/* * Copyright (C) 2017 The Android Open Source Project * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "reboot.h" #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include "action.h" #include "action_manager.h" #include "builtin_arguments.h" #include "init.h" #include "mount_namespace.h" #include "reboot_utils.h" #include "service.h" #include "service_list.h" #include "sigchld_handler.h" #include "util.h" #define PROC_SYSRQ "/proc/sysrq-trigger" using namespace std::literals; using android::base::boot_clock; using android::base::GetBoolProperty; using android::base::SetProperty; using android::base::Split; using android::base::Timer; using android::base::unique_fd; using android::base::WaitForProperty; using android::base::WriteStringToFile; namespace android { namespace init { static bool shutting_down = false; static const std::set kDebuggingServices{"tombstoned", "logd", "adbd", "console"}; static std::vector GetDebuggingServices(bool only_post_data) REQUIRES(service_lock) { std::vector ret; ret.reserve(kDebuggingServices.size()); for (const auto& s : ServiceList::GetInstance()) { if (kDebuggingServices.count(s->name()) && (!only_post_data || s->is_post_data())) { ret.push_back(s.get()); } } return ret; } static void PersistRebootReason(const char* reason, bool write_to_property) { if (write_to_property) { SetProperty(LAST_REBOOT_REASON_PROPERTY, reason); } WriteStringToFile(reason, LAST_REBOOT_REASON_FILE); } // represents umount status during reboot / shutdown. enum UmountStat { /* umount succeeded. */ UMOUNT_STAT_SUCCESS = 0, /* umount was not run. */ UMOUNT_STAT_SKIPPED = 1, /* umount failed with timeout. */ UMOUNT_STAT_TIMEOUT = 2, /* could not run due to error */ UMOUNT_STAT_ERROR = 3, /* not used by init but reserved for other part to use this to represent the the state where umount status before reboot is not found / available. */ UMOUNT_STAT_NOT_AVAILABLE = 4, }; // Utility for struct mntent class MountEntry { public: explicit MountEntry(const mntent& entry) : mnt_fsname_(entry.mnt_fsname), mnt_dir_(entry.mnt_dir), mnt_type_(entry.mnt_type), mnt_opts_(entry.mnt_opts) {} bool Umount(bool force) { LOG(INFO) << "Unmounting " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_; int r = umount2(mnt_dir_.c_str(), force ? MNT_FORCE : 0); if (r == 0) { LOG(INFO) << "Umounted " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_; return true; } else { PLOG(WARNING) << "Cannot umount " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_; return false; } } void DoFsck() { int st; if (IsF2Fs()) { const char* f2fs_argv[] = { "/system/bin/fsck.f2fs", "-a", mnt_fsname_.c_str(), }; logwrap_fork_execvp(arraysize(f2fs_argv), f2fs_argv, &st, false, LOG_KLOG, true, nullptr); } else if (IsExt4()) { const char* ext4_argv[] = { "/system/bin/e2fsck", "-y", mnt_fsname_.c_str(), }; logwrap_fork_execvp(arraysize(ext4_argv), ext4_argv, &st, false, LOG_KLOG, true, nullptr); } } static bool IsBlockDevice(const struct mntent& mntent) { return android::base::StartsWith(mntent.mnt_fsname, "/dev/block"); } static bool IsEmulatedDevice(const struct mntent& mntent) { return android::base::StartsWith(mntent.mnt_fsname, "/data/"); } private: bool IsF2Fs() const { return mnt_type_ == "f2fs"; } bool IsExt4() const { return mnt_type_ == "ext4"; } std::string mnt_fsname_; std::string mnt_dir_; std::string mnt_type_; std::string mnt_opts_; }; // Turn off backlight while we are performing power down cleanup activities. static void TurnOffBacklight() REQUIRES(service_lock) { Service* service = ServiceList::GetInstance().FindService("blank_screen"); if (service == nullptr) { LOG(WARNING) << "cannot find blank_screen in TurnOffBacklight"; return; } if (auto result = service->Start(); !result.ok()) { LOG(WARNING) << "Could not start blank_screen service: " << result.error(); } } static Result CallVdc(const std::string& system, const std::string& cmd) { const char* vdc_argv[] = {"/system/bin/vdc", system.c_str(), cmd.c_str()}; int status; if (logwrap_fork_execvp(arraysize(vdc_argv), vdc_argv, &status, false, LOG_KLOG, true, nullptr) != 0) { return ErrnoError() << "Failed to call '/system/bin/vdc " << system << " " << cmd << "'"; } if (WIFEXITED(status) && WEXITSTATUS(status) == 0) { return {}; } return Error() << "'/system/bin/vdc " << system << " " << cmd << "' failed : " << status; } static void LogShutdownTime(UmountStat stat, Timer* t) { LOG(WARNING) << "powerctl_shutdown_time_ms:" << std::to_string(t->duration().count()) << ":" << stat; } static bool IsDataMounted() { std::unique_ptr fp(setmntent("/proc/mounts", "re"), endmntent); if (fp == nullptr) { PLOG(ERROR) << "Failed to open /proc/mounts"; return false; } mntent* mentry; while ((mentry = getmntent(fp.get())) != nullptr) { if (mentry->mnt_dir == "/data"s) { return true; } } return false; } // Find all read+write block devices and emulated devices in /proc/mounts and add them to // the correpsponding list. static bool FindPartitionsToUmount(std::vector* block_dev_partitions, std::vector* emulated_partitions, bool dump) { std::unique_ptr fp(setmntent("/proc/mounts", "re"), endmntent); if (fp == nullptr) { PLOG(ERROR) << "Failed to open /proc/mounts"; return false; } mntent* mentry; while ((mentry = getmntent(fp.get())) != nullptr) { if (dump) { LOG(INFO) << "mount entry " << mentry->mnt_fsname << ":" << mentry->mnt_dir << " opts " << mentry->mnt_opts << " type " << mentry->mnt_type; } else if (MountEntry::IsBlockDevice(*mentry) && hasmntopt(mentry, "rw")) { std::string mount_dir(mentry->mnt_dir); // These are R/O partitions changed to R/W after adb remount. // Do not umount them as shutdown critical services may rely on them. if (mount_dir != "/" && mount_dir != "/system" && mount_dir != "/vendor" && mount_dir != "/oem") { block_dev_partitions->emplace(block_dev_partitions->begin(), *mentry); } } else if (MountEntry::IsEmulatedDevice(*mentry)) { emulated_partitions->emplace(emulated_partitions->begin(), *mentry); } } return true; } static void DumpUmountDebuggingInfo() { int status; if (!security_getenforce()) { LOG(INFO) << "Run lsof"; const char* lsof_argv[] = {"/system/bin/lsof"}; logwrap_fork_execvp(arraysize(lsof_argv), lsof_argv, &status, false, LOG_KLOG, true, nullptr); } FindPartitionsToUmount(nullptr, nullptr, true); // dump current CPU stack traces and uninterruptible tasks WriteStringToFile("l", PROC_SYSRQ); WriteStringToFile("w", PROC_SYSRQ); } static UmountStat UmountPartitions(std::chrono::milliseconds timeout) { Timer t; /* data partition needs all pending writes to be completed and all emulated partitions * umounted.If the current waiting is not good enough, give * up and leave it to e2fsck after reboot to fix it. */ while (true) { std::vector block_devices; std::vector emulated_devices; if (!FindPartitionsToUmount(&block_devices, &emulated_devices, false)) { return UMOUNT_STAT_ERROR; } if (block_devices.size() == 0) { return UMOUNT_STAT_SUCCESS; } bool unmount_done = true; if (emulated_devices.size() > 0) { for (auto& entry : emulated_devices) { if (!entry.Umount(false)) unmount_done = false; } if (unmount_done) { sync(); } } for (auto& entry : block_devices) { if (!entry.Umount(timeout == 0ms)) unmount_done = false; } if (unmount_done) { return UMOUNT_STAT_SUCCESS; } if ((timeout < t.duration())) { // try umount at least once return UMOUNT_STAT_TIMEOUT; } std::this_thread::sleep_for(100ms); } } static void KillAllProcesses() { WriteStringToFile("i", PROC_SYSRQ); } // Create reboot/shutdwon monitor thread void RebootMonitorThread(unsigned int cmd, const std::string& reboot_target, sem_t* reboot_semaphore, std::chrono::milliseconds shutdown_timeout, bool* reboot_monitor_run) { unsigned int remaining_shutdown_time = 0; // 30 seconds more than the timeout passed to the thread as there is a final Umount pass // after the timeout is reached. constexpr