2008-10-21 16:00:00 +02:00
|
|
|
|
|
|
|
Android Init Language
|
|
|
|
---------------------
|
|
|
|
|
|
|
|
The Android Init Language consists of four broad classes of statements,
|
|
|
|
which are Actions, Commands, Services, and Options.
|
|
|
|
|
|
|
|
All of these are line-oriented, consisting of tokens separated by
|
|
|
|
whitespace. The c-style backslash escapes may be used to insert
|
|
|
|
whitespace into a token. Double quotes may also be used to prevent
|
|
|
|
whitespace from breaking text into multiple tokens. The backslash,
|
|
|
|
when it is the last character on a line, may be used for line-folding.
|
|
|
|
|
|
|
|
Lines which start with a # (leading whitespace allowed) are comments.
|
|
|
|
|
|
|
|
Actions and Services implicitly declare a new section. All commands
|
|
|
|
or options belong to the section most recently declared. Commands
|
|
|
|
or options before the first section are ignored.
|
|
|
|
|
|
|
|
Actions and Services have unique names. If a second Action or Service
|
|
|
|
is declared with the same name as an existing one, it is ignored as
|
|
|
|
an error. (??? should we override instead)
|
|
|
|
|
|
|
|
|
|
|
|
Actions
|
|
|
|
-------
|
|
|
|
Actions are named sequences of commands. Actions have a trigger which
|
|
|
|
is used to determine when the action should occur. When an event
|
|
|
|
occurs which matches an action's trigger, that action is added to
|
|
|
|
the tail of a to-be-executed queue (unless it is already on the
|
|
|
|
queue).
|
|
|
|
|
|
|
|
Each action in the queue is dequeued in sequence and each command in
|
|
|
|
that action is executed in sequence. Init handles other activities
|
|
|
|
(device creation/destruction, property setting, process restarting)
|
|
|
|
"between" the execution of the commands in activities.
|
|
|
|
|
|
|
|
Actions take the form of:
|
|
|
|
|
|
|
|
on <trigger>
|
|
|
|
<command>
|
|
|
|
<command>
|
|
|
|
<command>
|
|
|
|
|
|
|
|
|
|
|
|
Services
|
|
|
|
--------
|
|
|
|
Services are programs which init launches and (optionally) restarts
|
|
|
|
when they exit. Services take the form of:
|
|
|
|
|
|
|
|
service <name> <pathname> [ <argument> ]*
|
|
|
|
<option>
|
|
|
|
<option>
|
|
|
|
...
|
|
|
|
|
|
|
|
|
|
|
|
Options
|
|
|
|
-------
|
|
|
|
Options are modifiers to services. They affect how and when init
|
|
|
|
runs the service.
|
|
|
|
|
|
|
|
critical
|
2015-06-13 03:02:20 +02:00
|
|
|
This is a device-critical service. If it exits more than four times in
|
|
|
|
four minutes, the device will reboot into recovery mode.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
|
|
|
disabled
|
2015-06-13 03:02:20 +02:00
|
|
|
This service will not automatically start with its class.
|
|
|
|
It must be explicitly started by name.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
|
|
|
setenv <name> <value>
|
2015-06-13 03:02:20 +02:00
|
|
|
Set the environment variable <name> to <value> in the launched process.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-02-07 05:15:18 +01:00
|
|
|
socket <name> <type> <perm> [ <user> [ <group> [ <seclabel> ] ] ]
|
2015-06-13 03:02:20 +02:00
|
|
|
Create a unix domain socket named /dev/socket/<name> and pass
|
|
|
|
its fd to the launched process. <type> must be "dgram", "stream" or "seqpacket".
|
|
|
|
User and group default to 0.
|
|
|
|
'seclabel' is the SELinux security context for the socket.
|
|
|
|
It defaults to the service security context, as specified by seclabel or
|
|
|
|
computed based on the service executable file security context.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
|
|
|
user <username>
|
2015-06-13 03:02:20 +02:00
|
|
|
Change to username before exec'ing this service.
