init.c revision 31712beaf7de127a1249b909cdefffbc25fff076
1/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <stdio.h>
18#include <stdlib.h>
19#include <string.h>
20#include <unistd.h>
21#include <fcntl.h>
22#include <ctype.h>
23#include <signal.h>
24#include <sys/wait.h>
25#include <sys/mount.h>
26#include <sys/stat.h>
27#include <sys/poll.h>
28#include <time.h>
29#include <errno.h>
30#include <stdarg.h>
31#include <mtd/mtd-user.h>
32#include <sys/types.h>
33#include <sys/socket.h>
34#include <sys/un.h>
35#include <sys/reboot.h>
36
37#include <cutils/sockets.h>
38#include <cutils/iosched_policy.h>
39#include <termios.h>
40#include <linux/kd.h>
41#include <linux/keychord.h>
42
43#include <sys/system_properties.h>
44
45#include "devices.h"
46#include "init.h"
47#include "property_service.h"
48#include "bootchart.h"
49
50static int property_triggers_enabled = 0;
51
52#if BOOTCHART
53static int   bootchart_count;
54#endif
55
56static char console[32];
57static char serialno[32];
58static char bootmode[32];
59static char baseband[32];
60static char carrier[32];
61static char bootloader[32];
62static char hardware[32];
63static unsigned revision = 0;
64static char qemu[32];
65static struct input_keychord *keychords = 0;
66static int keychords_count = 0;
67static int keychords_length = 0;
68
69static void notify_service_state(const char *name, const char *state)
70{
71    char pname[PROP_NAME_MAX];
72    int len = strlen(name);
73    if ((len + 10) > PROP_NAME_MAX)
74        return;
75    snprintf(pname, sizeof(pname), "init.svc.%s", name);
76    property_set(pname, state);
77}
78
79static int have_console;
80static char *console_name = "/dev/console";
81static time_t process_needs_restart;
82
83static const char *ENV[32];
84
85/* add_environment - add "key=value" to the current environment */
86int add_environment(const char *key, const char *val)
87{
88    int n;
89
90    for (n = 0; n < 31; n++) {
91        if (!ENV[n]) {
92            size_t len = strlen(key) + strlen(val) + 2;
93            char *entry = malloc(len);
94            snprintf(entry, len, "%s=%s", key, val);
95            ENV[n] = entry;
96            return 0;
97        }
98    }
99
100    return 1;
101}
102
103static void zap_stdio(void)
104{
105    int fd;
106    fd = open("/dev/null", O_RDWR);
107    dup2(fd, 0);
108    dup2(fd, 1);
109    dup2(fd, 2);
110    close(fd);
111}
112
113static void open_console()
114{
115    int fd;
116    if ((fd = open(console_name, O_RDWR)) < 0) {
117        fd = open("/dev/null", O_RDWR);
118    }
119    dup2(fd, 0);
120    dup2(fd, 1);
121    dup2(fd, 2);
122    close(fd);
123}
124
125/*
126 * gettime() - returns the time in seconds of the system's monotonic clock or
127 * zero on error.
