• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2017 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include "reboot.h"
18 
19 #include <dirent.h>
20 #include <fcntl.h>
21 #include <linux/fs.h>
22 #include <mntent.h>
23 #include <linux/loop.h>
24 #include <sys/cdefs.h>
25 #include <sys/ioctl.h>
26 #include <sys/mount.h>
27 #include <sys/swap.h>
28 #include <sys/stat.h>
29 #include <sys/syscall.h>
30 #include <sys/types.h>
31 #include <sys/wait.h>
32 
33 #include <memory>
34 #include <set>
35 #include <thread>
36 #include <vector>
37 
38 #include <android-base/chrono_utils.h>
39 #include <android-base/file.h>
40 #include <android-base/logging.h>
41 #include <android-base/macros.h>
42 #include <android-base/properties.h>
43 #include <android-base/stringprintf.h>
44 #include <android-base/strings.h>
45 #include <android-base/unique_fd.h>
46 #include <bootloader_message/bootloader_message.h>
47 #include <cutils/android_reboot.h>
48 #include <fs_mgr.h>
49 #include <logwrap/logwrap.h>
50 #include <private/android_filesystem_config.h>
51 #include <selinux/selinux.h>
52 
53 #include "action_manager.h"
54 #include "init.h"
55 #include "property_service.h"
56 #include "reboot_utils.h"
57 #include "service.h"
58 #include "sigchld_handler.h"
59 
60 using android::base::GetBoolProperty;
61 using android::base::Split;
62 using android::base::StringPrintf;
63 using android::base::Timer;
64 using android::base::unique_fd;
65 
66 namespace android {
67 namespace init {
68 
69 // represents umount status during reboot / shutdown.
70 enum UmountStat {
71     /* umount succeeded. */
72     UMOUNT_STAT_SUCCESS = 0,
73     /* umount was not run. */
74     UMOUNT_STAT_SKIPPED = 1,
75     /* umount failed with timeout. */
76     UMOUNT_STAT_TIMEOUT = 2,
77     /* could not run due to error */
78     UMOUNT_STAT_ERROR = 3,
79     /* not used by init but reserved for other part to use this to represent the
80        the state where umount status before reboot is not found / available. */
81     UMOUNT_STAT_NOT_AVAILABLE = 4,
82 };
83 
84 // Utility for struct mntent
85 class MountEntry {
86   public:
MountEntry(const mntent & entry)87     explicit MountEntry(const mntent& entry)
88         : mnt_fsname_(entry.mnt_fsname),
89           mnt_dir_(entry.mnt_dir),
90           mnt_type_(entry.mnt_type),
91           mnt_opts_(entry.mnt_opts) {}
92 
Umount(bool force)93     bool Umount(bool force) {
94         LOG(INFO) << "Unmounting " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_;
95         int r = umount2(mnt_dir_.c_str(), force ? MNT_FORCE : 0);
96         if (r == 0) {
97             LOG(INFO) << "Umounted " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_;
98             return true;
99         } else {
100             PLOG(WARNING) << "Cannot umount " << mnt_fsname_ << ":" << mnt_dir_ << " opts "
101                           << mnt_opts_;
102             return false;
103         }
104     }
105 
DoFsck()106     void DoFsck() {
107         int st;
108         if (IsF2Fs()) {
109             const char* f2fs_argv[] = {
110                     "/system/bin/fsck.f2fs",
111                     "-a",
112                     mnt_fsname_.c_str(),
113             };
114             android_fork_execvp_ext(arraysize(f2fs_argv), (char**)f2fs_argv, &st, true, LOG_KLOG,
115                                     true, nullptr, nullptr, 0);
116         } else if (IsExt4()) {
117             const char* ext4_argv[] = {
118                     "/system/bin/e2fsck",
119                     "-y",
120                     mnt_fsname_.c_str(),
121             };
122             android_fork_execvp_ext(arraysize(ext4_argv), (char**)ext4_argv, &st, true, LOG_KLOG,
123                                     true, nullptr, nullptr, 0);
124         }
125     }
126 
IsBlockDevice(const struct mntent & mntent)127     static bool IsBlockDevice(const struct mntent& mntent) {
128         return android::base::StartsWith(mntent.mnt_fsname, "/dev/block");
129     }
130 
IsEmulatedDevice(const struct mntent & mntent)131     static bool IsEmulatedDevice(const struct mntent& mntent) {
132         return android::base::StartsWith(mntent.mnt_fsname, "/data/");
133     }
134 
135   private:
IsF2Fs() const136     bool IsF2Fs() const { return mnt_type_ == "f2fs"; }
137 
IsExt4() const138     bool IsExt4() const { return mnt_type_ == "ext4"; }
139 
140     std::string mnt_fsname_;
141     std::string mnt_dir_;
142     std::string mnt_type_;
143     std::string mnt_opts_;
144 };
145 
146 // Turn off backlight while we are performing power down cleanup activities.
