blob: 72f0450da318e6035861f546929352de87465a16 [file] [log] [blame]
Keun-young Park8d01f632017-03-13 11:54:47 -07001/*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Tom Cherry3f5eaae52017-04-06 16:30:22 -070016
17#include "reboot.h"
18
Keun-young Park8d01f632017-03-13 11:54:47 -070019#include <dirent.h>
20#include <fcntl.h>
Keun-young Park2ba5c812017-03-29 12:54:40 -070021#include <linux/fs.h>
Jaegeuk Kim2aedc822018-11-20 13:27:06 -080022#include <linux/loop.h>
josephjangaaddf282019-04-16 18:46:24 +080023#include <mntent.h>
24#include <semaphore.h>
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +010025#include <stdlib.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070026#include <sys/cdefs.h>
Keun-young Park2ba5c812017-03-29 12:54:40 -070027#include <sys/ioctl.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070028#include <sys/mount.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070029#include <sys/stat.h>
josephjangaaddf282019-04-16 18:46:24 +080030#include <sys/swap.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070031#include <sys/syscall.h>
32#include <sys/types.h>
33#include <sys/wait.h>
34
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +010035#include <chrono>
Keun-young Park8d01f632017-03-13 11:54:47 -070036#include <memory>
Keun-young Park7830d592017-03-27 16:07:02 -070037#include <set>
Keun-young Park8d01f632017-03-13 11:54:47 -070038#include <thread>
39#include <vector>
40
Nikita Ioffe23dbd6d2019-11-14 01:21:24 +000041#include <InitProperties.sysprop.h>
Tom Cherryede0d532017-07-06 14:20:11 -070042#include <android-base/chrono_utils.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070043#include <android-base/file.h>
Tom Cherry3f5eaae52017-04-06 16:30:22 -070044#include <android-base/logging.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070045#include <android-base/macros.h>
Tom Cherryccf23532017-03-28 16:40:41 -070046#include <android-base/properties.h>
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +010047#include <android-base/scopeguard.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070048#include <android-base/strings.h>
Keun-young Park2ba5c812017-03-29 12:54:40 -070049#include <android-base/unique_fd.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070050#include <bootloader_message/bootloader_message.h>
51#include <cutils/android_reboot.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070052#include <fs_mgr.h>
53#include <logwrap/logwrap.h>
Todd Poynorfc827be2017-04-13 15:17:24 -070054#include <private/android_filesystem_config.h>
Tom Cherry0c8d6d22017-08-10 12:22:44 -070055#include <selinux/selinux.h>
Keun-young Park8d01f632017-03-13 11:54:47 -070056
Nikita Ioffeba6968e2019-10-07 16:26:33 +010057#include "action.h"
Tom Cherry7fd3bc22018-02-13 15:36:14 -080058#include "action_manager.h"
Nikita Ioffeba6968e2019-10-07 16:26:33 +010059#include "builtin_arguments.h"
Wei Wangeeab4912017-06-27 22:08:45 -070060#include "init.h"
Nikita Ioffeab91ee92019-11-06 21:40:31 +000061#include "mount_namespace.h"
Tom Cherry0c19d6c2020-03-12 14:29:25 -070062#include "property_service.h"
Tom Cherry44aceed2018-08-03 13:36:18 -070063#include "reboot_utils.h"
Keun-young Park8d01f632017-03-13 11:54:47 -070064#include "service.h"
Tom Cherry2aeb1ad2019-06-26 10:46:20 -070065#include "service_list.h"
Luis Hector Chavez9f97f472017-09-06 13:43:57 -070066#include "sigchld_handler.h"
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +010067#include "util.h"
Keun-young Park8d01f632017-03-13 11:54:47 -070068
josephjangaaddf282019-04-16 18:46:24 +080069#define PROC_SYSRQ "/proc/sysrq-trigger"
70
Tom Cherry2436e6b2019-09-19 11:16:19 -070071using namespace std::literals;
72
Nikita Ioffec0df1872019-11-13 21:47:06 +000073using android::base::boot_clock;
Tom Cherry4f4cacc2019-01-08 10:39:00 -080074using android::base::GetBoolProperty;
Nikita Ioffef0ab5b12020-03-25 00:06:51 +000075using android::base::GetUintProperty;
Nikita Ioffec0df1872019-11-13 21:47:06 +000076using android::base::SetProperty;
Mark Salyzyn62909822017-10-09 09:27:16 -070077using android::base::Split;
Tom Cherryede0d532017-07-06 14:20:11 -070078using android::base::Timer;
Jaegeuk Kim2aedc822018-11-20 13:27:06 -080079using android::base::unique_fd;
Nikita Ioffec0df1872019-11-13 21:47:06 +000080using android::base::WaitForProperty;
josephjangaaddf282019-04-16 18:46:24 +080081using android::base::WriteStringToFile;
Keun-young Park8d01f632017-03-13 11:54:47 -070082
Tom Cherry81f5d3e2017-06-22 12:53:17 -070083namespace android {
84namespace init {
85
Nikita Ioffeba6968e2019-10-07 16:26:33 +010086static bool shutting_down = false;
87
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +010088static const std::set<std::string> kDebuggingServices{"tombstoned", "logd", "adbd", "console"};
89
Tom Cherry01882742020-03-10 09:08:02 -070090static std::vector<Service*> GetDebuggingServices(bool only_post_data) {
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +010091 std::vector<Service*> ret;
92 ret.reserve(kDebuggingServices.size());
93 for (const auto& s : ServiceList::GetInstance()) {
94 if (kDebuggingServices.count(s->name()) && (!only_post_data || s->is_post_data())) {
95 ret.push_back(s.get());
96 }
97 }
98 return ret;
99}
100
Nikita Ioffedffbb4f2020-02-26 15:18:56 +0000101static void PersistRebootReason(const char* reason, bool write_to_property) {
102 if (write_to_property) {
103 SetProperty(LAST_REBOOT_REASON_PROPERTY, reason);
104 }
Tom Cherry62882122020-03-31 16:31:37 -0700105 auto fd = unique_fd(TEMP_FAILURE_RETRY(open(
106 LAST_REBOOT_REASON_FILE, O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC | O_BINARY, 0666)));
107 if (!fd.ok()) {
108 PLOG(ERROR) << "Could not open '" << LAST_REBOOT_REASON_FILE
109 << "' to persist reboot reason";
110 return;
111 }
112 WriteStringToFd(reason, fd);
113 fsync(fd.get());
Nikita Ioffed0bc0b62020-02-19 16:21:11 +0000114}
115
Keun-young Park8d01f632017-03-13 11:54:47 -0700116// represents umount status during reboot / shutdown.
