blob: 13cebcc17d8a40c1ca9bbe38be237db885170242 [file] [log] [blame]
Keun-young Park8d01f632017-03-13 11:54:47 -07001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Tom Cherry3f5eaae52017-04-06 16:30:22 -070016
17#include "reboot.h"
18
Keun-young Park8d01f632017-03-13 11:54:47 -070019#include <dirent.h>
20#include <fcntl.h>
Keun-young Park2ba5c812017-03-29 12:54:40 -070021#include <linux/fs.h>
Jaegeuk Kim2aedc822018-11-20 13:27:06 -080022#include <linux/loop.h>
josephjangaaddf282019-04-16 18:46:24 +080023#include <mntent.h>
24#include <semaphore.h>
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +010025#include <stdlib.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070026#include <sys/cdefs.h>
Keun-young Park2ba5c812017-03-29 12:54:40 -070027#include <sys/ioctl.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070028#include <sys/mount.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070029#include <sys/stat.h>
josephjangaaddf282019-04-16 18:46:24 +080030#include <sys/swap.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070031#include <sys/syscall.h>
32#include <sys/types.h>
33#include <sys/wait.h>
34
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +010035#include <chrono>
Keun-young Park8d01f632017-03-13 11:54:47 -070036#include <memory>
Keun-young Park7830d592017-03-27 16:07:02 -070037#include <set>
Keun-young Park8d01f632017-03-13 11:54:47 -070038#include <thread>
39#include <vector>
40
Nikita Ioffe23dbd6d2019-11-14 01:21:24 +000041#include <InitProperties.sysprop.h>
Tom Cherryede0d532017-07-06 14:20:11 -070042#include <android-base/chrono_utils.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070043#include <android-base/file.h>
Tom Cherry3f5eaae52017-04-06 16:30:22 -070044#include <android-base/logging.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070045#include <android-base/macros.h>
Tom Cherryccf23532017-03-28 16:40:41 -070046#include <android-base/properties.h>
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +010047#include <android-base/scopeguard.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070048#include <android-base/strings.h>
Keun-young Park2ba5c812017-03-29 12:54:40 -070049#include <android-base/unique_fd.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070050#include <bootloader_message/bootloader_message.h>
51#include <cutils/android_reboot.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070052#include <fs_mgr.h>
53#include <logwrap/logwrap.h>
Todd Poynorfc827be2017-04-13 15:17:24 -070054#include <private/android_filesystem_config.h>
Tom Cherry0c8d6d22017-08-10 12:22:44 -070055#include <selinux/selinux.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070056
Nikita Ioffeba6968e2019-10-07 16:26:33 +010057#include "action.h"
Tom Cherry7fd3bc22018-02-13 15:36:14 -080058#include "action_manager.h"
Nikita Ioffeba6968e2019-10-07 16:26:33 +010059#include "builtin_arguments.h"
Wei Wangeeab4912017-06-27 22:08:45 -070060#include "init.h"
Nikita Ioffeab91ee92019-11-06 21:40:31 +000061#include "mount_namespace.h"
Keun-young Park7830d592017-03-27 16:07:02 -070062#include "property_service.h"
Tom Cherry44aceed2018-08-03 13:36:18 -070063#include "reboot_utils.h"
Keun-young Park8d01f632017-03-13 11:54:47 -070064#include "service.h"
Tom Cherry2aeb1ad2019-06-26 10:46:20 -070065#include "service_list.h"
Luis Hector Chavez9f97f472017-09-06 13:43:57 -070066#include "sigchld_handler.h"
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +010067#include "util.h"
Keun-young Park8d01f632017-03-13 11:54:47 -070068
josephjangaaddf282019-04-16 18:46:24 +080069#define PROC_SYSRQ "/proc/sysrq-trigger"
70
Tom Cherry2436e6b2019-09-19 11:16:19 -070071using namespace std::literals;
72
Nikita Ioffec0df1872019-11-13 21:47:06 +000073using android::base::boot_clock;
Tom Cherry4f4cacc2019-01-08 10:39:00 -080074using android::base::GetBoolProperty;
Nikita Ioffec0df1872019-11-13 21:47:06 +000075using android::base::SetProperty;
Mark Salyzyn62909822017-10-09 09:27:16 -070076using android::base::Split;
Tom Cherryede0d532017-07-06 14:20:11 -070077using android::base::Timer;
Jaegeuk Kim2aedc822018-11-20 13:27:06 -080078using android::base::unique_fd;
Nikita Ioffec0df1872019-11-13 21:47:06 +000079using android::base::WaitForProperty;
josephjangaaddf282019-04-16 18:46:24 +080080using android::base::WriteStringToFile;
Keun-young Park8d01f632017-03-13 11:54:47 -070081
Tom Cherry81f5d3e2017-06-22 12:53:17 -070082namespace android {
83namespace init {
84
Nikita Ioffeba6968e2019-10-07 16:26:33 +010085static bool shutting_down = false;
86
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +010087static const std::set<std::string> kDebuggingServices{"tombstoned", "logd", "adbd", "console"};
88
89static std::vector<Service*> GetDebuggingServices(bool only_post_data) {
90 std::vector<Service*> ret;
91 ret.reserve(kDebuggingServices.size());
92 for (const auto& s : ServiceList::GetInstance()) {
93 if (kDebuggingServices.count(s->name()) && (!only_post_data || s->is_post_data())) {
94 ret.push_back(s.get());
95 }
96 }
97 return ret;
98}
99
Keun-young Park8d01f632017-03-13 11:54:47 -0700100// represents umount status during reboot / shutdown.