|
|
|
|
Currently defaults to root. (??? probably should default to nobody)
|
|
|
|
Currently, if your process requires linux capabilities then you cannot use
|
|
|
|
this command. You must instead request the capabilities in-process while
|
|
|
|
still root, and then drop to your desired uid.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
|
|
|
group <groupname> [ <groupname> ]*
|
2015-06-13 03:02:20 +02:00
|
|
|
Change to groupname before exec'ing this service. Additional
|
|
|
|
groupnames beyond the (required) first one are used to set the
|
|
|
|
supplemental groups of the process (via setgroups()).
|
|
|
|
Currently defaults to root. (??? probably should default to nobody)
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-02-07 05:15:18 +01:00
|
|
|
seclabel <seclabel>
|
|
|
|
Change to 'seclabel' before exec'ing this service.
|
2012-11-02 20:22:34 +01:00
|
|
|
Primarily for use by services run from the rootfs, e.g. ueventd, adbd.
|
|
|
|
Services on the system partition can instead use policy-defined transitions
|
|
|
|
based on their file security context.
|
|
|
|
If not specified and no transition is defined in policy, defaults to the init context.
|
|
|
|
|
2008-10-21 16:00:00 +02:00
|
|
|
oneshot
|
2015-06-13 03:02:20 +02:00
|
|
|
Do not restart the service when it exits.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
|
|
|
class <name>
|
2015-06-13 03:02:20 +02:00
|
|
|
Specify a class name for the service. All services in a
|
|
|
|
named class may be started or stopped together. A service
|
|
|
|
is in the class "default" if one is not specified via the
|
|
|
|
class option.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
|
|
|
onrestart
|
2015-06-13 03:02:20 +02:00
|
|
|
Execute a Command (see below) when service restarts.
|
|
|
|
|
|
|
|
writepid <file...>
|
|
|
|
Write the child's pid to the given files when it forks. Meant for
|
|
|
|
cgroup/cpuset usage.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-02-12 23:28:54 +01:00
|
|
|
|
2008-10-21 16:00:00 +02:00
|
|
|
Triggers
|
|
|
|
--------
|
2015-06-13 03:02:20 +02:00
|
|
|
Triggers are strings which can be used to match certain kinds
|
|
|
|
of events and used to cause an action to occur.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
|
|
|
boot
|
|
|
|
This is the first trigger that will occur when init starts
|
|
|
|
(after /init.conf is loaded)
|
|
|
|
|
|
|
|
<name>=<value>
|
|
|
|
Triggers of this form occur when the property <name> is set
|
|
|
|
to the specific value <value>.
|
|
|
|
|
2015-02-03 01:43:32 +01:00
|
|
|
One can also test multiple properties to execute a group
|
2014-10-11 08:19:06 +02:00
|
|
|
of commands. For example:
|
|
|
|
|
|
|
|
on property:test.a=1 && property:test.b=1
|
|
|
|
setprop test.c 1
|
|
|
|
|
|
|
|
The above stub sets test.c to 1 only when
|
|
|
|
both test.a=1 and test.b=1
|
|
|
|
|
2015-02-12 23:28:54 +01:00
|
|
|
|
2008-10-21 16:00:00 +02:00
|
|
|
Commands
|
|
|
|
--------
|
|
|
|
|
2015-03-20 19:00:15 +01:00
|
|
|
bootchart_init
|
|
|
|
Start bootcharting if configured (see below).
|
|
|
|
This is included in the default init.rc.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
|
|
|
chmod <octal-mode> <path>
|
|
|
|
Change file access permissions.
|
|
|
|
|
|
|
|
chown <owner> <group> <path>
|
|
|
|
Change file owner and group.
|
|
|
|
|
|
|
|
class_start <serviceclass>
|
|
|
|
Start all services of the specified class if they are
|
|
|
|
not already running.
|
|
|
|
|
|
|
|
class_stop <serviceclass>
|
2015-03-20 19:00:15 +01:00
|
|
|
Stop and disable all services of the specified class if they are
|
2008-10-21 16:00:00 +02:00
|
|
|
currently running.