117enum UmountStat {
118 /* umount succeeded. */
119 UMOUNT_STAT_SUCCESS = 0,
120 /* umount was not run. */
121 UMOUNT_STAT_SKIPPED = 1,
122 /* umount failed with timeout. */
123 UMOUNT_STAT_TIMEOUT = 2,
124 /* could not run due to error */
125 UMOUNT_STAT_ERROR = 3,
126 /* not used by init but reserved for other part to use this to represent the
127 the state where umount status before reboot is not found / available. */
128 UMOUNT_STAT_NOT_AVAILABLE = 4,
129};
130
131// Utility for struct mntent
132class MountEntry {
133 public:
Keun-young Park2ba5c812017-03-29 12:54:40 -0700134 explicit MountEntry(const mntent& entry)
Keun-young Park8d01f632017-03-13 11:54:47 -0700135 : mnt_fsname_(entry.mnt_fsname),
136 mnt_dir_(entry.mnt_dir),
137 mnt_type_(entry.mnt_type),
Keun-young Park2ba5c812017-03-29 12:54:40 -0700138 mnt_opts_(entry.mnt_opts) {}
Keun-young Park8d01f632017-03-13 11:54:47 -0700139
Jaegeuk Kim0f04f722017-09-25 10:55:39 -0700140 bool Umount(bool force) {
Tom Cherryc9fec9d2018-02-15 14:26:58 -0800141 LOG(INFO) << "Unmounting " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_;
Jaegeuk Kim0f04f722017-09-25 10:55:39 -0700142 int r = umount2(mnt_dir_.c_str(), force ? MNT_FORCE : 0);
Keun-young Park2ba5c812017-03-29 12:54:40 -0700143 if (r == 0) {
Tom Cherryc9fec9d2018-02-15 14:26:58 -0800144 LOG(INFO) << "Umounted " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_;
Keun-young Park2ba5c812017-03-29 12:54:40 -0700145 return true;
146 } else {
Tom Cherryc9fec9d2018-02-15 14:26:58 -0800147 PLOG(WARNING) << "Cannot umount " << mnt_fsname_ << ":" << mnt_dir_ << " opts "
Keun-young Park2ba5c812017-03-29 12:54:40 -0700148 << mnt_opts_;
149 return false;
150 }
151 }
Keun-young Park8d01f632017-03-13 11:54:47 -0700152
Keun-young Park2ba5c812017-03-29 12:54:40 -0700153 void DoFsck() {
154 int st;
155 if (IsF2Fs()) {
156 const char* f2fs_argv[] = {
Randall Huangdf2faa42019-01-15 15:00:56 +0800157 "/system/bin/fsck.f2fs",
158 "-a",
159 mnt_fsname_.c_str(),
Keun-young Park2ba5c812017-03-29 12:54:40 -0700160 };
Tom Cherry3a803eb2019-09-25 16:23:50 -0700161 logwrap_fork_execvp(arraysize(f2fs_argv), f2fs_argv, &st, false, LOG_KLOG, true,
162 nullptr);
Keun-young Park2ba5c812017-03-29 12:54:40 -0700163 } else if (IsExt4()) {
164 const char* ext4_argv[] = {
Randall Huangdf2faa42019-01-15 15:00:56 +0800165 "/system/bin/e2fsck",
166 "-y",
167 mnt_fsname_.c_str(),
Keun-young Park2ba5c812017-03-29 12:54:40 -0700168 };
Tom Cherry3a803eb2019-09-25 16:23:50 -0700169 logwrap_fork_execvp(arraysize(ext4_argv), ext4_argv, &st, false, LOG_KLOG, true,
170 nullptr);
Keun-young Park2ba5c812017-03-29 12:54:40 -0700171 }
172 }
Keun-young Park8d01f632017-03-13 11:54:47 -0700173
174 static bool IsBlockDevice(const struct mntent& mntent) {
175 return android::base::StartsWith(mntent.mnt_fsname, "/dev/block");
176 }
177
178 static bool IsEmulatedDevice(const struct mntent& mntent) {
Keun-young Park2ba5c812017-03-29 12:54:40 -0700179 return android::base::StartsWith(mntent.mnt_fsname, "/data/");
Keun-young Park8d01f632017-03-13 11:54:47 -0700180 }
181
182 private:
Keun-young Park2ba5c812017-03-29 12:54:40 -0700183 bool IsF2Fs() const { return mnt_type_ == "f2fs"; }
184
185 bool IsExt4() const { return mnt_type_ == "ext4"; }
186
Keun-young Park8d01f632017-03-13 11:54:47 -0700187 std::string mnt_fsname_;
188 std::string mnt_dir_;
189 std::string mnt_type_;
Keun-young Park2ba5c812017-03-29 12:54:40 -0700190 std::string mnt_opts_;
Keun-young Park8d01f632017-03-13 11:54:47 -0700191};
192
193// Turn off backlight while we are performing power down cleanup activities.
Tom Cherry01882742020-03-10 09:08:02 -0700194static void TurnOffBacklight() {
Steven Morelandd5eccfd2018-01-19 13:01:53 -0800195 Service* service = ServiceList::GetInstance().FindService("blank_screen");
196 if (service == nullptr) {
197 LOG(WARNING) << "cannot find blank_screen in TurnOffBacklight";
Keun-young Park8d01f632017-03-13 11:54:47 -0700198 return;
199 }
Bernie Innocenticecebbb2020-02-06 03:49:33 +0900200 if (auto result = service->Start(); !result.ok()) {
Tom Cherryd9872642018-10-11 10:38:05 -0700201 LOG(WARNING) << "Could not start blank_screen service: " << result.error();
202 }
Keun-young Park8d01f632017-03-13 11:54:47 -0700203}
204
Nikita Ioffebee7b8c2019-12-02 11:51:39 +0000205static Result<void> CallVdc(const std::string& system, const std::string& cmd) {
Nikita Ioffea840d402020-04-16 21:37:03 +0100206 LOG(INFO) << "Calling /system/bin/vdc " << system << " " << cmd;
Nikita Ioffebee7b8c2019-12-02 11:51:39 +0000207 const char* vdc_argv[] = {"/system/bin/vdc", system.c_str(), cmd.c_str()};
Keun-young Park8d01f632017-03-13 11:54:47 -0700208 int status;
Nikita Ioffe12a36072019-10-23 20:11:32 +0100209 if (logwrap_fork_execvp(arraysize(vdc_argv), vdc_argv, &status, false, LOG_KLOG, true,
210 nullptr) != 0) {
Nikita Ioffebee7b8c2019-12-02 11:51:39 +0000211 return ErrnoError() << "Failed to call '/system/bin/vdc " << system << " " << cmd << "'";
Nikita Ioffe12a36072019-10-23 20:11:32 +0100212 }
213 if (WIFEXITED(status) && WEXITSTATUS(status) == 0) {
214 return {};
215 }
Nikita Ioffebee7b8c2019-12-02 11:51:39 +0000216 return Error() << "'/system/bin/vdc " << system << " " << cmd << "' failed : " << status;
Keun-young Park8d01f632017-03-13 11:54:47 -0700217}
218
219static void LogShutdownTime(UmountStat stat, Timer* t) {
Tom Cherryede0d532017-07-06 14:20:11 -0700220 LOG(WARNING) << "powerctl_shutdown_time_ms:" << std::to_string(t->duration().count()) << ":"
221 << stat;
Keun-young Park8d01f632017-03-13 11:54:47 -0700222}
223
Tom Cherry2436e6b2019-09-19 11:16:19 -0700224static bool IsDataMounted() {
225 std::unique_ptr<std::FILE, int (*)(std::FILE*)> fp(setmntent("/proc/mounts", "re"), endmntent);
226 if (fp == nullptr) {
227 PLOG(ERROR) << "Failed to open /proc/mounts";
228 return false;
229 }
230 mntent* mentry;
231 while ((mentry = getmntent(fp.get())) != nullptr) {
232 if (mentry->mnt_dir == "/data"s) {
233 return true;
234 }
235 }
236 return false;
237}
238
239// Find all read+write block devices and emulated devices in /proc/mounts and add them to
240// the correpsponding list.
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100241static bool FindPartitionsToUmount(std::vector<MountEntry>* block_dev_partitions,
242 std::vector<MountEntry>* emulated_partitions, bool dump) {
Tom Cherryf274e782018-10-03 13:13:41 -0700243 std::unique_ptr<std::FILE, int (*)(std::FILE*)> fp(setmntent("/proc/mounts", "re"), endmntent);
Keun-young Park8d01f632017-03-13 11:54:47 -0700244 if (fp == nullptr) {
245 PLOG(ERROR) << "Failed to open /proc/mounts";
246 return false;
247 }
248 mntent* mentry;
249 while ((mentry = getmntent(fp.get())) != nullptr) {
Keun-young Park2ba5c812017-03-29 12:54:40 -0700250 if (dump) {
251 LOG(INFO) << "mount entry " << mentry->mnt_fsname << ":" << mentry->mnt_dir << " opts "
252 << mentry->mnt_opts << " type " << mentry->mnt_type;
253 } else if (MountEntry::IsBlockDevice(*mentry) && hasmntopt(mentry, "rw")) {
Keun-young Park6e12b382017-07-17 12:20:33 -0700254 std::string mount_dir(mentry->mnt_dir);
255 // These are R/O partitions changed to R/W after adb remount.
256 // Do not umount them as shutdown critical services may rely on them.
