diff options
Diffstat (limited to 'services/core/java/com/android/server/am/ActivityManagerService.java')
-rw-r--r-- | services/core/java/com/android/server/am/ActivityManagerService.java | 16548 |
1 files changed, 16548 insertions, 0 deletions
diff --git a/services/core/java/com/android/server/am/ActivityManagerService.java b/services/core/java/com/android/server/am/ActivityManagerService.java new file mode 100644 index 0000000..4540c1c --- /dev/null +++ b/services/core/java/com/android/server/am/ActivityManagerService.java @@ -0,0 +1,16548 @@ +/* + * Copyright (C) 2006-2008 The Android Open Source Project + * + * Licensed under the Apache License, Version 2.0 (the "License"); + * you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. + * See the License for the specific language governing permissions and + * limitations under the License. + */ + +package com.android.server.am; + +import static android.content.pm.PackageManager.PERMISSION_GRANTED; +import static com.android.internal.util.XmlUtils.readIntAttribute; +import static com.android.internal.util.XmlUtils.readLongAttribute; +import static com.android.internal.util.XmlUtils.writeIntAttribute; +import static com.android.internal.util.XmlUtils.writeLongAttribute; +import static com.android.server.Watchdog.NATIVE_STACKS_OF_INTEREST; +import static org.xmlpull.v1.XmlPullParser.END_DOCUMENT; +import static org.xmlpull.v1.XmlPullParser.START_TAG; + +import static com.android.server.am.ActivityStackSupervisor.HOME_STACK_ID; + +import android.app.AppOpsManager; +import android.app.IActivityContainer; +import android.app.IActivityContainerCallback; +import android.appwidget.AppWidgetManager; +import android.graphics.Rect; +import android.util.ArrayMap; +import com.android.internal.R; +import com.android.internal.annotations.GuardedBy; +import com.android.internal.app.IAppOpsService; +import com.android.internal.app.ProcessMap; +import com.android.internal.app.ProcessStats; +import com.android.internal.os.BackgroundThread; +import com.android.internal.os.BatteryStatsImpl; +import com.android.internal.os.ProcessCpuTracker; +import com.android.internal.os.TransferPipe; +import com.android.internal.util.FastPrintWriter; +import com.android.internal.util.FastXmlSerializer; +import com.android.internal.util.MemInfoReader; +import com.android.internal.util.Preconditions; +import com.android.server.AppOpsService; +import com.android.server.AttributeCache; +import com.android.server.IntentResolver; +import com.android.server.SystemServer; +import com.android.server.Watchdog; +import com.android.server.am.ActivityStack.ActivityState; +import com.android.server.firewall.IntentFirewall; +import com.android.server.pm.UserManagerService; +import com.android.server.wm.AppTransition; +import com.android.server.wm.WindowManagerService; +import com.google.android.collect.Lists; +import com.google.android.collect.Maps; + +import dalvik.system.Zygote; + +import libcore.io.IoUtils; + +import org.xmlpull.v1.XmlPullParser; +import org.xmlpull.v1.XmlPullParserException; +import org.xmlpull.v1.XmlSerializer; + +import android.app.Activity; +import android.app.ActivityManager; +import android.app.ActivityManager.RunningTaskInfo; +import android.app.ActivityManager.StackInfo; +import android.app.ActivityManagerNative; +import android.app.ActivityOptions; +import android.app.ActivityThread; +import android.app.AlertDialog; +import android.app.AppGlobals; +import android.app.ApplicationErrorReport; +import android.app.Dialog; +import android.app.IActivityController; +import android.app.IApplicationThread; +import android.app.IInstrumentationWatcher; +import android.app.INotificationManager; +import android.app.IProcessObserver; +import android.app.IServiceConnection; +import android.app.IStopUserCallback; +import android.app.IThumbnailReceiver; +import android.app.IUiAutomationConnection; +import android.app.IUserSwitchObserver; +import android.app.Instrumentation; +import android.app.Notification; +import android.app.NotificationManager; +import android.app.PendingIntent; +import android.app.backup.IBackupManager; +import android.content.ActivityNotFoundException; +import android.content.BroadcastReceiver; +import android.content.ClipData; +import android.content.ComponentCallbacks2; +import android.content.ComponentName; +import android.content.ContentProvider; +import android.content.ContentResolver; +import android.content.Context; +import android.content.DialogInterface; +import android.content.IContentProvider; +import android.content.IIntentReceiver; +import android.content.IIntentSender; +import android.content.Intent; +import android.content.IntentFilter; +import android.content.IntentSender; +import android.content.pm.ActivityInfo; +import android.content.pm.ApplicationInfo; +import android.content.pm.ConfigurationInfo; +import android.content.pm.IPackageDataObserver; +import android.content.pm.IPackageManager; +import android.content.pm.InstrumentationInfo; +import android.content.pm.PackageInfo; +import android.content.pm.PackageManager; +import android.content.pm.ParceledListSlice; +import android.content.pm.UserInfo; +import android.content.pm.PackageManager.NameNotFoundException; +import android.content.pm.PathPermission; +import android.content.pm.ProviderInfo; +import android.content.pm.ResolveInfo; +import android.content.pm.ServiceInfo; +import android.content.res.CompatibilityInfo; +import android.content.res.Configuration; +import android.graphics.Bitmap; +import android.net.Proxy; +import android.net.ProxyProperties; +import android.net.Uri; +import android.os.Binder; +import android.os.Build; +import android.os.Bundle; +import android.os.Debug; +import android.os.DropBoxManager; +import android.os.Environment; +import android.os.FileObserver; +import android.os.FileUtils; +import android.os.Handler; +import android.os.IBinder; +import android.os.IPermissionController; +import android.os.IRemoteCallback; +import android.os.IUserManager; +import android.os.Looper; +import android.os.Message; +import android.os.Parcel; +import android.os.ParcelFileDescriptor; +import android.os.Process; +import android.os.RemoteCallbackList; +import android.os.RemoteException; +import android.os.SELinux; +import android.os.ServiceManager; +import android.os.StrictMode; +import android.os.SystemClock; +import android.os.SystemProperties; +import android.os.UpdateLock; +import android.os.UserHandle; +import android.provider.Settings; +import android.text.format.DateUtils; +import android.text.format.Time; +import android.util.AtomicFile; +import android.util.EventLog; +import android.util.Log; +import android.util.Pair; +import android.util.PrintWriterPrinter; +import android.util.Slog; +import android.util.SparseArray; +import android.util.TimeUtils; +import android.util.Xml; +import android.view.Gravity; +import android.view.LayoutInflater; +import android.view.View; +import android.view.WindowManager; + +import java.io.BufferedInputStream; +import java.io.BufferedOutputStream; +import java.io.DataInputStream; +import java.io.DataOutputStream; +import java.io.File; +import java.io.FileDescriptor; +import java.io.FileInputStream; +import java.io.FileNotFoundException; +import java.io.FileOutputStream; +import java.io.IOException; +import java.io.InputStreamReader; +import java.io.PrintWriter; +import java.io.StringWriter; +import java.lang.ref.WeakReference; +import java.util.ArrayList; +import java.util.Arrays; +import java.util.Collections; +import java.util.Comparator; +import java.util.HashMap; +import java.util.HashSet; +import java.util.Iterator; +import java.util.List; +import java.util.Locale; +import java.util.Map; +import java.util.Set; +import java.util.concurrent.atomic.AtomicBoolean; +import java.util.concurrent.atomic.AtomicLong; + +public final class ActivityManagerService extends ActivityManagerNative + implements Watchdog.Monitor, BatteryStatsImpl.BatteryCallback { + private static final String USER_DATA_DIR = "/data/user/"; + static final String TAG = "ActivityManager"; + static final String TAG_MU = "ActivityManagerServiceMU"; + static final boolean DEBUG = false; + static final boolean localLOGV = DEBUG; + static final boolean DEBUG_BACKUP = localLOGV || false; + static final boolean DEBUG_BROADCAST = localLOGV || false; + static final boolean DEBUG_BROADCAST_LIGHT = DEBUG_BROADCAST || false; + static final boolean DEBUG_BACKGROUND_BROADCAST = DEBUG_BROADCAST || false; + static final boolean DEBUG_CLEANUP = localLOGV || false; + static final boolean DEBUG_CONFIGURATION = localLOGV || false; + static final boolean DEBUG_FOCUS = false; + static final boolean DEBUG_IMMERSIVE = localLOGV || false; + static final boolean DEBUG_MU = localLOGV || false; + static final boolean DEBUG_OOM_ADJ = localLOGV || false; + static final boolean DEBUG_LRU = localLOGV || false; + static final boolean DEBUG_PAUSE = localLOGV || false; + static final boolean DEBUG_POWER = localLOGV || false; + static final boolean DEBUG_POWER_QUICK = DEBUG_POWER || false; + static final boolean DEBUG_PROCESS_OBSERVERS = localLOGV || false; + static final boolean DEBUG_PROCESSES = localLOGV || false; + static final boolean DEBUG_PROVIDER = localLOGV || false; + static final boolean DEBUG_RESULTS = localLOGV || false; + static final boolean DEBUG_SERVICE = localLOGV || false; + static final boolean DEBUG_SERVICE_EXECUTING = localLOGV || false; + static final boolean DEBUG_STACK = localLOGV || false; + static final boolean DEBUG_SWITCH = localLOGV || false; + static final boolean DEBUG_TASKS = localLOGV || false; + static final boolean DEBUG_THUMBNAILS = localLOGV || false; + static final boolean DEBUG_TRANSITION = localLOGV || false; + static final boolean DEBUG_URI_PERMISSION = localLOGV || false; + static final boolean DEBUG_USER_LEAVING = localLOGV || false; + static final boolean DEBUG_VISBILITY = localLOGV || false; + static final boolean DEBUG_PSS = localLOGV || false; + static final boolean DEBUG_LOCKSCREEN = localLOGV || false; + static final boolean VALIDATE_TOKENS = false; + static final boolean SHOW_ACTIVITY_START_TIME = true; + + // Control over CPU and battery monitoring. + static final long BATTERY_STATS_TIME = 30*60*1000; // write battery stats every 30 minutes. + static final boolean MONITOR_CPU_USAGE = true; + static final long MONITOR_CPU_MIN_TIME = 5*1000; // don't sample cpu less than every 5 seconds. + static final long MONITOR_CPU_MAX_TIME = 0x0fffffff; // wait possibly forever for next cpu sample. + static final boolean MONITOR_THREAD_CPU_USAGE = false; + + // The flags that are set for all calls we make to the package manager. + static final int STOCK_PM_FLAGS = PackageManager.GET_SHARED_LIBRARY_FILES; + + private static final String SYSTEM_DEBUGGABLE = "ro.debuggable"; + + static final boolean IS_USER_BUILD = "user".equals(Build.TYPE); + + // Maximum number of recent tasks that we can remember. + static final int MAX_RECENT_TASKS = ActivityManager.isLowRamDeviceStatic() ? 10 : 20; + + // Amount of time after a call to stopAppSwitches() during which we will + // prevent further untrusted switches from happening. + static final long APP_SWITCH_DELAY_TIME = 5*1000; + + // How long we wait for a launched process to attach to the activity manager + // before we decide it's never going to come up for real. + static final int PROC_START_TIMEOUT = 10*1000; + + // How long we wait for a launched process to attach to the activity manager + // before we decide it's never going to come up for real, when the process was + // started with a wrapper for instrumentation (such as Valgrind) because it + // could take much longer than usual. + static final int PROC_START_TIMEOUT_WITH_WRAPPER = 300*1000; + + // How long to wait after going idle before forcing apps to GC. + static final int GC_TIMEOUT = 5*1000; + + // The minimum amount of time between successive GC requests for a process. + static final int GC_MIN_INTERVAL = 60*1000; + + // The minimum amount of time between successive PSS requests for a process. + static final int FULL_PSS_MIN_INTERVAL = 10*60*1000; + + // The minimum amount of time between successive PSS requests for a process + // when the request is due to the memory state being lowered. + static final int FULL_PSS_LOWERED_INTERVAL = 2*60*1000; + + // The rate at which we check for apps using excessive power -- 15 mins. + static final int POWER_CHECK_DELAY = (DEBUG_POWER_QUICK ? 2 : 15) * 60*1000; + + // The minimum sample duration we will allow before deciding we have + // enough data on wake locks to start killing things. + static final int WAKE_LOCK_MIN_CHECK_DURATION = (DEBUG_POWER_QUICK ? 1 : 5) * 60*1000; + + // The minimum sample duration we will allow before deciding we have + // enough data on CPU usage to start killing things. + static final int CPU_MIN_CHECK_DURATION = (DEBUG_POWER_QUICK ? 1 : 5) * 60*1000; + + // How long we allow a receiver to run before giving up on it. + static final int BROADCAST_FG_TIMEOUT = 10*1000; + static final int BROADCAST_BG_TIMEOUT = 60*1000; + + // How long we wait until we timeout on key dispatching. + static final int KEY_DISPATCHING_TIMEOUT = 5*1000; + + // How long we wait until we timeout on key dispatching during instrumentation. + static final int INSTRUMENTATION_KEY_DISPATCHING_TIMEOUT = 60*1000; + + // Amount of time we wait for observers to handle a user switch before + // giving up on them and unfreezing the screen. + static final int USER_SWITCH_TIMEOUT = 2*1000; + + // Maximum number of users we allow to be running at a time. + static final int MAX_RUNNING_USERS = 3; + + // How long to wait in getAssistContextExtras for the activity and foreground services + // to respond with the result. + static final int PENDING_ASSIST_EXTRAS_TIMEOUT = 500; + + // Maximum number of persisted Uri grants a package is allowed + static final int MAX_PERSISTED_URI_GRANTS = 128; + + static final int MY_PID = Process.myPid(); + + static final String[] EMPTY_STRING_ARRAY = new String[0]; + + // How many bytes to write into the dropbox log before truncating + static final int DROPBOX_MAX_SIZE = 256 * 1024; + + /** Run all ActivityStacks through this */ + ActivityStackSupervisor mStackSupervisor; + + public IntentFirewall mIntentFirewall; + + // Whether we should show our dialogs (ANR, crash, etc) or just perform their + // default actuion automatically. Important for devices without direct input + // devices. + private boolean mShowDialogs = true; + + /** + * Description of a request to start a new activity, which has been held + * due to app switches being disabled. + */ + static class PendingActivityLaunch { + final ActivityRecord r; + final ActivityRecord sourceRecord; + final int startFlags; + final ActivityStack stack; + + PendingActivityLaunch(ActivityRecord _r, ActivityRecord _sourceRecord, + int _startFlags, ActivityStack _stack) { + r = _r; + sourceRecord = _sourceRecord; + startFlags = _startFlags; + stack = _stack; + } + } + + final ArrayList<PendingActivityLaunch> mPendingActivityLaunches + = new ArrayList<PendingActivityLaunch>(); + + BroadcastQueue mFgBroadcastQueue; + BroadcastQueue mBgBroadcastQueue; + // Convenient for easy iteration over the queues. Foreground is first + // so that dispatch of foreground broadcasts gets precedence. + final BroadcastQueue[] mBroadcastQueues = new BroadcastQueue[2]; + + BroadcastQueue broadcastQueueForIntent(Intent intent) { + final boolean isFg = (intent.getFlags() & Intent.FLAG_RECEIVER_FOREGROUND) != 0; + if (DEBUG_BACKGROUND_BROADCAST) { + Slog.i(TAG, "Broadcast intent " + intent + " on " + + (isFg ? "foreground" : "background") + + " queue"); + } + return (isFg) ? mFgBroadcastQueue : mBgBroadcastQueue; + } + + BroadcastRecord broadcastRecordForReceiverLocked(IBinder receiver) { + for (BroadcastQueue queue : mBroadcastQueues) { + BroadcastRecord r = queue.getMatchingOrderedReceiver(receiver); + if (r != null) { + return r; + } + } + return null; + } + + /** + * Activity we have told the window manager to have key focus. + */ + ActivityRecord mFocusedActivity = null; + + /** + * List of intents that were used to start the most recent tasks. + */ + private final ArrayList<TaskRecord> mRecentTasks = new ArrayList<TaskRecord>(); + + public class PendingAssistExtras extends Binder implements Runnable { + public final ActivityRecord activity; + public boolean haveResult = false; + public Bundle result = null; + public PendingAssistExtras(ActivityRecord _activity) { + activity = _activity; + } + @Override + public void run() { + Slog.w(TAG, "getAssistContextExtras failed: timeout retrieving from " + activity); + synchronized (this) { + haveResult = true; + notifyAll(); + } + } + } + + final ArrayList<PendingAssistExtras> mPendingAssistExtras + = new ArrayList<PendingAssistExtras>(); + + /** + * Process management. + */ + final ProcessList mProcessList = new ProcessList(); + + /** + * All of the applications we currently have running organized by name. + * The keys are strings of the application package name (as + * returned by the package manager), and the keys are ApplicationRecord + * objects. + */ + final ProcessMap<ProcessRecord> mProcessNames = new ProcessMap<ProcessRecord>(); + + /** + * Tracking long-term execution of processes to look for abuse and other + * bad app behavior. + */ + final ProcessStatsService mProcessStats; + + /** + * The currently running isolated processes. + */ + final SparseArray<ProcessRecord> mIsolatedProcesses = new SparseArray<ProcessRecord>(); + + /** + * Counter for assigning isolated process uids, to avoid frequently reusing the + * same ones. + */ + int mNextIsolatedProcessUid = 0; + + /** + * The currently running heavy-weight process, if any. + */ + ProcessRecord mHeavyWeightProcess = null; + + /** + * The last time that various processes have crashed. + */ + final ProcessMap<Long> mProcessCrashTimes = new ProcessMap<Long>(); + + /** + * Information about a process that is currently marked as bad. + */ + static final class BadProcessInfo { + BadProcessInfo(long time, String shortMsg, String longMsg, String stack) { + this.time = time; + this.shortMsg = shortMsg; + this.longMsg = longMsg; + this.stack = stack; + } + + final long time; + final String shortMsg; + final String longMsg; + final String stack; + } + + /** + * Set of applications that we consider to be bad, and will reject + * incoming broadcasts from (which the user has no control over). + * Processes are added to this set when they have crashed twice within + * a minimum amount of time; they are removed from it when they are + * later restarted (hopefully due to some user action). The value is the + * time it was added to the list. + */ + final ProcessMap<BadProcessInfo> mBadProcesses = new ProcessMap<BadProcessInfo>(); + + /** + * All of the processes we currently have running organized by pid. + * The keys are the pid running the application. + * + * <p>NOTE: This object is protected by its own lock, NOT the global + * activity manager lock! + */ + final SparseArray<ProcessRecord> mPidsSelfLocked = new SparseArray<ProcessRecord>(); + + /** + * All of the processes that have been forced to be foreground. The key + * is the pid of the caller who requested it (we hold a death + * link on it). + */ + abstract class ForegroundToken implements IBinder.DeathRecipient { + int pid; + IBinder token; + } + final SparseArray<ForegroundToken> mForegroundProcesses = new SparseArray<ForegroundToken>(); + + /** + * List of records for processes that someone had tried to start before the + * system was ready. We don't start them at that point, but ensure they + * are started by the time booting is complete. + */ + final ArrayList<ProcessRecord> mProcessesOnHold = new ArrayList<ProcessRecord>(); + + /** + * List of persistent applications that are in the process + * of being started. + */ + final ArrayList<ProcessRecord> mPersistentStartingProcesses = new ArrayList<ProcessRecord>(); + + /** + * Processes that are being forcibly torn down. + */ + final ArrayList<ProcessRecord> mRemovedProcesses = new ArrayList<ProcessRecord>(); + + /** + * List of running applications, sorted by recent usage. + * The first entry in the list is the least recently used. + */ + final ArrayList<ProcessRecord> mLruProcesses = new ArrayList<ProcessRecord>(); + + /** + * Where in mLruProcesses that the processes hosting activities start. + */ + int mLruProcessActivityStart = 0; + + /** + * Where in mLruProcesses that the processes hosting services start. + * This is after (lower index) than mLruProcessesActivityStart. + */ + int mLruProcessServiceStart = 0; + + /** + * List of processes that should gc as soon as things are idle. + */ + final ArrayList<ProcessRecord> mProcessesToGc = new ArrayList<ProcessRecord>(); + + /** + * Processes we want to collect PSS data from. + */ + final ArrayList<ProcessRecord> mPendingPssProcesses = new ArrayList<ProcessRecord>(); + + /** + * Last time we requested PSS data of all processes. + */ + long mLastFullPssTime = SystemClock.uptimeMillis(); + + /** + * This is the process holding what we currently consider to be + * the "home" activity. + */ + ProcessRecord mHomeProcess; + + /** + * This is the process holding the activity the user last visited that + * is in a different process from the one they are currently in. + */ + ProcessRecord mPreviousProcess; + + /** + * The time at which the previous process was last visible. + */ + long mPreviousProcessVisibleTime; + + /** + * Which uses have been started, so are allowed to run code. + */ + final SparseArray<UserStartedState> mStartedUsers = new SparseArray<UserStartedState>(); + + /** + * LRU list of history of current users. Most recently current is at the end. + */ + final ArrayList<Integer> mUserLru = new ArrayList<Integer>(); + + /** + * Constant array of the users that are currently started. + */ + int[] mStartedUserArray = new int[] { 0 }; + + /** + * Registered observers of the user switching mechanics. + */ + final RemoteCallbackList<IUserSwitchObserver> mUserSwitchObservers + = new RemoteCallbackList<IUserSwitchObserver>(); + + /** + * Currently active user switch. + */ + Object mCurUserSwitchCallback; + + /** + * Packages that the user has asked to have run in screen size + * compatibility mode instead of filling the screen. + */ + final CompatModePackages mCompatModePackages; + + /** + * Set of IntentSenderRecord objects that are currently active. + */ + final HashMap<PendingIntentRecord.Key, WeakReference<PendingIntentRecord>> mIntentSenderRecords + = new HashMap<PendingIntentRecord.Key, WeakReference<PendingIntentRecord>>(); + + /** + * Fingerprints (hashCode()) of stack traces that we've + * already logged DropBox entries for. Guarded by itself. If + * something (rogue user app) forces this over + * MAX_DUP_SUPPRESSED_STACKS entries, the contents are cleared. + */ + private final HashSet<Integer> mAlreadyLoggedViolatedStacks = new HashSet<Integer>(); + private static final int MAX_DUP_SUPPRESSED_STACKS = 5000; + + /** + * Strict Mode background batched logging state. + * + * The string buffer is guarded by itself, and its lock is also + * used to determine if another batched write is already + * in-flight. + */ + private final StringBuilder mStrictModeBuffer = new StringBuilder(); + + /** + * Keeps track of all IIntentReceivers that have been registered for + * broadcasts. Hash keys are the receiver IBinder, hash value is + * a ReceiverList. + */ + final HashMap<IBinder, ReceiverList> mRegisteredReceivers = + new HashMap<IBinder, ReceiverList>(); + + /** + * Resolver for broadcast intents to registered receivers. + * Holds BroadcastFilter (subclass of IntentFilter). + */ + final IntentResolver<BroadcastFilter, BroadcastFilter> mReceiverResolver + = new IntentResolver<BroadcastFilter, BroadcastFilter>() { + @Override + protected boolean allowFilterResult( + BroadcastFilter filter, List<BroadcastFilter> dest) { + IBinder target = filter.receiverList.receiver.asBinder(); + for (int i=dest.size()-1; i>=0; i--) { + if (dest.get(i).receiverList.receiver.asBinder() == target) { + return false; + } + } + return true; + } + + @Override + protected BroadcastFilter newResult(BroadcastFilter filter, int match, int userId) { + if (userId == UserHandle.USER_ALL || filter.owningUserId == UserHandle.USER_ALL + || userId == filter.owningUserId) { + return super.newResult(filter, match, userId); + } + return null; + } + + @Override + protected BroadcastFilter[] newArray(int size) { + return new BroadcastFilter[size]; + } + + @Override + protected boolean isPackageForFilter(String packageName, BroadcastFilter filter) { + return packageName.equals(filter.packageName); + } + }; + + /** + * State of all active sticky broadcasts per user. Keys are the action of the + * sticky Intent, values are an ArrayList of all broadcasted intents with + * that action (which should usually be one). The SparseArray is keyed + * by the user ID the sticky is for, and can include UserHandle.USER_ALL + * for stickies that are sent to all users. + */ + final SparseArray<ArrayMap<String, ArrayList<Intent>>> mStickyBroadcasts = + new SparseArray<ArrayMap<String, ArrayList<Intent>>>(); + + final ActiveServices mServices; + + /** + * Backup/restore process management + */ + String mBackupAppName = null; + BackupRecord mBackupTarget = null; + + /** + * List of PendingThumbnailsRecord objects of clients who are still + * waiting to receive all of the thumbnails for a task. + */ + final ArrayList<PendingThumbnailsRecord> mPendingThumbnails = + new ArrayList<PendingThumbnailsRecord>(); + + final ProviderMap mProviderMap; + + /** + * List of content providers who have clients waiting for them. The + * application is currently being launched and the provider will be + * removed from this list once it is published. + */ + final ArrayList<ContentProviderRecord> mLaunchingProviders + = new ArrayList<ContentProviderRecord>(); + + /** + * File storing persisted {@link #mGrantedUriPermissions}. + */ + private final AtomicFile mGrantFile; + + /** XML constants used in {@link #mGrantFile} */ + private static final String TAG_URI_GRANTS = "uri-grants"; + private static final String TAG_URI_GRANT = "uri-grant"; + private static final String ATTR_USER_HANDLE = "userHandle"; + private static final String ATTR_SOURCE_PKG = "sourcePkg"; + private static final String ATTR_TARGET_PKG = "targetPkg"; + private static final String ATTR_URI = "uri"; + private static final String ATTR_MODE_FLAGS = "modeFlags"; + private static final String ATTR_CREATED_TIME = "createdTime"; + + /** + * Global set of specific {@link Uri} permissions that have been granted. + * This optimized lookup structure maps from {@link UriPermission#targetUid} + * to {@link UriPermission#uri} to {@link UriPermission}. + */ + @GuardedBy("this") + private final SparseArray<ArrayMap<Uri, UriPermission>> + mGrantedUriPermissions = new SparseArray<ArrayMap<Uri, UriPermission>>(); + + CoreSettingsObserver mCoreSettingsObserver; + + /** + * Thread-local storage used to carry caller permissions over through + * indirect content-provider access. + */ + private class Identity { + public int pid; + public int uid; + + Identity(int _pid, int _uid) { + pid = _pid; + uid = _uid; + } + } + + private static ThreadLocal<Identity> sCallerIdentity = new ThreadLocal<Identity>(); + + /** + * All information we have collected about the runtime performance of + * any user id that can impact battery performance. + */ + final BatteryStatsService mBatteryStatsService; + + /** + * Information about component usage + */ + final UsageStatsService mUsageStatsService; + + /** + * Information about and control over application operations + */ + final AppOpsService mAppOpsService; + + /** + * Current configuration information. HistoryRecord objects are given + * a reference to this object to indicate which configuration they are + * currently running in, so this object must be kept immutable. + */ + Configuration mConfiguration = new Configuration(); + + /** + * Current sequencing integer of the configuration, for skipping old + * configurations. + */ + int mConfigurationSeq = 0; + + /** + * Hardware-reported OpenGLES version. + */ + final int GL_ES_VERSION; + + /** + * List of initialization arguments to pass to all processes when binding applications to them. + * For example, references to the commonly used services. + */ + HashMap<String, IBinder> mAppBindArgs; + + /** + * Temporary to avoid allocations. Protected by main lock. + */ + final StringBuilder mStringBuilder = new StringBuilder(256); + + /** + * Used to control how we initialize the service. + */ + boolean mStartRunning = false; + ComponentName mTopComponent; + String mTopAction; + String mTopData; + boolean mProcessesReady = false; + boolean mSystemReady = false; + boolean mBooting = false; + boolean mWaitingUpdate = false; + boolean mDidUpdate = false; + boolean mOnBattery = false; + boolean mLaunchWarningShown = false; + + Context mContext; + + int mFactoryTest; + + boolean mCheckedForSetup; + + /** + * The time at which we will allow normal application switches again, + * after a call to {@link #stopAppSwitches()}. + */ + long mAppSwitchesAllowedTime; + + /** + * This is set to true after the first switch after mAppSwitchesAllowedTime + * is set; any switches after that will clear the time. + */ + boolean mDidAppSwitch; + + /** + * Last time (in realtime) at which we checked for power usage. + */ + long mLastPowerCheckRealtime; + + /** + * Last time (in uptime) at which we checked for power usage. + */ + long mLastPowerCheckUptime; + + /** + * Set while we are wanting to sleep, to prevent any + * activities from being started/resumed. + */ + boolean mSleeping = false; + + /** + * State of external calls telling us if the device is asleep. + */ + boolean mWentToSleep = false; + + /** + * State of external call telling us if the lock screen is shown. + */ + boolean mLockScreenShown = false; + + /** + * Set if we are shutting down the system, similar to sleeping. + */ + boolean mShuttingDown = false; + + /** + * Current sequence id for oom_adj computation traversal. + */ + int mAdjSeq = 0; + + /** + * Current sequence id for process LRU updating. + */ + int mLruSeq = 0; + + /** + * Keep track of the non-cached/empty process we last found, to help + * determine how to distribute cached/empty processes next time. + */ + int mNumNonCachedProcs = 0; + + /** + * Keep track of the number of cached hidden procs, to balance oom adj + * distribution between those and empty procs. + */ + int mNumCachedHiddenProcs = 0; + + /** + * Keep track of the number of service processes we last found, to + * determine on the next iteration which should be B services. + */ + int mNumServiceProcs = 0; + int mNewNumAServiceProcs = 0; + int mNewNumServiceProcs = 0; + + /** + * Allow the current computed overall memory level of the system to go down? + * This is set to false when we are killing processes for reasons other than + * memory management, so that the now smaller process list will not be taken as + * an indication that memory is tighter. + */ + boolean mAllowLowerMemLevel = false; + + /** + * The last computed memory level, for holding when we are in a state that + * processes are going away for other reasons. + */ + int mLastMemoryLevel = ProcessStats.ADJ_MEM_FACTOR_NORMAL; + + /** + * The last total number of process we have, to determine if changes actually look + * like a shrinking number of process due to lower RAM. + */ + int mLastNumProcesses; + + /** + * The uptime of the last time we performed idle maintenance. + */ + long mLastIdleTime = SystemClock.uptimeMillis(); + + /** + * Total time spent with RAM that has been added in the past since the last idle time. + */ + long mLowRamTimeSinceLastIdle = 0; + + /** + * If RAM is currently low, when that horrible situatin started. + */ + long mLowRamStartTime = 0; + + /** + * This is set if we had to do a delayed dexopt of an app before launching + * it, to increasing the ANR timeouts in that case. + */ + boolean mDidDexOpt; + + String mDebugApp = null; + boolean mWaitForDebugger = false; + boolean mDebugTransient = false; + String mOrigDebugApp = null; + boolean mOrigWaitForDebugger = false; + boolean mAlwaysFinishActivities = false; + IActivityController mController = null; + String mProfileApp = null; + ProcessRecord mProfileProc = null; + String mProfileFile; + ParcelFileDescriptor mProfileFd; + int mProfileType = 0; + boolean mAutoStopProfiler = false; + String mOpenGlTraceApp = null; + + static class ProcessChangeItem { + static final int CHANGE_ACTIVITIES = 1<<0; + static final int CHANGE_IMPORTANCE= 1<<1; + int changes; + int uid; + int pid; + int importance; + boolean foregroundActivities; + } + + final RemoteCallbackList<IProcessObserver> mProcessObservers + = new RemoteCallbackList<IProcessObserver>(); + ProcessChangeItem[] mActiveProcessChanges = new ProcessChangeItem[5]; + + final ArrayList<ProcessChangeItem> mPendingProcessChanges + = new ArrayList<ProcessChangeItem>(); + final ArrayList<ProcessChangeItem> mAvailProcessChanges + = new ArrayList<ProcessChangeItem>(); + + /** + * Runtime CPU use collection thread. This object's lock is used to + * protect all related state. + */ + final Thread mProcessCpuThread; + + /** + * Used to collect process stats when showing not responding dialog. + * Protected by mProcessCpuThread. + */ + final ProcessCpuTracker mProcessCpuTracker = new ProcessCpuTracker( + MONITOR_THREAD_CPU_USAGE); + final AtomicLong mLastCpuTime = new AtomicLong(0); + final AtomicBoolean mProcessCpuMutexFree = new AtomicBoolean(true); + + long mLastWriteTime = 0; + + /** + * Used to retain an update lock when the foreground activity is in + * immersive mode. + */ + final UpdateLock mUpdateLock = new UpdateLock("immersive"); + + /** + * Set to true after the system has finished booting. + */ + boolean mBooted = false; + + int mProcessLimit = ProcessList.MAX_CACHED_APPS; + int mProcessLimitOverride = -1; + + WindowManagerService mWindowManager; + + static ActivityManagerService mSelf; + static ActivityThread mSystemThread; + + int mCurrentUserId = 0; + private UserManagerService mUserManager; + + private final class AppDeathRecipient implements IBinder.DeathRecipient { + final ProcessRecord mApp; + final int mPid; + final IApplicationThread mAppThread; + + AppDeathRecipient(ProcessRecord app, int pid, + IApplicationThread thread) { + if (localLOGV) Slog.v( + TAG, "New death recipient " + this + + " for thread " + thread.asBinder()); + mApp = app; + mPid = pid; + mAppThread = thread; + } + + @Override + public void binderDied() { + if (localLOGV) Slog.v( + TAG, "Death received in " + this + + " for thread " + mAppThread.asBinder()); + synchronized(ActivityManagerService.this) { + appDiedLocked(mApp, mPid, mAppThread); + } + } + } + + static final int SHOW_ERROR_MSG = 1; + static final int SHOW_NOT_RESPONDING_MSG = 2; + static final int SHOW_FACTORY_ERROR_MSG = 3; + static final int UPDATE_CONFIGURATION_MSG = 4; + static final int GC_BACKGROUND_PROCESSES_MSG = 5; + static final int WAIT_FOR_DEBUGGER_MSG = 6; + static final int SERVICE_TIMEOUT_MSG = 12; + static final int UPDATE_TIME_ZONE = 13; + static final int SHOW_UID_ERROR_MSG = 14; + static final int IM_FEELING_LUCKY_MSG = 15; + static final int PROC_START_TIMEOUT_MSG = 20; + static final int DO_PENDING_ACTIVITY_LAUNCHES_MSG = 21; + static final int KILL_APPLICATION_MSG = 22; + static final int FINALIZE_PENDING_INTENT_MSG = 23; + static final int POST_HEAVY_NOTIFICATION_MSG = 24; + static final int CANCEL_HEAVY_NOTIFICATION_MSG = 25; + static final int SHOW_STRICT_MODE_VIOLATION_MSG = 26; + static final int CHECK_EXCESSIVE_WAKE_LOCKS_MSG = 27; + static final int CLEAR_DNS_CACHE_MSG = 28; + static final int UPDATE_HTTP_PROXY_MSG = 29; + static final int SHOW_COMPAT_MODE_DIALOG_MSG = 30; + static final int DISPATCH_PROCESSES_CHANGED = 31; + static final int DISPATCH_PROCESS_DIED = 32; + static final int REPORT_MEM_USAGE_MSG = 33; + static final int REPORT_USER_SWITCH_MSG = 34; + static final int CONTINUE_USER_SWITCH_MSG = 35; + static final int USER_SWITCH_TIMEOUT_MSG = 36; + static final int IMMERSIVE_MODE_LOCK_MSG = 37; + static final int PERSIST_URI_GRANTS_MSG = 38; + static final int REQUEST_ALL_PSS_MSG = 39; + + static final int FIRST_ACTIVITY_STACK_MSG = 100; + static final int FIRST_BROADCAST_QUEUE_MSG = 200; + static final int FIRST_COMPAT_MODE_MSG = 300; + static final int FIRST_SUPERVISOR_STACK_MSG = 100; + + AlertDialog mUidAlert; + CompatModeDialog mCompatModeDialog; + long mLastMemUsageReportTime = 0; + + /** + * Flag whether the current user is a "monkey", i.e. whether + * the UI is driven by a UI automation tool. + */ + private boolean mUserIsMonkey; + + final Handler mHandler = new Handler() { + //public Handler() { + // if (localLOGV) Slog.v(TAG, "Handler started!"); + //} + + @Override + public void handleMessage(Message msg) { + switch (msg.what) { + case SHOW_ERROR_MSG: { + HashMap<String, Object> data = (HashMap<String, Object>) msg.obj; + boolean showBackground = Settings.Secure.getInt(mContext.getContentResolver(), + Settings.Secure.ANR_SHOW_BACKGROUND, 0) != 0; + synchronized (ActivityManagerService.this) { + ProcessRecord proc = (ProcessRecord)data.get("app"); + AppErrorResult res = (AppErrorResult) data.get("result"); + if (proc != null && proc.crashDialog != null) { + Slog.e(TAG, "App already has crash dialog: " + proc); + if (res != null) { + res.set(0); + } + return; + } + if (!showBackground && UserHandle.getAppId(proc.uid) + >= Process.FIRST_APPLICATION_UID && proc.userId != mCurrentUserId + && proc.pid != MY_PID) { + Slog.w(TAG, "Skipping crash dialog of " + proc + ": background"); + if (res != null) { + res.set(0); + } + return; + } + if (mShowDialogs && !mSleeping && !mShuttingDown) { + Dialog d = new AppErrorDialog(mContext, + ActivityManagerService.this, res, proc); + d.show(); + proc.crashDialog = d; + } else { + // The device is asleep, so just pretend that the user + // saw a crash dialog and hit "force quit". + if (res != null) { + res.set(0); + } + } + } + + ensureBootCompleted(); + } break; + case SHOW_NOT_RESPONDING_MSG: { + synchronized (ActivityManagerService.this) { + HashMap<String, Object> data = (HashMap<String, Object>) msg.obj; + ProcessRecord proc = (ProcessRecord)data.get("app"); + if (proc != null && proc.anrDialog != null) { + Slog.e(TAG, "App already has anr dialog: " + proc); + return; + } + + Intent intent = new Intent("android.intent.action.ANR"); + if (!mProcessesReady) { + intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY + | Intent.FLAG_RECEIVER_FOREGROUND); + } + broadcastIntentLocked(null, null, intent, + null, null, 0, null, null, null, AppOpsManager.OP_NONE, + false, false, MY_PID, Process.SYSTEM_UID, 0 /* TODO: Verify */); + + if (mShowDialogs) { + Dialog d = new AppNotRespondingDialog(ActivityManagerService.this, + mContext, proc, (ActivityRecord)data.get("activity"), + msg.arg1 != 0); + d.show(); + proc.anrDialog = d; + } else { + // Just kill the app if there is no dialog to be shown. + killAppAtUsersRequest(proc, null); + } + } + + ensureBootCompleted(); + } break; + case SHOW_STRICT_MODE_VIOLATION_MSG: { + HashMap<String, Object> data = (HashMap<String, Object>) msg.obj; + synchronized (ActivityManagerService.this) { + ProcessRecord proc = (ProcessRecord) data.get("app"); + if (proc == null) { + Slog.e(TAG, "App not found when showing strict mode dialog."); + break; + } + if (proc.crashDialog != null) { + Slog.e(TAG, "App already has strict mode dialog: " + proc); + return; + } + AppErrorResult res = (AppErrorResult) data.get("result"); + if (mShowDialogs && !mSleeping && !mShuttingDown) { + Dialog d = new StrictModeViolationDialog(mContext, + ActivityManagerService.this, res, proc); + d.show(); + proc.crashDialog = d; + } else { + // The device is asleep, so just pretend that the user + // saw a crash dialog and hit "force quit". + res.set(0); + } + } + ensureBootCompleted(); + } break; + case SHOW_FACTORY_ERROR_MSG: { + Dialog d = new FactoryErrorDialog( + mContext, msg.getData().getCharSequence("msg")); + d.show(); + ensureBootCompleted(); + } break; + case UPDATE_CONFIGURATION_MSG: { + final ContentResolver resolver = mContext.getContentResolver(); + Settings.System.putConfiguration(resolver, (Configuration)msg.obj); + } break; + case GC_BACKGROUND_PROCESSES_MSG: { + synchronized (ActivityManagerService.this) { + performAppGcsIfAppropriateLocked(); + } + } break; + case WAIT_FOR_DEBUGGER_MSG: { + synchronized (ActivityManagerService.this) { + ProcessRecord app = (ProcessRecord)msg.obj; + if (msg.arg1 != 0) { + if (!app.waitedForDebugger) { + Dialog d = new AppWaitingForDebuggerDialog( + ActivityManagerService.this, + mContext, app); + app.waitDialog = d; + app.waitedForDebugger = true; + d.show(); + } + } else { + if (app.waitDialog != null) { + app.waitDialog.dismiss(); + app.waitDialog = null; + } + } + } + } break; + case SERVICE_TIMEOUT_MSG: { + if (mDidDexOpt) { + mDidDexOpt = false; + Message nmsg = mHandler.obtainMessage(SERVICE_TIMEOUT_MSG); + nmsg.obj = msg.obj; + mHandler.sendMessageDelayed(nmsg, ActiveServices.SERVICE_TIMEOUT); + return; + } + mServices.serviceTimeout((ProcessRecord)msg.obj); + } break; + case UPDATE_TIME_ZONE: { + synchronized (ActivityManagerService.this) { + for (int i = mLruProcesses.size() - 1 ; i >= 0 ; i--) { + ProcessRecord r = mLruProcesses.get(i); + if (r.thread != null) { + try { + r.thread.updateTimeZone(); + } catch (RemoteException ex) { + Slog.w(TAG, "Failed to update time zone for: " + r.info.processName); + } + } + } + } + } break; + case CLEAR_DNS_CACHE_MSG: { + synchronized (ActivityManagerService.this) { + for (int i = mLruProcesses.size() - 1 ; i >= 0 ; i--) { + ProcessRecord r = mLruProcesses.get(i); + if (r.thread != null) { + try { + r.thread.clearDnsCache(); + } catch (RemoteException ex) { + Slog.w(TAG, "Failed to clear dns cache for: " + r.info.processName); + } + } + } + } + } break; + case UPDATE_HTTP_PROXY_MSG: { + ProxyProperties proxy = (ProxyProperties)msg.obj; + String host = ""; + String port = ""; + String exclList = ""; + String pacFileUrl = null; + if (proxy != null) { + host = proxy.getHost(); + port = Integer.toString(proxy.getPort()); + exclList = proxy.getExclusionList(); + pacFileUrl = proxy.getPacFileUrl(); + } + synchronized (ActivityManagerService.this) { + for (int i = mLruProcesses.size() - 1 ; i >= 0 ; i--) { + ProcessRecord r = mLruProcesses.get(i); + if (r.thread != null) { + try { + r.thread.setHttpProxy(host, port, exclList, pacFileUrl); + } catch (RemoteException ex) { + Slog.w(TAG, "Failed to update http proxy for: " + + r.info.processName); + } + } + } + } + } break; + case SHOW_UID_ERROR_MSG: { + String title = "System UIDs Inconsistent"; + String text = "UIDs on the system are inconsistent, you need to wipe your" + + " data partition or your device will be unstable."; + Log.e(TAG, title + ": " + text); + if (mShowDialogs) { + // XXX This is a temporary dialog, no need to localize. + AlertDialog d = new BaseErrorDialog(mContext); + d.getWindow().setType(WindowManager.LayoutParams.TYPE_SYSTEM_ERROR); + d.setCancelable(false); + d.setTitle(title); + d.setMessage(text); + d.setButton(DialogInterface.BUTTON_POSITIVE, "I'm Feeling Lucky", + mHandler.obtainMessage(IM_FEELING_LUCKY_MSG)); + mUidAlert = d; + d.show(); + } + } break; + case IM_FEELING_LUCKY_MSG: { + if (mUidAlert != null) { + mUidAlert.dismiss(); + mUidAlert = null; + } + } break; + case PROC_START_TIMEOUT_MSG: { + if (mDidDexOpt) { + mDidDexOpt = false; + Message nmsg = mHandler.obtainMessage(PROC_START_TIMEOUT_MSG); + nmsg.obj = msg.obj; + mHandler.sendMessageDelayed(nmsg, PROC_START_TIMEOUT); + return; + } + ProcessRecord app = (ProcessRecord)msg.obj; + synchronized (ActivityManagerService.this) { + processStartTimedOutLocked(app); + } + } break; + case DO_PENDING_ACTIVITY_LAUNCHES_MSG: { + synchronized (ActivityManagerService.this) { + doPendingActivityLaunchesLocked(true); + } + } break; + case KILL_APPLICATION_MSG: { + synchronized (ActivityManagerService.this) { + int appid = msg.arg1; + boolean restart = (msg.arg2 == 1); + Bundle bundle = (Bundle)msg.obj; + String pkg = bundle.getString("pkg"); + String reason = bundle.getString("reason"); + forceStopPackageLocked(pkg, appid, restart, false, true, false, + UserHandle.USER_ALL, reason); + } + } break; + case FINALIZE_PENDING_INTENT_MSG: { + ((PendingIntentRecord)msg.obj).completeFinalize(); + } break; + case POST_HEAVY_NOTIFICATION_MSG: { + INotificationManager inm = NotificationManager.getService(); + if (inm == null) { + return; + } + + ActivityRecord root = (ActivityRecord)msg.obj; + ProcessRecord process = root.app; + if (process == null) { + return; + } + + try { + Context context = mContext.createPackageContext(process.info.packageName, 0); + String text = mContext.getString(R.string.heavy_weight_notification, + context.getApplicationInfo().loadLabel(context.getPackageManager())); + Notification notification = new Notification(); + notification.icon = com.android.internal.R.drawable.stat_sys_adb; //context.getApplicationInfo().icon; + notification.when = 0; + notification.flags = Notification.FLAG_ONGOING_EVENT; + notification.tickerText = text; + notification.defaults = 0; // please be quiet + notification.sound = null; + notification.vibrate = null; + notification.setLatestEventInfo(context, text, + mContext.getText(R.string.heavy_weight_notification_detail), + PendingIntent.getActivityAsUser(mContext, 0, root.intent, + PendingIntent.FLAG_CANCEL_CURRENT, null, + new UserHandle(root.userId))); + + try { + int[] outId = new int[1]; + inm.enqueueNotificationWithTag("android", "android", null, + R.string.heavy_weight_notification, + notification, outId, root.userId); + } catch (RuntimeException e) { + Slog.w(ActivityManagerService.TAG, + "Error showing notification for heavy-weight app", e); + } catch (RemoteException e) { + } + } catch (NameNotFoundException e) { + Slog.w(TAG, "Unable to create context for heavy notification", e); + } + } break; + case CANCEL_HEAVY_NOTIFICATION_MSG: { + INotificationManager inm = NotificationManager.getService(); + if (inm == null) { + return; + } + try { + inm.cancelNotificationWithTag("android", null, + R.string.heavy_weight_notification, msg.arg1); + } catch (RuntimeException e) { + Slog.w(ActivityManagerService.TAG, + "Error canceling notification for service", e); + } catch (RemoteException e) { + } + } break; + case CHECK_EXCESSIVE_WAKE_LOCKS_MSG: { + synchronized (ActivityManagerService.this) { + checkExcessivePowerUsageLocked(true); + removeMessages(CHECK_EXCESSIVE_WAKE_LOCKS_MSG); + Message nmsg = obtainMessage(CHECK_EXCESSIVE_WAKE_LOCKS_MSG); + sendMessageDelayed(nmsg, POWER_CHECK_DELAY); + } + } break; + case SHOW_COMPAT_MODE_DIALOG_MSG: { + synchronized (ActivityManagerService.this) { + ActivityRecord ar = (ActivityRecord)msg.obj; + if (mCompatModeDialog != null) { + if (mCompatModeDialog.mAppInfo.packageName.equals( + ar.info.applicationInfo.packageName)) { + return; + } + mCompatModeDialog.dismiss(); + mCompatModeDialog = null; + } + if (ar != null && false) { + if (mCompatModePackages.getPackageAskCompatModeLocked( + ar.packageName)) { + int mode = mCompatModePackages.computeCompatModeLocked( + ar.info.applicationInfo); + if (mode == ActivityManager.COMPAT_MODE_DISABLED + || mode == ActivityManager.COMPAT_MODE_ENABLED) { + mCompatModeDialog = new CompatModeDialog( + ActivityManagerService.this, mContext, + ar.info.applicationInfo); + mCompatModeDialog.show(); + } + } + } + } + break; + } + case DISPATCH_PROCESSES_CHANGED: { + dispatchProcessesChanged(); + break; + } + case DISPATCH_PROCESS_DIED: { + final int pid = msg.arg1; + final int uid = msg.arg2; + dispatchProcessDied(pid, uid); + break; + } + case REPORT_MEM_USAGE_MSG: { + final ArrayList<ProcessMemInfo> memInfos = (ArrayList<ProcessMemInfo>)msg.obj; + Thread thread = new Thread() { + @Override public void run() { + final SparseArray<ProcessMemInfo> infoMap + = new SparseArray<ProcessMemInfo>(memInfos.size()); + for (int i=0, N=memInfos.size(); i<N; i++) { + ProcessMemInfo mi = memInfos.get(i); + infoMap.put(mi.pid, mi); + } + updateCpuStatsNow(); + synchronized (mProcessCpuThread) { + final int N = mProcessCpuTracker.countStats(); + for (int i=0; i<N; i++) { + ProcessCpuTracker.Stats st = mProcessCpuTracker.getStats(i); + if (st.vsize > 0) { + long pss = Debug.getPss(st.pid, null); + if (pss > 0) { + if (infoMap.indexOfKey(st.pid) < 0) { + ProcessMemInfo mi = new ProcessMemInfo(st.name, st.pid, + ProcessList.NATIVE_ADJ, -1, "native", null); + mi.pss = pss; + memInfos.add(mi); + } + } + } + } + } + + long totalPss = 0; + for (int i=0, N=memInfos.size(); i<N; i++) { + ProcessMemInfo mi = memInfos.get(i); + if (mi.pss == 0) { + mi.pss = Debug.getPss(mi.pid, null); + } + totalPss += mi.pss; + } + Collections.sort(memInfos, new Comparator<ProcessMemInfo>() { + @Override public int compare(ProcessMemInfo lhs, ProcessMemInfo rhs) { + if (lhs.oomAdj != rhs.oomAdj) { + return lhs.oomAdj < rhs.oomAdj ? -1 : 1; + } + if (lhs.pss != rhs.pss) { + return lhs.pss < rhs.pss ? 