unsigned int shutdown_watchdog_timeout_default = 30; auto shutdown_watchdog_timeout = android::base::GetUintProperty( "ro.build.shutdown.watchdog.timeout", shutdown_watchdog_timeout_default); remaining_shutdown_time = shutdown_watchdog_timeout + shutdown_timeout.count() / 1000; while (*reboot_monitor_run == true) { if (TEMP_FAILURE_RETRY(sem_wait(reboot_semaphore)) == -1) { LOG(ERROR) << "sem_wait failed and exit RebootMonitorThread()"; return; } timespec shutdown_timeout_timespec; if (clock_gettime(CLOCK_MONOTONIC, &shutdown_timeout_timespec) == -1) { LOG(ERROR) << "clock_gettime() fail! exit RebootMonitorThread()"; return; } // If there are some remaining shutdown time left from previous round, we use // remaining time here. shutdown_timeout_timespec.tv_sec += remaining_shutdown_time; LOG(INFO) << "shutdown_timeout_timespec.tv_sec: " << shutdown_timeout_timespec.tv_sec; int sem_return = 0; while ((sem_return = sem_timedwait_monotonic_np(reboot_semaphore, &shutdown_timeout_timespec)) == -1 && errno == EINTR) { } if (sem_return == -1) { LOG(ERROR) << "Reboot thread timed out"; if (android::base::GetBoolProperty("ro.debuggable", false) == true) { if (false) { // SEPolicy will block debuggerd from running and this is intentional. // But these lines are left to be enabled during debugging. LOG(INFO) << "Try to dump init process call trace:"; const char* vdc_argv[] = {"/system/bin/debuggerd", "-b", "1"}; int status; logwrap_fork_execvp(arraysize(vdc_argv), vdc_argv, &status, false, LOG_KLOG, true, nullptr); } LOG(INFO) << "Show stack for all active CPU:"; WriteStringToFile("l", PROC_SYSRQ); LOG(INFO) << "Show tasks that are in disk sleep(uninterruptable sleep), which are " "like " "blocked in mutex or hardware register access:"; WriteStringToFile("w", PROC_SYSRQ); } // In shutdown case,notify kernel to sync and umount fs to read-only before shutdown. if (cmd == ANDROID_RB_POWEROFF || cmd == ANDROID_RB_THERMOFF) { WriteStringToFile("s", PROC_SYSRQ); WriteStringToFile("u", PROC_SYSRQ); RebootSystem(cmd, reboot_target); } LOG(ERROR) << "Trigger crash at last!"; WriteStringToFile("c", PROC_SYSRQ); } else { timespec current_time_timespec; if (clock_gettime(CLOCK_MONOTONIC, ¤t_time_timespec) == -1) { LOG(ERROR) << "clock_gettime() fail! exit RebootMonitorThread()"; return; } remaining_shutdown_time = shutdown_timeout_timespec.tv_sec - current_time_timespec.tv_sec; LOG(INFO) << "remaining_shutdown_time: " << remaining_shutdown_time; } } } /* Try umounting all emulated file systems R/W block device cfile systems. * This will just try umount and give it up if it fails. * For fs like ext4, this is ok as file system will be marked as unclean shutdown * and necessary check can be done at the next reboot. * For safer shutdown, caller needs to make sure that * all processes / emulated partition for the target fs are all cleaned-up. * * return true when umount was successful. false when timed out. */ static UmountStat TryUmountAndFsck(unsigned int cmd, bool run_fsck, std::chrono::milliseconds timeout, sem_t* reboot_semaphore) { Timer t; std::vector block_devices; std::vector emulated_devices; if (run_fsck && !FindPartitionsToUmount(&block_devices, &emulated_devices, false)) { return UMOUNT_STAT_ERROR; } UmountStat stat = UmountPartitions(timeout - t.duration()); if (stat != UMOUNT_STAT_SUCCESS) { LOG(INFO) << "umount timeout, last resort, kill all and try"; if (DUMP_ON_UMOUNT_FAILURE) DumpUmountDebuggingInfo(); KillAllProcesses(); // even if it succeeds, still it is timeout and do not run fsck with all processes killed UmountStat st = UmountPartitions(0ms); if ((st != UMOUNT_STAT_SUCCESS) && DUMP_ON_UMOUNT_FAILURE) DumpUmountDebuggingInfo(); } if (stat == UMOUNT_STAT_SUCCESS && run_fsck) { LOG(INFO) << "Pause reboot monitor thread before fsck"; sem_post(reboot_semaphore); // fsck part is excluded from timeout check. It only runs for user initiated shutdown // and should