Wei Wanga01c27e2017-07-25 10:52:08 -0700257 if (mount_dir != "/" && mount_dir != "/system" && mount_dir != "/vendor" &&
258 mount_dir != "/oem") {
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100259 block_dev_partitions->emplace(block_dev_partitions->begin(), *mentry);
Keun-young Park6e12b382017-07-17 12:20:33 -0700260 }
Keun-young Park8d01f632017-03-13 11:54:47 -0700261 } else if (MountEntry::IsEmulatedDevice(*mentry)) {
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100262 emulated_partitions->emplace(emulated_partitions->begin(), *mentry);
Keun-young Park8d01f632017-03-13 11:54:47 -0700263 }
264 }
265 return true;
266}
267
Jonglin Lee28a2c922019-01-15 16:38:44 -0800268static void DumpUmountDebuggingInfo() {
Keun-young Park2ba5c812017-03-29 12:54:40 -0700269 int status;
270 if (!security_getenforce()) {
271 LOG(INFO) << "Run lsof";
272 const char* lsof_argv[] = {"/system/bin/lsof"};
Tom Cherry3a803eb2019-09-25 16:23:50 -0700273 logwrap_fork_execvp(arraysize(lsof_argv), lsof_argv, &status, false, LOG_KLOG, true,
274 nullptr);
Keun-young Park8d01f632017-03-13 11:54:47 -0700275 }
Keun-young Park2ba5c812017-03-29 12:54:40 -0700276 FindPartitionsToUmount(nullptr, nullptr, true);
Jonglin Lee28a2c922019-01-15 16:38:44 -0800277 // dump current CPU stack traces and uninterruptible tasks
josephjangaaddf282019-04-16 18:46:24 +0800278 WriteStringToFile("l", PROC_SYSRQ);
279 WriteStringToFile("w", PROC_SYSRQ);
Keun-young Park2ba5c812017-03-29 12:54:40 -0700280}
281
Tom Cherryede0d532017-07-06 14:20:11 -0700282static UmountStat UmountPartitions(std::chrono::milliseconds timeout) {
Keun-young Park2ba5c812017-03-29 12:54:40 -0700283 Timer t;
Keun-young Park2ba5c812017-03-29 12:54:40 -0700284 /* data partition needs all pending writes to be completed and all emulated partitions
285 * umounted.If the current waiting is not good enough, give
286 * up and leave it to e2fsck after reboot to fix it.
287 */
288 while (true) {
289 std::vector<MountEntry> block_devices;
290 std::vector<MountEntry> emulated_devices;
291 if (!FindPartitionsToUmount(&block_devices, &emulated_devices, false)) {
292 return UMOUNT_STAT_ERROR;
293 }
294 if (block_devices.size() == 0) {
Wei Wang8c00e422017-08-16 14:01:46 -0700295 return UMOUNT_STAT_SUCCESS;
Keun-young Park2ba5c812017-03-29 12:54:40 -0700296 }
Wei Wang8c00e422017-08-16 14:01:46 -0700297 bool unmount_done = true;
298 if (emulated_devices.size() > 0) {
Wei Wang25dc30f2017-10-23 15:32:03 -0700299 for (auto& entry : emulated_devices) {
300 if (!entry.Umount(false)) unmount_done = false;
301 }
Wei Wang8c00e422017-08-16 14:01:46 -0700302 if (unmount_done) {
303 sync();
304 }
Keun-young Park2ba5c812017-03-29 12:54:40 -0700305 }
Wei Wang25dc30f2017-10-23 15:32:03 -0700306 for (auto& entry : block_devices) {
307 if (!entry.Umount(timeout == 0ms)) unmount_done = false;
308 }
Wei Wang8c00e422017-08-16 14:01:46 -0700309 if (unmount_done) {
310 return UMOUNT_STAT_SUCCESS;
Keun-young Park2ba5c812017-03-29 12:54:40 -0700311 }
Wei Wang8c00e422017-08-16 14:01:46 -0700312 if ((timeout < t.duration())) { // try umount at least once
313 return UMOUNT_STAT_TIMEOUT;
Keun-young Park2ba5c812017-03-29 12:54:40 -0700314 }
Keun-young Park2ba5c812017-03-29 12:54:40 -0700315 std::this_thread::sleep_for(100ms);
316 }
Keun-young Park8d01f632017-03-13 11:54:47 -0700317}
318
josephjangaaddf282019-04-16 18:46:24 +0800319static void KillAllProcesses() {
320 WriteStringToFile("i", PROC_SYSRQ);
321}
322
323// Create reboot/shutdwon monitor thread
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100324void RebootMonitorThread(unsigned int cmd, const std::string& reboot_target,
325 sem_t* reboot_semaphore, std::chrono::milliseconds shutdown_timeout,
326 bool* reboot_monitor_run) {
josephjangaaddf282019-04-16 18:46:24 +0800327 unsigned int remaining_shutdown_time = 0;
328
Tom Cherry62882122020-03-31 16:31:37 -0700329 // 300 seconds more than the timeout passed to the thread as there is a final Umount pass
josephjangaaddf282019-04-16 18:46:24 +0800330 // after the timeout is reached.
Tom Cherry62882122020-03-31 16:31:37 -0700331 constexpr unsigned int shutdown_watchdog_timeout_default = 300;
josephjangaaddf282019-04-16 18:46:24 +0800332 auto shutdown_watchdog_timeout = android::base::GetUintProperty(
333 "ro.build.shutdown.watchdog.timeout", shutdown_watchdog_timeout_default);
334 remaining_shutdown_time = shutdown_watchdog_timeout + shutdown_timeout.count() / 1000;
335
336 while (*reboot_monitor_run == true) {
337 if (TEMP_FAILURE_RETRY(sem_wait(reboot_semaphore)) == -1) {
338 LOG(ERROR) << "sem_wait failed and exit RebootMonitorThread()";
339 return;
340 }
341
342 timespec shutdown_timeout_timespec;
343 if (clock_gettime(CLOCK_MONOTONIC, &shutdown_timeout_timespec) == -1) {
344 LOG(ERROR) << "clock_gettime() fail! exit RebootMonitorThread()";
345 return;
346 }
347
348 // If there are some remaining shutdown time left from previous round, we use
349 // remaining time here.
350 shutdown_timeout_timespec.tv_sec += remaining_shutdown_time;
351
352 LOG(INFO) << "shutdown_timeout_timespec.tv_sec: " << shutdown_timeout_timespec.tv_sec;
353
354 int sem_return = 0;
355 while ((sem_return = sem_timedwait_monotonic_np(reboot_semaphore,
356 &shutdown_timeout_timespec)) == -1 &&
357 errno == EINTR) {
358 }
359
360 if (sem_return == -1) {
361 LOG(ERROR) << "Reboot thread timed out";
362
363 if (android::base::GetBoolProperty("ro.debuggable", false) == true) {
Tom Cherry2436e6b2019-09-19 11:16:19 -0700364 if (false) {
365 // SEPolicy will block debuggerd from running and this is intentional.
366 // But these lines are left to be enabled during debugging.
367 LOG(INFO) << "Try to dump init process call trace:";
368 const char* vdc_argv[] = {"/system/bin/debuggerd", "-b", "1"};
369 int status;
Tom Cherry3a803eb2019-09-25 16:23:50 -0700370 logwrap_fork_execvp(arraysize(vdc_argv), vdc_argv, &status, false, LOG_KLOG,
371 true, nullptr);
Tom Cherry2436e6b2019-09-19 11:16:19 -0700372 }
josephjangaaddf282019-04-16 18:46:24 +0800373 LOG(INFO) << "Show stack for all active CPU:";
374 WriteStringToFile("l", PROC_SYSRQ);
375
376 LOG(INFO) << "Show tasks that are in disk sleep(uninterruptable sleep), which are "
377 "like "
378 "blocked in mutex or hardware register access:";
379 WriteStringToFile("w", PROC_SYSRQ);
380 }
381
382 // In shutdown case,notify kernel to sync and umount fs to read-only before shutdown.