128 */
129static time_t gettime(void)
130{
131    struct timespec ts;
132    int ret;
133
134    ret = clock_gettime(CLOCK_MONOTONIC, &ts);
135    if (ret < 0) {
136        ERROR("clock_gettime(CLOCK_MONOTONIC) failed: %s\n", strerror(errno));
137        return 0;
138    }
139
140    return ts.tv_sec;
141}
142
143static void publish_socket(const char *name, int fd)
144{
145    char key[64] = ANDROID_SOCKET_ENV_PREFIX;
146    char val[64];
147
148    strlcpy(key + sizeof(ANDROID_SOCKET_ENV_PREFIX) - 1,
149            name,
150            sizeof(key) - sizeof(ANDROID_SOCKET_ENV_PREFIX));
151    snprintf(val, sizeof(val), "%d", fd);
152    add_environment(key, val);
153
154    /* make sure we don't close-on-exec */
155    fcntl(fd, F_SETFD, 0);
156}
157
158void service_start(struct service *svc, const char *dynamic_args)
159{
160    struct stat s;
161    pid_t pid;
162    int needs_console;
163    int n;
164
165        /* starting a service removes it from the disabled
166         * state and immediately takes it out of the restarting
167         * state if it was in there
168         */
169    svc->flags &= (~(SVC_DISABLED|SVC_RESTARTING));
170    svc->time_started = 0;
171
172        /* running processes require no additional work -- if
173         * they're in the process of exiting, we've ensured
174         * that they will immediately restart on exit, unless
175         * they are ONESHOT
176         */
177    if (svc->flags & SVC_RUNNING) {
178        return;
179    }
180
181    needs_console = (svc->flags & SVC_CONSOLE) ? 1 : 0;
182    if (needs_console && (!have_console)) {
183        ERROR("service '%s' requires console\n", svc->name);
184        svc->flags |= SVC_DISABLED;
185        return;
186    }
187
188    if (stat(svc->args[0], &s) != 0) {
189        ERROR("cannot find '%s', disabling '%s'\n", svc->args[0], svc->name);
190        svc->flags |= SVC_DISABLED;
191        return;
192    }
193
194    if ((!(svc->flags & SVC_ONESHOT)) && dynamic_args) {
195        ERROR("service '%s' must be one-shot to use dynamic args, disabling\n",
196               svc->args[0]);
197        svc->flags |= SVC_DISABLED;
198        return;
199    }
200
201    NOTICE("starting '%s'\n", svc->name);
202
203    pid = fork();
204
205    if (pid == 0) {
206        struct socketinfo *si;
207        struct svcenvinfo *ei;
208        char tmp[32];
209        int fd, sz;
210
211        get_property_workspace(&fd, &sz);
212        sprintf(tmp, "%d,%d", dup(fd), sz);
213        add_environment("ANDROID_PROPERTY_WORKSPACE", tmp);
214
215        for (ei = svc->envvars; ei; ei = ei->next)
216            add_environment(ei->name, ei->value);
217
218        for (si = svc->sockets; si; si = si->next) {
219            int s = create_socket(si->name,
220                                  !strcmp(si->type, "dgram") ?
221                                  SOCK_DGRAM : SOCK_STREAM,
222                                  si->perm, si->uid, si->gid);
223            if (s >= 0) {
224                publish_socket(si->name, s);
225            }
226        }
227
228        if (svc->ioprio_class != IoSchedClass_NONE) {
229            if (android_set_ioprio(getpid(), svc->ioprio_class, svc->ioprio_pri)) {
230                ERROR("Failed to set pid %d ioprio = %d,%d: %s\n",
231                      getpid(), svc->ioprio_class, svc->ioprio_pri, strerror(errno));
232            }
233        }
234
235        if (needs_console) {
236            setsid();
237            open_console();
238        } else {
239            zap_stdio();
240        }
241
242#if 0
243        for (n = 0; svc->args[n]; n++) {
244            INFO("args[%d] = '%s'\n", n, svc->args[n]);
245        }
246        for (n = 0; ENV[n]; n++) {
247            INFO("env[%d] = '%s'\n", n, ENV[n]);
248        }
249#endif
250
251        setpgid(0, getpid());
252
253    /* as requested, set our gid, supplemental gids, and uid */
254        if (svc->gid) {
255            setgid(svc->gid);
256        }
257        if (svc->nr_supp_gids) {
258            setgroups(svc->nr_supp_gids, svc->supp_gids);
259        }
260        if (svc->uid) {
261            setuid(svc->uid);