TurnOffBacklight()147 static void TurnOffBacklight() {
148     Service* service = ServiceList::GetInstance().FindService("blank_screen");
149     if (service == nullptr) {
150         LOG(WARNING) << "cannot find blank_screen in TurnOffBacklight";
151         return;
152     }
153     if (auto result = service->Start(); !result) {
154         LOG(WARNING) << "Could not start blank_screen service: " << result.error();
155     }
156 }
157 
ShutdownVold()158 static void ShutdownVold() {
159     const char* vdc_argv[] = {"/system/bin/vdc", "volume", "shutdown"};
160     int status;
161     android_fork_execvp_ext(arraysize(vdc_argv), (char**)vdc_argv, &status, true, LOG_KLOG, true,
162                             nullptr, nullptr, 0);
163 }
164 
LogShutdownTime(UmountStat stat,Timer * t)165 static void LogShutdownTime(UmountStat stat, Timer* t) {
166     LOG(WARNING) << "powerctl_shutdown_time_ms:" << std::to_string(t->duration().count()) << ":"
167                  << stat;
168 }
169 
170 /* Find all read+write block devices and emulated devices in /proc/mounts
171  * and add them to correpsponding list.
172  */
FindPartitionsToUmount(std::vector<MountEntry> * blockDevPartitions,std::vector<MountEntry> * emulatedPartitions,bool dump)173 static bool FindPartitionsToUmount(std::vector<MountEntry>* blockDevPartitions,
174                                    std::vector<MountEntry>* emulatedPartitions, bool dump) {
175     std::unique_ptr<std::FILE, int (*)(std::FILE*)> fp(setmntent("/proc/mounts", "re"), endmntent);
176     if (fp == nullptr) {
177         PLOG(ERROR) << "Failed to open /proc/mounts";
178         return false;
179     }
180     mntent* mentry;
181     while ((mentry = getmntent(fp.get())) != nullptr) {
182         if (dump) {
183             LOG(INFO) << "mount entry " << mentry->mnt_fsname << ":" << mentry->mnt_dir << " opts "
184                       << mentry->mnt_opts << " type " << mentry->mnt_type;
185         } else if (MountEntry::IsBlockDevice(*mentry) && hasmntopt(mentry, "rw")) {
186             std::string mount_dir(mentry->mnt_dir);
187             // These are R/O partitions changed to R/W after adb remount.
188             // Do not umount them as shutdown critical services may rely on them.
189             if (mount_dir != "/" && mount_dir != "/system" && mount_dir != "/vendor" &&
190                 mount_dir != "/oem") {
191                 blockDevPartitions->emplace(blockDevPartitions->begin(), *mentry);
192             }
193         } else if (MountEntry::IsEmulatedDevice(*mentry)) {
194             emulatedPartitions->emplace(emulatedPartitions->begin(), *mentry);
195         }
196     }
197     return true;
198 }
199 
DumpUmountDebuggingInfo()200 static void DumpUmountDebuggingInfo() {
201     int status;
202     if (!security_getenforce()) {
203         LOG(INFO) << "Run lsof";
204         const char* lsof_argv[] = {"/system/bin/lsof"};
205         android_fork_execvp_ext(arraysize(lsof_argv), (char**)lsof_argv, &status, true, LOG_KLOG,
206                                 true, nullptr, nullptr, 0);
207     }
208     FindPartitionsToUmount(nullptr, nullptr, true);
209     // dump current CPU stack traces and uninterruptible tasks
210     android::base::WriteStringToFile("l", "/proc/sysrq-trigger");
211     android::base::WriteStringToFile("w", "/proc/sysrq-trigger");
212 }
213 
UmountPartitions(std::chrono::milliseconds timeout)214 static UmountStat UmountPartitions(std::chrono::milliseconds timeout) {
215     Timer t;
216     /* data partition needs all pending writes to be completed and all emulated partitions
217      * umounted.If the current waiting is not good enough, give
218      * up and leave it to e2fsck after reboot to fix it.