101enum UmountStat {
102 /* umount succeeded. */
103 UMOUNT_STAT_SUCCESS = 0,
104 /* umount was not run. */
105 UMOUNT_STAT_SKIPPED = 1,
106 /* umount failed with timeout. */
107 UMOUNT_STAT_TIMEOUT = 2,
108 /* could not run due to error */
109 UMOUNT_STAT_ERROR = 3,
110 /* not used by init but reserved for other part to use this to represent the
111 the state where umount status before reboot is not found / available. */
112 UMOUNT_STAT_NOT_AVAILABLE = 4,
113};
114
115// Utility for struct mntent
116class MountEntry {
117 public:
Keun-young Park2ba5c812017-03-29 12:54:40 -0700118 explicit MountEntry(const mntent& entry)
Keun-young Park8d01f632017-03-13 11:54:47 -0700119 : mnt_fsname_(entry.mnt_fsname),
120 mnt_dir_(entry.mnt_dir),
121 mnt_type_(entry.mnt_type),
Keun-young Park2ba5c812017-03-29 12:54:40 -0700122 mnt_opts_(entry.mnt_opts) {}
Keun-young Park8d01f632017-03-13 11:54:47 -0700123
Jaegeuk Kim0f04f722017-09-25 10:55:39 -0700124 bool Umount(bool force) {
Tom Cherryc9fec9d2018-02-15 14:26:58 -0800125 LOG(INFO) << "Unmounting " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_;
Jaegeuk Kim0f04f722017-09-25 10:55:39 -0700126 int r = umount2(mnt_dir_.c_str(), force ? MNT_FORCE : 0);
Keun-young Park2ba5c812017-03-29 12:54:40 -0700127 if (r == 0) {
Tom Cherryc9fec9d2018-02-15 14:26:58 -0800128 LOG(INFO) << "Umounted " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_;
Keun-young Park2ba5c812017-03-29 12:54:40 -0700129 return true;
130 } else {
Tom Cherryc9fec9d2018-02-15 14:26:58 -0800131 PLOG(WARNING) << "Cannot umount " << mnt_fsname_ << ":" << mnt_dir_ << " opts "
Keun-young Park2ba5c812017-03-29 12:54:40 -0700132 << mnt_opts_;
133 return false;
134 }
135 }
Keun-young Park8d01f632017-03-13 11:54:47 -0700136
Keun-young Park2ba5c812017-03-29 12:54:40 -0700137 void DoFsck() {
138 int st;
139 if (IsF2Fs()) {
140 const char* f2fs_argv[] = {
Randall Huangdf2faa42019-01-15 15:00:56 +0800141 "/system/bin/fsck.f2fs",
142 "-a",
143 mnt_fsname_.c_str(),
Keun-young Park2ba5c812017-03-29 12:54:40 -0700144 };
Tom Cherry3a803eb2019-09-25 16:23:50 -0700145 logwrap_fork_execvp(arraysize(f2fs_argv), f2fs_argv, &st, false, LOG_KLOG, true,
146 nullptr);
Keun-young Park2ba5c812017-03-29 12:54:40 -0700147 } else if (IsExt4()) {
148 const char* ext4_argv[] = {
Randall Huangdf2faa42019-01-15 15:00:56 +0800149 "/system/bin/e2fsck",
150 "-y",
151 mnt_fsname_.c_str(),
Keun-young Park2ba5c812017-03-29 12:54:40 -0700152 };
Tom Cherry3a803eb2019-09-25 16:23:50 -0700153 logwrap_fork_execvp(arraysize(ext4_argv), ext4_argv, &st, false, LOG_KLOG, true,
154 nullptr);
Keun-young Park2ba5c812017-03-29 12:54:40 -0700155 }
156 }
Keun-young Park8d01f632017-03-13 11:54:47 -0700157
158 static bool IsBlockDevice(const struct mntent& mntent) {
159 return android::base::StartsWith(mntent.mnt_fsname, "/dev/block");
160 }
161
162 static bool IsEmulatedDevice(const struct mntent& mntent) {
Keun-young Park2ba5c812017-03-29 12:54:40 -0700163 return android::base::StartsWith(mntent.mnt_fsname, "/data/");
Keun-young Park8d01f632017-03-13 11:54:47 -0700164 }
165
166 private:
Keun-young Park2ba5c812017-03-29 12:54:40 -0700167 bool IsF2Fs() const { return mnt_type_ == "f2fs"; }
168
169 bool IsExt4() const { return mnt_type_ == "ext4"; }
170
Keun-young Park8d01f632017-03-13 11:54:47 -0700171 std::string mnt_fsname_;
172 std::string mnt_dir_;
173 std::string mnt_type_;
Keun-young Park2ba5c812017-03-29 12:54:40 -0700174 std::string mnt_opts_;
Keun-young Park8d01f632017-03-13 11:54:47 -0700175};
176
177// Turn off backlight while we are performing power down cleanup activities.
178static void TurnOffBacklight() {
Steven Morelandd5eccfd2018-01-19 13:01:53 -0800179 Service* service = ServiceList::GetInstance().FindService("blank_screen");
180 if (service == nullptr) {
181 LOG(WARNING) << "cannot find blank_screen in TurnOffBacklight";
Keun-young Park8d01f632017-03-13 11:54:47 -0700182 return;
183 }
Tom Cherryd9872642018-10-11 10:38:05 -0700184 if (auto result = service->Start(); !result) {
185 LOG(WARNING) << "Could not start blank_screen service: " << result.error();
186 }
Keun-young Park8d01f632017-03-13 11:54:47 -0700187}
188
Nikita Ioffe12a36072019-10-23 20:11:32 +0100189static Result<void> ShutdownVold() {
Keun-young Park8d01f632017-03-13 11:54:47 -0700190 const char* vdc_argv[] = {"/system/bin/vdc", "volume", "shutdown"};
191 int status;
Nikita Ioffe12a36072019-10-23 20:11:32 +0100192 if (logwrap_fork_execvp(arraysize(vdc_argv), vdc_argv, &status, false, LOG_KLOG, true,
193 nullptr) != 0) {
194 return ErrnoError() << "Failed to call 'vdc volume shutdown'";
195 }
196 if (WIFEXITED(status) && WEXITSTATUS(status) == 0) {
197 return {};
198 }
199 return Error() << "'vdc volume shutdown' failed : " << status;
Keun-young Park8d01f632017-03-13 11:54:47 -0700200}
201
202static void LogShutdownTime(UmountStat stat, Timer* t) {
Tom Cherryede0d532017-07-06 14:20:11 -0700203 LOG(WARNING) << "powerctl_shutdown_time_ms:" << std::to_string(t->duration().count()) << ":"
204 << stat;
Keun-young Park8d01f632017-03-13 11:54:47 -0700205}
206
Tom Cherry2436e6b2019-09-19 11:16:19 -0700207static bool IsDataMounted() {
208 std::unique_ptr<std::FILE, int (*)(std::FILE*)> fp(setmntent("/proc/mounts", "re"), endmntent);
209 if (fp == nullptr) {
210 PLOG(ERROR) << "Failed to open /proc/mounts";
211 return false;
212 }
213 mntent* mentry;
214 while ((mentry = getmntent(fp.get())) != nullptr) {
215 if (mentry->mnt_dir == "/data"s) {
216 return true;
217 }
218 }
219 return false;
220}
221
222// Find all read+write block devices and emulated devices in /proc/mounts and add them to
223// the correpsponding list.
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100224static bool FindPartitionsToUmount(std::vector<MountEntry>* block_dev_partitions,
225 std::vector<MountEntry>* emulated_partitions, bool dump) {
Tom Cherryf274e782018-10-03 13:13:41 -0700226 std::unique_ptr<std::FILE, int (*)(std::FILE*)> fp(setmntent("/proc/mounts", "re"), endmntent);
Keun-young Park8d01f632017-03-13 11:54:47 -0700227 if (fp == nullptr) {
228 PLOG(ERROR) << "Failed to open /proc/mounts";
229 return false;
230 }
231 mntent* mentry;
232 while ((mentry = getmntent(fp.get())) != nullptr) {
Keun-young Park2ba5c812017-03-29 12:54:40 -0700233 if (dump) {
234 LOG(INFO) << "mount entry " << mentry->mnt_fsname << ":" << mentry->mnt_dir << " opts "
235 << mentry->mnt_opts << " type " << mentry->mnt_type;
236 } else if (MountEntry::IsBlockDevice(*mentry) && hasmntopt(mentry, "rw")) {
Keun-young Park6e12b382017-07-17 12:20:33 -0700237 std::string mount_dir(mentry->mnt_dir);
238 // These are R/O partitions changed to R/W after adb remount.
239 // Do not umount them as shutdown critical services may rely on them.