|
|
|
|
|
2015-03-20 19:00:15 +01:00
|
|
|
class_reset <serviceclass>
|
|
|
|
Stop all services of the specified class if they are
|
|
|
|
currently running, without disabling them. They can be restarted
|
|
|
|
later using class_start.
|
|
|
|
|
|
|
|
copy <src> <dst>
|
|
|
|
Copies a file. Similar to write, but useful for binary/large
|
|
|
|
amounts of data.
|
|
|
|
|
2008-10-21 16:00:00 +02:00
|
|
|
domainname <name>
|
|
|
|
Set the domain name.
|
|
|
|
|
2014-05-03 06:14:29 +02:00
|
|
|
enable <servicename>
|
|
|
|
Turns a disabled service into an enabled one as if the service did not
|
|
|
|
specify disabled.
|
|
|
|
If the service is supposed to be running, it will be started now.
|
|
|
|
Typically used when the bootloader sets a variable that indicates a specific
|
|
|
|
service should be started when needed. E.g.
|
|
|
|
on property:ro.boot.myfancyhardware=1
|
|
|
|
enable my_fancy_service_for_my_fancy_hardware
|
|
|
|
|
2015-03-20 19:00:15 +01:00
|
|
|
exec [ <seclabel> [ <user> [ <group> ]* ] ] -- <command> [ <argument> ]*
|
|
|
|
Fork and execute command with the given arguments. The command starts
|
|
|
|
after "--" so that an optional security context, user, and supplementary
|
|
|
|
groups can be provided. No other commands will be run until this one
|
2015-06-02 20:11:02 +02:00
|
|
|
finishes. <seclabel> can be a - to denote default.
|
2015-03-20 19:00:15 +01:00
|
|
|
|
|
|
|
export <name> <value>
|
|
|
|
Set the environment variable <name> equal to <value> in the
|
|
|
|
global environment (which will be inherited by all processes
|
|
|
|
started after this command is executed)
|
|
|
|
|
|
|
|
hostname <name>
|
|
|
|
Set the host name.
|
|
|
|
|
|
|
|
ifup <interface>
|
|
|
|
Bring the network interface <interface> online.
|
|
|
|
|
2015-07-25 01:57:14 +02:00
|
|
|
import <path>
|
2015-03-20 19:00:15 +01:00
|
|
|
Parse an init config file, extending the current configuration.
|
2015-07-25 01:57:14 +02:00
|
|
|
If <path> is a directory, each file in the directory is parsed as
|
|
|
|
a config file. It is not recursive, nested directories will
|
|
|
|
not be parsed.
|
2015-03-20 19:00:15 +01:00
|
|
|
|
2008-10-21 16:00:00 +02:00
|
|
|
insmod <path>
|
|
|
|
Install the module at <path>
|
|
|
|
|
2015-03-20 19:00:15 +01:00
|
|
|
load_all_props
|
|
|
|
Loads properties from /system, /vendor, et cetera.
|
|
|
|
This is included in the default init.rc.
|
|
|
|
|
|
|
|
load_persist_props
|
|
|
|
Loads persistent properties when /data has been decrypted.
|
|
|
|
This is included in the default init.rc.
|
|
|
|
|
2015-02-06 21:19:48 +01:00
|
|
|
loglevel <level>
|
|
|
|
Sets the kernel log level to level. Properties are expanded within <level>.
|
|
|
|
|
2008-10-21 16:00:00 +02:00
|
|
|
mkdir <path> [mode] [owner] [group]
|
|
|
|
Create a directory at <path>, optionally with the given mode, owner, and
|
|
|
|
group. If not provided, the directory is created with permissions 755 and
|
2015-03-15 17:39:41 +01:00
|
|
|
owned by the root user and root group. If provided, the mode, owner and group
|
|
|
|
will be updated if the directory exists already.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-03-20 19:00:15 +01:00
|
|
|
mount_all <fstab>
|
|
|
|
Calls fs_mgr_mount_all on the given fs_mgr-format fstab.