1 : -1; + } + return 0; + } + }); + + StringBuilder tag = new StringBuilder(128); + StringBuilder stack = new StringBuilder(128); + tag.append("Low on memory -- "); + appendMemBucket(tag, totalPss, "total", false); + appendMemBucket(stack, totalPss, "total", true); + + StringBuilder logBuilder = new StringBuilder(1024); + logBuilder.append("Low on memory:\n"); + + boolean firstLine = true; + int lastOomAdj = Integer.MIN_VALUE; + for (int i=0, N=memInfos.size(); i<N; i++) { + ProcessMemInfo mi = memInfos.get(i); + + if (mi.oomAdj != ProcessList.NATIVE_ADJ + && (mi.oomAdj < ProcessList.SERVICE_ADJ + || mi.oomAdj == ProcessList.HOME_APP_ADJ + || mi.oomAdj == ProcessList.PREVIOUS_APP_ADJ)) { + if (lastOomAdj != mi.oomAdj) { + lastOomAdj = mi.oomAdj; + if (mi.oomAdj <= ProcessList.FOREGROUND_APP_ADJ) { + tag.append(" / "); + } + if (mi.oomAdj >= ProcessList.FOREGROUND_APP_ADJ) { + if (firstLine) { + stack.append(":"); + firstLine = false; + } + stack.append("\n\t at "); + } else { + stack.append("$"); + } + } else { + tag.append(" "); + stack.append("$"); + } + if (mi.oomAdj <= ProcessList.FOREGROUND_APP_ADJ) { + appendMemBucket(tag, mi.pss, mi.name, false); + } + appendMemBucket(stack, mi.pss, mi.name, true); + if (mi.oomAdj >= ProcessList.FOREGROUND_APP_ADJ + && ((i+1) >= N || memInfos.get(i+1).oomAdj != lastOomAdj)) { + stack.append("("); + for (int k=0; k<DUMP_MEM_OOM_ADJ.length; k++) { + if (DUMP_MEM_OOM_ADJ[k] == mi.oomAdj) { + stack.append(DUMP_MEM_OOM_LABEL[k]); + stack.append(":"); + stack.append(DUMP_MEM_OOM_ADJ[k]); + } + } + stack.append(")"); + } + } + + logBuilder.append(" "); + logBuilder.append(ProcessList.makeOomAdjString(mi.oomAdj)); + logBuilder.append(' '); + logBuilder.append(ProcessList.makeProcStateString(mi.procState)); + logBuilder.append(' '); + ProcessList.appendRamKb(logBuilder, mi.pss); + logBuilder.append(" kB: "); + logBuilder.append(mi.name); + logBuilder.append(" ("); + logBuilder.append(mi.pid); + logBuilder.append(") "); + logBuilder.append(mi.adjType); + logBuilder.append('\n'); + if (mi.adjReason != null) { + logBuilder.append(" "); + logBuilder.append(mi.adjReason); + logBuilder.append('\n'); + } + } + + logBuilder.append(" "); + ProcessList.appendRamKb(logBuilder, totalPss); + logBuilder.append(" kB: TOTAL\n"); + + long[] infos = new long[Debug.MEMINFO_COUNT]; + Debug.getMemInfo(infos); + logBuilder.append(" MemInfo: "); + logBuilder.append(infos[Debug.MEMINFO_SLAB]).append(" kB slab, "); + logBuilder.append(infos[Debug.MEMINFO_SHMEM]).append(" kB shmem, "); + logBuilder.append(infos[Debug.MEMINFO_BUFFERS]).append(" kB buffers, "); + logBuilder.append(infos[Debug.MEMINFO_CACHED]).append(" kB cached, "); + logBuilder.append(infos[Debug.MEMINFO_FREE]).append(" kB free\n"); + if (infos[Debug.MEMINFO_ZRAM_TOTAL] != 0) { + logBuilder.append(" ZRAM: "); + logBuilder.append(infos[Debug.MEMINFO_ZRAM_TOTAL]); + logBuilder.append(" kB RAM, "); + logBuilder.append(infos[Debug.MEMINFO_SWAP_TOTAL]); + logBuilder.append(" kB swap total, "); + logBuilder.append(infos[Debug.MEMINFO_SWAP_FREE]); + logBuilder.append(" kB swap free\n"); + } + Slog.i(TAG, logBuilder.toString()); + + StringBuilder dropBuilder = new StringBuilder(1024); + /* + StringWriter oomSw = new StringWriter(); + PrintWriter oomPw = new FastPrintWriter(oomSw, false, 256); + StringWriter catSw = new StringWriter(); + PrintWriter catPw = new FastPrintWriter(catSw, false, 256); + String[] emptyArgs = new String[] { }; + dumpApplicationMemoryUsage(null, oomPw, " ", emptyArgs, true, catPw); + oomPw.flush(); + String oomString = oomSw.toString(); + */ + dropBuilder.append(stack); + dropBuilder.append('\n'); + dropBuilder.append('\n'); + dropBuilder.append(logBuilder); + dropBuilder.append('\n'); + /* + dropBuilder.append(oomString); + dropBuilder.append('\n'); + */ + StringWriter catSw = new StringWriter(); + synchronized (ActivityManagerService.this) { + PrintWriter catPw = new FastPrintWriter(catSw, false, 256); + String[] emptyArgs = new String[] { }; + catPw.println(); + dumpProcessesLocked(null, catPw, emptyArgs, 0, false, null); + catPw.println(); + mServices.dumpServicesLocked(null, catPw, emptyArgs, 0, + false, false, null); + catPw.println(); + dumpActivitiesLocked(null, catPw, emptyArgs, 0, false, false, null); + catPw.flush(); + } + dropBuilder.append(catSw.toString()); + addErrorToDropBox("lowmem", null, "system_server", null, + null, tag.toString(), dropBuilder.toString(), null, null); + //Slog.i(TAG, "Sent to dropbox:"); + //Slog.i(TAG, dropBuilder.toString()); + synchronized (ActivityManagerService.this) { + long now = SystemClock.uptimeMillis(); + if (mLastMemUsageReportTime < now) { + mLastMemUsageReportTime = now; + } + } + } + }; + thread.start(); + break; + } + case REPORT_USER_SWITCH_MSG: { + dispatchUserSwitch((UserStartedState)msg.obj, msg.arg1, msg.arg2); + break; + } + case CONTINUE_USER_SWITCH_MSG: { + continueUserSwitch((UserStartedState)msg.obj, msg.arg1, msg.arg2); + break; + } + case USER_SWITCH_TIMEOUT_MSG: { + timeoutUserSwitch((UserStartedState)msg.obj, msg.arg1, msg.arg2); + break; + } + case IMMERSIVE_MODE_LOCK_MSG: { + final boolean nextState = (msg.arg1 != 0); + if (mUpdateLock.isHeld() != nextState) { + if (DEBUG_IMMERSIVE) { + final ActivityRecord r = (ActivityRecord) msg.obj; + Slog.d(TAG, "Applying new update lock state '" + nextState + "' for " + r); + } + if (nextState) { + mUpdateLock.acquire(); + } else { + mUpdateLock.release(); + } + } + break; + } + case PERSIST_URI_GRANTS_MSG: { + writeGrantedUriPermissions(); + break; + } + case REQUEST_ALL_PSS_MSG: { + requestPssAllProcsLocked(SystemClock.uptimeMillis(), true, false); + break; + } + } + } + }; + + static final int COLLECT_PSS_BG_MSG = 1; + + final Handler mBgHandler = new Handler(BackgroundThread.getHandler().getLooper()) { + @Override + public void handleMessage(Message msg) { + switch (msg.what) { + case COLLECT_PSS_BG_MSG: { + int i=0, num=0; + long start = SystemClock.uptimeMillis(); + long[] tmp = new long[1]; + do { + ProcessRecord proc; + int procState; + int pid; + synchronized (ActivityManagerService.this) { + if (i >= mPendingPssProcesses.size()) { + if (DEBUG_PSS) Slog.d(TAG, "Collected PSS of " + num + " of " + i + + " processes in " + (SystemClock.uptimeMillis()-start) + "ms"); + mPendingPssProcesses.clear(); + return; + } + proc = mPendingPssProcesses.get(i); + procState = proc.pssProcState; + if (proc.thread != null && procState == proc.setProcState) { + pid = proc.pid; + } else { + proc = null; + pid = 0; + } + i++; + } + if (proc != null) { + long pss = Debug.getPss(pid, tmp); + synchronized (ActivityManagerService.this) { + if (proc.thread != null && proc.setProcState == procState + && proc.pid == pid) { + num++; + proc.lastPssTime = SystemClock.uptimeMillis(); + proc.baseProcessTracker.addPss(pss, tmp[0], true, proc.pkgList); + if (DEBUG_PSS) Slog.d(TAG, "PSS of " + proc.toShortString() + + ": " + pss + " lastPss=" + proc.lastPss + + " state=" + ProcessList.makeProcStateString(procState)); + if (proc.initialIdlePss == 0) { + proc.initialIdlePss = pss; + } + proc.lastPss = pss; + if (procState >= ActivityManager.PROCESS_STATE_HOME) { + proc.lastCachedPss = pss; + } + } + } + } + } while (true); + } + } + } + }; + + public static void setSystemProcess() { + try { + ActivityManagerService m = mSelf; + + ServiceManager.addService(Context.ACTIVITY_SERVICE, m, true); + ServiceManager.addService(ProcessStats.SERVICE_NAME, m.mProcessStats); + ServiceManager.addService("meminfo", new MemBinder(m)); + ServiceManager.addService("gfxinfo", new GraphicsBinder(m)); + ServiceManager.addService("dbinfo", new DbBinder(m)); + if (MONITOR_CPU_USAGE) { + ServiceManager.addService("cpuinfo", new CpuBinder(m)); + } + ServiceManager.addService("permission", new PermissionController(m)); + + ApplicationInfo info = + mSelf.mContext.getPackageManager().getApplicationInfo( + "android", STOCK_PM_FLAGS); + mSystemThread.installSystemApplicationInfo(info); + + synchronized (mSelf) { + ProcessRecord app = mSelf.newProcessRecordLocked(info, + info.processName, false); + app.persistent = true; + app.pid = MY_PID; + app.maxAdj = ProcessList.SYSTEM_ADJ; + app.makeActive(mSystemThread.getApplicationThread(), mSelf.mProcessStats); + mSelf.mProcessNames.put(app.processName, app.uid, app); + synchronized (mSelf.mPidsSelfLocked) { + mSelf.mPidsSelfLocked.put(app.pid, app); + } + mSelf.updateLruProcessLocked(app, false, null); + mSelf.updateOomAdjLocked(); + } + } catch (PackageManager.NameNotFoundException e) { + throw new RuntimeException( + "Unable to find android system package", e); + } + } + + public void setWindowManager(WindowManagerService wm) { + mWindowManager = wm; + mStackSupervisor.setWindowManager(wm); + } + + public void startObservingNativeCrashes() { + final NativeCrashListener ncl = new NativeCrashListener(); + ncl.start(); + } + + public static final Context main(int factoryTest) { + AThread thr = new AThread(); + thr.start(); + + synchronized (thr) { + while (thr.mService == null) { + try { + thr.wait(); + } catch (InterruptedException e) { + } + } + } + + ActivityManagerService m = thr.mService; + mSelf = m; + ActivityThread at = ActivityThread.systemMain(); + mSystemThread = at; + Context context = at.getSystemContext(); + context.setTheme(android.R.style.Theme_Holo); + m.mContext = context; + m.mFactoryTest = factoryTest; + m.mIntentFirewall = new IntentFirewall(m.new IntentFirewallInterface()); + + m.mStackSupervisor = new ActivityStackSupervisor(m); + + m.mBatteryStatsService.publish(context); + m.mUsageStatsService.publish(context); + m.mAppOpsService.publish(context); + + synchronized (thr) { + thr.mReady = true; + thr.notifyAll(); + } + + m.startRunning(null, null, null, null); + + return context; + } + + public static ActivityManagerService self() { + return mSelf; + } + + public IAppOpsService getAppOpsService() { + return mAppOpsService; + } + + static class AThread extends Thread { + ActivityManagerService mService; + Looper mLooper; + boolean mReady = false; + + public AThread() { + super("ActivityManager"); + } + + @Override + public void run() { + Looper.prepare(); + + android.os.Process.setThreadPriority( + android.os.Process.THREAD_PRIORITY_FOREGROUND); + android.os.Process.setCanSelfBackground(false); + + ActivityManagerService m = new ActivityManagerService(); + + synchronized (this) { + mService = m; + mLooper = Looper.myLooper(); + Watchdog.getInstance().addThread(new Handler(mLooper), getName()); + notifyAll(); + } + + synchronized (this) { + while (!mReady) { + try { + wait(); + } catch (InterruptedException e) { + } + } + } + + // For debug builds, log event loop stalls to dropbox for analysis. + if (StrictMode.conditionallyEnableDebugLogging()) { + Slog.i(TAG, "Enabled StrictMode logging for AThread's Looper"); + } + + Looper.loop(); + } + } + + static class MemBinder extends Binder { + ActivityManagerService mActivityManagerService; + MemBinder(ActivityManagerService activityManagerService) { + mActivityManagerService = activityManagerService; + } + + @Override + protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) { + if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) + != PackageManager.PERMISSION_GRANTED) { + pw.println("Permission Denial: can't dump meminfo from from pid=" + + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid() + + " without permission " + android.Manifest.permission.DUMP); + return; + } + + mActivityManagerService.dumpApplicationMemoryUsage(fd, pw, " ", args, false, null); + } + } + + static class GraphicsBinder extends Binder { + ActivityManagerService mActivityManagerService; + GraphicsBinder(ActivityManagerService activityManagerService) { + mActivityManagerService = activityManagerService; + } + + @Override + protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) { + if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) + != PackageManager.PERMISSION_GRANTED) { + pw.println("Permission Denial: can't dump gfxinfo from from pid=" + + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid() + + " without permission " + android.Manifest.permission.DUMP); + return; + } + + mActivityManagerService.dumpGraphicsHardwareUsage(fd, pw, args); + } + } + + static class DbBinder extends Binder { + ActivityManagerService mActivityManagerService; + DbBinder(ActivityManagerService activityManagerService) { + mActivityManagerService = activityManagerService; + } + + @Override + protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) { + if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) + != PackageManager.PERMISSION_GRANTED) { + pw.println("Permission Denial: can't dump dbinfo from from pid=" + + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid() + + " without permission " + android.Manifest.permission.DUMP); + return; + } + + mActivityManagerService.dumpDbInfo(fd, pw, args); + } + } + + static class CpuBinder extends Binder { + ActivityManagerService mActivityManagerService; + CpuBinder(ActivityManagerService activityManagerService) { + mActivityManagerService = activityManagerService; + } + + @Override + protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) { + if (mActivityManagerService.checkCallingPermission(android.Manifest.permission.DUMP) + != PackageManager.PERMISSION_GRANTED) { + pw.println("Permission Denial: can't dump cpuinfo from from pid=" + + Binder.getCallingPid() + ", uid=" + Binder.getCallingUid() + + " without permission " + android.Manifest.permission.DUMP); + return; + } + + synchronized (mActivityManagerService.mProcessCpuThread) { + pw.print(mActivityManagerService.mProcessCpuTracker.printCurrentLoad()); + pw.print(mActivityManagerService.mProcessCpuTracker.printCurrentState( + SystemClock.uptimeMillis())); + } + } + } + + private ActivityManagerService() { + Slog.i(TAG, "Memory class: " + ActivityManager.staticGetMemoryClass()); + + mFgBroadcastQueue = new BroadcastQueue(this, "foreground", BROADCAST_FG_TIMEOUT, false); + mBgBroadcastQueue = new BroadcastQueue(this, "background", BROADCAST_BG_TIMEOUT, true); + mBroadcastQueues[0] = mFgBroadcastQueue; + mBroadcastQueues[1] = mBgBroadcastQueue; + + mServices = new ActiveServices(this); + mProviderMap = new ProviderMap(this); + + File dataDir = Environment.getDataDirectory(); + File systemDir = new File(dataDir, "system"); + systemDir.mkdirs(); + mBatteryStatsService = new BatteryStatsService(new File( + systemDir, "batterystats.bin").toString()); + mBatteryStatsService.getActiveStatistics().readLocked(); + mBatteryStatsService.getActiveStatistics().writeAsyncLocked(); + mOnBattery = DEBUG_POWER ? true + : mBatteryStatsService.getActiveStatistics().getIsOnBattery(); + mBatteryStatsService.getActiveStatistics().setCallback(this); + + mProcessStats = new ProcessStatsService(this, new File(systemDir, "procstats")); + + mUsageStatsService = new UsageStatsService(new File(systemDir, "usagestats").toString()); + mAppOpsService = new AppOpsService(new File(systemDir, "appops.xml")); + + mGrantFile = new AtomicFile(new File(systemDir, "urigrants.xml")); + + // User 0 is the first and only user that runs at boot. + mStartedUsers.put(0, new UserStartedState(new UserHandle(0), true)); + mUserLru.add(Integer.valueOf(0)); + updateStartedUserArrayLocked(); + + GL_ES_VERSION = SystemProperties.getInt("ro.opengles.version", + ConfigurationInfo.GL_ES_VERSION_UNDEFINED); + + mConfiguration.setToDefaults(); + mConfiguration.setLocale(Locale.getDefault()); + + mConfigurationSeq = mConfiguration.seq = 1; + mProcessCpuTracker.init(); + + mCompatModePackages = new CompatModePackages(this, systemDir); + + // Add ourself to the Watchdog monitors. + Watchdog.getInstance().addMonitor(this); + + mProcessCpuThread = new Thread("CpuTracker") { + @Override + public void run() { + while (true) { + try { + try { + synchronized(this) { + final long now = SystemClock.uptimeMillis(); + long nextCpuDelay = (mLastCpuTime.get()+MONITOR_CPU_MAX_TIME)-now; + long nextWriteDelay = (mLastWriteTime+BATTERY_STATS_TIME)-now; + //Slog.i(TAG, "Cpu delay=" + nextCpuDelay + // + ", write delay=" + nextWriteDelay); + if (nextWriteDelay < nextCpuDelay) { + nextCpuDelay = nextWriteDelay; + } + if (nextCpuDelay > 0) { + mProcessCpuMutexFree.set(true); + this.wait(nextCpuDelay); + } + } + } catch (InterruptedException e) { + } + updateCpuStatsNow(); + } catch (Exception e) { + Slog.e(TAG, "Unexpected exception collecting process stats", e); + } + } + } + }; + mProcessCpuThread.start(); + } + + @Override + public boolean onTransact(int code, Parcel data, Parcel reply, int flags) + throws RemoteException { + if (code == SYSPROPS_TRANSACTION) { + // We need to tell all apps about the system property change. + ArrayList<IBinder> procs = new ArrayList<IBinder>(); + synchronized(this) { + final int NP = mProcessNames.getMap().size(); + for (int ip=0; ip<NP; ip++) { + SparseArray<ProcessRecord> apps = mProcessNames.getMap().valueAt(ip); + final int NA = apps.size(); + for (int ia=0; ia<NA; ia++) { + ProcessRecord app = apps.valueAt(ia); + if (app.thread != null) { + procs.add(app.thread.asBinder()); + } + } + } + } + + int N = procs.size(); + for (int i=0; i<N; i++) { + Parcel data2 = Parcel.obtain(); + try { + procs.get(i).transact(IBinder.SYSPROPS_TRANSACTION, data2, null, 0); + } catch (RemoteException e) { + } + data2.recycle(); + } + } + try { + return super.onTransact(code, data, reply, flags); + } catch (RuntimeException e) { + // The activity manager only throws security exceptions, so let's + // log all others. + if (!(e instanceof SecurityException)) { + Slog.wtf(TAG, "Activity Manager Crash", e); + } + throw e; + } + } + + void updateCpuStats() { + final long now = SystemClock.uptimeMillis(); + if (mLastCpuTime.get() >= now - MONITOR_CPU_MIN_TIME) { + return; + } + if (mProcessCpuMutexFree.compareAndSet(true, false)) { + synchronized (mProcessCpuThread) { + mProcessCpuThread.notify(); + } + } + } + + void updateCpuStatsNow() { + synchronized (mProcessCpuThread) { + mProcessCpuMutexFree.set(false); + final long now = SystemClock.uptimeMillis(); + boolean haveNewCpuStats = false; + + if (MONITOR_CPU_USAGE && + mLastCpuTime.get() < (now-MONITOR_CPU_MIN_TIME)) { + mLastCpuTime.set(now); + haveNewCpuStats = true; + mProcessCpuTracker.update(); + //Slog.i(TAG, mProcessCpu.printCurrentState()); + //Slog.i(TAG, "Total CPU usage: " + // + mProcessCpu.getTotalCpuPercent() + "%"); + + // Slog the cpu usage if the property is set. + if ("true".equals(SystemProperties.get("events.cpu"))) { + int user = mProcessCpuTracker.getLastUserTime(); + int system = mProcessCpuTracker.getLastSystemTime(); + int iowait = mProcessCpuTracker.getLastIoWaitTime(); + int irq = mProcessCpuTracker.getLastIrqTime(); + int softIrq = mProcessCpuTracker.getLastSoftIrqTime(); + int idle = mProcessCpuTracker.getLastIdleTime(); + + int total = user + system + iowait + irq + softIrq + idle; + if (total == 0) total = 1; + + EventLog.writeEvent(EventLogTags.CPU, + ((user+system+iowait+irq+softIrq) * 100) / total, + (user * 100) / total, + (system * 100) / total, + (iowait * 100) / total, + (irq * 100) / total, + (softIrq * 100) / total); + } + } + + long[] cpuSpeedTimes = mProcessCpuTracker.getLastCpuSpeedTimes(); + final BatteryStatsImpl bstats = mBatteryStatsService.getActiveStatistics(); + synchronized(bstats) { + synchronized(mPidsSelfLocked) { + if (haveNewCpuStats) { + if (mOnBattery) { + int perc = bstats.startAddingCpuLocked(); + int totalUTime = 0; + int totalSTime = 0; + final int N = mProcessCpuTracker.countStats(); + for (int i=0; i<N; i++) { + ProcessCpuTracker.Stats st = mProcessCpuTracker.getStats(i); + if (!st.working) { + continue; + } + ProcessRecord pr = mPidsSelfLocked.get(st.pid); + int otherUTime = (st.rel_utime*perc)/100; + int otherSTime = (st.rel_stime*perc)/100; + totalUTime += otherUTime; + totalSTime += otherSTime; + if (pr != null) { + BatteryStatsImpl.Uid.Proc ps = bstats.getProcessStatsLocked( + st.name, st.pid); + ps.addCpuTimeLocked(st.rel_utime-otherUTime, + st.rel_stime-otherSTime); + ps.addSpeedStepTimes(cpuSpeedTimes); + pr.curCpuTime += (st.rel_utime+st.rel_stime) * 10; + } else if (st.uid >= Process.FIRST_APPLICATION_UID) { + BatteryStatsImpl.Uid.Proc ps = st.batteryStats; + if (ps == null) { + st.batteryStats = ps = bstats.getProcessStatsLocked(st.uid, + "(Unknown)"); + } + ps.addCpuTimeLocked(st.rel_utime-otherUTime, + st.rel_stime-otherSTime); + ps.addSpeedStepTimes(cpuSpeedTimes); + } else { + BatteryStatsImpl.Uid.Proc ps = + bstats.getProcessStatsLocked(st.name, st.pid); + if (ps != null) { + ps.addCpuTimeLocked(st.rel_utime-otherUTime, + st.rel_stime-otherSTime); + ps.addSpeedStepTimes(cpuSpeedTimes); + } + } + } + bstats.finishAddingCpuLocked(perc, totalUTime, + totalSTime, cpuSpeedTimes); + } + } + } + + if (mLastWriteTime < (now-BATTERY_STATS_TIME)) { + mLastWriteTime = now; + mBatteryStatsService.getActiveStatistics().writeAsyncLocked(); + } + } + } + } + + @Override + public void batteryNeedsCpuUpdate() { + updateCpuStatsNow(); + } + + @Override + public void batteryPowerChanged(boolean onBattery) { + // When plugging in, update the CPU stats first before changing + // the plug state. + updateCpuStatsNow(); + synchronized (this) { + synchronized(mPidsSelfLocked) { + mOnBattery = DEBUG_POWER ? true : onBattery; + } + } + } + + /** + * Initialize the application bind args. These are passed to each + * process when the bindApplication() IPC is sent to the process. They're + * lazily setup to make sure the services are running when they're asked for. + */ + private HashMap<String, IBinder> getCommonServicesLocked() { + if (mAppBindArgs == null) { + mAppBindArgs = new HashMap<String, IBinder>(); + + // Setup the application init args + mAppBindArgs.put("package", ServiceManager.getService("package")); + mAppBindArgs.put("window", ServiceManager.getService("window")); + mAppBindArgs.put(Context.ALARM_SERVICE, + ServiceManager.getService(Context.ALARM_SERVICE)); + } + return mAppBindArgs; + } + + final void setFocusedActivityLocked(ActivityRecord r) { + if (mFocusedActivity != r) { + if (DEBUG_FOCUS) Slog.d(TAG, "setFocusedActivityLocked: r=" + r); + mFocusedActivity = r; + mStackSupervisor.setFocusedStack(r); + if (r != null) { + mWindowManager.setFocusedApp(r.appToken, true); + } + applyUpdateLockStateLocked(r); + } + } + + @Override + public void setFocusedStack(int stackId) { + if (DEBUG_FOCUS) Slog.d(TAG, "setFocusedStack: stackId=" + stackId); + synchronized (ActivityManagerService.this) { + ActivityStack stack = mStackSupervisor.getStack(stackId); + if (stack != null) { + ActivityRecord r = stack.topRunningActivityLocked(null); + if (r != null) { + setFocusedActivityLocked(r); + } + } + } + } + + @Override + public void notifyActivityDrawn(IBinder token) { + if (DEBUG_VISBILITY) Slog.d(TAG, "notifyActivityDrawn: token=" + token); + synchronized (this) { + ActivityRecord r= mStackSupervisor.isInAnyStackLocked(token); + if (r != null) { + r.task.stack.notifyActivityDrawnLocked(r); + } + } + } + + final void applyUpdateLockStateLocked(ActivityRecord r) { + // Modifications to the UpdateLock state are done on our handler, outside + // the activity manager's locks. The new state is determined based on the + // state *now* of the relevant activity record. The object is passed to + // the handler solely for logging detail, not to be consulted/modified. + final boolean nextState = r != null && r.immersive; + mHandler.sendMessage( + mHandler.obtainMessage(IMMERSIVE_MODE_LOCK_MSG, (nextState) ? 1 : 0, 0, r)); + } + + final void showAskCompatModeDialogLocked(ActivityRecord r) { + Message msg = Message.obtain(); + msg.what = SHOW_COMPAT_MODE_DIALOG_MSG; + msg.obj = r.task.askedCompatMode ? null : r; + mHandler.sendMessage(msg); + } + + private final int updateLruProcessInternalLocked(ProcessRecord app, long now, int index, + String what, Object obj, ProcessRecord srcApp) { + app.lastActivityTime = now; + + if (app.activities.size() > 0) { + // Don't want to touch dependent processes that are hosting activities. + return index; + } + + int lrui = mLruProcesses.lastIndexOf(app); + if (lrui < 0) { + Slog.wtf(TAG, "Adding dependent process " + app + " not on LRU list: " + + what + " " + obj + " from " + srcApp); + return index; + } + + if (lrui >= index) { + // Don't want to cause this to move dependent processes *back* in the + // list as if they were less frequently used. + return index; + } + + if (lrui >= mLruProcessActivityStart) { + // Don't want to touch dependent processes that are hosting activities. + return index; + } + + mLruProcesses.remove(lrui); + if (index > 0) { + index--; + } + if (DEBUG_LRU) Slog.d(TAG, "Moving dep from " + lrui + " to " + index + + " in LRU list: " + app); + mLruProcesses.add(index, app); + return index; + } + + final void removeLruProcessLocked(ProcessRecord app) { + int lrui = mLruProcesses.lastIndexOf(app); + if (lrui >= 0) { + if (lrui <= mLruProcessActivityStart) { + mLruProcessActivityStart--; + } + if (lrui <= mLruProcessServiceStart) { + mLruProcessServiceStart--; + } + mLruProcesses.remove(lrui); + } + } + + final void updateLruProcessLocked(ProcessRecord app, boolean activityChange, + ProcessRecord client) { + final boolean hasActivity = app.activities.size() > 0 || app.hasClientActivities; + final boolean hasService = false; // not impl yet. app.services.size() > 0; + if (!activityChange && hasActivity) { + // The process has activties, so we are only going to allow activity-based + // adjustments move it. It should be kept in the front of the list with other + // processes that have activities, and we don't want those to change their + // order except due to activity operations. + return; + } + + mLruSeq++; + final long now = SystemClock.uptimeMillis(); + app.lastActivityTime = now; + + // First a quick reject: if the app is already at the position we will + // put it, then there is nothing to do. + if (hasActivity) { + final int N = mLruProcesses.size(); + if (N > 0 && mLruProcesses.get(N-1) == app) { + if (DEBUG_LRU) Slog.d(TAG, "Not moving, already top activity: " + app); + return; + } + } else { + if (mLruProcessServiceStart > 0 + && mLruProcesses.get(mLruProcessServiceStart-1) == app) { + if (DEBUG_LRU) Slog.d(TAG, "Not moving, already top other: " + app); + return; + } + } + + int lrui = mLruProcesses.lastIndexOf(app); + + if (app.persistent && lrui >= 0) { + // We don't care about the position of persistent processes, as long as + // they are in the list. + if (DEBUG_LRU) Slog.d(TAG, "Not moving, persistent: " + app); + return; + } + + /* In progress: compute new position first, so we can avoid doing work + if the process is not actually going to move. Not yet working. + int addIndex; + int nextIndex; + boolean inActivity = false, inService = false; + if (hasActivity) { + // Process has activities, put it at the very tipsy-top. + addIndex = mLruProcesses.size(); + nextIndex = mLruProcessServiceStart; + inActivity = true; + } else if (hasService) { + // Process has services, put it at the top of the service list. + addIndex = mLruProcessActivityStart; + nextIndex = mLruProcessServiceStart; + inActivity = true; + inService = true; + } else { + // Process not otherwise of interest, it goes to the top of the non-service area. + addIndex = mLruProcessServiceStart; + if (client != null) { + int clientIndex = mLruProcesses.lastIndexOf(client); + if (clientIndex < 0) Slog.d(TAG, "Unknown client " + client + " when updating " + + app); + if (clientIndex >= 0 && addIndex > clientIndex) { + addIndex = clientIndex; + } + } + nextIndex = addIndex > 0 ? addIndex-1 : addIndex; + } + + Slog.d(TAG, "Update LRU at " + lrui + " to " + addIndex + " (act=" + + mLruProcessActivityStart + "): " + app); + */ + + if (lrui >= 0) { + if (lrui < mLruProcessActivityStart) { + mLruProcessActivityStart--; + } + if (lrui < mLruProcessServiceStart) { + mLruProcessServiceStart--; + } + /* + if (addIndex > lrui) { + addIndex--; + } + if (nextIndex > lrui) { + nextIndex--; + } + */ + mLruProcesses.remove(lrui); + } + + /* + mLruProcesses.add(addIndex, app); + if (inActivity) { + mLruProcessActivityStart++; + } + if (inService) { + mLruProcessActivityStart++; + } + */ + + int nextIndex; + if (hasActivity) { + final int N = mLruProcesses.size(); + if (app.activities.size() == 0 && mLruProcessActivityStart < (N-1)) { + // Process doesn't have activities, but has clients with + // activities... move it up, but one below the top (the top + // should always have a real activity). + if (DEBUG_LRU) Slog.d(TAG, "Adding to second-top of LRU activity list: " + app); + mLruProcesses.add(N-1, app); + // To keep it from spamming the LRU list (by making a bunch of clients), + // we will push down any other entries owned by the app. + final int uid = app.info.uid; + for (int i=N-2; i>mLruProcessActivityStart; i--) { + ProcessRecord subProc = mLruProcesses.get(i); + if (subProc.info.uid == uid) { + // We want to push this one down the list. If the process after + // it is for the same uid, however, don't do so, because we don't + // want them internally to be re-ordered. + if (mLruProcesses.get(i-1).info.uid != uid) { + if (DEBUG_LRU) Slog.d(TAG, "Pushing uid " + uid + " swapping at " + i + + ": " + mLruProcesses.get(i) + " : " + mLruProcesses.get(i-1)); + ProcessRecord tmp = mLruProcesses.get(i); + mLruProcesses.set(i, mLruProcesses.get(i-1)); + mLruProcesses.set(i-1, tmp); + i--; + } + } else { + // A gap, we can stop here. + break; + } + } + } else { + // Process has activities, put it at the very tipsy-top. + if (DEBUG_LRU) Slog.d(TAG, "Adding to top of LRU activity list: " + app); + mLruProcesses.add(app); + } + nextIndex = mLruProcessServiceStart; + } else if (hasService) { + // Process has services, put it at the top of the service list. + if (DEBUG_LRU) Slog.d(TAG, "Adding to top of LRU service list: " + app); + mLruProcesses.add(mLruProcessActivityStart, app); + nextIndex = mLruProcessServiceStart; + mLruProcessActivityStart++; + } else { + // Process not otherwise of interest, it goes to the top of the non-service area. + int index = mLruProcessServiceStart; + if (client != null) { + // If there is a client, don't allow the process to be moved up higher + // in the list than that client. + int clientIndex = mLruProcesses.lastIndexOf(client); + if (DEBUG_LRU && clientIndex < 0) Slog.d(TAG, "Unknown client " + client + + " when updating " + app); + if (clientIndex <= lrui) { + // Don't allow the client index restriction to push it down farther in the + // list than it already is. + clientIndex = lrui; + } + if (clientIndex >= 0 && index > clientIndex) { + index = clientIndex; + } + } + if (DEBUG_LRU) Slog.d(TAG, "Adding at " + index + " of LRU list: " + app); + mLruProcesses.add(index, app); + nextIndex = index-1; + mLruProcessActivityStart++; + mLruProcessServiceStart++; + } + + // If the app is currently using a content provider or service, + // bump those processes as well. + for (int j=app.connections.size()-1; j>=0; j--) { + ConnectionRecord cr = app.connections.valueAt(j); + if (cr.binding != null && !cr.serviceDead && cr.binding.service != null + && cr.binding.service.app != null + && cr.binding.service.app.lruSeq != mLruSeq + && !cr.binding.service.app.persistent) { + nextIndex = updateLruProcessInternalLocked(cr.binding.service.app, now, nextIndex, + "service connection", cr, app); + } + } + for (int j=app.conProviders.size()-1; j>=0; j--) { + ContentProviderRecord cpr = app.conProviders.get(j).provider; + if (cpr.proc != null && cpr.proc.lruSeq != mLruSeq && !cpr.proc.persistent) { + nextIndex = updateLruProcessInternalLocked(cpr.proc, now, nextIndex, + "provider reference", cpr, app); + } + } + } + + final ProcessRecord getProcessRecordLocked(String processName, int uid, boolean keepIfLarge) { + if (uid == Process.SYSTEM_UID) { + // The system gets to run in any process. If there are multiple + // processes with the same uid, just pick the first (this + // should never happen). + SparseArray<ProcessRecord> procs = mProcessNames.getMap().get(processName); + if (procs == null) return null; + final int N = procs.size(); + for (int i = 0; i < N; i++) { + if (UserHandle.isSameUser(procs.keyAt(i), uid)) return procs.valueAt(i); + } + } + ProcessRecord proc = mProcessNames.get(processName, uid); + if (false && proc != null && !keepIfLarge + && proc.setProcState >= ActivityManager.PROCESS_STATE_CACHED_EMPTY + && proc.lastCachedPss >= 4000) { + // Turn this condition on to cause killing to happen regularly, for testing. + if (proc.baseProcessTracker != null) { + proc.baseProcessTracker.reportCachedKill(proc.pkgList, proc.lastCachedPss); + } + killUnneededProcessLocked(proc, Long.toString(proc.lastCachedPss) + + "k from cached"); + } else if (proc != null && !keepIfLarge + && mLastMemoryLevel > ProcessStats.ADJ_MEM_FACTOR_NORMAL + && proc.setProcState >= ActivityManager.PROCESS_STATE_CACHED_EMPTY) { + if (DEBUG_PSS) Slog.d(TAG, "May not keep " + proc + ": pss=" + proc.lastCachedPss); + if (proc.lastCachedPss >= mProcessList.getCachedRestoreThresholdKb()) { + if (proc.baseProcessTracker != null) { + proc.baseProcessTracker.reportCachedKill(proc.pkgList, proc.lastCachedPss); + } + killUnneededProcessLocked(proc, Long.toString(proc.lastCachedPss) + + "k from cached"); + } + } + return proc; + } + + void ensurePackageDexOpt(String packageName) { + IPackageManager pm = AppGlobals.getPackageManager(); + try { + if (pm.performDexOpt(packageName)) { + mDidDexOpt = true; + } + } catch (RemoteException e) { + } + } + + boolean isNextTransitionForward() { + int transit = mWindowManager.getPendingAppTransition(); + return transit == AppTransition.TRANSIT_ACTIVITY_OPEN + || transit == AppTransition.TRANSIT_TASK_OPEN + || transit == AppTransition.TRANSIT_TASK_TO_FRONT; + } + + final ProcessRecord startProcessLocked(String processName, + ApplicationInfo info, boolean knownToBeDead, int intentFlags, + String hostingType, ComponentName hostingName, boolean allowWhileBooting, + boolean isolated, boolean keepIfLarge) { + ProcessRecord app; + if (!isolated) { + app = getProcessRecordLocked(processName, info.uid, keepIfLarge); + } else { + // If this is an isolated process, it can't re-use an existing process. + app = null; + } + // We don't have to do anything more if: + // (1) There is an existing application record; and + // (2) The caller doesn't think it is dead, OR there is no thread + // object attached to it so we know it couldn't have crashed; and + // (3) There is a pid assigned to it, so it is either starting or + // already running. + if (DEBUG_PROCESSES) Slog.v(TAG, "startProcess: name=" + processName + + " app=" + app + " knownToBeDead=" + knownToBeDead + + " thread=" + (app != null ? app.thread : null) + + " pid=" + (app != null ? app.pid : -1)); + if (app != null && app.pid > 0) { + if (!knownToBeDead || app.thread == null) { + // We already have the app running, or are waiting for it to + // come up (we have a pid but not yet its thread), so keep it. + if (DEBUG_PROCESSES) Slog.v(TAG, "App already running: " + app); + // If this is a new package in the process, add the package to the list + app.addPackage(info.packageName, mProcessStats); + return app; + } + + // An application record is attached to a previous process, + // clean it up now. + if (DEBUG_PROCESSES || DEBUG_CLEANUP) Slog.v(TAG, "App died: " + app); + handleAppDiedLocked(app, true, true); + } + + String hostingNameStr = hostingName != null + ? hostingName.flattenToShortString() : null; + + if (!isolated) { + if ((intentFlags&Intent.FLAG_FROM_BACKGROUND) != 0) { + // If we are in the background, then check to see if this process + // is bad. If so, we will just silently fail. + if (mBadProcesses.get(info.processName, info.uid) != null) { + if (DEBUG_PROCESSES) Slog.v(TAG, "Bad process: " + info.uid + + "/" + info.processName); + return null; + } + } else { + // When the user is explicitly starting a process, then clear its + // crash count so that we won't make it bad until they see at + // least one crash dialog again, and make the process good again + // if it had been bad. + if (DEBUG_PROCESSES) Slog.v(TAG, "Clearing bad process: " + info.uid + + "/" + info.processName); + mProcessCrashTimes.remove(info.processName, info.uid); + if (mBadProcesses.get(info.processName, info.uid) != null) { + EventLog.writeEvent(EventLogTags.AM_PROC_GOOD, + UserHandle.getUserId(info.uid), info.uid, + info.processName); + mBadProcesses.remove(info.processName, info.uid); + if (app != null) { + app.bad = false; + } + } + } + } + + if (app == null) { + app = newProcessRecordLocked(info, processName, isolated); + if (app == null) { + Slog.w(TAG, "Failed making new process record for " + + processName + "/" + info.uid + " isolated=" + isolated); + return null; + } + mProcessNames.put(processName, app.uid, app); + if (isolated) { + mIsolatedProcesses.put(app.uid, app); + } + } else { + // If this is a new package in the process, add the package to the list + app.addPackage(info.packageName, mProcessStats); + } + + // If the system is not ready yet, then hold off on starting this + // process until it is. + if (!mProcessesReady + && !isAllowedWhileBooting(info) + && !allowWhileBooting) { + if (!mProcessesOnHold.contains(app)) { + mProcessesOnHold.add(app); + } + if (DEBUG_PROCESSES) Slog.v(TAG, "System not ready, putting on hold: " + app); + return app; + } + + startProcessLocked(app, hostingType, hostingNameStr); + return (app.pid != 0) ? app : null; + } + + boolean isAllowedWhileBooting(ApplicationInfo ai) { + return (ai.flags&ApplicationInfo.FLAG_PERSISTENT) != 0; + } + + private final void startProcessLocked(ProcessRecord app, + String hostingType, String hostingNameStr) { + if (app.pid > 0 && app.pid != MY_PID) { + synchronized (mPidsSelfLocked) { + mPidsSelfLocked.remove(app.pid); + mHandler.removeMessages(PROC_START_TIMEOUT_MSG, app); + } + app.setPid(0); + } + + if (DEBUG_PROCESSES && mProcessesOnHold.contains(app)) Slog.v(TAG, + "startProcessLocked removing on hold: " + app); + mProcessesOnHold.remove(app); + + updateCpuStats(); + + try { + int uid = app.uid; + + int[] gids = null; + int mountExternal = Zygote.MOUNT_EXTERNAL_NONE; + if (!app.isolated) { + int[] permGids = null; + try { + final PackageManager pm = mContext.getPackageManager(); + permGids = pm.getPackageGids(app.info.packageName); + + if (Environment.isExternalStorageEmulated()) { + if (pm.checkPermission( + android.Manifest.permission.ACCESS_ALL_EXTERNAL_STORAGE, + app.info.packageName) == PERMISSION_GRANTED) { + mountExternal = Zygote.MOUNT_EXTERNAL_MULTIUSER_ALL; + } else { + mountExternal = Zygote.MOUNT_EXTERNAL_MULTIUSER; + } + } + } catch (PackageManager.NameNotFoundException e) { + Slog.w(TAG, "Unable to retrieve gids", e); + } + + /* + * Add shared application GID so applications can share some + * resources like shared libraries + */ + if (permGids == null) { + gids = new int[1]; + } else { + gids = new int[permGids.length + 1]; + System.arraycopy(permGids, 0, gids, 1, permGids.length); + } + gids[0] = UserHandle.getSharedAppGid(UserHandle.getAppId(uid)); + } + if (mFactoryTest != SystemServer.FACTORY_TEST_OFF) { + if (mFactoryTest == SystemServer.FACTORY_TEST_LOW_LEVEL + && mTopComponent != null + && app.processName.equals(mTopComponent.getPackageName())) { + uid = 0; + } + if (mFactoryTest == SystemServer.FACTORY_TEST_HIGH_LEVEL + && (app.info.flags&ApplicationInfo.FLAG_FACTORY_TEST) != 0) { + uid = 0; + } + } + int debugFlags = 0; + if ((app.info.flags & ApplicationInfo.FLAG_DEBUGGABLE) != 0) { + debugFlags |= Zygote.DEBUG_ENABLE_DEBUGGER; + // Also turn on CheckJNI for debuggable apps. It's quite + // awkward to turn on otherwise. + debugFlags |= Zygote.DEBUG_ENABLE_CHECKJNI; + } + // Run the app in safe mode if its manifest requests so or the + // system is booted in safe mode. + if ((app.info.flags & ApplicationInfo.FLAG_VM_SAFE_MODE) != 0 || + Zygote.systemInSafeMode == true) { + debugFlags |= Zygote.DEBUG_ENABLE_SAFEMODE; + } + if ("1".equals(SystemProperties.get("debug.checkjni"))) { + debugFlags |= Zygote.DEBUG_ENABLE_CHECKJNI; + } + if ("1".equals(SystemProperties.get("debug.jni.logging"))) { + debugFlags |= Zygote.DEBUG_ENABLE_JNI_LOGGING; + } + if ("1".equals(SystemProperties.get("debug.assert"))) { + debugFlags |= Zygote.DEBUG_ENABLE_ASSERT; + } + + // Start the process. It will either succeed and return a result containing + // the PID of the new process, or else throw a RuntimeException. + Process.ProcessStartResult startResult = Process.start("android.app.ActivityThread", + app.processName, uid, uid, gids, debugFlags, mountExternal, + app.info.targetSdkVersion, app.info.seinfo, null); + + BatteryStatsImpl bs = mBatteryStatsService.getActiveStatistics(); + synchronized (bs) { + if (bs.isOnBattery()) { + bs.getProcessStatsLocked(app.uid, app.processName).incStartsLocked(); + } + } + + EventLog.writeEvent(EventLogTags.AM_PROC_START, + UserHandle.getUserId(uid), startResult.pid, uid, + app.processName, hostingType, + hostingNameStr != null ? hostingNameStr : ""); + + if (app.persistent) { + Watchdog.getInstance().processStarted(app.processName, startResult.pid); + } + + StringBuilder buf = mStringBuilder; + buf.setLength(0); + buf.append("Start proc "); + buf.append(app.processName); + buf.append(" for "); + buf.append(hostingType); + if (hostingNameStr != null) { + buf.append(" "); + buf.append(hostingNameStr); + } + buf.append(": pid="); + buf.append(startResult.pid); + buf.append(" uid="); + buf.append(uid); + buf.append(" gids={"); + if (gids != null) { + for (int gi=0; gi<gids.length; gi++) { + if (gi != 0) buf.append(", "); + buf.append(gids[gi]); + + } + } + buf.append("}"); + Slog.i(TAG, buf.toString()); + app.setPid(startResult.pid); + app.usingWrapper = startResult.usingWrapper; + app.removed = false; + synchronized (mPidsSelfLocked) { + this.mPidsSelfLocked.put(startResult.pid, app); + Message msg = mHandler.obtainMessage(PROC_START_TIMEOUT_MSG); + msg.obj = app; + mHandler.sendMessageDelayed(msg, startResult.usingWrapper + ? PROC_START_TIMEOUT_WITH_WRAPPER : PROC_START_TIMEOUT); + } + } catch (RuntimeException e) { + // XXX do better error recovery. + app.setPid(0); + Slog.e(TAG, "Failure starting process " + app.processName, e); + } + } + + void updateUsageStats(ActivityRecord component, boolean resumed) { + if (DEBUG_SWITCH) Slog.d(TAG, "updateUsageStats: comp=" + component + "res=" + resumed); + final BatteryStatsImpl stats = mBatteryStatsService.getActiveStatistics(); + if (resumed) { + mUsageStatsService.noteResumeComponent(component.realActivity); + synchronized (stats) { + stats.noteActivityResumedLocked(component.app.uid); + } + } else { + mUsageStatsService.notePauseComponent(component.realActivity); + synchronized (stats) { + stats.noteActivityPausedLocked(component.app.uid); + } + } + } + + Intent getHomeIntent() { + Intent intent = new Intent(mTopAction, mTopData != null ? Uri.parse(mTopData) : null); + intent.setComponent(mTopComponent); + if (mFactoryTest != SystemServer.FACTORY_TEST_LOW_LEVEL) { + intent.addCategory(Intent.CATEGORY_HOME); + } + return intent; + } + + boolean startHomeActivityLocked(int userId) { + if (mFactoryTest == SystemServer.FACTORY_TEST_LOW_LEVEL + && mTopAction == null) { + // We are running in factory test mode, but unable to find + // the factory test app, so just sit around displaying the + // error message and don't try to start anything. + return false; + } + Intent intent = getHomeIntent(); + ActivityInfo aInfo = + resolveActivityInfo(intent, STOCK_PM_FLAGS, userId); + if (aInfo != null) { + intent.setComponent(new ComponentName( + aInfo.applicationInfo.packageName, aInfo.name)); + // Don't do this if the home app is currently being + // instrumented. + aInfo = new ActivityInfo(aInfo); + aInfo.applicationInfo = getAppInfoForUser(aInfo.applicationInfo, userId); + ProcessRecord app = getProcessRecordLocked(aInfo.processName, + aInfo.applicationInfo.uid, true); + if (app == null || app.instrumentationClass == null) { + intent.setFlags(intent.getFlags() | Intent.FLAG_ACTIVITY_NEW_TASK); + mStackSupervisor.startHomeActivity(intent, aInfo); + } + } + + return true; + } + + private ActivityInfo resolveActivityInfo(Intent intent, int flags, int userId) { + ActivityInfo ai = null; + ComponentName comp = intent.getComponent(); + try { + if (comp != null) { + ai = AppGlobals.getPackageManager().getActivityInfo(comp, flags, userId); + } else { + ResolveInfo info = AppGlobals.getPackageManager().resolveIntent( + intent, + intent.resolveTypeIfNeeded(mContext.getContentResolver()), + flags, userId); + + if (info != null) { + ai = info.activityInfo; + } + } + } catch (RemoteException e) { + // ignore + } + + return ai; + } + + /** + * Starts the "new version setup screen" if appropriate. + */ + void startSetupActivityLocked() { + // Only do this once per boot. + if (mCheckedForSetup) { + return; + } + + // We will show this screen if the current one is a different + // version than the last one shown, and we are not running in + // low-level factory test mode. + final ContentResolver resolver = mContext.getContentResolver(); + if (mFactoryTest != SystemServer.FACTORY_TEST_LOW_LEVEL && + Settings.Global.getInt(resolver, + Settings.Global.DEVICE_PROVISIONED, 0) != 0) { + mCheckedForSetup = true; + + // See if we should be showing the platform update setup UI. + Intent intent = new Intent(Intent.ACTION_UPGRADE_SETUP); + List<ResolveInfo> ris = mSelf.mContext.getPackageManager() + .queryIntentActivities(intent, PackageManager.GET_META_DATA); + + // We don't allow third party apps to replace this. + ResolveInfo ri = null; + for (int i=0; ris != null && i<ris.size(); i++) { + if ((ris.get(i).activityInfo.applicationInfo.flags + & ApplicationInfo.FLAG_SYSTEM) != 0) { + ri = ris.get(i); + break; + } + } + + if (ri != null) { + String vers = ri.activityInfo.metaData != null + ? ri.activityInfo.metaData.getString(Intent.METADATA_SETUP_VERSION) + : null; + if (vers == null && ri.activityInfo.applicationInfo.metaData != null) { + vers = ri.activityInfo.applicationInfo.metaData.getString( + Intent.METADATA_SETUP_VERSION); + } + String lastVers = Settings.Secure.getString( + resolver, Settings.Secure.LAST_SETUP_SHOWN); + if (vers != null && !vers.equals(lastVers)) { + intent.setFlags(Intent.FLAG_ACTIVITY_NEW_TASK); + intent.setComponent(new ComponentName( + ri.activityInfo.packageName, ri.activityInfo.name)); + mStackSupervisor.startActivityLocked(null, intent, null, ri.activityInfo, + null, null, 0, 0, 0, null, 0, null, false, null); + } + } + } + } + + CompatibilityInfo compatibilityInfoForPackageLocked(ApplicationInfo ai) { + return mCompatModePackages.compatibilityInfoForPackageLocked(ai); + } + + void enforceNotIsolatedCaller(String caller) { + if (UserHandle.isIsolated(Binder.getCallingUid())) { + throw new SecurityException("Isolated process not allowed to call " + caller); + } + } + + @Override + public int getFrontActivityScreenCompatMode() { + enforceNotIsolatedCaller("getFrontActivityScreenCompatMode"); + synchronized (this) { + return mCompatModePackages.getFrontActivityScreenCompatModeLocked(); + } + } + + @Override + public void setFrontActivityScreenCompatMode(int mode) { + enforceCallingPermission(android.Manifest.permission.SET_SCREEN_COMPATIBILITY, + "setFrontActivityScreenCompatMode"); + synchronized (this) { + mCompatModePackages.setFrontActivityScreenCompatModeLocked(mode); + } + } + + @Override + public int getPackageScreenCompatMode(String packageName) { + enforceNotIsolatedCaller("getPackageScreenCompatMode"); + synchronized (this) { + return mCompatModePackages.getPackageScreenCompatModeLocked(packageName); + } + } + + @Override + public void setPackageScreenCompatMode(String packageName, int mode) { + enforceCallingPermission(android.Manifest.permission.SET_SCREEN_COMPATIBILITY, + "setPackageScreenCompatMode"); + synchronized (this) { + mCompatModePackages.setPackageScreenCompatModeLocked(packageName, mode); + } + } + + @Override + public boolean getPackageAskScreenCompat(String packageName) { + enforceNotIsolatedCaller("getPackageAskScreenCompat"); + synchronized (this) { + return mCompatModePackages.getPackageAskCompatModeLocked(packageName); + } + } + + @Override + public void setPackageAskScreenCompat(String packageName, boolean ask) { + enforceCallingPermission(android.Manifest.permission.SET_SCREEN_COMPATIBILITY, + "setPackageAskScreenCompat"); + synchronized (this) { + mCompatModePackages.setPackageAskCompatModeLocked(packageName, ask); + } + } + + private void dispatchProcessesChanged() { + int N; + synchronized (this) { + N = mPendingProcessChanges.size(); + if (mActiveProcessChanges.length < N) { + mActiveProcessChanges = new ProcessChangeItem[N]; + } + mPendingProcessChanges.toArray(mActiveProcessChanges); + mAvailProcessChanges.addAll(mPendingProcessChanges); + mPendingProcessChanges.clear(); + if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "*** Delivering " + N + " process changes"); + } + + int i = mProcessObservers.beginBroadcast(); + while (i > 0) { + i--; + final IProcessObserver observer = mProcessObservers.getBroadcastItem(i); + if (observer != null) { + try { + for (int j=0; j<N; j++) { + ProcessChangeItem item = mActiveProcessChanges[j]; + if ((item.changes&ProcessChangeItem.CHANGE_ACTIVITIES) != 0) { + if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "ACTIVITIES CHANGED pid=" + + item.pid + " uid=" + item.uid + ": " + + item.foregroundActivities); + observer.onForegroundActivitiesChanged(item.pid, item.uid, + item.foregroundActivities); + } + if ((item.changes&ProcessChangeItem.CHANGE_IMPORTANCE) != 0) { + if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "IMPORTANCE CHANGED pid=" + + item.pid + " uid=" + item.uid + ": " + item.importance); + observer.onImportanceChanged(item.pid, item.uid, + item.importance); + } + } + } catch (RemoteException e) { + } + } + } + mProcessObservers.finishBroadcast(); + } + + private void dispatchProcessDied(int pid, int uid) { + int i = mProcessObservers.beginBroadcast(); + while (i > 0) { + i--; + final IProcessObserver observer = mProcessObservers.getBroadcastItem(i); + if (observer != null) { + try { + observer.onProcessDied(pid, uid); + } catch (RemoteException e) { + } + } + } + mProcessObservers.finishBroadcast(); + } + + final void doPendingActivityLaunchesLocked(boolean doResume) { + final int N = mPendingActivityLaunches.size(); + if (N <= 0) { + return; + } + for (int i=0; i<N; i++) { + PendingActivityLaunch pal = mPendingActivityLaunches.get(i); + mStackSupervisor.startActivityUncheckedLocked(pal.r, pal.sourceRecord, pal.startFlags, + doResume && i == (N-1), null); + } + mPendingActivityLaunches.clear(); + } + + @Override + public final int startActivity(IApplicationThread caller, String callingPackage, + Intent intent, String resolvedType, IBinder resultTo, + String resultWho, int requestCode, int startFlags, + String profileFile, ParcelFileDescriptor profileFd, Bundle options) { + return startActivityAsUser(caller, callingPackage, intent, resolvedType, resultTo, + resultWho, requestCode, + startFlags, profileFile, profileFd, options, UserHandle.getCallingUserId()); + } + + @Override + public final int startActivityAsUser(IApplicationThread caller, String callingPackage, + Intent intent, String resolvedType, IBinder resultTo, + String resultWho, int requestCode, int startFlags, + String profileFile, ParcelFileDescriptor profileFd, Bundle options, int userId) { + enforceNotIsolatedCaller("startActivity"); + userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(), userId, + false, true, "startActivity", null); + // TODO: Switch to user app stacks here. + return mStackSupervisor.startActivityMayWait(caller, -1, callingPackage, intent, resolvedType, + resultTo, resultWho, requestCode, startFlags, profileFile, profileFd, + null, null, options, userId); + } + + @Override + public final WaitResult startActivityAndWait(IApplicationThread caller, String callingPackage, + Intent intent, String resolvedType, IBinder resultTo, + String resultWho, int requestCode, int startFlags, String profileFile, + ParcelFileDescriptor profileFd, Bundle options, int userId) { + enforceNotIsolatedCaller("startActivityAndWait"); + userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(), userId, + false, true, "startActivityAndWait", null); + WaitResult res = new WaitResult(); + // TODO: Switch to user app stacks here. + mStackSupervisor.startActivityMayWait(caller, -1, callingPackage, intent, resolvedType, + resultTo, resultWho, requestCode, startFlags, profileFile, profileFd, + res, null, options, UserHandle.getCallingUserId()); + return res; + } + + @Override + public final int startActivityWithConfig(IApplicationThread caller, String callingPackage, + Intent intent, String resolvedType, IBinder resultTo, + String resultWho, int requestCode, int startFlags, Configuration config, + Bundle options, int userId) { + enforceNotIsolatedCaller("startActivityWithConfig"); + userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(), userId, + false, true, "startActivityWithConfig", null); + // TODO: Switch to user app stacks here. + int ret = mStackSupervisor.startActivityMayWait(caller, -1, callingPackage, intent, + resolvedType, resultTo, resultWho, requestCode, startFlags, + null, null, null, config, options, userId); + return ret; + } + + @Override + public int startActivityIntentSender(IApplicationThread caller, + IntentSender intent, Intent fillInIntent, String resolvedType, + IBinder resultTo, String resultWho, int requestCode, + int flagsMask, int flagsValues, Bundle options) { + enforceNotIsolatedCaller("startActivityIntentSender"); + // Refuse possible leaked file descriptors + if (fillInIntent != null && fillInIntent.hasFileDescriptors()) { + throw new IllegalArgumentException("File descriptors passed in Intent"); + } + + IIntentSender sender = intent.getTarget(); + if (!(sender instanceof PendingIntentRecord)) { + throw new IllegalArgumentException("Bad PendingIntent object"); + } + + PendingIntentRecord pir = (PendingIntentRecord)sender; + + synchronized (this) { + // If this is coming from the currently resumed activity, it is + // effectively saying that app switches are allowed at this point. + final ActivityStack stack = getFocusedStack(); + if (stack.mResumedActivity != null && + stack.mResumedActivity.info.applicationInfo.uid == Binder.getCallingUid()) { + mAppSwitchesAllowedTime = 0; + } + } + int ret = pir.sendInner(0, fillInIntent, resolvedType, null, null, + resultTo, resultWho, requestCode, flagsMask, flagsValues, options); + return ret; + } + + @Override + public boolean startNextMatchingActivity(IBinder callingActivity, + Intent intent, Bundle options) { + // Refuse possible leaked file descriptors + if (intent != null && intent.hasFileDescriptors() == true) { + throw new IllegalArgumentException("File descriptors passed in Intent"); + } + + synchronized (this) { + final ActivityRecord r = ActivityRecord.isInStackLocked(callingActivity); + if (r == null) { + ActivityOptions.abort(options); + return false; + } + if (r.app == null || r.app.thread == null) { + // The caller is not running... d'oh! + ActivityOptions.abort(options); + return false; + } + intent = new Intent(intent); + // The caller is not allowed to change the data. + intent.setDataAndType(r.intent.getData(), r.intent.getType()); + // And we are resetting to find the next component... + intent.setComponent(null); + + final boolean debug = ((intent.getFlags() & Intent.FLAG_DEBUG_LOG_RESOLUTION) != 0); + + ActivityInfo aInfo = null; + try { + List<ResolveInfo> resolves = + AppGlobals.getPackageManager().queryIntentActivities( + intent, r.resolvedType, + PackageManager.MATCH_DEFAULT_ONLY | STOCK_PM_FLAGS, + UserHandle.getCallingUserId()); + + // Look for the original activity in the list... + final int N = resolves != null ? resolves.size() : 0; + for (int i=0; i<N; i++) { + ResolveInfo rInfo = resolves.get(i); + if (rInfo.activityInfo.packageName.equals(r.packageName) + && rInfo.activityInfo.name.equals(r.info.name)) { + // We found the current one... the next matching is + // after it. + i++; + if (i<N) { + aInfo = resolves.get(i).activityInfo; + } + if (debug) { + Slog.v(TAG, "Next matching activity: found current " + r.packageName + + "/" + r.info.name); + Slog.v(TAG, "Next matching activity: next is " + aInfo.packageName + + "/" + aInfo.name); + } + break; + } + } + } catch (RemoteException e) { + } + + if (aInfo == null) { + // Nobody who is next! + ActivityOptions.abort(options); + if (debug) Slog.d(TAG, "Next matching activity: nothing found"); + return false; + } + + intent.setComponent(new ComponentName( + aInfo.applicationInfo.packageName, aInfo.name)); + intent.setFlags(intent.getFlags()&~( + Intent.FLAG_ACTIVITY_FORWARD_RESULT| + Intent.FLAG_ACTIVITY_CLEAR_TOP| + Intent.FLAG_ACTIVITY_MULTIPLE_TASK| + Intent.FLAG_ACTIVITY_NEW_TASK)); + + // Okay now we need to start the new activity, replacing the + // currently running activity. This is a little tricky because + // we want to start the new one as if the current one is finished, + // but not finish the current one first so that there is no flicker. + // And thus... + final boolean wasFinishing = r.finishing; + r.finishing = true; + + // Propagate reply information over to the new activity. + final ActivityRecord resultTo = r.resultTo; + final String resultWho = r.resultWho; + final int requestCode = r.requestCode; + r.resultTo = null; + if (resultTo != null) { + resultTo.removeResultsLocked(r, resultWho, requestCode); + } + + final long origId = Binder.clearCallingIdentity(); + int res = mStackSupervisor.startActivityLocked(r.app.thread, intent, + r.resolvedType, aInfo, resultTo != null ? resultTo.appToken : null, + resultWho, requestCode, -1, r.launchedFromUid, r.launchedFromPackage, 0, + options, false, null); + Binder.restoreCallingIdentity(origId); + + r.finishing = wasFinishing; + if (res != ActivityManager.START_SUCCESS) { + return false; + } + return true; + } + } + + final int startActivityInPackage(int uid, String callingPackage, + Intent intent, String resolvedType, IBinder resultTo, + String resultWho, int requestCode, int startFlags, Bundle options, int userId) { + + userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(), userId, + false, true, "startActivityInPackage", null); + + // TODO: Switch to user app stacks here. + int ret = mStackSupervisor.startActivityMayWait(null, uid, callingPackage, intent, resolvedType, + resultTo, resultWho, requestCode, startFlags, + null, null, null, null, options, userId); + return ret; + } + + @Override + public final int startActivities(IApplicationThread caller, String callingPackage, + Intent[] intents, String[] resolvedTypes, IBinder resultTo, Bundle options, + int userId) { + enforceNotIsolatedCaller("startActivities"); + userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(), userId, + false, true, "startActivity", null); + // TODO: Switch to user app stacks here. + int ret = mStackSupervisor.startActivities(caller, -1, callingPackage, intents, + resolvedTypes, resultTo, options, userId); + return ret; + } + + final int startActivitiesInPackage(int uid, String callingPackage, + Intent[] intents, String[] resolvedTypes, IBinder resultTo, + Bundle options, int userId) { + + userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(), userId, + false, true, "startActivityInPackage", null); + // TODO: Switch to user app stacks here. + int ret = mStackSupervisor.startActivities(null, uid, callingPackage, intents, resolvedTypes, + resultTo, options, userId); + return ret; + } + + final void addRecentTaskLocked(TaskRecord task) { + int N = mRecentTasks.size(); + // Quick case: check if the top-most recent task is the same. + if (N > 0 && mRecentTasks.get(0) == task) { + return; + } + // Remove any existing entries that are the same kind of task. + for (int i=0; i<N; i++) { + TaskRecord tr = mRecentTasks.get(i); + if (task.userId == tr.userId + && ((task.affinity != null && task.affinity.equals(tr.affinity)) + || (task.intent != null && task.intent.filterEquals(tr.intent)))) { + tr.disposeThumbnail(); + mRecentTasks.remove(i); + i--; + N--; + if (task.intent == null) { + // If the new recent task we are adding is not fully + // specified, then replace it with the existing recent task. + task = tr; + } + } + } + if (N >= MAX_RECENT_TASKS) { + mRecentTasks.remove(N-1).disposeThumbnail(); + } + mRecentTasks.add(0, task); + } + + @Override + public void reportActivityFullyDrawn(IBinder token) { + synchronized (this) { + ActivityRecord r = ActivityRecord.isInStackLocked(token); + if (r == null) { + return; + } + r.reportFullyDrawnLocked(); + } + } + + @Override + public void setRequestedOrientation(IBinder token, int requestedOrientation) { + synchronized (this) { + ActivityRecord r = ActivityRecord.isInStackLocked(token); + if (r == null) { + return; + } + final long origId = Binder.clearCallingIdentity(); + mWindowManager.setAppOrientation(r.appToken, requestedOrientation); + Configuration config = mWindowManager.updateOrientationFromAppTokens( + mConfiguration, r.mayFreezeScreenLocked(r.app) ? r.appToken : null); + if (config != null) { + r.frozenBeforeDestroy = true; + if (!updateConfigurationLocked(config, r, false, false)) { + mStackSupervisor.resumeTopActivitiesLocked(); + } + } + Binder.restoreCallingIdentity(origId); + } + } + + @Override + public int getRequestedOrientation(IBinder token) { + synchronized (this) { + ActivityRecord r = ActivityRecord.isInStackLocked(token); + if (r == null) { + return ActivityInfo.SCREEN_ORIENTATION_UNSPECIFIED; + } + return mWindowManager.getAppOrientation(r.appToken); + } + } + + /** + * This is the internal entry point for handling Activity.finish(). + * + * @param token The Binder token referencing the Activity we want to finish. + * @param resultCode Result code, if any, from this Activity. + * @param resultData Result data (Intent), if any, from this Activity. + * + * @return Returns true if the activity successfully finished, or false if it is still running. + */ + @Override + public final boolean finishActivity(IBinder token, int resultCode, Intent resultData) { + // Refuse possible leaked file descriptors + if (resultData != null && resultData.hasFileDescriptors() == true) { + throw new IllegalArgumentException("File descriptors passed in Intent"); + } + + synchronized(this) { + ActivityRecord r = ActivityRecord.isInStackLocked(token); + if (r == null) { + return true; + } + if (mController != null) { + // Find the first activity that is not finishing. + ActivityRecord next = r.task.stack.topRunningActivityLocked(token, 0); + if (next != null) { + // ask watcher if this is allowed + boolean resumeOK = true; + try { + resumeOK = mController.activityResuming(next.packageName); + } catch (RemoteException e) { + mController = null; + Watchdog.getInstance().setActivityController(null); + } + + if (!resumeOK) { + return false; + } + } + } + final long origId = Binder.clearCallingIdentity(); + boolean res = r.task.stack.requestFinishActivityLocked(token, resultCode, + resultData, "app-request", true); + Binder.restoreCallingIdentity(origId); + return res; + } + } + + @Override + public final void finishHeavyWeightApp() { + if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES) + != PackageManager.PERMISSION_GRANTED) { + String msg = "Permission Denial: finishHeavyWeightApp() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " requires " + android.Manifest.permission.FORCE_STOP_PACKAGES; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + + synchronized(this) { + if (mHeavyWeightProcess == null) { + return; + } + + ArrayList<ActivityRecord> activities = new ArrayList<ActivityRecord>( + mHeavyWeightProcess.activities); + for (int i=0; i<activities.size(); i++) { + ActivityRecord r = activities.get(i); + if (!r.finishing) { + r.task.stack.finishActivityLocked(r, Activity.RESULT_CANCELED, + null, "finish-heavy", true); + } + } + + mHandler.sendMessage(mHandler.obtainMessage(CANCEL_HEAVY_NOTIFICATION_MSG, + mHeavyWeightProcess.userId, 0)); + mHeavyWeightProcess = null; + } + } + + @Override + public void crashApplication(int uid, int initialPid, String packageName, + String message) { + if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES) + != PackageManager.PERMISSION_GRANTED) { + String msg = "Permission Denial: crashApplication() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " requires " + android.Manifest.permission.FORCE_STOP_PACKAGES; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + + synchronized(this) { + ProcessRecord proc = null; + + // Figure out which process to kill. We don't trust that initialPid + // still has any relation to current pids, so must scan through the + // list. + synchronized (mPidsSelfLocked) { + for (int i=0; i<mPidsSelfLocked.size(); i++) { + ProcessRecord p = mPidsSelfLocked.valueAt(i); + if (p.uid != uid) { + continue; + } + if (p.pid == initialPid) { + proc = p; + break; + } + if (p.pkgList.containsKey(packageName)) { + proc = p; + } + } + } + + if (proc == null) { + Slog.w(TAG, "crashApplication: nothing for uid=" + uid + + " initialPid=" + initialPid + + " packageName=" + packageName); + return; + } + + if (proc.thread != null) { + if (proc.pid == Process.myPid()) { + Log.w(TAG, "crashApplication: trying to crash self!"); + return; + } + long ident = Binder.clearCallingIdentity(); + try { + proc.thread.scheduleCrash(message); + } catch (RemoteException e) { + } + Binder.restoreCallingIdentity(ident); + } + } + } + + @Override + public final void finishSubActivity(IBinder token, String resultWho, + int requestCode) { + synchronized(this) { + final long origId = Binder.clearCallingIdentity(); + ActivityRecord r = ActivityRecord.isInStackLocked(token); + if (r != null) { + r.task.stack.finishSubActivityLocked(r, resultWho, requestCode); + } + Binder.restoreCallingIdentity(origId); + } + } + + @Override + public boolean finishActivityAffinity(IBinder token) { + synchronized(this) { + final long origId = Binder.clearCallingIdentity(); + ActivityRecord r = ActivityRecord.isInStackLocked(token); + boolean res = false; + if (r != null) { + res = r.task.stack.finishActivityAffinityLocked(r); + } + Binder.restoreCallingIdentity(origId); + return res; + } + } + + @Override + public boolean willActivityBeVisible(IBinder token) { + synchronized(this) { + ActivityStack stack = ActivityRecord.getStackLocked(token); + if (stack != null) { + return stack.willActivityBeVisibleLocked(token); + } + return false; + } + } + + @Override + public void overridePendingTransition(IBinder token, String packageName, + int enterAnim, int exitAnim) { + synchronized(this) { + ActivityRecord self = ActivityRecord.isInStackLocked(token); + if (self == null) { + return; + } + + final long origId = Binder.clearCallingIdentity(); + + if (self.state == ActivityState.RESUMED + || self.state == ActivityState.PAUSING) { + mWindowManager.overridePendingAppTransition(packageName, + enterAnim, exitAnim, null); + } + + Binder.restoreCallingIdentity(origId); + } + } + + /** + * Main function for removing an existing process from the activity manager + * as a result of that process going away. Clears out all connections + * to the process. + */ + private final void handleAppDiedLocked(ProcessRecord app, + boolean restarting, boolean allowRestart) { + cleanUpApplicationRecordLocked(app, restarting, allowRestart, -1); + if (!restarting) { + removeLruProcessLocked(app); + } + + if (mProfileProc == app) { + clearProfilerLocked(); + } + + // Remove this application's activities from active lists. + boolean hasVisibleActivities = mStackSupervisor.handleAppDiedLocked(app); + + app.activities.clear(); + + if (app.instrumentationClass != null) { + Slog.w(TAG, "Crash of app " + app.processName + + " running instrumentation " + app.instrumentationClass); + Bundle info = new Bundle(); + info.putString("shortMsg", "Process crashed."); + finishInstrumentationLocked(app, Activity.RESULT_CANCELED, info); + } + + if (!restarting) { + if (!mStackSupervisor.resumeTopActivitiesLocked()) { + // If there was nothing to resume, and we are not already + // restarting this process, but there is a visible activity that + // is hosted by the process... then make sure all visible + // activities are running, taking care of restarting this + // process. + if (hasVisibleActivities) { + mStackSupervisor.ensureActivitiesVisibleLocked(null, 0); + } + } + } + } + + private final int getLRURecordIndexForAppLocked(IApplicationThread thread) { + IBinder threadBinder = thread.asBinder(); + // Find the application record. + for (int i=mLruProcesses.size()-1; i>=0; i--) { + ProcessRecord rec = mLruProcesses.get(i); + if (rec.thread != null && rec.thread.asBinder() == threadBinder) { + return i; + } + } + return -1; + } + + final ProcessRecord getRecordForAppLocked( + IApplicationThread thread) { + if (thread == null) { + return null; + } + + int appIndex = getLRURecordIndexForAppLocked(thread); + return appIndex >= 0 ? mLruProcesses.get(appIndex) : null; + } + + final void doLowMemReportIfNeededLocked(ProcessRecord dyingProc) { + // If there are no longer any background processes running, + // and the app that died was not running instrumentation, + // then tell everyone we are now low on memory. + boolean haveBg = false; + for (int i=mLruProcesses.size()-1; i>=0; i--) { + ProcessRecord rec = mLruProcesses.get(i); + if (rec.thread != null + && rec.setProcState >= ActivityManager.PROCESS_STATE_CACHED_ACTIVITY) { + haveBg = true; + break; + } + } + + if (!haveBg) { + boolean doReport = "1".equals(SystemProperties.get(SYSTEM_DEBUGGABLE, "0")); + if (doReport) { + long now = SystemClock.uptimeMillis(); + if (now < (mLastMemUsageReportTime+5*60*1000)) { + doReport = false; + } else { + mLastMemUsageReportTime = now; + } + } + final ArrayList<ProcessMemInfo> memInfos + = doReport ? new ArrayList<ProcessMemInfo>(mLruProcesses.size()) : null; + EventLog.writeEvent(EventLogTags.AM_LOW_MEMORY, mLruProcesses.size()); + long now = SystemClock.uptimeMillis(); + for (int i=mLruProcesses.size()-1; i>=0; i--) { + ProcessRecord rec = mLruProcesses.get(i); + if (rec == dyingProc || rec.thread == null) { + continue; + } + if (doReport) { + memInfos.add(new ProcessMemInfo(rec.processName, rec.pid, rec.setAdj, + rec.setProcState, rec.adjType, rec.makeAdjReason())); + } + if ((rec.lastLowMemory+GC_MIN_INTERVAL) <= now) { + // The low memory report is overriding any current + // state for a GC request. Make sure to do + // heavy/important/visible/foreground processes first. + if (rec.setAdj <= ProcessList.HEAVY_WEIGHT_APP_ADJ) { + rec.lastRequestedGc = 0; + } else { + rec.lastRequestedGc = rec.lastLowMemory; + } + rec.reportLowMemory = true; + rec.lastLowMemory = now; + mProcessesToGc.remove(rec); + addProcessToGcListLocked(rec); + } + } + if (doReport) { + Message msg = mHandler.obtainMessage(REPORT_MEM_USAGE_MSG, memInfos); + mHandler.sendMessage(msg); + } + scheduleAppGcsLocked(); + } + } + + final void appDiedLocked(ProcessRecord app, int pid, + IApplicationThread thread) { + + BatteryStatsImpl stats = mBatteryStatsService.getActiveStatistics(); + synchronized (stats) { + stats.noteProcessDiedLocked(app.info.uid, pid); + } + + // Clean up already done if the process has been re-started. + if (app.pid == pid && app.thread != null && + app.thread.asBinder() == thread.asBinder()) { + boolean doLowMem = app.instrumentationClass == null; + boolean doOomAdj = doLowMem; + if (!app.killedByAm) { + Slog.i(TAG, "Process " + app.processName + " (pid " + pid + + ") has died."); + mAllowLowerMemLevel = true; + } else { + // Note that we always want to do oom adj to update our state with the + // new number of procs. + mAllowLowerMemLevel = false; + doLowMem = false; + } + EventLog.writeEvent(EventLogTags.AM_PROC_DIED, app.userId, app.pid, app.processName); + if (DEBUG_CLEANUP) Slog.v( + TAG, "Dying app: " + app + ", pid: " + pid + + ", thread: " + thread.asBinder()); + handleAppDiedLocked(app, false, true); + + if (doOomAdj) { + updateOomAdjLocked(); + } + if (doLowMem) { + doLowMemReportIfNeededLocked(app); + } + } else if (app.pid != pid) { + // A new process has already been started. + Slog.i(TAG, "Process " + app.processName + " (pid " + pid + + ") has died and restarted (pid " + app.pid + ")."); + EventLog.writeEvent(EventLogTags.AM_PROC_DIED, app.userId, app.pid, app.processName); + } else if (DEBUG_PROCESSES) { + Slog.d(TAG, "Received spurious death notification for thread " + + thread.asBinder()); + } + } + + /** + * If a stack trace dump file is configured, dump process stack traces. + * @param clearTraces causes the dump file to be erased prior to the new + * traces being written, if true; when false, the new traces will be + * appended to any existing file content. + * @param firstPids of dalvik VM processes to dump stack traces for first + * @param lastPids of dalvik VM processes to dump stack traces for last + * @param nativeProcs optional list of native process names to dump stack crawls + * @return file containing stack traces, or null if no dump file is configured + */ + public static File dumpStackTraces(boolean clearTraces, ArrayList<Integer> firstPids, + ProcessCpuTracker processCpuTracker, SparseArray<Boolean> lastPids, String[] nativeProcs) { + String tracesPath = SystemProperties.get("dalvik.vm.stack-trace-file", null); + if (tracesPath == null || tracesPath.length() == 0) { + return null; + } + + File tracesFile = new File(tracesPath); + try { + File tracesDir = tracesFile.getParentFile(); + if (!tracesDir.exists()) { + tracesFile.mkdirs(); + if (!SELinux.restorecon(tracesDir)) { + return null; + } + } + FileUtils.setPermissions(tracesDir.getPath(), 0775, -1, -1); // drwxrwxr-x + + if (clearTraces && tracesFile.exists()) tracesFile.delete(); + tracesFile.createNewFile(); + FileUtils.setPermissions(tracesFile.getPath(), 0666, -1, -1); // -rw-rw-rw- + } catch (IOException e) { + Slog.w(TAG, "Unable to prepare ANR traces file: " + tracesPath, e); + return null; + } + + dumpStackTraces(tracesPath, firstPids, processCpuTracker, lastPids, nativeProcs); + return tracesFile; + } + + private static void dumpStackTraces(String tracesPath, ArrayList<Integer> firstPids, + ProcessCpuTracker processCpuTracker, SparseArray<Boolean> lastPids, String[] nativeProcs) { + // Use a FileObserver to detect when traces finish writing. + // The order of traces is considered important to maintain for legibility. + FileObserver observer = new FileObserver(tracesPath, FileObserver.CLOSE_WRITE) { + @Override + public synchronized void onEvent(int event, String path) { notify(); } + }; + + try { + observer.startWatching(); + + // First collect all of the stacks of the most important pids. + if (firstPids != null) { + try { + int num = firstPids.size(); + for (int i = 0; i < num; i++) { + synchronized (observer) { + Process.sendSignal(firstPids.get(i), Process.SIGNAL_QUIT); + observer.wait(200); // Wait for write-close, give up after 200msec + } + } + } catch (InterruptedException e) { + Log.wtf(TAG, e); + } + } + + // Next collect the stacks of the native pids + if (nativeProcs != null) { + int[] pids = Process.getPidsForCommands(nativeProcs); + if (pids != null) { + for (int pid : pids) { + Debug.dumpNativeBacktraceToFile(pid, tracesPath); + } + } + } + + // Lastly, measure CPU usage. + if (processCpuTracker != null) { + processCpuTracker.init(); + System.gc(); + processCpuTracker.update(); + try { + synchronized (processCpuTracker) { + processCpuTracker.wait(500); // measure over 1/2 second. + } + } catch (InterruptedException e) { + } + processCpuTracker.update(); + + // We'll take the stack crawls of just the top apps using CPU. + final int N = processCpuTracker.countWorkingStats(); + int numProcs = 0; + for (int i=0; i<N && numProcs<5; i++) { + ProcessCpuTracker.Stats stats = processCpuTracker.getWorkingStats(i); + if (lastPids.indexOfKey(stats.pid) >= 0) { + numProcs++; + try { + synchronized (observer) { + Process.sendSignal(stats.pid, Process.SIGNAL_QUIT); + observer.wait(200); // Wait for write-close, give up after 200msec + } + } catch (InterruptedException e) { + Log.wtf(TAG, e); + } + + } + } + } + } finally { + observer.stopWatching(); + } + } + + final void logAppTooSlow(ProcessRecord app, long startTime, String msg) { + if (true || IS_USER_BUILD) { + return; + } + String tracesPath = SystemProperties.get("dalvik.vm.stack-trace-file", null); + if (tracesPath == null || tracesPath.length() == 0) { + return; + } + + StrictMode.ThreadPolicy oldPolicy = StrictMode.allowThreadDiskReads(); + StrictMode.allowThreadDiskWrites(); + try { + final File tracesFile = new File(tracesPath); + final File tracesDir = tracesFile.getParentFile(); + final File tracesTmp = new File(tracesDir, "__tmp__"); + try { + if (!tracesDir.exists()) { + tracesFile.mkdirs(); + if (!SELinux.restorecon(tracesDir.getPath())) { + return; + } + } + FileUtils.setPermissions(tracesDir.getPath(), 0775, -1, -1); // drwxrwxr-x + + if (tracesFile.exists()) { + tracesTmp.delete(); + tracesFile.renameTo(tracesTmp); + } + StringBuilder sb = new StringBuilder(); + Time tobj = new Time(); + tobj.set(System.currentTimeMillis()); + sb.append(tobj.format("%Y-%m-%d %H:%M:%S")); + sb.append(": "); + TimeUtils.formatDuration(SystemClock.uptimeMillis()-startTime, sb); + sb.append(" since "); + sb.append(msg); + FileOutputStream fos = new FileOutputStream(tracesFile); + fos.write(sb.toString().getBytes()); + if (app == null) { + fos.write("\n*** No application process!".getBytes()); + } + fos.close(); + FileUtils.setPermissions(tracesFile.getPath(), 0666, -1, -1); // -rw-rw-rw- + } catch (IOException e) { + Slog.w(TAG, "Unable to prepare slow app traces file: " + tracesPath, e); + return; + } + + if (app != null) { + ArrayList<Integer> firstPids = new ArrayList<Integer>(); + firstPids.add(app.pid); + dumpStackTraces(tracesPath, firstPids, null, null, null); + } + + File lastTracesFile = null; + File curTracesFile = null; + for (int i=9; i>=0; i--) { + String name = String.format(Locale.US, "slow%02d.txt", i); + curTracesFile = new File(tracesDir, name); + if (curTracesFile.exists()) { + if (lastTracesFile != null) { + curTracesFile.renameTo(lastTracesFile); + } else { + curTracesFile.delete(); + } + } + lastTracesFile = curTracesFile; + } + tracesFile.renameTo(curTracesFile); + if (tracesTmp.exists()) { + tracesTmp.renameTo(tracesFile); + } + } finally { + StrictMode.setThreadPolicy(oldPolicy); + } + } + + final void appNotResponding(ProcessRecord app, ActivityRecord activity, + ActivityRecord parent, boolean aboveSystem, final String annotation) { + ArrayList<Integer> firstPids = new ArrayList<Integer>(5); + SparseArray<Boolean> lastPids = new SparseArray<Boolean>(20); + + if (mController != null) { + try { + // 0 == continue, -1 = kill process immediately + int res = mController.appEarlyNotResponding(app.processName, app.pid, annotation); + if (res < 0 && app.pid != MY_PID) Process.killProcess(app.pid); + } catch (RemoteException e) { + mController = null; + Watchdog.getInstance().setActivityController(null); + } + } + + long anrTime = SystemClock.uptimeMillis(); + if (MONITOR_CPU_USAGE) { + updateCpuStatsNow(); + } + + synchronized (this) { + // PowerManager.reboot() can block for a long time, so ignore ANRs while shutting down. + if (mShuttingDown) { + Slog.i(TAG, "During shutdown skipping ANR: " + app + " " + annotation); + return; + } else if (app.notResponding) { + Slog.i(TAG, "Skipping duplicate ANR: " + app + " " + annotation); + return; + } else if (app.crashing) { + Slog.i(TAG, "Crashing app skipping ANR: " + app + " " + annotation); + return; + } + + // In case we come through here for the same app before completing + // this one, mark as anring now so we will bail out. + app.notResponding = true; + + // Log the ANR to the event log. + EventLog.writeEvent(EventLogTags.AM_ANR, app.userId, app.pid, + app.processName, app.info.flags, annotation); + + // Dump thread traces as quickly as we can, starting with "interesting" processes. + firstPids.add(app.pid); + + int parentPid = app.pid; + if (parent != null && parent.app != null && parent.app.pid > 0) parentPid = parent.app.pid; + if (parentPid != app.pid) firstPids.add(parentPid); + + if (MY_PID != app.pid && MY_PID != parentPid) firstPids.add(MY_PID); + + for (int i = mLruProcesses.size() - 1; i >= 0; i--) { + ProcessRecord r = mLruProcesses.get(i); + if (r != null && r.thread != null) { + int pid = r.pid; + if (pid > 0 && pid != app.pid && pid != parentPid && pid != MY_PID) { + if (r.persistent) { + firstPids.add(pid); + } else { + lastPids.put(pid, Boolean.TRUE); + } + } + } + } + } + + // Log the ANR to the main log. + StringBuilder info = new StringBuilder(); + info.setLength(0); + info.append("ANR in ").append(app.processName); + if (activity != null && activity.shortComponentName != null) { + info.append(" (").append(activity.shortComponentName).append(")"); + } + info.append("\n"); + info.append("PID: ").append(app.pid).append("\n"); + if (annotation != null) { + info.append("Reason: ").append(annotation).append("\n"); + } + if (parent != null && parent != activity) { + info.append("Parent: ").append(parent.shortComponentName).append("\n"); + } + + final ProcessCpuTracker processCpuTracker = new ProcessCpuTracker(true); + + File tracesFile = dumpStackTraces(true, firstPids, processCpuTracker, lastPids, + NATIVE_STACKS_OF_INTEREST); + + String cpuInfo = null; + if (MONITOR_CPU_USAGE) { + updateCpuStatsNow(); + synchronized (mProcessCpuThread) { + cpuInfo = mProcessCpuTracker.printCurrentState(anrTime); + } + info.append(processCpuTracker.printCurrentLoad()); + info.append(cpuInfo); + } + + info.append(processCpuTracker.printCurrentState(anrTime)); + + Slog.e(TAG, info.toString()); + if (tracesFile == null) { + // There is no trace file, so dump (only) the alleged culprit's threads to the log + Process.sendSignal(app.pid, Process.SIGNAL_QUIT); + } + + addErrorToDropBox("anr", app, app.processName, activity, parent, annotation, + cpuInfo, tracesFile, null); + + if (mController != null) { + try { + // 0 == show dialog, 1 = keep waiting, -1 = kill process immediately + int res = mController.appNotResponding(app.processName, app.pid, info.toString()); + if (res != 0) { + if (res < 0 && app.pid != MY_PID) { + Process.killProcess(app.pid); + } else { + synchronized (this) { + mServices.scheduleServiceTimeoutLocked(app); + } + } + return; + } + } catch (RemoteException e) { + mController = null; + Watchdog.getInstance().setActivityController(null); + } + } + + // Unless configured otherwise, swallow ANRs in background processes & kill the process. + boolean showBackground = Settings.Secure.getInt(mContext.getContentResolver(), + Settings.Secure.ANR_SHOW_BACKGROUND, 0) != 0; + + synchronized (this) { + if (!showBackground && !app.isInterestingToUserLocked() && app.pid != MY_PID) { + killUnneededProcessLocked(app, "background ANR"); + return; + } + + // Set the app's notResponding state, and look up the errorReportReceiver + makeAppNotRespondingLocked(app, + activity != null ? activity.shortComponentName : null, + annotation != null ? "ANR " + annotation : "ANR", + info.toString()); + + // Bring up the infamous App Not Responding dialog + Message msg = Message.obtain(); + HashMap<String, Object> map = new HashMap<String, Object>(); + msg.what = SHOW_NOT_RESPONDING_MSG; + msg.obj = map; + msg.arg1 = aboveSystem ? 