blob: a5f45497b9048357d81eed719350184cf2eecbdd [file] [log] [blame]
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -07001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
Tom Cherry3f5eaae52017-04-06 16:30:22 -070017#include "init.h"
18
Rom Lemarchand6a524432015-02-28 06:39:11 -080019#include <dirent.h>
Elliott Hughes8d82ea02015-02-06 20:15:18 -080020#include <fcntl.h>
yusukes4a4ec14e2018-02-01 17:14:30 -080021#include <pthread.h>
Tom Cherryd9e53da2018-09-05 15:37:26 -070022#include <seccomp_policy.h>
Elliott Hughes8d82ea02015-02-06 20:15:18 -080023#include <signal.h>
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070024#include <stdlib.h>
25#include <string.h>
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070026#include <sys/mount.h>
Luis Hector Chavez9f97f472017-09-06 13:43:57 -070027#include <sys/signalfd.h>
Elliott Hughes8d82ea02015-02-06 20:15:18 -080028#include <sys/types.h>
Elliott Hughes8d82ea02015-02-06 20:15:18 -080029#include <unistd.h>
30
Tom Cherry8ae73752018-05-01 13:39:52 -070031#include <map>
32#include <memory>
33#include <optional>
34
James Hawkinse78ea772017-03-24 11:43:02 -070035#include <android-base/chrono_utils.h>
Elliott Hughes4f713192015-12-04 22:00:26 -080036#include <android-base/file.h>
Tom Cherry3f5eaae52017-04-06 16:30:22 -070037#include <android-base/logging.h>
Tom Cherryccf23532017-03-28 16:40:41 -070038#include <android-base/properties.h>
Tom Cherry6f2d56d2018-02-21 10:37:44 -080039#include <android-base/stringprintf.h>
Elliott Hughes4f713192015-12-04 22:00:26 -080040#include <android-base/strings.h>
Tom Cherryd8db7ab2017-08-17 17:28:30 -070041#include <cutils/android_reboot.h>
Bowgo Tsai1dacd422019-03-04 17:53:34 +080042#include <fs_avb/fs_avb.h>
Justin Yun6bab0a92018-10-29 18:31:48 +090043#include <fs_mgr_vendor_overlay.h>
Elliott Hughesf8627ce2017-05-09 17:09:06 -070044#include <keyutils.h>
bowgotsai76351272017-02-14 22:06:20 +080045#include <libavb/libavb.h>
David Anderson372278c2019-02-14 12:46:13 -080046#include <libgsi/libgsi.h>
Suren Baghdasaryan82b72a52018-12-21 11:41:50 -080047#include <processgroup/processgroup.h>
Tom Cherryd9e53da2018-09-05 15:37:26 -070048#include <selinux/android.h>
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070049
Martijn Coenen62e985a2018-09-04 06:29:14 +020050#ifndef RECOVERY
51#include <binder/ProcessState.h>
52#endif
53
Tom Cherry0f6417f2018-02-13 15:25:29 -080054#include "action_parser.h"
Branden Archerd0521182018-11-15 08:43:48 -080055#include "boringssl_self_test.h"
Mark Salyzyn6c6ec722015-10-24 16:20:18 -070056#include "epoll.h"
Tom Cherry38a11cc2018-07-20 15:18:04 -070057#include "first_stage_mount.h"
Tom Cherryb7349902015-08-26 11:43:36 -070058#include "import_parser.h"
Tom Cherrybac32992015-07-31 12:45:25 -070059#include "keychords.h"
Mark Salyzyna73ed222019-03-13 10:18:24 -070060#include "mount_handler.h"
Jiyong Park68660412019-01-16 23:00:59 +090061#include "mount_namespace.h"
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070062#include "property_service.h"
Tom Cherry98ad32a2017-04-17 16:34:20 -070063#include "reboot.h"
Tom Cherry44aceed2018-08-03 13:36:18 -070064#include "reboot_utils.h"
Tom Cherry0c8d6d22017-08-10 12:22:44 -070065#include "security.h"
66#include "selinux.h"
Luis Hector Chavez9f97f472017-09-06 13:43:57 -070067#include "sigchld_handler.h"
Tom Cherrybac32992015-07-31 12:45:25 -070068#include "util.h"
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070069
Mark Salyzyn6c6ec722015-10-24 16:20:18 -070070using namespace std::chrono_literals;
Tom Cherry1c3a53f2017-06-22 16:50:31 -070071using namespace std::string_literals;
72
James Hawkinse78ea772017-03-24 11:43:02 -070073using android::base::boot_clock;
Tom Cherryccf23532017-03-28 16:40:41 -070074using android::base::GetProperty;
Tom Cherry6f2d56d2018-02-21 10:37:44 -080075using android::base::ReadFileToString;
76using android::base::StringPrintf;
Tom Cherryede0d532017-07-06 14:20:11 -070077using android::base::Timer;
Tom Cherry6f2d56d2018-02-21 10:37:44 -080078using android::base::Trim;
Bowgo Tsai1dacd422019-03-04 17:53:34 +080079using android::fs_mgr::AvbHandle;
Elliott Hughes9605a942016-11-10 17:43:47 -080080
Tom Cherry81f5d3e2017-06-22 12:53:17 -070081namespace android {
82namespace init {
83
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070084static int property_triggers_enabled = 0;
85
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070086static char qemu[32];
87
Viorel Suman70daa672016-03-21 10:08:07 +020088std::string default_console = "/dev/console";
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -070089
Ryan Prichard1325ec82018-04-11 18:46:38 -070090static int signal_fd = -1;
Elliott Hughes929f4072015-04-24 21:13:44 -070091
Wei Wang132ac312017-01-25 16:27:03 -080092static std::unique_ptr<Timer> waiting_for_prop(nullptr);
93static std::string wait_prop_name;
94static std::string wait_prop_value;
Wei Wangeeab4912017-06-27 22:08:45 -070095static bool shutting_down;
Tom Cherry3633a402017-09-13 14:39:45 -070096static std::string shutdown_command;
