1 /*
2 * Copyright (C) 2017 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #include "reboot.h"
18
19 #include <dirent.h>
20 #include <fcntl.h>
21 #include <linux/fs.h>
22 #include <mntent.h>
23 #include <linux/loop.h>
24 #include <sys/cdefs.h>
25 #include <sys/ioctl.h>
26 #include <sys/mount.h>
27 #include <sys/swap.h>
28 #include <sys/stat.h>
29 #include <sys/syscall.h>
30 #include <sys/types.h>
31 #include <sys/wait.h>
32
33 #include <memory>
34 #include <set>
35 #include <thread>
36 #include <vector>
37
38 #include <android-base/chrono_utils.h>
39 #include <android-base/file.h>
40 #include <android-base/logging.h>
41 #include <android-base/macros.h>
42 #include <android-base/properties.h>
43 #include <android-base/stringprintf.h>
44 #include <android-base/strings.h>
45 #include <android-base/unique_fd.h>
46 #include <bootloader_message/bootloader_message.h>
47 #include <cutils/android_reboot.h>
48 #include <fs_mgr.h>
49 #include <logwrap/logwrap.h>
50 #include <private/android_filesystem_config.h>
51 #include <selinux/selinux.h>
52
53 #include "action_manager.h"
54 #include "init.h"
55 #include "property_service.h"
56 #include "reboot_utils.h"
57 #include "service.h"
58 #include "sigchld_handler.h"
59
60 using android::base::GetBoolProperty;
61 using android::base::Split;
62 using android::base::StringPrintf;
63 using android::base::Timer;
64 using android::base::unique_fd;
65
66 namespace android {
67 namespace init {
68
69 // represents umount status during reboot / shutdown.
70 enum UmountStat {
71 /* umount succeeded. */
72 UMOUNT_STAT_SUCCESS = 0,
73 /* umount was not run. */
74 UMOUNT_STAT_SKIPPED = 1,
75 /* umount failed with timeout. */
76 UMOUNT_STAT_TIMEOUT = 2,
77 /* could not run due to error */
78 UMOUNT_STAT_ERROR = 3,
79 /* not used by init but reserved for other part to use this to represent the
80 the state where umount status before reboot is not found / available. */
81 UMOUNT_STAT_NOT_AVAILABLE = 4,
82 };
83
84 // Utility for struct mntent
85 class MountEntry {
86 public:
MountEntry(const mntent & entry)87 explicit MountEntry(const mntent& entry)
88 : mnt_fsname_(entry.mnt_fsname),
89 mnt_dir_(entry.mnt_dir),
90 mnt_type_(entry.mnt_type),
91 mnt_opts_(entry.mnt_opts) {}
92
Umount(bool force)93 bool Umount(bool force) {
94 LOG(INFO) << "Unmounting " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_;
95 int r = umount2(mnt_dir_.c_str(), force ? MNT_FORCE : 0);
96 if (r == 0) {
97 LOG(INFO) << "Umounted " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_;
98 return true;
99 } else {
100 PLOG(WARNING) << "Cannot umount " << mnt_fsname_ << ":" << mnt_dir_ << " opts "
101 << mnt_opts_;
102 return false;
103 }
104 }
105
DoFsck()106 void DoFsck() {
107 int st;
108 if (IsF2Fs()) {
109 const char* f2fs_argv[] = {
110 "/system/bin/fsck.f2fs",
111 "-a",
112 mnt_fsname_.c_str(),
113 };
114 android_fork_execvp_ext(arraysize(f2fs_argv), (char**)f2fs_argv, &st, true, LOG_KLOG,
115 true, nullptr, nullptr, 0);
116 } else if (IsExt4()) {
117 const char* ext4_argv[] = {
118 "/system/bin/e2fsck",
119 "-y",
120 mnt_fsname_.c_str(),
121 };
122 android_fork_execvp_ext(arraysize(ext4_argv), (char**)ext4_argv, &st, true, LOG_KLOG,
123 true, nullptr, nullptr, 0);
124 }
125 }
126
IsBlockDevice(const struct mntent & mntent)127 static bool IsBlockDevice(const struct mntent& mntent) {
128 return android::base::StartsWith(mntent.mnt_fsname, "/dev/block");
129 }
130
IsEmulatedDevice(const struct mntent & mntent)131 static bool IsEmulatedDevice(const struct mntent& mntent) {
132 return android::base::StartsWith(mntent.mnt_fsname, "/data/");
133 }
134
135 private:
IsF2Fs() const136 bool IsF2Fs() const { return mnt_type_ == "f2fs"; }
137
IsExt4() const138 bool IsExt4() const { return mnt_type_ == "ext4"; }
139
140 std::string mnt_fsname_;
141 std::string mnt_dir_;
142 std::string mnt_type_;
143 std::string mnt_opts_;
144 };
145
146 // Turn off backlight while we are performing power down cleanup activities.