219      */
220     while (true) {
221         std::vector<MountEntry> block_devices;
222         std::vector<MountEntry> emulated_devices;
223         if (!FindPartitionsToUmount(&block_devices, &emulated_devices, false)) {
224             return UMOUNT_STAT_ERROR;
225         }
226         if (block_devices.size() == 0) {
227             return UMOUNT_STAT_SUCCESS;
228         }
229         bool unmount_done = true;
230         if (emulated_devices.size() > 0) {
231             for (auto& entry : emulated_devices) {
232                 if (!entry.Umount(false)) unmount_done = false;
233             }
234             if (unmount_done) {
235                 sync();
236             }
237         }
238         for (auto& entry : block_devices) {
239             if (!entry.Umount(timeout == 0ms)) unmount_done = false;
240         }
241         if (unmount_done) {
242             return UMOUNT_STAT_SUCCESS;
243         }
244         if ((timeout < t.duration())) {  // try umount at least once
245             return UMOUNT_STAT_TIMEOUT;
246         }
247         std::this_thread::sleep_for(100ms);
248     }
249 }
250 
KillAllProcesses()251 static void KillAllProcesses() { android::base::WriteStringToFile("i", "/proc/sysrq-trigger"); }
252 
253 /* Try umounting all emulated file systems R/W block device cfile systems.
254  * This will just try umount and give it up if it fails.
255  * For fs like ext4, this is ok as file system will be marked as unclean shutdown
256  * and necessary check can be done at the next reboot.
257  * For safer shutdown, caller needs to make sure that
258  * all processes / emulated partition for the target fs are all cleaned-up.
259  *
260  * return true when umount was successful. false when timed out.
261  */
TryUmountAndFsck(bool runFsck,std::chrono::milliseconds timeout)262 static UmountStat TryUmountAndFsck(bool runFsck, std::chrono::milliseconds timeout) {
263     Timer t;
264     std::vector<MountEntry> block_devices;
265     std::vector<MountEntry> emulated_devices;
266 
267     if (runFsck && !FindPartitionsToUmount(&block_devices, &emulated_devices, false)) {
268         return UMOUNT_STAT_ERROR;
269     }
270 
271     UmountStat stat = UmountPartitions(timeout - t.duration());
272     if (stat != UMOUNT_STAT_SUCCESS) {
273         LOG(INFO) << "umount timeout, last resort, kill all and try";
274         if (DUMP_ON_UMOUNT_FAILURE) DumpUmountDebuggingInfo();
275         KillAllProcesses();
276         // even if it succeeds, still it is timeout and do not run fsck with all processes killed
277         UmountStat st = UmountPartitions(0ms);
278         if ((st != UMOUNT_STAT_SUCCESS) && DUMP_ON_UMOUNT_FAILURE) DumpUmountDebuggingInfo();
279     }
280 
281     if (stat == UMOUNT_STAT_SUCCESS && runFsck) {
282         // fsck part is excluded from timeout check. It only runs for user initiated shutdown
283         // and should not affect reboot time.
284         for (auto& entry : block_devices) {
285             entry.DoFsck();
286         }
287     }
288     return stat;
289 }
290 
291 // zram is able to use backing device on top of a loopback device.