97static bool do_shutdown = false;
Bowgo Tsai1dacd422019-03-04 17:53:34 +080098static bool load_debug_prop = false;
Wei Wang132ac312017-01-25 16:27:03 -080099
Tom Cherry67dee622017-07-27 12:54:48 -0700100std::vector<std::string> late_import_paths;
101
Tom Cherrycb0f9bb2017-09-12 15:58:47 -0700102static std::vector<Subcontext>* subcontexts;
103
Tom Cherry30a6f272017-04-19 15:31:58 -0700104void DumpState() {
Tom Cherry911b9b12017-07-27 16:20:58 -0700105 ServiceList::GetInstance().DumpState();
Tom Cherry30a6f272017-04-19 15:31:58 -0700106 ActionManager::GetInstance().DumpState();
107}
108
Tom Cherry911b9b12017-07-27 16:20:58 -0700109Parser CreateParser(ActionManager& action_manager, ServiceList& service_list) {
Tom Cherry67dee622017-07-27 12:54:48 -0700110 Parser parser;
111
Tom Cherrycb0f9bb2017-09-12 15:58:47 -0700112 parser.AddSectionParser("service", std::make_unique<ServiceParser>(&service_list, subcontexts));
113 parser.AddSectionParser("on", std::make_unique<ActionParser>(&action_manager, subcontexts));
Tom Cherry67dee622017-07-27 12:54:48 -0700114 parser.AddSectionParser("import", std::make_unique<ImportParser>(&parser));
115
116 return parser;
117}
118
Jiyong Parkc2404402018-11-08 17:14:35 +0900119// parser that only accepts new services
120Parser CreateServiceOnlyParser(ServiceList& service_list) {
121 Parser parser;
122
123 parser.AddSectionParser("service", std::make_unique<ServiceParser>(&service_list, subcontexts));
124 return parser;
125}
126
Tom Cherry911b9b12017-07-27 16:20:58 -0700127static void LoadBootScripts(ActionManager& action_manager, ServiceList& service_list) {
128 Parser parser = CreateParser(action_manager, service_list);
Tom Cherry67dee622017-07-27 12:54:48 -0700129
130 std::string bootscript = GetProperty("ro.boot.init_rc", "");
131 if (bootscript.empty()) {
132 parser.ParseConfig("/init.rc");
133 if (!parser.ParseConfig("/system/etc/init")) {
134 late_import_paths.emplace_back("/system/etc/init");
135 }
Jaekyun Seokdff165d2017-11-28 12:10:10 +0900136 if (!parser.ParseConfig("/product/etc/init")) {
137 late_import_paths.emplace_back("/product/etc/init");
Tom Cherry67dee622017-07-27 12:54:48 -0700138 }
Dario Freniab5583b2018-08-17 01:01:25 +0100139 if (!parser.ParseConfig("/product_services/etc/init")) {
140 late_import_paths.emplace_back("/product_services/etc/init");
Dario Freni36137102018-05-25 16:07:19 +0100141 }
Tom Cherry67dee622017-07-27 12:54:48 -0700142 if (!parser.ParseConfig("/odm/etc/init")) {
143 late_import_paths.emplace_back("/odm/etc/init");
144 }
Jaekyun Seokdff165d2017-11-28 12:10:10 +0900145 if (!parser.ParseConfig("/vendor/etc/init")) {
146 late_import_paths.emplace_back("/vendor/etc/init");
147 }
Tom Cherry67dee622017-07-27 12:54:48 -0700148 } else {
149 parser.ParseConfig(bootscript);
150 }
151}
152
Wei Wang2d0fdaa2017-02-02 10:52:39 -0800153bool start_waiting_for_property(const char *name, const char *value)
Wei Wang132ac312017-01-25 16:27:03 -0800154{
155 if (waiting_for_prop) {
156 return false;
157 }
Tom Cherryccf23532017-03-28 16:40:41 -0700158 if (GetProperty(name, "") != value) {
Wei Wang132ac312017-01-25 16:27:03 -0800159 // Current property value is not equal to expected value
160 wait_prop_name = name;
161 wait_prop_value = value;
162 waiting_for_prop.reset(new Timer());
163 } else {
Wei Wang2d0fdaa2017-02-02 10:52:39 -0800164 LOG(INFO) << "start_waiting_for_property(\""
165 << name << "\", \"" << value << "\"): already set";
Wei Wang132ac312017-01-25 16:27:03 -0800166 }
167 return true;
168}
169
Wei Wangeeab4912017-06-27 22:08:45 -0700170void ResetWaitForProp() {
171 wait_prop_name.clear();
172 wait_prop_value.clear();
173 waiting_for_prop.reset();
174}
175
Tom Cherry98ad32a2017-04-17 16:34:20 -0700176void property_changed(const std::string& name, const std::string& value) {
177 // If the property is sys.powerctl, we bypass the event queue and immediately handle it.
178 // This is to ensure that init will always and immediately shutdown/reboot, regardless of
179 // if there are other pending events to process or if init is waiting on an exec service or
180 // waiting on a property.
Wei Wangeeab4912017-06-27 22:08:45 -0700181 // In non-thermal-shutdown case, 'shutdown' trigger will be fired to let device specific
182 // commands to be executed.
183 if (name == "sys.powerctl") {
Tom Cherry3633a402017-09-13 14:39:45 -0700184 // Despite the above comment, we can't call HandlePowerctlMessage() in this function,
185 // because it modifies the contents of the action queue, which can cause the action queue
186 // to get into a bad state if this function is called from a command being executed by the
187 // action queue. Instead we set this flag and ensure that shutdown happens before the next
188 // command is run in the main init loop.
189 // TODO: once property service is removed from init, this will never happen from a builtin,
190 // but rather from a callback from the property service socket, in which case this hack can
191 // go away.