Wei Wanga01c27e2017-07-25 10:52:08 -0700240 if (mount_dir != "/" && mount_dir != "/system" && mount_dir != "/vendor" &&
241 mount_dir != "/oem") {
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100242 block_dev_partitions->emplace(block_dev_partitions->begin(), *mentry);
Keun-young Park6e12b382017-07-17 12:20:33 -0700243 }
Keun-young Park8d01f632017-03-13 11:54:47 -0700244 } else if (MountEntry::IsEmulatedDevice(*mentry)) {
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100245 emulated_partitions->emplace(emulated_partitions->begin(), *mentry);
Keun-young Park8d01f632017-03-13 11:54:47 -0700246 }
247 }
248 return true;
249}
250
Jonglin Lee28a2c922019-01-15 16:38:44 -0800251static void DumpUmountDebuggingInfo() {
Keun-young Park2ba5c812017-03-29 12:54:40 -0700252 int status;
253 if (!security_getenforce()) {
254 LOG(INFO) << "Run lsof";
255 const char* lsof_argv[] = {"/system/bin/lsof"};
Tom Cherry3a803eb2019-09-25 16:23:50 -0700256 logwrap_fork_execvp(arraysize(lsof_argv), lsof_argv, &status, false, LOG_KLOG, true,
257 nullptr);
Keun-young Park8d01f632017-03-13 11:54:47 -0700258 }
Keun-young Park2ba5c812017-03-29 12:54:40 -0700259 FindPartitionsToUmount(nullptr, nullptr, true);
Jonglin Lee28a2c922019-01-15 16:38:44 -0800260 // dump current CPU stack traces and uninterruptible tasks
josephjangaaddf282019-04-16 18:46:24 +0800261 WriteStringToFile("l", PROC_SYSRQ);
262 WriteStringToFile("w", PROC_SYSRQ);
Keun-young Park2ba5c812017-03-29 12:54:40 -0700263}
264
Tom Cherryede0d532017-07-06 14:20:11 -0700265static UmountStat UmountPartitions(std::chrono::milliseconds timeout) {
Keun-young Park2ba5c812017-03-29 12:54:40 -0700266 Timer t;
Keun-young Park2ba5c812017-03-29 12:54:40 -0700267 /* data partition needs all pending writes to be completed and all emulated partitions
268 * umounted.If the current waiting is not good enough, give
269 * up and leave it to e2fsck after reboot to fix it.
270 */
271 while (true) {
272 std::vector<MountEntry> block_devices;
273 std::vector<MountEntry> emulated_devices;
274 if (!FindPartitionsToUmount(&block_devices, &emulated_devices, false)) {
275 return UMOUNT_STAT_ERROR;
276 }
277 if (block_devices.size() == 0) {
Wei Wang8c00e422017-08-16 14:01:46 -0700278 return UMOUNT_STAT_SUCCESS;
Keun-young Park2ba5c812017-03-29 12:54:40 -0700279 }
Wei Wang8c00e422017-08-16 14:01:46 -0700280 bool unmount_done = true;
281 if (emulated_devices.size() > 0) {
Wei Wang25dc30f2017-10-23 15:32:03 -0700282 for (auto& entry : emulated_devices) {
283 if (!entry.Umount(false)) unmount_done = false;
284 }
Wei Wang8c00e422017-08-16 14:01:46 -0700285 if (unmount_done) {
286 sync();
287 }
Keun-young Park2ba5c812017-03-29 12:54:40 -0700288 }
Wei Wang25dc30f2017-10-23 15:32:03 -0700289 for (auto& entry : block_devices) {
290 if (!entry.Umount(timeout == 0ms)) unmount_done = false;
291 }
Wei Wang8c00e422017-08-16 14:01:46 -0700292 if (unmount_done) {
293 return UMOUNT_STAT_SUCCESS;
Keun-young Park2ba5c812017-03-29 12:54:40 -0700294 }
Wei Wang8c00e422017-08-16 14:01:46 -0700295 if ((timeout < t.duration())) { // try umount at least once
296 return UMOUNT_STAT_TIMEOUT;
Keun-young Park2ba5c812017-03-29 12:54:40 -0700297 }
Keun-young Park2ba5c812017-03-29 12:54:40 -0700298 std::this_thread::sleep_for(100ms);
299 }
Keun-young Park8d01f632017-03-13 11:54:47 -0700300}
301
josephjangaaddf282019-04-16 18:46:24 +0800302static void KillAllProcesses() {
303 WriteStringToFile("i", PROC_SYSRQ);
304}
305
306// Create reboot/shutdwon monitor thread
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100307void RebootMonitorThread(unsigned int cmd, const std::string& reboot_target,
308 sem_t* reboot_semaphore, std::chrono::milliseconds shutdown_timeout,
309 bool* reboot_monitor_run) {
josephjangaaddf282019-04-16 18:46:24 +0800310 unsigned int remaining_shutdown_time = 0;
311
312 // 30 seconds more than the timeout passed to the thread as there is a final Umount pass
313 // after the timeout is reached.
314 constexpr unsigned int shutdown_watchdog_timeout_default = 30;
315 auto shutdown_watchdog_timeout = android::base::GetUintProperty(
316 "ro.build.shutdown.watchdog.timeout", shutdown_watchdog_timeout_default);
317 remaining_shutdown_time = shutdown_watchdog_timeout + shutdown_timeout.count() / 1000;
318
319 while (*reboot_monitor_run == true) {
320 if (TEMP_FAILURE_RETRY(sem_wait(reboot_semaphore)) == -1) {
321 LOG(ERROR) << "sem_wait failed and exit RebootMonitorThread()";
322 return;
323 }
324
325 timespec shutdown_timeout_timespec;
326 if (clock_gettime(CLOCK_MONOTONIC, &shutdown_timeout_timespec) == -1) {
327 LOG(ERROR) << "clock_gettime() fail! exit RebootMonitorThread()";
328 return;
329 }
330
331 // If there are some remaining shutdown time left from previous round, we use
332 // remaining time here.
333 shutdown_timeout_timespec.tv_sec += remaining_shutdown_time;
334
335 LOG(INFO) << "shutdown_timeout_timespec.tv_sec: " << shutdown_timeout_timespec.tv_sec;
336
337 int sem_return = 0;
338 while ((sem_return = sem_timedwait_monotonic_np(reboot_semaphore,
339 &shutdown_timeout_timespec)) == -1 &&
340 errno == EINTR) {
341 }
342
343 if (sem_return == -1) {
344 LOG(ERROR) << "Reboot thread timed out";
345
346 if (android::base::GetBoolProperty("ro.debuggable", false) == true) {
Tom Cherry2436e6b2019-09-19 11:16:19 -0700347 if (false) {
348 // SEPolicy will block debuggerd from running and this is intentional.
349 // But these lines are left to be enabled during debugging.