292 // In order to unmount /data successfully, we have to kill the loopback device first
293 #define ZRAM_DEVICE   "/dev/block/zram0"
294 #define ZRAM_RESET    "/sys/block/zram0/reset"
295 #define ZRAM_BACK_DEV "/sys/block/zram0/backing_dev"
KillZramBackingDevice()296 static void KillZramBackingDevice() {
297     std::string backing_dev;
298     if (!android::base::ReadFileToString(ZRAM_BACK_DEV, &backing_dev)) return;
299 
300     if (!android::base::StartsWith(backing_dev, "/dev/block/loop")) return;
301 
302     // cut the last "\n"
303     backing_dev.erase(backing_dev.length() - 1);
304 
305     // shutdown zram handle
306     Timer swap_timer;
307     LOG(INFO) << "swapoff() start...";
308     if (swapoff(ZRAM_DEVICE) == -1) {
309         LOG(ERROR) << "zram_backing_dev: swapoff (" << backing_dev << ")" << " failed";
310         return;
311     }
312     LOG(INFO) << "swapoff() took " << swap_timer;;
313 
314     if (!android::base::WriteStringToFile("1", ZRAM_RESET)) {
315         LOG(ERROR) << "zram_backing_dev: reset (" << backing_dev << ")" << " failed";
316         return;
317     }
318 
319     // clear loopback device
320     unique_fd loop(TEMP_FAILURE_RETRY(open(backing_dev.c_str(), O_RDWR | O_CLOEXEC)));
321     if (loop.get() < 0) {
322         LOG(ERROR) << "zram_backing_dev: open(" << backing_dev << ")" << " failed";
323         return;
324     }
325 
326     if (ioctl(loop.get(), LOOP_CLR_FD, 0) < 0) {
327         LOG(ERROR) << "zram_backing_dev: loop_clear (" << backing_dev << ")" << " failed";
328         return;
329     }
330     LOG(INFO) << "zram_backing_dev: `" << backing_dev << "` is cleared successfully.";
331 }
332 
333 //* Reboot / shutdown the system.
334 // cmd ANDROID_RB_* as defined in android_reboot.h
335 // reason Reason string like "reboot", "shutdown,userrequested"
336 // rebootTarget Reboot target string like "bootloader". Otherwise, it should be an
337 //              empty string.
338 // runFsck Whether to run fsck after umount is done.
339 //
DoReboot(unsigned int cmd,const std::string & reason,const std::string & rebootTarget,bool runFsck)340 static void DoReboot(unsigned int cmd, const std::string& reason, const std::string& rebootTarget,
341                      bool runFsck) {
342     Timer t;
343     LOG(INFO) << "Reboot start, reason: " << reason << ", rebootTarget: " << rebootTarget;
344 
345     // Ensure last reboot reason is reduced to canonical
346     // alias reported in bootloader or system boot reason.
347     size_t skip = 0;
348     std::vector<std::string> reasons = Split(reason, ",");
349     if (reasons.size() >= 2 && reasons[0] == "reboot" &&
350         (reasons[1] == "recovery" || reasons[1] == "bootloader" || reasons[1] == "cold" ||
351          reasons[1] == "hard" || reasons[1] == "warm")) {
352         skip = strlen("reboot,");
353     }
354     property_set(LAST_REBOOT_REASON_PROPERTY, reason.c_str() + skip);
355     sync();
356 
357     bool is_thermal_shutdown = cmd == ANDROID_RB_THERMOFF;
358 
359     auto shutdown_timeout = 0ms;
360     if (!SHUTDOWN_ZERO_TIMEOUT) {
361         constexpr unsigned int shutdown_timeout_default = 6;
362         constexpr unsigned int max_thermal_shutdown_timeout = 3;
363         auto shutdown_timeout_final = android::base::GetUintProperty("ro.build.shutdown_timeout",
364                                                                      shutdown_timeout_default);
365         if (is_thermal_shutdown && shutdown_timeout_final > max_thermal_shutdown_timeout) {
366             shutdown_timeout_final = max_thermal_shutdown_timeout;
367         }
368         shutdown_timeout = std::chrono::seconds(shutdown_timeout_final);
369     }
370     LOG(INFO) << "Shutdown timeout: " << shutdown_timeout.count() << " ms";
371 
372     // keep debugging tools until non critical ones are all gone.
373     const std::set<std::string> kill_after_apps{"tombstoned", "logd", "adbd"};
374     // watchdogd is a vendor specific component but should be alive to complete shutdown safely.
375     const std::set<std::string> to_starts{"watchdogd"};
376     for (const auto& s : ServiceList::GetInstance()) {
377         if (kill_after_apps.count(s->name())) {
378             s->SetShutdownCritical();
379         } else if (to_starts.count(s->name())) {
380             if (auto result = s->Start(); !result) {
381                 LOG(ERROR) << "Could not start shutdown 'to_start' service '" << s->name()
382                            << "': " << result.error();
383             }
384             s->SetShutdownCritical();
385         } else if (s->IsShutdownCritical()) {
386             // Start shutdown critical service if not started.
