• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2017 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include "reboot.h"
18 
19 #include <dirent.h>
20 #include <fcntl.h>
21 #include <linux/f2fs.h>
22 #include <linux/fs.h>
23 #include <linux/loop.h>
24 #include <mntent.h>
25 #include <semaphore.h>
26 #include <stdlib.h>
27 #include <sys/cdefs.h>
28 #include <sys/ioctl.h>
29 #include <sys/mount.h>
30 #include <sys/stat.h>
31 #include <sys/swap.h>
32 #include <sys/syscall.h>
33 #include <sys/types.h>
34 #include <sys/wait.h>
35 
36 #include <chrono>
37 #include <memory>
38 #include <set>
39 #include <thread>
40 #include <vector>
41 
42 #include <InitProperties.sysprop.h>
43 #include <android-base/chrono_utils.h>
44 #include <android-base/file.h>
45 #include <android-base/logging.h>
46 #include <android-base/macros.h>
47 #include <android-base/properties.h>
48 #include <android-base/scopeguard.h>
49 #include <android-base/strings.h>
50 #include <android-base/unique_fd.h>
51 #include <bootloader_message/bootloader_message.h>
52 #include <cutils/android_reboot.h>
53 #include <fs_mgr.h>
54 #include <libsnapshot/snapshot.h>
55 #include <logwrap/logwrap.h>
56 #include <private/android_filesystem_config.h>
57 #include <selinux/selinux.h>
58 
59 #include "action.h"
60 #include "action_manager.h"
61 #include "builtin_arguments.h"
62 #include "init.h"
63 #include "mount_namespace.h"
64 #include "property_service.h"
65 #include "reboot_utils.h"
66 #include "service.h"
67 #include "service_list.h"
68 #include "sigchld_handler.h"
69 #include "util.h"
70 
71 using namespace std::literals;
72 
73 using android::base::boot_clock;
74 using android::base::GetBoolProperty;
75 using android::base::GetUintProperty;
76 using android::base::SetProperty;
77 using android::base::Split;
78 using android::base::Timer;
79 using android::base::unique_fd;
80 using android::base::WaitForProperty;
81 using android::base::WriteStringToFile;
82 
83 namespace android {
84 namespace init {
85 
86 static bool shutting_down = false;
87 
88 static const std::set<std::string> kDebuggingServices{"tombstoned", "logd", "adbd", "console"};
89 
GetPostDataDebuggingServices()90 static std::set<std::string> GetPostDataDebuggingServices() {
91     std::set<std::string> ret;
92     for (const auto& s : ServiceList::GetInstance()) {
93         if (kDebuggingServices.count(s->name()) && s->is_post_data()) {
94             ret.insert(s->name());
95         }
96     }
97     return ret;
98 }
99 
PersistRebootReason(const char * reason,bool write_to_property)100 static void PersistRebootReason(const char* reason, bool write_to_property) {
101     if (write_to_property) {
102         SetProperty(LAST_REBOOT_REASON_PROPERTY, reason);
103     }
104     auto fd = unique_fd(TEMP_FAILURE_RETRY(open(
105             LAST_REBOOT_REASON_FILE, O_WRONLY | O_CREAT | O_TRUNC | O_CLOEXEC | O_BINARY, 0666)));
106     if (!fd.ok()) {
107         PLOG(ERROR) << "Could not open '" << LAST_REBOOT_REASON_FILE
108                     << "' to persist reboot reason";
109         return;
110     }
111     WriteStringToFd(reason, fd);
112     fsync(fd.get());
113 }
114 
115 // represents umount status during reboot / shutdown.
116 enum UmountStat {
117     /* umount succeeded. */
118     UMOUNT_STAT_SUCCESS = 0,
119     /* umount was not run. */
120     UMOUNT_STAT_SKIPPED = 1,
121     /* umount failed with timeout. */
122     UMOUNT_STAT_TIMEOUT = 2,
123     /* could not run due to error */
124     UMOUNT_STAT_ERROR = 3,
125     /* not used by init but reserved for other part to use this to represent the
126        the state where umount status before reboot is not found / available. */
127     UMOUNT_STAT_NOT_AVAILABLE = 4,
128 };
129 
130 // Utility for struct mntent
131 class MountEntry {
132   public:
MountEntry(const mntent & entry)133     explicit MountEntry(const mntent& entry)
134         : mnt_fsname_(entry.mnt_fsname),
135           mnt_dir_(entry.mnt_dir),
136           mnt_type_(entry.mnt_type),
137           mnt_opts_(entry.mnt_opts) {}
138 
Umount(bool force)139     bool Umount(bool force) {
140         LOG(INFO) << "Unmounting " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_;
141         int r = umount2(mnt_dir_.c_str(), force ? MNT_FORCE : 0);
142         if (r == 0) {
143             LOG(INFO) << "Umounted " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_;
144             return true;
145         } else {
146             PLOG(WARNING) << "Cannot umount " << mnt_fsname_ << ":" << mnt_dir_ << " opts "
147                           << mnt_opts_;
148             return false;
149         }
150     }
151 
DoFsck()152     void DoFsck() {
153         int st;
154         if (IsF2Fs()) {
155             const char* f2fs_argv[] = {
156                     "/system/bin/fsck.f2fs",
157                     "-a",
158                     mnt_fsname_.c_str(),
159             };
160             logwrap_fork_execvp(arraysize(f2fs_argv), f2fs_argv, &st, false, LOG_KLOG, true,
161                                 nullptr);
162         } else if (IsExt4()) {
163             const char* ext4_argv[] = {
164                     "/system/bin/e2fsck",
165                     "-y",
166                     mnt_fsname_.c_str(),
167             };
168             logwrap_fork_execvp(arraysize(ext4_argv), ext4_argv, &st, false, LOG_KLOG, true,
169                                 nullptr);
170         }
171     }
172 
IsBlockDevice(const struct mntent & mntent)173     static bool IsBlockDevice(const struct mntent& mntent) {
174         return android::base::StartsWith(mntent.mnt_fsname, "/dev/block");
175     }
176 
IsEmulatedDevice(const struct mntent & mntent)177     static bool IsEmulatedDevice(const struct mntent& mntent) {
178         return android::base::StartsWith(mntent.mnt_fsname, "/data/");
179     }
180 
181   private:
IsF2Fs() const182     bool IsF2Fs() const { return mnt_type_ == "f2fs"; }
183 
IsExt4() const184     bool IsExt4() const { return mnt_type_ == "ext4"; }
185 
186     std::string mnt_fsname_;
187     std::string mnt_dir_;
188     std::string mnt_type_;
189     std::string mnt_opts_;
190 };
191 
192 // Turn off backlight while we are performing power down cleanup activities.
