-
Notifications
You must be signed in to change notification settings - Fork 0
/
init.charging.rc
executable file
·628 lines (501 loc) · 22.1 KB
/
init.charging.rc
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
# Copyright (C) 2012 The Android Open Source Project
#
# IMPORTANT: Do not create world writable files or directories.
# This is a common source of Android security bugs.
#
#import /init.${ro.hardware}.rc
import /init.trace.rc
#import init.xlog.rc
on early-init
# Set init and its forked children's oom_adj.
write /proc/1/oom_adj -16
# Set the security context for the init process.
# This should occur before anything else (e.g. ueventd) is started.
setcon u:r:init:s0
start ueventd
# create mountpoints
mkdir /mnt 0775 root system
mkdir /storage 0055 system sdcard_r
mkdir /storage/sdcard0 0000 system system
mkdir /storage/sdcard1 0000 system system
mkdir /mnt/cd-rom 0000 system system
# for backwards compatibility
symlink /storage/sdcard0 /sdcard
symlink /storage/sdcard0 /mnt/sdcard
symlink /storage/sdcard1 /mnt/sdcard2
on early_property:ro.build.type=user
write /proc/bootprof "INIT: user build setting"
export BOOTCLASSPATH /system/framework/core.jar:/system/framework/conscrypt.jar:/system/framework/okhttp.jar:/system/framework/core-junit.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/framework2.jar:/system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/framework/mms-common.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/apache-xml.jar:/system/framework/webviewchromium.jar:/system/framework/mediatek-common.jar:/system/framework/mediatek-framework.jar:/system/framework/CustomProperties.jar:/system/framework/mediatek-telephony-common.jar:/system/framework/mediatek-tablet.jar
export BOOTCLASSPATH_EX /system/framework/mediatek-op.jar
on early_property:ro.build.type=userdebug
write /proc/bootprof "INIT: userdebug build setting"
export BOOTCLASSPATH /system/framework/core.jar:/system/framework/conscrypt.jar:/system/framework/okhttp.jar:/system/framework/core-junit.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/framework2.jar:/system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/framework/mms-common.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/apache-xml.jar:/system/framework/webviewchromium.jar:/system/framework/mediatek-common.jar:/system/framework/mediatek-framework.jar:/system/framework/CustomProperties.jar:/system/framework/mediatek-telephony-common.jar:/system/framework/mediatek-tablet.jar
export BOOTCLASSPATH_EX /system/framework/mediatek-op.jar
on early_property:ro.build.type=eng
write /proc/bootprof "INIT: eng build setting"
export BOOTCLASSPATH /system/framework/core.jar:/system/framework/conscrypt.jar:/system/framework/okhttp.jar:/system/framework/core-junit.jar:/system/framework/bouncycastle.jar:/system/framework/ext.jar:/system/framework/framework.jar:/system/framework/framework2.jar:/system/framework/telephony-common.jar:/system/framework/voip-common.jar:/system/framework/mms-common.jar:/system/framework/android.policy.jar:/system/framework/services.jar:/system/framework/apache-xml.jar:/system/framework/webviewchromium.jar:/system/framework/mediatek-common.jar:/system/framework/mediatek-framework.jar:/system/framework/CustomProperties.jar:/system/framework/mediatek-telephony-common.jar:/system/framework/mediatek-tablet.jar:/system/framework/emma.jar
export BOOTCLASSPATH_EX /system/framework/mediatek-op.jar
on init
sysclktz 0
loglevel 6
write /proc/bootprof "INIT: on init start"
mkdir /protect_f 0771 system system
mkdir /protect_s 0771 system system
# setup the global environment
export PATH /sbin:/vendor/bin:/system/sbin:/system/bin:/system/xbin
export LD_LIBRARY_PATH /vendor/lib:/system/lib
export ANDROID_BOOTLOGO 1
export ANDROID_ROOT /system
export ANDROID_ASSETS /system/app
export ANDROID_DATA /data
export ANDROID_STORAGE /storage
export ASEC_MOUNTPOINT /mnt/asec
export LOOP_MOUNTPOINT /mnt/obb
# Backward compatibility
symlink /system/etc /etc
symlink /sys/kernel/debug /d
# Right now vendor lives on the same filesystem as system,
# but someday that may change.
symlink /system/vendor /vendor
# Create cgroup mount point for cpu accounting
mkdir /acct
mount cgroup none /acct cpuacct
mkdir /acct/uid
mkdir /system
#mkdir /data 0771 system system
mkdir /cache 0770 system cache
mkdir /config 0500 root root
# See storage config details at http://source.android.com/tech/storage/
# mkdir /storage 0050 root sdcard_r
mkdir /storage 0055 root sdcard_r
mkdir /mnt/cd-rom 0000 system system
# Directory for putting things only root should see.
mkdir /mnt/secure 0700 root root
# Create private mountpoint so we can MS_MOVE from staging
mount tmpfs tmpfs /mnt/secure mode=0700,uid=0,gid=0
# Directory for staging bindmounts
mkdir /mnt/secure/staging 0700 root root
# Directory-target for where the secure container
# imagefile directory will be bind-mounted
mkdir /mnt/secure/asec 0700 root root
# Secure container public mount points.
mkdir /mnt/asec 0700 root system
mount tmpfs tmpfs /mnt/asec mode=0755,gid=1000
# Filesystem image public mount points.
mkdir /mnt/obb 0700 root system
mount tmpfs tmpfs /mnt/obb mode=0755,gid=1000
write /proc/sys/kernel/panic_on_oops 1
write /proc/sys/kernel/hung_task_timeout_secs 0
write /proc/cpu/alignment 4
write /proc/sys/kernel/sched_latency_ns 10000000
write /proc/sys/kernel/sched_wakeup_granularity_ns 2000000
write /proc/sys/kernel/sched_compat_yield 1
write /proc/sys/kernel/sched_child_runs_first 0
write /proc/sys/kernel/randomize_va_space 2
write /proc/sys/kernel/kptr_restrict 2
write /proc/sys/kernel/dmesg_restrict 1
write /proc/sys/vm/mmap_min_addr 32768
write /proc/sys/kernel/sched_rt_runtime_us 950000
write /proc/sys/kernel/sched_rt_period_us 1000000
# Create cgroup mount points for process groups
mkdir /dev/cpuctl
mount cgroup none /dev/cpuctl cpu
chown system system /dev/cpuctl
chown system system /dev/cpuctl/tasks
chmod 0660 /dev/cpuctl/tasks
write /dev/cpuctl/cpu.shares 1024
write /dev/cpuctl/cpu.rt_runtime_us 950000
write /dev/cpuctl/cpu.rt_period_us 1000000
mkdir /dev/cpuctl/apps
chown system system /dev/cpuctl/apps/tasks
chmod 0666 /dev/cpuctl/apps/tasks
write /dev/cpuctl/apps/cpu.shares 1024
write /dev/cpuctl/apps/cpu.rt_runtime_us 800000
write /dev/cpuctl/apps/cpu.rt_period_us 1000000
mkdir /dev/cpuctl/apps/bg_non_interactive
chown system system /dev/cpuctl/apps/bg_non_interactive/tasks
chmod 0666 /dev/cpuctl/apps/bg_non_interactive/tasks
# 5.0 %
write /dev/cpuctl/apps/bg_non_interactive/cpu.shares 52
write /dev/cpuctl/apps/bg_non_interactive/cpu.rt_runtime_us 700000
write /dev/cpuctl/apps/bg_non_interactive/cpu.rt_period_us 1000000
# Allow everybody to read the xt_qtaguid resource tracking misc dev.
# This is needed by any process that uses socket tagging.
chmod 0644 /dev/xt_qtaguid
# Change ION driver permission
chmod 0666 /dev/ion
on fs
write /proc/bootprof "INIT:Mount_START"
mount_all /fstab.mt6582
write /proc/bootprof "INIT:Mount_END"
on post-fs
# once everything is setup, no need to modify /
mount rootfs rootfs / ro remount
# We chown/chmod /cache again so because mount is run as root + defaults
chown system cache /cache
chmod 0770 /cache
# This may have been created by the recovery system with odd permissions
chown system cache /cache/recovery
chmod 0770 /cache/recovery
chown system system /protect_f
chmod 0771 /protect_f
chown system system /protect_s
chmod 0771 /protect_s
#change permissions on vmallocinfo so we can grab it from bugreports
chown root log /proc/vmallocinfo
chmod 0440 /proc/vmallocinfo
#change permissions for mediaserver
chown root media /proc/clkmgr/mipi_test
#change permissions on kmsg & sysrq-trigger so bugreports can grab kthread stacks