|
|
|
|
|
2012-08-01 13:15:38 +02:00
|
|
|
mount <type> <device> <dir> [ <flag> ]* [<options>]
|
2008-10-21 16:00:00 +02:00
|
|
|
Attempt to mount the named device at the directory <dir>
|
|
|
|
<device> may be of the form mtd@name to specify a mtd block
|
|
|
|
device by name.
|
2012-08-01 13:15:38 +02:00
|
|
|
<flag>s include "ro", "rw", "remount", "noatime", ...
|
|
|
|
<options> include "barrier=1", "noauto_da_alloc", "discard", ... as
|
|
|
|
a comma separated string, eg: barrier=1,noauto_da_alloc
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-03-20 19:00:15 +01:00
|
|
|
powerctl
|
|
|
|
Internal implementation detail used to respond to changes to the
|
|
|
|
"sys.powerctl" system property, used to implement rebooting.
|
|
|
|
|
|
|
|
restart <service>
|
|
|
|
Like stop, but doesn't disable the service.
|
|
|
|
|
2013-10-09 22:02:09 +02:00
|
|
|
restorecon <path> [ <path> ]*
|
2012-11-02 20:22:34 +01:00
|
|
|
Restore the file named by <path> to the security context specified
|
|
|
|
in the file_contexts configuration.
|
|
|
|
Not required for directories created by the init.rc as these are
|
|
|
|
automatically labeled correctly by init.
|
|
|
|
|
2013-10-09 22:02:09 +02:00
|
|
|
restorecon_recursive <path> [ <path> ]*
|
|
|
|
Recursively restore the directory tree named by <path> to the
|
|
|
|
security contexts specified in the file_contexts configuration.
|
|
|
|
|
2015-03-20 19:00:15 +01:00
|
|
|
rm <path>
|
|
|
|
Calls unlink(2) on the given path. You might want to
|
|
|
|
use "exec -- rm ..." instead (provided the system partition is
|
|
|
|
already mounted).
|
|
|
|
|
|
|
|
rmdir <path>
|
|
|
|
Calls rmdir(2) on the given path.
|
|
|
|
|
2008-10-21 16:00:00 +02:00
|
|
|
setprop <name> <value>
|
2015-02-06 21:19:48 +01:00
|
|
|
Set system property <name> to <value>. Properties are expanded
|
|
|
|
within <value>.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
|
|
|
setrlimit <resource> <cur> <max>
|
|
|
|
Set the rlimit for a resource.
|
|
|
|
|
|
|
|
start <service>
|
|
|
|
Start a service running if it is not already running.
|
|
|
|
|
|
|
|
stop <service>
|
|
|
|
Stop a service from running if it is currently running.
|
|
|
|
|
2015-03-20 19:00:15 +01:00
|
|
|
swapon_all <fstab>
|
|
|
|
Calls fs_mgr_swapon_all on the given fstab file.
|
|
|
|
|
2008-10-21 16:00:00 +02:00
|
|
|
symlink <target> <path>
|
|
|
|
Create a symbolic link at <path> with the value <target>
|
|
|
|
|
2008-12-18 03:08:08 +01:00
|
|
|
sysclktz <mins_west_of_gmt>
|
|
|
|
Set the system clock base (0 if system clock ticks in GMT)
|
|
|
|
|
2008-10-21 16:00:00 +02:00
|
|
|
trigger <event>
|
|
|
|
Trigger an event. Used to queue an action from another
|
|
|
|
action.
|
|
|
|
|
2015-03-20 19:00:15 +01:00
|
|
|
verity_load_state
|
|
|
|
Internal implementation detail used to load dm-verity state.
|
|
|
|
|
|
|
|
verity_update_state <mount_point>
|
|
|
|
Internal implementation detail used to update dm-verity state and
|
|
|
|
set the partition.<mount_point>.verified properties used by adb remount
|
|
|
|
because fs_mgr can't set them directly itself.