383 if (cmd == ANDROID_RB_POWEROFF || cmd == ANDROID_RB_THERMOFF) {
384 WriteStringToFile("s", PROC_SYSRQ);
385
386 WriteStringToFile("u", PROC_SYSRQ);
387
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100388 RebootSystem(cmd, reboot_target);
josephjangaaddf282019-04-16 18:46:24 +0800389 }
390
391 LOG(ERROR) << "Trigger crash at last!";
392 WriteStringToFile("c", PROC_SYSRQ);
393 } else {
394 timespec current_time_timespec;
395
396 if (clock_gettime(CLOCK_MONOTONIC, &current_time_timespec) == -1) {
397 LOG(ERROR) << "clock_gettime() fail! exit RebootMonitorThread()";
398 return;
399 }
400
401 remaining_shutdown_time =
402 shutdown_timeout_timespec.tv_sec - current_time_timespec.tv_sec;
403
404 LOG(INFO) << "remaining_shutdown_time: " << remaining_shutdown_time;
405 }
406 }
407}
Keun-young Park3ee0df92017-03-27 11:21:09 -0700408
Keun-young Park8d01f632017-03-13 11:54:47 -0700409/* Try umounting all emulated file systems R/W block device cfile systems.
410 * This will just try umount and give it up if it fails.
411 * For fs like ext4, this is ok as file system will be marked as unclean shutdown
412 * and necessary check can be done at the next reboot.
413 * For safer shutdown, caller needs to make sure that
414 * all processes / emulated partition for the target fs are all cleaned-up.
415 *
416 * return true when umount was successful. false when timed out.
417 */
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100418static UmountStat TryUmountAndFsck(unsigned int cmd, bool run_fsck,
josephjangaaddf282019-04-16 18:46:24 +0800419 std::chrono::milliseconds timeout, sem_t* reboot_semaphore) {
Keun-young Park3ee0df92017-03-27 11:21:09 -0700420 Timer t;
Keun-young Park2ba5c812017-03-29 12:54:40 -0700421 std::vector<MountEntry> block_devices;
422 std::vector<MountEntry> emulated_devices;
Keun-young Park8d01f632017-03-13 11:54:47 -0700423
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100424 if (run_fsck && !FindPartitionsToUmount(&block_devices, &emulated_devices, false)) {
Keun-young Park8d01f632017-03-13 11:54:47 -0700425 return UMOUNT_STAT_ERROR;
426 }
Keun-young Park2ba5c812017-03-29 12:54:40 -0700427
Tom Cherryede0d532017-07-06 14:20:11 -0700428 UmountStat stat = UmountPartitions(timeout - t.duration());
Keun-young Park2ba5c812017-03-29 12:54:40 -0700429 if (stat != UMOUNT_STAT_SUCCESS) {
430 LOG(INFO) << "umount timeout, last resort, kill all and try";
Jonglin Lee28a2c922019-01-15 16:38:44 -0800431 if (DUMP_ON_UMOUNT_FAILURE) DumpUmountDebuggingInfo();
Keun-young Park3ee0df92017-03-27 11:21:09 -0700432 KillAllProcesses();
Keun-young Park2ba5c812017-03-29 12:54:40 -0700433 // even if it succeeds, still it is timeout and do not run fsck with all processes killed
Keun-young Parkc59b8222017-07-18 18:52:25 -0700434 UmountStat st = UmountPartitions(0ms);
Jonglin Lee28a2c922019-01-15 16:38:44 -0800435 if ((st != UMOUNT_STAT_SUCCESS) && DUMP_ON_UMOUNT_FAILURE) DumpUmountDebuggingInfo();
Keun-young Park8d01f632017-03-13 11:54:47 -0700436 }
437
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100438 if (stat == UMOUNT_STAT_SUCCESS && run_fsck) {
josephjangaaddf282019-04-16 18:46:24 +0800439 LOG(INFO) << "Pause reboot monitor thread before fsck";
440 sem_post(reboot_semaphore);
441
Keun-young Park2ba5c812017-03-29 12:54:40 -0700442 // fsck part is excluded from timeout check. It only runs for user initiated shutdown
443 // and should not affect reboot time.
444 for (auto& entry : block_devices) {
445 entry.DoFsck();
446 }
josephjangaaddf282019-04-16 18:46:24 +0800447
448 LOG(INFO) << "Resume reboot monitor thread after fsck";
449 sem_post(reboot_semaphore);
Keun-young Park2ba5c812017-03-29 12:54:40 -0700450 }
Keun-young Park8d01f632017-03-13 11:54:47 -0700451 return stat;
452}
453
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800454// zram is able to use backing device on top of a loopback device.
455// In order to unmount /data successfully, we have to kill the loopback device first
456#define ZRAM_DEVICE "/dev/block/zram0"
457#define ZRAM_RESET "/sys/block/zram0/reset"
458#define ZRAM_BACK_DEV "/sys/block/zram0/backing_dev"
Nikita Ioffe12a36072019-10-23 20:11:32 +0100459static Result<void> KillZramBackingDevice() {
Nikita Ioffea840d402020-04-16 21:37:03 +0100460 if (access(ZRAM_BACK_DEV, F_OK) != 0 && errno == ENOENT) {
461 LOG(INFO) << "No zram backing device configured";
462 return {};
463 }
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800464 std::string backing_dev;
Nikita Ioffea840d402020-04-16 21:37:03 +0100465 if (!android::base::ReadFileToString(ZRAM_BACK_DEV, &backing_dev)) {
466 return ErrnoError() << "Failed to read " << ZRAM_BACK_DEV;
467 }
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800468
469 // cut the last "\n"
470 backing_dev.erase(backing_dev.length() - 1);
471
472 // shutdown zram handle
473 Timer swap_timer;
474 LOG(INFO) << "swapoff() start...";
475 if (swapoff(ZRAM_DEVICE) == -1) {
Nikita Ioffe12a36072019-10-23 20:11:32 +0100476 return ErrnoError() << "zram_backing_dev: swapoff (" << backing_dev << ")"
477 << " failed";
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800478 }
479 LOG(INFO) << "swapoff() took " << swap_timer;;
480
josephjangaaddf282019-04-16 18:46:24 +0800481 if (!WriteStringToFile("1", ZRAM_RESET)) {
Nikita Ioffe12a36072019-10-23 20:11:32 +0100482 return Error() << "zram_backing_dev: reset (" << backing_dev << ")"
483 << " failed";
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800484 }
485
Nikita Ioffea840d402020-04-16 21:37:03 +0100486 if (!android::base::StartsWith(backing_dev, "/dev/block/loop")) {
487 LOG(INFO) << backing_dev << " is not a loop device. Exiting early";
488 return {};
489 }
490
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800491 // clear loopback device
492 unique_fd loop(TEMP_FAILURE_RETRY(open(backing_dev.c_str(), O_RDWR | O_CLOEXEC)));
493 if (loop.get() < 0) {
Nikita Ioffe12a36072019-10-23 20:11:32 +0100494 return ErrnoError() << "zram_backing_dev: open(" << backing_dev << ")"
495 << " failed";
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800496 }
497
498 if (ioctl(loop.get(), LOOP_CLR_FD, 0) < 0) {
Nikita Ioffe12a36072019-10-23 20:11:32 +0100499 return ErrnoError() << "zram_backing_dev: loop_clear (" << backing_dev << ")"
500 << " failed";
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800501 }
502 LOG(INFO) << "zram_backing_dev: `" << backing_dev << "` is cleared successfully.";
Nikita Ioffe12a36072019-10-23 20:11:32 +0100503 return {};
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800504}
505
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100506// Stops given services, waits for them to be stopped for |timeout| ms.
507// If terminate is true, then SIGTERM is sent to services, otherwise SIGKILL is sent.
508static void StopServices(const std::vector<Service*>& services, std::chrono::milliseconds timeout,
509 bool terminate) {
510 LOG(INFO) << "Stopping " << services.size() << " services by sending "
511 << (terminate ? "SIGTERM" : "SIGKILL");
512 std::vector<pid_t> pids;
513 pids.reserve(services.size());
514 for (const auto& s : services) {
515 if (s->pid() > 0) {
516 pids.push_back(s->pid());
517 }
518 if (terminate) {
519 s->Terminate();
520 } else {
521 s->Stop();
522 }
523 }
524 if (timeout > 0ms) {
525 WaitToBeReaped(pids, timeout);
526 } else {
527 // Even if we don't to wait for services to stop, we still optimistically reap zombies.