350 LOG(INFO) << "Try to dump init process call trace:";
351 const char* vdc_argv[] = {"/system/bin/debuggerd", "-b", "1"};
352 int status;
Tom Cherry3a803eb2019-09-25 16:23:50 -0700353 logwrap_fork_execvp(arraysize(vdc_argv), vdc_argv, &status, false, LOG_KLOG,
354 true, nullptr);
Tom Cherry2436e6b2019-09-19 11:16:19 -0700355 }
josephjangaaddf282019-04-16 18:46:24 +0800356 LOG(INFO) << "Show stack for all active CPU:";
357 WriteStringToFile("l", PROC_SYSRQ);
358
359 LOG(INFO) << "Show tasks that are in disk sleep(uninterruptable sleep), which are "
360 "like "
361 "blocked in mutex or hardware register access:";
362 WriteStringToFile("w", PROC_SYSRQ);
363 }
364
365 // In shutdown case,notify kernel to sync and umount fs to read-only before shutdown.
366 if (cmd == ANDROID_RB_POWEROFF || cmd == ANDROID_RB_THERMOFF) {
367 WriteStringToFile("s", PROC_SYSRQ);
368
369 WriteStringToFile("u", PROC_SYSRQ);
370
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100371 RebootSystem(cmd, reboot_target);
josephjangaaddf282019-04-16 18:46:24 +0800372 }
373
374 LOG(ERROR) << "Trigger crash at last!";
375 WriteStringToFile("c", PROC_SYSRQ);
376 } else {
377 timespec current_time_timespec;
378
379 if (clock_gettime(CLOCK_MONOTONIC, &current_time_timespec) == -1) {
380 LOG(ERROR) << "clock_gettime() fail! exit RebootMonitorThread()";
381 return;
382 }
383
384 remaining_shutdown_time =
385 shutdown_timeout_timespec.tv_sec - current_time_timespec.tv_sec;
386
387 LOG(INFO) << "remaining_shutdown_time: " << remaining_shutdown_time;
388 }
389 }
390}
Keun-young Park3ee0df92017-03-27 11:21:09 -0700391
Keun-young Park8d01f632017-03-13 11:54:47 -0700392/* Try umounting all emulated file systems R/W block device cfile systems.
393 * This will just try umount and give it up if it fails.
394 * For fs like ext4, this is ok as file system will be marked as unclean shutdown
395 * and necessary check can be done at the next reboot.
396 * For safer shutdown, caller needs to make sure that
397 * all processes / emulated partition for the target fs are all cleaned-up.
398 *
399 * return true when umount was successful. false when timed out.
400 */
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100401static UmountStat TryUmountAndFsck(unsigned int cmd, bool run_fsck,
josephjangaaddf282019-04-16 18:46:24 +0800402 std::chrono::milliseconds timeout, sem_t* reboot_semaphore) {
Keun-young Park3ee0df92017-03-27 11:21:09 -0700403 Timer t;
Keun-young Park2ba5c812017-03-29 12:54:40 -0700404 std::vector<MountEntry> block_devices;
405 std::vector<MountEntry> emulated_devices;
Keun-young Park8d01f632017-03-13 11:54:47 -0700406
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100407 if (run_fsck && !FindPartitionsToUmount(&block_devices, &emulated_devices, false)) {
Keun-young Park8d01f632017-03-13 11:54:47 -0700408 return UMOUNT_STAT_ERROR;
409 }
Keun-young Park2ba5c812017-03-29 12:54:40 -0700410
Tom Cherryede0d532017-07-06 14:20:11 -0700411 UmountStat stat = UmountPartitions(timeout - t.duration());
Keun-young Park2ba5c812017-03-29 12:54:40 -0700412 if (stat != UMOUNT_STAT_SUCCESS) {
413 LOG(INFO) << "umount timeout, last resort, kill all and try";
Jonglin Lee28a2c922019-01-15 16:38:44 -0800414 if (DUMP_ON_UMOUNT_FAILURE) DumpUmountDebuggingInfo();
Keun-young Park3ee0df92017-03-27 11:21:09 -0700415 KillAllProcesses();
Keun-young Park2ba5c812017-03-29 12:54:40 -0700416 // even if it succeeds, still it is timeout and do not run fsck with all processes killed
Keun-young Parkc59b8222017-07-18 18:52:25 -0700417 UmountStat st = UmountPartitions(0ms);
Jonglin Lee28a2c922019-01-15 16:38:44 -0800418 if ((st != UMOUNT_STAT_SUCCESS) && DUMP_ON_UMOUNT_FAILURE) DumpUmountDebuggingInfo();
Keun-young Park8d01f632017-03-13 11:54:47 -0700419 }
420
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100421 if (stat == UMOUNT_STAT_SUCCESS && run_fsck) {
josephjangaaddf282019-04-16 18:46:24 +0800422 LOG(INFO) << "Pause reboot monitor thread before fsck";
423 sem_post(reboot_semaphore);
424
Keun-young Park2ba5c812017-03-29 12:54:40 -0700425 // fsck part is excluded from timeout check. It only runs for user initiated shutdown
426 // and should not affect reboot time.
427 for (auto& entry : block_devices) {
428 entry.DoFsck();
429 }
josephjangaaddf282019-04-16 18:46:24 +0800430
431 LOG(INFO) << "Resume reboot monitor thread after fsck";
432 sem_post(reboot_semaphore);
Keun-young Park2ba5c812017-03-29 12:54:40 -0700433 }
Keun-young Park8d01f632017-03-13 11:54:47 -0700434 return stat;
435}
436
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800437// zram is able to use backing device on top of a loopback device.
438// In order to unmount /data successfully, we have to kill the loopback device first
439#define ZRAM_DEVICE "/dev/block/zram0"
440#define ZRAM_RESET "/sys/block/zram0/reset"
441#define ZRAM_BACK_DEV "/sys/block/zram0/backing_dev"
Nikita Ioffe12a36072019-10-23 20:11:32 +0100442static Result<void> KillZramBackingDevice() {
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800443 std::string backing_dev;
Nikita Ioffe12a36072019-10-23 20:11:32 +0100444 if (!android::base::ReadFileToString(ZRAM_BACK_DEV, &backing_dev)) return {};
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800445
Nikita Ioffe12a36072019-10-23 20:11:32 +0100446 if (!android::base::StartsWith(backing_dev, "/dev/block/loop")) return {};
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800447
448 // cut the last "\n"
449 backing_dev.erase(backing_dev.length() - 1);
450
451 // shutdown zram handle
452 Timer swap_timer;
453 LOG(INFO) << "swapoff() start...";
454 if (swapoff(ZRAM_DEVICE) == -1) {
Nikita Ioffe12a36072019-10-23 20:11:32 +0100455 return ErrnoError() << "zram_backing_dev: swapoff (" << backing_dev << ")"
456 << " failed";
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800457 }
458 LOG(INFO) << "swapoff() took " << swap_timer;;
459
josephjangaaddf282019-04-16 18:46:24 +0800460 if (!WriteStringToFile("1", ZRAM_RESET)) {
Nikita Ioffe12a36072019-10-23 20:11:32 +0100461 return Error() << "zram_backing_dev: reset (" << backing_dev << ")"
462 << " failed";
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800463 }
464
465 // clear loopback device
466 unique_fd loop(TEMP_FAILURE_RETRY(open(backing_dev.c_str(), O_RDWR | O_CLOEXEC)));
467 if (loop.get() < 0) {
Nikita Ioffe12a36072019-10-23 20:11:32 +0100468 return ErrnoError() << "zram_backing_dev: open(" << backing_dev << ")"
469 << " failed";
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800470 }
471
472 if (ioctl(loop.get(), LOOP_CLR_FD, 0) < 0) {
Nikita Ioffe12a36072019-10-23 20:11:32 +0100473 return ErrnoError() << "zram_backing_dev: loop_clear (" << backing_dev << ")"
474 << " failed";
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800475 }
476 LOG(INFO) << "zram_backing_dev: `" << backing_dev << "` is cleared successfully.";
Nikita Ioffe12a36072019-10-23 20:11:32 +0100477 return {};
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800478}
479
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100480// Stops given services, waits for them to be stopped for |timeout| ms.