|
|
|
|
|
2011-02-04 19:51:39 +01:00
|
|
|
wait <path> [ <timeout> ]
|
2015-03-20 19:00:15 +01:00
|
|
|
Poll for the existence of the given file and return when found,
|
|
|
|
or the timeout has been reached. If timeout is not specified it
|
|
|
|
currently defaults to five seconds.
|
2011-02-04 19:51:39 +01:00
|
|
|
|
2015-02-06 21:19:48 +01:00
|
|
|
write <path> <content>
|
|
|
|
Open the file at <path> and write a string to it with write(2).
|
|
|
|
If the file does not exist, it will be created. If it does exist,
|
|
|
|
it will be truncated. Properties are expanded within <content>.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
|
|
|
|
|
|
|
Properties
|
|
|
|
----------
|
|
|
|
Init updates some system properties to provide some insight into
|
|
|
|
what it's doing:
|
|
|
|
|
2015-02-07 05:15:18 +01:00
|
|
|
init.action
|
2008-10-21 16:00:00 +02:00
|
|
|
Equal to the name of the action currently being executed or "" if none
|
|
|
|
|
|
|
|
init.command
|
|
|
|
Equal to the command being executed or "" if none.
|
|
|
|
|
|
|
|
init.svc.<name>
|
|
|
|
State of a named service ("stopped", "running", "restarting")
|
|
|
|
|
|
|
|
|
2015-02-12 23:28:54 +01:00
|
|
|
Bootcharting
|
|
|
|
------------
|
|
|
|
This version of init contains code to perform "bootcharting": generating log
|
|
|
|
files that can be later processed by the tools provided by www.bootchart.org.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-03-28 20:12:51 +01:00
|
|
|
On the emulator, use the -bootchart <timeout> option to boot with bootcharting
|
|
|
|
activated for <timeout> seconds.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-02-12 23:28:54 +01:00
|
|
|
On a device, create /data/bootchart/start with a command like the following:
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-02-12 23:28:54 +01:00
|
|
|
adb shell 'echo $TIMEOUT > /data/bootchart/start'
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-02-12 23:28:54 +01:00
|
|
|
Where the value of $TIMEOUT corresponds to the desired bootcharted period in
|
|
|
|
seconds. Bootcharting will stop after that many seconds have elapsed.
|
|
|
|
You can also stop the bootcharting at any moment by doing the following:
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-02-12 23:28:54 +01:00
|
|
|
adb shell 'echo 1 > /data/bootchart/stop'
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-02-12 23:28:54 +01:00
|
|
|
Note that /data/bootchart/stop is deleted automatically by init at the end of
|
|
|
|
the bootcharting. This is not the case with /data/bootchart/start, so don't
|
|
|
|
forget to delete it when you're done collecting data.
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-02-12 23:28:54 +01:00
|
|
|
The log files are written to /data/bootchart/. A script is provided to
|
|
|
|
retrieve them and create a bootchart.tgz file that can be used with the
|
|
|
|
bootchart command-line utility:
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-02-12 23:28:54 +01:00
|
|
|
sudo apt-get install pybootchartgui
|
2015-03-28 20:12:51 +01:00
|
|
|
# grab-bootchart.sh uses $ANDROID_SERIAL.
|
2015-02-12 23:28:54 +01:00
|
|
|
$ANDROID_BUILD_TOP/system/core/init/grab-bootchart.sh
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-03-28 20:12:51 +01:00
|
|
|
One thing to watch for is that the bootchart will show init as if it started
|
|
|
|
running at 0s. You'll have to look at dmesg to work out when the kernel
|
|
|
|
actually started init.
|
|
|
|
|
2008-10-21 16:00:00 +02:00
|
|
|
|
2015-06-09 11:04:36 +02:00
|
|
|
Comparing two bootcharts
|
|
|
|
------------------------
|
|
|
|
A handy script named compare-bootcharts.py can be used to compare the
|
|
|
|
start/end time of selected processes. The aforementioned grab-bootchart.sh
|
|
|
|
will leave a bootchart tarball named bootchart.tgz at /tmp/android-bootchart.