1 : 0; + map.put("app", app); + if (activity != null) { + map.put("activity", activity); + } + + mHandler.sendMessage(msg); + } + } + + final void showLaunchWarningLocked(final ActivityRecord cur, final ActivityRecord next) { + if (!mLaunchWarningShown) { + mLaunchWarningShown = true; + mHandler.post(new Runnable() { + @Override + public void run() { + synchronized (ActivityManagerService.this) { + final Dialog d = new LaunchWarningWindow(mContext, cur, next); + d.show(); + mHandler.postDelayed(new Runnable() { + @Override + public void run() { + synchronized (ActivityManagerService.this) { + d.dismiss(); + mLaunchWarningShown = false; + } + } + }, 4000); + } + } + }); + } + } + + @Override + public boolean clearApplicationUserData(final String packageName, + final IPackageDataObserver observer, int userId) { + enforceNotIsolatedCaller("clearApplicationUserData"); + int uid = Binder.getCallingUid(); + int pid = Binder.getCallingPid(); + userId = handleIncomingUser(pid, uid, + userId, false, true, "clearApplicationUserData", null); + long callingId = Binder.clearCallingIdentity(); + try { + IPackageManager pm = AppGlobals.getPackageManager(); + int pkgUid = -1; + synchronized(this) { + try { + pkgUid = pm.getPackageUid(packageName, userId); + } catch (RemoteException e) { + } + if (pkgUid == -1) { + Slog.w(TAG, "Invalid packageName: " + packageName); + if (observer != null) { + try { + observer.onRemoveCompleted(packageName, false); + } catch (RemoteException e) { + Slog.i(TAG, "Observer no longer exists."); + } + } + return false; + } + if (uid == pkgUid || checkComponentPermission( + android.Manifest.permission.CLEAR_APP_USER_DATA, + pid, uid, -1, true) + == PackageManager.PERMISSION_GRANTED) { + forceStopPackageLocked(packageName, pkgUid, "clear data"); + } else { + throw new SecurityException("PID " + pid + " does not have permission " + + android.Manifest.permission.CLEAR_APP_USER_DATA + " to clear data" + + " of package " + packageName); + } + } + + try { + // Clear application user data + pm.clearApplicationUserData(packageName, observer, userId); + + // Remove all permissions granted from/to this package + removeUriPermissionsForPackageLocked(packageName, userId, true); + + Intent intent = new Intent(Intent.ACTION_PACKAGE_DATA_CLEARED, + Uri.fromParts("package", packageName, null)); + intent.putExtra(Intent.EXTRA_UID, pkgUid); + broadcastIntentInPackage("android", Process.SYSTEM_UID, intent, + null, null, 0, null, null, null, false, false, userId); + } catch (RemoteException e) { + } + } finally { + Binder.restoreCallingIdentity(callingId); + } + return true; + } + + @Override + public void killBackgroundProcesses(final String packageName, int userId) { + if (checkCallingPermission(android.Manifest.permission.KILL_BACKGROUND_PROCESSES) + != PackageManager.PERMISSION_GRANTED && + checkCallingPermission(android.Manifest.permission.RESTART_PACKAGES) + != PackageManager.PERMISSION_GRANTED) { + String msg = "Permission Denial: killBackgroundProcesses() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " requires " + android.Manifest.permission.KILL_BACKGROUND_PROCESSES; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + + userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(), + userId, true, true, "killBackgroundProcesses", null); + long callingId = Binder.clearCallingIdentity(); + try { + IPackageManager pm = AppGlobals.getPackageManager(); + synchronized(this) { + int appId = -1; + try { + appId = UserHandle.getAppId(pm.getPackageUid(packageName, 0)); + } catch (RemoteException e) { + } + if (appId == -1) { + Slog.w(TAG, "Invalid packageName: " + packageName); + return; + } + killPackageProcessesLocked(packageName, appId, userId, + ProcessList.SERVICE_ADJ, false, true, true, false, "kill background"); + } + } finally { + Binder.restoreCallingIdentity(callingId); + } + } + + @Override + public void killAllBackgroundProcesses() { + if (checkCallingPermission(android.Manifest.permission.KILL_BACKGROUND_PROCESSES) + != PackageManager.PERMISSION_GRANTED) { + String msg = "Permission Denial: killAllBackgroundProcesses() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " requires " + android.Manifest.permission.KILL_BACKGROUND_PROCESSES; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + + long callingId = Binder.clearCallingIdentity(); + try { + synchronized(this) { + ArrayList<ProcessRecord> procs = new ArrayList<ProcessRecord>(); + final int NP = mProcessNames.getMap().size(); + for (int ip=0; ip<NP; ip++) { + SparseArray<ProcessRecord> apps = mProcessNames.getMap().valueAt(ip); + final int NA = apps.size(); + for (int ia=0; ia<NA; ia++) { + ProcessRecord app = apps.valueAt(ia); + if (app.persistent) { + // we don't kill persistent processes + continue; + } + if (app.removed) { + procs.add(app); + } else if (app.setAdj >= ProcessList.CACHED_APP_MIN_ADJ) { + app.removed = true; + procs.add(app); + } + } + } + + int N = procs.size(); + for (int i=0; i<N; i++) { + removeProcessLocked(procs.get(i), false, true, "kill all background"); + } + mAllowLowerMemLevel = true; + updateOomAdjLocked(); + doLowMemReportIfNeededLocked(null); + } + } finally { + Binder.restoreCallingIdentity(callingId); + } + } + + @Override + public void forceStopPackage(final String packageName, int userId) { + if (checkCallingPermission(android.Manifest.permission.FORCE_STOP_PACKAGES) + != PackageManager.PERMISSION_GRANTED) { + String msg = "Permission Denial: forceStopPackage() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " requires " + android.Manifest.permission.FORCE_STOP_PACKAGES; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + final int callingPid = Binder.getCallingPid(); + userId = handleIncomingUser(callingPid, Binder.getCallingUid(), + userId, true, true, "forceStopPackage", null); + long callingId = Binder.clearCallingIdentity(); + try { + IPackageManager pm = AppGlobals.getPackageManager(); + synchronized(this) { + int[] users = userId == UserHandle.USER_ALL + ? getUsersLocked() : new int[] { userId }; + for (int user : users) { + int pkgUid = -1; + try { + pkgUid = pm.getPackageUid(packageName, user); + } catch (RemoteException e) { + } + if (pkgUid == -1) { + Slog.w(TAG, "Invalid packageName: " + packageName); + continue; + } + try { + pm.setPackageStoppedState(packageName, true, user); + } catch (RemoteException e) { + } catch (IllegalArgumentException e) { + Slog.w(TAG, "Failed trying to unstop package " + + packageName + ": " + e); + } + if (isUserRunningLocked(user, false)) { + forceStopPackageLocked(packageName, pkgUid, "from pid " + callingPid); + } + } + } + } finally { + Binder.restoreCallingIdentity(callingId); + } + } + + /* + * The pkg name and app id have to be specified. + */ + @Override + public void killApplicationWithAppId(String pkg, int appid, String reason) { + if (pkg == null) { + return; + } + // Make sure the uid is valid. + if (appid < 0) { + Slog.w(TAG, "Invalid appid specified for pkg : " + pkg); + return; + } + int callerUid = Binder.getCallingUid(); + // Only the system server can kill an application + if (callerUid == Process.SYSTEM_UID) { + // Post an aysnc message to kill the application + Message msg = mHandler.obtainMessage(KILL_APPLICATION_MSG); + msg.arg1 = appid; + msg.arg2 = 0; + Bundle bundle = new Bundle(); + bundle.putString("pkg", pkg); + bundle.putString("reason", reason); + msg.obj = bundle; + mHandler.sendMessage(msg); + } else { + throw new SecurityException(callerUid + " cannot kill pkg: " + + pkg); + } + } + + @Override + public void closeSystemDialogs(String reason) { + enforceNotIsolatedCaller("closeSystemDialogs"); + + final int pid = Binder.getCallingPid(); + final int uid = Binder.getCallingUid(); + final long origId = Binder.clearCallingIdentity(); + try { + synchronized (this) { + // Only allow this from foreground processes, so that background + // applications can't abuse it to prevent system UI from being shown. + if (uid >= Process.FIRST_APPLICATION_UID) { + ProcessRecord proc; + synchronized (mPidsSelfLocked) { + proc = mPidsSelfLocked.get(pid); + } + if (proc.curRawAdj > ProcessList.PERCEPTIBLE_APP_ADJ) { + Slog.w(TAG, "Ignoring closeSystemDialogs " + reason + + " from background process " + proc); + return; + } + } + closeSystemDialogsLocked(reason); + } + } finally { + Binder.restoreCallingIdentity(origId); + } + } + + void closeSystemDialogsLocked(String reason) { + Intent intent = new Intent(Intent.ACTION_CLOSE_SYSTEM_DIALOGS); + intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY + | Intent.FLAG_RECEIVER_FOREGROUND); + if (reason != null) { + intent.putExtra("reason", reason); + } + mWindowManager.closeSystemDialogs(reason); + + mStackSupervisor.closeSystemDialogsLocked(); + + broadcastIntentLocked(null, null, intent, null, + null, 0, null, null, null, AppOpsManager.OP_NONE, false, false, -1, + Process.SYSTEM_UID, UserHandle.USER_ALL); + } + + @Override + public Debug.MemoryInfo[] getProcessMemoryInfo(int[] pids) { + enforceNotIsolatedCaller("getProcessMemoryInfo"); + Debug.MemoryInfo[] infos = new Debug.MemoryInfo[pids.length]; + for (int i=pids.length-1; i>=0; i--) { + ProcessRecord proc; + int oomAdj; + synchronized (this) { + synchronized (mPidsSelfLocked) { + proc = mPidsSelfLocked.get(pids[i]); + oomAdj = proc != null ? proc.setAdj : 0; + } + } + infos[i] = new Debug.MemoryInfo(); + Debug.getMemoryInfo(pids[i], infos[i]); + if (proc != null) { + synchronized (this) { + if (proc.thread != null && proc.setAdj == oomAdj) { + // Record this for posterity if the process has been stable. + proc.baseProcessTracker.addPss(infos[i].getTotalPss(), + infos[i].getTotalUss(), false, proc.pkgList); + } + } + } + } + return infos; + } + + @Override + public long[] getProcessPss(int[] pids) { + enforceNotIsolatedCaller("getProcessPss"); + long[] pss = new long[pids.length]; + for (int i=pids.length-1; i>=0; i--) { + ProcessRecord proc; + int oomAdj; + synchronized (this) { + synchronized (mPidsSelfLocked) { + proc = mPidsSelfLocked.get(pids[i]); + oomAdj = proc != null ? proc.setAdj : 0; + } + } + long[] tmpUss = new long[1]; + pss[i] = Debug.getPss(pids[i], tmpUss); + if (proc != null) { + synchronized (this) { + if (proc.thread != null && proc.setAdj == oomAdj) { + // Record this for posterity if the process has been stable. + proc.baseProcessTracker.addPss(pss[i], tmpUss[0], false, proc.pkgList); + } + } + } + } + return pss; + } + + @Override + public void killApplicationProcess(String processName, int uid) { + if (processName == null) { + return; + } + + int callerUid = Binder.getCallingUid(); + // Only the system server can kill an application + if (callerUid == Process.SYSTEM_UID) { + synchronized (this) { + ProcessRecord app = getProcessRecordLocked(processName, uid, true); + if (app != null && app.thread != null) { + try { + app.thread.scheduleSuicide(); + } catch (RemoteException e) { + // If the other end already died, then our work here is done. + } + } else { + Slog.w(TAG, "Process/uid not found attempting kill of " + + processName + " / " + uid); + } + } + } else { + throw new SecurityException(callerUid + " cannot kill app process: " + + processName); + } + } + + private void forceStopPackageLocked(final String packageName, int uid, String reason) { + forceStopPackageLocked(packageName, UserHandle.getAppId(uid), false, + false, true, false, UserHandle.getUserId(uid), reason); + Intent intent = new Intent(Intent.ACTION_PACKAGE_RESTARTED, + Uri.fromParts("package", packageName, null)); + if (!mProcessesReady) { + intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY + | Intent.FLAG_RECEIVER_FOREGROUND); + } + intent.putExtra(Intent.EXTRA_UID, uid); + intent.putExtra(Intent.EXTRA_USER_HANDLE, UserHandle.getUserId(uid)); + broadcastIntentLocked(null, null, intent, + null, null, 0, null, null, null, AppOpsManager.OP_NONE, + false, false, + MY_PID, Process.SYSTEM_UID, UserHandle.getUserId(uid)); + } + + private void forceStopUserLocked(int userId, String reason) { + forceStopPackageLocked(null, -1, false, false, true, false, userId, reason); + Intent intent = new Intent(Intent.ACTION_USER_STOPPED); + intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY + | Intent.FLAG_RECEIVER_FOREGROUND); + intent.putExtra(Intent.EXTRA_USER_HANDLE, userId); + broadcastIntentLocked(null, null, intent, + null, null, 0, null, null, null, AppOpsManager.OP_NONE, + false, false, + MY_PID, Process.SYSTEM_UID, UserHandle.USER_ALL); + } + + private final boolean killPackageProcessesLocked(String packageName, int appId, + int userId, int minOomAdj, boolean callerWillRestart, boolean allowRestart, + boolean doit, boolean evenPersistent, String reason) { + ArrayList<ProcessRecord> procs = new ArrayList<ProcessRecord>(); + + // Remove all processes this package may have touched: all with the + // same UID (except for the system or root user), and all whose name + // matches the package name. + final String procNamePrefix = packageName != null ? (packageName + ":") : null; + final int NP = mProcessNames.getMap().size(); + for (int ip=0; ip<NP; ip++) { + SparseArray<ProcessRecord> apps = mProcessNames.getMap().valueAt(ip); + final int NA = apps.size(); + for (int ia=0; ia<NA; ia++) { + ProcessRecord app = apps.valueAt(ia); + if (app.persistent && !evenPersistent) { + // we don't kill persistent processes + continue; + } + if (app.removed) { + if (doit) { + procs.add(app); + } + continue; + } + + // Skip process if it doesn't meet our oom adj requirement. + if (app.setAdj < minOomAdj) { + continue; + } + + // If no package is specified, we call all processes under the + // give user id. + if (packageName == null) { + if (app.userId != userId) { + continue; + } + if (appId >= 0 && UserHandle.getAppId(app.uid) != appId) { + continue; + } + // Package has been specified, we want to hit all processes + // that match it. We need to qualify this by the processes + // that are running under the specified app and user ID. + } else { + if (UserHandle.getAppId(app.uid) != appId) { + continue; + } + if (userId != UserHandle.USER_ALL && app.userId != userId) { + continue; + } + if (!app.pkgList.containsKey(packageName)) { + continue; + } + } + + // Process has passed all conditions, kill it! + if (!doit) { + return true; + } + app.removed = true; + procs.add(app); + } + } + + int N = procs.size(); + for (int i=0; i<N; i++) { + removeProcessLocked(procs.get(i), callerWillRestart, allowRestart, reason); + } + updateOomAdjLocked(); + return N > 0; + } + + private final boolean forceStopPackageLocked(String name, int appId, + boolean callerWillRestart, boolean purgeCache, boolean doit, + boolean evenPersistent, int userId, String reason) { + int i; + int N; + + if (userId == UserHandle.USER_ALL && name == null) { + Slog.w(TAG, "Can't force stop all processes of all users, that is insane!"); + } + + if (appId < 0 && name != null) { + try { + appId = UserHandle.getAppId( + AppGlobals.getPackageManager().getPackageUid(name, 0)); + } catch (RemoteException e) { + } + } + + if (doit) { + if (name != null) { + Slog.i(TAG, "Force stopping " + name + " appid=" + appId + + " user=" + userId + ": " + reason); + } else { + Slog.i(TAG, "Force stopping u" + userId + ": " + reason); + } + + final ArrayMap<String, SparseArray<Long>> pmap = mProcessCrashTimes.getMap(); + for (int ip=pmap.size()-1; ip>=0; ip--) { + SparseArray<Long> ba = pmap.valueAt(ip); + for (i=ba.size()-1; i>=0; i--) { + boolean remove = false; + final int entUid = ba.keyAt(i); + if (name != null) { + if (userId == UserHandle.USER_ALL) { + if (UserHandle.getAppId(entUid) == appId) { + remove = true; + } + } else { + if (entUid == UserHandle.getUid(userId, appId)) { + remove = true; + } + } + } else if (UserHandle.getUserId(entUid) == userId) { + remove = true; + } + if (remove) { + ba.removeAt(i); + } + } + if (ba.size() == 0) { + pmap.removeAt(ip); + } + } + } + + boolean didSomething = killPackageProcessesLocked(name, appId, userId, + -100, callerWillRestart, true, doit, evenPersistent, + name == null ? ("stop user " + userId) : ("stop " + name)); + + if (mStackSupervisor.forceStopPackageLocked(name, doit, evenPersistent, userId)) { + if (!doit) { + return true; + } + didSomething = true; + } + + if (mServices.forceStopLocked(name, userId, evenPersistent, doit)) { + if (!doit) { + return true; + } + didSomething = true; + } + + if (name == null) { + // Remove all sticky broadcasts from this user. + mStickyBroadcasts.remove(userId); + } + + ArrayList<ContentProviderRecord> providers = new ArrayList<ContentProviderRecord>(); + if (mProviderMap.collectForceStopProviders(name, appId, doit, evenPersistent, + userId, providers)) { + if (!doit) { + return true; + } + didSomething = true; + } + N = providers.size(); + for (i=0; i<N; i++) { + removeDyingProviderLocked(null, providers.get(i), true); + } + + // Remove transient permissions granted from/to this package/user + removeUriPermissionsForPackageLocked(name, userId, false); + + if (name == null) { + // Remove pending intents. For now we only do this when force + // stopping users, because we have some problems when doing this + // for packages -- app widgets are not currently cleaned up for + // such packages, so they can be left with bad pending intents. + if (mIntentSenderRecords.size() > 0) { + Iterator<WeakReference<PendingIntentRecord>> it + = mIntentSenderRecords.values().iterator(); + while (it.hasNext()) { + WeakReference<PendingIntentRecord> wpir = it.next(); + if (wpir == null) { + it.remove(); + continue; + } + PendingIntentRecord pir = wpir.get(); + if (pir == null) { + it.remove(); + continue; + } + if (name == null) { + // Stopping user, remove all objects for the user. + if (pir.key.userId != userId) { + // Not the same user, skip it. + continue; + } + } else { + if (UserHandle.getAppId(pir.uid) != appId) { + // Different app id, skip it. + continue; + } + if (userId != UserHandle.USER_ALL && pir.key.userId != userId) { + // Different user, skip it. + continue; + } + if (!pir.key.packageName.equals(name)) { + // Different package, skip it. + continue; + } + } + if (!doit) { + return true; + } + didSomething = true; + it.remove(); + pir.canceled = true; + if (pir.key.activity != null) { + pir.key.activity.pendingResults.remove(pir.ref); + } + } + } + } + + if (doit) { + if (purgeCache && name != null) { + AttributeCache ac = AttributeCache.instance(); + if (ac != null) { + ac.removePackage(name); + } + } + if (mBooted) { + mStackSupervisor.resumeTopActivitiesLocked(); + mStackSupervisor.scheduleIdleLocked(); + } + } + + return didSomething; + } + + private final boolean removeProcessLocked(ProcessRecord app, + boolean callerWillRestart, boolean allowRestart, String reason) { + final String name = app.processName; + final int uid = app.uid; + if (DEBUG_PROCESSES) Slog.d( + TAG, "Force removing proc " + app.toShortString() + " (" + name + + "/" + uid + ")"); + + mProcessNames.remove(name, uid); + mIsolatedProcesses.remove(app.uid); + if (mHeavyWeightProcess == app) { + mHandler.sendMessage(mHandler.obtainMessage(CANCEL_HEAVY_NOTIFICATION_MSG, + mHeavyWeightProcess.userId, 0)); + mHeavyWeightProcess = null; + } + boolean needRestart = false; + if (app.pid > 0 && app.pid != MY_PID) { + int pid = app.pid; + synchronized (mPidsSelfLocked) { + mPidsSelfLocked.remove(pid); + mHandler.removeMessages(PROC_START_TIMEOUT_MSG, app); + } + killUnneededProcessLocked(app, reason); + handleAppDiedLocked(app, true, allowRestart); + removeLruProcessLocked(app); + + if (app.persistent && !app.isolated) { + if (!callerWillRestart) { + addAppLocked(app.info, false); + } else { + needRestart = true; + } + } + } else { + mRemovedProcesses.add(app); + } + + return needRestart; + } + + private final void processStartTimedOutLocked(ProcessRecord app) { + final int pid = app.pid; + boolean gone = false; + synchronized (mPidsSelfLocked) { + ProcessRecord knownApp = mPidsSelfLocked.get(pid); + if (knownApp != null && knownApp.thread == null) { + mPidsSelfLocked.remove(pid); + gone = true; + } + } + + if (gone) { + Slog.w(TAG, "Process " + app + " failed to attach"); + EventLog.writeEvent(EventLogTags.AM_PROCESS_START_TIMEOUT, app.userId, + pid, app.uid, app.processName); + mProcessNames.remove(app.processName, app.uid); + mIsolatedProcesses.remove(app.uid); + if (mHeavyWeightProcess == app) { + mHandler.sendMessage(mHandler.obtainMessage(CANCEL_HEAVY_NOTIFICATION_MSG, + mHeavyWeightProcess.userId, 0)); + mHeavyWeightProcess = null; + } + // Take care of any launching providers waiting for this process. + checkAppInLaunchingProvidersLocked(app, true); + // Take care of any services that are waiting for the process. + mServices.processStartTimedOutLocked(app); + killUnneededProcessLocked(app, "start timeout"); + if (mBackupTarget != null && mBackupTarget.app.pid == pid) { + Slog.w(TAG, "Unattached app died before backup, skipping"); + try { + IBackupManager bm = IBackupManager.Stub.asInterface( + ServiceManager.getService(Context.BACKUP_SERVICE)); + bm.agentDisconnected(app.info.packageName); + } catch (RemoteException e) { + // Can't happen; the backup manager is local + } + } + if (isPendingBroadcastProcessLocked(pid)) { + Slog.w(TAG, "Unattached app died before broadcast acknowledged, skipping"); + skipPendingBroadcastLocked(pid); + } + } else { + Slog.w(TAG, "Spurious process start timeout - pid not known for " + app); + } + } + + private final boolean attachApplicationLocked(IApplicationThread thread, + int pid) { + + // Find the application record that is being attached... either via + // the pid if we are running in multiple processes, or just pull the + // next app record if we are emulating process with anonymous threads. + ProcessRecord app; + if (pid != MY_PID && pid >= 0) { + synchronized (mPidsSelfLocked) { + app = mPidsSelfLocked.get(pid); + } + } else { + app = null; + } + + if (app == null) { + Slog.w(TAG, "No pending application record for pid " + pid + + " (IApplicationThread " + thread + "); dropping process"); + EventLog.writeEvent(EventLogTags.AM_DROP_PROCESS, pid); + if (pid > 0 && pid != MY_PID) { + Process.killProcessQuiet(pid); + } else { + try { + thread.scheduleExit(); + } catch (Exception e) { + // Ignore exceptions. + } + } + return false; + } + + // If this application record is still attached to a previous + // process, clean it up now. + if (app.thread != null) { + handleAppDiedLocked(app, true, true); + } + + // Tell the process all about itself. + + if (localLOGV) Slog.v( + TAG, "Binding process pid " + pid + " to record " + app); + + final String processName = app.processName; + try { + AppDeathRecipient adr = new AppDeathRecipient( + app, pid, thread); + thread.asBinder().linkToDeath(adr, 0); + app.deathRecipient = adr; + } catch (RemoteException e) { + app.resetPackageList(mProcessStats); + startProcessLocked(app, "link fail", processName); + return false; + } + + EventLog.writeEvent(EventLogTags.AM_PROC_BOUND, app.userId, app.pid, app.processName); + + app.makeActive(thread, mProcessStats); + app.curAdj = app.setAdj = -100; + app.curSchedGroup = app.setSchedGroup = Process.THREAD_GROUP_DEFAULT; + app.forcingToForeground = null; + app.foregroundServices = false; + app.hasShownUi = false; + app.debugging = false; + app.cached = false; + + mHandler.removeMessages(PROC_START_TIMEOUT_MSG, app); + + boolean normalMode = mProcessesReady || isAllowedWhileBooting(app.info); + List<ProviderInfo> providers = normalMode ? generateApplicationProvidersLocked(app) : null; + + if (!normalMode) { + Slog.i(TAG, "Launching preboot mode app: " + app); + } + + if (localLOGV) Slog.v( + TAG, "New app record " + app + + " thread=" + thread.asBinder() + " pid=" + pid); + try { + int testMode = IApplicationThread.DEBUG_OFF; + if (mDebugApp != null && mDebugApp.equals(processName)) { + testMode = mWaitForDebugger + ? IApplicationThread.DEBUG_WAIT + : IApplicationThread.DEBUG_ON; + app.debugging = true; + if (mDebugTransient) { + mDebugApp = mOrigDebugApp; + mWaitForDebugger = mOrigWaitForDebugger; + } + } + String profileFile = app.instrumentationProfileFile; + ParcelFileDescriptor profileFd = null; + boolean profileAutoStop = false; + if (mProfileApp != null && mProfileApp.equals(processName)) { + mProfileProc = app; + profileFile = mProfileFile; + profileFd = mProfileFd; + profileAutoStop = mAutoStopProfiler; + } + boolean enableOpenGlTrace = false; + if (mOpenGlTraceApp != null && mOpenGlTraceApp.equals(processName)) { + enableOpenGlTrace = true; + mOpenGlTraceApp = null; + } + + // If the app is being launched for restore or full backup, set it up specially + boolean isRestrictedBackupMode = false; + if (mBackupTarget != null && mBackupAppName.equals(processName)) { + isRestrictedBackupMode = (mBackupTarget.backupMode == BackupRecord.RESTORE) + || (mBackupTarget.backupMode == BackupRecord.RESTORE_FULL) + || (mBackupTarget.backupMode == BackupRecord.BACKUP_FULL); + } + + ensurePackageDexOpt(app.instrumentationInfo != null + ? app.instrumentationInfo.packageName + : app.info.packageName); + if (app.instrumentationClass != null) { + ensurePackageDexOpt(app.instrumentationClass.getPackageName()); + } + if (DEBUG_CONFIGURATION) Slog.v(TAG, "Binding proc " + + processName + " with config " + mConfiguration); + ApplicationInfo appInfo = app.instrumentationInfo != null + ? app.instrumentationInfo : app.info; + app.compat = compatibilityInfoForPackageLocked(appInfo); + if (profileFd != null) { + profileFd = profileFd.dup(); + } + thread.bindApplication(processName, appInfo, providers, + app.instrumentationClass, profileFile, profileFd, profileAutoStop, + app.instrumentationArguments, app.instrumentationWatcher, + app.instrumentationUiAutomationConnection, testMode, enableOpenGlTrace, + isRestrictedBackupMode || !normalMode, app.persistent, + new Configuration(mConfiguration), app.compat, getCommonServicesLocked(), + mCoreSettingsObserver.getCoreSettingsLocked()); + updateLruProcessLocked(app, false, null); + app.lastRequestedGc = app.lastLowMemory = SystemClock.uptimeMillis(); + } catch (Exception e) { + // todo: Yikes! What should we do? For now we will try to + // start another process, but that could easily get us in + // an infinite loop of restarting processes... + Slog.w(TAG, "Exception thrown during bind!", e); + + app.resetPackageList(mProcessStats); + app.unlinkDeathRecipient(); + startProcessLocked(app, "bind fail", processName); + return false; + } + + // Remove this record from the list of starting applications. + mPersistentStartingProcesses.remove(app); + if (DEBUG_PROCESSES && mProcessesOnHold.contains(app)) Slog.v(TAG, + "Attach application locked removing on hold: " + app); + mProcessesOnHold.remove(app); + + boolean badApp = false; + boolean didSomething = false; + + // See if the top visible activity is waiting to run in this process... + if (normalMode) { + try { + if (mStackSupervisor.attachApplicationLocked(app)) { + didSomething = true; + } + } catch (Exception e) { + badApp = true; + } + } + + // Find any services that should be running in this process... + if (!badApp) { + try { + didSomething |= mServices.attachApplicationLocked(app, processName); + } catch (Exception e) { + badApp = true; + } + } + + // Check if a next-broadcast receiver is in this process... + if (!badApp && isPendingBroadcastProcessLocked(pid)) { + try { + didSomething |= sendPendingBroadcastsLocked(app); + } catch (Exception e) { + // If the app died trying to launch the receiver we declare it 'bad' + badApp = true; + } + } + + // Check whether the next backup agent is in this process... + if (!badApp && mBackupTarget != null && mBackupTarget.appInfo.uid == app.uid) { + if (DEBUG_BACKUP) Slog.v(TAG, "New app is backup target, launching agent for " + app); + ensurePackageDexOpt(mBackupTarget.appInfo.packageName); + try { + thread.scheduleCreateBackupAgent(mBackupTarget.appInfo, + compatibilityInfoForPackageLocked(mBackupTarget.appInfo), + mBackupTarget.backupMode); + } catch (Exception e) { + Slog.w(TAG, "Exception scheduling backup agent creation: "); + e.printStackTrace(); + } + } + + if (badApp) { + // todo: Also need to kill application to deal with all + // kinds of exceptions. + handleAppDiedLocked(app, false, true); + return false; + } + + if (!didSomething) { + updateOomAdjLocked(); + } + + return true; + } + + @Override + public final void attachApplication(IApplicationThread thread) { + synchronized (this) { + int callingPid = Binder.getCallingPid(); + final long origId = Binder.clearCallingIdentity(); + attachApplicationLocked(thread, callingPid); + Binder.restoreCallingIdentity(origId); + } + } + + @Override + public final void activityIdle(IBinder token, Configuration config, boolean stopProfiling) { + final long origId = Binder.clearCallingIdentity(); + synchronized (this) { + ActivityStack stack = ActivityRecord.getStackLocked(token); + if (stack != null) { + ActivityRecord r = + mStackSupervisor.activityIdleInternalLocked(token, false, config); + if (stopProfiling) { + if ((mProfileProc == r.app) && (mProfileFd != null)) { + try { + mProfileFd.close(); + } catch (IOException e) { + } + clearProfilerLocked(); + } + } + } + } + Binder.restoreCallingIdentity(origId); + } + + void enableScreenAfterBoot() { + EventLog.writeEvent(EventLogTags.BOOT_PROGRESS_ENABLE_SCREEN, + SystemClock.uptimeMillis()); + mWindowManager.enableScreenAfterBoot(); + + synchronized (this) { + updateEventDispatchingLocked(); + } + } + + @Override + public void showBootMessage(final CharSequence msg, final boolean always) { + enforceNotIsolatedCaller("showBootMessage"); + mWindowManager.showBootMessage(msg, always); + } + + @Override + public void dismissKeyguardOnNextActivity() { + enforceNotIsolatedCaller("dismissKeyguardOnNextActivity"); + final long token = Binder.clearCallingIdentity(); + try { + synchronized (this) { + if (DEBUG_LOCKSCREEN) logLockScreen(""); + if (mLockScreenShown) { + mLockScreenShown = false; + comeOutOfSleepIfNeededLocked(); + } + mStackSupervisor.setDismissKeyguard(true); + } + } finally { + Binder.restoreCallingIdentity(token); + } + } + + final void finishBooting() { + IntentFilter pkgFilter = new IntentFilter(); + pkgFilter.addAction(Intent.ACTION_QUERY_PACKAGE_RESTART); + pkgFilter.addDataScheme("package"); + mContext.registerReceiver(new BroadcastReceiver() { + @Override + public void onReceive(Context context, Intent intent) { + String[] pkgs = intent.getStringArrayExtra(Intent.EXTRA_PACKAGES); + if (pkgs != null) { + for (String pkg : pkgs) { + synchronized (ActivityManagerService.this) { + if (forceStopPackageLocked(pkg, -1, false, false, false, false, 0, + "finished booting")) { + setResultCode(Activity.RESULT_OK); + return; + } + } + } + } + } + }, pkgFilter); + + synchronized (this) { + // Ensure that any processes we had put on hold are now started + // up. + final int NP = mProcessesOnHold.size(); + if (NP > 0) { + ArrayList<ProcessRecord> procs = + new ArrayList<ProcessRecord>(mProcessesOnHold); + for (int ip=0; ip<NP; ip++) { + if (DEBUG_PROCESSES) Slog.v(TAG, "Starting process on hold: " + + procs.get(ip)); + startProcessLocked(procs.get(ip), "on-hold", null); + } + } + + if (mFactoryTest != SystemServer.FACTORY_TEST_LOW_LEVEL) { + // Start looking for apps that are abusing wake locks. + Message nmsg = mHandler.obtainMessage(CHECK_EXCESSIVE_WAKE_LOCKS_MSG); + mHandler.sendMessageDelayed(nmsg, POWER_CHECK_DELAY); + // Tell anyone interested that we are done booting! + SystemProperties.set("sys.boot_completed", "1"); + SystemProperties.set("dev.bootcomplete", "1"); + for (int i=0; i<mStartedUsers.size(); i++) { + UserStartedState uss = mStartedUsers.valueAt(i); + if (uss.mState == UserStartedState.STATE_BOOTING) { + uss.mState = UserStartedState.STATE_RUNNING; + final int userId = mStartedUsers.keyAt(i); + Intent intent = new Intent(Intent.ACTION_BOOT_COMPLETED, null); + intent.putExtra(Intent.EXTRA_USER_HANDLE, userId); + intent.addFlags(Intent.FLAG_RECEIVER_NO_ABORT); + broadcastIntentLocked(null, null, intent, null, + new IIntentReceiver.Stub() { + @Override + public void performReceive(Intent intent, int resultCode, + String data, Bundle extras, boolean ordered, + boolean sticky, int sendingUser) { + synchronized (ActivityManagerService.this) { + requestPssAllProcsLocked(SystemClock.uptimeMillis(), + true, false); + } + } + }, + 0, null, null, + android.Manifest.permission.RECEIVE_BOOT_COMPLETED, + AppOpsManager.OP_NONE, true, false, MY_PID, Process.SYSTEM_UID, + userId); + } + } + } + } + } + + final void ensureBootCompleted() { + boolean booting; + boolean enableScreen; + synchronized (this) { + booting = mBooting; + mBooting = false; + enableScreen = !mBooted; + mBooted = true; + } + + if (booting) { + finishBooting(); + } + + if (enableScreen) { + enableScreenAfterBoot(); + } + } + + @Override + public final void activityResumed(IBinder token) { + final long origId = Binder.clearCallingIdentity(); + synchronized(this) { + ActivityStack stack = ActivityRecord.getStackLocked(token); + if (stack != null) { + ActivityRecord.activityResumedLocked(token); + } + } + Binder.restoreCallingIdentity(origId); + } + + @Override + public final void activityPaused(IBinder token) { + final long origId = Binder.clearCallingIdentity(); + synchronized(this) { + ActivityStack stack = ActivityRecord.getStackLocked(token); + if (stack != null) { + stack.activityPausedLocked(token, false); + } + } + Binder.restoreCallingIdentity(origId); + } + + @Override + public final void activityStopped(IBinder token, Bundle icicle, Bitmap thumbnail, + CharSequence description) { + if (localLOGV) Slog.v( + TAG, "Activity stopped: token=" + token); + + // Refuse possible leaked file descriptors + if (icicle != null && icicle.hasFileDescriptors()) { + throw new IllegalArgumentException("File descriptors passed in Bundle"); + } + + ActivityRecord r = null; + + final long origId = Binder.clearCallingIdentity(); + + synchronized (this) { + r = ActivityRecord.isInStackLocked(token); + if (r != null) { + r.task.stack.activityStoppedLocked(r, icicle, thumbnail, description); + } + } + + if (r != null) { + sendPendingThumbnail(r, null, null, null, false); + } + + trimApplications(); + + Binder.restoreCallingIdentity(origId); + } + + @Override + public final void activityDestroyed(IBinder token) { + if (DEBUG_SWITCH) Slog.v(TAG, "ACTIVITY DESTROYED: " + token); + synchronized (this) { + ActivityStack stack = ActivityRecord.getStackLocked(token); + if (stack != null) { + stack.activityDestroyedLocked(token); + } + } + } + + @Override + public String getCallingPackage(IBinder token) { + synchronized (this) { + ActivityRecord r = getCallingRecordLocked(token); + return r != null ? r.info.packageName : null; + } + } + + @Override + public ComponentName getCallingActivity(IBinder token) { + synchronized (this) { + ActivityRecord r = getCallingRecordLocked(token); + return r != null ? r.intent.getComponent() : null; + } + } + + private ActivityRecord getCallingRecordLocked(IBinder token) { + ActivityRecord r = ActivityRecord.isInStackLocked(token); + if (r == null) { + return null; + } + return r.resultTo; + } + + @Override + public ComponentName getActivityClassForToken(IBinder token) { + synchronized(this) { + ActivityRecord r = ActivityRecord.isInStackLocked(token); + if (r == null) { + return null; + } + return r.intent.getComponent(); + } + } + + @Override + public String getPackageForToken(IBinder token) { + synchronized(this) { + ActivityRecord r = ActivityRecord.isInStackLocked(token); + if (r == null) { + return null; + } + return r.packageName; + } + } + + @Override + public IIntentSender getIntentSender(int type, + String packageName, IBinder token, String resultWho, + int requestCode, Intent[] intents, String[] resolvedTypes, + int flags, Bundle options, int userId) { + enforceNotIsolatedCaller("getIntentSender"); + // Refuse possible leaked file descriptors + if (intents != null) { + if (intents.length < 1) { + throw new IllegalArgumentException("Intents array length must be >= 1"); + } + for (int i=0; i<intents.length; i++) { + Intent intent = intents[i]; + if (intent != null) { + if (intent.hasFileDescriptors()) { + throw new IllegalArgumentException("File descriptors passed in Intent"); + } + if (type == ActivityManager.INTENT_SENDER_BROADCAST && + (intent.getFlags()&Intent.FLAG_RECEIVER_BOOT_UPGRADE) != 0) { + throw new IllegalArgumentException( + "Can't use FLAG_RECEIVER_BOOT_UPGRADE here"); + } + intents[i] = new Intent(intent); + } + } + if (resolvedTypes != null && resolvedTypes.length != intents.length) { + throw new IllegalArgumentException( + "Intent array length does not match resolvedTypes length"); + } + } + if (options != null) { + if (options.hasFileDescriptors()) { + throw new IllegalArgumentException("File descriptors passed in options"); + } + } + + synchronized(this) { + int callingUid = Binder.getCallingUid(); + int origUserId = userId; + userId = handleIncomingUser(Binder.getCallingPid(), callingUid, userId, + type == ActivityManager.INTENT_SENDER_BROADCAST, false, + "getIntentSender", null); + if (origUserId == UserHandle.USER_CURRENT) { + // We don't want to evaluate this until the pending intent is + // actually executed. However, we do want to always do the + // security checking for it above. + userId = UserHandle.USER_CURRENT; + } + try { + if (callingUid != 0 && callingUid != Process.SYSTEM_UID) { + int uid = AppGlobals.getPackageManager() + .getPackageUid(packageName, UserHandle.getUserId(callingUid)); + if (!UserHandle.isSameApp(callingUid, uid)) { + String msg = "Permission Denial: getIntentSender() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + ", (need uid=" + uid + ")" + + " is not allowed to send as package " + packageName; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + } + + return getIntentSenderLocked(type, packageName, callingUid, userId, + token, resultWho, requestCode, intents, resolvedTypes, flags, options); + + } catch (RemoteException e) { + throw new SecurityException(e); + } + } + } + + IIntentSender getIntentSenderLocked(int type, String packageName, + int callingUid, int userId, IBinder token, String resultWho, + int requestCode, Intent[] intents, String[] resolvedTypes, int flags, + Bundle options) { + if (DEBUG_MU) + Slog.v(TAG_MU, "getIntentSenderLocked(): uid=" + callingUid); + ActivityRecord activity = null; + if (type == ActivityManager.INTENT_SENDER_ACTIVITY_RESULT) { + activity = ActivityRecord.isInStackLocked(token); + if (activity == null) { + return null; + } + if (activity.finishing) { + return null; + } + } + + final boolean noCreate = (flags&PendingIntent.FLAG_NO_CREATE) != 0; + final boolean cancelCurrent = (flags&PendingIntent.FLAG_CANCEL_CURRENT) != 0; + final boolean updateCurrent = (flags&PendingIntent.FLAG_UPDATE_CURRENT) != 0; + flags &= ~(PendingIntent.FLAG_NO_CREATE|PendingIntent.FLAG_CANCEL_CURRENT + |PendingIntent.FLAG_UPDATE_CURRENT); + + PendingIntentRecord.Key key = new PendingIntentRecord.Key( + type, packageName, activity, resultWho, + requestCode, intents, resolvedTypes, flags, options, userId); + WeakReference<PendingIntentRecord> ref; + ref = mIntentSenderRecords.get(key); + PendingIntentRecord rec = ref != null ? ref.get() : null; + if (rec != null) { + if (!cancelCurrent) { + if (updateCurrent) { + if (rec.key.requestIntent != null) { + rec.key.requestIntent.replaceExtras(intents != null ? + intents[intents.length - 1] : null); + } + if (intents != null) { + intents[intents.length-1] = rec.key.requestIntent; + rec.key.allIntents = intents; + rec.key.allResolvedTypes = resolvedTypes; + } else { + rec.key.allIntents = null; + rec.key.allResolvedTypes = null; + } + } + return rec; + } + rec.canceled = true; + mIntentSenderRecords.remove(key); + } + if (noCreate) { + return rec; + } + rec = new PendingIntentRecord(this, key, callingUid); + mIntentSenderRecords.put(key, rec.ref); + if (type == ActivityManager.INTENT_SENDER_ACTIVITY_RESULT) { + if (activity.pendingResults == null) { + activity.pendingResults + = new HashSet<WeakReference<PendingIntentRecord>>(); + } + activity.pendingResults.add(rec.ref); + } + return rec; + } + + @Override + public void cancelIntentSender(IIntentSender sender) { + if (!(sender instanceof PendingIntentRecord)) { + return; + } + synchronized(this) { + PendingIntentRecord rec = (PendingIntentRecord)sender; + try { + int uid = AppGlobals.getPackageManager() + .getPackageUid(rec.key.packageName, UserHandle.getCallingUserId()); + if (!UserHandle.isSameApp(uid, Binder.getCallingUid())) { + String msg = "Permission Denial: cancelIntentSender() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " is not allowed to cancel packges " + + rec.key.packageName; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + } catch (RemoteException e) { + throw new SecurityException(e); + } + cancelIntentSenderLocked(rec, true); + } + } + + void cancelIntentSenderLocked(PendingIntentRecord rec, boolean cleanActivity) { + rec.canceled = true; + mIntentSenderRecords.remove(rec.key); + if (cleanActivity && rec.key.activity != null) { + rec.key.activity.pendingResults.remove(rec.ref); + } + } + + @Override + public String getPackageForIntentSender(IIntentSender pendingResult) { + if (!(pendingResult instanceof PendingIntentRecord)) { + return null; + } + try { + PendingIntentRecord res = (PendingIntentRecord)pendingResult; + return res.key.packageName; + } catch (ClassCastException e) { + } + return null; + } + + @Override + public int getUidForIntentSender(IIntentSender sender) { + if (sender instanceof PendingIntentRecord) { + try { + PendingIntentRecord res = (PendingIntentRecord)sender; + return res.uid; + } catch (ClassCastException e) { + } + } + return -1; + } + + @Override + public boolean isIntentSenderTargetedToPackage(IIntentSender pendingResult) { + if (!(pendingResult instanceof PendingIntentRecord)) { + return false; + } + try { + PendingIntentRecord res = (PendingIntentRecord)pendingResult; + if (res.key.allIntents == null) { + return false; + } + for (int i=0; i<res.key.allIntents.length; i++) { + Intent intent = res.key.allIntents[i]; + if (intent.getPackage() != null && intent.getComponent() != null) { + return false; + } + } + return true; + } catch (ClassCastException e) { + } + return false; + } + + @Override + public boolean isIntentSenderAnActivity(IIntentSender pendingResult) { + if (!(pendingResult instanceof PendingIntentRecord)) { + return false; + } + try { + PendingIntentRecord res = (PendingIntentRecord)pendingResult; + if (res.key.type == ActivityManager.INTENT_SENDER_ACTIVITY) { + return true; + } + return false; + } catch (ClassCastException e) { + } + return false; + } + + @Override + public Intent getIntentForIntentSender(IIntentSender pendingResult) { + if (!(pendingResult instanceof PendingIntentRecord)) { + return null; + } + try { + PendingIntentRecord res = (PendingIntentRecord)pendingResult; + return res.key.requestIntent != null ? new Intent(res.key.requestIntent) : null; + } catch (ClassCastException e) { + } + return null; + } + + @Override + public void setProcessLimit(int max) { + enforceCallingPermission(android.Manifest.permission.SET_PROCESS_LIMIT, + "setProcessLimit()"); + synchronized (this) { + mProcessLimit = max < 0 ? ProcessList.MAX_CACHED_APPS : max; + mProcessLimitOverride = max; + } + trimApplications(); + } + + @Override + public int getProcessLimit() { + synchronized (this) { + return mProcessLimitOverride; + } + } + + void foregroundTokenDied(ForegroundToken token) { + synchronized (ActivityManagerService.this) { + synchronized (mPidsSelfLocked) { + ForegroundToken cur + = mForegroundProcesses.get(token.pid); + if (cur != token) { + return; + } + mForegroundProcesses.remove(token.pid); + ProcessRecord pr = mPidsSelfLocked.get(token.pid); + if (pr == null) { + return; + } + pr.forcingToForeground = null; + pr.foregroundServices = false; + } + updateOomAdjLocked(); + } + } + + @Override + public void setProcessForeground(IBinder token, int pid, boolean isForeground) { + enforceCallingPermission(android.Manifest.permission.SET_PROCESS_LIMIT, + "setProcessForeground()"); + synchronized(this) { + boolean changed = false; + + synchronized (mPidsSelfLocked) { + ProcessRecord pr = mPidsSelfLocked.get(pid); + if (pr == null && isForeground) { + Slog.w(TAG, "setProcessForeground called on unknown pid: " + pid); + return; + } + ForegroundToken oldToken = mForegroundProcesses.get(pid); + if (oldToken != null) { + oldToken.token.unlinkToDeath(oldToken, 0); + mForegroundProcesses.remove(pid); + if (pr != null) { + pr.forcingToForeground = null; + } + changed = true; + } + if (isForeground && token != null) { + ForegroundToken newToken = new ForegroundToken() { + @Override + public void binderDied() { + foregroundTokenDied(this); + } + }; + newToken.pid = pid; + newToken.token = token; + try { + token.linkToDeath(newToken, 0); + mForegroundProcesses.put(pid, newToken); + pr.forcingToForeground = token; + changed = true; + } catch (RemoteException e) { + // If the process died while doing this, we will later + // do the cleanup with the process death link. + } + } + } + + if (changed) { + updateOomAdjLocked(); + } + } + } + + // ========================================================= + // PERMISSIONS + // ========================================================= + + static class PermissionController extends IPermissionController.Stub { + ActivityManagerService mActivityManagerService; + PermissionController(ActivityManagerService activityManagerService) { + mActivityManagerService = activityManagerService; + } + + @Override + public boolean checkPermission(String permission, int pid, int uid) { + return mActivityManagerService.checkPermission(permission, pid, + uid) == PackageManager.PERMISSION_GRANTED; + } + } + + class IntentFirewallInterface implements IntentFirewall.AMSInterface { + @Override + public int checkComponentPermission(String permission, int pid, int uid, + int owningUid, boolean exported) { + return ActivityManagerService.this.checkComponentPermission(permission, pid, uid, + owningUid, exported); + } + + @Override + public Object getAMSLock() { + return ActivityManagerService.this; + } + } + + /** + * This can be called with or without the global lock held. + */ + int checkComponentPermission(String permission, int pid, int uid, + int owningUid, boolean exported) { + // We might be performing an operation on behalf of an indirect binder + // invocation, e.g. via {@link #openContentUri}. Check and adjust the + // client identity accordingly before proceeding. + Identity tlsIdentity = sCallerIdentity.get(); + if (tlsIdentity != null) { + Slog.d(TAG, "checkComponentPermission() adjusting {pid,uid} to {" + + tlsIdentity.pid + "," + tlsIdentity.uid + "}"); + uid = tlsIdentity.uid; + pid = tlsIdentity.pid; + } + + if (pid == MY_PID) { + return PackageManager.PERMISSION_GRANTED; + } + + return ActivityManager.checkComponentPermission(permission, uid, + owningUid, exported); + } + + /** + * As the only public entry point for permissions checking, this method + * can enforce the semantic that requesting a check on a null global + * permission is automatically denied. (Internally a null permission + * string is used when calling {@link #checkComponentPermission} in cases + * when only uid-based security is needed.) + * + * This can be called with or without the global lock held. + */ + @Override + public int checkPermission(String permission, int pid, int uid) { + if (permission == null) { + return PackageManager.PERMISSION_DENIED; + } + return checkComponentPermission(permission, pid, UserHandle.getAppId(uid), -1, true); + } + + /** + * Binder IPC calls go through the public entry point. + * This can be called with or without the global lock held. + */ + int checkCallingPermission(String permission) { + return checkPermission(permission, + Binder.getCallingPid(), + UserHandle.getAppId(Binder.getCallingUid())); + } + + /** + * This can be called with or without the global lock held. + */ + void enforceCallingPermission(String permission, String func) { + if (checkCallingPermission(permission) + == PackageManager.PERMISSION_GRANTED) { + return; + } + + String msg = "Permission Denial: " + func + " from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " requires " + permission; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + + /** + * Determine if UID is holding permissions required to access {@link Uri} in + * the given {@link ProviderInfo}. Final permission checking is always done + * in {@link ContentProvider}. + */ + private final boolean checkHoldingPermissionsLocked( + IPackageManager pm, ProviderInfo pi, Uri uri, int uid, int modeFlags) { + if (DEBUG_URI_PERMISSION) Slog.v(TAG, + "checkHoldingPermissionsLocked: uri=" + uri + " uid=" + uid); + + if (pi.applicationInfo.uid == uid) { + return true; + } else if (!pi.exported) { + return false; + } + + boolean readMet = (modeFlags & Intent.FLAG_GRANT_READ_URI_PERMISSION) == 0; + boolean writeMet = (modeFlags & Intent.FLAG_GRANT_WRITE_URI_PERMISSION) == 0; + try { + // check if target holds top-level <provider> permissions + if (!readMet && pi.readPermission != null + && (pm.checkUidPermission(pi.readPermission, uid) == PERMISSION_GRANTED)) { + readMet = true; + } + if (!writeMet && pi.writePermission != null + && (pm.checkUidPermission(pi.writePermission, uid) == PERMISSION_GRANTED)) { + writeMet = true; + } + + // track if unprotected read/write is allowed; any denied + // <path-permission> below removes this ability + boolean allowDefaultRead = pi.readPermission == null; + boolean allowDefaultWrite = pi.writePermission == null; + + // check if target holds any <path-permission> that match uri + final PathPermission[] pps = pi.pathPermissions; + if (pps != null) { + final String path = uri.getPath(); + int i = pps.length; + while (i > 0 && (!readMet || !writeMet)) { + i--; + PathPermission pp = pps[i]; + if (pp.match(path)) { + if (!readMet) { + final String pprperm = pp.getReadPermission(); + if (DEBUG_URI_PERMISSION) Slog.v(TAG, "Checking read perm for " + + pprperm + " for " + pp.getPath() + + ": match=" + pp.match(path) + + " check=" + pm.checkUidPermission(pprperm, uid)); + if (pprperm != null) { + if (pm.checkUidPermission(pprperm, uid) == PERMISSION_GRANTED) { + readMet = true; + } else { + allowDefaultRead = false; + } + } + } + if (!writeMet) { + final String ppwperm = pp.getWritePermission(); + if (DEBUG_URI_PERMISSION) Slog.v(TAG, "Checking write perm " + + ppwperm + " for " + pp.getPath() + + ": match=" + pp.match(path) + + " check=" + pm.checkUidPermission(ppwperm, uid)); + if (ppwperm != null) { + if (pm.checkUidPermission(ppwperm, uid) == PERMISSION_GRANTED) { + writeMet = true; + } else { + allowDefaultWrite = false; + } + } + } + } + } + } + + // grant unprotected <provider> read/write, if not blocked by + // <path-permission> above + if (allowDefaultRead) readMet = true; + if (allowDefaultWrite) writeMet = true; + + } catch (RemoteException e) { + return false; + } + + return readMet && writeMet; + } + + private ProviderInfo getProviderInfoLocked(String authority, int userHandle) { + ProviderInfo pi = null; + ContentProviderRecord cpr = mProviderMap.getProviderByName(authority, userHandle); + if (cpr != null) { + pi = cpr.info; + } else { + try { + pi = AppGlobals.getPackageManager().resolveContentProvider( + authority, PackageManager.GET_URI_PERMISSION_PATTERNS, userHandle); + } catch (RemoteException ex) { + } + } + return pi; + } + + private UriPermission findUriPermissionLocked(int targetUid, Uri uri) { + ArrayMap<Uri, UriPermission> targetUris = mGrantedUriPermissions.get(targetUid); + if (targetUris != null) { + return targetUris.get(uri); + } else { + return null; + } + } + + private UriPermission findOrCreateUriPermissionLocked( + String