Custom Anbox installation files & patches, including patched Android OS image file.
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 

213 lines
8.6 KiB

--- a/system/core/rootdir/init.rc 2020-06-06 23:23:27.105286979 +0300
+++ b/system/core/rootdir/init.rc 2020-06-06 23:23:53.165287009 +0300
@@ -42,28 +42,28 @@
# Link /vendor to /system/vendor for devices without a vendor partition.
symlink /system/vendor /vendor
- # Mount cgroup mount point for cpu accounting
- mount cgroup none /acct cpuacct
- mkdir /acct/uid
-
- # Create energy-aware scheduler tuning nodes
- mkdir /dev/stune
- mount cgroup none /dev/stune schedtune
- mkdir /dev/stune/foreground
- mkdir /dev/stune/background
- mkdir /dev/stune/top-app
- chown system system /dev/stune
- chown system system /dev/stune/foreground
- chown system system /dev/stune/background
- chown system system /dev/stune/top-app
- chown system system /dev/stune/tasks
- chown system system /dev/stune/foreground/tasks
- chown system system /dev/stune/background/tasks
- chown system system /dev/stune/top-app/tasks
- chmod 0664 /dev/stune/tasks
- chmod 0664 /dev/stune/foreground/tasks
- chmod 0664 /dev/stune/background/tasks
- chmod 0664 /dev/stune/top-app/tasks
+# # Mount cgroup mount point for cpu accounting
+# mount cgroup none /acct cpuacct
+# mkdir /acct/uid
+
+# # Create energy-aware scheduler tuning nodes
+# mkdir /dev/stune
+# mount cgroup none /dev/stune schedtune
+# mkdir /dev/stune/foreground
+# mkdir /dev/stune/background
+# mkdir /dev/stune/top-app
+# chown system system /dev/stune
+# chown system system /dev/stune/foreground
+# chown system system /dev/stune/background
+# chown system system /dev/stune/top-app
+# chown system system /dev/stune/tasks
+# chown system system /dev/stune/foreground/tasks
+# chown system system /dev/stune/background/tasks
+# chown system system /dev/stune/top-app/tasks
+# chmod 0664 /dev/stune/tasks
+# chmod 0664 /dev/stune/foreground/tasks
+# chmod 0664 /dev/stune/background/tasks
+# chmod 0664 /dev/stune/top-app/tasks
# Mount staging areas for devices managed by vold
# See storage config details at http://source.android.com/tech/storage/
@@ -98,11 +98,11 @@
symlink /storage/self/primary /mnt/sdcard
symlink /mnt/user/0/primary /mnt/runtime/default/self/primary
- # root memory control cgroup, used by lmkd
- mkdir /dev/memcg 0700 root system
- mount cgroup none /dev/memcg memory
- # app mem cgroups, used by activity manager, lmkd and zygote
- mkdir /dev/memcg/apps/ 0755 system system
+# # root memory control cgroup, used by lmkd
+# mkdir /dev/memcg 0700 root system
+# mount cgroup none /dev/memcg memory
+# # app mem cgroups, used by activity manager, lmkd and zygote
+# mkdir /dev/memcg/apps/ 0755 system system
write /proc/sys/kernel/panic_on_oops 1
write /proc/sys/kernel/hung_task_timeout_secs 0
@@ -136,74 +136,74 @@
write /proc/sys/net/ipv4/conf/all/accept_redirects 0
write /proc/sys/net/ipv6/conf/all/accept_redirects 0
- # Create cgroup mount points for process groups
- mkdir /dev/cpuctl
- mount cgroup none /dev/cpuctl cpu
- chown system system /dev/cpuctl
- chown system system /dev/cpuctl/tasks
- chmod 0666 /dev/cpuctl/tasks
- write /dev/cpuctl/cpu.rt_period_us 1000000
- write /dev/cpuctl/cpu.rt_runtime_us 950000
-
- mkdir /dev/cpuctl/bg_non_interactive
- chown system system /dev/cpuctl/bg_non_interactive/tasks
- chmod 0666 /dev/cpuctl/bg_non_interactive/tasks
- # 5.0 %
- write /dev/cpuctl/bg_non_interactive/cpu.shares 52
- write /dev/cpuctl/bg_non_interactive/cpu.rt_period_us 1000000
- # active FIFO threads will never be in BG
- write /dev/cpuctl/bg_non_interactive/cpu.rt_runtime_us 10000
-
- # sets up initial cpusets for ActivityManager
- mkdir /dev/cpuset
- mount cpuset none /dev/cpuset
-
- # this ensures that the cpusets are present and usable, but the device's
- # init.rc must actually set the correct cpus
- mkdir /dev/cpuset/foreground
- write /dev/cpuset/foreground/cpus 0
- write /dev/cpuset/foreground/mems 0
- mkdir /dev/cpuset/foreground/boost
- write /dev/cpuset/foreground/boost/cpus 0
- write /dev/cpuset/foreground/boost/mems 0
- mkdir /dev/cpuset/background
- write /dev/cpuset/background/cpus 0
- write /dev/cpuset/background/mems 0
