From 4a787d96ceda4981b53cade7270b9cb27017c840 Mon Sep 17 00:00:00 2001 From: Nikita Ioffe Date: Wed, 15 Jan 2020 23:23:13 +0000 Subject: [PATCH] Whitelist reboot reasons related to userspace reboot failure Test: system/core/bootstat/boot_reason_test.sh Bug: 135984674 Change-Id: I31422329f1109273909293a83913ae801eb1fe52 --- bootstat/bootstat.cpp | 5 +++++ init/builtins.cpp | 3 ++- init/reboot.cpp | 6 +++--- 3 files changed, 10 insertions(+), 4 deletions(-) diff --git a/bootstat/bootstat.cpp b/bootstat/bootstat.cpp index d08a59f77..6409db0d5 100644 --- a/bootstat/bootstat.cpp +++ b/bootstat/bootstat.cpp @@ -312,6 +312,11 @@ const std::map kBootReasonMap = { {"reboot,unknown[0-9]*", 183}, {"reboot,longkey,.*", 184}, {"reboot,boringssl-self-check-failed", 185}, + {"reboot,userspace_failed,shutdown_aborted", 186}, + {"reboot,userspace_failed,watchdog_triggered", 187}, + {"reboot,userspace_failed,watchdog_fork", 188}, + {"reboot,userspace_failed,*", 189}, + {"reboot,mount_userdata_failed", 190}, }; // Converts a string value representing the reason the system booted to an diff --git a/init/builtins.cpp b/init/builtins.cpp index c87759016..742e0896d 100644 --- a/init/builtins.cpp +++ b/init/builtins.cpp @@ -1123,6 +1123,7 @@ static Result ExecVdcRebootOnFailure(const std::string& vdc_arg) { auto reboot_reason = vdc_arg + "_failed"; if (android::sysprop::InitProperties::userspace_reboot_in_progress().value_or(false)) { should_reboot_into_recovery = false; + reboot_reason = "userspace_failed," + vdc_arg; } auto reboot = [reboot_reason, should_reboot_into_recovery](const std::string& message) { @@ -1159,7 +1160,7 @@ static Result do_remount_userdata(const BuiltinArguments& args) { } // TODO(b/135984674): check that fstab contains /data. if (auto rc = fs_mgr_remount_userdata_into_checkpointing(&fstab); rc < 0) { - trigger_shutdown("reboot,mount-userdata-failed"); + trigger_shutdown("reboot,mount_userdata_failed"); } if (auto result = queue_fs_event(initial_mount_fstab_return_code, true); !result) { return Error() << "queue_fs_event() failed: " << result.error(); diff --git a/init/reboot.cpp b/init/reboot.cpp index 4ee718847..2b593eaab 100644 --- a/init/reboot.cpp +++ b/init/reboot.cpp @@ -737,7 +737,7 @@ static Result DoUserspaceReboot() { auto guard = android::base::make_scope_guard([] { // Leave shutdown so that we can handle a full reboot. LeaveShutdown(); - trigger_shutdown("reboot,abort-userspace-reboot"); + trigger_shutdown("reboot,userspace_failed,shutdown_aborted"); }); // Triggering userspace-reboot-requested will result in a bunch of setprop // actions. We should make sure, that all of them are propagated before @@ -828,7 +828,7 @@ static void UserspaceRebootWatchdogThread() { if (!WaitForProperty("sys.boot_completed", "1", timeout)) { LOG(ERROR) << "Failed to boot in " << timeout.count() << "ms. Switching to full reboot"; // In this case device is in a boot loop. Only way to recover is to do dirty reboot. - RebootSystem(ANDROID_RB_RESTART2, "userspace-reboot-watchdog-triggered"); + RebootSystem(ANDROID_RB_RESTART2, "userspace_failed,watchdog_triggered"); } LOG(INFO) << "Device booted, stopping userspace reboot watchdog"; } @@ -844,7 +844,7 @@ static void HandleUserspaceReboot() { if (pid < 0) { PLOG(ERROR) << "Failed to fork process for userspace reboot watchdog. Switching to full " << "reboot"; - trigger_shutdown("reboot,userspace-reboot-failed-to-fork"); + trigger_shutdown("reboot,userspace_failed,watchdog_fork"); return; } if (pid == 0) {