sourcePkg, String targetPkg, int targetUid, Uri uri) { + ArrayMap<Uri, UriPermission> targetUris = mGrantedUriPermissions.get(targetUid); + if (targetUris == null) { + targetUris = Maps.newArrayMap(); + mGrantedUriPermissions.put(targetUid, targetUris); + } + + UriPermission perm = targetUris.get(uri); + if (perm == null) { + perm = new UriPermission(sourcePkg, targetPkg, targetUid, uri); + targetUris.put(uri, perm); + } + + return perm; + } + + private final boolean checkUriPermissionLocked( + Uri uri, int uid, int modeFlags, int minStrength) { + // Root gets to do everything. + if (uid == 0) { + return true; + } + ArrayMap<Uri, UriPermission> perms = mGrantedUriPermissions.get(uid); + if (perms == null) return false; + UriPermission perm = perms.get(uri); + if (perm == null) return false; + return perm.getStrength(modeFlags) >= minStrength; + } + + @Override + public int checkUriPermission(Uri uri, int pid, int uid, int modeFlags) { + enforceNotIsolatedCaller("checkUriPermission"); + + // Another redirected-binder-call permissions check as in + // {@link checkComponentPermission}. + Identity tlsIdentity = sCallerIdentity.get(); + if (tlsIdentity != null) { + uid = tlsIdentity.uid; + pid = tlsIdentity.pid; + } + + // Our own process gets to do everything. + if (pid == MY_PID) { + return PackageManager.PERMISSION_GRANTED; + } + synchronized(this) { + return checkUriPermissionLocked(uri, uid, modeFlags, UriPermission.STRENGTH_OWNED) + ? PackageManager.PERMISSION_GRANTED + : PackageManager.PERMISSION_DENIED; + } + } + + /** + * Check if the targetPkg can be granted permission to access uri by + * the callingUid using the given modeFlags. Throws a security exception + * if callingUid is not allowed to do this. Returns the uid of the target + * if the URI permission grant should be performed; returns -1 if it is not + * needed (for example targetPkg already has permission to access the URI). + * If you already know the uid of the target, you can supply it in + * lastTargetUid else set that to -1. + */ + int checkGrantUriPermissionLocked(int callingUid, String targetPkg, + Uri uri, int modeFlags, int lastTargetUid) { + final boolean persistable = (modeFlags & Intent.FLAG_GRANT_PERSISTABLE_URI_PERMISSION) != 0; + modeFlags &= (Intent.FLAG_GRANT_READ_URI_PERMISSION + | Intent.FLAG_GRANT_WRITE_URI_PERMISSION); + if (modeFlags == 0) { + return -1; + } + + if (targetPkg != null) { + if (DEBUG_URI_PERMISSION) Slog.v(TAG, + "Checking grant " + targetPkg + " permission to " + uri); + } + + final IPackageManager pm = AppGlobals.getPackageManager(); + + // If this is not a content: uri, we can't do anything with it. + if (!ContentResolver.SCHEME_CONTENT.equals(uri.getScheme())) { + if (DEBUG_URI_PERMISSION) Slog.v(TAG, + "Can't grant URI permission for non-content URI: " + uri); + return -1; + } + + final String authority = uri.getAuthority(); + final ProviderInfo pi = getProviderInfoLocked(authority, UserHandle.getUserId(callingUid)); + if (pi == null) { + Slog.w(TAG, "No content provider found for permission check: " + uri.toSafeString()); + return -1; + } + + int targetUid = lastTargetUid; + if (targetUid < 0 && targetPkg != null) { + try { + targetUid = pm.getPackageUid(targetPkg, UserHandle.getUserId(callingUid)); + if (targetUid < 0) { + if (DEBUG_URI_PERMISSION) Slog.v(TAG, + "Can't grant URI permission no uid for: " + targetPkg); + return -1; + } + } catch (RemoteException ex) { + return -1; + } + } + + if (targetUid >= 0) { + // First... does the target actually need this permission? + if (checkHoldingPermissionsLocked(pm, pi, uri, targetUid, modeFlags)) { + // No need to grant the target this permission. + if (DEBUG_URI_PERMISSION) Slog.v(TAG, + "Target " + targetPkg + " already has full permission to " + uri); + return -1; + } + } else { + // First... there is no target package, so can anyone access it? + boolean allowed = pi.exported; + if ((modeFlags&Intent.FLAG_GRANT_READ_URI_PERMISSION) != 0) { + if (pi.readPermission != null) { + allowed = false; + } + } + if ((modeFlags&Intent.FLAG_GRANT_WRITE_URI_PERMISSION) != 0) { + if (pi.writePermission != null) { + allowed = false; + } + } + if (allowed) { + return -1; + } + } + + // Second... is the provider allowing granting of URI permissions? + if (!pi.grantUriPermissions) { + throw new SecurityException("Provider " + pi.packageName + + "/" + pi.name + + " does not allow granting of Uri permissions (uri " + + uri + ")"); + } + if (pi.uriPermissionPatterns != null) { + final int N = pi.uriPermissionPatterns.length; + boolean allowed = false; + for (int i=0; i<N; i++) { + if (pi.uriPermissionPatterns[i] != null + && pi.uriPermissionPatterns[i].match(uri.getPath())) { + allowed = true; + break; + } + } + if (!allowed) { + throw new SecurityException("Provider " + pi.packageName + + "/" + pi.name + + " does not allow granting of permission to path of Uri " + + uri); + } + } + + // Third... does the caller itself have permission to access + // this uri? + if (callingUid != Process.myUid()) { + if (!checkHoldingPermissionsLocked(pm, pi, uri, callingUid, modeFlags)) { + // Require they hold a strong enough Uri permission + final int minStrength = persistable ? UriPermission.STRENGTH_PERSISTABLE + : UriPermission.STRENGTH_OWNED; + if (!checkUriPermissionLocked(uri, callingUid, modeFlags, minStrength)) { + throw new SecurityException("Uid " + callingUid + + " does not have permission to uri " + uri); + } + } + } + + return targetUid; + } + + @Override + public int checkGrantUriPermission(int callingUid, String targetPkg, + Uri uri, int modeFlags) { + enforceNotIsolatedCaller("checkGrantUriPermission"); + synchronized(this) { + return checkGrantUriPermissionLocked(callingUid, targetPkg, uri, modeFlags, -1); + } + } + + void grantUriPermissionUncheckedLocked( + int targetUid, String targetPkg, Uri uri, int modeFlags, UriPermissionOwner owner) { + final boolean persistable = (modeFlags & Intent.FLAG_GRANT_PERSISTABLE_URI_PERMISSION) != 0; + modeFlags &= (Intent.FLAG_GRANT_READ_URI_PERMISSION + | Intent.FLAG_GRANT_WRITE_URI_PERMISSION); + if (modeFlags == 0) { + return; + } + + // So here we are: the caller has the assumed permission + // to the uri, and the target doesn't. Let's now give this to + // the target. + + if (DEBUG_URI_PERMISSION) Slog.v(TAG, + "Granting " + targetPkg + "/" + targetUid + " permission to " + uri); + + final String authority = uri.getAuthority(); + final ProviderInfo pi = getProviderInfoLocked(authority, UserHandle.getUserId(targetUid)); + if (pi == null) { + Slog.w(TAG, "No content provider found for grant: " + uri.toSafeString()); + return; + } + + final UriPermission perm = findOrCreateUriPermissionLocked( + pi.packageName, targetPkg, targetUid, uri); + perm.grantModes(modeFlags, persistable, owner); + } + + void grantUriPermissionLocked(int callingUid, String targetPkg, Uri uri, + int modeFlags, UriPermissionOwner owner) { + if (targetPkg == null) { + throw new NullPointerException("targetPkg"); + } + + int targetUid = checkGrantUriPermissionLocked(callingUid, targetPkg, uri, modeFlags, -1); + if (targetUid < 0) { + return; + } + + grantUriPermissionUncheckedLocked(targetUid, targetPkg, uri, modeFlags, owner); + } + + static class NeededUriGrants extends ArrayList<Uri> { + final String targetPkg; + final int targetUid; + final int flags; + + NeededUriGrants(String targetPkg, int targetUid, int flags) { + this.targetPkg = targetPkg; + this.targetUid = targetUid; + this.flags = flags; + } + } + + /** + * Like checkGrantUriPermissionLocked, but takes an Intent. + */ + NeededUriGrants checkGrantUriPermissionFromIntentLocked(int callingUid, + String targetPkg, Intent intent, int mode, NeededUriGrants needed) { + if (DEBUG_URI_PERMISSION) Slog.v(TAG, + "Checking URI perm to data=" + (intent != null ? intent.getData() : null) + + " clip=" + (intent != null ? intent.getClipData() : null) + + " from " + intent + "; flags=0x" + + Integer.toHexString(intent != null ? intent.getFlags() : 0)); + + if (targetPkg == null) { + throw new NullPointerException("targetPkg"); + } + + if (intent == null) { + return null; + } + Uri data = intent.getData(); + ClipData clip = intent.getClipData(); + if (data == null && clip == null) { + return null; + } + + if (data != null) { + int targetUid = checkGrantUriPermissionLocked(callingUid, targetPkg, data, + mode, needed != null ? needed.targetUid : -1); + if (targetUid > 0) { + if (needed == null) { + needed = new NeededUriGrants(targetPkg, targetUid, mode); + } + needed.add(data); + } + } + if (clip != null) { + for (int i=0; i<clip.getItemCount(); i++) { + Uri uri = clip.getItemAt(i).getUri(); + if (uri != null) { + int targetUid = -1; + targetUid = checkGrantUriPermissionLocked(callingUid, targetPkg, uri, + mode, needed != null ? needed.targetUid : -1); + if (targetUid > 0) { + if (needed == null) { + needed = new NeededUriGrants(targetPkg, targetUid, mode); + } + needed.add(uri); + } + } else { + Intent clipIntent = clip.getItemAt(i).getIntent(); + if (clipIntent != null) { + NeededUriGrants newNeeded = checkGrantUriPermissionFromIntentLocked( + callingUid, targetPkg, clipIntent, mode, needed); + if (newNeeded != null) { + needed = newNeeded; + } + } + } + } + } + + return needed; + } + + /** + * Like grantUriPermissionUncheckedLocked, but takes an Intent. + */ + void grantUriPermissionUncheckedFromIntentLocked(NeededUriGrants needed, + UriPermissionOwner owner) { + if (needed != null) { + for (int i=0; i<needed.size(); i++) { + grantUriPermissionUncheckedLocked(needed.targetUid, needed.targetPkg, + needed.get(i), needed.flags, owner); + } + } + } + + void grantUriPermissionFromIntentLocked(int callingUid, + String targetPkg, Intent intent, UriPermissionOwner owner) { + NeededUriGrants needed = checkGrantUriPermissionFromIntentLocked(callingUid, targetPkg, + intent, intent != null ? intent.getFlags() : 0, null); + if (needed == null) { + return; + } + + grantUriPermissionUncheckedFromIntentLocked(needed, owner); + } + + @Override + public void grantUriPermission(IApplicationThread caller, String targetPkg, + Uri uri, int modeFlags) { + enforceNotIsolatedCaller("grantUriPermission"); + synchronized(this) { + final ProcessRecord r = getRecordForAppLocked(caller); + if (r == null) { + throw new SecurityException("Unable to find app for caller " + + caller + + " when granting permission to uri " + uri); + } + if (targetPkg == null) { + throw new IllegalArgumentException("null target"); + } + if (uri == null) { + throw new IllegalArgumentException("null uri"); + } + + // Persistable only supported through Intents + Preconditions.checkFlagsArgument(modeFlags, + Intent.FLAG_GRANT_READ_URI_PERMISSION | Intent.FLAG_GRANT_WRITE_URI_PERMISSION); + + grantUriPermissionLocked(r.uid, targetPkg, uri, modeFlags, + null); + } + } + + void removeUriPermissionIfNeededLocked(UriPermission perm) { + if ((perm.modeFlags&(Intent.FLAG_GRANT_READ_URI_PERMISSION + |Intent.FLAG_GRANT_WRITE_URI_PERMISSION)) == 0) { + ArrayMap<Uri, UriPermission> perms + = mGrantedUriPermissions.get(perm.targetUid); + if (perms != null) { + if (DEBUG_URI_PERMISSION) Slog.v(TAG, + "Removing " + perm.targetUid + " permission to " + perm.uri); + perms.remove(perm.uri); + if (perms.size() == 0) { + mGrantedUriPermissions.remove(perm.targetUid); + } + } + } + } + + private void revokeUriPermissionLocked(int callingUid, Uri uri, int modeFlags) { + if (DEBUG_URI_PERMISSION) Slog.v(TAG, "Revoking all granted permissions to " + uri); + + final IPackageManager pm = AppGlobals.getPackageManager(); + final String authority = uri.getAuthority(); + final ProviderInfo pi = getProviderInfoLocked(authority, UserHandle.getUserId(callingUid)); + if (pi == null) { + Slog.w(TAG, "No content provider found for permission revoke: " + uri.toSafeString()); + return; + } + + // Does the caller have this permission on the URI? + if (!checkHoldingPermissionsLocked(pm, pi, uri, callingUid, modeFlags)) { + // Right now, if you are not the original owner of the permission, + // you are not allowed to revoke it. + //if (!checkUriPermissionLocked(uri, callingUid, modeFlags)) { + throw new SecurityException("Uid " + callingUid + + " does not have permission to uri " + uri); + //} + } + + boolean persistChanged = false; + + // Go through all of the permissions and remove any that match. + final List<String> SEGMENTS = uri.getPathSegments(); + if (SEGMENTS != null) { + final int NS = SEGMENTS.size(); + int N = mGrantedUriPermissions.size(); + for (int i=0; i<N; i++) { + ArrayMap<Uri, UriPermission> perms + = mGrantedUriPermissions.valueAt(i); + Iterator<UriPermission> it = perms.values().iterator(); + toploop: + while (it.hasNext()) { + UriPermission perm = it.next(); + Uri targetUri = perm.uri; + if (!authority.equals(targetUri.getAuthority())) { + continue; + } + List<String> targetSegments = targetUri.getPathSegments(); + if (targetSegments == null) { + continue; + } + if (targetSegments.size() < NS) { + continue; + } + for (int j=0; j<NS; j++) { + if (!SEGMENTS.get(j).equals(targetSegments.get(j))) { + continue toploop; + } + } + if (DEBUG_URI_PERMISSION) Slog.v(TAG, + "Revoking " + perm.targetUid + " permission to " + perm.uri); + persistChanged |= perm.clearModes(modeFlags, true); + if (perm.modeFlags == 0) { + it.remove(); + } + } + if (perms.size() == 0) { + mGrantedUriPermissions.remove( + mGrantedUriPermissions.keyAt(i)); + N--; + i--; + } + } + } + + if (persistChanged) { + schedulePersistUriGrants(); + } + } + + @Override + public void revokeUriPermission(IApplicationThread caller, Uri uri, + int modeFlags) { + enforceNotIsolatedCaller("revokeUriPermission"); + synchronized(this) { + final ProcessRecord r = getRecordForAppLocked(caller); + if (r == null) { + throw new SecurityException("Unable to find app for caller " + + caller + + " when revoking permission to uri " + uri); + } + if (uri == null) { + Slog.w(TAG, "revokeUriPermission: null uri"); + return; + } + + modeFlags &= (Intent.FLAG_GRANT_READ_URI_PERMISSION + | Intent.FLAG_GRANT_WRITE_URI_PERMISSION); + if (modeFlags == 0) { + return; + } + + final IPackageManager pm = AppGlobals.getPackageManager(); + final String authority = uri.getAuthority(); + final ProviderInfo pi = getProviderInfoLocked(authority, r.userId); + if (pi == null) { + Slog.w(TAG, "No content provider found for permission revoke: " + + uri.toSafeString()); + return; + } + + revokeUriPermissionLocked(r.uid, uri, modeFlags); + } + } + + /** + * Remove any {@link UriPermission} granted <em>from</em> or <em>to</em> the + * given package. + * + * @param packageName Package name to match, or {@code null} to apply to all + * packages. + * @param userHandle User to match, or {@link UserHandle#USER_ALL} to apply + * to all users. + * @param persistable If persistable grants should be removed. + */ + private void removeUriPermissionsForPackageLocked( + String packageName, int userHandle, boolean persistable) { + if (userHandle == UserHandle.USER_ALL && packageName == null) { + throw new IllegalArgumentException("Must narrow by either package or user"); + } + + boolean persistChanged = false; + + final int size = mGrantedUriPermissions.size(); + for (int i = 0; i < size; i++) { + // Only inspect grants matching user + if (userHandle == UserHandle.USER_ALL + || userHandle == UserHandle.getUserId(mGrantedUriPermissions.keyAt(i))) { + final Iterator<UriPermission> it = mGrantedUriPermissions.valueAt(i) + .values().iterator(); + while (it.hasNext()) { + final UriPermission perm = it.next(); + + // Only inspect grants matching package + if (packageName == null || perm.sourcePkg.equals(packageName) + || perm.targetPkg.equals(packageName)) { + persistChanged |= perm.clearModes(~0, persistable); + + // Only remove when no modes remain; any persisted grants + // will keep this alive. + if (perm.modeFlags == 0) { + it.remove(); + } + } + } + } + } + + if (persistChanged) { + schedulePersistUriGrants(); + } + } + + @Override + public IBinder newUriPermissionOwner(String name) { + enforceNotIsolatedCaller("newUriPermissionOwner"); + synchronized(this) { + UriPermissionOwner owner = new UriPermissionOwner(this, name); + return owner.getExternalTokenLocked(); + } + } + + @Override + public void grantUriPermissionFromOwner(IBinder token, int fromUid, String targetPkg, + Uri uri, int modeFlags) { + synchronized(this) { + UriPermissionOwner owner = UriPermissionOwner.fromExternalToken(token); + if (owner == null) { + throw new IllegalArgumentException("Unknown owner: " + token); + } + if (fromUid != Binder.getCallingUid()) { + if (Binder.getCallingUid() != Process.myUid()) { + // Only system code can grant URI permissions on behalf + // of other users. + throw new SecurityException("nice try"); + } + } + if (targetPkg == null) { + throw new IllegalArgumentException("null target"); + } + if (uri == null) { + throw new IllegalArgumentException("null uri"); + } + + grantUriPermissionLocked(fromUid, targetPkg, uri, modeFlags, owner); + } + } + + @Override + public void revokeUriPermissionFromOwner(IBinder token, Uri uri, int mode) { + synchronized(this) { + UriPermissionOwner owner = UriPermissionOwner.fromExternalToken(token); + if (owner == null) { + throw new IllegalArgumentException("Unknown owner: " + token); + } + + if (uri == null) { + owner.removeUriPermissionsLocked(mode); + } else { + owner.removeUriPermissionLocked(uri, mode); + } + } + } + + private void schedulePersistUriGrants() { + if (!mHandler.hasMessages(PERSIST_URI_GRANTS_MSG)) { + mHandler.sendMessageDelayed(mHandler.obtainMessage(PERSIST_URI_GRANTS_MSG), + 10 * DateUtils.SECOND_IN_MILLIS); + } + } + + private void writeGrantedUriPermissions() { + if (DEBUG_URI_PERMISSION) Slog.v(TAG, "writeGrantedUriPermissions()"); + + // Snapshot permissions so we can persist without lock + ArrayList<UriPermission.Snapshot> persist = Lists.newArrayList(); + synchronized (this) { + final int size = mGrantedUriPermissions.size(); + for (int i = 0 ; i < size; i++) { + for (UriPermission perm : mGrantedUriPermissions.valueAt(i).values()) { + if (perm.persistedModeFlags != 0) { + persist.add(perm.snapshot()); + } + } + } + } + + FileOutputStream fos = null; + try { + fos = mGrantFile.startWrite(); + + XmlSerializer out = new FastXmlSerializer(); + out.setOutput(fos, "utf-8"); + out.startDocument(null, true); + out.startTag(null, TAG_URI_GRANTS); + for (UriPermission.Snapshot perm : persist) { + out.startTag(null, TAG_URI_GRANT); + writeIntAttribute(out, ATTR_USER_HANDLE, perm.userHandle); + out.attribute(null, ATTR_SOURCE_PKG, perm.sourcePkg); + out.attribute(null, ATTR_TARGET_PKG, perm.targetPkg); + out.attribute(null, ATTR_URI, String.valueOf(perm.uri)); + writeIntAttribute(out, ATTR_MODE_FLAGS, perm.persistedModeFlags); + writeLongAttribute(out, ATTR_CREATED_TIME, perm.persistedCreateTime); + out.endTag(null, TAG_URI_GRANT); + } + out.endTag(null, TAG_URI_GRANTS); + out.endDocument(); + + mGrantFile.finishWrite(fos); + } catch (IOException e) { + if (fos != null) { + mGrantFile.failWrite(fos); + } + } + } + + private void readGrantedUriPermissionsLocked() { + if (DEBUG_URI_PERMISSION) Slog.v(TAG, "readGrantedUriPermissions()"); + + final long now = System.currentTimeMillis(); + + FileInputStream fis = null; + try { + fis = mGrantFile.openRead(); + final XmlPullParser in = Xml.newPullParser(); + in.setInput(fis, null); + + int type; + while ((type = in.next()) != END_DOCUMENT) { + final String tag = in.getName(); + if (type == START_TAG) { + if (TAG_URI_GRANT.equals(tag)) { + final int userHandle = readIntAttribute(in, ATTR_USER_HANDLE); + final String sourcePkg = in.getAttributeValue(null, ATTR_SOURCE_PKG); + final String targetPkg = in.getAttributeValue(null, ATTR_TARGET_PKG); + final Uri uri = Uri.parse(in.getAttributeValue(null, ATTR_URI)); + final int modeFlags = readIntAttribute(in, ATTR_MODE_FLAGS); + final long createdTime = readLongAttribute(in, ATTR_CREATED_TIME, now); + + // Sanity check that provider still belongs to source package + final ProviderInfo pi = getProviderInfoLocked( + uri.getAuthority(), userHandle); + if (pi != null && sourcePkg.equals(pi.packageName)) { + int targetUid = -1; + try { + targetUid = AppGlobals.getPackageManager() + .getPackageUid(targetPkg, userHandle); + } catch (RemoteException e) { + } + if (targetUid != -1) { + final UriPermission perm = findOrCreateUriPermissionLocked( + sourcePkg, targetPkg, targetUid, uri); + perm.initPersistedModes(modeFlags, createdTime); + } + } else { + Slog.w(TAG, "Persisted grant for " + uri + " had source " + sourcePkg + + " but instead found " + pi); + } + } + } + } + } catch (FileNotFoundException e) { + // Missing grants is okay + } catch (IOException e) { + Log.wtf(TAG, "Failed reading Uri grants", e); + } catch (XmlPullParserException e) { + Log.wtf(TAG, "Failed reading Uri grants", e); + } finally { + IoUtils.closeQuietly(fis); + } + } + + @Override + public void takePersistableUriPermission(Uri uri, int modeFlags) { + enforceNotIsolatedCaller("takePersistableUriPermission"); + + Preconditions.checkFlagsArgument(modeFlags, + Intent.FLAG_GRANT_READ_URI_PERMISSION | Intent.FLAG_GRANT_WRITE_URI_PERMISSION); + + synchronized (this) { + final int callingUid = Binder.getCallingUid(); + final UriPermission perm = findUriPermissionLocked(callingUid, uri); + if (perm == null) { + throw new SecurityException("No permission grant found for UID " + callingUid + + " and Uri " + uri.toSafeString()); + } + + boolean persistChanged = perm.takePersistableModes(modeFlags); + persistChanged |= maybePrunePersistedUriGrantsLocked(callingUid); + + if (persistChanged) { + schedulePersistUriGrants(); + } + } + } + + @Override + public void releasePersistableUriPermission(Uri uri, int modeFlags) { + enforceNotIsolatedCaller("releasePersistableUriPermission"); + + Preconditions.checkFlagsArgument(modeFlags, + Intent.FLAG_GRANT_READ_URI_PERMISSION | Intent.FLAG_GRANT_WRITE_URI_PERMISSION); + + synchronized (this) { + final int callingUid = Binder.getCallingUid(); + + final UriPermission perm = findUriPermissionLocked(callingUid, uri); + if (perm == null) { + Slog.w(TAG, "No permission grant found for UID " + callingUid + " and Uri " + + uri.toSafeString()); + return; + } + + final boolean persistChanged = perm.releasePersistableModes(modeFlags); + removeUriPermissionIfNeededLocked(perm); + if (persistChanged) { + schedulePersistUriGrants(); + } + } + } + + /** + * Prune any older {@link UriPermission} for the given UID until outstanding + * persisted grants are below {@link #MAX_PERSISTED_URI_GRANTS}. + * + * @return if any mutations occured that require persisting. + */ + private boolean maybePrunePersistedUriGrantsLocked(int uid) { + final ArrayMap<Uri, UriPermission> perms = mGrantedUriPermissions.get(uid); + if (perms == null) return false; + if (perms.size() < MAX_PERSISTED_URI_GRANTS) return false; + + final ArrayList<UriPermission> persisted = Lists.newArrayList(); + for (UriPermission perm : perms.values()) { + if (perm.persistedModeFlags != 0) { + persisted.add(perm); + } + } + + final int trimCount = persisted.size() - MAX_PERSISTED_URI_GRANTS; + if (trimCount <= 0) return false; + + Collections.sort(persisted, new UriPermission.PersistedTimeComparator()); + for (int i = 0; i < trimCount; i++) { + final UriPermission perm = persisted.get(i); + + if (DEBUG_URI_PERMISSION) { + Slog.v(TAG, "Trimming grant created at " + perm.persistedCreateTime); + } + + perm.releasePersistableModes(~0); + removeUriPermissionIfNeededLocked(perm); + } + + return true; + } + + @Override + public ParceledListSlice<android.content.UriPermission> getPersistedUriPermissions( + String packageName, boolean incoming) { + enforceNotIsolatedCaller("getPersistedUriPermissions"); + Preconditions.checkNotNull(packageName, "packageName"); + + final int callingUid = Binder.getCallingUid(); + final IPackageManager pm = AppGlobals.getPackageManager(); + try { + final int packageUid = pm.getPackageUid(packageName, UserHandle.getUserId(callingUid)); + if (packageUid != callingUid) { + throw new SecurityException( + "Package " + packageName + " does not belong to calling UID " + callingUid); + } + } catch (RemoteException e) { + throw new SecurityException("Failed to verify package name ownership"); + } + + final ArrayList<android.content.UriPermission> result = Lists.newArrayList(); + synchronized (this) { + if (incoming) { + final ArrayMap<Uri, UriPermission> perms = mGrantedUriPermissions.get(callingUid); + if (perms == null) { + Slog.w(TAG, "No permission grants found for " + packageName); + } else { + final int size = perms.size(); + for (int i = 0; i < size; i++) { + final UriPermission perm = perms.valueAt(i); + if (packageName.equals(perm.targetPkg) && perm.persistedModeFlags != 0) { + result.add(perm.buildPersistedPublicApiObject()); + } + } + } + } else { + final int size = mGrantedUriPermissions.size(); + for (int i = 0; i < size; i++) { + final ArrayMap<Uri, UriPermission> perms = mGrantedUriPermissions.valueAt(i); + final int permsSize = perms.size(); + for (int j = 0; j < permsSize; j++) { + final UriPermission perm = perms.valueAt(j); + if (packageName.equals(perm.sourcePkg) && perm.persistedModeFlags != 0) { + result.add(perm.buildPersistedPublicApiObject()); + } + } + } + } + } + return new ParceledListSlice<android.content.UriPermission>(result); + } + + @Override + public void showWaitingForDebugger(IApplicationThread who, boolean waiting) { + synchronized (this) { + ProcessRecord app = + who != null ? getRecordForAppLocked(who) : null; + if (app == null) return; + + Message msg = Message.obtain(); + msg.what = WAIT_FOR_DEBUGGER_MSG; + msg.obj = app; + msg.arg1 = waiting ? 1 : 0; + mHandler.sendMessage(msg); + } + } + + @Override + public void getMemoryInfo(ActivityManager.MemoryInfo outInfo) { + final long homeAppMem = mProcessList.getMemLevel(ProcessList.HOME_APP_ADJ); + final long cachedAppMem = mProcessList.getMemLevel(ProcessList.CACHED_APP_MIN_ADJ); + outInfo.availMem = Process.getFreeMemory(); + outInfo.totalMem = Process.getTotalMemory(); + outInfo.threshold = homeAppMem; + outInfo.lowMemory = outInfo.availMem < (homeAppMem + ((cachedAppMem-homeAppMem)/2)); + outInfo.hiddenAppThreshold = cachedAppMem; + outInfo.secondaryServerThreshold = mProcessList.getMemLevel( + ProcessList.SERVICE_ADJ); + outInfo.visibleAppThreshold = mProcessList.getMemLevel( + ProcessList.VISIBLE_APP_ADJ); + outInfo.foregroundAppThreshold = mProcessList.getMemLevel( + ProcessList.FOREGROUND_APP_ADJ); + } + + // ========================================================= + // TASK MANAGEMENT + // ========================================================= + + @Override + public List<RunningTaskInfo> getTasks(int maxNum, int flags, + IThumbnailReceiver receiver) { + ArrayList<RunningTaskInfo> list = new ArrayList<RunningTaskInfo>(); + + PendingThumbnailsRecord pending = new PendingThumbnailsRecord(receiver); + ActivityRecord topRecord = null; + + synchronized(this) { + if (localLOGV) Slog.v( + TAG, "getTasks: max=" + maxNum + ", flags=" + flags + + ", receiver=" + receiver); + + if (checkCallingPermission(android.Manifest.permission.GET_TASKS) + != PackageManager.PERMISSION_GRANTED) { + if (receiver != null) { + // If the caller wants to wait for pending thumbnails, + // it ain't gonna get them. + try { + receiver.finished(); + } catch (RemoteException ex) { + } + } + String msg = "Permission Denial: getTasks() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " requires " + android.Manifest.permission.GET_TASKS; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + + // TODO: Improve with MRU list from all ActivityStacks. + topRecord = mStackSupervisor.getTasksLocked(maxNum, receiver, pending, list); + + if (!pending.pendingRecords.isEmpty()) { + mPendingThumbnails.add(pending); + } + } + + if (localLOGV) Slog.v(TAG, "We have pending thumbnails: " + pending); + + if (topRecord != null) { + if (localLOGV) Slog.v(TAG, "Requesting top thumbnail"); + try { + IApplicationThread topThumbnail = topRecord.app.thread; + topThumbnail.requestThumbnail(topRecord.appToken); + } catch (Exception e) { + Slog.w(TAG, "Exception thrown when requesting thumbnail", e); + sendPendingThumbnail(null, topRecord.appToken, null, null, true); + } + } + + if (pending == null && receiver != null) { + // In this case all thumbnails were available and the client + // is being asked to be told when the remaining ones come in... + // which is unusually, since the top-most currently running + // activity should never have a canned thumbnail! Oh well. + try { + receiver.finished(); + } catch (RemoteException ex) { + } + } + + return list; + } + + TaskRecord getMostRecentTask() { + return mRecentTasks.get(0); + } + + @Override + public List<ActivityManager.RecentTaskInfo> getRecentTasks(int maxNum, + int flags, int userId) { + userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(), userId, + false, true, "getRecentTasks", null); + + synchronized (this) { + enforceCallingPermission(android.Manifest.permission.GET_TASKS, + "getRecentTasks()"); + final boolean detailed = checkCallingPermission( + android.Manifest.permission.GET_DETAILED_TASKS) + == PackageManager.PERMISSION_GRANTED; + + IPackageManager pm = AppGlobals.getPackageManager(); + + final int N = mRecentTasks.size(); + ArrayList<ActivityManager.RecentTaskInfo> res + = new ArrayList<ActivityManager.RecentTaskInfo>( + maxNum < N ? maxNum : N); + for (int i=0; i<N && maxNum > 0; i++) { + TaskRecord tr = mRecentTasks.get(i); + // Only add calling user's recent tasks + if (tr.userId != userId) continue; + // Return the entry if desired by the caller. We always return + // the first entry, because callers always expect this to be the + // foreground app. We may filter others if the caller has + // not supplied RECENT_WITH_EXCLUDED and there is some reason + // we should exclude the entry. + + if (i == 0 + || ((flags&ActivityManager.RECENT_WITH_EXCLUDED) != 0) + || (tr.intent == null) + || ((tr.intent.getFlags() + &Intent.FLAG_ACTIVITY_EXCLUDE_FROM_RECENTS) == 0)) { + ActivityManager.RecentTaskInfo rti + = new ActivityManager.RecentTaskInfo(); + rti.id = tr.numActivities > 0 ? tr.taskId : -1; + rti.persistentId = tr.taskId; + rti.baseIntent = new Intent( + tr.intent != null ? tr.intent : tr.affinityIntent); + if (!detailed) { + rti.baseIntent.replaceExtras((Bundle)null); + } + rti.origActivity = tr.origActivity; + rti.description = tr.lastDescription; + rti.stackId = tr.stack.mStackId; + + if ((flags&ActivityManager.RECENT_IGNORE_UNAVAILABLE) != 0) { + // Check whether this activity is currently available. + try { + if (rti.origActivity != null) { + if (pm.getActivityInfo(rti.origActivity, 0, userId) + == null) { + continue; + } + } else if (rti.baseIntent != null) { + if (pm.queryIntentActivities(rti.baseIntent, + null, 0, userId) == null) { + continue; + } + } + } catch (RemoteException e) { + // Will never happen. + } + } + + res.add(rti); + maxNum--; + } + } + return res; + } + } + + private TaskRecord recentTaskForIdLocked(int id) { + final int N = mRecentTasks.size(); + for (int i=0; i<N; i++) { + TaskRecord tr = mRecentTasks.get(i); + if (tr.taskId == id) { + return tr; + } + } + return null; + } + + @Override + public ActivityManager.TaskThumbnails getTaskThumbnails(int id) { + synchronized (this) { + enforceCallingPermission(android.Manifest.permission.READ_FRAME_BUFFER, + "getTaskThumbnails()"); + TaskRecord tr = recentTaskForIdLocked(id); + if (tr != null) { + return tr.getTaskThumbnailsLocked(); + } + } + return null; + } + + @Override + public Bitmap getTaskTopThumbnail(int id) { + synchronized (this) { + enforceCallingPermission(android.Manifest.permission.READ_FRAME_BUFFER, + "getTaskTopThumbnail()"); + TaskRecord tr = recentTaskForIdLocked(id); + if (tr != null) { + return tr.getTaskTopThumbnailLocked(); + } + } + return null; + } + + @Override + public boolean removeSubTask(int taskId, int subTaskIndex) { + synchronized (this) { + enforceCallingPermission(android.Manifest.permission.REMOVE_TASKS, + "removeSubTask()"); + long ident = Binder.clearCallingIdentity(); + try { + TaskRecord tr = recentTaskForIdLocked(taskId); + if (tr != null) { + return tr.removeTaskActivitiesLocked(subTaskIndex, true) != null; + } + return false; + } finally { + Binder.restoreCallingIdentity(ident); + } + } + } + + private void killUnneededProcessLocked(ProcessRecord pr, String reason) { + if (!pr.killedByAm) { + Slog.i(TAG, "Killing " + pr.toShortString() + " (adj " + pr.setAdj + "): " + reason); + EventLog.writeEvent(EventLogTags.AM_KILL, pr.userId, pr.pid, + pr.processName, pr.setAdj, reason); + pr.killedByAm = true; + Process.killProcessQuiet(pr.pid); + } + } + + private void cleanUpRemovedTaskLocked(TaskRecord tr, int flags) { + tr.disposeThumbnail(); + mRecentTasks.remove(tr); + final boolean killProcesses = (flags&ActivityManager.REMOVE_TASK_KILL_PROCESS) != 0; + Intent baseIntent = new Intent( + tr.intent != null ? tr.intent : tr.affinityIntent); + ComponentName component = baseIntent.getComponent(); + if (component == null) { + Slog.w(TAG, "Now component for base intent of task: " + tr); + return; + } + + // Find any running services associated with this app. + mServices.cleanUpRemovedTaskLocked(tr, component, baseIntent); + + if (killProcesses) { + // Find any running processes associated with this app. + final String pkg = component.getPackageName(); + ArrayList<ProcessRecord> procs = new ArrayList<ProcessRecord>(); + ArrayMap<String, SparseArray<ProcessRecord>> pmap = mProcessNames.getMap(); + for (int i=0; i<pmap.size(); i++) { + SparseArray<ProcessRecord> uids = pmap.valueAt(i); + for (int j=0; j<uids.size(); j++) { + ProcessRecord proc = uids.valueAt(j); + if (proc.userId != tr.userId) { + continue; + } + if (!proc.pkgList.containsKey(pkg)) { + continue; + } + procs.add(proc); + } + } + + // Kill the running processes. + for (int i=0; i<procs.size(); i++) { + ProcessRecord pr = procs.get(i); + if (pr == mHomeProcess) { + // Don't kill the home process along with tasks from the same package. + continue; + } + if (pr.setSchedGroup == Process.THREAD_GROUP_BG_NONINTERACTIVE) { + killUnneededProcessLocked(pr, "remove task"); + } else { + pr.waitingToKill = "remove task"; + } + } + } + } + + @Override + public boolean removeTask(int taskId, int flags) { + synchronized (this) { + enforceCallingPermission(android.Manifest.permission.REMOVE_TASKS, + "removeTask()"); + long ident = Binder.clearCallingIdentity(); + try { + TaskRecord tr = recentTaskForIdLocked(taskId); + if (tr != null) { + ActivityRecord r = tr.removeTaskActivitiesLocked(-1, false); + if (r != null) { + cleanUpRemovedTaskLocked(tr, flags); + return true; + } + if (tr.mActivities.size() == 0) { + // Caller is just removing a recent task that is + // not actively running. That is easy! + cleanUpRemovedTaskLocked(tr, flags); + return true; + } + Slog.w(TAG, "removeTask: task " + taskId + + " does not have activities to remove, " + + " but numActivities=" + tr.numActivities + + ": " + tr); + } + } finally { + Binder.restoreCallingIdentity(ident); + } + } + return false; + } + + /** + * TODO: Add mController hook + */ + @Override + public void moveTaskToFront(int task, int flags, Bundle options) { + enforceCallingPermission(android.Manifest.permission.REORDER_TASKS, + "moveTaskToFront()"); + + if (DEBUG_STACK) Slog.d(TAG, "moveTaskToFront: moving task=" + task); + synchronized(this) { + if (!checkAppSwitchAllowedLocked(Binder.getCallingPid(), + Binder.getCallingUid(), "Task to front")) { + ActivityOptions.abort(options); + return; + } + final long origId = Binder.clearCallingIdentity(); + try { + mStackSupervisor.findTaskToMoveToFrontLocked(task, flags, options); + } finally { + Binder.restoreCallingIdentity(origId); + } + ActivityOptions.abort(options); + } + } + + @Override + public void moveTaskToBack(int taskId) { + enforceCallingPermission(android.Manifest.permission.REORDER_TASKS, + "moveTaskToBack()"); + + synchronized(this) { + TaskRecord tr = recentTaskForIdLocked(taskId); + if (tr != null) { + if (DEBUG_STACK) Slog.d(TAG, "moveTaskToBack: moving task=" + tr); + ActivityStack stack = tr.stack; + if (stack.mResumedActivity != null && stack.mResumedActivity.task == tr) { + if (!checkAppSwitchAllowedLocked(Binder.getCallingPid(), + Binder.getCallingUid(), "Task to back")) { + return; + } + } + final long origId = Binder.clearCallingIdentity(); + try { + stack.moveTaskToBackLocked(taskId, null); + } finally { + Binder.restoreCallingIdentity(origId); + } + } + } + } + + /** + * Moves an activity, and all of the other activities within the same task, to the bottom + * of the history stack. The activity's order within the task is unchanged. + * + * @param token A reference to the activity we wish to move + * @param nonRoot If false then this only works if the activity is the root + * of a task; if true it will work for any activity in a task. + * @return Returns true if the move completed, false if not. + */ + @Override + public boolean moveActivityTaskToBack(IBinder token, boolean nonRoot) { + enforceNotIsolatedCaller("moveActivityTaskToBack"); + synchronized(this) { + final long origId = Binder.clearCallingIdentity(); + int taskId = ActivityRecord.getTaskForActivityLocked(token, !nonRoot); + if (taskId >= 0) { + return ActivityRecord.getStackLocked(token).moveTaskToBackLocked(taskId, null); + } + Binder.restoreCallingIdentity(origId); + } + return false; + } + + @Override + public void moveTaskBackwards(int task) { + enforceCallingPermission(android.Manifest.permission.REORDER_TASKS, + "moveTaskBackwards()"); + + synchronized(this) { + if (!checkAppSwitchAllowedLocked(Binder.getCallingPid(), + Binder.getCallingUid(), "Task backwards")) { + return; + } + final long origId = Binder.clearCallingIdentity(); + moveTaskBackwardsLocked(task); + Binder.restoreCallingIdentity(origId); + } + } + + private final void moveTaskBackwardsLocked(int task) { + Slog.e(TAG, "moveTaskBackwards not yet implemented!"); + } + + @Override + public IBinder getHomeActivityToken() throws RemoteException { + enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS, + "getHomeActivityToken()"); + synchronized (this) { + return mStackSupervisor.getHomeActivityToken(); + } + } + + @Override + public IActivityContainer createActivityContainer(IBinder parentActivityToken, + IActivityContainerCallback callback) throws RemoteException { + enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS, + "createActivityContainer()"); + synchronized (this) { + if (parentActivityToken == null) { + throw new IllegalArgumentException("parent token must not be null"); + } + ActivityRecord r = ActivityRecord.forToken(parentActivityToken); + if (r == null) { + return null; + } + return mStackSupervisor.createActivityContainer(r, callback); + } + } + + @Override + public void moveTaskToStack(int taskId, int stackId, boolean toTop) { + enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS, + "moveTaskToStack()"); + if (stackId == HOME_STACK_ID) { + Slog.e(TAG, "moveTaskToStack: Attempt to move task " + taskId + " to home stack", + new RuntimeException("here").fillInStackTrace()); + } + synchronized (this) { + long ident = Binder.clearCallingIdentity(); + try { + if (DEBUG_STACK) Slog.d(TAG, "moveTaskToStack: moving task=" + taskId + " to stackId=" + + stackId + " toTop=" + toTop); + mStackSupervisor.moveTaskToStack(taskId, stackId, toTop); + } finally { + Binder.restoreCallingIdentity(ident); + } + } + } + + @Override + public void resizeStack(int stackBoxId, Rect bounds) { + enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS, + "resizeStackBox()"); + long ident = Binder.clearCallingIdentity(); + try { + mWindowManager.resizeStack(stackBoxId, bounds); + } finally { + Binder.restoreCallingIdentity(ident); + } + } + + @Override + public List<StackInfo> getAllStackInfos() { + enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS, + "getAllStackInfos()"); + long ident = Binder.clearCallingIdentity(); + try { + synchronized (this) { + return mStackSupervisor.getAllStackInfosLocked(); + } + } finally { + Binder.restoreCallingIdentity(ident); + } + } + + @Override + public StackInfo getStackInfo(int stackId) { + enforceCallingPermission(android.Manifest.permission.MANAGE_ACTIVITY_STACKS, + "getStackInfo()"); + long ident = Binder.clearCallingIdentity(); + try { + synchronized (this) { + return mStackSupervisor.getStackInfoLocked(stackId); + } + } finally { + Binder.restoreCallingIdentity(ident); + } + } + + @Override + public int getTaskForActivity(IBinder token, boolean onlyRoot) { + synchronized(this) { + return ActivityRecord.getTaskForActivityLocked(token, onlyRoot); + } + } + + // ========================================================= + // THUMBNAILS + // ========================================================= + + public void reportThumbnail(IBinder token, + Bitmap thumbnail, CharSequence description) { + //System.out.println("Report thumbnail for " + token + ": " + thumbnail); + final long origId = Binder.clearCallingIdentity(); + sendPendingThumbnail(null, token, thumbnail, description, true); + Binder.restoreCallingIdentity(origId); + } + + final void sendPendingThumbnail(ActivityRecord r, IBinder token, + Bitmap thumbnail, CharSequence description, boolean always) { + TaskRecord task; + ArrayList<PendingThumbnailsRecord> receivers = null; + + //System.out.println("Send pending thumbnail: " + r); + + synchronized(this) { + if (r == null) { + r = ActivityRecord.isInStackLocked(token); + if (r == null) { + return; + } + } + if (thumbnail == null && r.thumbHolder != null) { + thumbnail = r.thumbHolder.lastThumbnail; + description = r.thumbHolder.lastDescription; + } + if (thumbnail == null && !always) { + // If there is no thumbnail, and this entry is not actually + // going away, then abort for now and pick up the next + // thumbnail we get. + return; + } + task = r.task; + + int N = mPendingThumbnails.size(); + int i=0; + while (i<N) { + PendingThumbnailsRecord pr = mPendingThumbnails.get(i); + //System.out.println("Looking in " + pr.pendingRecords); + if (pr.pendingRecords.remove(r)) { + if (receivers == null) { + receivers = new ArrayList<PendingThumbnailsRecord>(); + } + receivers.add(pr); + if (pr.pendingRecords.size() == 0) { + pr.finished = true; + mPendingThumbnails.remove(i); + N--; + continue; + } + } + i++; + } + } + + if (receivers != null) { + final int N = receivers.size(); + for (int i=0; i<N; i++) { + try { + PendingThumbnailsRecord pr = receivers.get(i); + pr.receiver.newThumbnail( + task != null ? task.taskId : -1, thumbnail, description); + if (pr.finished) { + pr.receiver.finished(); + } + } catch (Exception e) { + Slog.w(TAG, "Exception thrown when sending thumbnail", e); + } + } + } + } + + // ========================================================= + // CONTENT PROVIDERS + // ========================================================= + + private final List<ProviderInfo> generateApplicationProvidersLocked(ProcessRecord app) { + List<ProviderInfo> providers = null; + try { + providers = AppGlobals.getPackageManager(). + queryContentProviders(app.processName, app.uid, + STOCK_PM_FLAGS | PackageManager.GET_URI_PERMISSION_PATTERNS); + } catch (RemoteException ex) { + } + if (DEBUG_MU) + Slog.v(TAG_MU, "generateApplicationProvidersLocked, app.info.uid = " + app.uid); + int userId = app.userId; + if (providers != null) { + int N = providers.size(); + app.pubProviders.ensureCapacity(N + app.pubProviders.size()); + for (int i=0; i<N; i++) { + ProviderInfo cpi = + (ProviderInfo)providers.get(i); + boolean singleton = isSingleton(cpi.processName, cpi.applicationInfo, + cpi.name, cpi.flags); + if (singleton && UserHandle.getUserId(app.uid) != 0) { + // This is a singleton provider, but a user besides the + // default user is asking to initialize a process it runs + // in... well, no, it doesn't actually run in this process, + // it runs in the process of the default user. Get rid of it. + providers.remove(i); + N--; + i--; + continue; + } + + ComponentName comp = new ComponentName(cpi.packageName, cpi.name); + ContentProviderRecord cpr = mProviderMap.getProviderByClass(comp, userId); + if (cpr == null) { + cpr = new ContentProviderRecord(this, cpi, app.info, comp, singleton); + mProviderMap.putProviderByClass(comp, cpr); + } + if (DEBUG_MU) + Slog.v(TAG_MU, "generateApplicationProvidersLocked, cpi.uid = " + cpr.uid); + app.pubProviders.put(cpi.name, cpr); + if (!cpi.multiprocess || !"android".equals(cpi.packageName)) { + // Don't add this if it is a platform component that is marked + // to run in multiple processes, because this is actually + // part of the framework so doesn't make sense to track as a + // separate apk in the process. + app.addPackage(cpi.applicationInfo.packageName, mProcessStats); + } + ensurePackageDexOpt(cpi.applicationInfo.packageName); + } + } + return providers; + } + + /** + * Check if {@link ProcessRecord} has a possible chance at accessing the + * given {@link ProviderInfo}. Final permission checking is always done + * in {@link ContentProvider}. + */ + private final String checkContentProviderPermissionLocked( + ProviderInfo cpi, ProcessRecord r) { + final int callingPid = (r != null) ? r.pid : Binder.getCallingPid(); + final int callingUid = (r != null) ? r.uid : Binder.getCallingUid(); + if (checkComponentPermission(cpi.readPermission, callingPid, callingUid, + cpi.applicationInfo.uid, cpi.exported) + == PackageManager.PERMISSION_GRANTED) { + return null; + } + if (checkComponentPermission(cpi.writePermission, callingPid, callingUid, + cpi.applicationInfo.uid, cpi.exported) + == PackageManager.PERMISSION_GRANTED) { + return null; + } + + PathPermission[] pps = cpi.pathPermissions; + if (pps != null) { + int i = pps.length; + while (i > 0) { + i--; + PathPermission pp = pps[i]; + if (checkComponentPermission(pp.getReadPermission(), callingPid, callingUid, + cpi.applicationInfo.uid, cpi.exported) + == PackageManager.PERMISSION_GRANTED) { + return null; + } + if (checkComponentPermission(pp.getWritePermission(), callingPid, callingUid, + cpi.applicationInfo.uid, cpi.exported) + == PackageManager.PERMISSION_GRANTED) { + return