TurnOffBacklight()147 static void TurnOffBacklight() {
148 Service* service = ServiceList::GetInstance().FindService("blank_screen");
149 if (service == nullptr) {
150 LOG(WARNING) << "cannot find blank_screen in TurnOffBacklight";
151 return;
152 }
153 if (auto result = service->Start(); !result) {
154 LOG(WARNING) << "Could not start blank_screen service: " << result.error();
155 }
156 }
157
ShutdownVold()158 static void ShutdownVold() {
159 const char* vdc_argv[] = {"/system/bin/vdc", "volume", "shutdown"};
160 int status;
161 android_fork_execvp_ext(arraysize(vdc_argv), (char**)vdc_argv, &status, true, LOG_KLOG, true,
162 nullptr, nullptr, 0);
163 }
164
LogShutdownTime(UmountStat stat,Timer * t)165 static void LogShutdownTime(UmountStat stat, Timer* t) {
166 LOG(WARNING) << "powerctl_shutdown_time_ms:" << std::to_string(t->duration().count()) << ":"
167 << stat;
168 }
169
170 /* Find all read+write block devices and emulated devices in /proc/mounts
171 * and add them to correpsponding list.
172 */
FindPartitionsToUmount(std::vector<MountEntry> * blockDevPartitions,std::vector<MountEntry> * emulatedPartitions,bool dump)173 static bool FindPartitionsToUmount(std::vector<MountEntry>* blockDevPartitions,
174 std::vector<MountEntry>* emulatedPartitions, bool dump) {
175 std::unique_ptr<std::FILE, int (*)(std::FILE*)> fp(setmntent("/proc/mounts", "re"), endmntent);
176 if (fp == nullptr) {
177 PLOG(ERROR) << "Failed to open /proc/mounts";
178 return false;
179 }
180 mntent* mentry;
181 while ((mentry = getmntent(fp.get())) != nullptr) {
182 if (dump) {
183 LOG(INFO) << "mount entry " << mentry->mnt_fsname << ":" << mentry->mnt_dir << " opts "
184 << mentry->mnt_opts << " type " << mentry->mnt_type;
185 } else if (MountEntry::IsBlockDevice(*mentry) && hasmntopt(mentry, "rw")) {
186 std::string mount_dir(mentry->mnt_dir);
187 // These are R/O partitions changed to R/W after adb remount.
188 // Do not umount them as shutdown critical services may rely on them.
189 if (mount_dir != "/" && mount_dir != "/system" && mount_dir != "/vendor" &&
190 mount_dir != "/oem") {
191 blockDevPartitions->emplace(blockDevPartitions->begin(), *mentry);
192 }
193 } else if (MountEntry::IsEmulatedDevice(*mentry)) {
194 emulatedPartitions->emplace(emulatedPartitions->begin(), *mentry);
195 }
196 }
197 return true;
198 }
199
DumpUmountDebuggingInfo()200 static void DumpUmountDebuggingInfo() {
201 int status;
202 if (!security_getenforce()) {
203 LOG(INFO) << "Run lsof";
204 const char* lsof_argv[] = {"/system/bin/lsof"};
205 android_fork_execvp_ext(arraysize(lsof_argv), (char**)lsof_argv, &status, true, LOG_KLOG,
206 true, nullptr, nullptr, 0);
207 }
208 FindPartitionsToUmount(nullptr, nullptr, true);
209 // dump current CPU stack traces and uninterruptible tasks
210 android::base::WriteStringToFile("l", "/proc/sysrq-trigger");
211 android::base::WriteStringToFile("w", "/proc/sysrq-trigger");
212 }
213
UmountPartitions(std::chrono::milliseconds timeout)214 static UmountStat UmountPartitions(std::chrono::milliseconds timeout) {
215 Timer t;
216 /* data partition needs all pending writes to be completed and all emulated partitions
217 * umounted.If the current waiting is not good enough, give
218 * up and leave it to e2fsck after reboot to fix it.