262        }
263
264        if (!dynamic_args) {
265            if (execve(svc->args[0], (char**) svc->args, (char**) ENV) < 0) {
266                ERROR("cannot execve('%s'): %s\n", svc->args[0], strerror(errno));
267            }
268        } else {
269            char *arg_ptrs[SVC_MAXARGS+1];
270            int arg_idx = svc->nargs;
271            char *tmp = strdup(dynamic_args);
272            char *next = tmp;
273            char *bword;
274
275            /* Copy the static arguments */
276            memcpy(arg_ptrs, svc->args, (svc->nargs * sizeof(char *)));
277
278            while((bword = strsep(&next, " "))) {
279                arg_ptrs[arg_idx++] = bword;
280                if (arg_idx == SVC_MAXARGS)
281                    break;
282            }
283            arg_ptrs[arg_idx] = '\0';
284            execve(svc->args[0], (char**) arg_ptrs, (char**) ENV);
285        }
286        _exit(127);
287    }
288
289    if (pid < 0) {
290        ERROR("failed to start '%s'\n", svc->name);
291        svc->pid = 0;
292        return;
293    }
294
295    svc->time_started = gettime();
296    svc->pid = pid;
297    svc->flags |= SVC_RUNNING;
298
299    notify_service_state(svc->name, "running");
300}
301
302void service_stop(struct service *svc)
303{
304        /* we are no longer running, nor should we
305         * attempt to restart
306         */
307    svc->flags &= (~(SVC_RUNNING|SVC_RESTARTING));
308
309        /* if the service has not yet started, prevent
310         * it from auto-starting with its class
311         */
312    svc->flags |= SVC_DISABLED;
313
314    if (svc->pid) {
315        NOTICE("service '%s' is being killed\n", svc->name);
316        kill(-svc->pid, SIGTERM);
317        notify_service_state(svc->name, "stopping");
318    } else {
319        notify_service_state(svc->name, "stopped");
320    }
321}
322
323void property_changed(const char *name, const char *value)
324{
325    if (property_triggers_enabled) {
326        queue_property_triggers(name, value);
327        drain_action_queue();
328    }
329}
330
331#define CRITICAL_CRASH_THRESHOLD    4       /* if we crash >4 times ... */
332#define CRITICAL_CRASH_WINDOW       (4*60)  /* ... in 4 minutes, goto recovery*/
333
334static int wait_for_one_process(int block)
335{
336    pid_t pid;
337    int status;
338    struct service *svc;
339    struct socketinfo *si;
340    time_t now;
341    struct listnode *node;
342    struct command *cmd;
343
344    while ( (pid = waitpid(-1, &status, block ? 0 : WNOHANG)) == -1 && errno == EINTR );
345    if (pid <= 0) return -1;
346    INFO("waitpid returned pid %d, status = %08x\n", pid, status);
347
348    svc = service_find_by_pid(pid);
349    if (!svc) {
350        ERROR("untracked pid %d exited\n", pid);
351        return 0;
352    }
353
354    NOTICE("process '%s', pid %d exited\n", svc->name, pid);
355
356    if (!(svc->flags & SVC_ONESHOT)) {
357        kill(-pid, SIGKILL);
358        NOTICE("process '%s' killing any children in process group\n", svc->name);
359    }
360
361    /* remove any sockets we may have created */
362    for (si = svc->sockets; si; si = si->next) {
363        char tmp[128];
364        snprintf(tmp, sizeof(tmp), ANDROID_SOCKET_DIR"/%s", si->name);
365        unlink(tmp);
366    }
367
368    svc->pid = 0;
369    svc->flags &= (~SVC_RUNNING);
370
371        /* oneshot processes go into the disabled state on exit */
372    if (svc->flags & SVC_ONESHOT) {
373        svc->flags |= SVC_DISABLED;
374    }
375
376        /* disabled processes do not get restarted automatically */
377    if (svc->flags & SVC_DISABLED) {
378        notify_service_state(svc->name, "stopped");
379        return 0;
380    }
381
382    now = gettime();
383    if (svc->flags & SVC_CRITICAL) {
384        if (svc->time_crashed + CRITICAL_CRASH_WINDOW >= now) {
385            if (++svc->nr_crashed > CRITICAL_CRASH_THRESHOLD) {
386                ERROR("critical process '%s' exited %d times in %d minutes; "
387                      "rebooting into recovery mode\n", svc->name,
388                      CRITICAL_CRASH_THRESHOLD, CRITICAL_CRASH_WINDOW / 60);
389                sync();