192 shutdown_command = value;
193 do_shutdown = true;
Wei Wangeeab4912017-06-27 22:08:45 -0700194 }
Tom Cherry98ad32a2017-04-17 16:34:20 -0700195
Tom Cherry26ed9cb2017-04-17 13:25:29 -0700196 if (property_triggers_enabled) ActionManager::GetInstance().QueuePropertyChange(name, value);
197
Wei Wang132ac312017-01-25 16:27:03 -0800198 if (waiting_for_prop) {
199 if (wait_prop_name == name && wait_prop_value == value) {
Wei Wangc9352bb2019-02-05 14:45:47 -0800200 LOG(INFO) << "Wait for property '" << wait_prop_name << "=" << wait_prop_value
201 << "' took " << *waiting_for_prop;
Wei Wangeeab4912017-06-27 22:08:45 -0700202 ResetWaitForProp();
Wei Wang132ac312017-01-25 16:27:03 -0800203 }
204 }
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700205}
206
Tom Cherry73f535e2018-09-27 16:10:46 -0700207static std::optional<boot_clock::time_point> HandleProcessActions() {
208 std::optional<boot_clock::time_point> next_process_action_time;
Tom Cherry911b9b12017-07-27 16:20:58 -0700209 for (const auto& s : ServiceList::GetInstance()) {
Tom Cherry73f535e2018-09-27 16:10:46 -0700210 if ((s->flags() & SVC_RUNNING) && s->timeout_period()) {
211 auto timeout_time = s->time_started() + *s->timeout_period();
212 if (boot_clock::now() > timeout_time) {
213 s->Timeout();
214 } else {
215 if (!next_process_action_time || timeout_time < *next_process_action_time) {
216 next_process_action_time = timeout_time;
217 }
218 }
219 }
220
Tom Cherry911b9b12017-07-27 16:20:58 -0700221 if (!(s->flags() & SVC_RESTARTING)) continue;
Tom Cherryd269e3a2017-07-31 13:23:18 -0700222
Tom Cherry73f535e2018-09-27 16:10:46 -0700223 auto restart_time = s->time_started() + s->restart_period();
Tom Cherryd269e3a2017-07-31 13:23:18 -0700224 if (boot_clock::now() > restart_time) {
Tom Cherry702ca9a2017-08-25 10:36:52 -0700225 if (auto result = s->Start(); !result) {
226 LOG(ERROR) << "Could not restart process '" << s->name() << "': " << result.error();
227 }
Tom Cherryd269e3a2017-07-31 13:23:18 -0700228 } else {
Tom Cherry73f535e2018-09-27 16:10:46 -0700229 if (!next_process_action_time || restart_time < *next_process_action_time) {
230 next_process_action_time = restart_time;
Tom Cherryd269e3a2017-07-31 13:23:18 -0700231 }
232 }
Tom Cherry911b9b12017-07-27 16:20:58 -0700233 }
Tom Cherry73f535e2018-09-27 16:10:46 -0700234 return next_process_action_time;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700235}
236
Steven Morelande055d732017-10-05 18:50:22 -0700237static Result<Success> DoControlStart(Service* service) {
238 return service->Start();
239}
240
241static Result<Success> DoControlStop(Service* service) {
242 service->Stop();
243 return Success();
244}
245
246static Result<Success> DoControlRestart(Service* service) {
247 service->Restart();
248 return Success();
249}
250
251enum class ControlTarget {
252 SERVICE, // function gets called for the named service
253 INTERFACE, // action gets called for every service that holds this interface
254};
255
256struct ControlMessageFunction {
257 ControlTarget target;
258 std::function<Result<Success>(Service*)> action;
259};
260
261static const std::map<std::string, ControlMessageFunction>& get_control_message_map() {
262 // clang-format off
263 static const std::map<std::string, ControlMessageFunction> control_message_functions = {
Tom Cherry8f380482018-04-17 14:48:44 -0700264 {"sigstop_on", {ControlTarget::SERVICE,
265 [](auto* service) { service->set_sigstop(true); return Success(); }}},
266 {"sigstop_off", {ControlTarget::SERVICE,
267 [](auto* service) { service->set_sigstop(false); return Success(); }}},
Steven Morelande055d732017-10-05 18:50:22 -0700268 {"start", {ControlTarget::SERVICE, DoControlStart}},
269 {"stop", {ControlTarget::SERVICE, DoControlStop}},
270 {"restart", {ControlTarget::SERVICE, DoControlRestart}},
271 {"interface_start", {ControlTarget::INTERFACE, DoControlStart}},
272 {"interface_stop", {ControlTarget::INTERFACE, DoControlStop}},
273 {"interface_restart", {ControlTarget::INTERFACE, DoControlRestart}},
274 };
275 // clang-format on
276
277 return control_message_functions;
278}
279
Tom Cherry6f2d56d2018-02-21 10:37:44 -0800280void HandleControlMessage(const std::string& msg, const std::string& name, pid_t pid) {
Steven Morelande055d732017-10-05 18:50:22 -0700281 const auto& map = get_control_message_map();
282 const auto it = map.find(msg);
283
284 if (it == map.end()) {
285 LOG(ERROR) << "Unknown control msg '" << msg << "'";
Elliott Hughesbdeac392016-04-12 15:38:27 -0700286 return;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700287 }
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700288
Tom Cherry6f2d56d2018-02-21 10:37:44 -0800289 std::string cmdline_path = StringPrintf("proc/%d/cmdline", pid);
290 std::string process_cmdline;
291 if (ReadFileToString(cmdline_path, &process_cmdline)) {
292 std::replace(process_cmdline.begin(), process_cmdline.end(), '\0', ' ');
293 process_cmdline = Trim(process_cmdline);
294 } else {
295 process_cmdline = "unknown process";
296 }
297
298 LOG(INFO) << "Received control message '" << msg << "' for '" << name << "' from pid: " << pid
299 << " (" << process_cmdline << ")";
300
Steven Morelande055d732017-10-05 18:50:22 -0700301 const ControlMessageFunction& function = it->second;
302
Steven Moreland6227e342018-05-08 13:46:39 -0700303 Service* svc = nullptr;
Steven Morelande055d732017-10-05 18:50:22 -0700304
Steven Moreland6227e342018-05-08 13:46:39 -0700305 switch (function.target) {
306 case ControlTarget::SERVICE:
307 svc = ServiceList::GetInstance().FindService(name);
308 break;
309 case ControlTarget::INTERFACE:
310 svc = ServiceList::GetInstance().FindInterface(name);
311 break;
312 default:
313 LOG(ERROR) << "Invalid function target from static map key '" << msg << "': "
314 << static_cast<std::underlying_type<ControlTarget>::type>(function.target);
315 return;
316 }
317
318 if (svc == nullptr) {
319 LOG(ERROR) << "Could not find '" << name << "' for ctl." << msg;
Steven Morelande055d732017-10-05 18:50:22 -0700320 return;
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700321 }
Steven Morelande055d732017-10-05 18:50:22 -0700322
Steven Moreland6227e342018-05-08 13:46:39 -0700323 if (auto result = function.action(svc); !result) {
324 LOG(ERROR) << "Could not ctl." << msg << " for '" << name << "': " << result.error();
Steven Morelande055d732017-10-05 18:50:22 -0700325 }
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700326}
327
Tom Cherrycb0f9bb2017-09-12 15:58:47 -0700328static Result<Success> wait_for_coldboot_done_action(const BuiltinArguments& args) {
Elliott Hughesc6c26ed2015-04-24 18:50:30 -0700329 Timer t;
330
Elliott Hughesf86b5a62016-06-24 15:12:21 -0700331 LOG(VERBOSE) << "Waiting for " COLDBOOT_DONE "...";
Elliott Hughes331cf2f2016-11-29 19:20:58 +0000332
333 // Historically we had a 1s timeout here because we weren't otherwise
334 // tracking boot time, and many OEMs made their sepolicy regular
335 // expressions too expensive (http://b/19899875).