219 */
220 while (true) {
221 std::vector<MountEntry> block_devices;
222 std::vector<MountEntry> emulated_devices;
223 if (!FindPartitionsToUmount(&block_devices, &emulated_devices, false)) {
224 return UMOUNT_STAT_ERROR;
225 }
226 if (block_devices.size() == 0) {
227 return UMOUNT_STAT_SUCCESS;
228 }
229 bool unmount_done = true;
230 if (emulated_devices.size() > 0) {
231 for (auto& entry : emulated_devices) {
232 if (!entry.Umount(false)) unmount_done = false;
233 }
234 if (unmount_done) {
235 sync();
236 }
237 }
238 for (auto& entry : block_devices) {
239 if (!entry.Umount(timeout == 0ms)) unmount_done = false;
240 }
241 if (unmount_done) {
242 return UMOUNT_STAT_SUCCESS;
243 }
244 if ((timeout < t.duration())) { // try umount at least once
245 return UMOUNT_STAT_TIMEOUT;
246 }
247 std::this_thread::sleep_for(100ms);
248 }
249 }
250
KillAllProcesses()251 static void KillAllProcesses() { android::base::WriteStringToFile("i", "/proc/sysrq-trigger"); }
252
253 /* Try umounting all emulated file systems R/W block device cfile systems.
254 * This will just try umount and give it up if it fails.
255 * For fs like ext4, this is ok as file system will be marked as unclean shutdown
256 * and necessary check can be done at the next reboot.
257 * For safer shutdown, caller needs to make sure that
258 * all processes / emulated partition for the target fs are all cleaned-up.
259 *
260 * return true when umount was successful. false when timed out.
261 */
TryUmountAndFsck(bool runFsck,std::chrono::milliseconds timeout)262 static UmountStat TryUmountAndFsck(bool runFsck, std::chrono::milliseconds timeout) {
263 Timer t;
264 std::vector<MountEntry> block_devices;
265 std::vector<MountEntry> emulated_devices;
266
267 if (runFsck && !FindPartitionsToUmount(&block_devices, &emulated_devices, false)) {
268 return UMOUNT_STAT_ERROR;
269 }
270
271 UmountStat stat = UmountPartitions(timeout - t.duration());
272 if (stat != UMOUNT_STAT_SUCCESS) {
273 LOG(INFO) << "umount timeout, last resort, kill all and try";
274 if (DUMP_ON_UMOUNT_FAILURE) DumpUmountDebuggingInfo();
275 KillAllProcesses();
276 // even if it succeeds, still it is timeout and do not run fsck with all processes killed
277 UmountStat st = UmountPartitions(0ms);
278 if ((st != UMOUNT_STAT_SUCCESS) && DUMP_ON_UMOUNT_FAILURE) DumpUmountDebuggingInfo();
279 }
280
281 if (stat == UMOUNT_STAT_SUCCESS && runFsck) {
282 // fsck part is excluded from timeout check. It only runs for user initiated shutdown
283 // and should not affect reboot time.
284 for (auto& entry : block_devices) {
285 entry.DoFsck();
286 }
287 }
288 return stat;
289 }
290
291 // zram is able to use backing device on top of a loopback device.