TurnOffBacklight()193 static void TurnOffBacklight() {
194     Service* service = ServiceList::GetInstance().FindService("blank_screen");
195     if (service == nullptr) {
196         LOG(WARNING) << "cannot find blank_screen in TurnOffBacklight";
197         return;
198     }
199     if (auto result = service->Start(); !result.ok()) {
200         LOG(WARNING) << "Could not start blank_screen service: " << result.error();
201     }
202 }
203 
CallVdc(const std::string & system,const std::string & cmd)204 static Result<void> CallVdc(const std::string& system, const std::string& cmd) {
205     LOG(INFO) << "Calling /system/bin/vdc " << system << " " << cmd;
206     const char* vdc_argv[] = {"/system/bin/vdc", system.c_str(), cmd.c_str()};
207     int status;
208     if (logwrap_fork_execvp(arraysize(vdc_argv), vdc_argv, &status, false, LOG_KLOG, true,
209                             nullptr) != 0) {
210         return ErrnoError() << "Failed to call '/system/bin/vdc " << system << " " << cmd << "'";
211     }
212     if (WIFEXITED(status) && WEXITSTATUS(status) == 0) {
213         return {};
214     }
215     return Error() << "'/system/bin/vdc " << system << " " << cmd << "' failed : " << status;
216 }
217 
LogShutdownTime(UmountStat stat,Timer * t)218 static void LogShutdownTime(UmountStat stat, Timer* t) {
219     LOG(WARNING) << "powerctl_shutdown_time_ms:" << std::to_string(t->duration().count()) << ":"
220                  << stat;
221 }
222 
IsDataMounted(const std::string & fstype)223 static bool IsDataMounted(const std::string& fstype) {
224     std::unique_ptr<std::FILE, int (*)(std::FILE*)> fp(setmntent("/proc/mounts", "re"), endmntent);
225     if (fp == nullptr) {
226         PLOG(ERROR) << "Failed to open /proc/mounts";
227         return false;
228     }
229     mntent* mentry;
230     while ((mentry = getmntent(fp.get())) != nullptr) {
231         if (mentry->mnt_dir == "/data"s) {
232             return fstype == "*" || mentry->mnt_type == fstype;
233         }
234     }
235     return false;
236 }
237 
238 // Find all read+write block devices and emulated devices in /proc/mounts and add them to
239 // the correpsponding list.
FindPartitionsToUmount(std::vector<MountEntry> * block_dev_partitions,std::vector<MountEntry> * emulated_partitions,bool dump)240 static bool FindPartitionsToUmount(std::vector<MountEntry>* block_dev_partitions,
241                                    std::vector<MountEntry>* emulated_partitions, bool dump) {
242     std::unique_ptr<std::FILE, int (*)(std::FILE*)> fp(setmntent("/proc/mounts", "re"), endmntent);
243     if (fp == nullptr) {
244         PLOG(ERROR) << "Failed to open /proc/mounts";
245         return false;
246     }
247     mntent* mentry;
248     while ((mentry = getmntent(fp.get())) != nullptr) {
249         if (dump) {
250             LOG(INFO) << "mount entry " << mentry->mnt_fsname << ":" << mentry->mnt_dir << " opts "
251                       << mentry->mnt_opts << " type " << mentry->mnt_type;
252         } else if (MountEntry::IsBlockDevice(*mentry) && hasmntopt(mentry, "rw")) {
253             std::string mount_dir(mentry->mnt_dir);
254             // These are R/O partitions changed to R/W after adb remount.
255             // Do not umount them as shutdown critical services may rely on them.
256             if (mount_dir != "/" && mount_dir != "/system" && mount_dir != "/vendor" &&
257                 mount_dir != "/oem") {
258                 block_dev_partitions->emplace(block_dev_partitions->begin(), *mentry);
259             }
260         } else if (MountEntry::IsEmulatedDevice(*mentry)) {
261             emulated_partitions->emplace(emulated_partitions->begin(), *mentry);
262         }
263     }
264     return true;
265 }
266 
DumpUmountDebuggingInfo()267 static void DumpUmountDebuggingInfo() {
268     int status;
269     if (!security_getenforce()) {
270         LOG(INFO) << "Run lsof";
271         const char* lsof_argv[] = {"/system/bin/lsof"};
272         logwrap_fork_execvp(arraysize(lsof_argv), lsof_argv, &status, false, LOG_KLOG, true,
273                             nullptr);
274     }
275     FindPartitionsToUmount(nullptr, nullptr, true);
276     // dump current CPU stack traces and uninterruptible tasks
277     WriteStringToFile("l", PROC_SYSRQ);
278     WriteStringToFile("w", PROC_SYSRQ);
279 }
280 
UmountPartitions(std::chrono::milliseconds timeout)281 static UmountStat UmountPartitions(std::chrono::milliseconds timeout) {
282     Timer t;
283     /* data partition needs all pending writes to be completed and all emulated partitions
284      * umounted.If the current waiting is not good enough, give
285      * up and leave it to e2fsck after reboot to fix it.
286      */
287     while (true) {
288         std::vector<MountEntry> block_devices;
289         std::vector<MountEntry> emulated_devices;
290         if (!FindPartitionsToUmount(&block_devices, &emulated_devices, false)) {
291             return UMOUNT_STAT_ERROR;
292         }
293         if (block_devices.size() == 0) {
294             return UMOUNT_STAT_SUCCESS;
295         }
296         bool unmount_done = true;
297         if (emulated_devices.size() > 0) {
298             for (auto& entry : emulated_devices) {
299                 if (!entry.Umount(false)) unmount_done = false;
300             }
301             if (unmount_done) {
302                 sync();
303             }
304         }
305         for (auto& entry : block_devices) {
306             if (!entry.Umount(timeout == 0ms)) unmount_done = false;
307         }
308         if (unmount_done) {
309             return UMOUNT_STAT_SUCCESS;
310         }
311         if ((timeout < t.duration())) {  // try umount at least once
312             return UMOUNT_STAT_TIMEOUT;
313         }
314         std::this_thread::sleep_for(100ms);
315     }
316 }
317 
KillAllProcesses()318 static void KillAllProcesses() {
319     WriteStringToFile("i", PROC_SYSRQ);
320 }
321 
322 // Create reboot/shutdwon monitor thread
RebootMonitorThread(unsigned int cmd,const std::string & reboot_target,sem_t * reboot_semaphore,std::chrono::milliseconds shutdown_timeout,bool * reboot_monitor_run)323 void RebootMonitorThread(unsigned int cmd, const std::string& reboot_target,
324                          sem_t* reboot_semaphore, std::chrono::milliseconds shutdown_timeout,
325                          bool* reboot_monitor_run) {
326     unsigned int remaining_shutdown_time = 0;
327 
328     // 300 seconds more than the timeout passed to the thread as there is a final Umount pass
329     // after the timeout is reached.