336
337 // Now we're tracking boot time, just log the time taken to a system
338 // property. We still panic if it takes more than a minute though,
339 // because any build that slow isn't likely to boot at all, and we'd
340 // rather any test lab devices fail back to the bootloader.
341 if (wait_for_file(COLDBOOT_DONE, 60s) < 0) {
Tom Cherryd8db7ab2017-08-17 17:28:30 -0700342 LOG(FATAL) << "Timed out waiting for " COLDBOOT_DONE;
Elliott Hughesc6c26ed2015-04-24 18:50:30 -0700343 }
344
Tom Cherryede0d532017-07-06 14:20:11 -0700345 property_set("ro.boottime.init.cold_boot_wait", std::to_string(t.duration().count()));
Tom Cherry557946e2017-08-01 13:50:23 -0700346 return Success();
Colin Crossebc6ff12010-04-13 19:52:01 -0700347}
348
Tom Cherrycb0f9bb2017-09-12 15:58:47 -0700349static Result<Success> console_init_action(const BuiltinArguments& args) {
Tom Cherryccf23532017-03-28 16:40:41 -0700350 std::string console = GetProperty("ro.boot.console", "");
Viorel Sumanefc72752016-03-21 10:23:43 +0200351 if (!console.empty()) {
Viorel Suman70daa672016-03-21 10:08:07 +0200352 default_console = "/dev/" + console;
Colin Crossebc6ff12010-04-13 19:52:01 -0700353 }
Tom Cherry557946e2017-08-01 13:50:23 -0700354 return Success();
Colin Crossebc6ff12010-04-13 19:52:01 -0700355}
356
Suren Baghdasaryan82b72a52018-12-21 11:41:50 -0800357static Result<Success> SetupCgroupsAction(const BuiltinArguments&) {
358 // Have to create <CGROUPS_RC_DIR> using make_dir function
359 // for appropriate sepolicy to be set for it
360 make_dir(CGROUPS_RC_DIR, 0711);
361 if (!CgroupSetupCgroups()) {
362 return ErrnoError() << "Failed to setup cgroups";
363 }
364
365 return Success();
366}
367
Elliott Hughese5ce30f2015-05-06 19:19:24 -0700368static void import_kernel_nv(const std::string& key, const std::string& value, bool for_emulator) {
369 if (key.empty()) return;
Dima Zavin5511c842011-12-19 11:21:32 -0800370
371 if (for_emulator) {
Elliott Hughese5ce30f2015-05-06 19:19:24 -0700372 // In the emulator, export any kernel option with the "ro.kernel." prefix.
Tom Cherry1c3a53f2017-06-22 16:50:31 -0700373 property_set("ro.kernel." + key, value);
Dima Zavin5511c842011-12-19 11:21:32 -0800374 return;
375 }
376
Elliott Hughese5ce30f2015-05-06 19:19:24 -0700377 if (key == "qemu") {
378 strlcpy(qemu, value.c_str(), sizeof(qemu));
379 } else if (android::base::StartsWith(key, "androidboot.")) {
Tom Cherry1c3a53f2017-06-22 16:50:31 -0700380 property_set("ro.boot." + key.substr(12), value);
Dima Zavin5511c842011-12-19 11:21:32 -0800381 }
382}
383
Sami Tolvanen9e9efca2015-12-07 12:33:58 +0000384static void export_oem_lock_status() {
Tom Cherryccf23532017-03-28 16:40:41 -0700385 if (!android::base::GetBoolProperty("ro.oem_unlock_supported", false)) {
Sami Tolvanen9e9efca2015-12-07 12:33:58 +0000386 return;
387 }
Hridya Valsaraju5ed32782018-09-25 15:43:42 -0700388 import_kernel_cmdline(
389 false, [](const std::string& key, const std::string& value, bool in_qemu) {
390 if (key == "androidboot.verifiedbootstate") {
391 property_set("ro.boot.flash.locked", value == "orange" ? "0" : "1");
392 }
393 });
Sami Tolvanen9e9efca2015-12-07 12:33:58 +0000394}
395
Elliott Hughesd679bc92015-03-20 08:50:46 -0700396static void export_kernel_boot_props() {
Chris Morin39d124b2018-06-21 18:42:22 -0700397 constexpr const char* UNSET = "";
Dima Zavin5511c842011-12-19 11:21:32 -0800398 struct {
399 const char *src_prop;
Elliott Hughesd679bc92015-03-20 08:50:46 -0700400 const char *dst_prop;
401 const char *default_value;
Dima Zavin5511c842011-12-19 11:21:32 -0800402 } prop_map[] = {
Chris Morin39d124b2018-06-21 18:42:22 -0700403 { "ro.boot.serialno", "ro.serialno", UNSET, },
Elliott Hughesd679bc92015-03-20 08:50:46 -0700404 { "ro.boot.mode", "ro.bootmode", "unknown", },
405 { "ro.boot.baseband", "ro.baseband", "unknown", },
Dima Zavin5511c842011-12-19 11:21:32 -0800406 { "ro.boot.bootloader", "ro.bootloader", "unknown", },
Elliott Hughesd679bc92015-03-20 08:50:46 -0700407 { "ro.boot.hardware", "ro.hardware", "unknown", },
408 { "ro.boot.revision", "ro.revision", "0", },
Dima Zavin5511c842011-12-19 11:21:32 -0800409 };
Chris Morin39d124b2018-06-21 18:42:22 -0700410 for (const auto& prop : prop_map) {
411 std::string value = GetProperty(prop.src_prop, prop.default_value);
412 if (value != UNSET)
413 property_set(prop.dst_prop, value);
Dima Zavin5511c842011-12-19 11:21:32 -0800414 }
Dima Zavin5511c842011-12-19 11:21:32 -0800415}
Colin Crossebc6ff12010-04-13 19:52:01 -0700416
Sandeep Patilfc86f242017-02-09 19:19:31 -0800417static void process_kernel_dt() {
Bowgo Tsaid2620172017-04-17 22:17:09 +0800418 if (!is_android_dt_value_expected("compatible", "android,firmware")) {
419 return;
420 }
Sandeep Patilfc86f242017-02-09 19:19:31 -0800421
Yu Ningc01022a2017-07-26 17:54:08 +0800422 std::unique_ptr<DIR, int (*)(DIR*)> dir(opendir(get_android_dt_dir().c_str()), closedir);
Elliott Hughese5ce30f2015-05-06 19:19:24 -0700423 if (!dir) return;
Rom Lemarchand6a524432015-02-28 06:39:11 -0800424
Sandeep Patilfc86f242017-02-09 19:19:31 -0800425 std::string dt_file;
Rom Lemarchand6a524432015-02-28 06:39:11 -0800426 struct dirent *dp;
427 while ((dp = readdir(dir.get())) != NULL) {
Rom Lemarchand1dcf3252015-11-08 17:51:50 -0800428 if (dp->d_type != DT_REG || !strcmp(dp->d_name, "compatible") || !strcmp(dp->d_name, "name")) {
Rom Lemarchand6a524432015-02-28 06:39:11 -0800429 continue;
Elliott Hughese5ce30f2015-05-06 19:19:24 -0700430 }
Rom Lemarchand6a524432015-02-28 06:39:11 -0800431
Yu Ningc01022a2017-07-26 17:54:08 +0800432 std::string file_name = get_android_dt_dir() + dp->d_name;
Rom Lemarchand6a524432015-02-28 06:39:11 -0800433
434 android::base::ReadFileToString(file_name, &dt_file);
435 std::replace(dt_file.begin(), dt_file.end(), ',', '.');
436
Tom Cherry1c3a53f2017-06-22 16:50:31 -0700437 property_set("ro.boot."s + dp->d_name, dt_file);
Rom Lemarchand6a524432015-02-28 06:39:11 -0800438 }
439}
440
Elliott Hughese5ce30f2015-05-06 19:19:24 -0700441static void process_kernel_cmdline() {
Elliott Hughese5ce30f2015-05-06 19:19:24 -0700442 // The first pass does the common stuff, and finds if we are in qemu.