not affect reboot time. for (auto& entry : block_devices) { entry.DoFsck(); } LOG(INFO) << "Resume reboot monitor thread after fsck"; sem_post(reboot_semaphore); } return stat; } // zram is able to use backing device on top of a loopback device. // In order to unmount /data successfully, we have to kill the loopback device first #define ZRAM_DEVICE "/dev/block/zram0" #define ZRAM_RESET "/sys/block/zram0/reset" #define ZRAM_BACK_DEV "/sys/block/zram0/backing_dev" static Result KillZramBackingDevice() { std::string backing_dev; if (!android::base::ReadFileToString(ZRAM_BACK_DEV, &backing_dev)) return {}; if (!android::base::StartsWith(backing_dev, "/dev/block/loop")) return {}; // cut the last "\n" backing_dev.erase(backing_dev.length() - 1); // shutdown zram handle Timer swap_timer; LOG(INFO) << "swapoff() start..."; if (swapoff(ZRAM_DEVICE) == -1) { return ErrnoError() << "zram_backing_dev: swapoff (" << backing_dev << ")" << " failed"; } LOG(INFO) << "swapoff() took " << swap_timer;; if (!WriteStringToFile("1", ZRAM_RESET)) { return Error() << "zram_backing_dev: reset (" << backing_dev << ")" << " failed"; } // clear loopback device unique_fd loop(TEMP_FAILURE_RETRY(open(backing_dev.c_str(), O_RDWR | O_CLOEXEC))); if (loop.get() < 0) { return ErrnoError() << "zram_backing_dev: open(" << backing_dev << ")" << " failed"; } if (ioctl(loop.get(), LOOP_CLR_FD, 0) < 0) { return ErrnoError() << "zram_backing_dev: loop_clear (" << backing_dev << ")" << " failed"; } LOG(INFO) << "zram_backing_dev: `" << backing_dev << "` is cleared successfully."; return {}; } // Stops given services, waits for them to be stopped for |timeout| ms. // If terminate is true, then SIGTERM is sent to services, otherwise SIGKILL is sent. static void StopServices(const std::vector& services, std::chrono::milliseconds timeout, bool terminate) { LOG(INFO) << "Stopping " << services.size() << " services by sending " << (terminate ? "SIGTERM" : "SIGKILL"); std::vector pids; pids.reserve(services.size()); for (const auto& s : services) { if (s->pid() > 0) { pids.push_back(s->pid()); } if (terminate) { s->Terminate(); } else { s->Stop(); } } if (timeout > 0ms) { WaitToBeReaped(pids, timeout); } else { // Even if we don't to wait for services to stop, we still optimistically reap zombies. ReapAnyOutstandingChildren(); } } // Like StopServices, but also logs all the services that failed to stop after the provided timeout. // Returns number of violators. static int StopServicesAndLogViolations(const std::vector& services, std::chrono::milliseconds timeout, bool terminate) { StopServices(services, timeout, terminate); int still_running = 0; for (const auto& s : services) { if (s->IsRunning()) { LOG(ERROR) << "[service-misbehaving] : service '" << s->name() << "' is still running " << timeout.count() << "ms after receiving " << (terminate ? "SIGTERM" : "SIGKILL"); still_running++; } } return still_running; } //* Reboot / shutdown the system. // cmd ANDROID_RB_* as defined in android_reboot.h // reason Reason string like "reboot", "shutdown,userrequested" // reboot_target Reboot target string like "bootloader". Otherwise, it should be an empty string. // run_fsck Whether to run fsck after umount is done. // static void DoReboot(unsigned int cmd, const std::string& reason, const std::string& reboot_target, bool run_fsck) { Timer t; LOG(INFO) << "Reboot start, reason: " << reason << ", reboot_target: " << reboot_target; // Ensure last reboot reason is reduced to canonical // alias reported in bootloader or system boot reason. size_t skip = 0; std::vector reasons = Split(reason, ","); if (reasons.size() >= 2 && reasons[0] == "reboot" && (reasons[1] == "recovery" || reasons[1] == "bootloader" || reasons[1] == "cold" || reasons[1] == "hard" || reasons[1] == "warm")) { skip = strlen("reboot,"); } PersistRebootReason(reason.c_str() + skip, true); sync(); // If /data isn't mounted then we can skip the extra