chown root system /proc/kmsg
chmod 0440 /proc/kmsg
chown root system /proc/sysrq-trigger
chmod 0220 /proc/sysrq-trigger
# create the lost+found directories, so as to enforce our permissions
mkdir /cache/lost+found 0770 root root
# change owner
chown root system /proc/bootprof
chown root system /proc/mtprof/cputime
on post-fs-data
# We chown/chmod /data again so because mount is run as root + defaults
chown system system /data
chmod 0777 /data
#chmod 0771 /data
# Create dump dir and collect dumps.
# Do this before we mount cache so eventually we can use cache for
# storing dumps on platforms which do not have a dedicated dump partition.
mkdir /data/dontpanic 0750 root log
# Collect apanic data, free resources and re-arm trigger
copy /proc/apanic_console /data/dontpanic/apanic_console
chown root log /data/dontpanic/apanic_console
chmod 0640 /data/dontpanic/apanic_console
copy /proc/apanic_threads /data/dontpanic/apanic_threads
chown root log /data/dontpanic/apanic_threads
chmod 0640 /data/dontpanic/apanic_threads
write /proc/apanic_console 1
# create basic filesystem structure
mkdir /data/nvram 2770 root system
mkdir /data/misc 01771 system misc
mkdir /data/misc/adb 02750 system shell
mkdir /data/misc/bluetoothd 0770 bluetooth bluetooth
mkdir /data/misc/bluetooth 0770 system system
mkdir /data/misc/keystore 0700 keystore keystore
mkdir /data/misc/keychain 0771 system system
mkdir /data/misc/vpn 0770 system vpn
mkdir /data/misc/systemkeys 0700 system system
# give system access to wpa_supplicant.conf for backup and restore
mkdir /data/misc/wifi 0770 wifi wifi
chmod 0660 /data/misc/wifi/wpa_supplicant.conf
chmod 0660 /data/misc/wifi/p2p_supplicant.conf
mkdir /data/local 0751 root root
# For security reasons, /data/local/tmp should always be empty.
# Do not place files or directories in /data/local/tmp
mkdir /data/local/tmp 0771 shell shell
mkdir /data/data 0771 system system
mkdir /data/app-private 0771 system system
mkdir /data/app-asec 0700 root root
mkdir /data/app-lib 0771 system system
mkdir /data/app 0771 system system
mkdir /data/property 0700 root root
mkdir /data/ssh 0750 root shell
mkdir /data/ssh/empty 0700 root root
#give system access to rfkill device node
chmod 0660 /dev/rfkill
# create dalvik-cache, so as to enforce our permissions
mkdir /data/dalvik-cache 0771 system system
# create resource-cache and double-check the perms
mkdir /data/resource-cache 0771 system system
chown system system /data/resource-cache
chmod 0771 /data/resource-cache
# create the lost+found directories, so as to enforce our permissions
mkdir /data/lost+found 0770 root root
# create for muxd pts device node , to operate without root
mkdir /dev/radio 0770 radio radio
# create directory for DRM plug-ins
mkdir /data/drm 0774 drm drm
# If there is no fs-post-data action in the init.<device>.rc file, you
# must uncomment this line, otherwise encrypted filesystems
# won't work.
# Set indication (checked by vold) that we have finished this action
#setprop vold.post_fs_data_done 1
# -----------------------
# Add by MTK
# dhcp server
mkdir /data/misc/dhcp 0770 dhcp dhcp
chown dhcp dhcp /data/misc/dhcp
# radvd
mkdir /data/misc/radvd 0770 system system
chmod 444 /etc/radvd/radvd.conf
#Mali 3D GPU driver
#insmod /system/lib/modules/ump.ko
insmod /system/lib/modules/mali.ko
#chmod 666 /dev/ump
chmod 666 /dev/mali
#chown graphics /dev/ump
chown graphics /dev/mali
# Permissions for System Server and daemons.
chown root radio /sys/class/leds/lcd-backlight/brightness
chown root radio /sys/class/leds/lcd-backlight/duty
chown root radio /sys/class/leds/lcd-backlight/div
# Touch Panel
chmod 0664 /dev/touch
chown root diag /sys/module/tpd_setting/parameters/tpd_calmat
chown root diag /sys/module/tpd_setting/parameters/tpd_em_debounce_time
chown root diag /sys/module/tpd_setting/parameters/tpd_mode
chown root diag /sys/module/tpd_setting/parameters/tpd_em_debounce_time0