330     constexpr unsigned int shutdown_watchdog_timeout_default = 300;
331     auto shutdown_watchdog_timeout = android::base::GetUintProperty(
332             "ro.build.shutdown.watchdog.timeout", shutdown_watchdog_timeout_default);
333     remaining_shutdown_time = shutdown_watchdog_timeout + shutdown_timeout.count() / 1000;
334 
335     while (*reboot_monitor_run == true) {
336         if (TEMP_FAILURE_RETRY(sem_wait(reboot_semaphore)) == -1) {
337             LOG(ERROR) << "sem_wait failed and exit RebootMonitorThread()";
338             return;
339         }
340 
341         timespec shutdown_timeout_timespec;
342         if (clock_gettime(CLOCK_MONOTONIC, &shutdown_timeout_timespec) == -1) {
343             LOG(ERROR) << "clock_gettime() fail! exit RebootMonitorThread()";
344             return;
345         }
346 
347         // If there are some remaining shutdown time left from previous round, we use
348         // remaining time here.
349         shutdown_timeout_timespec.tv_sec += remaining_shutdown_time;
350 
351         LOG(INFO) << "shutdown_timeout_timespec.tv_sec: " << shutdown_timeout_timespec.tv_sec;
352 
353         int sem_return = 0;
354         while ((sem_return = sem_timedwait_monotonic_np(reboot_semaphore,
355                                                         &shutdown_timeout_timespec)) == -1 &&
356                errno == EINTR) {
357         }
358 
359         if (sem_return == -1) {
360             LOG(ERROR) << "Reboot thread timed out";
361 
362             if (android::base::GetBoolProperty("ro.debuggable", false) == true) {
363                 if (false) {
364                     // SEPolicy will block debuggerd from running and this is intentional.
365                     // But these lines are left to be enabled during debugging.
366                     LOG(INFO) << "Try to dump init process call trace:";
367                     const char* vdc_argv[] = {"/system/bin/debuggerd", "-b", "1"};
368                     int status;
369                     logwrap_fork_execvp(arraysize(vdc_argv), vdc_argv, &status, false, LOG_KLOG,
370                                         true, nullptr);
371                 }
372                 LOG(INFO) << "Show stack for all active CPU:";
373                 WriteStringToFile("l", PROC_SYSRQ);
374 
375                 LOG(INFO) << "Show tasks that are in disk sleep(uninterruptable sleep), which are "
376                              "like "
377                              "blocked in mutex or hardware register access:";
378                 WriteStringToFile("w", PROC_SYSRQ);
379             }
380 
381             // In shutdown case,notify kernel to sync and umount fs to read-only before shutdown.
382             if (cmd == ANDROID_RB_POWEROFF || cmd == ANDROID_RB_THERMOFF) {
383                 WriteStringToFile("s", PROC_SYSRQ);
384 
385                 WriteStringToFile("u", PROC_SYSRQ);
386 
387                 RebootSystem(cmd, reboot_target);
388             }
389 
390             LOG(ERROR) << "Trigger crash at last!";
391             WriteStringToFile("c", PROC_SYSRQ);
392         } else {
393             timespec current_time_timespec;
394 
395             if (clock_gettime(CLOCK_MONOTONIC, &current_time_timespec) == -1) {
396                 LOG(ERROR) << "clock_gettime() fail! exit RebootMonitorThread()";
397                 return;
398             }
399 
400             remaining_shutdown_time =
401                     shutdown_timeout_timespec.tv_sec - current_time_timespec.tv_sec;
402 
403             LOG(INFO) << "remaining_shutdown_time: " << remaining_shutdown_time;
404         }
405     }
406 }
407 
408 /* Try umounting all emulated file systems R/W block device cfile systems.
409  * This will just try umount and give it up if it fails.
410  * For fs like ext4, this is ok as file system will be marked as unclean shutdown
411  * and necessary check can be done at the next reboot.
412  * For safer shutdown, caller needs to make sure that
413  * all processes / emulated partition for the target fs are all cleaned-up.
414  *
415  * return true when umount was successful. false when timed out.
416  */
TryUmountAndFsck(unsigned int cmd,bool run_fsck,std::chrono::milliseconds timeout,sem_t * reboot_semaphore)417 static UmountStat TryUmountAndFsck(unsigned int cmd, bool run_fsck,
418                                    std::chrono::milliseconds timeout, sem_t* reboot_semaphore) {
419     Timer t;
420     std::vector<MountEntry> block_devices;
421     std::vector<MountEntry> emulated_devices;
422 
423     if (run_fsck && !FindPartitionsToUmount(&block_devices, &emulated_devices, false)) {
424         return UMOUNT_STAT_ERROR;
425     }
426     auto sm = snapshot::SnapshotManager::New();
427     bool ota_update_in_progress = false;
428     if (sm->IsUserspaceSnapshotUpdateInProgress()) {
429         LOG(INFO) << "OTA update in progress";
430         ota_update_in_progress = true;
431     }
432     UmountStat stat = UmountPartitions(timeout - t.duration());
433     if (stat != UMOUNT_STAT_SUCCESS) {
434         LOG(INFO) << "umount timeout, last resort, kill all and try";
435         if (DUMP_ON_UMOUNT_FAILURE) DumpUmountDebuggingInfo();
436         // Since umount timedout, we will try to kill all processes
437         // and do one more attempt to umount the partitions.
438         //
439         // However, if OTA update is in progress, we don't want
440         // to kill the snapuserd daemon as the daemon will
441         // be serving I/O requests. Killing the daemon will
442         // end up with I/O failures. If the update is in progress,
443         // we will just return the umount failure status immediately.
444         // This is ok, given the fact that killing the processes
445         // and doing an umount is just a last effort. We are
446         // still not doing fsck when all processes are killed.