528 ReapAnyOutstandingChildren();
529 }
530}
531
532// Like StopServices, but also logs all the services that failed to stop after the provided timeout.
533// Returns number of violators.
534static int StopServicesAndLogViolations(const std::vector<Service*>& services,
535 std::chrono::milliseconds timeout, bool terminate) {
536 StopServices(services, timeout, terminate);
537 int still_running = 0;
538 for (const auto& s : services) {
539 if (s->IsRunning()) {
540 LOG(ERROR) << "[service-misbehaving] : service '" << s->name() << "' is still running "
541 << timeout.count() << "ms after receiving "
542 << (terminate ? "SIGTERM" : "SIGKILL");
543 still_running++;
544 }
545 }
546 return still_running;
547}
548
Tom Cherry44aceed2018-08-03 13:36:18 -0700549//* Reboot / shutdown the system.
550// cmd ANDROID_RB_* as defined in android_reboot.h
551// reason Reason string like "reboot", "shutdown,userrequested"
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100552// reboot_target Reboot target string like "bootloader". Otherwise, it should be an empty string.
553// run_fsck Whether to run fsck after umount is done.
Tom Cherry44aceed2018-08-03 13:36:18 -0700554//
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100555static void DoReboot(unsigned int cmd, const std::string& reason, const std::string& reboot_target,
556 bool run_fsck) {
Keun-young Park8d01f632017-03-13 11:54:47 -0700557 Timer t;
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100558 LOG(INFO) << "Reboot start, reason: " << reason << ", reboot_target: " << reboot_target;
Tom Cherry0a72e6c2018-03-19 16:19:01 -0700559
Tom Cherry0a72e6c2018-03-19 16:19:01 -0700560 bool is_thermal_shutdown = cmd == ANDROID_RB_THERMOFF;
561
562 auto shutdown_timeout = 0ms;
563 if (!SHUTDOWN_ZERO_TIMEOUT) {
Wei Wangb5de0882018-10-09 12:42:06 -0700564 constexpr unsigned int shutdown_timeout_default = 6;
565 constexpr unsigned int max_thermal_shutdown_timeout = 3;
566 auto shutdown_timeout_final = android::base::GetUintProperty("ro.build.shutdown_timeout",
567 shutdown_timeout_default);
568 if (is_thermal_shutdown && shutdown_timeout_final > max_thermal_shutdown_timeout) {
569 shutdown_timeout_final = max_thermal_shutdown_timeout;
Tom Cherry0a72e6c2018-03-19 16:19:01 -0700570 }
Wei Wangb5de0882018-10-09 12:42:06 -0700571 shutdown_timeout = std::chrono::seconds(shutdown_timeout_final);
Tom Cherry0a72e6c2018-03-19 16:19:01 -0700572 }
573 LOG(INFO) << "Shutdown timeout: " << shutdown_timeout.count() << " ms";
574
josephjangaaddf282019-04-16 18:46:24 +0800575 sem_t reboot_semaphore;
576 if (sem_init(&reboot_semaphore, false, 0) == -1) {
577 // These should never fail, but if they do, skip the graceful reboot and reboot immediately.
578 LOG(ERROR) << "sem_init() fail and RebootSystem() return!";
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100579 RebootSystem(cmd, reboot_target);
josephjangaaddf282019-04-16 18:46:24 +0800580 }
581
582 // Start a thread to monitor init shutdown process
583 LOG(INFO) << "Create reboot monitor thread.";
584 bool reboot_monitor_run = true;
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100585 std::thread reboot_monitor_thread(&RebootMonitorThread, cmd, reboot_target, &reboot_semaphore,
josephjangaaddf282019-04-16 18:46:24 +0800586 shutdown_timeout, &reboot_monitor_run);
587 reboot_monitor_thread.detach();
588
589 // Start reboot monitor thread
590 sem_post(&reboot_semaphore);
591
Tom Cherry62882122020-03-31 16:31:37 -0700592 // Ensure last reboot reason is reduced to canonical
593 // alias reported in bootloader or system boot reason.
594 size_t skip = 0;
595 std::vector<std::string> reasons = Split(reason, ",");
596 if (reasons.size() >= 2 && reasons[0] == "reboot" &&
597 (reasons[1] == "recovery" || reasons[1] == "bootloader" || reasons[1] == "cold" ||
598 reasons[1] == "hard" || reasons[1] == "warm")) {
599 skip = strlen("reboot,");
600 }
601 PersistRebootReason(reason.c_str() + skip, true);
602
603 // If /data isn't mounted then we can skip the extra reboot steps below, since we don't need to
604 // worry about unmounting it.
605 if (!IsDataMounted()) {
606 sync();
607 RebootSystem(cmd, reboot_target);
608 abort();
609 }
610
Keun-young Park7830d592017-03-27 16:07:02 -0700611 // watchdogd is a vendor specific component but should be alive to complete shutdown safely.
Keun-young Parkcccb34f2017-07-05 11:38:44 -0700612 const std::set<std::string> to_starts{"watchdogd"};
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100613 std::vector<Service*> stop_first;
614 stop_first.reserve(ServiceList::GetInstance().services().size());
Tom Cherry911b9b12017-07-27 16:20:58 -0700615 for (const auto& s : ServiceList::GetInstance()) {
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100616 if (kDebuggingServices.count(s->name())) {
617 // keep debugging tools until non critical ones are all gone.
Keun-young Park7830d592017-03-27 16:07:02 -0700618 s->SetShutdownCritical();
619 } else if (to_starts.count(s->name())) {
Bernie Innocenticecebbb2020-02-06 03:49:33 +0900620 if (auto result = s->Start(); !result.ok()) {
Tom Cherry702ca9a2017-08-25 10:36:52 -0700621 LOG(ERROR) << "Could not start shutdown 'to_start' service '" << s->name()
622 << "': " << result.error();
623 }
Keun-young Park7830d592017-03-27 16:07:02 -0700624 s->SetShutdownCritical();
Keun-young Parkcccb34f2017-07-05 11:38:44 -0700625 } else if (s->IsShutdownCritical()) {
Tom Cherry702ca9a2017-08-25 10:36:52 -0700626 // Start shutdown critical service if not started.
Bernie Innocenticecebbb2020-02-06 03:49:33 +0900627 if (auto result = s->Start(); !result.ok()) {
Tom Cherry702ca9a2017-08-25 10:36:52 -0700628 LOG(ERROR) << "Could not start shutdown critical service '" << s->name()
629 << "': " << result.error();
630 }
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100631 } else {
632 stop_first.push_back(s.get());
Keun-young Park8d01f632017-03-13 11:54:47 -0700633 }
Tom Cherry911b9b12017-07-27 16:20:58 -0700634 }
Keun-young Park7830d592017-03-27 16:07:02 -0700635
Steven Morelandd5eccfd2018-01-19 13:01:53 -0800636 // remaining operations (specifically fsck) may take a substantial duration
Tom Cherry0a72e6c2018-03-19 16:19:01 -0700637 if (cmd == ANDROID_RB_POWEROFF || is_thermal_shutdown) {
Steven Morelandd5eccfd2018-01-19 13:01:53 -0800638 TurnOffBacklight();
639 }
640
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100641 Service* boot_anim = ServiceList::GetInstance().FindService("bootanim");
642 Service* surface_flinger = ServiceList::GetInstance().FindService("surfaceflinger");
643 if (boot_anim != nullptr && surface_flinger != nullptr && surface_flinger->IsRunning()) {
Tom Cherry4f4cacc2019-01-08 10:39:00 -0800644 bool do_shutdown_animation = GetBoolProperty("ro.init.shutdown_animation", false);
645
646 if (do_shutdown_animation) {
Tom Cherryc88d8f92019-08-19 15:21:25 -0700647 SetProperty("service.bootanim.exit", "0");
Tom Cherry4f4cacc2019-01-08 10:39:00 -0800648 // Could be in the middle of animation. Stop and start so that it can pick
649 // up the right mode.