chown root diag /sys/module/tpd_setting/parameters/tpd_em_debounce_time1
chown root diag /sys/module/tpd_setting/parameters/tpd_em_spl_num
chown root diag /sys/module/tpd_setting/parameters/tpd_em_pressure_threshold
chown root diag /sys/module/tpd_setting/parameters/tpd_em_auto_time_interval
chown root diag /sys/module/tpd_setting/parameters/tpd_em_sample_cnt
chown root diag /sys/module/tpd_setting/parameters/tpd_em_asamp
chown root diag /sys/module/tpd_debug/parameters/tpd_em_log
chown root diag /sys/module/tpd_debug/parameters/tpd_em_log_to_fs
chmod 0666 /dev/pmem_multimedia
# watch dog kicker
write /proc/wdk "0 20 30"
# set ptmx group to non-root
chown root radio /dev/ptmx
# RTC
mkdir /data/misc/rtc 0770 system system
# M4U
#insmod /system/lib/modules/m4u.ko
#mknod /dev/M4U_device c 188 0
chmod 0444 /dev/M4U_device
#chown system media /dev/M4U_device
# Sensor
chmod 0660 /dev/hwmsensor
chmod 0660 /dev/msensor
chmod 0660 /dev/gsensor
chmod 0660 /dev/als_ps
chmod 0660 /dev/gyroscope
chmod 0660 /sys/devices/platform/msensor/driver/cpsopmode
chmod 0660 /sys/devices/platform/msensor/driver/cpsreptxy
chmod 0660 /sys/devices/platform/msensor/driver/cpsreptz
chown system system /dev/hwmsensor
chown system system /dev/msensor
chown system system /dev/gsensor
chown system system /dev/als_ps
chown system system /dev/gyroscope
#Accdet
chown root radio /sys/devices/platform/Accdet_Driver/driver/accdet_call_state
#VideoCodec
chmod 0660 /dev/Vcodec
chown system media /dev/Vcodec
#kpd
chown radio radio /sys/devices/platform/mtk-kpd/driver/kpd_call_state
mkdir /data/amit/ 0770 system system
mkdir /data/misc/sensors 0664 system system
mkdir /data/misc/akmd 0770 system system
mkdir /data/misc/s62x 0771 compass compass
mkdir /data/acdapi/ 0770 system system
chmod 0666 /data/misc/acdapi/calib.dat
chmod 0666 /data/misc/acdapi/param.dat
chmod 0666 /data/misc/acdapi/sensors.dat
chown system /sys/class/input/input4/enable
chown system /sys/class/input/input4/delay
chown system /sys/class/input/input4/wake
chown system /sys/class/input/input2/enable
chown system /sys/class/input/input2/wake
chown system /sys/class/input/input3/offsets
chown system /sys/devices/platform/msensor/driver/cpsopmode
chown system /sys/devices/platform/msensor/driver/cpsreptxy
chown system /sys/devices/platform/msensor/driver/cpsreptz
mkdir /data/data/mcube 0664 system system
# GPIO
chmod 0664 /dev/mtgpio
#EM eint
chown root diag /sys/bus/platform/drivers/eint/current_eint
chmod 0660 /dev/graphics/fb0
chown system graphics /dev/graphics/fb0
chmod 0660 /dev/mtkfb_vsync
chown system graphics /dev/mtkfb_vsync
chmod 0660 /dev/sw_sync
chown system graphics /dev/sw_sync
# EM baseband file
chown root diag /system/bin/baseband_regdump
chmod 4750 /system/bin/baseband_regdump
#pmu
chown root radio /sys/devices/platform/mt-pmic/pmic_access_bank0
chown root radio /sys/devices/platform/mt-pmic/pmic_access_bank1
chown root radio /sys/devices/platform/mt6333-user/mt6333_access
chown root radio /sys/devices/platform/mt-pmic/pmic_access
chmod 0664 /sys/devices/platform/mt-pmic/pmic_access_bank0
chmod 0664 /sys/devices/platform/mt-pmic/pmic_access_bank1
chmod 0664 /sys/devices/platform/mt6333-user/mt6333_access
chmod 0664 /sys/devices/platform/mt-pmic/pmic_access
# EM CPU Speed Stress
chown root radio /proc/cpu_ss/cpu_ss_debug_mode
chown root radio /proc/cpu_ss/cpu_ss_mode
chown root radio /proc/cpu_ss/cpu_ss_period
chown root radio /proc/cpu_ss/cpu_ss_period_mode
chmod 0664 /proc/cpu_ss/cpu_ss_debug_mode
chmod 0664 /proc/cpu_ss/cpu_ss_mode
chmod 0664 /proc/cpu_ss/cpu_ss_period
chmod 0664 /proc/cpu_ss/cpu_ss_period_mode
#EM eint
chown root diag /sys/bus/platform/drivers/eint/current_eint
# for ppp options file
mkdir /data/misc/ppp
chmod 0777 /data/misc/ppp
# Android SEC related device nodes
insmod /system/lib/modules/sec.ko
chmod 0660 /dev/sec
chown root system /dev/sec
# FM Radio device node
mknod /dev/fm c 193 0;