387             if (auto result = s->Start(); !result) {
388                 LOG(ERROR) << "Could not start shutdown critical service '" << s->name()
389                            << "': " << result.error();
390             }
391         }
392     }
393 
394     // remaining operations (specifically fsck) may take a substantial duration
395     if (cmd == ANDROID_RB_POWEROFF || is_thermal_shutdown) {
396         TurnOffBacklight();
397     }
398 
399     Service* bootAnim = ServiceList::GetInstance().FindService("bootanim");
400     Service* surfaceFlinger = ServiceList::GetInstance().FindService("surfaceflinger");
401     if (bootAnim != nullptr && surfaceFlinger != nullptr && surfaceFlinger->IsRunning()) {
402         bool do_shutdown_animation = GetBoolProperty("ro.init.shutdown_animation", false);
403 
404         if (do_shutdown_animation) {
405             property_set("service.bootanim.exit", "0");
406             // Could be in the middle of animation. Stop and start so that it can pick
407             // up the right mode.
408             bootAnim->Stop();
409         }
410 
411         for (const auto& service : ServiceList::GetInstance()) {
412             if (service->classnames().count("animation") == 0) {
413                 continue;
414             }
415 
416             // start all animation classes if stopped.
417             if (do_shutdown_animation) {
418                 service->Start().IgnoreError();
419             }
420             service->SetShutdownCritical();  // will not check animation class separately
421         }
422 
423         if (do_shutdown_animation) {
424             bootAnim->Start().IgnoreError();
425             surfaceFlinger->SetShutdownCritical();
426             bootAnim->SetShutdownCritical();
427         }
428     }
429 
430     // optional shutdown step
431     // 1. terminate all services except shutdown critical ones. wait for delay to finish
432     if (shutdown_timeout > 0ms) {
433         LOG(INFO) << "terminating init services";
434 
435         // Ask all services to terminate except shutdown critical ones.
436         for (const auto& s : ServiceList::GetInstance().services_in_shutdown_order()) {
437             if (!s->IsShutdownCritical()) s->Terminate();
438         }
439 
440         int service_count = 0;
441         // Only wait up to half of timeout here
442         auto termination_wait_timeout = shutdown_timeout / 2;
443         while (t.duration() < termination_wait_timeout) {
444             ReapAnyOutstandingChildren();
445 
446             service_count = 0;
447             for (const auto& s : ServiceList::GetInstance()) {
448                 // Count the number of services running except shutdown critical.
449                 // Exclude the console as it will ignore the SIGTERM signal
450                 // and not exit.
451                 // Note: SVC_CONSOLE actually means "requires console" but
452                 // it is only used by the shell.
453                 if (!s->IsShutdownCritical() && s->pid() != 0 && (s->flags() & SVC_CONSOLE) == 0) {
454                     service_count++;
455                 }
456             }
457 
458             if (service_count == 0) {
459                 // All terminable services terminated. We can exit early.
460                 break;
461             }
462 
463             // Wait a bit before recounting the number or running services.
464             std::this_thread::sleep_for(50ms);
465         }
466         LOG(INFO) << "Terminating running services took " << t
467                   << " with remaining services:" << service_count;
468     }
469 
470     // minimum safety steps before restarting
471     // 2. kill all services except ones that are necessary for the shutdown sequence.
472     for (const auto& s : ServiceList::GetInstance().services_in_shutdown_order()) {
473         if (!s->IsShutdownCritical()) s->Stop();
474     }
475     SubcontextTerminate();
476     ReapAnyOutstandingChildren();
477 
478     // 3. send volume shutdown to vold
479     Service* voldService = ServiceList::GetInstance().FindService("vold");
480     if (voldService != nullptr && voldService->IsRunning()) {
481         ShutdownVold();
482         voldService->Stop();
483     } else {
484         LOG(INFO) << "vold not running, skipping vold shutdown";
485     }
486     // logcat stopped here
487     for (const auto& s : ServiceList::GetInstance().services_in_shutdown_order()) {
488         if (kill_after_apps.count(s->name())) s->Stop();
489     }
490     // 4. sync, try umount, and optionally run fsck for user shutdown
491     {
492         Timer sync_timer;
493         LOG(INFO) << "sync() before umount...";
494         sync();
495         LOG(INFO) << "sync() before umount took" << sync_timer;
496     }
497     // 5. drop caches and disable zram backing device, if exist
498     KillZramBackingDevice();
499 
500     UmountStat stat = TryUmountAndFsck(runFsck, shutdown_timeout - t.duration());
501     // Follow what linux shutdown is doing: one more sync with little bit delay
502     {
503         Timer sync_timer;
504         LOG(INFO) << "sync() after umount...";
505         sync();
506         LOG(INFO) << "sync() after umount took" << sync_timer;
507     }
508     if (!is_thermal_shutdown) std::this_thread::sleep_for(100ms);
509     LogShutdownTime(stat, &t);
510     // Reboot regardless of umount status. If umount fails, fsck after reboot will fix it.