null; + } + } + } + + ArrayMap<Uri, UriPermission> perms = mGrantedUriPermissions.get(callingUid); + if (perms != null) { + for (Map.Entry<Uri, UriPermission> uri : perms.entrySet()) { + if (uri.getKey().getAuthority().equals(cpi.authority)) { + return null; + } + } + } + + String msg; + if (!cpi.exported) { + msg = "Permission Denial: opening provider " + cpi.name + + " from " + (r != null ? r : "(null)") + " (pid=" + callingPid + + ", uid=" + callingUid + ") that is not exported from uid " + + cpi.applicationInfo.uid; + } else { + msg = "Permission Denial: opening provider " + cpi.name + + " from " + (r != null ? r : "(null)") + " (pid=" + callingPid + + ", uid=" + callingUid + ") requires " + + cpi.readPermission + " or " + cpi.writePermission; + } + Slog.w(TAG, msg); + return msg; + } + + ContentProviderConnection incProviderCountLocked(ProcessRecord r, + final ContentProviderRecord cpr, IBinder externalProcessToken, boolean stable) { + if (r != null) { + for (int i=0; i<r.conProviders.size(); i++) { + ContentProviderConnection conn = r.conProviders.get(i); + if (conn.provider == cpr) { + if (DEBUG_PROVIDER) Slog.v(TAG, + "Adding provider requested by " + + r.processName + " from process " + + cpr.info.processName + ": " + cpr.name.flattenToShortString() + + " scnt=" + conn.stableCount + " uscnt=" + conn.unstableCount); + if (stable) { + conn.stableCount++; + conn.numStableIncs++; + } else { + conn.unstableCount++; + conn.numUnstableIncs++; + } + return conn; + } + } + ContentProviderConnection conn = new ContentProviderConnection(cpr, r); + if (stable) { + conn.stableCount = 1; + conn.numStableIncs = 1; + } else { + conn.unstableCount = 1; + conn.numUnstableIncs = 1; + } + cpr.connections.add(conn); + r.conProviders.add(conn); + return conn; + } + cpr.addExternalProcessHandleLocked(externalProcessToken); + return null; + } + + boolean decProviderCountLocked(ContentProviderConnection conn, + ContentProviderRecord cpr, IBinder externalProcessToken, boolean stable) { + if (conn != null) { + cpr = conn.provider; + if (DEBUG_PROVIDER) Slog.v(TAG, + "Removing provider requested by " + + conn.client.processName + " from process " + + cpr.info.processName + ": " + cpr.name.flattenToShortString() + + " scnt=" + conn.stableCount + " uscnt=" + conn.unstableCount); + if (stable) { + conn.stableCount--; + } else { + conn.unstableCount--; + } + if (conn.stableCount == 0 && conn.unstableCount == 0) { + cpr.connections.remove(conn); + conn.client.conProviders.remove(conn); + return true; + } + return false; + } + cpr.removeExternalProcessHandleLocked(externalProcessToken); + return false; + } + + private final ContentProviderHolder getContentProviderImpl(IApplicationThread caller, + String name, IBinder token, boolean stable, int userId) { + ContentProviderRecord cpr; + ContentProviderConnection conn = null; + ProviderInfo cpi = null; + + synchronized(this) { + ProcessRecord r = null; + if (caller != null) { + r = getRecordForAppLocked(caller); + if (r == null) { + throw new SecurityException( + "Unable to find app for caller " + caller + + " (pid=" + Binder.getCallingPid() + + ") when getting content provider " + name); + } + } + + // First check if this content provider has been published... + cpr = mProviderMap.getProviderByName(name, userId); + boolean providerRunning = cpr != null; + if (providerRunning) { + cpi = cpr.info; + String msg; + if ((msg=checkContentProviderPermissionLocked(cpi, r)) != null) { + throw new SecurityException(msg); + } + + if (r != null && cpr.canRunHere(r)) { + // This provider has been published or is in the process + // of being published... but it is also allowed to run + // in the caller's process, so don't make a connection + // and just let the caller instantiate its own instance. + ContentProviderHolder holder = cpr.newHolder(null); + // don't give caller the provider object, it needs + // to make its own. + holder.provider = null; + return holder; + } + + final long origId = Binder.clearCallingIdentity(); + + // In this case the provider instance already exists, so we can + // return it right away. + conn = incProviderCountLocked(r, cpr, token, stable); + if (conn != null && (conn.stableCount+conn.unstableCount) == 1) { + if (cpr.proc != null && r.setAdj <= ProcessList.PERCEPTIBLE_APP_ADJ) { + // If this is a perceptible app accessing the provider, + // make sure to count it as being accessed and thus + // back up on the LRU list. This is good because + // content providers are often expensive to start. + updateLruProcessLocked(cpr.proc, false, null); + } + } + + if (cpr.proc != null) { + if (false) { + if (cpr.name.flattenToShortString().equals( + "com.android.providers.calendar/.CalendarProvider2")) { + Slog.v(TAG, "****************** KILLING " + + cpr.name.flattenToShortString()); + Process.killProcess(cpr.proc.pid); + } + } + boolean success = updateOomAdjLocked(cpr.proc); + if (DEBUG_PROVIDER) Slog.i(TAG, "Adjust success: " + success); + // NOTE: there is still a race here where a signal could be + // pending on the process even though we managed to update its + // adj level. Not sure what to do about this, but at least + // the race is now smaller. + if (!success) { + // Uh oh... it looks like the provider's process + // has been killed on us. We need to wait for a new + // process to be started, and make sure its death + // doesn't kill our process. + Slog.i(TAG, + "Existing provider " + cpr.name.flattenToShortString() + + " is crashing; detaching " + r); + boolean lastRef = decProviderCountLocked(conn, cpr, token, stable); + appDiedLocked(cpr.proc, cpr.proc.pid, cpr.proc.thread); + if (!lastRef) { + // This wasn't the last ref our process had on + // the provider... we have now been killed, bail. + return null; + } + providerRunning = false; + conn = null; + } + } + + Binder.restoreCallingIdentity(origId); + } + + boolean singleton; + if (!providerRunning) { + try { + cpi = AppGlobals.getPackageManager(). + resolveContentProvider(name, + STOCK_PM_FLAGS | PackageManager.GET_URI_PERMISSION_PATTERNS, userId); + } catch (RemoteException ex) { + } + if (cpi == null) { + return null; + } + singleton = isSingleton(cpi.processName, cpi.applicationInfo, + cpi.name, cpi.flags); + if (singleton) { + userId = 0; + } + cpi.applicationInfo = getAppInfoForUser(cpi.applicationInfo, userId); + + String msg; + if ((msg=checkContentProviderPermissionLocked(cpi, r)) != null) { + throw new SecurityException(msg); + } + + if (!mProcessesReady && !mDidUpdate && !mWaitingUpdate + && !cpi.processName.equals("system")) { + // If this content provider does not run in the system + // process, and the system is not yet ready to run other + // processes, then fail fast instead of hanging. + throw new IllegalArgumentException( + "Attempt to launch content provider before system ready"); + } + + // Make sure that the user who owns this provider is started. If not, + // we don't want to allow it to run. + if (mStartedUsers.get(userId) == null) { + Slog.w(TAG, "Unable to launch app " + + cpi.applicationInfo.packageName + "/" + + cpi.applicationInfo.uid + " for provider " + + name + ": user " + userId + " is stopped"); + return null; + } + + ComponentName comp = new ComponentName(cpi.packageName, cpi.name); + cpr = mProviderMap.getProviderByClass(comp, userId); + final boolean firstClass = cpr == null; + if (firstClass) { + try { + ApplicationInfo ai = + AppGlobals.getPackageManager(). + getApplicationInfo( + cpi.applicationInfo.packageName, + STOCK_PM_FLAGS, userId); + if (ai == null) { + Slog.w(TAG, "No package info for content provider " + + cpi.name); + return null; + } + ai = getAppInfoForUser(ai, userId); + cpr = new ContentProviderRecord(this, cpi, ai, comp, singleton); + } catch (RemoteException ex) { + // pm is in same process, this will never happen. + } + } + + if (r != null && cpr.canRunHere(r)) { + // If this is a multiprocess provider, then just return its + // info and allow the caller to instantiate it. Only do + // this if the provider is the same user as the caller's + // process, or can run as root (so can be in any process). + return cpr.newHolder(null); + } + + if (DEBUG_PROVIDER) { + RuntimeException e = new RuntimeException("here"); + Slog.w(TAG, "LAUNCHING REMOTE PROVIDER (myuid " + (r != null ? r.uid : null) + + " pruid " + cpr.appInfo.uid + "): " + cpr.info.name, e); + } + + // This is single process, and our app is now connecting to it. + // See if we are already in the process of launching this + // provider. + final int N = mLaunchingProviders.size(); + int i; + for (i=0; i<N; i++) { + if (mLaunchingProviders.get(i) == cpr) { + break; + } + } + + // If the provider is not already being launched, then get it + // started. + if (i >= N) { + final long origId = Binder.clearCallingIdentity(); + + try { + // Content provider is now in use, its package can't be stopped. + try { + AppGlobals.getPackageManager().setPackageStoppedState( + cpr.appInfo.packageName, false, userId); + } catch (RemoteException e) { + } catch (IllegalArgumentException e) { + Slog.w(TAG, "Failed trying to unstop package " + + cpr.appInfo.packageName + ": " + e); + } + + // Use existing process if already started + ProcessRecord proc = getProcessRecordLocked( + cpi.processName, cpr.appInfo.uid, false); + if (proc != null && proc.thread != null) { + if (DEBUG_PROVIDER) { + Slog.d(TAG, "Installing in existing process " + proc); + } + proc.pubProviders.put(cpi.name, cpr); + try { + proc.thread.scheduleInstallProvider(cpi); + } catch (RemoteException e) { + } + } else { + proc = startProcessLocked(cpi.processName, + cpr.appInfo, false, 0, "content provider", + new ComponentName(cpi.applicationInfo.packageName, + cpi.name), false, false, false); + if (proc == null) { + Slog.w(TAG, "Unable to launch app " + + cpi.applicationInfo.packageName + "/" + + cpi.applicationInfo.uid + " for provider " + + name + ": process is bad"); + return null; + } + } + cpr.launchingApp = proc; + mLaunchingProviders.add(cpr); + } finally { + Binder.restoreCallingIdentity(origId); + } + } + + // Make sure the provider is published (the same provider class + // may be published under multiple names). + if (firstClass) { + mProviderMap.putProviderByClass(comp, cpr); + } + + mProviderMap.putProviderByName(name, cpr); + conn = incProviderCountLocked(r, cpr, token, stable); + if (conn != null) { + conn.waiting = true; + } + } + } + + // Wait for the provider to be published... + synchronized (cpr) { + while (cpr.provider == null) { + if (cpr.launchingApp == null) { + Slog.w(TAG, "Unable to launch app " + + cpi.applicationInfo.packageName + "/" + + cpi.applicationInfo.uid + " for provider " + + name + ": launching app became null"); + EventLog.writeEvent(EventLogTags.AM_PROVIDER_LOST_PROCESS, + UserHandle.getUserId(cpi.applicationInfo.uid), + cpi.applicationInfo.packageName, + cpi.applicationInfo.uid, name); + return null; + } + try { + if (DEBUG_MU) { + Slog.v(TAG_MU, "Waiting to start provider " + cpr + " launchingApp=" + + cpr.launchingApp); + } + if (conn != null) { + conn.waiting = true; + } + cpr.wait(); + } catch (InterruptedException ex) { + } finally { + if (conn != null) { + conn.waiting = false; + } + } + } + } + return cpr != null ? cpr.newHolder(conn) : null; + } + + public final ContentProviderHolder getContentProvider( + IApplicationThread caller, String name, int userId, boolean stable) { + enforceNotIsolatedCaller("getContentProvider"); + if (caller == null) { + String msg = "null IApplicationThread when getting content provider " + + name; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + + userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(), userId, + false, true, "getContentProvider", null); + return getContentProviderImpl(caller, name, null, stable, userId); + } + + public ContentProviderHolder getContentProviderExternal( + String name, int userId, IBinder token) { + enforceCallingPermission(android.Manifest.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY, + "Do not have permission in call getContentProviderExternal()"); + userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(), userId, + false, true, "getContentProvider", null); + return getContentProviderExternalUnchecked(name, token, userId); + } + + private ContentProviderHolder getContentProviderExternalUnchecked(String name, + IBinder token, int userId) { + return getContentProviderImpl(null, name, token, true, userId); + } + + /** + * Drop a content provider from a ProcessRecord's bookkeeping + */ + public void removeContentProvider(IBinder connection, boolean stable) { + enforceNotIsolatedCaller("removeContentProvider"); + synchronized (this) { + ContentProviderConnection conn; + try { + conn = (ContentProviderConnection)connection; + } catch (ClassCastException e) { + String msg ="removeContentProvider: " + connection + + " not a ContentProviderConnection"; + Slog.w(TAG, msg); + throw new IllegalArgumentException(msg); + } + if (conn == null) { + throw new NullPointerException("connection is null"); + } + if (decProviderCountLocked(conn, null, null, stable)) { + updateOomAdjLocked(); + } + } + } + + public void removeContentProviderExternal(String name, IBinder token) { + enforceCallingPermission(android.Manifest.permission.ACCESS_CONTENT_PROVIDERS_EXTERNALLY, + "Do not have permission in call removeContentProviderExternal()"); + removeContentProviderExternalUnchecked(name, token, UserHandle.getCallingUserId()); + } + + private void removeContentProviderExternalUnchecked(String name, IBinder token, int userId) { + synchronized (this) { + ContentProviderRecord cpr = mProviderMap.getProviderByName(name, userId); + if(cpr == null) { + //remove from mProvidersByClass + if(localLOGV) Slog.v(TAG, name+" content provider not found in providers list"); + return; + } + + //update content provider record entry info + ComponentName comp = new ComponentName(cpr.info.packageName, cpr.info.name); + ContentProviderRecord localCpr = mProviderMap.getProviderByClass(comp, userId); + if (localCpr.hasExternalProcessHandles()) { + if (localCpr.removeExternalProcessHandleLocked(token)) { + updateOomAdjLocked(); + } else { + Slog.e(TAG, "Attmpt to remove content provider " + localCpr + + " with no external reference for token: " + + token + "."); + } + } else { + Slog.e(TAG, "Attmpt to remove content provider: " + localCpr + + " with no external references."); + } + } + } + + public final void publishContentProviders(IApplicationThread caller, + List<ContentProviderHolder> providers) { + if (providers == null) { + return; + } + + enforceNotIsolatedCaller("publishContentProviders"); + synchronized (this) { + final ProcessRecord r = getRecordForAppLocked(caller); + if (DEBUG_MU) + Slog.v(TAG_MU, "ProcessRecord uid = " + r.uid); + if (r == null) { + throw new SecurityException( + "Unable to find app for caller " + caller + + " (pid=" + Binder.getCallingPid() + + ") when publishing content providers"); + } + + final long origId = Binder.clearCallingIdentity(); + + final int N = providers.size(); + for (int i=0; i<N; i++) { + ContentProviderHolder src = providers.get(i); + if (src == null || src.info == null || src.provider == null) { + continue; + } + ContentProviderRecord dst = r.pubProviders.get(src.info.name); + if (DEBUG_MU) + Slog.v(TAG_MU, "ContentProviderRecord uid = " + dst.uid); + if (dst != null) { + ComponentName comp = new ComponentName(dst.info.packageName, dst.info.name); + mProviderMap.putProviderByClass(comp, dst); + String names[] = dst.info.authority.split(";"); + for (int j = 0; j < names.length; j++) { + mProviderMap.putProviderByName(names[j], dst); + } + + int NL = mLaunchingProviders.size(); + int j; + for (j=0; j<NL; j++) { + if (mLaunchingProviders.get(j) == dst) { + mLaunchingProviders.remove(j); + j--; + NL--; + } + } + synchronized (dst) { + dst.provider = src.provider; + dst.proc = r; + dst.notifyAll(); + } + updateOomAdjLocked(r); + } + } + + Binder.restoreCallingIdentity(origId); + } + } + + public boolean refContentProvider(IBinder connection, int stable, int unstable) { + ContentProviderConnection conn; + try { + conn = (ContentProviderConnection)connection; + } catch (ClassCastException e) { + String msg ="refContentProvider: " + connection + + " not a ContentProviderConnection"; + Slog.w(TAG, msg); + throw new IllegalArgumentException(msg); + } + if (conn == null) { + throw new NullPointerException("connection is null"); + } + + synchronized (this) { + if (stable > 0) { + conn.numStableIncs += stable; + } + stable = conn.stableCount + stable; + if (stable < 0) { + throw new IllegalStateException("stableCount < 0: " + stable); + } + + if (unstable > 0) { + conn.numUnstableIncs += unstable; + } + unstable = conn.unstableCount + unstable; + if (unstable < 0) { + throw new IllegalStateException("unstableCount < 0: " + unstable); + } + + if ((stable+unstable) <= 0) { + throw new IllegalStateException("ref counts can't go to zero here: stable=" + + stable + " unstable=" + unstable); + } + conn.stableCount = stable; + conn.unstableCount = unstable; + return !conn.dead; + } + } + + public void unstableProviderDied(IBinder connection) { + ContentProviderConnection conn; + try { + conn = (ContentProviderConnection)connection; + } catch (ClassCastException e) { + String msg ="refContentProvider: " + connection + + " not a ContentProviderConnection"; + Slog.w(TAG, msg); + throw new IllegalArgumentException(msg); + } + if (conn == null) { + throw new NullPointerException("connection is null"); + } + + // Safely retrieve the content provider associated with the connection. + IContentProvider provider; + synchronized (this) { + provider = conn.provider.provider; + } + + if (provider == null) { + // Um, yeah, we're way ahead of you. + return; + } + + // Make sure the caller is being honest with us. + if (provider.asBinder().pingBinder()) { + // Er, no, still looks good to us. + synchronized (this) { + Slog.w(TAG, "unstableProviderDied: caller " + Binder.getCallingUid() + + " says " + conn + " died, but we don't agree"); + return; + } + } + + // Well look at that! It's dead! + synchronized (this) { + if (conn.provider.provider != provider) { + // But something changed... good enough. + return; + } + + ProcessRecord proc = conn.provider.proc; + if (proc == null || proc.thread == null) { + // Seems like the process is already cleaned up. + return; + } + + // As far as we're concerned, this is just like receiving a + // death notification... just a bit prematurely. + Slog.i(TAG, "Process " + proc.processName + " (pid " + proc.pid + + ") early provider death"); + final long ident = Binder.clearCallingIdentity(); + try { + appDiedLocked(proc, proc.pid, proc.thread); + } finally { + Binder.restoreCallingIdentity(ident); + } + } + } + + @Override + public void appNotRespondingViaProvider(IBinder connection) { + enforceCallingPermission( + android.Manifest.permission.REMOVE_TASKS, "appNotRespondingViaProvider()"); + + final ContentProviderConnection conn = (ContentProviderConnection) connection; + if (conn == null) { + Slog.w(TAG, "ContentProviderConnection is null"); + return; + } + + final ProcessRecord host = conn.provider.proc; + if (host == null) { + Slog.w(TAG, "Failed to find hosting ProcessRecord"); + return; + } + + final long token = Binder.clearCallingIdentity(); + try { + appNotResponding(host, null, null, false, "ContentProvider not responding"); + } finally { + Binder.restoreCallingIdentity(token); + } + } + + public static final void installSystemProviders() { + List<ProviderInfo> providers; + synchronized (mSelf) { + ProcessRecord app = mSelf.mProcessNames.get("system", Process.SYSTEM_UID); + providers = mSelf.generateApplicationProvidersLocked(app); + if (providers != null) { + for (int i=providers.size()-1; i>=0; i--) { + ProviderInfo pi = (ProviderInfo)providers.get(i); + if ((pi.applicationInfo.flags&ApplicationInfo.FLAG_SYSTEM) == 0) { + Slog.w(TAG, "Not installing system proc provider " + pi.name + + ": not system .apk"); + providers.remove(i); + } + } + } + } + if (providers != null) { + mSystemThread.installSystemProviders(providers); + } + + mSelf.mCoreSettingsObserver = new CoreSettingsObserver(mSelf); + + mSelf.mUsageStatsService.monitorPackages(); + } + + /** + * Allows app to retrieve the MIME type of a URI without having permission + * to access its content provider. + * + * CTS tests for this functionality can be run with "runtest cts-appsecurity". + * + * Test cases are at cts/tests/appsecurity-tests/test-apps/UsePermissionDiffCert/ + * src/com/android/cts/usespermissiondiffcertapp/AccessPermissionWithDiffSigTest.java + */ + public String getProviderMimeType(Uri uri, int userId) { + enforceNotIsolatedCaller("getProviderMimeType"); + userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(), + userId, false, true, "getProviderMimeType", null); + final String name = uri.getAuthority(); + final long ident = Binder.clearCallingIdentity(); + ContentProviderHolder holder = null; + + try { + holder = getContentProviderExternalUnchecked(name, null, userId); + if (holder != null) { + return holder.provider.getType(uri); + } + } catch (RemoteException e) { + Log.w(TAG, "Content provider dead retrieving " + uri, e); + return null; + } finally { + if (holder != null) { + removeContentProviderExternalUnchecked(name, null, userId); + } + Binder.restoreCallingIdentity(ident); + } + + return null; + } + + // ========================================================= + // GLOBAL MANAGEMENT + // ========================================================= + + final ProcessRecord newProcessRecordLocked(ApplicationInfo info, String customProcess, + boolean isolated) { + String proc = customProcess != null ? customProcess : info.processName; + BatteryStatsImpl.Uid.Proc ps = null; + BatteryStatsImpl stats = mBatteryStatsService.getActiveStatistics(); + int uid = info.uid; + if (isolated) { + int userId = UserHandle.getUserId(uid); + int stepsLeft = Process.LAST_ISOLATED_UID - Process.FIRST_ISOLATED_UID + 1; + while (true) { + if (mNextIsolatedProcessUid < Process.FIRST_ISOLATED_UID + || mNextIsolatedProcessUid > Process.LAST_ISOLATED_UID) { + mNextIsolatedProcessUid = Process.FIRST_ISOLATED_UID; + } + uid = UserHandle.getUid(userId, mNextIsolatedProcessUid); + mNextIsolatedProcessUid++; + if (mIsolatedProcesses.indexOfKey(uid) < 0) { + // No process for this uid, use it. + break; + } + stepsLeft--; + if (stepsLeft <= 0) { + return null; + } + } + } + return new ProcessRecord(stats, info, proc, uid); + } + + final ProcessRecord addAppLocked(ApplicationInfo info, boolean isolated) { + ProcessRecord app; + if (!isolated) { + app = getProcessRecordLocked(info.processName, info.uid, true); + } else { + app = null; + } + + if (app == null) { + app = newProcessRecordLocked(info, null, isolated); + mProcessNames.put(info.processName, app.uid, app); + if (isolated) { + mIsolatedProcesses.put(app.uid, app); + } + updateLruProcessLocked(app, false, null); + updateOomAdjLocked(); + } + + // This package really, really can not be stopped. + try { + AppGlobals.getPackageManager().setPackageStoppedState( + info.packageName, false, UserHandle.getUserId(app.uid)); + } catch (RemoteException e) { + } catch (IllegalArgumentException e) { + Slog.w(TAG, "Failed trying to unstop package " + + info.packageName + ": " + e); + } + + if ((info.flags&(ApplicationInfo.FLAG_SYSTEM|ApplicationInfo.FLAG_PERSISTENT)) + == (ApplicationInfo.FLAG_SYSTEM|ApplicationInfo.FLAG_PERSISTENT)) { + app.persistent = true; + app.maxAdj = ProcessList.PERSISTENT_PROC_ADJ; + } + if (app.thread == null && mPersistentStartingProcesses.indexOf(app) < 0) { + mPersistentStartingProcesses.add(app); + startProcessLocked(app, "added application", app.processName); + } + + return app; + } + + public void unhandledBack() { + enforceCallingPermission(android.Manifest.permission.FORCE_BACK, + "unhandledBack()"); + + synchronized(this) { + final long origId = Binder.clearCallingIdentity(); + try { + getFocusedStack().unhandledBackLocked(); + } finally { + Binder.restoreCallingIdentity(origId); + } + } + } + + public ParcelFileDescriptor openContentUri(Uri uri) throws RemoteException { + enforceNotIsolatedCaller("openContentUri"); + final int userId = UserHandle.getCallingUserId(); + String name = uri.getAuthority(); + ContentProviderHolder cph = getContentProviderExternalUnchecked(name, null, userId); + ParcelFileDescriptor pfd = null; + if (cph != null) { + // We record the binder invoker's uid in thread-local storage before + // going to the content provider to open the file. Later, in the code + // that handles all permissions checks, we look for this uid and use + // that rather than the Activity Manager's own uid. The effect is that + // we do the check against the caller's permissions even though it looks + // to the content provider like the Activity Manager itself is making + // the request. + sCallerIdentity.set(new Identity( + Binder.getCallingPid(), Binder.getCallingUid())); + try { + pfd = cph.provider.openFile(null, uri, "r", null); + } catch (FileNotFoundException e) { + // do nothing; pfd will be returned null + } finally { + // Ensure that whatever happens, we clean up the identity state + sCallerIdentity.remove(); + } + + // We've got the fd now, so we're done with the provider. + removeContentProviderExternalUnchecked(name, null, userId); + } else { + Slog.d(TAG, "Failed to get provider for authority '" + name + "'"); + } + return pfd; + } + + // Actually is sleeping or shutting down or whatever else in the future + // is an inactive state. + public boolean isSleepingOrShuttingDown() { + return mSleeping || mShuttingDown; + } + + public void goingToSleep() { + if (checkCallingPermission(android.Manifest.permission.DEVICE_POWER) + != PackageManager.PERMISSION_GRANTED) { + throw new SecurityException("Requires permission " + + android.Manifest.permission.DEVICE_POWER); + } + + synchronized(this) { + mWentToSleep = true; + updateEventDispatchingLocked(); + + if (!mSleeping) { + mSleeping = true; + mStackSupervisor.goingToSleepLocked(); + + // Initialize the wake times of all processes. + checkExcessivePowerUsageLocked(false); + mHandler.removeMessages(CHECK_EXCESSIVE_WAKE_LOCKS_MSG); + Message nmsg = mHandler.obtainMessage(CHECK_EXCESSIVE_WAKE_LOCKS_MSG); + mHandler.sendMessageDelayed(nmsg, POWER_CHECK_DELAY); + } + } + } + + @Override + public boolean shutdown(int timeout) { + if (checkCallingPermission(android.Manifest.permission.SHUTDOWN) + != PackageManager.PERMISSION_GRANTED) { + throw new SecurityException("Requires permission " + + android.Manifest.permission.SHUTDOWN); + } + + boolean timedout = false; + + synchronized(this) { + mShuttingDown = true; + updateEventDispatchingLocked(); + timedout = mStackSupervisor.shutdownLocked(timeout); + } + + mAppOpsService.shutdown(); + mUsageStatsService.shutdown(); + mBatteryStatsService.shutdown(); + synchronized (this) { + mProcessStats.shutdownLocked(); + } + + return timedout; + } + + public final void activitySlept(IBinder token) { + if (localLOGV) Slog.v(TAG, "Activity slept: token=" + token); + + final long origId = Binder.clearCallingIdentity(); + + synchronized (this) { + final ActivityRecord r = ActivityRecord.isInStackLocked(token); + if (r != null) { + mStackSupervisor.activitySleptLocked(r); + } + } + + Binder.restoreCallingIdentity(origId); + } + + void logLockScreen(String msg) { + if (DEBUG_LOCKSCREEN) Slog.d(TAG, Debug.getCallers(2) + ":" + msg + + " mLockScreenShown=" + mLockScreenShown + " mWentToSleep=" + + mWentToSleep + " mSleeping=" + mSleeping + " mDismissKeyguardOnNextActivity=" + + mStackSupervisor.mDismissKeyguardOnNextActivity); + } + + private void comeOutOfSleepIfNeededLocked() { + if (!mWentToSleep && !mLockScreenShown) { + if (mSleeping) { + mSleeping = false; + mStackSupervisor.comeOutOfSleepIfNeededLocked(); + } + } + } + + public void wakingUp() { + if (checkCallingPermission(android.Manifest.permission.DEVICE_POWER) + != PackageManager.PERMISSION_GRANTED) { + throw new SecurityException("Requires permission " + + android.Manifest.permission.DEVICE_POWER); + } + + synchronized(this) { + mWentToSleep = false; + updateEventDispatchingLocked(); + comeOutOfSleepIfNeededLocked(); + } + } + + private void updateEventDispatchingLocked() { + mWindowManager.setEventDispatching(mBooted && !mWentToSleep && !mShuttingDown); + } + + public void setLockScreenShown(boolean shown) { + if (checkCallingPermission(android.Manifest.permission.DEVICE_POWER) + != PackageManager.PERMISSION_GRANTED) { + throw new SecurityException("Requires permission " + + android.Manifest.permission.DEVICE_POWER); + } + + synchronized(this) { + long ident = Binder.clearCallingIdentity(); + try { + if (DEBUG_LOCKSCREEN) logLockScreen(" shown=" + shown); + mLockScreenShown = shown; + comeOutOfSleepIfNeededLocked(); + } finally { + Binder.restoreCallingIdentity(ident); + } + } + } + + public void stopAppSwitches() { + if (checkCallingPermission(android.Manifest.permission.STOP_APP_SWITCHES) + != PackageManager.PERMISSION_GRANTED) { + throw new SecurityException("Requires permission " + + android.Manifest.permission.STOP_APP_SWITCHES); + } + + synchronized(this) { + mAppSwitchesAllowedTime = SystemClock.uptimeMillis() + + APP_SWITCH_DELAY_TIME; + mDidAppSwitch = false; + mHandler.removeMessages(DO_PENDING_ACTIVITY_LAUNCHES_MSG); + Message msg = mHandler.obtainMessage(DO_PENDING_ACTIVITY_LAUNCHES_MSG); + mHandler.sendMessageDelayed(msg, APP_SWITCH_DELAY_TIME); + } + } + + public void resumeAppSwitches() { + if (checkCallingPermission(android.Manifest.permission.STOP_APP_SWITCHES) + != PackageManager.PERMISSION_GRANTED) { + throw new SecurityException("Requires permission " + + android.Manifest.permission.STOP_APP_SWITCHES); + } + + synchronized(this) { + // Note that we don't execute any pending app switches... we will + // let those wait until either the timeout, or the next start + // activity request. + mAppSwitchesAllowedTime = 0; + } + } + + boolean checkAppSwitchAllowedLocked(int callingPid, int callingUid, + String name) { + if (mAppSwitchesAllowedTime < SystemClock.uptimeMillis()) { + return true; + } + + final int perm = checkComponentPermission( + android.Manifest.permission.STOP_APP_SWITCHES, callingPid, + callingUid, -1, true); + if (perm == PackageManager.PERMISSION_GRANTED) { + return true; + } + + Slog.w(TAG, name + " request from " + callingUid + " stopped"); + return false; + } + + public void setDebugApp(String packageName, boolean waitForDebugger, + boolean persistent) { + enforceCallingPermission(android.Manifest.permission.SET_DEBUG_APP, + "setDebugApp()"); + + long ident = Binder.clearCallingIdentity(); + try { + // Note that this is not really thread safe if there are multiple + // callers into it at the same time, but that's not a situation we + // care about. + if (persistent) { + final ContentResolver resolver = mContext.getContentResolver(); + Settings.Global.putString( + resolver, Settings.Global.DEBUG_APP, + packageName); + Settings.Global.putInt( + resolver, Settings.Global.WAIT_FOR_DEBUGGER, + waitForDebugger ? 1 : 0); + } + + synchronized (this) { + if (!persistent) { + mOrigDebugApp = mDebugApp; + mOrigWaitForDebugger = mWaitForDebugger; + } + mDebugApp = packageName; + mWaitForDebugger = waitForDebugger; + mDebugTransient = !persistent; + if (packageName != null) { + forceStopPackageLocked(packageName, -1, false, false, true, true, + UserHandle.USER_ALL, "set debug app"); + } + } + } finally { + Binder.restoreCallingIdentity(ident); + } + } + + void setOpenGlTraceApp(ApplicationInfo app, String processName) { + synchronized (this) { + boolean isDebuggable = "1".equals(SystemProperties.get(SYSTEM_DEBUGGABLE, "0")); + if (!isDebuggable) { + if ((app.flags&ApplicationInfo.FLAG_DEBUGGABLE) == 0) { + throw new SecurityException("Process not debuggable: " + app.packageName); + } + } + + mOpenGlTraceApp = processName; + } + } + + void setProfileApp(ApplicationInfo app, String processName, String profileFile, + ParcelFileDescriptor profileFd, boolean autoStopProfiler) { + synchronized (this) { + boolean isDebuggable = "1".equals(SystemProperties.get(SYSTEM_DEBUGGABLE, "0")); + if (!isDebuggable) { + if ((app.flags&ApplicationInfo.FLAG_DEBUGGABLE) == 0) { + throw new SecurityException("Process not debuggable: " + app.packageName); + } + } + mProfileApp = processName; + mProfileFile = profileFile; + if (mProfileFd != null) { + try { + mProfileFd.close(); + } catch (IOException e) { + } + mProfileFd = null; + } + mProfileFd = profileFd; + mProfileType = 0; + mAutoStopProfiler = autoStopProfiler; + } + } + + @Override + public void setAlwaysFinish(boolean enabled) { + enforceCallingPermission(android.Manifest.permission.SET_ALWAYS_FINISH, + "setAlwaysFinish()"); + + Settings.Global.putInt( + mContext.getContentResolver(), + Settings.Global.ALWAYS_FINISH_ACTIVITIES, enabled ? 1 : 0); + + synchronized (this) { + mAlwaysFinishActivities = enabled; + } + } + + @Override + public void setActivityController(IActivityController controller) { + enforceCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER, + "setActivityController()"); + synchronized (this) { + mController = controller; + Watchdog.getInstance().setActivityController(controller); + } + } + + @Override + public void setUserIsMonkey(boolean userIsMonkey) { + synchronized (this) { + synchronized (mPidsSelfLocked) { + final int callingPid = Binder.getCallingPid(); + ProcessRecord precessRecord = mPidsSelfLocked.get(callingPid); + if (precessRecord == null) { + throw new SecurityException("Unknown process: " + callingPid); + } + if (precessRecord.instrumentationUiAutomationConnection == null) { + throw new SecurityException("Only an instrumentation process " + + "with a UiAutomation can call setUserIsMonkey"); + } + } + mUserIsMonkey = userIsMonkey; + } + } + + @Override + public boolean isUserAMonkey() { + synchronized (this) { + // If there is a controller also implies the user is a monkey. + return (mUserIsMonkey || mController != null); + } + } + + public void requestBugReport() { + enforceCallingPermission(android.Manifest.permission.DUMP, "requestBugReport"); + SystemProperties.set("ctl.start", "bugreport"); + } + + public static long getInputDispatchingTimeoutLocked(ActivityRecord r) { + return r != null ? getInputDispatchingTimeoutLocked(r.app) : KEY_DISPATCHING_TIMEOUT; + } + + public static long getInputDispatchingTimeoutLocked(ProcessRecord r) { + if (r != null && (r.instrumentationClass != null || r.usingWrapper)) { + return INSTRUMENTATION_KEY_DISPATCHING_TIMEOUT; + } + return KEY_DISPATCHING_TIMEOUT; + } + + @Override + public long inputDispatchingTimedOut(int pid, final boolean aboveSystem, String reason) { + if (checkCallingPermission(android.Manifest.permission.FILTER_EVENTS) + != PackageManager.PERMISSION_GRANTED) { + throw new SecurityException("Requires permission " + + android.Manifest.permission.FILTER_EVENTS); + } + ProcessRecord proc; + long timeout; + synchronized (this) { + synchronized (mPidsSelfLocked) { + proc = mPidsSelfLocked.get(pid); + } + timeout = getInputDispatchingTimeoutLocked(proc); + } + + if (!inputDispatchingTimedOut(proc, null, null, aboveSystem, reason)) { + return -1; + } + + return timeout; + } + + /** + * Handle input dispatching timeouts. + * Returns whether input dispatching should be aborted or not. + */ + public boolean inputDispatchingTimedOut(final ProcessRecord proc, + final ActivityRecord activity, final ActivityRecord parent, + final boolean aboveSystem, String reason) { + if (checkCallingPermission(android.Manifest.permission.FILTER_EVENTS) + != PackageManager.PERMISSION_GRANTED) { + throw new SecurityException("Requires permission " + + android.Manifest.permission.FILTER_EVENTS); + } + + final String annotation; + if (reason == null) { + annotation = "Input dispatching timed out"; + } else { + annotation = "Input dispatching timed out (" + reason + ")"; + } + + if (proc != null) { + synchronized (this) { + if (proc.debugging) { + return false; + } + + if (mDidDexOpt) { + // Give more time since we were dexopting. + mDidDexOpt = false; + return false; + } + + if (proc.instrumentationClass != null) { + Bundle info = new Bundle(); + info.putString("shortMsg", "keyDispatchingTimedOut"); + info.putString("longMsg", annotation); + finishInstrumentationLocked(proc, Activity.RESULT_CANCELED, info); + return true; + } + } + mHandler.post(new Runnable() { + @Override + public void run() { + appNotResponding(proc, activity, parent, aboveSystem, annotation); + } + }); + } + + return true; + } + + public Bundle getAssistContextExtras(int requestType) { + enforceCallingPermission(android.Manifest.permission.GET_TOP_ACTIVITY_INFO, + "getAssistContextExtras()"); + PendingAssistExtras pae; + Bundle extras = new Bundle(); + synchronized (this) { + ActivityRecord activity = getFocusedStack().mResumedActivity; + if (activity == null) { + Slog.w(TAG, "getAssistContextExtras failed: no resumed activity"); + return null; + } + extras.putString(Intent.EXTRA_ASSIST_PACKAGE, activity.packageName); + if (activity.app == null || activity.app.thread == null) { + Slog.w(TAG, "getAssistContextExtras failed: no process for " + activity); + return extras; + } + if (activity.app.pid == Binder.getCallingPid()) { + Slog.w(TAG, "getAssistContextExtras failed: request process same as " + activity); + return extras; + } + pae = new PendingAssistExtras(activity); + try { + activity.app.thread.requestAssistContextExtras(activity.appToken, pae, + requestType); + mPendingAssistExtras.add(pae); + mHandler.postDelayed(pae, PENDING_ASSIST_EXTRAS_TIMEOUT); + } catch (RemoteException e) { + Slog.w(TAG, "getAssistContextExtras failed: crash calling " + activity); + return extras; + } + } + synchronized (pae) { + while (!pae.haveResult) { + try { + pae.wait(); + } catch (InterruptedException e) { + } + } + if (pae.result != null) { + extras.putBundle(Intent.EXTRA_ASSIST_CONTEXT, pae.result); + } + } + synchronized (this) { + mPendingAssistExtras.remove(pae); + mHandler.removeCallbacks(pae); + } + return extras; + } + + public void reportAssistContextExtras(IBinder token, Bundle extras) { + PendingAssistExtras pae = (PendingAssistExtras)token; + synchronized (pae) { + pae.result = extras; + pae.haveResult = true; + pae.notifyAll(); + } + } + + public void registerProcessObserver(IProcessObserver observer) { + enforceCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER, + "registerProcessObserver()"); + synchronized (this) { + mProcessObservers.register(observer); + } + } + + @Override + public void unregisterProcessObserver(IProcessObserver observer) { + synchronized (this) { + mProcessObservers.unregister(observer); + } + } + + @Override + public boolean convertFromTranslucent(IBinder token) { + final long origId = Binder.clearCallingIdentity(); + try { + synchronized (this) { + final ActivityRecord r = ActivityRecord.isInStackLocked(token); + if (r == null) { + return false; + } + if (r.changeWindowTranslucency(true)) { + mWindowManager.setAppFullscreen(token, true); + mStackSupervisor.ensureActivitiesVisibleLocked(null, 0); + return true; + } + return false; + } + } finally { + Binder.restoreCallingIdentity(origId); + } + } + + @Override + public boolean convertToTranslucent(IBinder token) { + final long origId = Binder.clearCallingIdentity(); + try { + synchronized (this) { + final ActivityRecord r = ActivityRecord.isInStackLocked(token); + if (r == null) { + return false; + } + if (r.changeWindowTranslucency(false)) { + r.task.stack.convertToTranslucent(r); + mWindowManager.setAppFullscreen(token, false); + mStackSupervisor.ensureActivitiesVisibleLocked(null, 0); + return true; + } + return false; + } + } finally { + Binder.restoreCallingIdentity(origId); + } + } + + @Override + public void setImmersive(IBinder token, boolean immersive) { + synchronized(this) { + final ActivityRecord r = ActivityRecord.isInStackLocked(token); + if (r == null) { + throw new IllegalArgumentException(); + } + r.immersive = immersive; + + // update associated state if we're frontmost + if (r == mFocusedActivity) { + if (DEBUG_IMMERSIVE) { + Slog.d(TAG, "Frontmost changed immersion: "+ r); + } + applyUpdateLockStateLocked(r); + } + } + } + + @Override + public boolean isImmersive(IBinder token) { + synchronized (this) { + ActivityRecord r = ActivityRecord.isInStackLocked(token); + if (r == null) { + throw new IllegalArgumentException(); + } + return r.immersive; + } + } + + public boolean isTopActivityImmersive() { + enforceNotIsolatedCaller("startActivity"); + synchronized (this) { + ActivityRecord r = getFocusedStack().topRunningActivityLocked(null); + return (r != null) ? r.immersive : false; + } + } + + public final void enterSafeMode() { + synchronized(this) { + // It only makes sense to do this before the system is ready + // and started launching other packages. + if (!mSystemReady) { + try { + AppGlobals.getPackageManager().enterSafeMode(); + } catch (RemoteException e) { + } + } + } + } + + public final void showSafeModeOverlay() { + View v = LayoutInflater.from(mContext).inflate( + com.android.internal.R.layout.safe_mode, null); + WindowManager.LayoutParams lp = new WindowManager.LayoutParams(); + lp.type = WindowManager.LayoutParams.TYPE_SECURE_SYSTEM_OVERLAY; + lp.width = WindowManager.LayoutParams.WRAP_CONTENT; + lp.height = WindowManager.LayoutParams.WRAP_CONTENT; + lp.gravity = Gravity.BOTTOM | Gravity.START; + lp.format = v.getBackground().getOpacity(); + lp.flags = WindowManager.LayoutParams.FLAG_NOT_FOCUSABLE + | WindowManager.LayoutParams.FLAG_NOT_TOUCHABLE; + lp.privateFlags |= WindowManager.LayoutParams.PRIVATE_FLAG_SHOW_FOR_ALL_USERS; + ((WindowManager)mContext.getSystemService( + Context.WINDOW_SERVICE)).addView(v, lp); + } + + public void noteWakeupAlarm(IIntentSender sender) { + if (!