-
- # system-background is for system tasks that should only run on
- # little cores, not on bigs
- # to be used only by init, so don't change system-bg permissions
- mkdir /dev/cpuset/system-background
- write /dev/cpuset/system-background/cpus 0
- write /dev/cpuset/system-background/mems 0
-
- mkdir /dev/cpuset/top-app
- write /dev/cpuset/top-app/cpus 0
- write /dev/cpuset/top-app/mems 0
-
- # change permissions for all cpusets we'll touch at runtime
- chown system system /dev/cpuset
- chown system system /dev/cpuset/foreground
- chown system system /dev/cpuset/foreground/boost
- chown system system /dev/cpuset/background
- chown system system /dev/cpuset/system-background
- chown system system /dev/cpuset/top-app
- chown system system /dev/cpuset/tasks
- chown system system /dev/cpuset/foreground/tasks
- chown system system /dev/cpuset/foreground/boost/tasks
- chown system system /dev/cpuset/background/tasks
- chown system system /dev/cpuset/system-background/tasks
- chown system system /dev/cpuset/top-app/tasks
-
- # set system-background to 0775 so SurfaceFlinger can touch it
- chmod 0775 /dev/cpuset/system-background
-
- chmod 0664 /dev/cpuset/foreground/tasks
- chmod 0664 /dev/cpuset/foreground/boost/tasks
- chmod 0664 /dev/cpuset/background/tasks
- chmod 0664 /dev/cpuset/system-background/tasks
- chmod 0664 /dev/cpuset/top-app/tasks
- chmod 0664 /dev/cpuset/tasks
+# # Create cgroup mount points for process groups
+# mkdir /dev/cpuctl
+# mount cgroup none /dev/cpuctl cpu
+# chown system system /dev/cpuctl
+# chown system system /dev/cpuctl/tasks
+# chmod 0666 /dev/cpuctl/tasks
+# write /dev/cpuctl/cpu.rt_period_us 1000000
+# write /dev/cpuctl/cpu.rt_runtime_us 950000
+#
+# mkdir /dev/cpuctl/bg_non_interactive
+# chown system system /dev/cpuctl/bg_non_interactive/tasks
+# chmod 0666 /dev/cpuctl/bg_non_interactive/tasks
+# # 5.0 %
+# write /dev/cpuctl/bg_non_interactive/cpu.shares 52
+# write /dev/cpuctl/bg_non_interactive/cpu.rt_period_us 1000000
+# # active FIFO threads will never be in BG
+# write /dev/cpuctl/bg_non_interactive/cpu.rt_runtime_us 10000
+
+# # sets up initial cpusets for ActivityManager
+# mkdir /dev/cpuset
+# mount cpuset none /dev/cpuset
+#
+# # this ensures that the cpusets are present and usable, but the device's
+# # init.rc must actually set the correct cpus
+# mkdir /dev/cpuset/foreground
+# write /dev/cpuset/foreground/cpus 0
+# write /dev/cpuset/foreground/mems 0
+# mkdir /dev/cpuset/foreground/boost
+# write /dev/cpuset/foreground/boost/cpus 0
+# write /dev/cpuset/foreground/boost/mems 0
+# mkdir /dev/cpuset/background
+# write /dev/cpuset/background/cpus 0
+# write /dev/cpuset/background/mems 0
+#
+# # system-background is for system tasks that should only run on
+# # little cores, not on bigs
+# # to be used only by init, so don't change system-bg permissions
+# mkdir /dev/cpuset/system-background
+# write /dev/cpuset/system-background/cpus 0
+# write /dev/cpuset/system-background/mems 0
+#
+# mkdir /dev/cpuset/top-app
+# write /dev/cpuset/top-app/cpus 0
+# write /dev/cpuset/top-app/mems 0
+#
+# # change permissions for all cpusets we'll touch at runtime
+# chown system system /dev/cpuset
+# chown system system /dev/cpuset/foreground
+# chown system system /dev/cpuset/foreground/boost
+# chown system system /dev/cpuset/background
+# chown system system /dev/cpuset/system-background
+# chown system system /dev/cpuset/top-app
+# chown system system /dev/cpuset/tasks
+# chown system system /dev/cpuset/foreground/tasks
+# chown system system /dev/cpuset/foreground/boost/tasks
+# chown system system /dev/cpuset/background/tasks
+# chown system system /dev/cpuset/system-background/tasks
+# chown system system /dev/cpuset/top-app/tasks
+#
+# # set system-background to 0775 so SurfaceFlinger can touch it
+# chmod 0775 /dev/cpuset/system-background
+#
+# chmod 0664 /dev/cpuset/foreground/tasks
+# chmod 0664 /dev/cpuset/foreground/boost/tasks
+# chmod 0664 /dev/cpuset/background/tasks
+# chmod 0664 /dev/cpuset/system-background/tasks
+# chmod 0664 /dev/cpuset/top-app/tasks
+# chmod 0664 /dev/cpuset/tasks
# qtaguid will limit access to specific data based on group memberships.