reboot steps below, since we don't need to // worry about unmounting it. if (!IsDataMounted()) { sync(); RebootSystem(cmd, reboot_target); abort(); } bool is_thermal_shutdown = cmd == ANDROID_RB_THERMOFF; auto shutdown_timeout = 0ms; if (!SHUTDOWN_ZERO_TIMEOUT) { constexpr unsigned int shutdown_timeout_default = 6; constexpr unsigned int max_thermal_shutdown_timeout = 3; auto shutdown_timeout_final = android::base::GetUintProperty("ro.build.shutdown_timeout", shutdown_timeout_default); if (is_thermal_shutdown && shutdown_timeout_final > max_thermal_shutdown_timeout) { shutdown_timeout_final = max_thermal_shutdown_timeout; } shutdown_timeout = std::chrono::seconds(shutdown_timeout_final); } LOG(INFO) << "Shutdown timeout: " << shutdown_timeout.count() << " ms"; sem_t reboot_semaphore; if (sem_init(&reboot_semaphore, false, 0) == -1) { // These should never fail, but if they do, skip the graceful reboot and reboot immediately. LOG(ERROR) << "sem_init() fail and RebootSystem() return!"; RebootSystem(cmd, reboot_target); } // Start a thread to monitor init shutdown process LOG(INFO) << "Create reboot monitor thread."; bool reboot_monitor_run = true; std::thread reboot_monitor_thread(&RebootMonitorThread, cmd, reboot_target, &reboot_semaphore, shutdown_timeout, &reboot_monitor_run); reboot_monitor_thread.detach(); // Start reboot monitor thread sem_post(&reboot_semaphore); auto lock = std::lock_guard{service_lock}; // watchdogd is a vendor specific component but should be alive to complete shutdown safely. const std::set to_starts{"watchdogd"}; std::vector stop_first; stop_first.reserve(ServiceList::GetInstance().services().size()); for (const auto& s : ServiceList::GetInstance()) { if (kDebuggingServices.count(s->name())) { // keep debugging tools until non critical ones are all gone. s->SetShutdownCritical(); } else if (to_starts.count(s->name())) { if (auto result = s->Start(); !result.ok()) { LOG(ERROR) << "Could not start shutdown 'to_start' service '" << s->name() << "': " << result.error(); } s->SetShutdownCritical(); } else if (s->IsShutdownCritical()) { // Start shutdown critical service if not started. if (auto result = s->Start(); !result.ok()) { LOG(ERROR) << "Could not start shutdown critical service '" << s->name() << "': " << result.error(); } } else { stop_first.push_back(s.get()); } } // remaining operations (specifically fsck) may take a substantial duration if (cmd == ANDROID_RB_POWEROFF || is_thermal_shutdown) { TurnOffBacklight(); } Service* boot_anim = ServiceList::GetInstance().FindService("bootanim"); Service* surface_flinger = ServiceList::GetInstance().FindService("surfaceflinger"); if (boot_anim != nullptr && surface_flinger != nullptr && surface_flinger->IsRunning()) { bool do_shutdown_animation = GetBoolProperty("ro.init.shutdown_animation", false); if (do_shutdown_animation) { SetProperty("service.bootanim.exit", "0"); // Could be in the middle of animation. Stop and start so that it can pick // up the right mode. boot_anim->Stop(); } for (const auto& service : ServiceList::GetInstance()) { if (service->classnames().count("animation") == 0) { continue; } // start all animation classes if stopped. if (do_shutdown_animation) { service->Start(); } service->SetShutdownCritical(); // will not check animation class separately } if (do_shutdown_animation) { boot_anim->Start(); surface_flinger->SetShutdownCritical(); boot_anim->SetShutdownCritical(); } } // optional shutdown step // 1. terminate all services except shutdown critical ones. wait for delay to finish if (shutdown_timeout > 0ms) { StopServicesAndLogViolations(stop_first, shutdown_timeout / 2, true /* SIGTERM */); } // Send SIGKILL to ones that didn't terminate cleanly. StopServicesAndLogViolations(stop_first, 0ms, false /* SIGKILL */); SubcontextTerminate(); // Reap subcontext pids. ReapAnyOutstandingChildren(); // 3. send volume shutdown to vold Service* vold_service = ServiceList::GetInstance().FindService("vold"); if (vold_service != nullptr && vold_service->IsRunning()) { CallVdc("volume", "shutdown"); vold_service->Stop(); } else { LOG(INFO) << "vold not running, skipping vold shutdown"; } // logcat stopped here StopServices(GetDebuggingServices(false /* only_post_data */), 0ms, false /* SIGKILL */); // 4. sync, try umount, and optionally run fsck for user shutdown { Timer sync_timer; LOG(INFO) << "sync() before umount..."; sync(); LOG(INFO) << "sync() before umount took" << sync_timer; } // 5. drop caches and disable zram backing device, if exist KillZramBackingDevice(); UmountStat stat = TryUmountAndFsck(cmd, run_fsck, shutdown_timeout - t.duration(), &reboot_semaphore); // Follow what linux shutdown is doing: one more sync with little bit delay { Timer sync_timer; LOG(INFO) << "sync() after umount..."; sync(); LOG(INFO) << "sync() after umount took" << sync_timer; } if (!is_thermal_shutdown) std::this_thread::sleep_for(100ms); LogShutdownTime(stat, &t); // Send signal to terminate reboot monitor thread. reboot_monitor_run = false; sem_post(&reboot_semaphore); // Reboot regardless of umount status. If umount fails, fsck after reboot will fix it. RebootSystem(cmd, reboot_target); abort(); } static void EnterShutdown() { LOG(INFO) << "Entering shutdown mode"; shutting_down = true; // Skip wait for prop if it is in progress ResetWaitForProp(); // Clear EXEC flag if there is one pending auto lock = std::lock_guard{service_lock}; for (const auto& s : ServiceList::GetInstance()) { s->UnSetExec(); } // We no longer process messages about properties changing coming from property service, so we // need to tell property service to stop sending us these messages, otherwise it'll fill the // buffers and block indefinitely, causing future property sets, including those that init makes // during shutdown in Service::NotifyStateChange() to also block indefinitely. SendStopSendingMessagesMessage(); } static void LeaveShutdown() { LOG(INFO) << "Leaving shutdown mode"; shutting_down = false; SendStartSendingMessagesMessage(); } static Result UnmountAllApexes() { const char* args[] = {"/system/bin/apexd", "--unmount-all"}; int status; if (logwrap_fork_execvp(arraysize(args), args, &status, false, LOG_KLOG, true, nullptr) != 0) { return ErrnoError() << "Failed to call '/system/bin/apexd --unmount-all'"; } if (WIFEXITED(status) && WEXITSTATUS(status) == 0) { return {}; } return Error() << "'/system/bin/apexd --unmount-all' failed : " << status; } static Result DoUserspaceReboot() { LOG(INFO) << "Userspace reboot initiated"; auto guard = android::base::make_scope_guard([] { // Leave shutdown so that we can handle a full reboot. LeaveShutdown(); trigger_shutdown("reboot,userspace_failed,shutdown_aborted"); }); // Triggering userspace-reboot-requested will result in a bunch of setprop // actions. We should make sure, that all of them are propagated before // proceeding with userspace reboot. Synchronously setting sys.init.userspace_reboot.in_progress // property is not perfect, but it should do the trick. if (!android::sysprop::InitProperties::userspace_reboot_in_progress(true)) { return Error() << "Failed to set sys.init.userspace_reboot.in_progress property"; } EnterShutdown(); auto lock = std::lock_guard{service_lock}; if (!SetProperty("sys.powerctl", "")) { return Error() << "Failed to reset sys.powerctl property"; } std::vector stop_first; // Remember the services that were enabled. We will need to manually enable them again otherwise // triggers like class_start won't restart them. std::vector were_enabled; stop_first.reserve(ServiceList::GetInstance().services().size()); for (const auto& s : ServiceList::GetInstance().services_in_shutdown_order()) { if (s->is_post_data() && !kDebuggingServices.count(s->name())) { stop_first.push_back(s); } if (s->is_post_data() && s->IsEnabled()) { were_enabled.push_back(s); } } { Timer