|
|
|
|
If two such barballs are preserved on the host machine under different
|
|
|
|
directories, the script can list the timestamps differences. For example:
|
|
|
|
|
|
|
|
Usage: system/core/init/compare-bootcharts.py base_bootchart_dir
|
|
|
|
exp_bootchart_dir
|
|
|
|
|
|
|
|
process: baseline experiment (delta)
|
|
|
|
- Unit is ms (a jiffy is 10 ms on the system)
|
|
|
|
------------------------------------
|
|
|
|
/init: 50 40 (-10)
|
|
|
|
/system/bin/surfaceflinger: 4320 4470 (+150)
|
|
|
|
/system/bin/bootanimation: 6980 6990 (+10)
|
|
|
|
zygote64: 10410 10640 (+230)
|
|
|
|
zygote: 10410 10640 (+230)
|
|
|
|
system_server: 15350 15150 (-200)
|
|
|
|
bootanimation ends at: 33790 31230 (-2560)
|
|
|
|
|
|
|
|
|
2015-06-15 11:49:35 +02:00
|
|
|
Systrace
|
|
|
|
--------
|
|
|
|
Systrace [1] can be used for obtaining performance analysis reports during boot
|
|
|
|
time on userdebug or eng builds.
|
|
|
|
Here is an example of trace events of "wm" and "am" categories:
|
|
|
|
|
|
|
|
$ANDROID_BUILD_TOP/external/chromium-trace/systrace.py wm am --boot
|
|
|
|
|
|
|
|
This command will cause the device to reboot. After the device is rebooted and
|
|
|
|
the boot sequence has finished, the trace report is obtained from the device
|
|
|
|
and written as trace.html on the host by hitting Ctrl+C.
|
|
|
|
|
|
|
|
LIMITATION
|
|
|
|
Recording trace events is started after persistent properties are loaded, so
|
|
|
|
the trace events that are emitted before that are not recorded. Several
|
|
|
|
services such as vold, surfaceflinger, and servicemanager are affected by this
|
|
|
|
limitation since they are started before persistent properties are loaded.
|
|
|
|
Zygote initialization and the processes that are forked from the zygote are not
|
|
|
|
affected.
|
|
|
|
|
|
|
|
[1] http://developer.android.com/tools/help/systrace.html
|
|
|
|
|
|
|
|
|
2015-02-12 23:28:54 +01:00
|
|
|
Debugging init
|
|
|
|
--------------
|
2008-10-21 16:00:00 +02:00
|
|
|
By default, programs executed by init will drop stdout and stderr into
|
|
|
|
/dev/null. To help with debugging, you can execute your program via the
|
2015-02-06 21:19:48 +01:00
|
|
|
Android program logwrapper. This will redirect stdout/stderr into the
|
2008-10-21 16:00:00 +02:00
|
|
|
Android logging system (accessed via logcat).
|
|
|
|
|
|
|
|
For example
|
|
|
|
service akmd /system/bin/logwrapper /sbin/akmd
|
2015-02-06 21:19:48 +01:00
|
|
|
|
|
|
|
For quicker turnaround when working on init itself, use:
|
|
|
|
|
2015-02-12 23:28:54 +01:00
|
|
|
mm -j
|
2015-02-06 21:19:48 +01:00
|
|
|
m ramdisk-nodeps
|
|
|
|
m bootimage-nodeps
|
|
|
|
adb reboot bootloader
|
|
|
|
fastboot boot $ANDROID_PRODUCT_OUT/boot.img
|
|
|
|
|
|
|
|
Alternatively, use the emulator:
|
|
|
|
|
|
|
|
emulator -partition-size 1024 -verbose -show-kernel -no-window
|
|
|
|
|
|
|
|
You might want to call klog_set_level(6) after the klog_init() call
|
|
|
|
so you see the kernel logging in dmesg (or the emulator output).
|