511     RebootSystem(cmd, rebootTarget);
512     abort();
513 }
514 
HandlePowerctlMessage(const std::string & command)515 bool HandlePowerctlMessage(const std::string& command) {
516     unsigned int cmd = 0;
517     std::vector<std::string> cmd_params = Split(command, ",");
518     std::string reboot_target = "";
519     bool run_fsck = false;
520     bool command_invalid = false;
521 
522     if (cmd_params.size() > 3) {
523         command_invalid = true;
524     } else if (cmd_params[0] == "shutdown") {
525         cmd = ANDROID_RB_POWEROFF;
526         if (cmd_params.size() == 2) {
527             if (cmd_params[1] == "userrequested") {
528                 // The shutdown reason is PowerManager.SHUTDOWN_USER_REQUESTED.
529                 // Run fsck once the file system is remounted in read-only mode.
530                 run_fsck = true;
531             } else if (cmd_params[1] == "thermal") {
532                 // Turn off sources of heat immediately.
533                 TurnOffBacklight();
534                 // run_fsck is false to avoid delay
535                 cmd = ANDROID_RB_THERMOFF;
536             }
537         }
538     } else if (cmd_params[0] == "reboot") {
539         cmd = ANDROID_RB_RESTART2;
540         if (cmd_params.size() >= 2) {
541             reboot_target = cmd_params[1];
542             // adb reboot fastboot should boot into bootloader for devices not
543             // supporting logical partitions.
544             if (reboot_target == "fastboot" &&
545                 !android::base::GetBoolProperty("ro.boot.dynamic_partitions", false)) {
546                 reboot_target = "bootloader";
547             }
548             // When rebooting to the bootloader notify the bootloader writing
549             // also the BCB.
550             if (reboot_target == "bootloader") {
551                 std::string err;
552                 if (!write_reboot_bootloader(&err)) {
553                     LOG(ERROR) << "reboot-bootloader: Error writing "
554                                   "bootloader_message: "
555                                << err;
556                 }
557             } else if (reboot_target == "sideload" || reboot_target == "sideload-auto-reboot" ||
558                        reboot_target == "fastboot") {
559                 std::string arg = reboot_target == "sideload-auto-reboot" ? "sideload_auto_reboot"
560                                                                           : reboot_target;
561                 const std::vector<std::string> options = {
562                         "--" + arg,
563                 };
564                 std::string err;
565                 if (!write_bootloader_message(options, &err)) {
566                     LOG(ERROR) << "Failed to set bootloader message: " << err;
567                     return false;
568                 }
569                 reboot_target = "recovery";
570             }
571 
572             // If there is an additional parameter, pass it along
573             if ((cmd_params.size() == 3) && cmd_params[2].size()) {
574                 reboot_target += "," + cmd_params[2];
575             }
576         }
577     } else {
578         command_invalid = true;
579     }
580     if (command_invalid) {
581         LOG(ERROR) << "powerctl: unrecognized command '" << command << "'";
582         return false;
583     }
584 
585     LOG(INFO) << "Clear action queue and start shutdown trigger";
586     ActionManager::GetInstance().ClearQueue();
587     // Queue shutdown trigger first
588     ActionManager::GetInstance().QueueEventTrigger("shutdown");
589     // Queue built-in shutdown_done
590     auto shutdown_handler = [cmd, command, reboot_target, run_fsck](const BuiltinArguments&) {
591         DoReboot(cmd, command, reboot_target, run_fsck);
592         return Success();
593     };
594     ActionManager::GetInstance().QueueBuiltinAction(shutdown_handler, "shutdown_done");
595 
596     // Skip wait for prop if it is in progress
597     ResetWaitForProp();
598 
599     // Clear EXEC flag if there is one pending
600     for (const auto& s : ServiceList::GetInstance()) {
601         s->UnSetExec();
602     }
603 
604     return true;
605 }
606 
607 }  // namespace init
608 }  // namespace android
609