chmod 0660 /dev/fm
chown system media /dev/fm
# device apc settings
# device info /proc interface
chmod 0660 /dev/devmap
chown root media /dev/devmap
# bluetooth
mkdir /data/@btmtk 0770 bluetooth net_bt
chown bluetooth bluetooth /dev/hid-keyboard
chmod 0660 /dev/hid-keyboard
chown bluetooth bluetooth /dev/btn
chmod 0660 /dev/btn
#Use uinput's default permission
chown system net_bt_admin /dev/uinput
#TV-out
chmod 0664 /dev/TV-out
#HDMI
chmod 0664 /dev/hdmitx
# JPEG
#chmod 0444 /dev/mtk_jpeg
# DISP
chmod 0444 /dev/mtk_disp
#Camera
chmod 0660 /dev/camera-sysram
chmod 0660 /dev/camera-isp
chmod 0660 /dev/camera-pipemgr
chmod 0660 /dev/kd_camera_hw
chmod 0660 /dev/kd_camera_flashlight
chmod 0660 /dev/kd_camera_hw_bus2
chmod 0660 /dev/FM50AF
chown system camera /dev/camera-sysram
chown system camera /dev/camera-isp
chown system camera /dev/camera-pipemgr
chown system camera /dev/kd_camera_hw
chown system camera /dev/kd_camera_flashlight
chown system camera /dev/kd_camera_hw_bus2
chown system camera /dev/FM50AF
#MATV
chmod 0660 /dev/MATV
chown system media /dev/MATV
# otg_test
chown root radio /dev/mt_otg_test
chmod 0660 /dev/mt_otg_test
# MDP
chmod 0660 /dev/mt-mdp
chown system media /dev/mt-mdp
#for eng mode
chmod 0664 /dev/misc-sd
chown system media /sys/bus/platform/drivers/mem_bw_ctrl/concurrency_scenario
#mtk_sched
chmod 0660 /dev/mtk_sched
chown system media /dev/mtk_sched
# End of adding by MTK drivers
# -----------------------
on ipo
# xlog
start xlogboot
# basic network init
ifup lo
hostname localhost
domainname localdomain
# set RLIMIT_NICE to allow priorities from 19 to -20
setrlimit 13 40 40
# Memory management. Basic kernel parameters, and allow the high
# level system server to be able to adjust the kernel OOM driver
# parameters to match how it is managing things.
write /proc/sys/vm/overcommit_memory 1
write /proc/sys/vm/min_free_order_shift 4
chown root system /sys/module/lowmemorykiller/parameters/adj
chmod 0664 /sys/module/lowmemorykiller/parameters/adj
chown root system /sys/module/lowmemorykiller/parameters/minfree
chmod 0664 /sys/module/lowmemorykiller/parameters/minfree
# Tweak background writeout
write /proc/sys/vm/dirty_expire_centisecs 100
write /proc/sys/vm/dirty_writeback_centisecs 300
write /proc/sys/vm/dirty_background_ratio 5
# Permissions for System Server and daemons.
chown radio system /sys/android_power/state
chown radio system /sys/android_power/request_state
chown radio system /sys/android_power/acquire_full_wake_lock
chown radio system /sys/android_power/acquire_partial_wake_lock
chown radio system /sys/android_power/release_wake_lock