481// If terminate is true, then SIGTERM is sent to services, otherwise SIGKILL is sent.
482static void StopServices(const std::vector<Service*>& services, std::chrono::milliseconds timeout,
483 bool terminate) {
484 LOG(INFO) << "Stopping " << services.size() << " services by sending "
485 << (terminate ? "SIGTERM" : "SIGKILL");
486 std::vector<pid_t> pids;
487 pids.reserve(services.size());
488 for (const auto& s : services) {
489 if (s->pid() > 0) {
490 pids.push_back(s->pid());
491 }
492 if (terminate) {
493 s->Terminate();
494 } else {
495 s->Stop();
496 }
497 }
498 if (timeout > 0ms) {
499 WaitToBeReaped(pids, timeout);
500 } else {
501 // Even if we don't to wait for services to stop, we still optimistically reap zombies.
502 ReapAnyOutstandingChildren();
503 }
504}
505
506// Like StopServices, but also logs all the services that failed to stop after the provided timeout.
507// Returns number of violators.
508static int StopServicesAndLogViolations(const std::vector<Service*>& services,
509 std::chrono::milliseconds timeout, bool terminate) {
510 StopServices(services, timeout, terminate);
511 int still_running = 0;
512 for (const auto& s : services) {
513 if (s->IsRunning()) {
514 LOG(ERROR) << "[service-misbehaving] : service '" << s->name() << "' is still running "
515 << timeout.count() << "ms after receiving "
516 << (terminate ? "SIGTERM" : "SIGKILL");
517 still_running++;
518 }
519 }
520 return still_running;
521}
522
Tom Cherry44aceed2018-08-03 13:36:18 -0700523//* Reboot / shutdown the system.
524// cmd ANDROID_RB_* as defined in android_reboot.h
525// reason Reason string like "reboot", "shutdown,userrequested"
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100526// reboot_target Reboot target string like "bootloader". Otherwise, it should be an empty string.
527// run_fsck Whether to run fsck after umount is done.
Tom Cherry44aceed2018-08-03 13:36:18 -0700528//
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100529static void DoReboot(unsigned int cmd, const std::string& reason, const std::string& reboot_target,
530 bool run_fsck) {
Keun-young Park8d01f632017-03-13 11:54:47 -0700531 Timer t;
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100532 LOG(INFO) << "Reboot start, reason: " << reason << ", reboot_target: " << reboot_target;
Tom Cherry0a72e6c2018-03-19 16:19:01 -0700533
Tom Cherry2436e6b2019-09-19 11:16:19 -0700534 // If /data isn't mounted then we can skip the extra reboot steps below, since we don't need to
535 // worry about unmounting it.
536 if (!IsDataMounted()) {
537 sync();
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100538 RebootSystem(cmd, reboot_target);
Tom Cherry2436e6b2019-09-19 11:16:19 -0700539 abort();
540 }
541
Tom Cherry0a72e6c2018-03-19 16:19:01 -0700542 // Ensure last reboot reason is reduced to canonical
543 // alias reported in bootloader or system boot reason.
544 size_t skip = 0;
545 std::vector<std::string> reasons = Split(reason, ",");
546 if (reasons.size() >= 2 && reasons[0] == "reboot" &&
547 (reasons[1] == "recovery" || reasons[1] == "bootloader" || reasons[1] == "cold" ||
548 reasons[1] == "hard" || reasons[1] == "warm")) {
549 skip = strlen("reboot,");
550 }
551 property_set(LAST_REBOOT_REASON_PROPERTY, reason.c_str() + skip);
552 sync();
553
554 bool is_thermal_shutdown = cmd == ANDROID_RB_THERMOFF;
555
556 auto shutdown_timeout = 0ms;
557 if (!SHUTDOWN_ZERO_TIMEOUT) {
Wei Wangb5de0882018-10-09 12:42:06 -0700558 constexpr unsigned int shutdown_timeout_default = 6;
559 constexpr unsigned int max_thermal_shutdown_timeout = 3;
560 auto shutdown_timeout_final = android::base::GetUintProperty("ro.build.shutdown_timeout",
561 shutdown_timeout_default);
562 if (is_thermal_shutdown && shutdown_timeout_final > max_thermal_shutdown_timeout) {
563 shutdown_timeout_final = max_thermal_shutdown_timeout;
Tom Cherry0a72e6c2018-03-19 16:19:01 -0700564 }
Wei Wangb5de0882018-10-09 12:42:06 -0700565 shutdown_timeout = std::chrono::seconds(shutdown_timeout_final);
Tom Cherry0a72e6c2018-03-19 16:19:01 -0700566 }
567 LOG(INFO) << "Shutdown timeout: " << shutdown_timeout.count() << " ms";
568
josephjangaaddf282019-04-16 18:46:24 +0800569 sem_t reboot_semaphore;
570 if (sem_init(&reboot_semaphore, false, 0) == -1) {
571 // These should never fail, but if they do, skip the graceful reboot and reboot immediately.
572 LOG(ERROR) << "sem_init() fail and RebootSystem() return!";
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100573 RebootSystem(cmd, reboot_target);
josephjangaaddf282019-04-16 18:46:24 +0800574 }
575
576 // Start a thread to monitor init shutdown process
577 LOG(INFO) << "Create reboot monitor thread.";
578 bool reboot_monitor_run = true;
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100579 std::thread reboot_monitor_thread(&RebootMonitorThread, cmd, reboot_target, &reboot_semaphore,
josephjangaaddf282019-04-16 18:46:24 +0800580 shutdown_timeout, &reboot_monitor_run);
581 reboot_monitor_thread.detach();
582
583 // Start reboot monitor thread
584 sem_post(&reboot_semaphore);
585
Keun-young Park7830d592017-03-27 16:07:02 -0700586 // watchdogd is a vendor specific component but should be alive to complete shutdown safely.
Keun-young Parkcccb34f2017-07-05 11:38:44 -0700587 const std::set<std::string> to_starts{"watchdogd"};
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100588 std::vector<Service*> stop_first;
589 stop_first.reserve(ServiceList::GetInstance().services().size());
Tom Cherry911b9b12017-07-27 16:20:58 -0700590 for (const auto& s : ServiceList::GetInstance()) {
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100591 if (kDebuggingServices.count(s->name())) {
592 // keep debugging tools until non critical ones are all gone.