sync_timer; LOG(INFO) << "sync() before terminating services..."; sync(); LOG(INFO) << "sync() took " << sync_timer; } // TODO(b/135984674): do we need shutdown animation for userspace reboot? // TODO(b/135984674): control userspace timeout via read-only property? StopServicesAndLogViolations(stop_first, 10s, true /* SIGTERM */); if (int r = StopServicesAndLogViolations(stop_first, 20s, false /* SIGKILL */); r > 0) { // TODO(b/135984674): store information about offending services for debugging. return Error() << r << " post-data services are still running"; } if (auto result = KillZramBackingDevice(); !result.ok()) { return result; } if (auto result = CallVdc("volume", "reset"); !result.ok()) { return result; } if (int r = StopServicesAndLogViolations(GetDebuggingServices(true /* only_post_data */), 5s, false /* SIGKILL */); r > 0) { // TODO(b/135984674): store information about offending services for debugging. return Error() << r << " debugging services are still running"; } { Timer sync_timer; LOG(INFO) << "sync() after stopping services..."; sync(); LOG(INFO) << "sync() took " << sync_timer; } if (auto result = UnmountAllApexes(); !result.ok()) { return result; } if (!SwitchToBootstrapMountNamespaceIfNeeded()) { return Error() << "Failed to switch to bootstrap namespace"; } // Remove services that were defined in an APEX. ServiceList::GetInstance().RemoveServiceIf([](const std::unique_ptr& s) -> bool { if (s->is_from_apex()) { LOG(INFO) << "Removing service '" << s->name() << "' because it's defined in an APEX"; return true; } return false; }); // Re-enable services for (const auto& s : were_enabled) { LOG(INFO) << "Re-enabling service '" << s->name() << "'"; s->Enable(); } ServiceList::GetInstance().ResetState(); LeaveShutdown(); ActionManager::GetInstance().QueueEventTrigger("userspace-reboot-resume"); guard.Disable(); // Go on with userspace reboot. return {}; } static void UserspaceRebootWatchdogThread() { if (!WaitForProperty("sys.init.userspace_reboot.in_progress", "1", 20s)) { // TODO(b/135984674): should we reboot instead? LOG(WARNING) << "Userspace reboot didn't start in 20 seconds. Stopping watchdog"; return; } LOG(INFO) << "Starting userspace reboot watchdog"; // TODO(b/135984674): this should be configured via a read-only sysprop. std::chrono::milliseconds timeout = 60s; if (!WaitForProperty("sys.boot_completed", "1", timeout)) { LOG(ERROR) << "Failed to boot in " << timeout.count() << "ms. Switching to full reboot"; // In this case device is in a boot loop. Only way to recover is to do dirty reboot. // Since init might be wedged, don't try to write reboot reason into a persistent property. PersistRebootReason("userspace_failed,watchdog_triggered", false); RebootSystem(ANDROID_RB_RESTART2, "userspace_failed,watchdog_triggered"); } LOG(INFO) << "Device booted, stopping userspace reboot watchdog"; } static void HandleUserspaceReboot() { if (!android::sysprop::InitProperties::is_userspace_reboot_supported().value_or(false)) { LOG(ERROR) << "Attempted a userspace reboot on a device that doesn't support it"; return; } // Spinnig up a separate thread will fail the setns call later in the boot sequence. // Fork a new process to monitor userspace reboot while we are investigating a better solution. pid_t pid = fork(); if (pid < 0) { PLOG(ERROR) << "Failed to fork process for userspace reboot watchdog. Switching to full " << "reboot"; trigger_shutdown("reboot,userspace_failed,watchdog_fork"); return; } if (pid == 0) { // Child UserspaceRebootWatchdogThread(); _exit(EXIT_SUCCESS); } LOG(INFO) << "Clearing queue and starting userspace-reboot-requested trigger"; auto& am = ActionManager::GetInstance(); am.ClearQueue(); am.QueueEventTrigger("userspace-reboot-requested"); auto handler = [](const BuiltinArguments&) { return DoUserspaceReboot(); }; am.QueueBuiltinAction(handler, "userspace-reboot"); } /** * Check if "command" field is set in bootloader message. * * If "command" field is broken (contains non-printable characters prior to * terminating zero), it will be zeroed. * * @param[in,out] boot Bootloader message (BCB) structure * @return true if "command" field is already set, and false if it's empty */ static bool CommandIsPresent(bootloader_message* boot) { if (boot->command[0] == '\0') return false; for (size_t i = 0; i < arraysize(boot->command); ++i) { if (boot->command[i] == '\0') return true; if (!isprint(boot->command[i])) break; } memset(boot->command, 0, sizeof(boot->command)); return false; } void HandlePowerctlMessage(const std::string& command) { unsigned int cmd = 0; std::vector cmd_params = Split(command, ","); std::string reboot_target = ""; bool run_fsck = false; bool command_invalid = false; bool userspace_reboot = false; if (cmd_params[0] == "shutdown") { cmd = ANDROID_RB_POWEROFF; if (cmd_params.size() >= 2) { if (cmd_params[1] == "userrequested") { // The shutdown reason is PowerManager.SHUTDOWN_USER_REQUESTED. // Run fsck once the file system is remounted in read-only mode. run_fsck = true; } else if (cmd_params[1] == "thermal") { // Turn off sources of heat immediately. auto lock = std::lock_guard{service_lock}; TurnOffBacklight(); // run_fsck is false to avoid delay cmd = ANDROID_RB_THERMOFF; } } } else if (cmd_params[0] == "reboot") { cmd = ANDROID_RB_RESTART2; if (cmd_params.size() >= 2) { reboot_target = cmd_params[1]; if (reboot_target == "userspace") { LOG(INFO) << "Userspace reboot requested"; userspace_reboot = true; } // adb reboot fastboot should boot into bootloader for devices not // supporting logical partitions. if (reboot_target == "fastboot" && !android::base::GetBoolProperty("ro.boot.dynamic_partitions", false)) { reboot_target = "bootloader"; } // When rebooting to the bootloader notify the bootloader writing // also the BCB. if (reboot_target == "bootloader") { std::string err; if (!write_reboot_bootloader(&err)) { LOG(ERROR) << "reboot-bootloader: Error writing " "bootloader_message: " << err; } } else if (reboot_target == "recovery") { bootloader_message boot = {}; if (std::string err; !read_bootloader_message(&boot, &err)) { LOG(ERROR) << "Failed to read bootloader message: " << err; } // Update the boot command field if it's empty, and preserve // the other arguments in the bootloader message. if (!CommandIsPresent(&boot)) { strlcpy(boot.command, "boot-recovery", sizeof(boot.command)); if (std::string err; !write_bootloader_message(boot, &err)) { LOG(ERROR) << "Failed to set bootloader message: " << err; return; } } } else if (reboot_target == "sideload" || reboot_target == "sideload-auto-reboot" || reboot_target == "fastboot") { std::string arg = reboot_target == "sideload-auto-reboot" ? "sideload_auto_reboot" : reboot_target; const std::vector options = { "--" + arg, }; std::string err; if (!write_bootloader_message(options, &err)) { LOG(ERROR) << "Failed to set bootloader message: " << err; return; } reboot_target = "recovery"; } // If there are additional parameter, pass them along for (size_t i = 2; (cmd_params.size() > i) && cmd_params[i].size(); ++i) { reboot_target += "," + cmd_params[i]; } } } else { command_invalid = true; } if (command_invalid) { LOG(ERROR) << "powerctl: unrecognized command '" << command << "'"; return; } if (userspace_reboot) { HandleUserspaceReboot(); return; } LOG(INFO) << "Clear action queue and start shutdown trigger"; ActionManager::GetInstance().ClearQueue(); // Queue shutdown trigger first ActionManager::GetInstance().QueueEventTrigger("shutdown"); // Queue built-in shutdown_done auto shutdown_handler = [cmd, command, reboot_target, run_fsck](const BuiltinArguments&) { DoReboot(cmd, command, reboot_target, run_fsck); return Result{}; }; ActionManager::GetInstance().QueueBuiltinAction(shutdown_handler, "shutdown_done"); EnterShutdown(); } bool IsShuttingDown() { return shutting_down; } } // namespace init } // namespace android