(sender instanceof PendingIntentRecord)) { + return; + } + BatteryStatsImpl stats = mBatteryStatsService.getActiveStatistics(); + synchronized (stats) { + if (mBatteryStatsService.isOnBattery()) { + mBatteryStatsService.enforceCallingPermission(); + PendingIntentRecord rec = (PendingIntentRecord)sender; + int MY_UID = Binder.getCallingUid(); + int uid = rec.uid == MY_UID ? Process.SYSTEM_UID : rec.uid; + BatteryStatsImpl.Uid.Pkg pkg = + stats.getPackageStatsLocked(uid, rec.key.packageName); + pkg.incWakeupsLocked(); + } + } + } + + public boolean killPids(int[] pids, String pReason, boolean secure) { + if (Binder.getCallingUid() != Process.SYSTEM_UID) { + throw new SecurityException("killPids only available to the system"); + } + String reason = (pReason == null) ? "Unknown" : pReason; + // XXX Note: don't acquire main activity lock here, because the window + // manager calls in with its locks held. + + boolean killed = false; + synchronized (mPidsSelfLocked) { + int[] types = new int[pids.length]; + int worstType = 0; + for (int i=0; i<pids.length; i++) { + ProcessRecord proc = mPidsSelfLocked.get(pids[i]); + if (proc != null) { + int type = proc.setAdj; + types[i] = type; + if (type > worstType) { + worstType = type; + } + } + } + + // If the worst oom_adj is somewhere in the cached proc LRU range, + // then constrain it so we will kill all cached procs. + if (worstType < ProcessList.CACHED_APP_MAX_ADJ + && worstType > ProcessList.CACHED_APP_MIN_ADJ) { + worstType = ProcessList.CACHED_APP_MIN_ADJ; + } + + // If this is not a secure call, don't let it kill processes that + // are important. + if (!secure && worstType < ProcessList.SERVICE_ADJ) { + worstType = ProcessList.SERVICE_ADJ; + } + + Slog.w(TAG, "Killing processes " + reason + " at adjustment " + worstType); + for (int i=0; i<pids.length; i++) { + ProcessRecord proc = mPidsSelfLocked.get(pids[i]); + if (proc == null) { + continue; + } + int adj = proc.setAdj; + if (adj >= worstType && !proc.killedByAm) { + killUnneededProcessLocked(proc, reason); + killed = true; + } + } + } + return killed; + } + + @Override + public void killUid(int uid, String reason) { + if (Binder.getCallingUid() != Process.SYSTEM_UID) { + throw new SecurityException("killUid only available to the system"); + } + synchronized (this) { + killPackageProcessesLocked(null, UserHandle.getAppId(uid), UserHandle.getUserId(uid), + ProcessList.FOREGROUND_APP_ADJ-1, false, true, true, false, + reason != null ? reason : "kill uid"); + } + } + + @Override + public boolean killProcessesBelowForeground(String reason) { + if (Binder.getCallingUid() != Process.SYSTEM_UID) { + throw new SecurityException("killProcessesBelowForeground() only available to system"); + } + + return killProcessesBelowAdj(ProcessList.FOREGROUND_APP_ADJ, reason); + } + + private boolean killProcessesBelowAdj(int belowAdj, String reason) { + if (Binder.getCallingUid() != Process.SYSTEM_UID) { + throw new SecurityException("killProcessesBelowAdj() only available to system"); + } + + boolean killed = false; + synchronized (mPidsSelfLocked) { + final int size = mPidsSelfLocked.size(); + for (int i = 0; i < size; i++) { + final int pid = mPidsSelfLocked.keyAt(i); + final ProcessRecord proc = mPidsSelfLocked.valueAt(i); + if (proc == null) continue; + + final int adj = proc.setAdj; + if (adj > belowAdj && !proc.killedByAm) { + killUnneededProcessLocked(proc, reason); + killed = true; + } + } + } + return killed; + } + + @Override + public void hang(final IBinder who, boolean allowRestart) { + if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER) + != PackageManager.PERMISSION_GRANTED) { + throw new SecurityException("Requires permission " + + android.Manifest.permission.SET_ACTIVITY_WATCHER); + } + + final IBinder.DeathRecipient death = new DeathRecipient() { + @Override + public void binderDied() { + synchronized (this) { + notifyAll(); + } + } + }; + + try { + who.linkToDeath(death, 0); + } catch (RemoteException e) { + Slog.w(TAG, "hang: given caller IBinder is already dead."); + return; + } + + synchronized (this) { + Watchdog.getInstance().setAllowRestart(allowRestart); + Slog.i(TAG, "Hanging system process at request of pid " + Binder.getCallingPid()); + synchronized (death) { + while (who.isBinderAlive()) { + try { + death.wait(); + } catch (InterruptedException e) { + } + } + } + Watchdog.getInstance().setAllowRestart(true); + } + } + + @Override + public void restart() { + if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER) + != PackageManager.PERMISSION_GRANTED) { + throw new SecurityException("Requires permission " + + android.Manifest.permission.SET_ACTIVITY_WATCHER); + } + + Log.i(TAG, "Sending shutdown broadcast..."); + + BroadcastReceiver br = new BroadcastReceiver() { + @Override public void onReceive(Context context, Intent intent) { + // Now the broadcast is done, finish up the low-level shutdown. + Log.i(TAG, "Shutting down activity manager..."); + shutdown(10000); + Log.i(TAG, "Shutdown complete, restarting!"); + Process.killProcess(Process.myPid()); + System.exit(10); + } + }; + + // First send the high-level shut down broadcast. + Intent intent = new Intent(Intent.ACTION_SHUTDOWN); + intent.addFlags(Intent.FLAG_RECEIVER_FOREGROUND); + intent.putExtra(Intent.EXTRA_SHUTDOWN_USERSPACE_ONLY, true); + /* For now we are not doing a clean shutdown, because things seem to get unhappy. + mContext.sendOrderedBroadcastAsUser(intent, + UserHandle.ALL, null, br, mHandler, 0, null, null); + */ + br.onReceive(mContext, intent); + } + + private long getLowRamTimeSinceIdle(long now) { + return mLowRamTimeSinceLastIdle + (mLowRamStartTime > 0 ? (now-mLowRamStartTime) : 0); + } + + @Override + public void performIdleMaintenance() { + if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER) + != PackageManager.PERMISSION_GRANTED) { + throw new SecurityException("Requires permission " + + android.Manifest.permission.SET_ACTIVITY_WATCHER); + } + + synchronized (this) { + final long now = SystemClock.uptimeMillis(); + final long timeSinceLastIdle = now - mLastIdleTime; + final long lowRamSinceLastIdle = getLowRamTimeSinceIdle(now); + mLastIdleTime = now; + mLowRamTimeSinceLastIdle = 0; + if (mLowRamStartTime != 0) { + mLowRamStartTime = now; + } + + StringBuilder sb = new StringBuilder(128); + sb.append("Idle maintenance over "); + TimeUtils.formatDuration(timeSinceLastIdle, sb); + sb.append(" low RAM for "); + TimeUtils.formatDuration(lowRamSinceLastIdle, sb); + Slog.i(TAG, sb.toString()); + + // If at least 1/3 of our time since the last idle period has been spent + // with RAM low, then we want to kill processes. + boolean doKilling = lowRamSinceLastIdle > (timeSinceLastIdle/3); + + for (int i = mLruProcesses.size() - 1 ; i >= 0 ; i--) { + ProcessRecord proc = mLruProcesses.get(i); + if (proc.notCachedSinceIdle) { + if (proc.setProcState > ActivityManager.PROCESS_STATE_TOP + && proc.setProcState <= ActivityManager.PROCESS_STATE_SERVICE) { + if (doKilling && proc.initialIdlePss != 0 + && proc.lastPss > ((proc.initialIdlePss*3)/2)) { + killUnneededProcessLocked(proc, "idle maint (pss " + proc.lastPss + + " from " + proc.initialIdlePss + ")"); + } + } + } else if (proc.setProcState < ActivityManager.PROCESS_STATE_HOME) { + proc.notCachedSinceIdle = true; + proc.initialIdlePss = 0; + proc.nextPssTime = ProcessList.computeNextPssTime(proc.curProcState, true, + mSleeping, now); + } + } + + mHandler.removeMessages(REQUEST_ALL_PSS_MSG); + mHandler.sendEmptyMessageDelayed(REQUEST_ALL_PSS_MSG, 2*60*1000); + } + } + + public final void startRunning(String pkg, String cls, String action, + String data) { + synchronized(this) { + if (mStartRunning) { + return; + } + mStartRunning = true; + mTopComponent = pkg != null && cls != null + ? new ComponentName(pkg, cls) : null; + mTopAction = action != null ? action : Intent.ACTION_MAIN; + mTopData = data; + if (!mSystemReady) { + return; + } + } + + systemReady(null); + } + + private void retrieveSettings() { + final ContentResolver resolver = mContext.getContentResolver(); + String debugApp = Settings.Global.getString( + resolver, Settings.Global.DEBUG_APP); + boolean waitForDebugger = Settings.Global.getInt( + resolver, Settings.Global.WAIT_FOR_DEBUGGER, 0) != 0; + boolean alwaysFinishActivities = Settings.Global.getInt( + resolver, Settings.Global.ALWAYS_FINISH_ACTIVITIES, 0) != 0; + boolean forceRtl = Settings.Global.getInt( + resolver, Settings.Global.DEVELOPMENT_FORCE_RTL, 0) != 0; + // Transfer any global setting for forcing RTL layout, into a System Property + SystemProperties.set(Settings.Global.DEVELOPMENT_FORCE_RTL, forceRtl ? "1":"0"); + + Configuration configuration = new Configuration(); + Settings.System.getConfiguration(resolver, configuration); + if (forceRtl) { + // This will take care of setting the correct layout direction flags + configuration.setLayoutDirection(configuration.locale); + } + + synchronized (this) { + mDebugApp = mOrigDebugApp = debugApp; + mWaitForDebugger = mOrigWaitForDebugger = waitForDebugger; + mAlwaysFinishActivities = alwaysFinishActivities; + // This happens before any activities are started, so we can + // change mConfiguration in-place. + updateConfigurationLocked(configuration, null, false, true); + if (DEBUG_CONFIGURATION) Slog.v(TAG, "Initial config: " + mConfiguration); + } + } + + public boolean testIsSystemReady() { + // no need to synchronize(this) just to read & return the value + return mSystemReady; + } + + private static File getCalledPreBootReceiversFile() { + File dataDir = Environment.getDataDirectory(); + File systemDir = new File(dataDir, "system"); + File fname = new File(systemDir, "called_pre_boots.dat"); + return fname; + } + + static final int LAST_DONE_VERSION = 10000; + + private static ArrayList<ComponentName> readLastDonePreBootReceivers() { + ArrayList<ComponentName> lastDoneReceivers = new ArrayList<ComponentName>(); + File file = getCalledPreBootReceiversFile(); + FileInputStream fis = null; + try { + fis = new FileInputStream(file); + DataInputStream dis = new DataInputStream(new BufferedInputStream(fis, 2048)); + int fvers = dis.readInt(); + if (fvers == LAST_DONE_VERSION) { + String vers = dis.readUTF(); + String codename = dis.readUTF(); + String build = dis.readUTF(); + if (android.os.Build.VERSION.RELEASE.equals(vers) + && android.os.Build.VERSION.CODENAME.equals(codename) + && android.os.Build.VERSION.INCREMENTAL.equals(build)) { + int num = dis.readInt(); + while (num > 0) { + num--; + String pkg = dis.readUTF(); + String cls = dis.readUTF(); + lastDoneReceivers.add(new ComponentName(pkg, cls)); + } + } + } + } catch (FileNotFoundException e) { + } catch (IOException e) { + Slog.w(TAG, "Failure reading last done pre-boot receivers", e); + } finally { + if (fis != null) { + try { + fis.close(); + } catch (IOException e) { + } + } + } + return lastDoneReceivers; + } + + private static void writeLastDonePreBootReceivers(ArrayList<ComponentName> list) { + File file = getCalledPreBootReceiversFile(); + FileOutputStream fos = null; + DataOutputStream dos = null; + try { + Slog.i(TAG, "Writing new set of last done pre-boot receivers..."); + fos = new FileOutputStream(file); + dos = new DataOutputStream(new BufferedOutputStream(fos, 2048)); + dos.writeInt(LAST_DONE_VERSION); + dos.writeUTF(android.os.Build.VERSION.RELEASE); + dos.writeUTF(android.os.Build.VERSION.CODENAME); + dos.writeUTF(android.os.Build.VERSION.INCREMENTAL); + dos.writeInt(list.size()); + for (int i=0; i<list.size(); i++) { + dos.writeUTF(list.get(i).getPackageName()); + dos.writeUTF(list.get(i).getClassName()); + } + } catch (IOException e) { + Slog.w(TAG, "Failure writing last done pre-boot receivers", e); + file.delete(); + } finally { + FileUtils.sync(fos); + if (dos != null) { + try { + dos.close(); + } catch (IOException e) { + // TODO Auto-generated catch block + e.printStackTrace(); + } + } + } + } + + public void systemReady(final Runnable goingCallback) { + synchronized(this) { + if (mSystemReady) { + if (goingCallback != null) goingCallback.run(); + return; + } + + // Check to see if there are any update receivers to run. + if (!mDidUpdate) { + if (mWaitingUpdate) { + return; + } + Intent intent = new Intent(Intent.ACTION_PRE_BOOT_COMPLETED); + List<ResolveInfo> ris = null; + try { + ris = AppGlobals.getPackageManager().queryIntentReceivers( + intent, null, 0, 0); + } catch (RemoteException e) { + } + if (ris != null) { + for (int i=ris.size()-1; i>=0; i--) { + if ((ris.get(i).activityInfo.applicationInfo.flags + &ApplicationInfo.FLAG_SYSTEM) == 0) { + ris.remove(i); + } + } + intent.addFlags(Intent.FLAG_RECEIVER_BOOT_UPGRADE); + + ArrayList<ComponentName> lastDoneReceivers = readLastDonePreBootReceivers(); + + final ArrayList<ComponentName> doneReceivers = new ArrayList<ComponentName>(); + for (int i=0; i<ris.size(); i++) { + ActivityInfo ai = ris.get(i).activityInfo; + ComponentName comp = new ComponentName(ai.packageName, ai.name); + if (lastDoneReceivers.contains(comp)) { + ris.remove(i); + i--; + } + } + + final int[] users = getUsersLocked(); + for (int i=0; i<ris.size(); i++) { + ActivityInfo ai = ris.get(i).activityInfo; + ComponentName comp = new ComponentName(ai.packageName, ai.name); + doneReceivers.add(comp); + intent.setComponent(comp); + for (int j=0; j<users.length; j++) { + IIntentReceiver finisher = null; + if (i == ris.size()-1 && j == users.length-1) { + finisher = new IIntentReceiver.Stub() { + public void performReceive(Intent intent, int resultCode, + String data, Bundle extras, boolean ordered, + boolean sticky, int sendingUser) { + // The raw IIntentReceiver interface is called + // with the AM lock held, so redispatch to + // execute our code without the lock. + mHandler.post(new Runnable() { + public void run() { + synchronized (ActivityManagerService.this) { + mDidUpdate = true; + } + writeLastDonePreBootReceivers(doneReceivers); + showBootMessage(mContext.getText( + R.string.android_upgrading_complete), + false); + systemReady(goingCallback); + } + }); + } + }; + } + Slog.i(TAG, "Sending system update to " + intent.getComponent() + + " for user " + users[j]); + broadcastIntentLocked(null, null, intent, null, finisher, + 0, null, null, null, AppOpsManager.OP_NONE, + true, false, MY_PID, Process.SYSTEM_UID, + users[j]); + if (finisher != null) { + mWaitingUpdate = true; + } + } + } + } + if (mWaitingUpdate) { + return; + } + mDidUpdate = true; + } + + mAppOpsService.systemReady(); + mSystemReady = true; + if (!mStartRunning) { + return; + } + } + + ArrayList<ProcessRecord> procsToKill = null; + synchronized(mPidsSelfLocked) { + for (int i=mPidsSelfLocked.size()-1; i>=0; i--) { + ProcessRecord proc = mPidsSelfLocked.valueAt(i); + if (!isAllowedWhileBooting(proc.info)){ + if (procsToKill == null) { + procsToKill = new ArrayList<ProcessRecord>(); + } + procsToKill.add(proc); + } + } + } + + synchronized(this) { + if (procsToKill != null) { + for (int i=procsToKill.size()-1; i>=0; i--) { + ProcessRecord proc = procsToKill.get(i); + Slog.i(TAG, "Removing system update proc: " + proc); + removeProcessLocked(proc, true, false, "system update done"); + } + } + + // Now that we have cleaned up any update processes, we + // are ready to start launching real processes and know that + // we won't trample on them any more. + mProcessesReady = true; + } + + Slog.i(TAG, "System now ready"); + EventLog.writeEvent(EventLogTags.BOOT_PROGRESS_AMS_READY, + SystemClock.uptimeMillis()); + + synchronized(this) { + // Make sure we have no pre-ready processes sitting around. + + if (mFactoryTest == SystemServer.FACTORY_TEST_LOW_LEVEL) { + ResolveInfo ri = mContext.getPackageManager() + .resolveActivity(new Intent(Intent.ACTION_FACTORY_TEST), + STOCK_PM_FLAGS); + CharSequence errorMsg = null; + if (ri != null) { + ActivityInfo ai = ri.activityInfo; + ApplicationInfo app = ai.applicationInfo; + if ((app.flags&ApplicationInfo.FLAG_SYSTEM) != 0) { + mTopAction = Intent.ACTION_FACTORY_TEST; + mTopData = null; + mTopComponent = new ComponentName(app.packageName, + ai.name); + } else { + errorMsg = mContext.getResources().getText( + com.android.internal.R.string.factorytest_not_system); + } + } else { + errorMsg = mContext.getResources().getText( + com.android.internal.R.string.factorytest_no_action); + } + if (errorMsg != null) { + mTopAction = null; + mTopData = null; + mTopComponent = null; + Message msg = Message.obtain(); + msg.what = SHOW_FACTORY_ERROR_MSG; + msg.getData().putCharSequence("msg", errorMsg); + mHandler.sendMessage(msg); + } + } + } + + retrieveSettings(); + + synchronized (this) { + readGrantedUriPermissionsLocked(); + } + + if (goingCallback != null) goingCallback.run(); + + synchronized (this) { + if (mFactoryTest != SystemServer.FACTORY_TEST_LOW_LEVEL) { + try { + List apps = AppGlobals.getPackageManager(). + getPersistentApplications(STOCK_PM_FLAGS); + if (apps != null) { + int N = apps.size(); + int i; + for (i=0; i<N; i++) { + ApplicationInfo info + = (ApplicationInfo)apps.get(i); + if (info != null && + !info.packageName.equals("android")) { + addAppLocked(info, false); + } + } + } + } catch (RemoteException ex) { + // pm is in same process, this will never happen. + } + } + + // Start up initial activity. + mBooting = true; + + try { + if (AppGlobals.getPackageManager().hasSystemUidErrors()) { + Message msg = Message.obtain(); + msg.what = SHOW_UID_ERROR_MSG; + mHandler.sendMessage(msg); + } + } catch (RemoteException e) { + } + + long ident = Binder.clearCallingIdentity(); + try { + Intent intent = new Intent(Intent.ACTION_USER_STARTED); + intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY + | Intent.FLAG_RECEIVER_FOREGROUND); + intent.putExtra(Intent.EXTRA_USER_HANDLE, mCurrentUserId); + broadcastIntentLocked(null, null, intent, + null, null, 0, null, null, null, AppOpsManager.OP_NONE, + false, false, MY_PID, Process.SYSTEM_UID, mCurrentUserId); + intent = new Intent(Intent.ACTION_USER_STARTING); + intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY); + intent.putExtra(Intent.EXTRA_USER_HANDLE, mCurrentUserId); + broadcastIntentLocked(null, null, intent, + null, new IIntentReceiver.Stub() { + @Override + public void performReceive(Intent intent, int resultCode, String data, + Bundle extras, boolean ordered, boolean sticky, int sendingUser) + throws RemoteException { + } + }, 0, null, null, + android.Manifest.permission.INTERACT_ACROSS_USERS, AppOpsManager.OP_NONE, + true, false, MY_PID, Process.SYSTEM_UID, UserHandle.USER_ALL); + } finally { + Binder.restoreCallingIdentity(ident); + } + mStackSupervisor.resumeTopActivitiesLocked(); + sendUserSwitchBroadcastsLocked(-1, mCurrentUserId); + } + } + + private boolean makeAppCrashingLocked(ProcessRecord app, + String shortMsg, String longMsg, String stackTrace) { + app.crashing = true; + app.crashingReport = generateProcessError(app, + ActivityManager.ProcessErrorStateInfo.CRASHED, null, shortMsg, longMsg, stackTrace); + startAppProblemLocked(app); + app.stopFreezingAllLocked(); + return handleAppCrashLocked(app, shortMsg, longMsg, stackTrace); + } + + private void makeAppNotRespondingLocked(ProcessRecord app, + String activity, String shortMsg, String longMsg) { + app.notResponding = true; + app.notRespondingReport = generateProcessError(app, + ActivityManager.ProcessErrorStateInfo.NOT_RESPONDING, + activity, shortMsg, longMsg, null); + startAppProblemLocked(app); + app.stopFreezingAllLocked(); + } + + /** + * Generate a process error record, suitable for attachment to a ProcessRecord. + * + * @param app The ProcessRecord in which the error occurred. + * @param condition Crashing, Application Not Responding, etc. Values are defined in + * ActivityManager.AppErrorStateInfo + * @param activity The activity associated with the crash, if known. + * @param shortMsg Short message describing the crash. + * @param longMsg Long message describing the crash. + * @param stackTrace Full crash stack trace, may be null. + * + * @return Returns a fully-formed AppErrorStateInfo record. + */ + private ActivityManager.ProcessErrorStateInfo generateProcessError(ProcessRecord app, + int condition, String activity, String shortMsg, String longMsg, String stackTrace) { + ActivityManager.ProcessErrorStateInfo report = new ActivityManager.ProcessErrorStateInfo(); + + report.condition = condition; + report.processName = app.processName; + report.pid = app.pid; + report.uid = app.info.uid; + report.tag = activity; + report.shortMsg = shortMsg; + report.longMsg = longMsg; + report.stackTrace = stackTrace; + + return report; + } + + void killAppAtUsersRequest(ProcessRecord app, Dialog fromDialog) { + synchronized (this) { + app.crashing = false; + app.crashingReport = null; + app.notResponding = false; + app.notRespondingReport = null; + if (app.anrDialog == fromDialog) { + app.anrDialog = null; + } + if (app.waitDialog == fromDialog) { + app.waitDialog = null; + } + if (app.pid > 0 && app.pid != MY_PID) { + handleAppCrashLocked(app, null, null, null); + killUnneededProcessLocked(app, "user request after error"); + } + } + } + + private boolean handleAppCrashLocked(ProcessRecord app, String shortMsg, String longMsg, + String stackTrace) { + long now = SystemClock.uptimeMillis(); + + Long crashTime; + if (!app.isolated) { + crashTime = mProcessCrashTimes.get(app.info.processName, app.uid); + } else { + crashTime = null; + } + if (crashTime != null && now < crashTime+ProcessList.MIN_CRASH_INTERVAL) { + // This process loses! + Slog.w(TAG, "Process " + app.info.processName + + " has crashed too many times: killing!"); + EventLog.writeEvent(EventLogTags.AM_PROCESS_CRASHED_TOO_MUCH, + app.userId, app.info.processName, app.uid); + mStackSupervisor.handleAppCrashLocked(app); + if (!app.persistent) { + // We don't want to start this process again until the user + // explicitly does so... but for persistent process, we really + // need to keep it running. If a persistent process is actually + // repeatedly crashing, then badness for everyone. + EventLog.writeEvent(EventLogTags.AM_PROC_BAD, app.userId, app.uid, + app.info.processName); + if (!app.isolated) { + // XXX We don't have a way to mark isolated processes + // as bad, since they don't have a peristent identity. + mBadProcesses.put(app.info.processName, app.uid, + new BadProcessInfo(now, shortMsg, longMsg, stackTrace)); + mProcessCrashTimes.remove(app.info.processName, app.uid); + } + app.bad = true; + app.removed = true; + // Don't let services in this process be restarted and potentially + // annoy the user repeatedly. Unless it is persistent, since those + // processes run critical code. + removeProcessLocked(app, false, false, "crash"); + mStackSupervisor.resumeTopActivitiesLocked(); + return false; + } + mStackSupervisor.resumeTopActivitiesLocked(); + } else { + mStackSupervisor.finishTopRunningActivityLocked(app); + } + + // Bump up the crash count of any services currently running in the proc. + for (int i=app.services.size()-1; i>=0; i--) { + // Any services running in the application need to be placed + // back in the pending list. + ServiceRecord sr = app.services.valueAt(i); + sr.crashCount++; + } + + // If the crashing process is what we consider to be the "home process" and it has been + // replaced by a third-party app, clear the package preferred activities from packages + // with a home activity running in the process to prevent a repeatedly crashing app + // from blocking the user to manually clear the list. + final ArrayList<ActivityRecord> activities = app.activities; + if (app == mHomeProcess && activities.size() > 0 + && (mHomeProcess.info.flags & ApplicationInfo.FLAG_SYSTEM) == 0) { + for (int activityNdx = activities.size() - 1; activityNdx >= 0; --activityNdx) { + final ActivityRecord r = activities.get(activityNdx); + if (r.isHomeActivity()) { + Log.i(TAG, "Clearing package preferred activities from " + r.packageName); + try { + ActivityThread.getPackageManager() + .clearPackagePreferredActivities(r.packageName); + } catch (RemoteException c) { + // pm is in same process, this will never happen. + } + } + } + } + + if (!app.isolated) { + // XXX Can't keep track of crash times for isolated processes, + // because they don't have a perisistent identity. + mProcessCrashTimes.put(app.info.processName, app.uid, now); + } + + return true; + } + + void startAppProblemLocked(ProcessRecord app) { + if (app.userId == mCurrentUserId) { + app.errorReportReceiver = ApplicationErrorReport.getErrorReportReceiver( + mContext, app.info.packageName, app.info.flags); + } else { + // If this app is not running under the current user, then we + // can't give it a report button because that would require + // launching the report UI under a different user. + app.errorReportReceiver = null; + } + skipCurrentReceiverLocked(app); + } + + void skipCurrentReceiverLocked(ProcessRecord app) { + for (BroadcastQueue queue : mBroadcastQueues) { + queue.skipCurrentReceiverLocked(app); + } + } + + /** + * Used by {@link com.android.internal.os.RuntimeInit} to report when an application crashes. + * The application process will exit immediately after this call returns. + * @param app object of the crashing app, null for the system server + * @param crashInfo describing the exception + */ + public void handleApplicationCrash(IBinder app, ApplicationErrorReport.CrashInfo crashInfo) { + ProcessRecord r = findAppProcess(app, "Crash"); + final String processName = app == null ? "system_server" + : (r == null ? "unknown" : r.processName); + + handleApplicationCrashInner("crash", r, processName, crashInfo); + } + + /* Native crash reporting uses this inner version because it needs to be somewhat + * decoupled from the AM-managed cleanup lifecycle + */ + void handleApplicationCrashInner(String eventType, ProcessRecord r, String processName, + ApplicationErrorReport.CrashInfo crashInfo) { + EventLog.writeEvent(EventLogTags.AM_CRASH, Binder.getCallingPid(), + UserHandle.getUserId(Binder.getCallingUid()), processName, + r == null ? -1 : r.info.flags, + crashInfo.exceptionClassName, + crashInfo.exceptionMessage, + crashInfo.throwFileName, + crashInfo.throwLineNumber); + + addErrorToDropBox(eventType, r, processName, null, null, null, null, null, crashInfo); + + crashApplication(r, crashInfo); + } + + public void handleApplicationStrictModeViolation( + IBinder app, + int violationMask, + StrictMode.ViolationInfo info) { + ProcessRecord r = findAppProcess(app, "StrictMode"); + if (r == null) { + return; + } + + if ((violationMask & StrictMode.PENALTY_DROPBOX) != 0) { + Integer stackFingerprint = info.hashCode(); + boolean logIt = true; + synchronized (mAlreadyLoggedViolatedStacks) { + if (mAlreadyLoggedViolatedStacks.contains(stackFingerprint)) { + logIt = false; + // TODO: sub-sample into EventLog for these, with + // the info.durationMillis? Then we'd get + // the relative pain numbers, without logging all + // the stack traces repeatedly. We'd want to do + // likewise in the client code, which also does + // dup suppression, before the Binder call. + } else { + if (mAlreadyLoggedViolatedStacks.size() >= MAX_DUP_SUPPRESSED_STACKS) { + mAlreadyLoggedViolatedStacks.clear(); + } + mAlreadyLoggedViolatedStacks.add(stackFingerprint); + } + } + if (logIt) { + logStrictModeViolationToDropBox(r, info); + } + } + + if ((violationMask & StrictMode.PENALTY_DIALOG) != 0) { + AppErrorResult result = new AppErrorResult(); + synchronized (this) { + final long origId = Binder.clearCallingIdentity(); + + Message msg = Message.obtain(); + msg.what = SHOW_STRICT_MODE_VIOLATION_MSG; + HashMap<String, Object> data = new HashMap<String, Object>(); + data.put("result", result); + data.put("app", r); + data.put("violationMask", violationMask); + data.put("info", info); + msg.obj = data; + mHandler.sendMessage(msg); + + Binder.restoreCallingIdentity(origId); + } + int res = result.get(); + Slog.w(TAG, "handleApplicationStrictModeViolation; res=" + res); + } + } + + // Depending on the policy in effect, there could be a bunch of + // these in quick succession so we try to batch these together to + // minimize disk writes, number of dropbox entries, and maximize + // compression, by having more fewer, larger records. + private void logStrictModeViolationToDropBox( + ProcessRecord process, + StrictMode.ViolationInfo info) { + if (info == null) { + return; + } + final boolean isSystemApp = process == null || + (process.info.flags & (ApplicationInfo.FLAG_SYSTEM | + ApplicationInfo.FLAG_UPDATED_SYSTEM_APP)) != 0; + final String processName = process == null ? "unknown" : process.processName; + final String dropboxTag = isSystemApp ? "system_app_strictmode" : "data_app_strictmode"; + final DropBoxManager dbox = (DropBoxManager) + mContext.getSystemService(Context.DROPBOX_SERVICE); + + // Exit early if the dropbox isn't configured to accept this report type. + if (dbox == null || !dbox.isTagEnabled(dropboxTag)) return; + + boolean bufferWasEmpty; + boolean needsFlush; + final StringBuilder sb = isSystemApp ? mStrictModeBuffer : new StringBuilder(1024); + synchronized (sb) { + bufferWasEmpty = sb.length() == 0; + appendDropBoxProcessHeaders(process, processName, sb); + sb.append("Build: ").append(Build.FINGERPRINT).append("\n"); + sb.append("System-App: ").append(isSystemApp).append("\n"); + sb.append("Uptime-Millis: ").append(info.violationUptimeMillis).append("\n"); + if (info.violationNumThisLoop != 0) { + sb.append("Loop-Violation-Number: ").append(info.violationNumThisLoop).append("\n"); + } + if (info.numAnimationsRunning != 0) { + sb.append("Animations-Running: ").append(info.numAnimationsRunning).append("\n"); + } + if (info.broadcastIntentAction != null) { + sb.append("Broadcast-Intent-Action: ").append(info.broadcastIntentAction).append("\n"); + } + if (info.durationMillis != -1) { + sb.append("Duration-Millis: ").append(info.durationMillis).append("\n"); + } + if (info.numInstances != -1) { + sb.append("Instance-Count: ").append(info.numInstances).append("\n"); + } + if (info.tags != null) { + for (String tag : info.tags) { + sb.append("Span-Tag: ").append(tag).append("\n"); + } + } + sb.append("\n"); + if (info.crashInfo != null && info.crashInfo.stackTrace != null) { + sb.append(info.crashInfo.stackTrace); + } + sb.append("\n"); + + // Only buffer up to ~64k. Various logging bits truncate + // things at 128k. + needsFlush = (sb.length() > 64 * 1024); + } + + // Flush immediately if the buffer's grown too large, or this + // is a non-system app. Non-system apps are isolated with a + // different tag & policy and not batched. + // + // Batching is useful during internal testing with + // StrictMode settings turned up high. Without batching, + // thousands of separate files could be created on boot. + if (!isSystemApp || needsFlush) { + new Thread("Error dump: " + dropboxTag) { + @Override + public void run() { + String report; + synchronized (sb) { + report = sb.toString(); + sb.delete(0, sb.length()); + sb.trimToSize(); + } + if (report.length() != 0) { + dbox.addText(dropboxTag, report); + } + } + }.start(); + return; + } + + // System app batching: + if (!bufferWasEmpty) { + // An existing dropbox-writing thread is outstanding, so + // we don't need to start it up. The existing thread will + // catch the buffer appends we just did. + return; + } + + // Worker thread to both batch writes and to avoid blocking the caller on I/O. + // (After this point, we shouldn't access AMS internal data structures.) + new Thread("Error dump: " + dropboxTag) { + @Override + public void run() { + // 5 second sleep to let stacks arrive and be batched together + try { + Thread.sleep(5000); // 5 seconds + } catch (InterruptedException e) {} + + String errorReport; + synchronized (mStrictModeBuffer) { + errorReport = mStrictModeBuffer.toString(); + if (errorReport.length() == 0) { + return; + } + mStrictModeBuffer.delete(0, mStrictModeBuffer.length()); + mStrictModeBuffer.trimToSize(); + } + dbox.addText(dropboxTag, errorReport); + } + }.start(); + } + + /** + * Used by {@link Log} via {@link com.android.internal.os.RuntimeInit} to report serious errors. + * @param app object of the crashing app, null for the system server + * @param tag reported by the caller + * @param crashInfo describing the context of the error + * @return true if the process should exit immediately (WTF is fatal) + */ + public boolean handleApplicationWtf(IBinder app, String tag, + ApplicationErrorReport.CrashInfo crashInfo) { + ProcessRecord r = findAppProcess(app, "WTF"); + final String processName = app == null ? "system_server" + : (r == null ? "unknown" : r.processName); + + EventLog.writeEvent(EventLogTags.AM_WTF, + UserHandle.getUserId(Binder.getCallingUid()), Binder.getCallingPid(), + processName, + r == null ? -1 : r.info.flags, + tag, crashInfo.exceptionMessage); + + addErrorToDropBox("wtf", r, processName, null, null, tag, null, null, crashInfo); + + if (r != null && r.pid != Process.myPid() && + Settings.Global.getInt(mContext.getContentResolver(), + Settings.Global.WTF_IS_FATAL, 0) != 0) { + crashApplication(r, crashInfo); + return true; + } else { + return false; + } + } + + /** + * @param app object of some object (as stored in {@link com.android.internal.os.RuntimeInit}) + * @return the corresponding {@link ProcessRecord} object, or null if none could be found + */ + private ProcessRecord findAppProcess(IBinder app, String reason) { + if (app == null) { + return null; + } + + synchronized (this) { + final int NP = mProcessNames.getMap().size(); + for (int ip=0; ip<NP; ip++) { + SparseArray<ProcessRecord> apps = mProcessNames.getMap().valueAt(ip); + final int NA = apps.size(); + for (int ia=0; ia<NA; ia++) { + ProcessRecord p = apps.valueAt(ia); + if (p.thread != null && p.thread.asBinder() == app) { + return p; + } + } + } + + Slog.w(TAG, "Can't find mystery application for " + reason + + " from pid=" + Binder.getCallingPid() + + " uid=" + Binder.getCallingUid() + ": " + app); + return null; + } + } + + /** + * Utility function for addErrorToDropBox and handleStrictModeViolation's logging + * to append various headers to the dropbox log text. + */ + private void appendDropBoxProcessHeaders(ProcessRecord process, String processName, + StringBuilder sb) { + // Watchdog thread ends up invoking this function (with + // a null ProcessRecord) to add the stack file to dropbox. + // Do not acquire a lock on this (am) in such cases, as it + // could cause a potential deadlock, if and when watchdog + // is invoked due to unavailability of lock on am and it + // would prevent watchdog from killing system_server. + if (process == null) { + sb.append("Process: ").append(processName).append("\n"); + return; + } + // Note: ProcessRecord 'process' is guarded by the service + // instance. (notably process.pkgList, which could otherwise change + // concurrently during execution of this method) + synchronized (this) { + sb.append("Process: ").append(processName).append("\n"); + int flags = process.info.flags; + IPackageManager pm = AppGlobals.getPackageManager(); + sb.append("Flags: 0x").append(Integer.toString(flags, 16)).append("\n"); + for (int ip=0; ip<process.pkgList.size(); ip++) { + String pkg = process.pkgList.keyAt(ip); + sb.append("Package: ").append(pkg); + try { + PackageInfo pi = pm.getPackageInfo(pkg, 0, UserHandle.getCallingUserId()); + if (pi != null) { + sb.append(" v").append(pi.versionCode); + if (pi.versionName != null) { + sb.append(" (").append(pi.versionName).append(")"); + } + } + } catch (RemoteException e) { + Slog.e(TAG, "Error getting package info: " + pkg, e); + } + sb.append("\n"); + } + } + } + + private static String processClass(ProcessRecord process) { + if (process == null || process.pid == MY_PID) { + return "system_server"; + } else if ((process.info.flags & ApplicationInfo.FLAG_SYSTEM) != 0) { + return "system_app"; + } else { + return "data_app"; + } + } + + /** + * Write a description of an error (crash, WTF, ANR) to the drop box. + * @param eventType to include in the drop box tag ("crash", "wtf", etc.) + * @param process which caused the error, null means the system server + * @param activity which triggered the error, null if unknown + * @param parent activity related to the error, null if unknown + * @param subject line related to the error, null if absent + * @param report in long form describing the error, null if absent + * @param logFile to include in the report, null if none + * @param crashInfo giving an application stack trace, null if absent + */ + public void addErrorToDropBox(String eventType, + ProcessRecord process, String processName, ActivityRecord activity, + ActivityRecord parent, String subject, + final String report, final File logFile, + final ApplicationErrorReport.CrashInfo crashInfo) { + // NOTE -- this must never acquire the ActivityManagerService lock, + // otherwise the watchdog may be prevented from resetting the system. + + final String dropboxTag = processClass(process) + "_" + eventType; + final DropBoxManager dbox = (DropBoxManager) + mContext.getSystemService(Context.DROPBOX_SERVICE); + + // Exit early if the dropbox isn't configured to accept this report type. + if (dbox == null || !dbox.isTagEnabled(dropboxTag)) return; + + final StringBuilder sb = new StringBuilder(1024); + appendDropBoxProcessHeaders(process, processName, sb); + if (activity != null) { + sb.append("Activity: ").append(activity.shortComponentName).append("\n"); + } + if (parent != null && parent.app != null && parent.app.pid != process.pid) { + sb.append("Parent-Process: ").append(parent.app.processName).append("\n"); + } + if (parent != null && parent != activity) { + sb.append("Parent-Activity: ").append(parent.shortComponentName).append("\n"); + } + if (subject != null) { + sb.append("Subject: ").append(subject).append("\n"); + } + sb.append("Build: ").append(Build.FINGERPRINT).append("\n"); + if (Debug.isDebuggerConnected()) { + sb.append("Debugger: Connected\n"); + } + sb.append("\n"); + + // Do the rest in a worker thread to avoid blocking the caller on I/O + // (After this point, we shouldn't access AMS internal data structures.) + Thread worker = new Thread("Error dump: " + dropboxTag) { + @Override + public void run() { + if (report != null) { + sb.append(report); + } + if (logFile != null) { + try { + sb.append(FileUtils.readTextFile(logFile, DROPBOX_MAX_SIZE, + "\n\n[[TRUNCATED]]")); + } catch (IOException e) { + Slog.e(TAG, "Error reading " + logFile, e); + } + } + if (crashInfo != null && crashInfo.stackTrace != null) { + sb.append(crashInfo.stackTrace); + } + + String setting = Settings.Global.ERROR_LOGCAT_PREFIX + dropboxTag; + int lines = Settings.Global.getInt(mContext.getContentResolver(), setting, 0); + if (lines > 0) { + sb.append("\n"); + + // Merge several logcat streams, and take the last N lines + InputStreamReader input = null; + try { + java.lang.Process logcat = new ProcessBuilder("/system/bin/logcat", + "-v", "time", "-b", "events", "-b", "system", "-b", "main", + "-t", String.valueOf(lines)).redirectErrorStream(true).start(); + + try { logcat.getOutputStream().close(); } catch (IOException e) {} + try { logcat.getErrorStream().close(); } catch (IOException e) {} + input = new InputStreamReader(logcat.getInputStream()); + + int num; + char[] buf = new char[8192]; + while ((num = input.read(buf)) > 0) sb.append(buf, 0, num); + } catch (IOException e) { + Slog.e(TAG, "Error running logcat", e); + } finally { + if (input != null) try { input.close(); } catch (IOException e) {} + } + } + + dbox.addText(dropboxTag, sb.toString()); + } + }; + + if (process == null) { + // If process is null, we are being called from some internal code + // and may be about to die -- run this synchronously. + worker.run(); + } else { + worker.start(); + } + } + + /** + * Bring up the "unexpected error" dialog box for a crashing app. + * Deal with edge cases (intercepts from instrumented applications, + * ActivityController, error intent receivers, that sort of thing). + * @param r the application crashing + * @param crashInfo describing the failure + */ + private void crashApplication(ProcessRecord r, ApplicationErrorReport.CrashInfo crashInfo) { + long timeMillis = System.currentTimeMillis(); + String shortMsg = crashInfo.exceptionClassName; + String longMsg = crashInfo.exceptionMessage; + String stackTrace = crashInfo.stackTrace; + if (shortMsg != null && longMsg != null) { + longMsg = shortMsg + ": " + longMsg; + } else if (shortMsg != null) { + longMsg = shortMsg; + } + + AppErrorResult result = new AppErrorResult(); + synchronized (this) { + if (mController != null) { + try { + String name = r != null ? r.processName : null; + int pid = r != null ? r.pid : Binder.getCallingPid(); + if (!mController.appCrashed(name, pid, + shortMsg, longMsg, timeMillis, crashInfo.stackTrace)) { + Slog.w(TAG, "Force-killing crashed app " + name + + " at watcher's request"); + Process.killProcess(pid); + return; + } + } catch (RemoteException e) { + mController = null; + Watchdog.getInstance().setActivityController(null); + } + } + + final long origId = Binder.clearCallingIdentity(); + + // If this process is running instrumentation, finish it. + if (r != null && r.instrumentationClass != null) { + Slog.w(TAG, "Error in app " + r.processName + + " running instrumentation " + r.instrumentationClass + ":"); + if (shortMsg != null) Slog.w(TAG, " " + shortMsg); + if (longMsg != null) Slog.w(TAG, " " + longMsg); + Bundle info = new Bundle(); + info.putString("shortMsg", shortMsg); + info.putString("longMsg", longMsg); + finishInstrumentationLocked(r, Activity.RESULT_CANCELED, info); + Binder.restoreCallingIdentity(origId); + return; + } + + // If we can't identify the process or it's already exceeded its crash quota, + // quit right away without showing a crash dialog. + if (r == null || !makeAppCrashingLocked(r, shortMsg, longMsg, stackTrace)) { + Binder.restoreCallingIdentity(origId); + return; + } + + Message msg = Message.obtain(); + msg.what = SHOW_ERROR_MSG; + HashMap data = new HashMap(); + data.put("result", result); + data.put("app", r); + msg.obj = data; + mHandler.sendMessage(msg); + + Binder.restoreCallingIdentity(origId); + } + + int res = result.get(); + + Intent appErrorIntent = null; + synchronized (this) { + if (r != null && !r.isolated) { + // XXX Can't keep track of crash time for isolated processes, + // since they don't have a persistent identity. + mProcessCrashTimes.put(r.info.processName, r.uid, + SystemClock.uptimeMillis()); + } + if (res == AppErrorDialog.FORCE_QUIT_AND_REPORT) { + appErrorIntent = createAppErrorIntentLocked(r, timeMillis, crashInfo); + } + } + + if (appErrorIntent != null) { + try { + mContext.startActivityAsUser(appErrorIntent, new UserHandle(r.userId)); + } catch (ActivityNotFoundException e) { + Slog.w(TAG, "bug report receiver dissappeared", e); + } + } + } + + Intent createAppErrorIntentLocked(ProcessRecord r, + long timeMillis, ApplicationErrorReport.CrashInfo crashInfo) { + ApplicationErrorReport report = createAppErrorReportLocked(r, timeMillis, crashInfo); + if (report == null) { + return null; + } + Intent result = new Intent(Intent.ACTION_APP_ERROR); + result.setComponent(r.errorReportReceiver); + result.putExtra(Intent.EXTRA_BUG_REPORT, report); + result.addFlags(Intent.FLAG_ACTIVITY_NEW_TASK); + return result; + } + + private ApplicationErrorReport createAppErrorReportLocked(ProcessRecord r, + long timeMillis, ApplicationErrorReport.CrashInfo crashInfo) { + if (r.errorReportReceiver == null) { + return null; + } + + if (!r.crashing && !r.notResponding && !r.forceCrashReport) { + return null; + } + + ApplicationErrorReport report = new ApplicationErrorReport(); + report.packageName = r.info.packageName; + report.installerPackageName = r.errorReportReceiver.getPackageName(); + report.processName = r.processName; + report.time = timeMillis; + report.systemApp = (r.info.flags & ApplicationInfo.FLAG_SYSTEM) != 0; + + if (r.crashing || r.forceCrashReport) { + report.type = ApplicationErrorReport.TYPE_CRASH; + report.crashInfo = crashInfo; + } else if (r.notResponding) { + report.type = ApplicationErrorReport.TYPE_ANR; + report.anrInfo = new ApplicationErrorReport.AnrInfo(); + + report.anrInfo.activity = r.notRespondingReport.tag; + report.anrInfo.cause = r.notRespondingReport.shortMsg; + report.anrInfo.info = r.notRespondingReport.longMsg; + } + + return report; + } + + public List<ActivityManager.ProcessErrorStateInfo> getProcessesInErrorState() { + enforceNotIsolatedCaller("getProcessesInErrorState"); + // assume our apps are happy - lazy create the list + List<ActivityManager.ProcessErrorStateInfo> errList = null; + + final boolean allUsers = ActivityManager.checkUidPermission( + android.Manifest.permission.INTERACT_ACROSS_USERS_FULL, + Binder.getCallingUid()) == PackageManager.PERMISSION_GRANTED; + int userId = UserHandle.getUserId(Binder.getCallingUid()); + + synchronized (this) { + + // iterate across all processes + for (int i=mLruProcesses.size()-1; i>=0; i--) { + ProcessRecord app = mLruProcesses.get(i); + if (!allUsers && app.userId != userId) { + continue; + } + if ((app.thread != null) && (app.crashing || app.notResponding)) { + // This one's in trouble, so we'll generate a report for it + // crashes are higher priority (in case there's a crash *and* an anr) + ActivityManager.ProcessErrorStateInfo report = null; + if (app.crashing) { + report = app.crashingReport; + } else if (app.notResponding) { + report = app.notRespondingReport; + } + + if (report != null) { + if (errList == null) { + errList = new ArrayList<ActivityManager.ProcessErrorStateInfo>(1); + } + errList.add(report); + } else { + Slog.w(TAG, "Missing app error report, app = " + app.processName + + " crashing = " + app.crashing + + " notResponding = " + app.notResponding); + } + } + } + } + + return errList; + } + + static int oomAdjToImportance(int adj, ActivityManager.RunningAppProcessInfo currApp) { + if (adj >= ProcessList.CACHED_APP_MIN_ADJ) { + if (currApp != null) { + currApp.lru = adj - ProcessList.CACHED_APP_MIN_ADJ + 1; + } + return ActivityManager.RunningAppProcessInfo.IMPORTANCE_BACKGROUND; + } else if (adj >= ProcessList.SERVICE_B_ADJ) { + return ActivityManager.RunningAppProcessInfo.IMPORTANCE_SERVICE; + } else if (adj >= ProcessList.HOME_APP_ADJ) { + if (currApp != null) { + currApp.lru = 0; + } + return ActivityManager.RunningAppProcessInfo.IMPORTANCE_BACKGROUND; + } else if (adj >= ProcessList.SERVICE_ADJ) { + return ActivityManager.RunningAppProcessInfo.IMPORTANCE_SERVICE; + } else if (adj >= ProcessList.HEAVY_WEIGHT_APP_ADJ) { + return ActivityManager.RunningAppProcessInfo.IMPORTANCE_CANT_SAVE_STATE; + } else if (adj >= ProcessList.PERCEPTIBLE_APP_ADJ) { + return ActivityManager.RunningAppProcessInfo.IMPORTANCE_PERCEPTIBLE; + } else if (adj >= ProcessList.VISIBLE_APP_ADJ) { + return ActivityManager.RunningAppProcessInfo.IMPORTANCE_VISIBLE; + } else { + return ActivityManager.RunningAppProcessInfo.IMPORTANCE_FOREGROUND; + } + } + + private void fillInProcMemInfo(ProcessRecord app, + ActivityManager.RunningAppProcessInfo outInfo) { + outInfo.pid = app.pid; + outInfo.uid = app.info.uid; + if (mHeavyWeightProcess == app) { + outInfo.flags |= ActivityManager.RunningAppProcessInfo.FLAG_CANT_SAVE_STATE; + } + if (app.persistent) { + outInfo.flags |= ActivityManager.RunningAppProcessInfo.FLAG_PERSISTENT; + } + if (app.activities.size() > 0) { + outInfo.flags |= ActivityManager.RunningAppProcessInfo.FLAG_HAS_ACTIVITIES; + } + outInfo.lastTrimLevel = app.trimMemoryLevel; + int adj = app.curAdj; + outInfo.importance = oomAdjToImportance(adj, outInfo); + outInfo.importanceReasonCode = app.adjTypeCode; + } + + public List<ActivityManager.RunningAppProcessInfo> getRunningAppProcesses() { + enforceNotIsolatedCaller("getRunningAppProcesses"); + // Lazy instantiation of list + List<ActivityManager.RunningAppProcessInfo> runList = null; + final boolean allUsers = ActivityManager.checkUidPermission( + android.Manifest.permission.INTERACT_ACROSS_USERS_FULL, + Binder.getCallingUid()) == PackageManager.PERMISSION_GRANTED; + int userId = UserHandle.getUserId(Binder.getCallingUid()); + synchronized (this) { + // Iterate across all processes + for (int i=mLruProcesses.size()-1; i>=0; i--) { + ProcessRecord app = mLruProcesses.get(i); + if (!allUsers && app.userId != userId) { + continue; + } + if ((app.thread != null) && (!app.crashing && !app.notResponding)) { + // Generate process state info for running application + ActivityManager.RunningAppProcessInfo currApp = + new ActivityManager.RunningAppProcessInfo(app.processName, + app.pid, app.getPackageList()); + fillInProcMemInfo(app, currApp); + if (app.adjSource instanceof ProcessRecord) { + currApp.importanceReasonPid = ((ProcessRecord)app.adjSource).pid; + currApp.importanceReasonImportance = oomAdjToImportance( + app.adjSourceOom, null); + } else if (app.adjSource instanceof ActivityRecord) { + ActivityRecord r = (ActivityRecord)app.adjSource; + if (r.app != null) currApp.importanceReasonPid = r.app.pid; + } + if (app.adjTarget instanceof ComponentName) { + currApp.importanceReasonComponent = (ComponentName)app.adjTarget; + } + //Slog.v(TAG, "Proc " + app.processName + ": imp=" + currApp.importance + // + " lru=" + currApp.lru); + if (runList == null) { + runList = new ArrayList<ActivityManager.RunningAppProcessInfo>(); + } + runList.add(currApp); + } + } + } + return runList; + } + + public List<ApplicationInfo> getRunningExternalApplications() { + enforceNotIsolatedCaller("getRunningExternalApplications"); + List<ActivityManager.RunningAppProcessInfo> runningApps = getRunningAppProcesses(); + List<ApplicationInfo> retList = new ArrayList<ApplicationInfo>(); + if (runningApps != null && runningApps.size() > 0) { + Set<String> extList = new HashSet<String>(); + for (ActivityManager.RunningAppProcessInfo app : runningApps) { + if (app.pkgList != null) { + for (String pkg : app.pkgList) { + extList.add(pkg); + } + } + } + IPackageManager pm = AppGlobals.getPackageManager(); + for (String pkg : extList) { + try { + ApplicationInfo info = pm.getApplicationInfo(pkg, 0, UserHandle.getCallingUserId()); + if ((info.flags & ApplicationInfo.FLAG_EXTERNAL_STORAGE) != 0) { + retList.add(info); + } + } catch (RemoteException e) { + } + } + } + return retList; + } + + @Override + public void getMyMemoryState(ActivityManager.RunningAppProcessInfo