447         //
448         if (ota_update_in_progress) {
449             return stat;
450         }
451         KillAllProcesses();
452         // even if it succeeds, still it is timeout and do not run fsck with all processes killed
453         UmountStat st = UmountPartitions(0ms);
454         if ((st != UMOUNT_STAT_SUCCESS) && DUMP_ON_UMOUNT_FAILURE) DumpUmountDebuggingInfo();
455     }
456 
457     if (stat == UMOUNT_STAT_SUCCESS && run_fsck) {
458         LOG(INFO) << "Pause reboot monitor thread before fsck";
459         sem_post(reboot_semaphore);
460 
461         // fsck part is excluded from timeout check. It only runs for user initiated shutdown
462         // and should not affect reboot time.
463         for (auto& entry : block_devices) {
464             entry.DoFsck();
465         }
466 
467         LOG(INFO) << "Resume reboot monitor thread after fsck";
468         sem_post(reboot_semaphore);
469     }
470     return stat;
471 }
472 
473 // zram is able to use backing device on top of a loopback device.
474 // In order to unmount /data successfully, we have to kill the loopback device first
475 #define ZRAM_DEVICE       "/dev/block/zram0"
476 #define ZRAM_RESET        "/sys/block/zram0/reset"
477 #define ZRAM_BACK_DEV     "/sys/block/zram0/backing_dev"
478 #define ZRAM_INITSTATE    "/sys/block/zram0/initstate"
KillZramBackingDevice()479 static Result<void> KillZramBackingDevice() {
480     std::string zram_initstate;
481     if (!android::base::ReadFileToString(ZRAM_INITSTATE, &zram_initstate)) {
482         return ErrnoError() << "Failed to read " << ZRAM_INITSTATE;
483     }
484 
485     zram_initstate.erase(zram_initstate.length() - 1);
486     if (zram_initstate == "0") {
487         LOG(INFO) << "Zram has not been swapped on";
488         return {};
489     }
490 
491     if (access(ZRAM_BACK_DEV, F_OK) != 0 && errno == ENOENT) {
492         LOG(INFO) << "No zram backing device configured";
493         return {};
494     }
495     std::string backing_dev;
496     if (!android::base::ReadFileToString(ZRAM_BACK_DEV, &backing_dev)) {
497         return ErrnoError() << "Failed to read " << ZRAM_BACK_DEV;
498     }
499 
500     // cut the last "\n"
501     backing_dev.erase(backing_dev.length() - 1);
502 
503     if (android::base::StartsWith(backing_dev, "none")) {
504         LOG(INFO) << "No zram backing device configured";
505         return {};
506     }
507 
508     // shutdown zram handle
509     Timer swap_timer;
510     LOG(INFO) << "swapoff() start...";
511     if (swapoff(ZRAM_DEVICE) == -1) {
512         return ErrnoError() << "zram_backing_dev: swapoff (" << backing_dev << ")"
513                             << " failed";
514     }
515     LOG(INFO) << "swapoff() took " << swap_timer;
516 
517     if (!WriteStringToFile("1", ZRAM_RESET)) {
518         return Error() << "zram_backing_dev: reset (" << backing_dev << ")"
519                        << " failed";
520     }
521 
522     if (!android::base::StartsWith(backing_dev, "/dev/block/loop")) {
523         LOG(INFO) << backing_dev << " is not a loop device. Exiting early";
524         return {};
525     }
526 
527     // clear loopback device
528     unique_fd loop(TEMP_FAILURE_RETRY(open(backing_dev.c_str(), O_RDWR | O_CLOEXEC)));
529     if (loop.get() < 0) {
530         return ErrnoError() << "zram_backing_dev: open(" << backing_dev << ")"
531                             << " failed";
532     }
533 
534     if (ioctl(loop.get(), LOOP_CLR_FD, 0) < 0) {
535         return ErrnoError() << "zram_backing_dev: loop_clear (" << backing_dev << ")"
536                             << " failed";
537     }
538     LOG(INFO) << "zram_backing_dev: `" << backing_dev << "` is cleared successfully.";
539     return {};
540 }
541 
542 // Stops given services, waits for them to be stopped for |timeout| ms.
543 // If terminate is true, then SIGTERM is sent to services, otherwise SIGKILL is sent.
544 // Note that services are stopped in order given by |ServiceList::services_in_shutdown_order|
545 // function.
StopServices(const std::set<std::string> & services,std::chrono::milliseconds timeout,bool terminate)546 static void StopServices(const std::set<std::string>& services, std::chrono::milliseconds timeout,
547                          bool terminate) {
548     LOG(INFO) << "Stopping " << services.size() << " services by sending "
549               << (terminate ? "SIGTERM" : "SIGKILL");
550     std::vector<pid_t> pids;
551     pids.reserve(services.size());
552     for (const auto& s : ServiceList::GetInstance().services_in_shutdown_order()) {
553         if (services.count(s->name()) == 0) {
554             continue;
555         }
556         if (s->pid() > 0) {
557             pids.push_back(s->pid());
558         }
559         if (terminate) {
560             s->Terminate();
561         } else {
562             s->Stop();
563         }
564     }
565     if (timeout > 0ms) {
566         WaitToBeReaped(Service::GetSigchldFd(), pids, timeout);
567     } else {
568         // Even if we don't to wait for services to stop, we still optimistically reap zombies.
569         ReapAnyOutstandingChildren();
570     }
571 }
572 
573 // Like StopServices, but also logs all the services that failed to stop after the provided timeout.
574 // Returns number of violators.
StopServicesAndLogViolations(const std::set<std::string> & services,std::chrono::milliseconds timeout,bool terminate)575 int StopServicesAndLogViolations(const std::set<std::string>& services,
576                                  std::chrono::milliseconds timeout, bool terminate) {
577     StopServices(services, timeout, terminate);
578     int still_running = 0;
579     for (const auto& s : ServiceList::GetInstance()) {
580         if (s->IsRunning() && services.count(s->name())) {
581             LOG(ERROR) << "[service-misbehaving] : service '" << s->name() << "' is still running "
582                        << timeout.count() << "ms after receiving "
583                        << (terminate ? "SIGTERM" : "SIGKILL");
584             still_running++;
585         }
586     }
587     return still_running;
588 }
589 
UnmountAllApexes()590 static Result<void> UnmountAllApexes() {
591     // don't need to unmount because apexd doesn't use /data in Microdroid
592     if (IsMicrodroid()) {
593         return {};
594     }
595 
596     const char* args[] = {"/system/bin/apexd", "--unmount-all"};
597     int status;
598     if (logwrap_fork_execvp(arraysize(args), args, &status, false, LOG_KLOG, true, nullptr) != 0) {
599         return ErrnoError() << "Failed to call '/system/bin/apexd --unmount-all'";
600     }
601     if (WIFEXITED(status) && WEXITSTATUS(status) == 0) {
602         return {};
603     }
604     return Error() << "'/system/bin/apexd --unmount-all' failed : " << status;
605 }
606 
607 //* Reboot / shutdown the system.
608 // cmd ANDROID_RB_* as defined in android_reboot.h
609 // reason Reason string like "reboot", "shutdown,userrequested"
610 // reboot_target Reboot target string like "bootloader". Otherwise, it should be an empty string.
611 // run_fsck Whether to run fsck after umount is done.
612 //
DoReboot(unsigned int cmd,const std::string & reason,const std::string & reboot_target,bool run_fsck)613 static void DoReboot(unsigned int cmd, const std::string& reason, const std::string& reboot_target,
614                      bool run_fsck) {
615     Timer t;
616     LOG(INFO) << "Reboot start, reason: " << reason << ", reboot_target: " << reboot_target;
617 
618     bool is_thermal_shutdown = cmd == ANDROID_RB_THERMOFF;
619 
620     auto shutdown_timeout = 0ms;
621     if (!SHUTDOWN_ZERO_TIMEOUT) {
622         constexpr unsigned int shutdown_timeout_default = 6;
623         constexpr unsigned int max_thermal_shutdown_timeout = 3;
624         auto shutdown_timeout_final = android::base::GetUintProperty("ro.build.shutdown_timeout",
625                                                                      shutdown_timeout_default);
626         if (is_thermal_shutdown && shutdown_timeout_final > max_thermal_shutdown_timeout) {
627             shutdown_timeout_final = max_thermal_shutdown_timeout;
628         }
629         shutdown_timeout = std::chrono::seconds(shutdown_timeout_final);
630     }
631     LOG(INFO) << "Shutdown timeout: " << shutdown_timeout.count() << " ms";
632 
633     sem_t reboot_semaphore;
634     if (sem_init(&reboot_semaphore, false, 0) == -1) {
635         // These should never fail, but if they do, skip the graceful reboot and reboot immediately.
636         LOG(ERROR) << "sem_init() fail and RebootSystem() return!";
637         RebootSystem(cmd, reboot_target, reason);
638     }
639 
640     // Start a thread to monitor init shutdown process
641     LOG(INFO) << "Create reboot monitor thread.";
642     bool reboot_monitor_run = true;
643     std::thread reboot_monitor_thread(&RebootMonitorThread, cmd, reboot_target, &reboot_semaphore,
644                                       shutdown_timeout, &reboot_monitor_run);
645     reboot_monitor_thread.detach();
646 
647     // Start reboot monitor thread
648     sem_post(&reboot_semaphore);
649 
650     // Ensure last reboot reason is reduced to canonical
651     // alias reported in bootloader or system boot reason.
652     size_t skip = 0;
653     std::vector<std::string> reasons = Split(reason, ",");
654     if (reasons.size() >= 2 && reasons[0] == "reboot" &&
655         (reasons[1] == "recovery" || reasons[1] == "bootloader" || reasons[1] == "cold" ||
656          reasons[1] == "hard" || reasons[1] == "warm")) {
657         skip = strlen("reboot,");
658     }
659     PersistRebootReason(reason.c_str() + skip, true);
660 
661     // If /data isn't mounted then we can skip the extra reboot steps below, since we don't need to
662     // worry about unmounting it.
663     if (!IsDataMounted("*")) {
664         sync();
665         RebootSystem(cmd, reboot_target, reason);
666         abort();
667     }
668 
669     bool do_shutdown_animation = GetBoolProperty("ro.init.shutdown_animation", false);
670     // watchdogd is a vendor specific component but should be alive to complete shutdown safely.
671     const std::set<std::string> to_starts{"watchdogd"};
672     std::set<std::string> stop_first;
673     for (const auto& s : ServiceList::GetInstance()) {
674         if (kDebuggingServices.count(s->name())) {
675             // keep debugging tools until non critical ones are all gone.
676             s->SetShutdownCritical();
677         } else if (to_starts.count(s->name())) {
678             if (auto result = s->Start(); !result.ok()) {
679                 LOG(ERROR) << "Could not start shutdown 'to_start' service '" << s->name()
680                            << "': " << result.error();
681             }
682             s->SetShutdownCritical();
683         } else if (do_shutdown_animation && s->classnames().count("animation") > 0) {
684             // Need these for shutdown animations.
685         } else if (s->IsShutdownCritical()) {
686             // Start shutdown critical service if not started.
687             if (auto result = s->Start(); !result.ok()) {
688                 LOG(ERROR) << "Could not start shutdown critical service '" << s->name()
689                            << "': " << result.error();
690             }
691         } else {
692             stop_first.insert(s->name());
693         }
694     }
695 
696     // remaining operations (specifically fsck) may take a substantial duration
697     if (!do_shutdown_animation && (cmd == ANDROID_RB_POWEROFF || is_thermal_shutdown)) {
698         TurnOffBacklight();
699     }
700 
701     Service* boot_anim = ServiceList::GetInstance().FindService("bootanim");
702     Service* surface_flinger = ServiceList::GetInstance().FindService("surfaceflinger");
703     if (boot_anim != nullptr && surface_flinger != nullptr && surface_flinger->IsRunning()) {
704 
705         if (do_shutdown_animation) {
706             SetProperty("service.bootanim.exit", "0");
707             SetProperty("service.bootanim.progress", "0");
708             // Could be in the middle of animation. Stop and start so that it can pick
709             // up the right mode.
710             boot_anim->Stop();
711         }
712 
713         for (const auto& service : ServiceList::GetInstance()) {
714             if (service->classnames().count("animation") == 0) {
715                 continue;
716             }
717 
718             // start all animation classes if stopped.
719             if (do_shutdown_animation) {
720                 service->Start();
721             }
722             service->SetShutdownCritical();  // will not check animation class separately
723         }
724 
725         if (do_shutdown_animation) {
726             boot_anim->Start();
727             surface_flinger->SetShutdownCritical();
728             boot_anim->SetShutdownCritical();
729         }
730     }
731 
732     // optional shutdown step
733     // 1. terminate all services except shutdown critical ones. wait for delay to finish
734     if (shutdown_timeout > 0ms) {
735         StopServicesAndLogViolations(stop_first, shutdown_timeout / 2, true /* SIGTERM */);
736     }
737     // Send SIGKILL to ones that didn't terminate cleanly.
738     StopServicesAndLogViolations(stop_first, 0ms, false /* SIGKILL */);
739     SubcontextTerminate();
740     // Reap subcontext pids.
741     ReapAnyOutstandingChildren();
742 
743     // 3. send volume abort_fuse and volume shutdown to vold
744     Service* vold_service = ServiceList::GetInstance().FindService("vold");
745     if (vold_service != nullptr && vold_service->IsRunning()) {
746         // Manually abort FUSE connections, since the FUSE daemon is already dead
747         // at this point, and unmounting it might hang.
748         CallVdc("volume", "abort_fuse");
749         CallVdc("volume", "shutdown");
750         vold_service->Stop();
751     } else {
752         LOG(INFO) << "vold not running, skipping vold shutdown";
753     }
754     // logcat stopped here
755     StopServices(kDebuggingServices, 0ms, false /* SIGKILL */);
756     // 4. sync, try umount, and optionally run fsck for user shutdown
757     {
758         Timer sync_timer;
759         LOG(INFO) << "sync() before umount...";
760         sync();
761         LOG(INFO) << "sync() before umount took" << sync_timer;
762     }
763     // 5. drop caches and disable zram backing device, if exist
764     KillZramBackingDevice();
765 
766     LOG(INFO) << "Ready to unmount apexes. So far shutdown sequence took " << t;
767     // 6. unmount active apexes, otherwise they might prevent clean unmount of /data.
768     if (auto ret = UnmountAllApexes(); !ret.ok()) {
769         LOG(ERROR) << ret.error();
770     }
771     UmountStat stat =
772             TryUmountAndFsck(cmd, run_fsck, shutdown_timeout - t.duration(), &reboot_semaphore);
773     // Follow what linux shutdown is doing: one more sync with little bit delay
774     {
775         Timer sync_timer;
776         LOG(INFO) << "sync() after umount...";
777         sync();
778         LOG(INFO) << "sync() after umount took" << sync_timer;
779     }
780     if (!is_thermal_shutdown) std::this_thread::sleep_for(100ms);
781     LogShutdownTime(stat, &t);
782 
783     // Send signal to terminate reboot monitor thread.
784     reboot_monitor_run = false;
785     sem_post(&reboot_semaphore);
786 
787     // Reboot regardless of umount status. If umount fails, fsck after reboot will fix it.
788     if (IsDataMounted("f2fs")) {
789         uint32_t flag = F2FS_GOING_DOWN_FULLSYNC;
790         unique_fd fd(TEMP_FAILURE_RETRY(open("/data", O_RDONLY)));
791         int ret = ioctl(fd.get(), F2FS_IOC_SHUTDOWN, &flag);
792         if (ret) {
793             PLOG(ERROR) << "Shutdown /data: ";
794         } else {
795             LOG(INFO) << "Shutdown /data";
796         }
797     }
798     RebootSystem(cmd, reboot_target, reason);
799     abort();
800 }
801 
EnterShutdown()802 static void EnterShutdown() {
803     LOG(INFO) << "Entering shutdown mode";
804     shutting_down = true;
805     // Skip wait for prop if it is in progress
806     ResetWaitForProp();
807     // Clear EXEC flag if there is one pending
808     for (const auto& s : ServiceList::GetInstance()) {
809         s->UnSetExec();
810     }
811 }
812 
LeaveShutdown()813 static void LeaveShutdown() {
814     LOG(INFO) << "Leaving shutdown mode";
815     shutting_down = false;
816     StartSendingMessages();
817 }
818 
GetMillisProperty(const std::string & name,std::chrono::milliseconds default_value)819 static std::chrono::milliseconds GetMillisProperty(const std::string& name,
820                                                    std::chrono::milliseconds default_value) {
821     auto value = GetUintProperty(name, static_cast<uint64_t>(default_value.count()));
822     return std::chrono::milliseconds(std::move(value));
823 }
824 
DoUserspaceReboot()825 static Result<void> DoUserspaceReboot() {
826     LOG(INFO) << "Userspace reboot initiated";
827     // An ugly way to pass a more precise reason on why fallback to hard reboot was triggered.
828     std::string sub_reason = "";
829     auto guard = android::base::make_scope_guard([&sub_reason] {
830         // Leave shutdown so that we can handle a full reboot.
831         LeaveShutdown();
832         trigger_shutdown("reboot,userspace_failed,shutdown_aborted," + sub_reason);
833     });
834     // Triggering userspace-reboot-requested will result in a bunch of setprop
835     // actions. We should make sure, that all of them are propagated before
836     // proceeding with userspace reboot. Synchronously setting sys.init.userspace_reboot.in_progress
837     // property is not perfect, but it should do the trick.
838     if (!android::sysprop::InitProperties::userspace_reboot_in_progress(true)) {
839         sub_reason = "setprop";
840         return Error() << "Failed to set sys.init.userspace_reboot.in_progress property";
841     }
842     EnterShutdown();
843     if (!SetProperty("sys.powerctl", "")) {
844         sub_reason = "resetprop";
845         return Error() << "Failed to reset sys.powerctl property";
846     }
847     std::set<std::string> stop_first;
848     // Remember the services that were enabled. We will need to manually enable them again otherwise
849     // triggers like class_start won't restart them.
850     std::set<std::string> were_enabled;
851     for (const auto& s : ServiceList::GetInstance().services_in_shutdown_order()) {
852         if (s->is_post_data() && !kDebuggingServices.count(s->name())) {
853             stop_first.insert(s->name());
854         }
855         // TODO(ioffe): we should also filter out temporary services here.
856         if (s->is_post_data() && s->IsEnabled()) {
857             were_enabled.insert(s->name());
858         }
859     }
860     {
861         Timer sync_timer;
862         LOG(INFO) << "sync() before terminating services...";
863         sync();
864         LOG(INFO) << "sync() took " << sync_timer;
865     }
866     auto sigterm_timeout = GetMillisProperty("init.userspace_reboot.sigterm.timeoutmillis", 5s);
867     auto sigkill_timeout = GetMillisProperty("init.userspace_reboot.sigkill.timeoutmillis", 10s);
868     LOG(INFO) << "Timeout to terminate services: " << sigterm_timeout.count() << "ms "
869               << "Timeout to kill services: " << sigkill_timeout.count() << "ms";
870     std::string services_file_name = "/metadata/userspacereboot/services.txt";
871     const int flags = O_RDWR | O_CREAT | O_SYNC | O_APPEND | O_CLOEXEC;
872     StopServicesAndLogViolations(stop_first, sigterm_timeout, true /* SIGTERM */);
873     if (int r = StopServicesAndLogViolations(stop_first, sigkill_timeout, false /* SIGKILL */);
874         r > 0) {
875         auto fd = unique_fd(TEMP_FAILURE_RETRY(open(services_file_name.c_str(), flags, 0666)));
876         android::base::WriteStringToFd("Post-data services still running: \n", fd);
877         for (const auto& s : ServiceList::GetInstance()) {
878             if (s->IsRunning() && stop_first.count(s->name())) {
879                 android::base::WriteStringToFd(s->name() + "\n", fd);
880             }
881         }
882         sub_reason = "sigkill";
883         return Error() << r << " post-data services are still running";
884     }
885     if (auto result = KillZramBackingDevice(); !result.ok()) {
886         sub_reason = "zram";
887         return result;
888     }
889     if (auto result = CallVdc("volume", "reset"); !result.ok()) {
890         sub_reason = "vold_reset";
891         return result;
892     }
893     const auto& debugging_services = GetPostDataDebuggingServices();
894     if (int r = StopServicesAndLogViolations(debugging_services, sigkill_timeout,
895                                              false /* SIGKILL */);
896         r > 0) {
897         auto fd = unique_fd(TEMP_FAILURE_RETRY(open(services_file_name.c_str(), flags, 0666)));
898         android::base::WriteStringToFd("Debugging services still running: \n", fd);
899         for (const auto& s : ServiceList::GetInstance()) {
900             if (s->IsRunning() && debugging_services.count(s->name())) {
901                 android::base::WriteStringToFd(s->name() + "\n", fd);
902             }
903         }
904         sub_reason = "sigkill_debug";
905         return Error() << r << " debugging services are still running";
906     }
907     {
908         Timer sync_timer;
909         LOG(INFO) << "sync() after stopping services...";
910         sync();
911         LOG(INFO) << "sync() took " << sync_timer;
912     }
913     if (auto result = UnmountAllApexes(); !result.ok()) {
914         sub_reason = "apex";
915         return result;
916     }
917     if (!SwitchToMountNamespaceIfNeeded(NS_BOOTSTRAP).ok()) {
918         sub_reason = "ns_switch";
919         return Error() << "Failed to switch to bootstrap namespace";
920     }
921     ActionManager::GetInstance().RemoveActionIf([](const auto& action) -> bool {
922         if (action->IsFromApex()) {
923             std::string trigger_name = action->BuildTriggersString();
924             LOG(INFO) << "Removing action (" << trigger_name << ") from (" << action->filename()
925                       << ":" << action->line() << ")";
926             return true;
927         }
928         return false;
929     });
930     // Remove services that were defined in an APEX
931     ServiceList::GetInstance().RemoveServiceIf([](const std::unique_ptr<Service>& s) -> bool {
932         if (s->is_from_apex()) {
933             LOG(INFO) << "Removing service '" << s->name() << "' because it's defined in an APEX";
934             return true;
935         }
936         return false;
937     });
938     // Re-enable services
939     for (const auto& s : ServiceList::GetInstance()) {
940         if (were_enabled.count(s->name())) {
941             LOG(INFO) << "Re-enabling service '" << s->name() << "'";
942             s->Enable();
943         }
944     }
945     ServiceList::GetInstance().ResetState();
946     LeaveShutdown();
947     ActionManager::GetInstance().QueueEventTrigger("userspace-reboot-resume");
948     guard.Disable();  // Go on with userspace reboot.
949     return {};
950 }
951 
UserspaceRebootWatchdogThread()952 static void UserspaceRebootWatchdogThread() {
953     auto started_timeout = GetMillisProperty("init.userspace_reboot.started.timeoutmillis", 10s);
954     if (!WaitForProperty("sys.init.userspace_reboot.in_progress", "1", started_timeout)) {
955         LOG(ERROR) << "Userspace reboot didn't start in " << started_timeout.count()
956                    << "ms. Switching to full reboot";
957         // Init might be wedged, don't try to write reboot reason into a persistent property and do
958         // a dirty reboot.
959         PersistRebootReason("userspace_failed,watchdog_triggered,failed_to_start", false);
960         RebootSystem(ANDROID_RB_RESTART2, "userspace_failed,watchdog_triggered,failed_to_start");
961     }
962     LOG(INFO) << "Starting userspace reboot watchdog";
963     auto watchdog_timeout = GetMillisProperty("init.userspace_reboot.watchdog.timeoutmillis", 5min);
964     LOG(INFO) << "UserspaceRebootWatchdog timeout: " << watchdog_timeout.count() << "ms";
965     if (!WaitForProperty("sys.boot_completed", "1", watchdog_timeout)) {
966         LOG(ERROR) << "Failed to boot in " << watchdog_timeout.count()
967                    << "ms. Switching to full reboot";
968         // In this case device is in a boot loop. Only way to recover is to do dirty reboot.
969         // Since init might be wedged, don't try to write reboot reason into a persistent property.
970         PersistRebootReason("userspace_failed,watchdog_triggered,failed_to_boot", false);
971         RebootSystem(ANDROID_RB_RESTART2, "userspace_failed,watchdog_triggered,failed_to_boot");
972     }
973     LOG(INFO) << "Device booted, stopping userspace reboot watchdog";
974 }
975 
HandleUserspaceReboot()976 static void HandleUserspaceReboot() {
977     if (!android::sysprop::InitProperties::is_userspace_reboot_supported().value_or(false)) {
978         LOG(ERROR) << "Attempted a userspace reboot on a device that doesn't support it";
979         return;
980     }
981     // Spinnig up a separate thread will fail the setns call later in the boot sequence.
982     // Fork a new process to monitor userspace reboot while we are investigating a better solution.
983     pid_t pid = fork();
984     if (pid < 0) {
985         PLOG(ERROR) << "Failed to fork process for userspace reboot watchdog. Switching to full "
986                     << "reboot";
987         trigger_shutdown("reboot,userspace_failed,watchdog_fork");
988         return;
989     }
990     if (pid == 0) {
991         // Child
992         UserspaceRebootWatchdogThread();
993         _exit(EXIT_SUCCESS);
994     }
995     LOG(INFO) << "Clearing queue and starting userspace-reboot-requested trigger";
996     auto& am = ActionManager::GetInstance();
997     am.ClearQueue();
998     am.QueueEventTrigger("userspace-reboot-requested");
999     auto handler = [](const BuiltinArguments&) { return DoUserspaceReboot(); };
1000     am.QueueBuiltinAction(handler, "userspace-reboot");
1001 }
1002 
1003 /**
1004  * Check if "command" field is set in bootloader message.
1005  *
1006  * If "command" field is broken (contains non-printable characters prior to
1007  * terminating zero), it will be zeroed.
1008  *
1009  * @param[in,out] boot Bootloader message (BCB) structure
1010  * @return true if "command" field is already set, and false if it's empty
1011  */
CommandIsPresent(bootloader_message * boot)1012 static bool CommandIsPresent(bootloader_message* boot) {
1013     if (boot->command[0] == '\0')
1014         return false;
1015 
1016     for (size_t i = 0; i < arraysize(boot->command); ++i) {
1017         if (boot->command[i] == '\0')
1018             return true;
1019         if (!isprint(boot->command[i]))
1020             break;
1021     }
1022 
1023     memset(boot->command, 0, sizeof(boot->command));
1024     return false;
1025 }
1026 
HandlePowerctlMessage(const std::string & command)1027 void HandlePowerctlMessage(const std::string& command) {
1028     unsigned int cmd = 0;
1029     std::vector<std::string> cmd_params = Split(command, ",");
1030     std::string reboot_target = "";
1031     bool run_fsck = false;
1032     bool command_invalid = false;
1033     bool userspace_reboot = false;
1034 
1035     if (cmd_params[0] == "shutdown") {
1036         cmd = ANDROID_RB_POWEROFF;
1037         if (cmd_params.size() >= 2) {
1038             if (cmd_params[1] == "userrequested") {
1039                 // The shutdown reason is PowerManager.SHUTDOWN_USER_REQUESTED.
1040                 // Run fsck once the file system is remounted in read-only mode.
1041                 run_fsck = true;
1042             } else if (cmd_params[1] == "thermal") {
1043                 // Turn off sources of heat immediately.
1044                 TurnOffBacklight();
1045                 // run_fsck is false to avoid delay
1046                 cmd = ANDROID_RB_THERMOFF;
1047             }
1048         }
1049     } else if (cmd_params[0] == "reboot") {
1050         cmd = ANDROID_RB_RESTART2;
1051         if (cmd_params.size() >= 2) {
1052             reboot_target = cmd_params[1];
1053             if (reboot_target == "userspace") {
1054                 LOG(INFO) << "Userspace reboot requested";
1055                 userspace_reboot = true;
1056             }
1057             // adb reboot fastboot should boot into bootloader for devices not
1058             // supporting logical partitions.
1059             if (reboot_target == "fastboot" &&
1060                 !android::base::GetBoolProperty("ro.boot.dynamic_partitions", false)) {
1061                 reboot_target = "bootloader";
1062             }
1063             // When rebooting to the bootloader notify the bootloader writing
1064             // also the BCB.
1065             if (reboot_target == "bootloader") {
1066                 std::string err;
1067                 if (!write_reboot_bootloader(&err)) {
1068                     LOG(ERROR) << "reboot-bootloader: Error writing "
1069                                   "bootloader_message: "
1070                                << err;
1071                 }
1072             } else if (reboot_target == "recovery") {
1073                 bootloader_message boot = {};
1074                 if (std::string err; !read_bootloader_message(&boot, &err)) {
1075                     LOG(ERROR) << "Failed to read bootloader message: " << err;
1076                 }
1077                 // Update the boot command field if it's empty, and preserve
1078                 // the other arguments in the bootloader message.
1079                 if (!CommandIsPresent(&boot)) {
1080                     strlcpy(boot.command, "boot-recovery", sizeof(boot.command));
1081                     if (std::string err; !write_bootloader_message(boot, &err)) {
1082                         LOG(ERROR) << "Failed to set bootloader message: " << err;
1083                         return;
1084                     }
1085                 }
1086             } else if (std::find(cmd_params.begin(), cmd_params.end(), "quiescent")
1087                     != cmd_params.end()) { // Quiescent can be either subreason or details.
1088                 bootloader_message boot = {};
1089                 if (std::string err; !read_bootloader_message(&boot, &err)) {
1090                     LOG(ERROR) << "Failed to read bootloader message: " << err;
1091                 }
1092                 // Update the boot command field if it's empty, and preserve
1093                 // the other arguments in the bootloader message.
1094                 if (!CommandIsPresent(&boot)) {
1095                     strlcpy(boot.command, "boot-quiescent", sizeof(boot.command));
1096                     if (std::string err; !write_bootloader_message(boot, &err)) {
1097                         LOG(ERROR) << "Failed to set bootloader message: " << err;
1098                         return;
1099                     }
1100                 }
1101             } else if (reboot_target == "sideload" || reboot_target == "sideload-auto-reboot" ||
1102                        reboot_target == "fastboot") {
1103                 std::string arg = reboot_target == "sideload-auto-reboot" ? "sideload_auto_reboot"
1104                                                                           : reboot_target;
1105                 const std::vector<std::string> options = {
1106                         "--" + arg,
1107                 };
1108                 std::string err;
1109                 if (!write_bootloader_message(options, &err)) {
1110                     LOG(ERROR) << "Failed to set bootloader message: " << err;
1111                     return;
1112                 }
1113                 reboot_target = "recovery";
1114             }
1115 
1116             // If there are additional parameter, pass them along
1117             for (size_t i = 2; (cmd_params.size() > i) && cmd_params[i].size(); ++i) {
1118                 reboot_target += "," + cmd_params[i];
1119             }
1120         }
1121     } else {
1122         command_invalid = true;
1123     }
1124     if (command_invalid) {
1125         LOG(ERROR) << "powerctl: unrecognized command '" << command << "'";
1126         return;
1127     }
1128 
1129     // We do not want to process any messages (queue'ing triggers, shutdown messages, control
1130     // messages, etc) from properties during reboot.
1131     StopSendingMessages();
1132 
1133     if (userspace_reboot) {
1134         HandleUserspaceReboot();
1135         return;
1136     }
1137 
1138     LOG(INFO) << "Clear action queue and start shutdown trigger";
1139     ActionManager::GetInstance().ClearQueue();
1140     // Queue shutdown trigger first
1141     ActionManager::GetInstance().QueueEventTrigger("shutdown");
1142     // Queue built-in shutdown_done
1143     auto shutdown_handler = [cmd, command, reboot_target, run_fsck](const BuiltinArguments&) {
1144         DoReboot(cmd, command, reboot_target, run_fsck);
1145         return Result<void>{};
1146     };
1147     ActionManager::GetInstance().QueueBuiltinAction(shutdown_handler, "shutdown_done");
1148 
1149     EnterShutdown();
1150 }
1151 
IsShuttingDown()1152 bool IsShuttingDown() {
1153     return shutting_down;
1154 }
1155 
1156 }  // namespace init
1157 }  // namespace android
1158