Keun-young Park7830d592017-03-27 16:07:02 -0700593 s->SetShutdownCritical();
594 } else if (to_starts.count(s->name())) {
Tom Cherry702ca9a2017-08-25 10:36:52 -0700595 if (auto result = s->Start(); !result) {
596 LOG(ERROR) << "Could not start shutdown 'to_start' service '" << s->name()
597 << "': " << result.error();
598 }
Keun-young Park7830d592017-03-27 16:07:02 -0700599 s->SetShutdownCritical();
Keun-young Parkcccb34f2017-07-05 11:38:44 -0700600 } else if (s->IsShutdownCritical()) {
Tom Cherry702ca9a2017-08-25 10:36:52 -0700601 // Start shutdown critical service if not started.
602 if (auto result = s->Start(); !result) {
603 LOG(ERROR) << "Could not start shutdown critical service '" << s->name()
604 << "': " << result.error();
605 }
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100606 } else {
607 stop_first.push_back(s.get());
Keun-young Park8d01f632017-03-13 11:54:47 -0700608 }
Tom Cherry911b9b12017-07-27 16:20:58 -0700609 }
Keun-young Park7830d592017-03-27 16:07:02 -0700610
Steven Morelandd5eccfd2018-01-19 13:01:53 -0800611 // remaining operations (specifically fsck) may take a substantial duration
Tom Cherry0a72e6c2018-03-19 16:19:01 -0700612 if (cmd == ANDROID_RB_POWEROFF || is_thermal_shutdown) {
Steven Morelandd5eccfd2018-01-19 13:01:53 -0800613 TurnOffBacklight();
614 }
615
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100616 Service* boot_anim = ServiceList::GetInstance().FindService("bootanim");
617 Service* surface_flinger = ServiceList::GetInstance().FindService("surfaceflinger");
618 if (boot_anim != nullptr && surface_flinger != nullptr && surface_flinger->IsRunning()) {
Tom Cherry4f4cacc2019-01-08 10:39:00 -0800619 bool do_shutdown_animation = GetBoolProperty("ro.init.shutdown_animation", false);
620
621 if (do_shutdown_animation) {
622 property_set("service.bootanim.exit", "0");
623 // Could be in the middle of animation. Stop and start so that it can pick
624 // up the right mode.
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100625 boot_anim->Stop();
Tom Cherry4f4cacc2019-01-08 10:39:00 -0800626 }
627
Tom Cherry911b9b12017-07-27 16:20:58 -0700628 for (const auto& service : ServiceList::GetInstance()) {
Tom Cherry4f4cacc2019-01-08 10:39:00 -0800629 if (service->classnames().count("animation") == 0) {
630 continue;
631 }
632
633 // start all animation classes if stopped.
634 if (do_shutdown_animation) {
Tom Cherry9949ec52019-05-16 16:54:49 -0700635 service->Start();
Tom Cherry4f4cacc2019-01-08 10:39:00 -0800636 }
637 service->SetShutdownCritical(); // will not check animation class separately
638 }
639
640 if (do_shutdown_animation) {
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100641 boot_anim->Start();
642 surface_flinger->SetShutdownCritical();
643 boot_anim->SetShutdownCritical();
Tom Cherry911b9b12017-07-27 16:20:58 -0700644 }
Keun-young Park8d01f632017-03-13 11:54:47 -0700645 }
Keun-young Park7830d592017-03-27 16:07:02 -0700646
Keun-young Park8d01f632017-03-13 11:54:47 -0700647 // optional shutdown step
648 // 1. terminate all services except shutdown critical ones. wait for delay to finish
Keun-young Park30173872017-07-18 10:58:28 -0700649 if (shutdown_timeout > 0ms) {
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100650 StopServicesAndLogViolations(stop_first, shutdown_timeout / 2, true /* SIGTERM */);
Keun-young Park8d01f632017-03-13 11:54:47 -0700651 }
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100652 // Send SIGKILL to ones that didn't terminate cleanly.
653 StopServicesAndLogViolations(stop_first, 0ms, false /* SIGKILL */);
Luis Hector Chavez92c49bc2018-07-27 11:19:25 -0700654 SubcontextTerminate();
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100655 // Reap subcontext pids.
Tom Cherryeeee8312017-07-28 15:22:23 -0700656 ReapAnyOutstandingChildren();
Keun-young Park8d01f632017-03-13 11:54:47 -0700657
658 // 3. send volume shutdown to vold
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100659 Service* vold_service = ServiceList::GetInstance().FindService("vold");
660 if (vold_service != nullptr && vold_service->IsRunning()) {
Keun-young Park8d01f632017-03-13 11:54:47 -0700661 ShutdownVold();
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100662 vold_service->Stop();
Keun-young Park8d01f632017-03-13 11:54:47 -0700663 } else {
664 LOG(INFO) << "vold not running, skipping vold shutdown";
665 }
Keun-young Park2ba5c812017-03-29 12:54:40 -0700666 // logcat stopped here
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100667 StopServices(GetDebuggingServices(false /* only_post_data */), 0ms, false /* SIGKILL */);
Keun-young Park8d01f632017-03-13 11:54:47 -0700668 // 4. sync, try umount, and optionally run fsck for user shutdown
Tom Cherry1f9d5402018-03-15 10:22:40 -0700669 {
670 Timer sync_timer;
671 LOG(INFO) << "sync() before umount...";
672 sync();
673 LOG(INFO) << "sync() before umount took" << sync_timer;
674 }
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800675 // 5. drop caches and disable zram backing device, if exist
676 KillZramBackingDevice();
677
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100678 UmountStat stat =
679 TryUmountAndFsck(cmd, run_fsck, shutdown_timeout - t.duration(), &reboot_semaphore);
Keun-young Park2ba5c812017-03-29 12:54:40 -0700680 // Follow what linux shutdown is doing: one more sync with little bit delay
Tom Cherry1f9d5402018-03-15 10:22:40 -0700681 {
682 Timer sync_timer;
683 LOG(INFO) << "sync() after umount...";
684 sync();
685 LOG(INFO) << "sync() after umount took" << sync_timer;
686 }
Tom Cherry0a72e6c2018-03-19 16:19:01 -0700687 if (!is_thermal_shutdown) std::this_thread::sleep_for(100ms);
Keun-young Park8d01f632017-03-13 11:54:47 -0700688 LogShutdownTime(stat, &t);
josephjangaaddf282019-04-16 18:46:24 +0800689
690 // Send signal to terminate reboot monitor thread.
691 reboot_monitor_run = false;
692 sem_post(&reboot_semaphore);
693
Keun-young Park8d01f632017-03-13 11:54:47 -0700694 // Reboot regardless of umount status. If umount fails, fsck after reboot will fix it.
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100695 RebootSystem(cmd, reboot_target);
Keun-young Park8d01f632017-03-13 11:54:47 -0700696 abort();
697}
Tom Cherry98ad32a2017-04-17 16:34:20 -0700698
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100699static void EnterShutdown() {
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100700 LOG(INFO) << "Entering shutdown mode";
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100701 shutting_down = true;
702 // Skip wait for prop if it is in progress
703 ResetWaitForProp();
704 // Clear EXEC flag if there is one pending
705 for (const auto& s : ServiceList::GetInstance()) {
706 s->UnSetExec();
707 }
708 // We no longer process messages about properties changing coming from property service, so we
709 // need to tell property service to stop sending us these messages, otherwise it'll fill the
710 // buffers and block indefinitely, causing future property sets, including those that init makes
711 // during shutdown in Service::NotifyStateChange() to also block indefinitely.