443 // The second pass is only necessary for qemu to export all kernel params
444 // as properties.
Nick Kralevichf667a322015-04-25 17:42:52 -0700445 import_kernel_cmdline(false, import_kernel_nv);
Elliott Hughese5ce30f2015-05-06 19:19:24 -0700446 if (qemu[0]) import_kernel_cmdline(true, import_kernel_nv);
Colin Crossebc6ff12010-04-13 19:52:01 -0700447}
448
Tom Cherrycb0f9bb2017-09-12 15:58:47 -0700449static Result<Success> property_enable_triggers_action(const BuiltinArguments& args) {
caozhiyuanb104c502016-11-26 21:14:07 +0800450 /* Enable property triggers. */
451 property_triggers_enabled = 1;
Tom Cherry557946e2017-08-01 13:50:23 -0700452 return Success();
caozhiyuanb104c502016-11-26 21:14:07 +0800453}
454
Tom Cherrycb0f9bb2017-09-12 15:58:47 -0700455static Result<Success> queue_property_triggers_action(const BuiltinArguments& args) {
caozhiyuanb104c502016-11-26 21:14:07 +0800456 ActionManager::GetInstance().QueueBuiltinAction(property_enable_triggers_action, "enable_property_trigger");
Tom Cherry26ed9cb2017-04-17 13:25:29 -0700457 ActionManager::GetInstance().QueueAllPropertyActions();
Tom Cherry557946e2017-08-01 13:50:23 -0700458 return Success();
Colin Crossebc6ff12010-04-13 19:52:01 -0700459}
460
Martijn Coenen62e985a2018-09-04 06:29:14 +0200461static Result<Success> InitBinder(const BuiltinArguments& args) {
462 // init's use of binder is very limited. init cannot:
463 // - have any binder threads
464 // - receive incoming binder calls
465 // - pass local binder services to remote processes
466 // - use death recipients
467 // The main supported usecases are:
468 // - notifying other daemons (oneway calls only)
469 // - retrieving data that is necessary to boot
470 // Also, binder can't be used by recovery.
471#ifndef RECOVERY
472 android::ProcessState::self()->setThreadPoolMaxThreadCount(0);
Steven Morelanddc1f2472019-01-11 14:39:45 -0800473 android::ProcessState::self()->setCallRestriction(
474 ProcessState::CallRestriction::ERROR_IF_NOT_ONEWAY);
Martijn Coenen62e985a2018-09-04 06:29:14 +0200475#endif
476 return Success();
477}
478
Amit Pundird2e74db2016-06-29 19:00:00 +0530479// Set the UDC controller for the ConfigFS USB Gadgets.
480// Read the UDC controller in use from "/sys/class/udc".
481// In case of multiple UDC controllers select the first one.
482static void set_usb_controller() {
483 std::unique_ptr<DIR, decltype(&closedir)>dir(opendir("/sys/class/udc"), closedir);
484 if (!dir) return;
485
486 dirent* dp;
487 while ((dp = readdir(dir.get())) != nullptr) {
488 if (dp->d_name[0] == '.') continue;
489
490 property_set("sys.usb.controller", dp->d_name);
491 break;
492 }
493}
494
Ryan Prichard1325ec82018-04-11 18:46:38 -0700495static void HandleSigtermSignal(const signalfd_siginfo& siginfo) {
Luis Hector Chavez9f97f472017-09-06 13:43:57 -0700496 if (siginfo.ssi_pid != 0) {
497 // Drop any userspace SIGTERM requests.
498 LOG(DEBUG) << "Ignoring SIGTERM from pid " << siginfo.ssi_pid;
499 return;
500 }
501
Mark Salyzyn161b8622017-09-26 08:26:12 -0700502 HandlePowerctlMessage("shutdown,container");
Luis Hector Chavez9f97f472017-09-06 13:43:57 -0700503}
504
Ryan Prichard1325ec82018-04-11 18:46:38 -0700505static void HandleSignalFd() {
506 signalfd_siginfo siginfo;
507 ssize_t bytes_read = TEMP_FAILURE_RETRY(read(signal_fd, &siginfo, sizeof(siginfo)));
508 if (bytes_read != sizeof(siginfo)) {
509 PLOG(ERROR) << "Failed to read siginfo from signal_fd";
510 return;
511 }
yusukes4a4ec14e2018-02-01 17:14:30 -0800512
Ryan Prichard1325ec82018-04-11 18:46:38 -0700513 switch (siginfo.ssi_signo) {
514 case SIGCHLD:
515 ReapAnyOutstandingChildren();
516 break;
517 case SIGTERM:
518 HandleSigtermSignal(siginfo);
519 break;
520 default:
521 PLOG(ERROR) << "signal_fd: received unexpected signal " << siginfo.ssi_signo;
522 break;
yusukes4a4ec14e2018-02-01 17:14:30 -0800523 }
524}
525
Ryan Prichard1325ec82018-04-11 18:46:38 -0700526static void UnblockSignals() {
527 const struct sigaction act { .sa_handler = SIG_DFL };
528 sigaction(SIGCHLD, &act, nullptr);
529
Luis Hector Chavez9f97f472017-09-06 13:43:57 -0700530 sigset_t mask;
531 sigemptyset(&mask);
Ryan Prichard1325ec82018-04-11 18:46:38 -0700532 sigaddset(&mask, SIGCHLD);
Luis Hector Chavez9f97f472017-09-06 13:43:57 -0700533 sigaddset(&mask, SIGTERM);
534
Ryan Prichard1325ec82018-04-11 18:46:38 -0700535 if (sigprocmask(SIG_UNBLOCK, &mask, nullptr) == -1) {
536 PLOG(FATAL) << "failed to unblock signals for PID " << getpid();
537 }
538}
539
Mark Salyzyn6c6ec722015-10-24 16:20:18 -0700540static void InstallSignalFdHandler(Epoll* epoll) {
Ryan Prichard1325ec82018-04-11 18:46:38 -0700541 // Applying SA_NOCLDSTOP to a defaulted SIGCHLD handler prevents the signalfd from receiving
542 // SIGCHLD when a child process stops or continues (b/77867680#comment9).