390                __reboot(LINUX_REBOOT_MAGIC1, LINUX_REBOOT_MAGIC2,
391                         LINUX_REBOOT_CMD_RESTART2, "recovery");
392                return 0;
393            }
394        } else {
395            svc->time_crashed = now;
396            svc->nr_crashed = 1;
397        }
398    }
399
400    svc->flags |= SVC_RESTARTING;
401
402    /* Execute all onrestart commands for this service. */
403    list_for_each(node, &svc->onrestart.commands) {
404        cmd = node_to_item(node, struct command, clist);
405        cmd->func(cmd->nargs, cmd->args);
406    }
407    notify_service_state(svc->name, "restarting");
408    return 0;
409}
410
411static void restart_service_if_needed(struct service *svc)
412{
413    time_t next_start_time = svc->time_started + 5;
414
415    if (next_start_time <= gettime()) {
416        svc->flags &= (~SVC_RESTARTING);
417        service_start(svc, NULL);
418        return;
419    }
420
421    if ((next_start_time < process_needs_restart) ||
422        (process_needs_restart == 0)) {
423        process_needs_restart = next_start_time;
424    }
425}
426
427static void restart_processes()
428{
429    process_needs_restart = 0;
430    service_for_each_flags(SVC_RESTARTING,
431                           restart_service_if_needed);
432}
433
434static int signal_fd = -1;
435
436static void sigchld_handler(int s)
437{
438    write(signal_fd, &s, 1);
439}
440
441static void msg_start(const char *name)
442{
443    struct service *svc;
444    char *tmp = NULL;
445    char *args = NULL;
446
447    if (!strchr(name, ':'))
448        svc = service_find_by_name(name);
449    else {
450        tmp = strdup(name);
451        args = strchr(tmp, ':');
452        *args = '\0';
453        args++;
454
455        svc = service_find_by_name(tmp);
456    }
457
458    if (svc) {
459        service_start(svc, args);
460    } else {
461        ERROR("no such service '%s'\n", name);
462    }
463    if (tmp)
464        free(tmp);
465}
466
467static void msg_stop(const char *name)
468{
469    struct service *svc = service_find_by_name(name);
470
471    if (svc) {
472        service_stop(svc);
473    } else {
474        ERROR("no such service '%s'\n", name);
475    }
476}
477
478void handle_control_message(const char *msg, const char *arg)
479{
480    if (!strcmp(msg,"start")) {
481        msg_start(arg);
482    } else if (!strcmp(msg,"stop")) {
483        msg_stop(arg);
484    } else {
485        ERROR("unknown control msg '%s'\n", msg);
486    }
487}
488
489#define MAX_MTD_PARTITIONS 16
490
491static struct {
492    char name[16];
493    int number;
494} mtd_part_map[MAX_MTD_PARTITIONS];
495
496static int mtd_part_count = -1;
497
498static void find_mtd_partitions(void)
499{
500    int fd;
501    char buf[1024];
502    char *pmtdbufp;
503    ssize_t pmtdsize;
504    int r;
505
506    fd = open("/proc/mtd", O_RDONLY);
507    if (fd < 0)
508        return;
509
510    buf[sizeof(buf) - 1] = '\0';
511    pmtdsize = read(fd, buf, sizeof(buf) - 1);
512    pmtdbufp = buf;
513    while (pmtdsize > 0) {
514        int mtdnum, mtdsize, mtderasesize;
515        char mtdname[16];
516        mtdname[0] = '\0';
517        mtdnum = -1;
518        r = sscanf(pmtdbufp, "mtd%d: %x %x %15s",
519                   &mtdnum, &mtdsize, &mtderasesize, mtdname);
520        if ((r == 4) && (mtdname[0] == '"')) {
521            char *x = strchr(mtdname + 1, '"');
522            if (x) {
523                *x = 0;
524            }
525            INFO("mtd partition %d, %s\n", mtdnum, mtdname + 1);
526            if (mtd_part_count < MAX_MTD_PARTITIONS) {
527                strcpy(mtd_part_map[mtd_part_count].name, mtdname + 1);
528                mtd_part_map[mtd_part_count].number = mtdnum;
529                mtd_part_count++;
530            } else {
531                ERROR("too many mtd partitions\n");
532            }
533        }
534        while (pmtdsize > 0 && *pmtdbufp != '\n') {
535            pmtdbufp++;
536            pmtdsize--;
537        }
538        if (pmtdsize > 0) {
539            pmtdbufp++;
540            pmtdsize--;
541        }
542    }
543    close(fd);
544}
545