712 SendStopSendingMessagesMessage();
713}
714
715static void LeaveShutdown() {
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100716 LOG(INFO) << "Leaving shutdown mode";
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100717 shutting_down = false;
718 SendStartSendingMessagesMessage();
719}
720
Nikita Ioffeab91ee92019-11-06 21:40:31 +0000721static Result<void> UnmountAllApexes() {
722 const char* args[] = {"/system/bin/apexd", "--unmount-all"};
723 int status;
724 if (logwrap_fork_execvp(arraysize(args), args, &status, false, LOG_KLOG, true, nullptr) != 0) {
725 return ErrnoError() << "Failed to call '/system/bin/apexd --unmount-all'";
726 }
727 if (WIFEXITED(status) && WEXITSTATUS(status) == 0) {
728 return {};
729 }
730 return Error() << "'/system/bin/apexd --unmount-all' failed : " << status;
731}
732
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100733static Result<void> DoUserspaceReboot() {
734 LOG(INFO) << "Userspace reboot initiated";
Nikita Ioffec0df1872019-11-13 21:47:06 +0000735 boot_clock::time_point now = boot_clock::now();
736 property_set("sys.init.userspace_reboot.last_started",
737 std::to_string(now.time_since_epoch().count()));
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100738 auto guard = android::base::make_scope_guard([] {
739 // Leave shutdown so that we can handle a full reboot.
740 LeaveShutdown();
Tom Cherry18278d22019-11-12 16:21:20 -0800741 trigger_shutdown("reboot,abort-userspace-reboot");
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100742 });
Nikita Ioffec0df1872019-11-13 21:47:06 +0000743 // Triggering userspace-reboot-requested will result in a bunch of setprop
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100744 // actions. We should make sure, that all of them are propagated before
Nikita Ioffec0df1872019-11-13 21:47:06 +0000745 // proceeding with userspace reboot. Synchronously setting kUserspaceRebootInProgress property
746 // is not perfect, but it should do the trick.
Nikita Ioffe23dbd6d2019-11-14 01:21:24 +0000747 if (!android::sysprop::InitProperties::userspace_reboot_in_progress(true)) {
748 return Error() << "Failed to set sys.init.userspace_reboot.in_progress property";
Nikita Ioffec0df1872019-11-13 21:47:06 +0000749 }
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100750 EnterShutdown();
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100751 std::vector<Service*> stop_first;
752 // Remember the services that were enabled. We will need to manually enable them again otherwise
753 // triggers like class_start won't restart them.
754 std::vector<Service*> were_enabled;
755 stop_first.reserve(ServiceList::GetInstance().services().size());
756 for (const auto& s : ServiceList::GetInstance().services_in_shutdown_order()) {
757 if (s->is_post_data() && !kDebuggingServices.count(s->name())) {
758 stop_first.push_back(s);
759 }
760 if (s->is_post_data() && s->IsEnabled()) {
761 were_enabled.push_back(s);
762 }
763 }
Nikita Ioffe82a431e2019-11-07 15:37:38 +0000764 {
765 Timer sync_timer;
766 LOG(INFO) << "sync() before terminating services...";
767 sync();
768 LOG(INFO) << "sync() took " << sync_timer;
769 }
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100770 // TODO(b/135984674): do we need shutdown animation for userspace reboot?
771 // TODO(b/135984674): control userspace timeout via read-only property?
772 StopServicesAndLogViolations(stop_first, 10s, true /* SIGTERM */);
773 if (int r = StopServicesAndLogViolations(stop_first, 20s, false /* SIGKILL */); r > 0) {
774 // TODO(b/135984674): store information about offending services for debugging.
775 return Error() << r << " post-data services are still running";
776 }
Nikita Ioffe42697d32019-11-05 23:04:17 +0000777 // TODO(b/143970043): in case of ext4 we probably we will need to restart vold and kill zram
778 // backing device.
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100779 if (int r = StopServicesAndLogViolations(GetDebuggingServices(true /* only_post_data */), 5s,
780 false /* SIGKILL */);
781 r > 0) {
782 // TODO(b/135984674): store information about offending services for debugging.
783 return Error() << r << " debugging services are still running";
784 }
Nikita Ioffe82a431e2019-11-07 15:37:38 +0000785 {
786 Timer sync_timer;
787 LOG(INFO) << "sync() after stopping services...";
788 sync();
789 LOG(INFO) << "sync() took " << sync_timer;
790 }
Nikita Ioffeab91ee92019-11-06 21:40:31 +0000791 if (auto result = UnmountAllApexes(); !result) {
792 return result;
793 }
794 if (!SwitchToBootstrapMountNamespaceIfNeeded()) {
795 return Error() << "Failed to switch to bootstrap namespace";
796 }
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100797 // Re-enable services
798 for (const auto& s : were_enabled) {
799 LOG(INFO) << "Re-enabling service '" << s->name() << "'";
800 s->Enable();
801 }
802 LeaveShutdown();
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100803 ActionManager::GetInstance().QueueEventTrigger("userspace-reboot-resume");
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100804 guard.Disable(); // Go on with userspace reboot.
805 return {};
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100806}
807
Nikita Ioffe82a431e2019-11-07 15:37:38 +0000808static void UserspaceRebootWatchdogThread() {
809 if (!WaitForProperty("sys.init.userspace_reboot_in_progress", "1", 20s)) {
810 // TODO(b/135984674): should we reboot instead?
811 LOG(WARNING) << "Userspace reboot didn't start in 20 seconds. Stopping watchdog";
812 return;
813 }
814 LOG(INFO) << "Starting userspace reboot watchdog";
815 // TODO(b/135984674): this should be configured via a read-only sysprop.
816 std::chrono::milliseconds timeout = 60s;
817 if (!WaitForProperty("sys.boot_completed", "1", timeout)) {
818 LOG(ERROR) << "Failed to boot in " << timeout.count() << "ms. Switching to full reboot";
819 // In this case device is in a boot loop. Only way to recover is to do dirty reboot.
820 RebootSystem(ANDROID_RB_RESTART2, "userspace-reboot-watchdog-triggered");
821 }
822 LOG(INFO) << "Device booted, stopping userspace reboot watchdog";
823}
824
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100825static void HandleUserspaceReboot() {
Nikita Ioffe82a431e2019-11-07 15:37:38 +0000826 // Spinnig up a separate thread will fail the setns call later in the boot sequence.
827 // Fork a new process to monitor userspace reboot while we are investigating a better solution.
