/state
+    chmod 0660 /sys/power/wake_lock
+    chmod 0660 /sys/power/wake_unlock
+    chown system system /sys/class/timed_output/vibrator/enable
+    chown system system /sys/class/leds/keyboard-backlight/brightness
+    chown system system /sys/class/leds/lcd-backlight/brightness
+    chown system system /sys/class/leds/button-backlight/brightness
+    chown system system /sys/class/leds/jogball-backlight/brightness
+    chown system system /sys/class/leds/red/brightness
+    chown system system /sys/class/leds/green/brightness
+    chown system system /sys/class/leds/blue/brightness
+    chown system system /sys/class/leds/red/device/grpfreq
+    chown system system /sys/class/leds/red/device/grppwm
+    chown system system /sys/class/leds/red/device/blink
+    chown system system /sys/class/leds/red/brightness
+    chown system system /sys/class/leds/green/brightness
+    chown system system /sys/class/leds/blue/brightness
+    chown system system /sys/class/leds/red/device/grpfreq
+    chown system system /sys/class/leds/red/device/grppwm
+    chown system system /sys/class/leds/red/device/blink
+    chown system system /sys/class/timed_output/vibrator/enable
+    chown system system /sys/module/sco/parameters/disable_esco
+    chown system system /sys/kernel/ipv4/tcp_wmem_min
+    chown system system /sys/kernel/ipv4/tcp_wmem_def
+    chown system system /sys/kernel/ipv4/tcp_wmem_max
+    chown system system /sys/kernel/ipv4/tcp_rmem_min
+    chown system system /sys/kernel/ipv4/tcp_rmem_def
+    chown system system /sys/kernel/ipv4/tcp_rmem_max
+    chown root radio /proc/cmdline
+
+# Define TCP buffer sizes for various networks
+#   ReadMin, ReadInitial, ReadMax, WriteMin, WriteInitial, WriteMax,
+    setprop net.tcp.buffersize.default 4096,87380,110208,4096,16384,110208
+    setprop net.tcp.buffersize.wifi    4095,87380,110208,4096,16384,110208
+    setprop net.tcp.buffersize.umts    4094,87380,110208,4096,16384,110208
+    setprop net.tcp.buffersize.edge    4093,26280,35040,4096,16384,35040
+    setprop net.tcp.buffersize.gprs    4092,8760,11680,4096,8760,11680
+
+    class_start default
+
+## Daemon processes to be run by init.
+##
+service ueventd /sbin/ueventd
+    critical
+
+service console /system/bin/sh
+    console
+    #disabled
+    #user shell
+    group log
+
+#on property:ro.secure=0
+#    start console
+
+# adbd is controlled by the persist.service.adb.enable system property
+service adbd /sbin/adbd
+    disabled
+
+# adbd on at boot in emulator
+on property:ro.kernel.qemu=1
+    start adbd
+
+on property:persist.service.adb.enable=1
+    start adbd
+
+on property:persist.service.adb.enable=0
+    stop adbd
+
+service servicemanager /system/bin/servicemanager
+    user system
+    critical
+    onrestart restart zygote
+    onrestart restart media
+
+service vold /system/bin/vold
+    socket vold stream 0660 root mount
+    ioprio be 2
+
+service netd /system/bin/netd
+    socket netd stream 0660 root system
+
+service debuggerd /system/bin/debuggerd
+
+service ril-daemon /system/bin/rild
+    socket rild stream 660 root radio
+    socket rild-debug stream 660 radio system
+    user root
+    group radio cache inet misc audio sdcard_rw
+
+service zygote /system/bin/app_process -Xzygote /system/bin --zygote
--start-system-server
+    socket zygote stream 666
+    onrestart write /sys/android_power/request_state wake
+    onrestart write /sys/power/state on
+    onrestart restart media
+    onrestart restart netd
+
+service media /system/bin/mediaserver
+    user media
+    group system audio camera graphics inet net_bt net_bt_admin net_raw
+    ioprio rt 4
+
+service bootanim /system/bin/bootanimation
+    user graphics
+    group graphics
+    disabled
+    oneshot
+
+service dbus /system/bin/dbus-daemon --system --nofork
+    socket dbus stream 660 bluetooth bluetooth
+    user bluetooth
+    group bluetooth net_bt_admin
+
+service bluetoothd /system/bin/bluetoothd -n
+    socket bluetooth stream 660 bluetooth bluetooth
+    socket dbus_bluetooth stream 660 bluetooth bluetooth
+    # init.rc does not yet support applying capabilities, so run as root and
+    # let bluetoothd drop uid to bluetooth with the right linux capabilities
+    group bluetooth net_bt_admin misc
+    disabled
+
+service hfag /system/bin/sdptool add --channel=10 HFAG
+    user bluetooth
+    group bluetooth net_bt_admin
+    disabled
+    oneshot
+
+service hsag /system/bin/sdptool add --channel=11 HSAG
+    user bluetooth
+    group bluetooth net_bt_admin
+    disabled
+    oneshot
+
+service opush /system/bin/sdptool add --channel=12 OPUSH
+    user bluetooth
+    group bluetooth net_bt_admin
+    disabled
+    oneshot
+
+service pbap /system/bin/sdptool add --channel=19 PBAP
+    user bluetooth
+    group bluetooth net_bt_admin
+    disabled
+    oneshot
+
+service installd /system/bin/installd
+    socket installd stream 600 system system
+
+service flash_recovery /system/etc/install-recovery.sh
+    oneshot
+
+service racoon /system/bin/racoon
+    socket racoon stream 600 system system
+    # racoon will setuid to vpn after getting necessary resources.
+    group net_admin
+    disabled
+    oneshot
+
+service mtpd /system/bin/mtpd
+    socket mtpd stream 600 system system
+    user vpn
+    group vpn net_admin net_raw
+    disabled
+    oneshot
+
+service keystore /system/bin/keystore /data/misc/keystore
+    user keystore
+    group keystore
+    socket keystore stream 666
+