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100650 boot_anim->Stop();
Tom Cherry4f4cacc2019-01-08 10:39:00 -0800651 }
652
Tom Cherry911b9b12017-07-27 16:20:58 -0700653 for (const auto& service : ServiceList::GetInstance()) {
Tom Cherry4f4cacc2019-01-08 10:39:00 -0800654 if (service->classnames().count("animation") == 0) {
655 continue;
656 }
657
658 // start all animation classes if stopped.
659 if (do_shutdown_animation) {
Tom Cherry9949ec52019-05-16 16:54:49 -0700660 service->Start();
Tom Cherry4f4cacc2019-01-08 10:39:00 -0800661 }
662 service->SetShutdownCritical(); // will not check animation class separately
663 }
664
665 if (do_shutdown_animation) {
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100666 boot_anim->Start();
667 surface_flinger->SetShutdownCritical();
668 boot_anim->SetShutdownCritical();
Tom Cherry911b9b12017-07-27 16:20:58 -0700669 }
Keun-young Park8d01f632017-03-13 11:54:47 -0700670 }
Keun-young Park7830d592017-03-27 16:07:02 -0700671
Keun-young Park8d01f632017-03-13 11:54:47 -0700672 // optional shutdown step
673 // 1. terminate all services except shutdown critical ones. wait for delay to finish
Keun-young Park30173872017-07-18 10:58:28 -0700674 if (shutdown_timeout > 0ms) {
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100675 StopServicesAndLogViolations(stop_first, shutdown_timeout / 2, true /* SIGTERM */);
Keun-young Park8d01f632017-03-13 11:54:47 -0700676 }
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100677 // Send SIGKILL to ones that didn't terminate cleanly.
678 StopServicesAndLogViolations(stop_first, 0ms, false /* SIGKILL */);
Luis Hector Chavez92c49bc2018-07-27 11:19:25 -0700679 SubcontextTerminate();
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100680 // Reap subcontext pids.
Tom Cherryeeee8312017-07-28 15:22:23 -0700681 ReapAnyOutstandingChildren();
Keun-young Park8d01f632017-03-13 11:54:47 -0700682
683 // 3. send volume shutdown to vold
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100684 Service* vold_service = ServiceList::GetInstance().FindService("vold");
685 if (vold_service != nullptr && vold_service->IsRunning()) {
Nikita Ioffebee7b8c2019-12-02 11:51:39 +0000686 CallVdc("volume", "shutdown");
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100687 vold_service->Stop();
Keun-young Park8d01f632017-03-13 11:54:47 -0700688 } else {
689 LOG(INFO) << "vold not running, skipping vold shutdown";
690 }
Keun-young Park2ba5c812017-03-29 12:54:40 -0700691 // logcat stopped here
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100692 StopServices(GetDebuggingServices(false /* only_post_data */), 0ms, false /* SIGKILL */);
Keun-young Park8d01f632017-03-13 11:54:47 -0700693 // 4. sync, try umount, and optionally run fsck for user shutdown
Tom Cherry1f9d5402018-03-15 10:22:40 -0700694 {
695 Timer sync_timer;
696 LOG(INFO) << "sync() before umount...";
697 sync();
698 LOG(INFO) << "sync() before umount took" << sync_timer;
699 }
Jaegeuk Kim2aedc822018-11-20 13:27:06 -0800700 // 5. drop caches and disable zram backing device, if exist
701 KillZramBackingDevice();
702
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100703 UmountStat stat =
704 TryUmountAndFsck(cmd, run_fsck, shutdown_timeout - t.duration(), &reboot_semaphore);
Keun-young Park2ba5c812017-03-29 12:54:40 -0700705 // Follow what linux shutdown is doing: one more sync with little bit delay
Tom Cherry1f9d5402018-03-15 10:22:40 -0700706 {
707 Timer sync_timer;
708 LOG(INFO) << "sync() after umount...";
709 sync();
710 LOG(INFO) << "sync() after umount took" << sync_timer;
711 }
Tom Cherry0a72e6c2018-03-19 16:19:01 -0700712 if (!is_thermal_shutdown) std::this_thread::sleep_for(100ms);
Keun-young Park8d01f632017-03-13 11:54:47 -0700713 LogShutdownTime(stat, &t);
josephjangaaddf282019-04-16 18:46:24 +0800714
715 // Send signal to terminate reboot monitor thread.
716 reboot_monitor_run = false;
717 sem_post(&reboot_semaphore);
718
Keun-young Park8d01f632017-03-13 11:54:47 -0700719 // Reboot regardless of umount status. If umount fails, fsck after reboot will fix it.
Nikita Ioffee7ec8c82019-10-24 23:18:39 +0100720 RebootSystem(cmd, reboot_target);
Keun-young Park8d01f632017-03-13 11:54:47 -0700721 abort();
722}
Tom Cherry98ad32a2017-04-17 16:34:20 -0700723
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100724static void EnterShutdown() {
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100725 LOG(INFO) << "Entering shutdown mode";
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100726 shutting_down = true;
727 // Skip wait for prop if it is in progress
728 ResetWaitForProp();
729 // Clear EXEC flag if there is one pending
730 for (const auto& s : ServiceList::GetInstance()) {
731 s->UnSetExec();
732 }
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100733}
734
735static void LeaveShutdown() {
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100736 LOG(INFO) << "Leaving shutdown mode";
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100737 shutting_down = false;
Tom Cherry0c19d6c2020-03-12 14:29:25 -0700738 StartSendingMessages();
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100739}
740
Nikita Ioffeab91ee92019-11-06 21:40:31 +0000741static Result<void> UnmountAllApexes() {
742 const char* args[] = {"/system/bin/apexd", "--unmount-all"};
743 int status;
744 if (logwrap_fork_execvp(arraysize(args), args, &status, false, LOG_KLOG, true, nullptr) != 0) {
745 return ErrnoError() << "Failed to call '/system/bin/apexd --unmount-all'";
746 }
747 if (WIFEXITED(status) && WEXITSTATUS(status) == 0) {
748 return {};
749 }
750 return Error() << "'/system/bin/apexd --unmount-all' failed : " << status;
751}
752
Nikita Ioffef0ab5b12020-03-25 00:06:51 +0000753static std::chrono::milliseconds GetMillisProperty(const std::string& name,
754 std::chrono::milliseconds default_value) {
755 auto value = GetUintProperty(name, static_cast<uint64_t>(default_value.count()));
756 return std::chrono::milliseconds(std::move(value));
757}
758
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100759static Result<void> DoUserspaceReboot() {
760 LOG(INFO) << "Userspace reboot initiated";
761 auto guard = android::base::make_scope_guard([] {
762 // Leave shutdown so that we can handle a full reboot.
763 LeaveShutdown();
Nikita Ioffe4a787d92020-01-15 23:23:13 +0000764 trigger_shutdown("reboot,userspace_failed,shutdown_aborted");
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100765 });
Nikita Ioffec0df1872019-11-13 21:47:06 +0000766 // Triggering userspace-reboot-requested will result in a bunch of setprop
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100767 // actions. We should make sure, that all of them are propagated before
Nikita Ioffe764c1ac2020-01-27 17:14:46 +0000768 // proceeding with userspace reboot. Synchronously setting sys.init.userspace_reboot.in_progress
769 // property is not perfect, but it should do the trick.
Nikita Ioffe23dbd6d2019-11-14 01:21:24 +0000770 if (!android::sysprop::InitProperties::userspace_reboot_in_progress(true)) {
771 return Error() << "Failed to set sys.init.userspace_reboot.in_progress property";
Nikita Ioffec0df1872019-11-13 21:47:06 +0000772 }
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100773 EnterShutdown();
Nikita Ioffe764c1ac2020-01-27 17:14:46 +0000774 if (!SetProperty("sys.powerctl", "")) {
775 return Error() << "Failed to reset sys.powerctl property";
776 }
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100777 std::vector<Service*> stop_first;
778 // Remember the services that were enabled. We will need to manually enable them again otherwise
779 // triggers like class_start won't restart them.