chown system system /sys/power/autosleep
chown system system /sys/power/state
chown system system /sys/power/wakeup_count
chown radio system /sys/power/wake_lock
chown radio system /sys/power/wake_unlock
chmod 0660 /sys/power/autosleep
chmod 0660 /sys/power/state
chmod 0660 /sys/power/wake_lock
chmod 0660 /sys/power/wake_unlock
chmod 0664 /sys/class/leds/lcd-backlight/brightness
chown system system /sys/devices/system/cpu/cpufreq/interactive/timer_rate
chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/timer_rate
chown system system /sys/devices/system/cpu/cpufreq/interactive/min_sample_time
chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/min_sample_time
chown system system /sys/devices/system/cpu/cpufreq/interactive/hispeed_freq
chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/hispeed_freq
chown system system /sys/devices/system/cpu/cpufreq/interactive/go_hispeed_load
chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/go_hispeed_load
chown system system /sys/devices/system/cpu/cpufreq/interactive/above_hispeed_delay
chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/above_hispeed_delay
chown system system /sys/devices/system/cpu/cpufreq/interactive/boost
chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/boost
chown system system /sys/devices/system/cpu/cpufreq/interactive/boostpulse
chown system system /sys/devices/system/cpu/cpufreq/interactive/input_boost
chmod 0660 /sys/devices/system/cpu/cpufreq/interactive/input_boost
# Set this property so surfaceflinger is not started by system_init
setprop system_init.startsurfaceflinger 0
class_start ipo
class_start main
class_start core
## Daemon processes to be run by init.
##
# Update the second boot logo
service bootlogoupdater /system/bin/boot_logo_updater
oneshot
service ueventd /sbin/ueventd
class core
critical
service console /system/bin/sh
class core
console
disabled
user root
group log
on property:ro.debuggable=1
start console
# adbd is controlled via property triggers in init.<platform>.usb.rc
service adbd /sbin/adbd
class core
socket adbd stream 660 system system
disabled
seclabel u:r:adbd:s0
# adbd on at boot in emulator
on property:ro.kernel.qemu=1
start adbd
service debuggerd /system/bin/debuggerd
class main
service mobile_log_d /system/bin/mobile_log_d
class main
oneshot
service servicemanager /system/bin/servicemanager
class core
user system
group system
#critical
onrestart restart zygote
onrestart restart media
onrestart restart surfaceflinger
onrestart restart drm
service ipod /system/bin/ipod
user root
group root
class ipo