543 const struct sigaction act { .sa_handler = SIG_DFL, .sa_flags = SA_NOCLDSTOP };
544 sigaction(SIGCHLD, &act, nullptr);
545
546 sigset_t mask;
547 sigemptyset(&mask);
548 sigaddset(&mask, SIGCHLD);
549
550 if (!IsRebootCapable()) {
551 // If init does not have the CAP_SYS_BOOT capability, it is running in a container.
552 // In that case, receiving SIGTERM will cause the system to shut down.
553 sigaddset(&mask, SIGTERM);
Luis Hector Chavez9f97f472017-09-06 13:43:57 -0700554 }
555
Ryan Prichard1325ec82018-04-11 18:46:38 -0700556 if (sigprocmask(SIG_BLOCK, &mask, nullptr) == -1) {
557 PLOG(FATAL) << "failed to block signals";
558 }
559
560 // Register a handler to unblock signals in the child processes.
561 const int result = pthread_atfork(nullptr, nullptr, &UnblockSignals);
yusukes4a4ec14e2018-02-01 17:14:30 -0800562 if (result != 0) {
563 LOG(FATAL) << "Failed to register a fork handler: " << strerror(result);
564 }
565
Ryan Prichard1325ec82018-04-11 18:46:38 -0700566 signal_fd = signalfd(-1, &mask, SFD_CLOEXEC);
567 if (signal_fd == -1) {
568 PLOG(FATAL) << "failed to create signalfd";
Luis Hector Chavez9f97f472017-09-06 13:43:57 -0700569 }
570
Mark Salyzyn6c6ec722015-10-24 16:20:18 -0700571 if (auto result = epoll->RegisterHandler(signal_fd, HandleSignalFd); !result) {
572 LOG(FATAL) << result.error();
573 }
Luis Hector Chavez9f97f472017-09-06 13:43:57 -0700574}
575
Mark Salyzyn13857252018-05-18 15:25:15 -0700576void HandleKeychord(const std::vector<int>& keycodes) {
Mark Salyzyneca25072018-05-16 15:10:24 -0700577 // Only handle keychords if adb is enabled.
578 std::string adb_enabled = android::base::GetProperty("init.svc.adbd", "");
Mark Salyzyn13857252018-05-18 15:25:15 -0700579 if (adb_enabled != "running") {
580 LOG(WARNING) << "Not starting service for keychord " << android::base::Join(keycodes, ' ')
581 << " because ADB is disabled";
582 return;
583 }
584
585 auto found = false;
586 for (const auto& service : ServiceList::GetInstance()) {
587 auto svc = service.get();
588 if (svc->keycodes() == keycodes) {
589 found = true;
590 LOG(INFO) << "Starting service '" << svc->name() << "' from keychord "
591 << android::base::Join(keycodes, ' ');
Mark Salyzyneca25072018-05-16 15:10:24 -0700592 if (auto result = svc->Start(); !result) {
Mark Salyzyn13857252018-05-18 15:25:15 -0700593 LOG(ERROR) << "Could not start service '" << svc->name() << "' from keychord "
594 << android::base::Join(keycodes, ' ') << ": " << result.error();
Mark Salyzyneca25072018-05-16 15:10:24 -0700595 }
Mark Salyzyneca25072018-05-16 15:10:24 -0700596 }
Mark Salyzyn13857252018-05-18 15:25:15 -0700597 }
598 if (!found) {
599 LOG(ERROR) << "Service for keychord " << android::base::Join(keycodes, ' ') << " not found";
Mark Salyzyneca25072018-05-16 15:10:24 -0700600 }
601}
602
Tom Cherry74069d12018-07-20 15:26:25 -0700603static void InitAborter(const char* abort_message) {
604 // When init forks, it continues to use this aborter for LOG(FATAL), but we want children to
605 // simply abort instead of trying to reboot the system.
606 if (getpid() != 1) {
607 android::base::DefaultAborter(abort_message);
608 return;
609 }
610
611 RebootSystem(ANDROID_RB_RESTART2, "bootloader");
612}
613
Tom Cherryd9e53da2018-09-05 15:37:26 -0700614static void GlobalSeccomp() {
615 import_kernel_cmdline(false, [](const std::string& key, const std::string& value,
616 bool in_qemu) {
617 if (key == "androidboot.seccomp" && value == "global" && !set_global_seccomp_filter()) {
618 LOG(FATAL) << "Failed to globally enable seccomp!";
619 }
620 });
621}
622
Tom Cherry7bfea3d2018-11-06 14:12:05 -0800623int SecondStageMain(int argc, char** argv) {
Tom Cherry663fdfc2017-03-10 14:46:38 -0800624 if (REBOOT_BOOTLOADER_ON_PANIC) {
Tom Cherry1ca83242017-08-25 15:10:48 -0700625 InstallRebootSignalHandlers();
Tom Cherry663fdfc2017-03-10 14:46:38 -0800626 }
627
Tom Cherry48e83e62018-10-04 13:14:14 -0700628 // We need to set up stdin/stdout/stderr again now that we're running in init's context.
629 InitKernelLogging(argv, InitAborter);
Tom Cherry34e70412017-03-16 18:08:56 -0700630 LOG(INFO) << "init second stage started!";
631
Tom Cherryd9e53da2018-09-05 15:37:26 -0700632 // Enable seccomp if global boot option was passed (otherwise it is enabled in zygote).
633 GlobalSeccomp();
634
Mark Salyzyn45996272017-05-02 14:44:39 -0700635 // Set up a session keyring that all processes will have access to. It
636 // will hold things like FBE encryption keys. No process should override
637 // its session keyring.