780 std::vector<Service*> were_enabled;
781 stop_first.reserve(ServiceList::GetInstance().services().size());
782 for (const auto& s : ServiceList::GetInstance().services_in_shutdown_order()) {
783 if (s->is_post_data() && !kDebuggingServices.count(s->name())) {
784 stop_first.push_back(s);
785 }
786 if (s->is_post_data() && s->IsEnabled()) {
787 were_enabled.push_back(s);
788 }
789 }
Nikita Ioffe82a431e2019-11-07 15:37:38 +0000790 {
791 Timer sync_timer;
792 LOG(INFO) << "sync() before terminating services...";
793 sync();
794 LOG(INFO) << "sync() took " << sync_timer;
795 }
Nikita Ioffef0ab5b12020-03-25 00:06:51 +0000796 auto sigterm_timeout = GetMillisProperty("init.userspace_reboot.sigterm.timeoutmillis", 5s);
797 auto sigkill_timeout = GetMillisProperty("init.userspace_reboot.sigkill.timeoutmillis", 10s);
Nikita Ioffea840d402020-04-16 21:37:03 +0100798 LOG(INFO) << "Timeout to terminate services: " << sigterm_timeout.count() << "ms "
Nikita Ioffef0ab5b12020-03-25 00:06:51 +0000799 << "Timeout to kill services: " << sigkill_timeout.count() << "ms";
800 StopServicesAndLogViolations(stop_first, sigterm_timeout, true /* SIGTERM */);
801 if (int r = StopServicesAndLogViolations(stop_first, sigkill_timeout, false /* SIGKILL */);
802 r > 0) {
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100803 // TODO(b/135984674): store information about offending services for debugging.
804 return Error() << r << " post-data services are still running";
805 }
Bernie Innocenticecebbb2020-02-06 03:49:33 +0900806 if (auto result = KillZramBackingDevice(); !result.ok()) {
Nikita Ioffebee7b8c2019-12-02 11:51:39 +0000807 return result;
808 }
Bernie Innocenticecebbb2020-02-06 03:49:33 +0900809 if (auto result = CallVdc("volume", "reset"); !result.ok()) {
Nikita Ioffebee7b8c2019-12-02 11:51:39 +0000810 return result;
811 }
Nikita Ioffef0ab5b12020-03-25 00:06:51 +0000812 if (int r = StopServicesAndLogViolations(GetDebuggingServices(true /* only_post_data */),
813 sigkill_timeout, false /* SIGKILL */);
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100814 r > 0) {
815 // TODO(b/135984674): store information about offending services for debugging.
816 return Error() << r << " debugging services are still running";
817 }
Nikita Ioffe82a431e2019-11-07 15:37:38 +0000818 {
819 Timer sync_timer;
820 LOG(INFO) << "sync() after stopping services...";
821 sync();
822 LOG(INFO) << "sync() took " << sync_timer;
823 }
Bernie Innocenticecebbb2020-02-06 03:49:33 +0900824 if (auto result = UnmountAllApexes(); !result.ok()) {
Nikita Ioffeab91ee92019-11-06 21:40:31 +0000825 return result;
826 }
827 if (!SwitchToBootstrapMountNamespaceIfNeeded()) {
828 return Error() << "Failed to switch to bootstrap namespace";
829 }
Nikita Ioffe091c4d12019-12-05 12:35:19 +0000830 // Remove services that were defined in an APEX.
831 ServiceList::GetInstance().RemoveServiceIf([](const std::unique_ptr<Service>& s) -> bool {
832 if (s->is_from_apex()) {
833 LOG(INFO) << "Removing service '" << s->name() << "' because it's defined in an APEX";
834 return true;
835 }
836 return false;
837 });
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100838 // Re-enable services
839 for (const auto& s : were_enabled) {
840 LOG(INFO) << "Re-enabling service '" << s->name() << "'";
841 s->Enable();
842 }
Nikita Ioffe284d0cf2020-02-27 20:46:27 +0000843 ServiceList::GetInstance().ResetState();
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100844 LeaveShutdown();
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100845 ActionManager::GetInstance().QueueEventTrigger("userspace-reboot-resume");
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100846 guard.Disable(); // Go on with userspace reboot.
847 return {};
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100848}
849
Nikita Ioffe82a431e2019-11-07 15:37:38 +0000850static void UserspaceRebootWatchdogThread() {
Nikita Ioffe6236af32020-04-11 01:55:24 +0100851 auto started_timeout = GetMillisProperty("init.userspace_reboot.started.timeoutmillis", 10s);
852 if (!WaitForProperty("sys.init.userspace_reboot.in_progress", "1", started_timeout)) {
853 LOG(ERROR) << "Userspace reboot didn't start in " << started_timeout.count()
854 << "ms. Switching to full reboot";
855 // Init might be wedged, don't try to write reboot reason into a persistent property and do
856 // a dirty reboot.
857 PersistRebootReason("userspace_failed,watchdog_triggered,failed_to_start", false);
858 RebootSystem(ANDROID_RB_RESTART2, "userspace_failed,watchdog_triggered,failed_to_start");
Nikita Ioffe82a431e2019-11-07 15:37:38 +0000859 }
860 LOG(INFO) << "Starting userspace reboot watchdog";
Nikita Ioffe6236af32020-04-11 01:55:24 +0100861 auto watchdog_timeout = GetMillisProperty("init.userspace_reboot.watchdog.timeoutmillis", 5min);
862 LOG(INFO) << "UserspaceRebootWatchdog timeout: " << watchdog_timeout.count() << "ms";
863 if (!WaitForProperty("sys.boot_completed", "1", watchdog_timeout)) {
864 LOG(ERROR) << "Failed to boot in " << watchdog_timeout.count()
865 << "ms. Switching to full reboot";
Nikita Ioffe82a431e2019-11-07 15:37:38 +0000866 // In this case device is in a boot loop. Only way to recover is to do dirty reboot.
Nikita Ioffedffbb4f2020-02-26 15:18:56 +0000867 // Since init might be wedged, don't try to write reboot reason into a persistent property.
Nikita Ioffe6236af32020-04-11 01:55:24 +0100868 PersistRebootReason("userspace_failed,watchdog_triggered,failed_to_boot", false);
869 RebootSystem(ANDROID_RB_RESTART2, "userspace_failed,watchdog_triggered,failed_to_boot");
Nikita Ioffe82a431e2019-11-07 15:37:38 +0000870 }
871 LOG(INFO) << "Device booted, stopping userspace reboot watchdog";
872}
873
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100874static void HandleUserspaceReboot() {
Nikita Ioffe018ddd72019-12-20 16:34:48 +0000875 if (!android::sysprop::InitProperties::is_userspace_reboot_supported().value_or(false)) {
Nikita Ioffe9f473c02019-12-18 13:31:42 +0000876 LOG(ERROR) << "Attempted a userspace reboot on a device that doesn't support it";
877 return;
878 }
Nikita Ioffe82a431e2019-11-07 15:37:38 +0000879 // Spinnig up a separate thread will fail the setns call later in the boot sequence.
880 // Fork a new process to monitor userspace reboot while we are investigating a better solution.
881 pid_t pid = fork();
882 if (pid < 0) {
883 PLOG(ERROR) << "Failed to fork process for userspace reboot watchdog. Switching to full "
884 << "reboot";
Nikita Ioffe4a787d92020-01-15 23:23:13 +0000885 trigger_shutdown("reboot,userspace_failed,watchdog_fork");
Nikita Ioffe82a431e2019-11-07 15:37:38 +0000886 return;
887 }
888 if (pid == 0) {
889 // Child
890 UserspaceRebootWatchdogThread();
891 _exit(EXIT_SUCCESS);
892 }
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100893 LOG(INFO) << "Clearing queue and starting userspace-reboot-requested trigger";
894 auto& am = ActionManager::GetInstance();
895 am.ClearQueue();
896 am.QueueEventTrigger("userspace-reboot-requested");
Nikita Ioffe3f4b0d62019-10-09 15:23:02 +0100897 auto handler = [](const BuiltinArguments&) { return DoUserspaceReboot(); };
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100898 am.QueueBuiltinAction(handler, "userspace-reboot");
899}
900
Sam Protsenko2c7c3c72019-12-26 21:55:08 +0200901/**
902 * Check if "command" field is set in bootloader message.