292 // In order to unmount /data successfully, we have to kill the loopback device first
293 #define ZRAM_DEVICE "/dev/block/zram0"
294 #define ZRAM_RESET "/sys/block/zram0/reset"
295 #define ZRAM_BACK_DEV "/sys/block/zram0/backing_dev"
KillZramBackingDevice()296 static void KillZramBackingDevice() {
297 std::string backing_dev;
298 if (!android::base::ReadFileToString(ZRAM_BACK_DEV, &backing_dev)) return;
299
300 if (!android::base::StartsWith(backing_dev, "/dev/block/loop")) return;
301
302 // cut the last "\n"
303 backing_dev.erase(backing_dev.length() - 1);
304
305 // shutdown zram handle
306 Timer swap_timer;
307 LOG(INFO) << "swapoff() start...";
308 if (swapoff(ZRAM_DEVICE) == -1) {
309 LOG(ERROR) << "zram_backing_dev: swapoff (" << backing_dev << ")" << " failed";
310 return;
311 }
312 LOG(INFO) << "swapoff() took " << swap_timer;;
313
314 if (!android::base::WriteStringToFile("1", ZRAM_RESET)) {
315 LOG(ERROR) << "zram_backing_dev: reset (" << backing_dev << ")" << " failed";
316 return;
317 }
318
319 // clear loopback device
320 unique_fd loop(TEMP_FAILURE_RETRY(open(backing_dev.c_str(), O_RDWR | O_CLOEXEC)));
321 if (loop.get() < 0) {
322 LOG(ERROR) << "zram_backing_dev: open(" << backing_dev << ")" << " failed";
323 return;
324 }
325
326 if (ioctl(loop.get(), LOOP_CLR_FD, 0) < 0) {
327 LOG(ERROR) << "zram_backing_dev: loop_clear (" << backing_dev << ")" << " failed";
328 return;
329 }
330 LOG(INFO) << "zram_backing_dev: `" << backing_dev << "` is cleared successfully.";
331 }
332
333 //* Reboot / shutdown the system.
334 // cmd ANDROID_RB_* as defined in android_reboot.h
335 // reason Reason string like "reboot", "shutdown,userrequested"
336 // rebootTarget Reboot target string like "bootloader". Otherwise, it should be an
337 // empty string.
338 // runFsck Whether to run fsck after umount is done.
339 //
DoReboot(unsigned int cmd,const std::string & reason,const std::string & rebootTarget,bool runFsck)340 static void DoReboot(unsigned int cmd, const std::string& reason, const std::string& rebootTarget,
341 bool runFsck) {
342 Timer t;
343 LOG(INFO) << "Reboot start, reason: " << reason << ", rebootTarget: " << rebootTarget;
344
345 // Ensure last reboot reason is reduced to canonical
346 // alias reported in bootloader or system boot reason.
347 size_t skip = 0;
348 std::vector<std::string> reasons = Split(reason, ",");
349 if (reasons.size() >= 2 && reasons[0] == "reboot" &&
350 (reasons[1] == "recovery" || reasons[1] == "bootloader" || reasons[1] == "cold" ||
351 reasons[1] == "hard" || reasons[1] == "warm")) {
352 skip = strlen("reboot,");
353 }
354 property_set(LAST_REBOOT_REASON_PROPERTY, reason.c_str() + skip);
355 sync();
356
357 bool is_thermal_shutdown = cmd == ANDROID_RB_THERMOFF;
358
359 auto shutdown_timeout = 0ms;
360 if (!SHUTDOWN_ZERO_TIMEOUT) {
361 constexpr unsigned int shutdown_timeout_default = 6;
362 constexpr unsigned int max_thermal_shutdown_timeout = 3;
363 auto shutdown_timeout_final = android::base::GetUintProperty("ro.build.shutdown_timeout",
364 shutdown_timeout_default);
365 if (is_thermal_shutdown && shutdown_timeout_final > max_thermal_shutdown_timeout) {
366 shutdown_timeout_final = max_thermal_shutdown_timeout;
367 }
368 shutdown_timeout = std::chrono::seconds(shutdown_timeout_final);
369 }
370 LOG(INFO) << "Shutdown timeout: " << shutdown_timeout.count() << " ms";
371
372 // keep debugging tools until non critical ones are all gone.
373 const std::set<std::string> kill_after_apps{"tombstoned", "logd", "adbd"};
374 // watchdogd is a vendor specific component but should be alive to complete shutdown safely.
375 const std::set<std::string> to_starts{"watchdogd"};
376 for (const auto& s : ServiceList::GetInstance()) {
377 if (kill_after_apps.count(s->name())) {
378 s->SetShutdownCritical();
379 } else if (to_starts.count(s->name())) {
380 if (auto result = s->Start(); !result) {
381 LOG(ERROR) << "Could not start shutdown 'to_start' service '" << s->name()
382 << "': " << result.error();
383 }
384 s->SetShutdownCritical();
385 } else if (s->IsShutdownCritical()) {
386 // Start shutdown critical service if not started.