546int mtd_name_to_number(const char *name)
547{
548    int n;
549    if (mtd_part_count < 0) {
550        mtd_part_count = 0;
551        find_mtd_partitions();
552    }
553    for (n = 0; n < mtd_part_count; n++) {
554        if (!strcmp(name, mtd_part_map[n].name)) {
555            return mtd_part_map[n].number;
556        }
557    }
558    return -1;
559}
560
561static void import_kernel_nv(char *name, int in_qemu)
562{
563    char *value = strchr(name, '=');
564
565    if (value == 0) return;
566    *value++ = 0;
567    if (*name == 0) return;
568
569    if (!in_qemu)
570    {
571        /* on a real device, white-list the kernel options */
572        if (!strcmp(name,"qemu")) {
573            strlcpy(qemu, value, sizeof(qemu));
574        } else if (!strcmp(name,"androidboot.console")) {
575            strlcpy(console, value, sizeof(console));
576        } else if (!strcmp(name,"androidboot.mode")) {
577            strlcpy(bootmode, value, sizeof(bootmode));
578        } else if (!strcmp(name,"androidboot.serialno")) {
579            strlcpy(serialno, value, sizeof(serialno));
580        } else if (!strcmp(name,"androidboot.baseband")) {
581            strlcpy(baseband, value, sizeof(baseband));
582        } else if (!strcmp(name,"androidboot.carrier")) {
583            strlcpy(carrier, value, sizeof(carrier));
584        } else if (!strcmp(name,"androidboot.bootloader")) {
585            strlcpy(bootloader, value, sizeof(bootloader));
586        } else if (!strcmp(name,"androidboot.hardware")) {
587            strlcpy(hardware, value, sizeof(hardware));
588        } else {
589            qemu_cmdline(name, value);
590        }
591    } else {
592        /* in the emulator, export any kernel option with the
593         * ro.kernel. prefix */
594        char  buff[32];
595        int   len = snprintf( buff, sizeof(buff), "ro.kernel.%s", name );
596        if (len < (int)sizeof(buff)) {
597            property_set( buff, value );
598        }
599    }
600}
601
602static void import_kernel_cmdline(int in_qemu)
603{
604    char cmdline[1024];
605    char *ptr;
606    int fd;
607
608    fd = open("/proc/cmdline", O_RDONLY);
609    if (fd >= 0) {
610        int n = read(fd, cmdline, 1023);
611        if (n < 0) n = 0;
612
613        /* get rid of trailing newline, it happens */
614        if (n > 0 && cmdline[n-1] == '\n') n--;
615
616        cmdline[n] = 0;
617        close(fd);
618    } else {
619        cmdline[0] = 0;
620    }
621
622    ptr = cmdline;
623    while (ptr && *ptr) {
624        char *x = strchr(ptr, ' ');
625        if (x != 0) *x++ = 0;
626        import_kernel_nv(ptr, in_qemu);
627        ptr = x;
628    }
629
630        /* don't expose the raw commandline to nonpriv processes */
631    chmod("/proc/cmdline", 0440);
632}
633
634static void get_hardware_name(void)
635{
636    char data[1024];
637    int fd, n;
638    char *x, *hw, *rev;
639
640    /* Hardware string was provided on kernel command line */
641    if (hardware[0])
642        return;
643
644    fd = open("/proc/cpuinfo", O_RDONLY);
645    if (fd < 0) return;
646
647    n = read(fd, data, 1023);
648    close(fd);
649    if (n < 0) return;
650
651    data[n] = 0;
652    hw = strstr(data, "\nHardware");
653    rev = strstr(data, "\nRevision");
654
655    if (hw) {
656        x = strstr(hw, ": ");
657        if (x) {
658            x += 2;
659            n = 0;
660            while (*x && !isspace(*x)) {
661                hardware[n++] = tolower(*x);
662                x++;
663                if (n == 31) break;
664            }
665            hardware[n] = 0;
666        }
667    }
668
669    if (rev) {
670        x = strstr(rev, ": ");
671        if (x) {
672            revision = strtoul(x + 2, 0, 16);
673        }
674    }
675}
676
677void drain_action_queue(void)
678{
679    struct listnode *node;
680    struct command *cmd;
681    struct action *act;
682    int ret;
683
684    while ((act = action_remove_queue_head())) {
685        INFO("processing action %p (%s)\n", act, act->name);
686        list_for_each(node, &act->commands) {
687            cmd = node_to_item(node, struct command, clist);