Elliott Hughesf8627ce2017-05-09 17:09:06 -0700638 keyctl_get_keyring_ID(KEY_SPEC_SESSION_KEYRING, 1);
Mark Salyzyn45996272017-05-02 14:44:39 -0700639
Tom Cherry34e70412017-03-16 18:08:56 -0700640 // Indicate that booting is in progress to background fw loaders, etc.
641 close(open("/dev/.booting", O_WRONLY | O_CREAT | O_CLOEXEC, 0000));
642
643 property_init();
644
645 // If arguments are passed both on the command line and in DT,
646 // properties set in DT always have priority over the command-line ones.
647 process_kernel_dt();
648 process_kernel_cmdline();
649
650 // Propagate the kernel variables to internal variables
651 // used by init as well as the current required properties.
652 export_kernel_boot_props();
653
654 // Make the time that init started available for bootstat to log.
655 property_set("ro.boottime.init", getenv("INIT_STARTED_AT"));
656 property_set("ro.boottime.init.selinux", getenv("INIT_SELINUX_TOOK"));
657
658 // Set libavb version for Framework-only OTA match in Treble build.
Bowgo Tsai1a898c22017-04-13 21:17:48 +0800659 const char* avb_version = getenv("INIT_AVB_VERSION");
660 if (avb_version) property_set("ro.boot.avb_version", avb_version);
Tom Cherry34e70412017-03-16 18:08:56 -0700661
Bowgo Tsai1dacd422019-03-04 17:53:34 +0800662 // See if need to load debug props to allow adb root, when the device is unlocked.
663 const char* force_debuggable_env = getenv("INIT_FORCE_DEBUGGABLE");
664 if (force_debuggable_env && AvbHandle::IsDeviceUnlocked()) {
665 load_debug_prop = "true"s == force_debuggable_env;
666 }
667
Tom Cherry34e70412017-03-16 18:08:56 -0700668 // Clean up our environment.
Tom Cherry34e70412017-03-16 18:08:56 -0700669 unsetenv("INIT_STARTED_AT");
670 unsetenv("INIT_SELINUX_TOOK");
Bowgo Tsai1a898c22017-04-13 21:17:48 +0800671 unsetenv("INIT_AVB_VERSION");
Bowgo Tsai1dacd422019-03-04 17:53:34 +0800672 unsetenv("INIT_FORCE_DEBUGGABLE");
Tom Cherry34e70412017-03-16 18:08:56 -0700673
674 // Now set up SELinux for second stage.
Tom Cherry0c8d6d22017-08-10 12:22:44 -0700675 SelinuxSetupKernelLogging();
676 SelabelInitialize();
677 SelinuxRestoreContext();
Stephen Smalleye46f9d52012-01-13 08:48:47 -0500678
Mark Salyzyn6c6ec722015-10-24 16:20:18 -0700679 Epoll epoll;
680 if (auto result = epoll.Open(); !result) {
681 PLOG(FATAL) << result.error();
Elliott Hughes929f4072015-04-24 21:13:44 -0700682 }
683
Mark Salyzyn6c6ec722015-10-24 16:20:18 -0700684 InstallSignalFdHandler(&epoll);
Elliott Hughes9042cae2015-04-24 17:43:21 -0700685
Bowgo Tsai1dacd422019-03-04 17:53:34 +0800686 property_load_boot_defaults(load_debug_prop);
Justin Yun6bab0a92018-10-29 18:31:48 +0900687 fs_mgr_vendor_overlay_mount_all();
Sami Tolvanen9e9efca2015-12-07 12:33:58 +0000688 export_oem_lock_status();
Mark Salyzyn6c6ec722015-10-24 16:20:18 -0700689 StartPropertyService(&epoll);
Mark Salyzyna73ed222019-03-13 10:18:24 -0700690 MountHandler mount_handler(&epoll);
Amit Pundird2e74db2016-06-29 19:00:00 +0530691 set_usb_controller();
Dima Zavind7634c92011-12-16 14:18:06 -0800692
Tom Cherryb7349902015-08-26 11:43:36 -0700693 const BuiltinFunctionMap function_map;
694 Action::set_function_map(&function_map);
695
Jiyong Park68660412019-01-16 23:00:59 +0900696 if (!SetupMountNamespaces()) {
697 PLOG(FATAL) << "SetupMountNamespaces failed";
698 }
699
Tom Cherrycb0f9bb2017-09-12 15:58:47 -0700700 subcontexts = InitializeSubcontexts();
701
Tom Cherry30a6f272017-04-19 15:31:58 -0700702 ActionManager& am = ActionManager::GetInstance();
Tom Cherry911b9b12017-07-27 16:20:58 -0700703 ServiceList& sm = ServiceList::GetInstance();
Tom Cherry30a6f272017-04-19 15:31:58 -0700704
Tom Cherry67dee622017-07-27 12:54:48 -0700705 LoadBootScripts(am, sm);
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700706
Tom Cherryd8a72572017-03-13 12:24:49 -0700707 // Turning this on and letting the INFO logging be discarded adds 0.2s to
708 // Nexus 9 boot time, so it's disabled by default.
Tom Cherry30a6f272017-04-19 15:31:58 -0700709 if (false) DumpState();
Tom Cherryfa0c21c2015-07-23 17:53:11 -0700710
David Anderson372278c2019-02-14 12:46:13 -0800711 // Make the GSI status available before scripts start running.
712 if (android::gsi::IsGsiRunning()) {
713 property_set("ro.gsid.image_running", "1");
714 } else {
715 property_set("ro.gsid.image_running", "0");
716 }
717
Suren Baghdasaryan82b72a52018-12-21 11:41:50 -0800718 am.QueueBuiltinAction(SetupCgroupsAction, "SetupCgroups");
719
Tom Cherryfa0c21c2015-07-23 17:53:11 -0700720 am.QueueEventTrigger("early-init");
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700721
Elliott Hughesc6c26ed2015-04-24 18:50:30 -0700722 // Queue an action that waits for coldboot done so we know ueventd has set up all of /dev...
Tom Cherryfa0c21c2015-07-23 17:53:11 -0700723 am.QueueBuiltinAction(wait_for_coldboot_done_action, "wait_for_coldboot_done");
Elliott Hughesc6c26ed2015-04-24 18:50:30 -0700724 // ... so that we can start queuing up actions that require stuff from /dev.