387 if (auto result = s->Start(); !result) {
388 LOG(ERROR) << "Could not start shutdown critical service '" << s->name()
389 << "': " << result.error();
390 }
391 }
392 }
393
394 // remaining operations (specifically fsck) may take a substantial duration
395 if (cmd == ANDROID_RB_POWEROFF || is_thermal_shutdown) {
396 TurnOffBacklight();
397 }
398
399 Service* bootAnim = ServiceList::GetInstance().FindService("bootanim");
400 Service* surfaceFlinger = ServiceList::GetInstance().FindService("surfaceflinger");
401 if (bootAnim != nullptr && surfaceFlinger != nullptr && surfaceFlinger->IsRunning()) {
402 bool do_shutdown_animation = GetBoolProperty("ro.init.shutdown_animation", false);
403
404 if (do_shutdown_animation) {
405 property_set("service.bootanim.exit", "0");
406 // Could be in the middle of animation. Stop and start so that it can pick
407 // up the right mode.
408 bootAnim->Stop();
409 }
410
411 for (const auto& service : ServiceList::GetInstance()) {
412 if (service->classnames().count("animation") == 0) {
413 continue;
414 }
415
416 // start all animation classes if stopped.
417 if (do_shutdown_animation) {
418 service->Start().IgnoreError();
419 }
420 service->SetShutdownCritical(); // will not check animation class separately
421 }
422
423 if (do_shutdown_animation) {
424 bootAnim->Start().IgnoreError();
425 surfaceFlinger->SetShutdownCritical();
426 bootAnim->SetShutdownCritical();
427 }
428 }
429
430 // optional shutdown step
431 // 1. terminate all services except shutdown critical ones. wait for delay to finish
432 if (shutdown_timeout > 0ms) {
433 LOG(INFO) << "terminating init services";
434
435 // Ask all services to terminate except shutdown critical ones.
436 for (const auto& s : ServiceList::GetInstance().services_in_shutdown_order()) {
437 if (!s->IsShutdownCritical()) s->Terminate();
438 }
439
440 int service_count = 0;
441 // Only wait up to half of timeout here
442 auto termination_wait_timeout = shutdown_timeout / 2;
443 while (t.duration() < termination_wait_timeout) {
444 ReapAnyOutstandingChildren();
445
446 service_count = 0;
447 for (const auto& s : ServiceList::GetInstance()) {
448 // Count the number of services running except shutdown critical.
449 // Exclude the console as it will ignore the SIGTERM signal
450 // and not exit.
451 // Note: SVC_CONSOLE actually means "requires console" but
452 // it is only used by the shell.
453 if (!s->IsShutdownCritical() && s->pid() != 0 && (s->flags() & SVC_CONSOLE) == 0) {
454 service_count++;
455 }
456 }
457
458 if (service_count == 0) {
459 // All terminable services terminated. We can exit early.
460 break;
461 }
462
463 // Wait a bit before recounting the number or running services.
464 std::this_thread::sleep_for(50ms);
465 }
466 LOG(INFO) << "Terminating running services took " << t
467 << " with remaining services:" << service_count;
468 }
469
470 // minimum safety steps before restarting
471 // 2. kill all services except ones that are necessary for the shutdown sequence.
472 for (const auto& s : ServiceList::GetInstance().services_in_shutdown_order()) {
473 if (!s->IsShutdownCritical()) s->Stop();
474 }
475 SubcontextTerminate();
476 ReapAnyOutstandingChildren();
477
478 // 3. send volume shutdown to vold
479 Service* voldService = ServiceList::GetInstance().FindService("vold");
480 if (voldService != nullptr && voldService->IsRunning()) {
481 ShutdownVold();
482 voldService->Stop();
483 } else {
484 LOG(INFO) << "vold not running, skipping vold shutdown";
485 }
486 // logcat stopped here
487 for (const auto& s : ServiceList::GetInstance().services_in_shutdown_order()) {
488 if (kill_after_apps.count(s->name())) s->Stop();
489 }
490 // 4. sync, try umount, and optionally run fsck for user shutdown
491 {
492 Timer sync_timer;
493 LOG(INFO) << "sync() before umount...";
494 sync();
495 LOG(INFO) << "sync() before umount took" << sync_timer;
496 }
497 // 5. drop caches and disable zram backing device, if exist
498 KillZramBackingDevice();
499
500 UmountStat stat = TryUmountAndFsck(runFsck, shutdown_timeout - t.duration());
501 // Follow what linux shutdown is doing: one more sync with little bit delay
502 {
503 Timer sync_timer;
504 LOG(INFO) << "sync() after umount...";
505 sync();
506 LOG(INFO) << "sync() after umount took" << sync_timer;
507 }
508 if (!is_thermal_shutdown) std::this_thread::sleep_for(100ms);
509 LogShutdownTime(stat, &t);
510 // Reboot regardless of umount status. If umount fails, fsck after reboot will fix it.