688            ret = cmd->func(cmd->nargs, cmd->args);
689            INFO("command '%s' r=%d\n", cmd->args[0], ret);
690        }
691    }
692}
693
694void open_devnull_stdio(void)
695{
696    int fd;
697    static const char *name = "/dev/__null__";
698    if (mknod(name, S_IFCHR | 0600, (1 << 8) | 3) == 0) {
699        fd = open(name, O_RDWR);
700        unlink(name);
701        if (fd >= 0) {
702            dup2(fd, 0);
703            dup2(fd, 1);
704            dup2(fd, 2);
705            if (fd > 2) {
706                close(fd);
707            }
708            return;
709        }
710    }
711
712    exit(1);
713}
714
715void add_service_keycodes(struct service *svc)
716{
717    struct input_keychord *keychord;
718    int i, size;
719
720    if (svc->keycodes) {
721        /* add a new keychord to the list */
722        size = sizeof(*keychord) + svc->nkeycodes * sizeof(keychord->keycodes[0]);
723        keychords = realloc(keychords, keychords_length + size);
724        if (!keychords) {
725            ERROR("could not allocate keychords\n");
726            keychords_length = 0;
727            keychords_count = 0;
728            return;
729        }
730
731        keychord = (struct input_keychord *)((char *)keychords + keychords_length);
732        keychord->version = KEYCHORD_VERSION;
733        keychord->id = keychords_count + 1;
734        keychord->count = svc->nkeycodes;
735        svc->keychord_id = keychord->id;
736
737        for (i = 0; i < svc->nkeycodes; i++) {
738            keychord->keycodes[i] = svc->keycodes[i];
739        }
740        keychords_count++;
741        keychords_length += size;
742    }
743}
744
745int open_keychord()
746{
747    int fd, ret;
748
749    service_for_each(add_service_keycodes);
750
751    /* nothing to do if no services require keychords */
752    if (!keychords)
753        return -1;
754
755    fd = open("/dev/keychord", O_RDWR);
756    if (fd < 0) {
757        ERROR("could not open /dev/keychord\n");
758        return fd;
759    }
760    fcntl(fd, F_SETFD, FD_CLOEXEC);
761
762    ret = write(fd, keychords, keychords_length);
763    if (ret != keychords_length) {
764        ERROR("could not configure /dev/keychord %d (%d)\n", ret, errno);
765        close(fd);
766        fd = -1;
767    }
768
769    free(keychords);
770    keychords = 0;
771
772    return fd;
773}
774
775void handle_keychord(int fd)
776{
777    struct service *svc;
778    char* debuggable;
779    char* adb_enabled;
780    int ret;
781    __u16 id;
782
783    // only handle keychords if ro.debuggable is set or adb is enabled.
784    // the logic here is that bugreports should be enabled in userdebug or eng builds
785    // and on user builds for users that are developers.
786    debuggable = property_get("ro.debuggable");
787    adb_enabled = property_get("init.svc.adbd");
788    if ((debuggable && !strcmp(debuggable, "1")) ||
789        (adb_enabled && !strcmp(adb_enabled, "running"))) {
790        ret = read(fd, &id, sizeof(id));
791        if (ret != sizeof(id)) {
792            ERROR("could not read keychord id\n");
793            return;
794        }
795
796        svc = service_find_by_keychord(id);
797        if (svc) {
798            INFO("starting service %s from keychord\n", svc->name);
799            service_start(svc, NULL);
800        } else {
801            ERROR("service for keychord %d not found\n", id);
802        }
803    }
804}
805
806int main(int argc, char **argv)
807{
808    int device_fd = -1;
809    int property_set_fd = -1;
810    int signal_recv_fd = -1;
811    int keychord_fd = -1;
812    int fd_count;
813    int s[2];
814    int fd;
815    struct sigaction act;
816    char tmp[PROP_VALUE_MAX];
817    struct pollfd ufds[4];
818    char *tmpdev;
819    char* debuggable;
820
821    act.sa_handler = sigchld_handler;
822    act.sa_flags = SA_NOCLDSTOP;
823    act.sa_mask = 0;
824    act.sa_restorer = NULL;
825    sigaction(SIGCHLD, &act, 0);
826
827    /* clear the umask */
828    umask(0);
829
830        /* Get the basic filesystem setup we need put
831         * together in the initramdisk on / and then we'll
832         * let the rc file figure out the rest.
833         */
834    mkdir("/dev", 0755);
835    mkdir("/proc", 0755);
836    mkdir("/sys", 0755);
837
838    mount("tmpfs", "/dev", "tmpfs", 0, "mode=0755");
839    mkdir("/dev/pts", 0755);
840    mkdir("/dev/socket", 0755);
841    mount("devpts", "/dev/pts", "devpts", 0, NULL);
842    mount("proc", "/proc", "proc", 0, NULL);
843    mount("sysfs", "/sys", "sysfs", 0, NULL);
844
845        /* We must have some place other than / to create the
846         * device nodes for kmsg and null, otherwise we won't
847         * be able to remount / read-only later on.
848         * Now that tmpfs is mounted on /dev, we can actually
849         * talk to the outside world.
850         */
851    open_devnull_stdio();
852    log_init();
853
854    INFO("reading config file\n");
855    parse_config_file("/init.rc");
856
857    /* pull the kernel commandline and ramdisk properties file in */
858    qemu_init();
859    import_kernel_cmdline(0);
860
861    get_hardware_name();
862    snprintf(tmp, sizeof(tmp), "/init.%s.rc", hardware);
863    parse_config_file(tmp);
864
865    action_for_each_trigger("early-init", action_add_queue_tail);
866    drain_action_queue();
867
868    INFO("device init\n");
869    device_fd = device_init();
870
871    property_init();
872
873    // only listen for keychords if ro.debuggable is true
874    keychord_fd = open_keychord();
875
876    if (console[0]) {
877        snprintf(tmp, sizeof(tmp), "/dev/%s", console);
878        console_name = strdup(tmp);
879    }
880
881    fd = open(console_name, O_RDWR);
882    if (fd >= 0)
883        have_console = 1;
884    close(fd);
885
886    if( load_565rle_image(INIT_IMAGE_FILE) ) {
887    fd = open("/dev/tty0", O_WRONLY);
888    if (fd >= 0) {
889        const char *msg;
890            msg = "\n"
891        "\n"
892        "\n"
893        "\n"
894        "\n"
895        "\n"
896        "\n"  // console is 40 cols x 30 lines
897        "\n"
898        "\n"
899        "\n"
900        "\n"
901        "\n"
902        "\n"
903        "\n"
904        "             A N D R O I D ";
905        write(fd, msg, strlen(msg));
906        close(fd);
907    }
908    }
909
910    if (qemu[0])
911        import_kernel_cmdline(1);
912
913    if (!strcmp(bootmode,"factory"))
914        property_set("ro.factorytest", "1");
915    else if (!strcmp(bootmode,"factory2"))
916        property_set("ro.factorytest", "2");
917    else
918        property_set("ro.factorytest", "0");
919
920    property_set("ro.serialno", serialno[0] ? serialno : "");
921    property_set("ro.bootmode", bootmode[0] ? bootmode : "unknown");
922    property_set("ro.baseband", baseband[0] ? baseband : "unknown");
923    property_set("ro.carrier", carrier[0] ? carrier : "unknown");
924    property_set("ro.bootloader", bootloader[0] ? bootloader : "unknown");
925
926    property_set("ro.hardware", hardware);
927    snprintf(tmp, PROP_VALUE_MAX, "%d", revision);
928    property_set("ro.revision", tmp);
929
930        /* execute all the boot actions to get us started */
931    action_for_each_trigger("init", action_add_queue_tail);
932    action_for_each_trigger("early-fs", action_add_queue_tail);
933    action_for_each_trigger("fs", action_add_queue_tail);
934    action_for_each_trigger("post-fs", action_add_queue_tail);
935    drain_action_queue();
936
937        /* read any property files on system or data and
938         * fire up the property service.  This must happen
939         * after the ro.foo properties are set above so
940         * that /data/local.prop cannot interfere with them.
941         */
942    property_set_fd = start_property_service();
943
944    /* create a signalling mechanism for the sigchld handler */
945    if (socketpair(AF_UNIX, SOCK_STREAM, 0, s) == 0) {
946        signal_fd = s[0];
947        signal_recv_fd = s[1];
948        fcntl(s[0], F_SETFD, FD_CLOEXEC);
949        fcntl(s[0], F_SETFL, O_NONBLOCK);
950        fcntl(s[1], F_SETFD, FD_CLOEXEC);
951        fcntl(s[1], F_SETFL, O_NONBLOCK);
952    }
953
954    /* make sure we actually have all the pieces we need */
955    if ((device_fd < 0) ||
956        (property_set_fd < 0) ||
957        (signal_recv_fd < 0)) {
958        ERROR("init startup failure\n");
959        return 1;
960    }
961
962    /* execute all the boot actions to get us started */
963    action_for_each_trigger("early-boot", action_add_queue_tail);
964    action_for_each_trigger("boot", action_add_queue_tail);
965    drain_action_queue();
966
967        /* run all property triggers based on current state of the properties */
968    queue_all_property_triggers();
969    drain_action_queue();
970
971        /* enable property triggers */
972    property_triggers_enabled = 1;
973
974    ufds[0].fd = device_fd;
975    ufds[0].events = POLLIN;
976    ufds[1].fd = property_set_fd;
977    ufds[1].events = POLLIN;
978    ufds[2].fd = signal_recv_fd;
979    ufds[2].events = POLLIN;
980    fd_count = 3;
981
982    if (keychord_fd > 0) {
983        ufds[3].fd = keychord_fd;
984        ufds[3].events = POLLIN;
985        fd_count++;
986    } else {
987        ufds[3].events = 0;
988        ufds[3].revents = 0;
989    }
990
991#if BOOTCHART
992    bootchart_count = bootchart_init();
993    if (bootchart_count < 0) {
994        ERROR("bootcharting init failure\n");
995    } else if (bootchart_count > 0) {
996        NOTICE("bootcharting started (period=%d ms)\n", bootchart_count*BOOTCHART_POLLING_MS);
997    } else {
998        NOTICE("bootcharting ignored\n");
999    }
1000#endif
1001
1002    for(;;) {
1003        int nr, i, timeout = -1;
1004
1005        for (i = 0; i < fd_count; i++)
1006            ufds[i].revents = 0;
1007
1008        drain_action_queue();
1009        restart_processes();
1010
1011        if (process_needs_restart) {
1012            timeout = (process_needs_restart - gettime()) * 1000;
1013            if (timeout < 0)
1014                timeout = 0;
1015        }
1016
1017#if BOOTCHART
1018        if (bootchart_count > 0) {
1019            if (timeout < 0 || timeout > BOOTCHART_POLLING_MS)
1020                timeout = BOOTCHART_POLLING_MS;
1021            if (bootchart_step() < 0 || --bootchart_count == 0) {
1022                bootchart_finish();
1023                bootchart_count = 0;
1024            }
1025        }
1026#endif
1027        nr = poll(ufds, fd_count, timeout);
1028        if (nr <= 0)
1029            continue;
1030
1031        if (ufds[2].revents == POLLIN) {
1032            /* we got a SIGCHLD - reap and restart as needed */
1033            read(signal_recv_fd, tmp, sizeof(tmp));
1034            while (!wait_for_one_process(0))
1035                ;
1036            continue;
1037        }
1038
1039        if (ufds[0].revents == POLLIN)
1040            handle_device_fd(device_fd);
1041
1042        if (ufds[1].revents == POLLIN)
1043            handle_property_set_fd(property_set_fd);
1044        if (ufds[3].revents == POLLIN)
1045            handle_keychord(keychord_fd);
1046    }
1047
1048    return 0;
1049}
1050