903 *
904 * If "command" field is broken (contains non-printable characters prior to
905 * terminating zero), it will be zeroed.
906 *
907 * @param[in,out] boot Bootloader message (BCB) structure
908 * @return true if "command" field is already set, and false if it's empty
909 */
910static bool CommandIsPresent(bootloader_message* boot) {
911 if (boot->command[0] == '\0')
912 return false;
913
914 for (size_t i = 0; i < arraysize(boot->command); ++i) {
915 if (boot->command[i] == '\0')
916 return true;
917 if (!isprint(boot->command[i]))
918 break;
919 }
920
921 memset(boot->command, 0, sizeof(boot->command));
922 return false;
923}
924
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100925void HandlePowerctlMessage(const std::string& command) {
Tom Cherry98ad32a2017-04-17 16:34:20 -0700926 unsigned int cmd = 0;
Mark Salyzyn62909822017-10-09 09:27:16 -0700927 std::vector<std::string> cmd_params = Split(command, ",");
Tom Cherry98ad32a2017-04-17 16:34:20 -0700928 std::string reboot_target = "";
929 bool run_fsck = false;
930 bool command_invalid = false;
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100931 bool userspace_reboot = false;
Tom Cherry98ad32a2017-04-17 16:34:20 -0700932
Mark Salyzynd7931f12019-07-10 10:33:09 -0700933 if (cmd_params[0] == "shutdown") {
Tom Cherry98ad32a2017-04-17 16:34:20 -0700934 cmd = ANDROID_RB_POWEROFF;
Mark Salyzynd7931f12019-07-10 10:33:09 -0700935 if (cmd_params.size() >= 2) {
Mark Salyzyn73e6b492017-08-14 15:56:53 -0700936 if (cmd_params[1] == "userrequested") {
937 // The shutdown reason is PowerManager.SHUTDOWN_USER_REQUESTED.
938 // Run fsck once the file system is remounted in read-only mode.
939 run_fsck = true;
940 } else if (cmd_params[1] == "thermal") {
Mark Salyzynbfd05b62017-09-26 11:10:12 -0700941 // Turn off sources of heat immediately.
942 TurnOffBacklight();
Mark Salyzyn73e6b492017-08-14 15:56:53 -0700943 // run_fsck is false to avoid delay
944 cmd = ANDROID_RB_THERMOFF;
945 }
Tom Cherry98ad32a2017-04-17 16:34:20 -0700946 }
947 } else if (cmd_params[0] == "reboot") {
948 cmd = ANDROID_RB_RESTART2;
949 if (cmd_params.size() >= 2) {
950 reboot_target = cmd_params[1];
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100951 if (reboot_target == "userspace") {
952 LOG(INFO) << "Userspace reboot requested";
953 userspace_reboot = true;
954 }
Hridya Valsaraju54258262018-09-19 21:14:18 -0700955 // adb reboot fastboot should boot into bootloader for devices not
956 // supporting logical partitions.
957 if (reboot_target == "fastboot" &&
Yifan Hong0e0f8182018-11-16 12:49:06 -0800958 !android::base::GetBoolProperty("ro.boot.dynamic_partitions", false)) {
Hridya Valsaraju54258262018-09-19 21:14:18 -0700959 reboot_target = "bootloader";
960 }
Tom Cherry98ad32a2017-04-17 16:34:20 -0700961 // When rebooting to the bootloader notify the bootloader writing
962 // also the BCB.
963 if (reboot_target == "bootloader") {
964 std::string err;
965 if (!write_reboot_bootloader(&err)) {
966 LOG(ERROR) << "reboot-bootloader: Error writing "
967 "bootloader_message: "
968 << err;
969 }
Tianjie Xu5e98b632019-07-18 12:48:28 -0700970 } else if (reboot_target == "recovery") {
971 bootloader_message boot = {};
972 if (std::string err; !read_bootloader_message(&boot, &err)) {
973 LOG(ERROR) << "Failed to read bootloader message: " << err;
974 }
975 // Update the boot command field if it's empty, and preserve
976 // the other arguments in the bootloader message.
Sam Protsenko2c7c3c72019-12-26 21:55:08 +0200977 if (!CommandIsPresent(&boot)) {
Tianjie Xu5e98b632019-07-18 12:48:28 -0700978 strlcpy(boot.command, "boot-recovery", sizeof(boot.command));
979 if (std::string err; !write_bootloader_message(boot, &err)) {
980 LOG(ERROR) << "Failed to set bootloader message: " << err;
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100981 return;
Tianjie Xu5e98b632019-07-18 12:48:28 -0700982 }
983 }
Hridya Valsaraju71fb82a2018-08-02 15:02:06 -0700984 } else if (reboot_target == "sideload" || reboot_target == "sideload-auto-reboot" ||
985 reboot_target == "fastboot") {
986 std::string arg = reboot_target == "sideload-auto-reboot" ? "sideload_auto_reboot"
987 : reboot_target;
988 const std::vector<std::string> options = {
989 "--" + arg,
990 };
991 std::string err;
992 if (!write_bootloader_message(options, &err)) {
993 LOG(ERROR) << "Failed to set bootloader message: " << err;
Nikita Ioffeba6968e2019-10-07 16:26:33 +0100994 return;
Hridya Valsaraju71fb82a2018-08-02 15:02:06 -0700995 }
996 reboot_target = "recovery";
Tom Cherry98ad32a2017-04-17 16:34:20 -0700997 }
Hridya Valsaraju71fb82a2018-08-02 15:02:06 -0700998
Mark Salyzynd7931f12019-07-10 10:33:09 -0700999 // If there are additional parameter, pass them along
1000 for (size_t i = 2; (cmd_params.size() > i) && cmd_params[i].size(); ++i) {
1001 reboot_target += "," + cmd_params[i];
Tom Cherry98ad32a2017-04-17 16:34:20 -07001002 }
1003 }
Tom Cherry98ad32a2017-04-17 16:34:20 -07001004 } else {
1005 command_invalid = true;
1006 }
1007 if (command_invalid) {
1008 LOG(ERROR) << "powerctl: unrecognized command '" << command << "'";
Nikita Ioffeba6968e2019-10-07 16:26:33 +01001009 return;
1010 }
1011
Tom Cherry0c19d6c2020-03-12 14:29:25 -07001012 // We do not want to process any messages (queue'ing triggers, shutdown messages, control
1013 // messages, etc) from properties during reboot.
1014 StopSendingMessages();
1015
Nikita Ioffeba6968e2019-10-07 16:26:33 +01001016 if (userspace_reboot) {
1017 HandleUserspaceReboot();
1018 return;
Tom Cherry98ad32a2017-04-17 16:34:20 -07001019 }
1020
Wei Wangeeab4912017-06-27 22:08:45 -07001021 LOG(INFO) << "Clear action queue and start shutdown trigger";
1022 ActionManager::GetInstance().ClearQueue();
1023 // Queue shutdown trigger first
1024 ActionManager::GetInstance().QueueEventTrigger("shutdown");
1025 // Queue built-in shutdown_done
Tom Cherrycb0f9bb2017-09-12 15:58:47 -07001026 auto shutdown_handler = [cmd, command, reboot_target, run_fsck](const BuiltinArguments&) {
Wei Wangeeab4912017-06-27 22:08:45 -07001027 DoReboot(cmd, command, reboot_target, run_fsck);
Tom Cherrybbcbc2f2019-06-10 11:08:01 -07001028 return Result<void>{};
Wei Wangeeab4912017-06-27 22:08:45 -07001029 };
1030 ActionManager::GetInstance().QueueBuiltinAction(shutdown_handler, "shutdown_done");
1031
Nikita Ioffeba6968e2019-10-07 16:26:33 +01001032 EnterShutdown();
1033}
Wei Wangeeab4912017-06-27 22:08:45 -07001034
Nikita Ioffeba6968e2019-10-07 16:26:33 +01001035bool IsShuttingDown() {
1036 return shutting_down;
Tom Cherry98ad32a2017-04-17 16:34:20 -07001037}
Tom Cherry81f5d3e2017-06-22 12:53:17 -07001038
1039} // namespace init
1040} // namespace android