511 RebootSystem(cmd, rebootTarget);
512 abort();
513 }
514
HandlePowerctlMessage(const std::string & command)515 bool HandlePowerctlMessage(const std::string& command) {
516 unsigned int cmd = 0;
517 std::vector<std::string> cmd_params = Split(command, ",");
518 std::string reboot_target = "";
519 bool run_fsck = false;
520 bool command_invalid = false;
521
522 if (cmd_params.size() > 3) {
523 command_invalid = true;
524 } else if (cmd_params[0] == "shutdown") {
525 cmd = ANDROID_RB_POWEROFF;
526 if (cmd_params.size() == 2) {
527 if (cmd_params[1] == "userrequested") {
528 // The shutdown reason is PowerManager.SHUTDOWN_USER_REQUESTED.
529 // Run fsck once the file system is remounted in read-only mode.
530 run_fsck = true;
531 } else if (cmd_params[1] == "thermal") {
532 // Turn off sources of heat immediately.
533 TurnOffBacklight();
534 // run_fsck is false to avoid delay
535 cmd = ANDROID_RB_THERMOFF;
536 }
537 }
538 } else if (cmd_params[0] == "reboot") {
539 cmd = ANDROID_RB_RESTART2;
540 if (cmd_params.size() >= 2) {
541 reboot_target = cmd_params[1];
542 // adb reboot fastboot should boot into bootloader for devices not
543 // supporting logical partitions.
544 if (reboot_target == "fastboot" &&
545 !android::base::GetBoolProperty("ro.boot.dynamic_partitions", false)) {
546 reboot_target = "bootloader";
547 }
548 // When rebooting to the bootloader notify the bootloader writing
549 // also the BCB.
550 if (reboot_target == "bootloader") {
551 std::string err;
552 if (!write_reboot_bootloader(&err)) {
553 LOG(ERROR) << "reboot-bootloader: Error writing "
554 "bootloader_message: "
555 << err;
556 }
557 } else if (reboot_target == "sideload" || reboot_target == "sideload-auto-reboot" ||
558 reboot_target == "fastboot") {
559 std::string arg = reboot_target == "sideload-auto-reboot" ? "sideload_auto_reboot"
560 : reboot_target;
561 const std::vector<std::string> options = {
562 "--" + arg,
563 };
564 std::string err;
565 if (!write_bootloader_message(options, &err)) {
566 LOG(ERROR) << "Failed to set bootloader message: " << err;
567 return false;
568 }
569 reboot_target = "recovery";
570 }
571
572 // If there is an additional parameter, pass it along
573 if ((cmd_params.size() == 3) && cmd_params[2].size()) {
574 reboot_target += "," + cmd_params[2];
575 }
576 }
577 } else {
578 command_invalid = true;
579 }
580 if (command_invalid) {
581 LOG(ERROR) << "powerctl: unrecognized command '" << command << "'";
582 return false;
583 }
584
585 LOG(INFO) << "Clear action queue and start shutdown trigger";
586 ActionManager::GetInstance().ClearQueue();
587 // Queue shutdown trigger first
588 ActionManager::GetInstance().QueueEventTrigger("shutdown");
589 // Queue built-in shutdown_done
590 auto shutdown_handler = [cmd, command, reboot_target, run_fsck](const BuiltinArguments&) {
591 DoReboot(cmd, command, reboot_target, run_fsck);
592 return Success();
593 };
594 ActionManager::GetInstance().QueueBuiltinAction(shutdown_handler, "shutdown_done");
595
596 // Skip wait for prop if it is in progress
597 ResetWaitForProp();
598
599 // Clear EXEC flag if there is one pending
600 for (const auto& s : ServiceList::GetInstance()) {
601 s->UnSetExec();
602 }
603
604 return true;
605 }
606
607 } // namespace init
608 } // namespace android
609