Tom Cherry0c8d6d22017-08-10 12:22:44 -0700725 am.QueueBuiltinAction(MixHwrngIntoLinuxRngAction, "MixHwrngIntoLinuxRng");
726 am.QueueBuiltinAction(SetMmapRndBitsAction, "SetMmapRndBits");
727 am.QueueBuiltinAction(SetKptrRestrictAction, "SetKptrRestrict");
Mark Salyzyn06aeb412018-05-18 15:25:15 -0700728 Keychords keychords;
Mark Salyzyn6c6ec722015-10-24 16:20:18 -0700729 am.QueueBuiltinAction(
Mark Salyzyn06aeb412018-05-18 15:25:15 -0700730 [&epoll, &keychords](const BuiltinArguments& args) -> Result<Success> {
Mark Salyzyneca25072018-05-16 15:10:24 -0700731 for (const auto& svc : ServiceList::GetInstance()) {
Mark Salyzyn13857252018-05-18 15:25:15 -0700732 keychords.Register(svc->keycodes());
Mark Salyzyneca25072018-05-16 15:10:24 -0700733 }
Mark Salyzyn06aeb412018-05-18 15:25:15 -0700734 keychords.Start(&epoll, HandleKeychord);
Mark Salyzyn6c6ec722015-10-24 16:20:18 -0700735 return Success();
736 },
737 "KeychordInit");
Tom Cherryfa0c21c2015-07-23 17:53:11 -0700738 am.QueueBuiltinAction(console_init_action, "console_init");
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700739
Elliott Hughesda40c002015-03-27 23:20:44 -0700740 // Trigger all the boot actions to get us started.
Tom Cherryfa0c21c2015-07-23 17:53:11 -0700741 am.QueueEventTrigger("init");
Dima Zavinca47cef2011-08-24 15:28:23 -0700742
Branden Archerd0521182018-11-15 08:43:48 -0800743 // Starting the BoringSSL self test, for NIAP certification compliance.
744 am.QueueBuiltinAction(StartBoringSslSelfTest, "StartBoringSslSelfTest");
745
Elliott Hughes8d82ea02015-02-06 20:15:18 -0800746 // Repeat mix_hwrng_into_linux_rng in case /dev/hw_random or /dev/random
747 // wasn't ready immediately after wait_for_coldboot_done
Tom Cherry0c8d6d22017-08-10 12:22:44 -0700748 am.QueueBuiltinAction(MixHwrngIntoLinuxRngAction, "MixHwrngIntoLinuxRng");
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700749
Martijn Coenen62e985a2018-09-04 06:29:14 +0200750 // Initialize binder before bringing up other system services
751 am.QueueBuiltinAction(InitBinder, "InitBinder");
752
Elliott Hughes8d82ea02015-02-06 20:15:18 -0800753 // Don't mount filesystems or start core system services in charger mode.
Tom Cherryccf23532017-03-28 16:40:41 -0700754 std::string bootmode = GetProperty("ro.bootmode", "");
Yabin Cui74edcea2015-07-24 10:11:05 -0700755 if (bootmode == "charger") {
Tom Cherryfa0c21c2015-07-23 17:53:11 -0700756 am.QueueEventTrigger("charger");
Dima Zavinca47cef2011-08-24 15:28:23 -0700757 } else {
Tom Cherryfa0c21c2015-07-23 17:53:11 -0700758 am.QueueEventTrigger("late-init");
Dima Zavinca47cef2011-08-24 15:28:23 -0700759 }
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700760
Elliott Hughes8d82ea02015-02-06 20:15:18 -0800761 // Run all property triggers based on current state of the properties.
Tom Cherryfa0c21c2015-07-23 17:53:11 -0700762 am.QueueBuiltinAction(queue_property_triggers_action, "queue_property_triggers");
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700763
Elliott Hughesc6c26ed2015-04-24 18:50:30 -0700764 while (true) {
Elliott Hughes9605a942016-11-10 17:43:47 -0800765 // By default, sleep until something happens.
Mark Salyzyn6c6ec722015-10-24 16:20:18 -0700766 auto epoll_timeout = std::optional<std::chrono::milliseconds>{};
Elliott Hughes9605a942016-11-10 17:43:47 -0800767
Tom Cherry3633a402017-09-13 14:39:45 -0700768 if (do_shutdown && !shutting_down) {
769 do_shutdown = false;
770 if (HandlePowerctlMessage(shutdown_command)) {
771 shutting_down = true;
772 }
773 }
774
Tom Cherry3b81f2d2017-07-28 14:48:41 -0700775 if (!(waiting_for_prop || Service::is_exec_service_running())) {
Tom Cherry77ddcd52017-03-23 16:54:38 -0700776 am.ExecuteOneCommand();
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700777 }
Tom Cherry3b81f2d2017-07-28 14:48:41 -0700778 if (!(waiting_for_prop || Service::is_exec_service_running())) {
Tom Cherryd269e3a2017-07-31 13:23:18 -0700779 if (!shutting_down) {
Tom Cherry73f535e2018-09-27 16:10:46 -0700780 auto next_process_action_time = HandleProcessActions();
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700781
Tom Cherryd269e3a2017-07-31 13:23:18 -0700782 // If there's a process that needs restarting, wake up in time for that.
Tom Cherry73f535e2018-09-27 16:10:46 -0700783 if (next_process_action_time) {
Mark Salyzyn6c6ec722015-10-24 16:20:18 -0700784 epoll_timeout = std::chrono::ceil<std::chrono::milliseconds>(
Tom Cherry73f535e2018-09-27 16:10:46 -0700785 *next_process_action_time - boot_clock::now());
Mark Salyzyn6c6ec722015-10-24 16:20:18 -0700786 if (*epoll_timeout < 0ms) epoll_timeout = 0ms;
Tom Cherryd269e3a2017-07-31 13:23:18 -0700787 }
Tom Cherry77ddcd52017-03-23 16:54:38 -0700788 }
789
790 // If there's more work to do, wake up again immediately.
Mark Salyzyn6c6ec722015-10-24 16:20:18 -0700791 if (am.HasMoreCommands()) epoll_timeout = 0ms;
Tom Cherry77ddcd52017-03-23 16:54:38 -0700792 }
Wei Wang16db4342016-11-30 15:43:42 -0800793
Mark Salyzyn6c6ec722015-10-24 16:20:18 -0700794 if (auto result = epoll.Wait(epoll_timeout); !result) {
795 LOG(ERROR) << result.error();
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700796 }
The Android Open Source Project4f6e8d72008-10-21 07:00:00 -0700797 }
798
799 return 0;
800}
Tom Cherry81f5d3e2017-06-22 12:53:17 -0700801
802} // namespace init
803} // namespace android