828 pid_t pid = fork();
829 if (pid < 0) {
830 PLOG(ERROR) << "Failed to fork process for userspace reboot watchdog. Switching to full "
831 << "reboot";
832 trigger_shutdown("reboot,userspace-reboot-failed-to-fork");
833 return;
834 }
835 if (pid == 0) {
836 // Child
837 UserspaceRebootWatchdogThread();
838 _exit(EXIT_SUCCESS);
839 }
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100840 LOG(INFO) << "Clearing queue and starting userspace-reboot-requested trigger";
841 auto& am = ActionManager::GetInstance();
842 am.ClearQueue();
843 am.QueueEventTrigger("userspace-reboot-requested");
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100844 auto handler = [](const BuiltinArguments&) { return DoUserspaceReboot(); };
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100845 am.QueueBuiltinAction(handler, "userspace-reboot");
846}
847
848void HandlePowerctlMessage(const std::string& command) {
Tom Cherry98ad32a2017-04-17 16:34:20 -0700849 unsigned int cmd = 0;
Mark Salyzyn62909822017-10-09 09:27:16 -0700850 std::vector<std::string> cmd_params = Split(command, ",");
Tom Cherry98ad32a2017-04-17 16:34:20 -0700851 std::string reboot_target = "";
852 bool run_fsck = false;
853 bool command_invalid = false;
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100854 bool userspace_reboot = false;
Tom Cherry98ad32a2017-04-17 16:34:20 -0700855
Mark Salyzynd7931f12019-07-10 10:33:09 -0700856 if (cmd_params[0] == "shutdown") {
Tom Cherry98ad32a2017-04-17 16:34:20 -0700857 cmd = ANDROID_RB_POWEROFF;
Mark Salyzynd7931f12019-07-10 10:33:09 -0700858 if (cmd_params.size() >= 2) {
Mark Salyzyn73e6b492017-08-14 15:56:53 -0700859 if (cmd_params[1] == "userrequested") {
860 // The shutdown reason is PowerManager.SHUTDOWN_USER_REQUESTED.
861 // Run fsck once the file system is remounted in read-only mode.
862 run_fsck = true;
863 } else if (cmd_params[1] == "thermal") {
Mark Salyzynbfd05b62017-09-26 11:10:12 -0700864 // Turn off sources of heat immediately.
865 TurnOffBacklight();
Mark Salyzyn73e6b492017-08-14 15:56:53 -0700866 // run_fsck is false to avoid delay
867 cmd = ANDROID_RB_THERMOFF;
868 }
Tom Cherry98ad32a2017-04-17 16:34:20 -0700869 }
870 } else if (cmd_params[0] == "reboot") {
871 cmd = ANDROID_RB_RESTART2;
872 if (cmd_params.size() >= 2) {
873 reboot_target = cmd_params[1];
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100874 if (reboot_target == "userspace") {
875 LOG(INFO) << "Userspace reboot requested";
876 userspace_reboot = true;
877 }
Hridya Valsaraju54258262018-09-19 21:14:18 -0700878 // adb reboot fastboot should boot into bootloader for devices not
879 // supporting logical partitions.
880 if (reboot_target == "fastboot" &&
Yifan Hong0e0f8182018-11-16 12:49:06 -0800881 !android::base::GetBoolProperty("ro.boot.dynamic_partitions", false)) {
Hridya Valsaraju54258262018-09-19 21:14:18 -0700882 reboot_target = "bootloader";
883 }
Tom Cherry98ad32a2017-04-17 16:34:20 -0700884 // When rebooting to the bootloader notify the bootloader writing
885 // also the BCB.
886 if (reboot_target == "bootloader") {
887 std::string err;
888 if (!write_reboot_bootloader(&err)) {
889 LOG(ERROR) << "reboot-bootloader: Error writing "
890 "bootloader_message: "
891 << err;
892 }
Tianjie Xu5e98b632019-07-18 12:48:28 -0700893 } else if (reboot_target == "recovery") {
894 bootloader_message boot = {};
895 if (std::string err; !read_bootloader_message(&boot, &err)) {
896 LOG(ERROR) << "Failed to read bootloader message: " << err;
897 }
898 // Update the boot command field if it's empty, and preserve
899 // the other arguments in the bootloader message.
900 if (boot.command[0] == '\0') {
901 strlcpy(boot.command, "boot-recovery", sizeof(boot.command));
902 if (std::string err; !write_bootloader_message(boot, &err)) {
903 LOG(ERROR) << "Failed to set bootloader message: " << err;
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100904 return;
Tianjie Xu5e98b632019-07-18 12:48:28 -0700905 }
906 }
Hridya Valsaraju71fb82a2018-08-02 15:02:06 -0700907 } else if (reboot_target == "sideload" || reboot_target == "sideload-auto-reboot" ||
908 reboot_target == "fastboot") {
909 std::string arg = reboot_target == "sideload-auto-reboot" ? "sideload_auto_reboot"
910 : reboot_target;
911 const std::vector<std::string> options = {
912 "--" + arg,
913 };
914 std::string err;
915 if (!write_bootloader_message(options, &err)) {
916 LOG(ERROR) << "Failed to set bootloader message: " << err;
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100917 return;
Hridya Valsaraju71fb82a2018-08-02 15:02:06 -0700918 }
919 reboot_target = "recovery";
Tom Cherry98ad32a2017-04-17 16:34:20 -0700920 }
Hridya Valsaraju71fb82a2018-08-02 15:02:06 -0700921
Mark Salyzynd7931f12019-07-10 10:33:09 -0700922 // If there are additional parameter, pass them along
923 for (size_t i = 2; (cmd_params.size() > i) && cmd_params[i].size(); ++i) {
924 reboot_target += "," + cmd_params[i];
Tom Cherry98ad32a2017-04-17 16:34:20 -0700925 }
926 }
Tom Cherry98ad32a2017-04-17 16:34:20 -0700927 } else {
928 command_invalid = true;
929 }
930 if (command_invalid) {
931 LOG(ERROR) << "powerctl: unrecognized command '" << command << "'";
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100932 return;
933 }
934
935 if (userspace_reboot) {
936 HandleUserspaceReboot();
937 return;
Tom Cherry98ad32a2017-04-17 16:34:20 -0700938 }
939
Wei Wangeeab4912017-06-27 22:08:45 -0700940 LOG(INFO) << "Clear action queue and start shutdown trigger";
941 ActionManager::GetInstance().ClearQueue();
942 // Queue shutdown trigger first
943 ActionManager::GetInstance().QueueEventTrigger("shutdown");
944 // Queue built-in shutdown_done
Tom Cherrycb0f9bb2017-09-12 15:58:47 -0700945 auto shutdown_handler = [cmd, command, reboot_target, run_fsck](const BuiltinArguments&) {
Wei Wangeeab4912017-06-27 22:08:45 -0700946 DoReboot(cmd, command, reboot_target, run_fsck);
Tom Cherrybbcbc2f2019-06-10 11:08:01 -0700947 return Result<void>{};
Wei Wangeeab4912017-06-27 22:08:45 -0700948 };
949 ActionManager::GetInstance().QueueBuiltinAction(shutdown_handler, "shutdown_done");
950
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100951 EnterShutdown();
952}
Wei Wangeeab4912017-06-27 22:08:45 -0700953
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100954bool IsShuttingDown() {
955 return shutting_down;
Tom Cherry98ad32a2017-04-17 16:34:20 -0700956}
Tom Cherry81f5d3e2017-06-22 12:53:17 -0700957
958} // namespace init
959} // namespace android