Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # Copyright (C) 2012 The Android Open Source Project
- #
- # IMPORTANT: Do not create world writable files or directories.
- # This is a common source of Android security bugs.
- #
- service lipstickhack /usr/bin/droid/lipstick-hack.sh
- class core
- user system
- oneshot
- group graphics drmrpc
- import /init.environ.rc
- # Mer handles usb stuff
- #import /init.usb.rc
- import /init.${ro.hardware}.rc
- import /init.${ro.zygote}.rc
- import /init.trace.rc
- # Include CM's extra init file
- import /init.cm.rc
- on early-init
- # Apply strict SELinux checking of PROT_EXEC on mmap/mprotect calls.
- write /sys/fs/selinux/checkreqprot 0
- # Set the security context for the init process.
- # This should occur before anything else (e.g. ueventd) is started.
- setcon u:r:init:s0
- "init.rc" 674L, 23101C written
- sh-3.2# reboot
- sh-3.2# Connection closed by foreign host.
- [douglasbrito@home ~]$
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement