• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2017 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include "reboot.h"
18 
19 #include <dirent.h>
20 #include <fcntl.h>
21 #include <linux/fs.h>
22 #include <mntent.h>
23 #include <sys/capability.h>
24 #include <sys/cdefs.h>
25 #include <sys/ioctl.h>
26 #include <sys/mount.h>
27 #include <sys/reboot.h>
28 #include <sys/stat.h>
29 #include <sys/syscall.h>
30 #include <sys/types.h>
31 #include <sys/wait.h>
32 
33 #include <memory>
34 #include <set>
35 #include <thread>
36 #include <vector>
37 
38 #include <android-base/chrono_utils.h>
39 #include <android-base/file.h>
40 #include <android-base/logging.h>
41 #include <android-base/macros.h>
42 #include <android-base/properties.h>
43 #include <android-base/stringprintf.h>
44 #include <android-base/strings.h>
45 #include <android-base/unique_fd.h>
46 #include <bootloader_message/bootloader_message.h>
47 #include <cutils/android_reboot.h>
48 #include <fs_mgr.h>
49 #include <logwrap/logwrap.h>
50 #include <private/android_filesystem_config.h>
51 #include <selinux/selinux.h>
52 
53 #include "action_manager.h"
54 #include "capabilities.h"
55 #include "init.h"
56 #include "property_service.h"
57 #include "service.h"
58 #include "sigchld_handler.h"
59 
60 using android::base::Split;
61 using android::base::StringPrintf;
62 using android::base::Timer;
63 
64 namespace android {
65 namespace init {
66 
67 // represents umount status during reboot / shutdown.
68 enum UmountStat {
69     /* umount succeeded. */
70     UMOUNT_STAT_SUCCESS = 0,
71     /* umount was not run. */
72     UMOUNT_STAT_SKIPPED = 1,
73     /* umount failed with timeout. */
74     UMOUNT_STAT_TIMEOUT = 2,
75     /* could not run due to error */
76     UMOUNT_STAT_ERROR = 3,
77     /* not used by init but reserved for other part to use this to represent the
78        the state where umount status before reboot is not found / available. */
79     UMOUNT_STAT_NOT_AVAILABLE = 4,
80 };
81 
82 // Utility for struct mntent
83 class MountEntry {
84   public:
MountEntry(const mntent & entry)85     explicit MountEntry(const mntent& entry)
86         : mnt_fsname_(entry.mnt_fsname),
87           mnt_dir_(entry.mnt_dir),
88           mnt_type_(entry.mnt_type),
89           mnt_opts_(entry.mnt_opts) {}
90 
Umount(bool force)91     bool Umount(bool force) {
92         LOG(INFO) << "Unmounting " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_;
93         int r = umount2(mnt_dir_.c_str(), force ? MNT_FORCE : 0);
94         if (r == 0) {
95             LOG(INFO) << "Umounted " << mnt_fsname_ << ":" << mnt_dir_ << " opts " << mnt_opts_;
96             return true;
97         } else {
98             PLOG(WARNING) << "Cannot umount " << mnt_fsname_ << ":" << mnt_dir_ << " opts "
99                           << mnt_opts_;
100             return false;
101         }
102     }
103 
DoFsck()104     void DoFsck() {
105         int st;
106         if (IsF2Fs()) {
107             const char* f2fs_argv[] = {
108                 "/system/bin/fsck.f2fs", "-f", mnt_fsname_.c_str(),
109             };
110             android_fork_execvp_ext(arraysize(f2fs_argv), (char**)f2fs_argv, &st, true, LOG_KLOG,
111                                     true, nullptr, nullptr, 0);
112         } else if (IsExt4()) {
113             const char* ext4_argv[] = {
114                 "/system/bin/e2fsck", "-f", "-y", mnt_fsname_.c_str(),
115             };
116             android_fork_execvp_ext(arraysize(ext4_argv), (char**)ext4_argv, &st, true, LOG_KLOG,
117                                     true, nullptr, nullptr, 0);
118         }
119     }
120 
IsBlockDevice(const struct mntent & mntent)121     static bool IsBlockDevice(const struct mntent& mntent) {
122         return android::base::StartsWith(mntent.mnt_fsname, "/dev/block");
123     }
124 
IsEmulatedDevice(const struct mntent & mntent)125     static bool IsEmulatedDevice(const struct mntent& mntent) {
126         return android::base::StartsWith(mntent.mnt_fsname, "/data/");
127     }
128 
129   private:
IsF2Fs() const130     bool IsF2Fs() const { return mnt_type_ == "f2fs"; }
131 
IsExt4() const132     bool IsExt4() const { return mnt_type_ == "ext4"; }
133 
134     std::string mnt_fsname_;
135     std::string mnt_dir_;
136     std::string mnt_type_;
137     std::string mnt_opts_;
138 };
139 
140 // Turn off backlight while we are performing power down cleanup activities.
TurnOffBacklight()141 static void TurnOffBacklight() {
142     Service* service = ServiceList::GetInstance().FindService("blank_screen");
143     if (service == nullptr) {
144         LOG(WARNING) << "cannot find blank_screen in TurnOffBacklight";
145         return;
146     }
147     service->Start();
148 }
149 
ShutdownVold()150 static void ShutdownVold() {
151     const char* vdc_argv[] = {"/system/bin/vdc", "volume", "shutdown"};
152     int status;
153     android_fork_execvp_ext(arraysize(vdc_argv), (char**)vdc_argv, &status, true, LOG_KLOG, true,
154                             nullptr, nullptr, 0);
155 }
156 
LogShutdownTime(UmountStat stat,Timer * t)157 static void LogShutdownTime(UmountStat stat, Timer* t) {
158     LOG(WARNING) << "powerctl_shutdown_time_ms:" << std::to_string(t->duration().count()) << ":"
159                  << stat;
160 }
161 
IsRebootCapable()162 bool IsRebootCapable() {
163     if (!CAP_IS_SUPPORTED(CAP_SYS_BOOT)) {
164         PLOG(WARNING) << "CAP_SYS_BOOT is not supported";
165         return true;
166     }
167 
168     ScopedCaps caps(cap_get_proc());
169     if (!caps) {
170         PLOG(WARNING) << "cap_get_proc() failed";
171         return true;
172     }
173 
174     cap_flag_value_t value = CAP_SET;
175     if (cap_get_flag(caps.get(), CAP_SYS_BOOT, CAP_EFFECTIVE, &value) != 0) {
176         PLOG(WARNING) << "cap_get_flag(CAP_SYS_BOOT, EFFECTIVE) failed";
177         return true;
178     }
179     return value == CAP_SET;
180 }
181 
RebootSystem(unsigned int cmd,const std::string & rebootTarget)182 void __attribute__((noreturn)) RebootSystem(unsigned int cmd, const std::string& rebootTarget) {
183     LOG(INFO) << "Reboot ending, jumping to kernel";
184 
185     if (!IsRebootCapable()) {
186         // On systems where init does not have the capability of rebooting the
187         // device, just exit cleanly.
188         exit(0);
189     }
190 
191     switch (cmd) {
192         case ANDROID_RB_POWEROFF:
193             reboot(RB_POWER_OFF);
194             break;
195 
196         case ANDROID_RB_RESTART2:
197             syscall(__NR_reboot, LINUX_REBOOT_MAGIC1, LINUX_REBOOT_MAGIC2,
198                     LINUX_REBOOT_CMD_RESTART2, rebootTarget.c_str());
199             break;
200 
201         case ANDROID_RB_THERMOFF:
202             reboot(RB_POWER_OFF);
203             break;
204     }
205     // In normal case, reboot should not return.
206     PLOG(ERROR) << "reboot call returned";
207     abort();
208 }
209 
210 /* Find all read+write block devices and emulated devices in /proc/mounts
211  * and add them to correpsponding list.
212  */
FindPartitionsToUmount(std::vector<MountEntry> * blockDevPartitions,std::vector<MountEntry> * emulatedPartitions,bool dump)213 static bool FindPartitionsToUmount(std::vector<MountEntry>* blockDevPartitions,
214                                    std::vector<MountEntry>* emulatedPartitions, bool dump) {
215     std::unique_ptr<std::FILE, int (*)(std::FILE*)> fp(setmntent("/proc/mounts", "r"), endmntent);
216     if (fp == nullptr) {
217         PLOG(ERROR) << "Failed to open /proc/mounts";
218         return false;
219     }
220     mntent* mentry;
221     while ((mentry = getmntent(fp.get())) != nullptr) {
222         if (dump) {
223             LOG(INFO) << "mount entry " << mentry->mnt_fsname << ":" << mentry->mnt_dir << " opts "
224                       << mentry->mnt_opts << " type " << mentry->mnt_type;
225         } else if (MountEntry::IsBlockDevice(*mentry) && hasmntopt(mentry, "rw")) {
226             std::string mount_dir(mentry->mnt_dir);
227             // These are R/O partitions changed to R/W after adb remount.
228             // Do not umount them as shutdown critical services may rely on them.
229             if (mount_dir != "/" && mount_dir != "/system" && mount_dir != "/vendor" &&
230                 mount_dir != "/oem") {
231                 blockDevPartitions->emplace(blockDevPartitions->begin(), *mentry);
232             }
233         } else if (MountEntry::IsEmulatedDevice(*mentry)) {
234             emulatedPartitions->emplace(emulatedPartitions->begin(), *mentry);
235         }
236     }
237     return true;
238 }
239 
DumpUmountDebuggingInfo(bool dump_all)240 static void DumpUmountDebuggingInfo(bool dump_all) {
241     int status;
242     if (!security_getenforce()) {
243         LOG(INFO) << "Run lsof";
244         const char* lsof_argv[] = {"/system/bin/lsof"};
245         android_fork_execvp_ext(arraysize(lsof_argv), (char**)lsof_argv, &status, true, LOG_KLOG,
246                                 true, nullptr, nullptr, 0);
247     }
248     FindPartitionsToUmount(nullptr, nullptr, true);
249     if (dump_all) {
250         // dump current tasks, this log can be lengthy, so only dump with dump_all
251         android::base::WriteStringToFile("t", "/proc/sysrq-trigger");
252     }
253 }
254 
UmountPartitions(std::chrono::milliseconds timeout)255 static UmountStat UmountPartitions(std::chrono::milliseconds timeout) {
256     Timer t;
257     /* data partition needs all pending writes to be completed and all emulated partitions
258      * umounted.If the current waiting is not good enough, give
259      * up and leave it to e2fsck after reboot to fix it.
260      */
261     while (true) {
262         std::vector<MountEntry> block_devices;
263         std::vector<MountEntry> emulated_devices;
264         if (!FindPartitionsToUmount(&block_devices, &emulated_devices, false)) {
265             return UMOUNT_STAT_ERROR;
266         }
267         if (block_devices.size() == 0) {
268             return UMOUNT_STAT_SUCCESS;
269         }
270         bool unmount_done = true;
271         if (emulated_devices.size() > 0) {
272             for (auto& entry : emulated_devices) {
273                 if (!entry.Umount(false)) unmount_done = false;
274             }
275             if (unmount_done) {
276                 sync();
277             }
278         }
279         for (auto& entry : block_devices) {
280             if (!entry.Umount(timeout == 0ms)) unmount_done = false;
281         }
282         if (unmount_done) {
283             return UMOUNT_STAT_SUCCESS;
284         }
285         if ((timeout < t.duration())) {  // try umount at least once
286             return UMOUNT_STAT_TIMEOUT;
287         }
288         std::this_thread::sleep_for(100ms);
289     }
290 }
291 
KillAllProcesses()292 static void KillAllProcesses() { android::base::WriteStringToFile("i", "/proc/sysrq-trigger"); }
293 
294 /* Try umounting all emulated file systems R/W block device cfile systems.
295  * This will just try umount and give it up if it fails.
296  * For fs like ext4, this is ok as file system will be marked as unclean shutdown
297  * and necessary check can be done at the next reboot.
298  * For safer shutdown, caller needs to make sure that
299  * all processes / emulated partition for the target fs are all cleaned-up.
300  *
301  * return true when umount was successful. false when timed out.
302  */
TryUmountAndFsck(bool runFsck,std::chrono::milliseconds timeout)303 static UmountStat TryUmountAndFsck(bool runFsck, std::chrono::milliseconds timeout) {
304     Timer t;
305     std::vector<MountEntry> block_devices;
306     std::vector<MountEntry> emulated_devices;
307 
308     if (runFsck && !FindPartitionsToUmount(&block_devices, &emulated_devices, false)) {
309         return UMOUNT_STAT_ERROR;
310     }
311 
312     UmountStat stat = UmountPartitions(timeout - t.duration());
313     if (stat != UMOUNT_STAT_SUCCESS) {
314         LOG(INFO) << "umount timeout, last resort, kill all and try";
315         if (DUMP_ON_UMOUNT_FAILURE) DumpUmountDebuggingInfo(true);
316         KillAllProcesses();
317         // even if it succeeds, still it is timeout and do not run fsck with all processes killed
318         UmountStat st = UmountPartitions(0ms);
319         if ((st != UMOUNT_STAT_SUCCESS) && DUMP_ON_UMOUNT_FAILURE) DumpUmountDebuggingInfo(false);
320     }
321 
322     if (stat == UMOUNT_STAT_SUCCESS && runFsck) {
323         // fsck part is excluded from timeout check. It only runs for user initiated shutdown
324         // and should not affect reboot time.
325         for (auto& entry : block_devices) {
326             entry.DoFsck();
327         }
328     }
329     return stat;
330 }
331 
DoReboot(unsigned int cmd,const std::string & reason,const std::string & rebootTarget,bool runFsck)332 void DoReboot(unsigned int cmd, const std::string& reason, const std::string& rebootTarget,
333               bool runFsck) {
334     Timer t;
335     LOG(INFO) << "Reboot start, reason: " << reason << ", rebootTarget: " << rebootTarget;
336 
337     // Ensure last reboot reason is reduced to canonical
338     // alias reported in bootloader or system boot reason.
339     size_t skip = 0;
340     std::vector<std::string> reasons = Split(reason, ",");
341     if (reasons.size() >= 2 && reasons[0] == "reboot" &&
342         (reasons[1] == "recovery" || reasons[1] == "bootloader" || reasons[1] == "cold" ||
343          reasons[1] == "hard" || reasons[1] == "warm")) {
344         skip = strlen("reboot,");
345     }
346     property_set(LAST_REBOOT_REASON_PROPERTY, reason.c_str() + skip);
347     sync();
348 
349     bool is_thermal_shutdown = cmd == ANDROID_RB_THERMOFF;
350 
351     auto shutdown_timeout = 0ms;
352     if (!SHUTDOWN_ZERO_TIMEOUT) {
353         if (is_thermal_shutdown) {
354             constexpr unsigned int thermal_shutdown_timeout = 1;
355             shutdown_timeout = std::chrono::seconds(thermal_shutdown_timeout);
356         } else {
357             constexpr unsigned int shutdown_timeout_default = 6;
358             auto shutdown_timeout_property = android::base::GetUintProperty(
359                 "ro.build.shutdown_timeout", shutdown_timeout_default);
360             shutdown_timeout = std::chrono::seconds(shutdown_timeout_property);
361         }
362     }
363     LOG(INFO) << "Shutdown timeout: " << shutdown_timeout.count() << " ms";
364 
365     // keep debugging tools until non critical ones are all gone.
366     const std::set<std::string> kill_after_apps{"tombstoned", "logd", "adbd"};
367     // watchdogd is a vendor specific component but should be alive to complete shutdown safely.
368     const std::set<std::string> to_starts{"watchdogd"};
369     for (const auto& s : ServiceList::GetInstance()) {
370         if (kill_after_apps.count(s->name())) {
371             s->SetShutdownCritical();
372         } else if (to_starts.count(s->name())) {
373             if (auto result = s->Start(); !result) {
374                 LOG(ERROR) << "Could not start shutdown 'to_start' service '" << s->name()
375                            << "': " << result.error();
376             }
377             s->SetShutdownCritical();
378         } else if (s->IsShutdownCritical()) {
379             // Start shutdown critical service if not started.
380             if (auto result = s->Start(); !result) {
381                 LOG(ERROR) << "Could not start shutdown critical service '" << s->name()
382                            << "': " << result.error();
383             }
384         }
385     }
386 
387     // remaining operations (specifically fsck) may take a substantial duration
388     if (cmd == ANDROID_RB_POWEROFF || is_thermal_shutdown) {
389         TurnOffBacklight();
390     }
391 
392     Service* bootAnim = ServiceList::GetInstance().FindService("bootanim");
393     Service* surfaceFlinger = ServiceList::GetInstance().FindService("surfaceflinger");
394     if (bootAnim != nullptr && surfaceFlinger != nullptr && surfaceFlinger->IsRunning()) {
395         // will not check animation class separately
396         for (const auto& service : ServiceList::GetInstance()) {
397             if (service->classnames().count("animation")) service->SetShutdownCritical();
398         }
399     }
400 
401     // optional shutdown step
402     // 1. terminate all services except shutdown critical ones. wait for delay to finish
403     if (shutdown_timeout > 0ms) {
404         LOG(INFO) << "terminating init services";
405 
406         // Ask all services to terminate except shutdown critical ones.
407         for (const auto& s : ServiceList::GetInstance().services_in_shutdown_order()) {
408             if (!s->IsShutdownCritical()) s->Terminate();
409         }
410 
411         int service_count = 0;
412         // Only wait up to half of timeout here
413         auto termination_wait_timeout = shutdown_timeout / 2;
414         while (t.duration() < termination_wait_timeout) {
415             ReapAnyOutstandingChildren();
416 
417             service_count = 0;
418             for (const auto& s : ServiceList::GetInstance()) {
419                 // Count the number of services running except shutdown critical.
420                 // Exclude the console as it will ignore the SIGTERM signal
421                 // and not exit.
422                 // Note: SVC_CONSOLE actually means "requires console" but
423                 // it is only used by the shell.
424                 if (!s->IsShutdownCritical() && s->pid() != 0 && (s->flags() & SVC_CONSOLE) == 0) {
425                     service_count++;
426                 }
427             }
428 
429             if (service_count == 0) {
430                 // All terminable services terminated. We can exit early.
431                 break;
432             }
433 
434             // Wait a bit before recounting the number or running services.
435             std::this_thread::sleep_for(50ms);
436         }
437         LOG(INFO) << "Terminating running services took " << t
438                   << " with remaining services:" << service_count;
439     }
440 
441     // minimum safety steps before restarting
442     // 2. kill all services except ones that are necessary for the shutdown sequence.
443     for (const auto& s : ServiceList::GetInstance().services_in_shutdown_order()) {
444         if (!s->IsShutdownCritical()) s->Stop();
445     }
446     ReapAnyOutstandingChildren();
447 
448     // 3. send volume shutdown to vold
449     Service* voldService = ServiceList::GetInstance().FindService("vold");
450     if (voldService != nullptr && voldService->IsRunning()) {
451         ShutdownVold();
452         voldService->Stop();
453     } else {
454         LOG(INFO) << "vold not running, skipping vold shutdown";
455     }
456     // logcat stopped here
457     for (const auto& s : ServiceList::GetInstance().services_in_shutdown_order()) {
458         if (kill_after_apps.count(s->name())) s->Stop();
459     }
460     // 4. sync, try umount, and optionally run fsck for user shutdown
461     sync();
462     UmountStat stat = TryUmountAndFsck(runFsck, shutdown_timeout - t.duration());
463     // Follow what linux shutdown is doing: one more sync with little bit delay
464     sync();
465     if (!is_thermal_shutdown) std::this_thread::sleep_for(100ms);
466     LogShutdownTime(stat, &t);
467     // Reboot regardless of umount status. If umount fails, fsck after reboot will fix it.
468     RebootSystem(cmd, rebootTarget);
469     abort();
470 }
471 
HandlePowerctlMessage(const std::string & command)472 bool HandlePowerctlMessage(const std::string& command) {
473     unsigned int cmd = 0;
474     std::vector<std::string> cmd_params = Split(command, ",");
475     std::string reboot_target = "";
476     bool run_fsck = false;
477     bool command_invalid = false;
478 
479     if (cmd_params.size() > 3) {
480         command_invalid = true;
481     } else if (cmd_params[0] == "shutdown") {
482         cmd = ANDROID_RB_POWEROFF;
483         if (cmd_params.size() == 2) {
484             if (cmd_params[1] == "userrequested") {
485                 // The shutdown reason is PowerManager.SHUTDOWN_USER_REQUESTED.
486                 // Run fsck once the file system is remounted in read-only mode.
487                 run_fsck = true;
488             } else if (cmd_params[1] == "thermal") {
489                 // Turn off sources of heat immediately.
490                 TurnOffBacklight();
491                 // run_fsck is false to avoid delay
492                 cmd = ANDROID_RB_THERMOFF;
493             }
494         }
495     } else if (cmd_params[0] == "reboot") {
496         cmd = ANDROID_RB_RESTART2;
497         if (cmd_params.size() >= 2) {
498             reboot_target = cmd_params[1];
499             // When rebooting to the bootloader notify the bootloader writing
500             // also the BCB.
501             if (reboot_target == "bootloader") {
502                 std::string err;
503                 if (!write_reboot_bootloader(&err)) {
504                     LOG(ERROR) << "reboot-bootloader: Error writing "
505                                   "bootloader_message: "
506                                << err;
507                 }
508             }
509             // If there is an additional parameter, pass it along
510             if ((cmd_params.size() == 3) && cmd_params[2].size()) {
511                 reboot_target += "," + cmd_params[2];
512             }
513         }
514     } else {
515         command_invalid = true;
516     }
517     if (command_invalid) {
518         LOG(ERROR) << "powerctl: unrecognized command '" << command << "'";
519         return false;
520     }
521 
522     LOG(INFO) << "Clear action queue and start shutdown trigger";
523     ActionManager::GetInstance().ClearQueue();
524     // Queue shutdown trigger first
525     ActionManager::GetInstance().QueueEventTrigger("shutdown");
526     // Queue built-in shutdown_done
527     auto shutdown_handler = [cmd, command, reboot_target, run_fsck](const BuiltinArguments&) {
528         DoReboot(cmd, command, reboot_target, run_fsck);
529         return Success();
530     };
531     ActionManager::GetInstance().QueueBuiltinAction(shutdown_handler, "shutdown_done");
532 
533     // Skip wait for prop if it is in progress
534     ResetWaitForProp();
535 
536     // Clear EXEC flag if there is one pending
537     for (const auto& s : ServiceList::GetInstance()) {
538         s->UnSetExec();
539     }
540 
541     return true;
542 }
543 
544 }  // namespace init
545 }  // namespace android
546