outInfo) { + enforceNotIsolatedCaller("getMyMemoryState"); + synchronized (this) { + ProcessRecord proc; + synchronized (mPidsSelfLocked) { + proc = mPidsSelfLocked.get(Binder.getCallingPid()); + } + fillInProcMemInfo(proc, outInfo); + } + } + + @Override + protected void dump(FileDescriptor fd, PrintWriter pw, String[] args) { + if (checkCallingPermission(android.Manifest.permission.DUMP) + != PackageManager.PERMISSION_GRANTED) { + pw.println("Permission Denial: can't dump ActivityManager from from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " without permission " + + android.Manifest.permission.DUMP); + return; + } + + boolean dumpAll = false; + boolean dumpClient = false; + String dumpPackage = null; + + int opti = 0; + while (opti < args.length) { + String opt = args[opti]; + if (opt == null || opt.length() <= 0 || opt.charAt(0) != '-') { + break; + } + opti++; + if ("-a".equals(opt)) { + dumpAll = true; + } else if ("-c".equals(opt)) { + dumpClient = true; + } else if ("-h".equals(opt)) { + pw.println("Activity manager dump options:"); + pw.println(" [-a] [-c] [-h] [cmd] ..."); + pw.println(" cmd may be one of:"); + pw.println(" a[ctivities]: activity stack state"); + pw.println(" b[roadcasts] [PACKAGE_NAME] [history [-s]]: broadcast state"); + pw.println(" i[ntents] [PACKAGE_NAME]: pending intent state"); + pw.println(" p[rocesses] [PACKAGE_NAME]: process state"); + pw.println(" o[om]: out of memory management"); + pw.println(" prov[iders] [COMP_SPEC ...]: content provider state"); + pw.println(" provider [COMP_SPEC]: provider client-side state"); + pw.println(" s[ervices] [COMP_SPEC ...]: service state"); + pw.println(" service [COMP_SPEC]: service client-side state"); + pw.println(" package [PACKAGE_NAME]: all state related to given package"); + pw.println(" all: dump all activities"); + pw.println(" top: dump the top activity"); + pw.println(" cmd may also be a COMP_SPEC to dump activities."); + pw.println(" COMP_SPEC may be a component name (com.foo/.myApp),"); + pw.println(" a partial substring in a component name, a"); + pw.println(" hex object identifier."); + pw.println(" -a: include all available server state."); + pw.println(" -c: include client state."); + return; + } else { + pw.println("Unknown argument: " + opt + "; use -h for help"); + } + } + + long origId = Binder.clearCallingIdentity(); + boolean more = false; + // Is the caller requesting to dump a particular piece of data? + if (opti < args.length) { + String cmd = args[opti]; + opti++; + if ("activities".equals(cmd) || "a".equals(cmd)) { + synchronized (this) { + dumpActivitiesLocked(fd, pw, args, opti, true, dumpClient, null); + } + } else if ("broadcasts".equals(cmd) || "b".equals(cmd)) { + String[] newArgs; + String name; + if (opti >= args.length) { + name = null; + newArgs = EMPTY_STRING_ARRAY; + } else { + name = args[opti]; + opti++; + newArgs = new String[args.length - opti]; + if (args.length > 2) System.arraycopy(args, opti, newArgs, 0, + args.length - opti); + } + synchronized (this) { + dumpBroadcastsLocked(fd, pw, args, opti, true, name); + } + } else if ("intents".equals(cmd) || "i".equals(cmd)) { + String[] newArgs; + String name; + if (opti >= args.length) { + name = null; + newArgs = EMPTY_STRING_ARRAY; + } else { + name = args[opti]; + opti++; + newArgs = new String[args.length - opti]; + if (args.length > 2) System.arraycopy(args, opti, newArgs, 0, + args.length - opti); + } + synchronized (this) { + dumpPendingIntentsLocked(fd, pw, args, opti, true, name); + } + } else if ("processes".equals(cmd) || "p".equals(cmd)) { + String[] newArgs; + String name; + if (opti >= args.length) { + name = null; + newArgs = EMPTY_STRING_ARRAY; + } else { + name = args[opti]; + opti++; + newArgs = new String[args.length - opti]; + if (args.length > 2) System.arraycopy(args, opti, newArgs, 0, + args.length - opti); + } + synchronized (this) { + dumpProcessesLocked(fd, pw, args, opti, true, name); + } + } else if ("oom".equals(cmd) || "o".equals(cmd)) { + synchronized (this) { + dumpOomLocked(fd, pw, args, opti, true); + } + } else if ("provider".equals(cmd)) { + String[] newArgs; + String name; + if (opti >= args.length) { + name = null; + newArgs = EMPTY_STRING_ARRAY; + } else { + name = args[opti]; + opti++; + newArgs = new String[args.length - opti]; + if (args.length > 2) System.arraycopy(args, opti, newArgs, 0, args.length - opti); + } + if (!dumpProvider(fd, pw, name, newArgs, 0, dumpAll)) { + pw.println("No providers match: " + name); + pw.println("Use -h for help."); + } + } else if ("providers".equals(cmd) || "prov".equals(cmd)) { + synchronized (this) { + dumpProvidersLocked(fd, pw, args, opti, true, null); + } + } else if ("service".equals(cmd)) { + String[] newArgs; + String name; + if (opti >= args.length) { + name = null; + newArgs = EMPTY_STRING_ARRAY; + } else { + name = args[opti]; + opti++; + newArgs = new String[args.length - opti]; + if (args.length > 2) System.arraycopy(args, opti, newArgs, 0, + args.length - opti); + } + if (!mServices.dumpService(fd, pw, name, newArgs, 0, dumpAll)) { + pw.println("No services match: " + name); + pw.println("Use -h for help."); + } + } else if ("package".equals(cmd)) { + String[] newArgs; + if (opti >= args.length) { + pw.println("package: no package name specified"); + pw.println("Use -h for help."); + } else { + dumpPackage = args[opti]; + opti++; + newArgs = new String[args.length - opti]; + if (args.length > 2) System.arraycopy(args, opti, newArgs, 0, + args.length - opti); + args = newArgs; + opti = 0; + more = true; + } + } else if ("services".equals(cmd) || "s".equals(cmd)) { + synchronized (this) { + mServices.dumpServicesLocked(fd, pw, args, opti, true, dumpClient, null); + } + } else { + // Dumping a single activity? + if (!dumpActivity(fd, pw, cmd, args, opti, dumpAll)) { + pw.println("Bad activity command, or no activities match: " + cmd); + pw.println("Use -h for help."); + } + } + if (!more) { + Binder.restoreCallingIdentity(origId); + return; + } + } + + // No piece of data specified, dump everything. + synchronized (this) { + dumpPendingIntentsLocked(fd, pw, args, opti, dumpAll, dumpPackage); + pw.println(); + if (dumpAll) { + pw.println("-------------------------------------------------------------------------------"); + } + dumpBroadcastsLocked(fd, pw, args, opti, dumpAll, dumpPackage); + pw.println(); + if (dumpAll) { + pw.println("-------------------------------------------------------------------------------"); + } + dumpProvidersLocked(fd, pw, args, opti, dumpAll, dumpPackage); + pw.println(); + if (dumpAll) { + pw.println("-------------------------------------------------------------------------------"); + } + mServices.dumpServicesLocked(fd, pw, args, opti, dumpAll, dumpClient, dumpPackage); + pw.println(); + if (dumpAll) { + pw.println("-------------------------------------------------------------------------------"); + } + dumpActivitiesLocked(fd, pw, args, opti, dumpAll, dumpClient, dumpPackage); + pw.println(); + if (dumpAll) { + pw.println("-------------------------------------------------------------------------------"); + } + dumpProcessesLocked(fd, pw, args, opti, dumpAll, dumpPackage); + } + Binder.restoreCallingIdentity(origId); + } + + void dumpActivitiesLocked(FileDescriptor fd, PrintWriter pw, String[] args, + int opti, boolean dumpAll, boolean dumpClient, String dumpPackage) { + pw.println("ACTIVITY MANAGER ACTIVITIES (dumpsys activity activities)"); + + boolean printedAnything = mStackSupervisor.dumpActivitiesLocked(fd, pw, dumpAll, dumpClient, + dumpPackage); + boolean needSep = printedAnything; + + boolean printed = ActivityStackSupervisor.printThisActivity(pw, mFocusedActivity, + dumpPackage, needSep, " mFocusedActivity: "); + if (printed) { + printedAnything = true; + needSep = false; + } + + if (dumpPackage == null) { + if (needSep) { + pw.println(); + } + needSep = true; + printedAnything = true; + mStackSupervisor.dump(pw, " "); + } + + if (mRecentTasks.size() > 0) { + boolean printedHeader = false; + + final int N = mRecentTasks.size(); + for (int i=0; i<N; i++) { + TaskRecord tr = mRecentTasks.get(i); + if (dumpPackage != null) { + if (tr.realActivity == null || + !dumpPackage.equals(tr.realActivity)) { + continue; + } + } + if (!printedHeader) { + if (needSep) { + pw.println(); + } + pw.println(" Recent tasks:"); + printedHeader = true; + printedAnything = true; + } + pw.print(" * Recent #"); pw.print(i); pw.print(": "); + pw.println(tr); + if (dumpAll) { + mRecentTasks.get(i).dump(pw, " "); + } + } + } + + if (!printedAnything) { + pw.println(" (nothing)"); + } + } + + void dumpProcessesLocked(FileDescriptor fd, PrintWriter pw, String[] args, + int opti, boolean dumpAll, String dumpPackage) { + boolean needSep = false; + boolean printedAnything = false; + int numPers = 0; + + pw.println("ACTIVITY MANAGER RUNNING PROCESSES (dumpsys activity processes)"); + + if (dumpAll) { + final int NP = mProcessNames.getMap().size(); + for (int ip=0; ip<NP; ip++) { + SparseArray<ProcessRecord> procs = mProcessNames.getMap().valueAt(ip); + final int NA = procs.size(); + for (int ia=0; ia<NA; ia++) { + ProcessRecord r = procs.valueAt(ia); + if (dumpPackage != null && !r.pkgList.containsKey(dumpPackage)) { + continue; + } + if (!needSep) { + pw.println(" All known processes:"); + needSep = true; + printedAnything = true; + } + pw.print(r.persistent ? " *PERS*" : " *APP*"); + pw.print(" UID "); pw.print(procs.keyAt(ia)); + pw.print(" "); pw.println(r); + r.dump(pw, " "); + if (r.persistent) { + numPers++; + } + } + } + } + + if (mIsolatedProcesses.size() > 0) { + boolean printed = false; + for (int i=0; i<mIsolatedProcesses.size(); i++) { + ProcessRecord r = mIsolatedProcesses.valueAt(i); + if (dumpPackage != null && !r.pkgList.containsKey(dumpPackage)) { + continue; + } + if (!printed) { + if (needSep) { + pw.println(); + } + pw.println(" Isolated process list (sorted by uid):"); + printedAnything = true; + printed = true; + needSep = true; + } + pw.println(String.format("%sIsolated #%2d: %s", + " ", i, r.toString())); + } + } + + if (mLruProcesses.size() > 0) { + if (needSep) { + pw.println(); + } + pw.print(" Process LRU list (sorted by oom_adj, "); pw.print(mLruProcesses.size()); + pw.print(" total, non-act at "); + pw.print(mLruProcesses.size()-mLruProcessActivityStart); + pw.print(", non-svc at "); + pw.print(mLruProcesses.size()-mLruProcessServiceStart); + pw.println("):"); + dumpProcessOomList(pw, this, mLruProcesses, " ", "Proc", "PERS", false, dumpPackage); + needSep = true; + printedAnything = true; + } + + if (dumpAll || dumpPackage != null) { + synchronized (mPidsSelfLocked) { + boolean printed = false; + for (int i=0; i<mPidsSelfLocked.size(); i++) { + ProcessRecord r = mPidsSelfLocked.valueAt(i); + if (dumpPackage != null && !r.pkgList.containsKey(dumpPackage)) { + continue; + } + if (!printed) { + if (needSep) pw.println(); + needSep = true; + pw.println(" PID mappings:"); + printed = true; + printedAnything = true; + } + pw.print(" PID #"); pw.print(mPidsSelfLocked.keyAt(i)); + pw.print(": "); pw.println(mPidsSelfLocked.valueAt(i)); + } + } + } + + if (mForegroundProcesses.size() > 0) { + synchronized (mPidsSelfLocked) { + boolean printed = false; + for (int i=0; i<mForegroundProcesses.size(); i++) { + ProcessRecord r = mPidsSelfLocked.get( + mForegroundProcesses.valueAt(i).pid); + if (dumpPackage != null && (r == null + || !r.pkgList.containsKey(dumpPackage))) { + continue; + } + if (!printed) { + if (needSep) pw.println(); + needSep = true; + pw.println(" Foreground Processes:"); + printed = true; + printedAnything = true; + } + pw.print(" PID #"); pw.print(mForegroundProcesses.keyAt(i)); + pw.print(": "); pw.println(mForegroundProcesses.valueAt(i)); + } + } + } + + if (mPersistentStartingProcesses.size() > 0) { + if (needSep) pw.println(); + needSep = true; + printedAnything = true; + pw.println(" Persisent processes that are starting:"); + dumpProcessList(pw, this, mPersistentStartingProcesses, " ", + "Starting Norm", "Restarting PERS", dumpPackage); + } + + if (mRemovedProcesses.size() > 0) { + if (needSep) pw.println(); + needSep = true; + printedAnything = true; + pw.println(" Processes that are being removed:"); + dumpProcessList(pw, this, mRemovedProcesses, " ", + "Removed Norm", "Removed PERS", dumpPackage); + } + + if (mProcessesOnHold.size() > 0) { + if (needSep) pw.println(); + needSep = true; + printedAnything = true; + pw.println(" Processes that are on old until the system is ready:"); + dumpProcessList(pw, this, mProcessesOnHold, " ", + "OnHold Norm", "OnHold PERS", dumpPackage); + } + + needSep = dumpProcessesToGc(fd, pw, args, opti, needSep, dumpAll, dumpPackage); + + if (mProcessCrashTimes.getMap().size() > 0) { + boolean printed = false; + long now = SystemClock.uptimeMillis(); + final ArrayMap<String, SparseArray<Long>> pmap = mProcessCrashTimes.getMap(); + final int NP = pmap.size(); + for (int ip=0; ip<NP; ip++) { + String pname = pmap.keyAt(ip); + SparseArray<Long> uids = pmap.valueAt(ip); + final int N = uids.size(); + for (int i=0; i<N; i++) { + int puid = uids.keyAt(i); + ProcessRecord r = mProcessNames.get(pname, puid); + if (dumpPackage != null && (r == null + || !r.pkgList.containsKey(dumpPackage))) { + continue; + } + if (!printed) { + if (needSep) pw.println(); + needSep = true; + pw.println(" Time since processes crashed:"); + printed = true; + printedAnything = true; + } + pw.print(" Process "); pw.print(pname); + pw.print(" uid "); pw.print(puid); + pw.print(": last crashed "); + TimeUtils.formatDuration(now-uids.valueAt(i), pw); + pw.println(" ago"); + } + } + } + + if (mBadProcesses.getMap().size() > 0) { + boolean printed = false; + final ArrayMap<String, SparseArray<BadProcessInfo>> pmap = mBadProcesses.getMap(); + final int NP = pmap.size(); + for (int ip=0; ip<NP; ip++) { + String pname = pmap.keyAt(ip); + SparseArray<BadProcessInfo> uids = pmap.valueAt(ip); + final int N = uids.size(); + for (int i=0; i<N; i++) { + int puid = uids.keyAt(i); + ProcessRecord r = mProcessNames.get(pname, puid); + if (dumpPackage != null && (r == null + || !r.pkgList.containsKey(dumpPackage))) { + continue; + } + if (!printed) { + if (needSep) pw.println(); + needSep = true; + pw.println(" Bad processes:"); + printedAnything = true; + } + BadProcessInfo info = uids.valueAt(i); + pw.print(" Bad process "); pw.print(pname); + pw.print(" uid "); pw.print(puid); + pw.print(": crashed at time "); pw.println(info.time); + if (info.shortMsg != null) { + pw.print(" Short msg: "); pw.println(info.shortMsg); + } + if (info.longMsg != null) { + pw.print(" Long msg: "); pw.println(info.longMsg); + } + if (info.stack != null) { + pw.println(" Stack:"); + int lastPos = 0; + for (int pos=0; pos<info.stack.length(); pos++) { + if (info.stack.charAt(pos) == '\n') { + pw.print(" "); + pw.write(info.stack, lastPos, pos-lastPos); + pw.println(); + lastPos = pos+1; + } + } + if (lastPos < info.stack.length()) { + pw.print(" "); + pw.write(info.stack, lastPos, info.stack.length()-lastPos); + pw.println(); + } + } + } + } + } + + if (dumpPackage == null) { + pw.println(); + needSep = false; + pw.println(" mStartedUsers:"); + for (int i=0; i<mStartedUsers.size(); i++) { + UserStartedState uss = mStartedUsers.valueAt(i); + pw.print(" User #"); pw.print(uss.mHandle.getIdentifier()); + pw.print(": "); uss.dump("", pw); + } + pw.print(" mStartedUserArray: ["); + for (int i=0; i<mStartedUserArray.length; i++) { + if (i > 0) pw.print(", "); + pw.print(mStartedUserArray[i]); + } + pw.println("]"); + pw.print(" mUserLru: ["); + for (int i=0; i<mUserLru.size(); i++) { + if (i > 0) pw.print(", "); + pw.print(mUserLru.get(i)); + } + pw.println("]"); + if (dumpAll) { + pw.print(" mStartedUserArray: "); pw.println(Arrays.toString(mStartedUserArray)); + } + } + if (mHomeProcess != null && (dumpPackage == null + || mHomeProcess.pkgList.containsKey(dumpPackage))) { + if (needSep) { + pw.println(); + needSep = false; + } + pw.println(" mHomeProcess: " + mHomeProcess); + } + if (mPreviousProcess != null && (dumpPackage == null + || mPreviousProcess.pkgList.containsKey(dumpPackage))) { + if (needSep) { + pw.println(); + needSep = false; + } + pw.println(" mPreviousProcess: " + mPreviousProcess); + } + if (dumpAll) { + StringBuilder sb = new StringBuilder(128); + sb.append(" mPreviousProcessVisibleTime: "); + TimeUtils.formatDuration(mPreviousProcessVisibleTime, sb); + pw.println(sb); + } + if (mHeavyWeightProcess != null && (dumpPackage == null + || mHeavyWeightProcess.pkgList.containsKey(dumpPackage))) { + if (needSep) { + pw.println(); + needSep = false; + } + pw.println(" mHeavyWeightProcess: " + mHeavyWeightProcess); + } + if (dumpPackage == null) { + pw.println(" mConfiguration: " + mConfiguration); + } + if (dumpAll) { + pw.println(" mConfigWillChange: " + getFocusedStack().mConfigWillChange); + if (mCompatModePackages.getPackages().size() > 0) { + boolean printed = false; + for (Map.Entry<String, Integer> entry + : mCompatModePackages.getPackages().entrySet()) { + String pkg = entry.getKey(); + int mode = entry.getValue(); + if (dumpPackage != null && !dumpPackage.equals(pkg)) { + continue; + } + if (!printed) { + pw.println(" mScreenCompatPackages:"); + printed = true; + } + pw.print(" "); pw.print(pkg); pw.print(": "); + pw.print(mode); pw.println(); + } + } + } + if (dumpPackage == null) { + if (mSleeping || mWentToSleep || mLockScreenShown) { + pw.println(" mSleeping=" + mSleeping + " mWentToSleep=" + mWentToSleep + + " mLockScreenShown " + mLockScreenShown); + } + if (mShuttingDown) { + pw.println(" mShuttingDown=" + mShuttingDown); + } + } + if (mDebugApp != null || mOrigDebugApp != null || mDebugTransient + || mOrigWaitForDebugger) { + if (dumpPackage == null || dumpPackage.equals(mDebugApp) + || dumpPackage.equals(mOrigDebugApp)) { + if (needSep) { + pw.println(); + needSep = false; + } + pw.println(" mDebugApp=" + mDebugApp + "/orig=" + mOrigDebugApp + + " mDebugTransient=" + mDebugTransient + + " mOrigWaitForDebugger=" + mOrigWaitForDebugger); + } + } + if (mOpenGlTraceApp != null) { + if (dumpPackage == null || dumpPackage.equals(mOpenGlTraceApp)) { + if (needSep) { + pw.println(); + needSep = false; + } + pw.println(" mOpenGlTraceApp=" + mOpenGlTraceApp); + } + } + if (mProfileApp != null || mProfileProc != null || mProfileFile != null + || mProfileFd != null) { + if (dumpPackage == null || dumpPackage.equals(mProfileApp)) { + if (needSep) { + pw.println(); + needSep = false; + } + pw.println(" mProfileApp=" + mProfileApp + " mProfileProc=" + mProfileProc); + pw.println(" mProfileFile=" + mProfileFile + " mProfileFd=" + mProfileFd); + pw.println(" mProfileType=" + mProfileType + " mAutoStopProfiler=" + + mAutoStopProfiler); + } + } + if (dumpPackage == null) { + if (mAlwaysFinishActivities || mController != null) { + pw.println(" mAlwaysFinishActivities=" + mAlwaysFinishActivities + + " mController=" + mController); + } + if (dumpAll) { + pw.println(" Total persistent processes: " + numPers); + pw.println(" mStartRunning=" + mStartRunning + + " mProcessesReady=" + mProcessesReady + + " mSystemReady=" + mSystemReady); + pw.println(" mBooting=" + mBooting + + " mBooted=" + mBooted + + " mFactoryTest=" + mFactoryTest); + pw.print(" mLastPowerCheckRealtime="); + TimeUtils.formatDuration(mLastPowerCheckRealtime, pw); + pw.println(""); + pw.print(" mLastPowerCheckUptime="); + TimeUtils.formatDuration(mLastPowerCheckUptime, pw); + pw.println(""); + pw.println(" mGoingToSleep=" + mStackSupervisor.mGoingToSleep); + pw.println(" mLaunchingActivity=" + mStackSupervisor.mLaunchingActivity); + pw.println(" mAdjSeq=" + mAdjSeq + " mLruSeq=" + mLruSeq); + pw.println(" mNumNonCachedProcs=" + mNumNonCachedProcs + + " (" + mLruProcesses.size() + " total)" + + " mNumCachedHiddenProcs=" + mNumCachedHiddenProcs + + " mNumServiceProcs=" + mNumServiceProcs + + " mNewNumServiceProcs=" + mNewNumServiceProcs); + pw.println(" mAllowLowerMemLevel=" + mAllowLowerMemLevel + + " mLastMemoryLevel" + mLastMemoryLevel + + " mLastNumProcesses" + mLastNumProcesses); + long now = SystemClock.uptimeMillis(); + pw.print(" mLastIdleTime="); + TimeUtils.formatDuration(now, mLastIdleTime, pw); + pw.print(" mLowRamSinceLastIdle="); + TimeUtils.formatDuration(getLowRamTimeSinceIdle(now), pw); + pw.println(); + } + } + + if (!printedAnything) { + pw.println(" (nothing)"); + } + } + + boolean dumpProcessesToGc(FileDescriptor fd, PrintWriter pw, String[] args, + int opti, boolean needSep, boolean dumpAll, String dumpPackage) { + if (mProcessesToGc.size() > 0) { + boolean printed = false; + long now = SystemClock.uptimeMillis(); + for (int i=0; i<mProcessesToGc.size(); i++) { + ProcessRecord proc = mProcessesToGc.get(i); + if (dumpPackage != null && !dumpPackage.equals(proc.info.packageName)) { + continue; + } + if (!printed) { + if (needSep) pw.println(); + needSep = true; + pw.println(" Processes that are waiting to GC:"); + printed = true; + } + pw.print(" Process "); pw.println(proc); + pw.print(" lowMem="); pw.print(proc.reportLowMemory); + pw.print(", last gced="); + pw.print(now-proc.lastRequestedGc); + pw.print(" ms ago, last lowMem="); + pw.print(now-proc.lastLowMemory); + pw.println(" ms ago"); + + } + } + return needSep; + } + + void printOomLevel(PrintWriter pw, String name, int adj) { + pw.print(" "); + if (adj >= 0) { + pw.print(' '); + if (adj < 10) pw.print(' '); + } else { + if (adj > -10) pw.print(' '); + } + pw.print(adj); + pw.print(": "); + pw.print(name); + pw.print(" ("); + pw.print(mProcessList.getMemLevel(adj)/1024); + pw.println(" kB)"); + } + + boolean dumpOomLocked(FileDescriptor fd, PrintWriter pw, String[] args, + int opti, boolean dumpAll) { + boolean needSep = false; + + if (mLruProcesses.size() > 0) { + if (needSep) pw.println(); + needSep = true; + pw.println(" OOM levels:"); + printOomLevel(pw, "SYSTEM_ADJ", ProcessList.SYSTEM_ADJ); + printOomLevel(pw, "PERSISTENT_PROC_ADJ", ProcessList.PERSISTENT_PROC_ADJ); + printOomLevel(pw, "FOREGROUND_APP_ADJ", ProcessList.FOREGROUND_APP_ADJ); + printOomLevel(pw, "VISIBLE_APP_ADJ", ProcessList.VISIBLE_APP_ADJ); + printOomLevel(pw, "PERCEPTIBLE_APP_ADJ", ProcessList.PERCEPTIBLE_APP_ADJ); + printOomLevel(pw, "BACKUP_APP_ADJ", ProcessList.BACKUP_APP_ADJ); + printOomLevel(pw, "HEAVY_WEIGHT_APP_ADJ", ProcessList.HEAVY_WEIGHT_APP_ADJ); + printOomLevel(pw, "SERVICE_ADJ", ProcessList.SERVICE_ADJ); + printOomLevel(pw, "HOME_APP_ADJ", ProcessList.HOME_APP_ADJ); + printOomLevel(pw, "PREVIOUS_APP_ADJ", ProcessList.PREVIOUS_APP_ADJ); + printOomLevel(pw, "SERVICE_B_ADJ", ProcessList.SERVICE_B_ADJ); + printOomLevel(pw, "CACHED_APP_MIN_ADJ", ProcessList.CACHED_APP_MIN_ADJ); + printOomLevel(pw, "CACHED_APP_MAX_ADJ", ProcessList.CACHED_APP_MAX_ADJ); + + if (needSep) pw.println(); + pw.print(" Process OOM control ("); pw.print(mLruProcesses.size()); + pw.print(" total, non-act at "); + pw.print(mLruProcesses.size()-mLruProcessActivityStart); + pw.print(", non-svc at "); + pw.print(mLruProcesses.size()-mLruProcessServiceStart); + pw.println("):"); + dumpProcessOomList(pw, this, mLruProcesses, " ", "Proc", "PERS", true, null); + needSep = true; + } + + dumpProcessesToGc(fd, pw, args, opti, needSep, dumpAll, null); + + pw.println(); + pw.println(" mHomeProcess: " + mHomeProcess); + pw.println(" mPreviousProcess: " + mPreviousProcess); + if (mHeavyWeightProcess != null) { + pw.println(" mHeavyWeightProcess: " + mHeavyWeightProcess); + } + + return true; + } + + /** + * There are three ways to call this: + * - no provider specified: dump all the providers + * - a flattened component name that matched an existing provider was specified as the + * first arg: dump that one provider + * - the first arg isn't the flattened component name of an existing provider: + * dump all providers whose component contains the first arg as a substring + */ + protected boolean dumpProvider(FileDescriptor fd, PrintWriter pw, String name, String[] args, + int opti, boolean dumpAll) { + return mProviderMap.dumpProvider(fd, pw, name, args, opti, dumpAll); + } + + static class ItemMatcher { + ArrayList<ComponentName> components; + ArrayList<String> strings; + ArrayList<Integer> objects; + boolean all; + + ItemMatcher() { + all = true; + } + + void build(String name) { + ComponentName componentName = ComponentName.unflattenFromString(name); + if (componentName != null) { + if (components == null) { + components = new ArrayList<ComponentName>(); + } + components.add(componentName); + all = false; + } else { + int objectId = 0; + // Not a '/' separated full component name; maybe an object ID? + try { + objectId = Integer.parseInt(name, 16); + if (objects == null) { + objects = new ArrayList<Integer>(); + } + objects.add(objectId); + all = false; + } catch (RuntimeException e) { + // Not an integer; just do string match. + if (strings == null) { + strings = new ArrayList<String>(); + } + strings.add(name); + all = false; + } + } + } + + int build(String[] args, int opti) { + for (; opti<args.length; opti++) { + String name = args[opti]; + if ("--".equals(name)) { + return opti+1; + } + build(name); + } + return opti; + } + + boolean match(Object object, ComponentName comp) { + if (all) { + return true; + } + if (components != null) { + for (int i=0; i<components.size(); i++) { + if (components.get(i).equals(comp)) { + return true; + } + } + } + if (objects != null) { + for (int i=0; i<objects.size(); i++) { + if (System.identityHashCode(object) == objects.get(i)) { + return true; + } + } + } + if (strings != null) { + String flat = comp.flattenToString(); + for (int i=0; i<strings.size(); i++) { + if (flat.contains(strings.get(i))) { + return true; + } + } + } + return false; + } + } + + /** + * There are three things that cmd can be: + * - a flattened component name that matches an existing activity + * - the cmd arg isn't the flattened component name of an existing activity: + * dump all activity whose component contains the cmd as a substring + * - A hex number of the ActivityRecord object instance. + */ + protected boolean dumpActivity(FileDescriptor fd, PrintWriter pw, String name, String[] args, + int opti, boolean dumpAll) { + ArrayList<ActivityRecord> activities; + + synchronized (this) { + activities = mStackSupervisor.getDumpActivitiesLocked(name); + } + + if (activities.size() <= 0) { + return false; + } + + String[] newArgs = new String[args.length - opti]; + System.arraycopy(args, opti, newArgs, 0, args.length - opti); + + TaskRecord lastTask = null; + boolean needSep = false; + for (int i=activities.size()-1; i>=0; i--) { + ActivityRecord r = activities.get(i); + if (needSep) { + pw.println(); + } + needSep = true; + synchronized (this) { + if (lastTask != r.task) { + lastTask = r.task; + pw.print("TASK "); pw.print(lastTask.affinity); + pw.print(" id="); pw.println(lastTask.taskId); + if (dumpAll) { + lastTask.dump(pw, " "); + } + } + } + dumpActivity(" ", fd, pw, activities.get(i), newArgs, dumpAll); + } + return true; + } + + /** + * Invokes IApplicationThread.dumpActivity() on the thread of the specified activity if + * there is a thread associated with the activity. + */ + private void dumpActivity(String prefix, FileDescriptor fd, PrintWriter pw, + final ActivityRecord r, String[] args, boolean dumpAll) { + String innerPrefix = prefix + " "; + synchronized (this) { + pw.print(prefix); pw.print("ACTIVITY "); pw.print(r.shortComponentName); + pw.print(" "); pw.print(Integer.toHexString(System.identityHashCode(r))); + pw.print(" pid="); + if (r.app != null) pw.println(r.app.pid); + else pw.println("(not running)"); + if (dumpAll) { + r.dump(pw, innerPrefix); + } + } + if (r.app != null && r.app.thread != null) { + // flush anything that is already in the PrintWriter since the thread is going + // to write to the file descriptor directly + pw.flush(); + try { + TransferPipe tp = new TransferPipe(); + try { + r.app.thread.dumpActivity(tp.getWriteFd().getFileDescriptor(), + r.appToken, innerPrefix, args); + tp.go(fd); + } finally { + tp.kill(); + } + } catch (IOException e) { + pw.println(innerPrefix + "Failure while dumping the activity: " + e); + } catch (RemoteException e) { + pw.println(innerPrefix + "Got a RemoteException while dumping the activity"); + } + } + } + + void dumpBroadcastsLocked(FileDescriptor fd, PrintWriter pw, String[] args, + int opti, boolean dumpAll, String dumpPackage) { + boolean needSep = false; + boolean onlyHistory = false; + boolean printedAnything = false; + + if ("history".equals(dumpPackage)) { + if (opti < args.length && "-s".equals(args[opti])) { + dumpAll = false; + } + onlyHistory = true; + dumpPackage = null; + } + + pw.println("ACTIVITY MANAGER BROADCAST STATE (dumpsys activity broadcasts)"); + if (!onlyHistory && dumpAll) { + if (mRegisteredReceivers.size() > 0) { + boolean printed = false; + Iterator it = mRegisteredReceivers.values().iterator(); + while (it.hasNext()) { + ReceiverList r = (ReceiverList)it.next(); + if (dumpPackage != null && (r.app == null || + !dumpPackage.equals(r.app.info.packageName))) { + continue; + } + if (!printed) { + pw.println(" Registered Receivers:"); + needSep = true; + printed = true; + printedAnything = true; + } + pw.print(" * "); pw.println(r); + r.dump(pw, " "); + } + } + + if (mReceiverResolver.dump(pw, needSep ? + "\n Receiver Resolver Table:" : " Receiver Resolver Table:", + " ", dumpPackage, false)) { + needSep = true; + printedAnything = true; + } + } + + for (BroadcastQueue q : mBroadcastQueues) { + needSep = q.dumpLocked(fd, pw, args, opti, dumpAll, dumpPackage, needSep); + printedAnything |= needSep; + } + + needSep = true; + + if (!onlyHistory && mStickyBroadcasts != null && dumpPackage == null) { + for (int user=0; user<mStickyBroadcasts.size(); user++) { + if (needSep) { + pw.println(); + } + needSep = true; + printedAnything = true; + pw.print(" Sticky broadcasts for user "); + pw.print(mStickyBroadcasts.keyAt(user)); pw.println(":"); + StringBuilder sb = new StringBuilder(128); + for (Map.Entry<String, ArrayList<Intent>> ent + : mStickyBroadcasts.valueAt(user).entrySet()) { + pw.print(" * Sticky action "); pw.print(ent.getKey()); + if (dumpAll) { + pw.println(":"); + ArrayList<Intent> intents = ent.getValue(); + final int N = intents.size(); + for (int i=0; i<N; i++) { + sb.setLength(0); + sb.append(" Intent: "); + intents.get(i).toShortString(sb, false, true, false, false); + pw.println(sb.toString()); + Bundle bundle = intents.get(i).getExtras(); + if (bundle != null) { + pw.print(" "); + pw.println(bundle.toString()); + } + } + } else { + pw.println(""); + } + } + } + } + + if (!onlyHistory && dumpAll) { + pw.println(); + for (BroadcastQueue queue : mBroadcastQueues) { + pw.println(" mBroadcastsScheduled [" + queue.mQueueName + "]=" + + queue.mBroadcastsScheduled); + } + pw.println(" mHandler:"); + mHandler.dump(new PrintWriterPrinter(pw), " "); + needSep = true; + printedAnything = true; + } + + if (!printedAnything) { + pw.println(" (nothing)"); + } + } + + void dumpProvidersLocked(FileDescriptor fd, PrintWriter pw, String[] args, + int opti, boolean dumpAll, String dumpPackage) { + boolean needSep; + boolean printedAnything = false; + + ItemMatcher matcher = new ItemMatcher(); + matcher.build(args, opti); + + pw.println("ACTIVITY MANAGER CONTENT PROVIDERS (dumpsys activity providers)"); + + needSep = mProviderMap.dumpProvidersLocked(pw, dumpAll, dumpPackage); + printedAnything |= needSep; + + if (mLaunchingProviders.size() > 0) { + boolean printed = false; + for (int i=mLaunchingProviders.size()-1; i>=0; i--) { + ContentProviderRecord r = mLaunchingProviders.get(i); + if (dumpPackage != null && !dumpPackage.equals(r.name.getPackageName())) { + continue; + } + if (!printed) { + if (needSep) pw.println(); + needSep = true; + pw.println(" Launching content providers:"); + printed = true; + printedAnything = true; + } + pw.print(" Launching #"); pw.print(i); pw.print(": "); + pw.println(r); + } + } + + if (mGrantedUriPermissions.size() > 0) { + boolean printed = false; + int dumpUid = -2; + if (dumpPackage != null) { + try { + dumpUid = mContext.getPackageManager().getPackageUid(dumpPackage, 0); + } catch (NameNotFoundException e) { + dumpUid = -1; + } + } + for (int i=0; i<mGrantedUriPermissions.size(); i++) { + int uid = mGrantedUriPermissions.keyAt(i); + if (dumpUid >= -1 && UserHandle.getAppId(uid) != dumpUid) { + continue; + } + ArrayMap<Uri, UriPermission> perms + = mGrantedUriPermissions.valueAt(i); + if (!printed) { + if (needSep) pw.println(); + needSep = true; + pw.println(" Granted Uri Permissions:"); + printed = true; + printedAnything = true; + } + pw.print(" * UID "); pw.print(uid); + pw.println(" holds:"); + for (UriPermission perm : perms.values()) { + pw.print(" "); pw.println(perm); + if (dumpAll) { + perm.dump(pw, " "); + } + } + } + } + + if (!printedAnything) { + pw.println(" (nothing)"); + } + } + + void dumpPendingIntentsLocked(FileDescriptor fd, PrintWriter pw, String[] args, + int opti, boolean dumpAll, String dumpPackage) { + boolean printed = false; + + pw.println("ACTIVITY MANAGER PENDING INTENTS (dumpsys activity intents)"); + + if (mIntentSenderRecords.size() > 0) { + Iterator<WeakReference<PendingIntentRecord>> it + = mIntentSenderRecords.values().iterator(); + while (it.hasNext()) { + WeakReference<PendingIntentRecord> ref = it.next(); + PendingIntentRecord rec = ref != null ? ref.get(): null; + if (dumpPackage != null && (rec == null + || !dumpPackage.equals(rec.key.packageName))) { + continue; + } + printed = true; + if (rec != null) { + pw.print(" * "); pw.println(rec); + if (dumpAll) { + rec.dump(pw, " "); + } + } else { + pw.print(" * "); pw.println(ref); + } + } + } + + if (!printed) { + pw.println(" (nothing)"); + } + } + + private static final int dumpProcessList(PrintWriter pw, + ActivityManagerService service, List list, + String prefix, String normalLabel, String persistentLabel, + String dumpPackage) { + int numPers = 0; + final int N = list.size()-1; + for (int i=N; i>=0; i--) { + ProcessRecord r = (ProcessRecord)list.get(i); + if (dumpPackage != null && !dumpPackage.equals(r.info.packageName)) { + continue; + } + pw.println(String.format("%s%s #%2d: %s", + prefix, (r.persistent ? persistentLabel : normalLabel), + i, r.toString())); + if (r.persistent) { + numPers++; + } + } + return numPers; + } + + private static final boolean dumpProcessOomList(PrintWriter pw, + ActivityManagerService service, List<ProcessRecord> origList, + String prefix, String normalLabel, String persistentLabel, + boolean inclDetails, String dumpPackage) { + + ArrayList<Pair<ProcessRecord, Integer>> list + = new ArrayList<Pair<ProcessRecord, Integer>>(origList.size()); + for (int i=0; i<origList.size(); i++) { + ProcessRecord r = origList.get(i); + if (dumpPackage != null && !r.pkgList.containsKey(dumpPackage)) { + continue; + } + list.add(new Pair<ProcessRecord, Integer>(origList.get(i), i)); + } + + if (list.size() <= 0) { + return false; + } + + Comparator<Pair<ProcessRecord, Integer>> comparator + = new Comparator<Pair<ProcessRecord, Integer>>() { + @Override + public int compare(Pair<ProcessRecord, Integer> object1, + Pair<ProcessRecord, Integer> object2) { + if (object1.first.setAdj != object2.first.setAdj) { + return object1.first.setAdj > object2.first.setAdj ? -1 : 1; + } + if (object1.second.intValue() != object2.second.intValue()) { + return object1.second.intValue() > object2.second.intValue() ? -1 : 1; + } + return 0; + } + }; + + Collections.sort(list, comparator); + + final long curRealtime = SystemClock.elapsedRealtime(); + final long realtimeSince = curRealtime - service.mLastPowerCheckRealtime; + final long curUptime = SystemClock.uptimeMillis(); + final long uptimeSince = curUptime - service.mLastPowerCheckUptime; + + for (int i=list.size()-1; i>=0; i--) { + ProcessRecord r = list.get(i).first; + String oomAdj = ProcessList.makeOomAdjString(r.setAdj); + char schedGroup; + switch (r.setSchedGroup) { + case Process.THREAD_GROUP_BG_NONINTERACTIVE: + schedGroup = 'B'; + break; + case Process.THREAD_GROUP_DEFAULT: + schedGroup = 'F'; + break; + default: + schedGroup = '?'; + break; + } + char foreground; + if (r.foregroundActivities) { + foreground = 'A'; + } else if (r.foregroundServices) { + foreground = 'S'; + } else { + foreground = ' '; + } + String procState = ProcessList.makeProcStateString(r.curProcState); + pw.print(prefix); + pw.print(r.persistent ? persistentLabel : normalLabel); + pw.print(" #"); + int num = (origList.size()-1)-list.get(i).second; + if (num < 10) pw.print(' '); + pw.print(num); + pw.print(": "); + pw.print(oomAdj); + pw.print(' '); + pw.print(schedGroup); + pw.print('/'); + pw.print(foreground); + pw.print('/'); + pw.print(procState); + pw.print(" trm:"); + if (r.trimMemoryLevel < 10) pw.print(' '); + pw.print(r.trimMemoryLevel); + pw.print(' '); + pw.print(r.toShortString()); + pw.print(" ("); + pw.print(r.adjType); + pw.println(')'); + if (r.adjSource != null || r.adjTarget != null) { + pw.print(prefix); + pw.print(" "); + if (r.adjTarget instanceof ComponentName) { + pw.print(((ComponentName)r.adjTarget).flattenToShortString()); + } else if (r.adjTarget != null) { + pw.print(r.adjTarget.toString()); + } else { + pw.print("{null}"); + } + pw.print("<="); + if (r.adjSource instanceof ProcessRecord) { + pw.print("Proc{"); + pw.print(((ProcessRecord)r.adjSource).toShortString()); + pw.println("}"); + } else if (r.adjSource != null) { + pw.println(r.adjSource.toString()); + } else { + pw.println("{null}"); + } + } + if (inclDetails) { + pw.print(prefix); + pw.print(" "); + pw.print("oom: max="); pw.print(r.maxAdj); + pw.print(" curRaw="); pw.print(r.curRawAdj); + pw.print(" setRaw="); pw.print(r.setRawAdj); + pw.print(" cur="); pw.print(r.curAdj); + pw.print(" set="); pw.println(r.setAdj); + pw.print(prefix); + pw.print(" "); + pw.print("state: cur="); pw.print(ProcessList.makeProcStateString(r.curProcState)); + pw.print(" set="); pw.print(ProcessList.makeProcStateString(r.setProcState)); + pw.print(" lastPss="); pw.print(r.lastPss); + pw.print(" lastCachedPss="); pw.println(r.lastCachedPss); + pw.print(prefix); + pw.print(" "); + pw.print("keeping="); pw.print(r.keeping); + pw.print(" cached="); pw.print(r.cached); + pw.print(" empty="); pw.print(r.empty); + pw.print(" hasAboveClient="); pw.println(r.hasAboveClient); + + if (!r.keeping) { + if (r.lastWakeTime != 0) { + long wtime; + BatteryStatsImpl stats = service.mBatteryStatsService.getActiveStatistics(); + synchronized (stats) { + wtime = stats.getProcessWakeTime(r.info.uid, + r.pid, curRealtime); + } + long timeUsed = wtime - r.lastWakeTime; + pw.print(prefix); + pw.print(" "); + pw.print("keep awake over "); + TimeUtils.formatDuration(realtimeSince, pw); + pw.print(" used "); + TimeUtils.formatDuration(timeUsed, pw); + pw.print(" ("); + pw.print((timeUsed*100)/realtimeSince); + pw.println("%)"); + } + if (r.lastCpuTime != 0) { + long timeUsed = r.curCpuTime - r.lastCpuTime; + pw.print(prefix); + pw.print(" "); + pw.print("run cpu over "); + TimeUtils.formatDuration(uptimeSince, pw); + pw.print(" used "); + TimeUtils.formatDuration(timeUsed, pw); + pw.print(" ("); + pw.print((timeUsed*100)/uptimeSince); + pw.println("%)"); + } + } + } + } + return true; + } + + ArrayList<ProcessRecord> collectProcesses(PrintWriter pw, int start, String[] args) { + ArrayList<ProcessRecord> procs; + synchronized (this) { + if (args != null && args.length > start + && args[start].charAt(0) != '-') { + procs = new ArrayList<ProcessRecord>(); + int pid = -1; + try { + pid = Integer.parseInt(args[start]); + } catch (NumberFormatException e) { + } + for (int i=mLruProcesses.size()-1; i>=0; i--) { + ProcessRecord proc = mLruProcesses.get(i); + if (proc.pid == pid) { + procs.add(proc); + } else if (proc.processName.equals(args[start])) { + procs.add(proc); + } + } + if (procs.size() <= 0) { + return null; + } + } else { + procs = new ArrayList<ProcessRecord>(mLruProcesses); + } + } + return procs; + } + + final void dumpGraphicsHardwareUsage(FileDescriptor fd, + PrintWriter pw, String[] args) { + ArrayList<ProcessRecord> procs = collectProcesses(pw, 0, args); + if (procs == null) { + pw.println("No process found for: " + args[0]); + return; + } + + long uptime = SystemClock.uptimeMillis(); + long realtime = SystemClock.elapsedRealtime(); + pw.println("Applications Graphics Acceleration Info:"); + pw.println("Uptime: " + uptime + " Realtime: " + realtime); + + for (int i = procs.size() - 1 ; i >= 0 ; i--) { + ProcessRecord r = procs.get(i); + if (r.thread != null) { + pw.println("\n** Graphics info for pid " + r.pid + " [" + r.processName + "] **"); + pw.flush(); + try { + TransferPipe tp = new TransferPipe(); + try { + r.thread.dumpGfxInfo(tp.getWriteFd().getFileDescriptor(), args); + tp.go(fd); + } finally { + tp.kill(); + } + } catch (IOException e) { + pw.println("Failure while dumping the app: " + r); + pw.flush(); + } catch (RemoteException e) { + pw.println("Got a RemoteException while dumping the app " + r); + pw.flush(); + } + } + } + } + + final void dumpDbInfo(FileDescriptor fd, PrintWriter pw, String[] args) { + ArrayList<ProcessRecord> procs = collectProcesses(pw, 0, args); + if (procs == null) { + pw.println("No process found for: " + args[0]); + return; + } + + pw.println("Applications Database Info:"); + + for (int i = procs.size() - 1 ; i >= 0 ; i--) { + ProcessRecord r = procs.get(i); + if (r.thread != null) { + pw.println("\n** Database info for pid " + r.pid + " [" + r.processName + "] **"); + pw.flush(); + try { + TransferPipe tp = new TransferPipe(); + try { + r.thread.dumpDbInfo(tp.getWriteFd().getFileDescriptor(), args); + tp.go(fd); + } finally { + tp.kill(); + } + } catch (IOException e) { + pw.println("Failure while dumping the app: " + r); + pw.flush(); + } catch (RemoteException e) { + pw.println("Got a RemoteException while dumping the app " + r); + pw.flush(); + } + } + } + } + + final static class MemItem { + final boolean isProc; + final String label; + final String shortLabel; + final long pss; + final int id; + final boolean hasActivities; + ArrayList<MemItem> subitems; + + public MemItem(String _label, String _shortLabel, long _pss, int _id, + boolean _hasActivities) { + isProc = true; + label = _label; + shortLabel = _shortLabel; + pss = _pss; + id = _id; + hasActivities = _hasActivities; + } + + public MemItem(String _label, String _shortLabel, long _pss, int _id) { + isProc = false; + label = _label; + shortLabel = _shortLabel; + pss = _pss; + id = _id; + hasActivities = false; + } + } + + static final void dumpMemItems(PrintWriter pw, String prefix, String tag, + ArrayList<MemItem> items, boolean sort, boolean isCompact) { + if (sort && !isCompact) { + Collections.sort(items, new Comparator<MemItem>() { + @Override + public int compare(MemItem lhs, MemItem rhs) { + if (lhs.pss < rhs.pss) { + return 1; + } else if (lhs.pss > rhs.pss) { + return -1; + } + return 0; + } + }); + } + + for (int i=0; i<items.size(); i++) { + MemItem mi = items.get(i); + if (!isCompact) { + pw.print(prefix); pw.printf("%7d kB: ", mi.pss); pw.println(mi.label); + } else if (mi.isProc) { + pw.print("proc,"); pw.print(tag); pw.print(","); pw.print(mi.shortLabel); + pw.print(","); pw.print(mi.id); pw.print(","); pw.print(mi.pss); + pw.println(mi.hasActivities ? ",a" : ",e"); + } else { + pw.print(tag); pw.print(","); pw.print(mi.shortLabel); pw.print(","); + pw.println(mi.pss); + } + if (mi.subitems != null) { + dumpMemItems(pw, prefix + " ", mi.shortLabel, mi.subitems, + true, isCompact); + } + } + } + + // These are in KB. + static final long[] DUMP_MEM_BUCKETS = new long[] { + 5*1024, 7*1024, 10*1024, 15*1024, 20*1024, 30*1024, 40*1024, 80*1024, + 120*1024, 160*1024, 200*1024, + 250*1024, 300*1024, 350*1024, 400*1024, 500*1024, 600*1024, 800*1024, + 1*1024*1024, 2*1024*1024, 5*1024*1024, 10*1024*1024, 20*1024*1024 + }; + + static final void appendMemBucket(StringBuilder out, long memKB, String label, + boolean stackLike) { + int start = label.lastIndexOf('.'); + if (start >= 0) start++; + else start = 0; + int end = label.length(); + for (int i=0; i<DUMP_MEM_BUCKETS.length; i++) { + if (DUMP_MEM_BUCKETS[i] >= memKB) { + long bucket = DUMP_MEM_BUCKETS[i]/1024; + out.append(bucket); + out.append(stackLike ? "MB." : "MB "); + out.append(label, start, end); + return; + } + } + out.append(memKB/1024); + out.append(stackLike ? "MB." : "MB "); + out.append(label, start, end); + } + + static final int[] DUMP_MEM_OOM_ADJ = new int[] { + ProcessList.NATIVE_ADJ, + ProcessList.SYSTEM_ADJ, ProcessList.PERSISTENT_PROC_ADJ, ProcessList.FOREGROUND_APP_ADJ, + ProcessList.VISIBLE_APP_ADJ, ProcessList.PERCEPTIBLE_APP_ADJ, + ProcessList.BACKUP_APP_ADJ, ProcessList.HEAVY_WEIGHT_APP_ADJ, + ProcessList.SERVICE_ADJ, ProcessList.HOME_APP_ADJ, + ProcessList.PREVIOUS_APP_ADJ, ProcessList.SERVICE_B_ADJ, ProcessList.CACHED_APP_MAX_ADJ + }; + static final String[] DUMP_MEM_OOM_LABEL = new String[] { + "Native", + "System", "Persistent", "Foreground", + "Visible", "Perceptible", + "Heavy Weight", "Backup", + "A Services", "Home", + "Previous", "B Services", "Cached" + }; + static final String[] DUMP_MEM_OOM_COMPACT_LABEL = new String[] { + "native", + "sys", "pers", "fore", + "vis", "percept", + "heavy", "backup", + "servicea", "home", + "prev", "serviceb", "cached" + }; + + private final void dumpApplicationMemoryUsageHeader(PrintWriter pw, long uptime, + long realtime, boolean isCheckinRequest, boolean isCompact) { + if (isCheckinRequest || isCompact) { + // short checkin version + pw.print("time,"); pw.print(uptime); pw.print(","); pw.println(realtime); + } else { + pw.println("Applications Memory Usage (kB):"); + pw.println("Uptime: " + uptime + " Realtime: " + realtime); + } + } + + final void dumpApplicationMemoryUsage(FileDescriptor fd, + PrintWriter pw, String prefix, String[] args, boolean brief, PrintWriter categoryPw) { + boolean dumpDetails = false; + boolean dumpFullDetails = false; + boolean dumpDalvik = false; + boolean oomOnly = false; + boolean isCompact = false; + boolean localOnly = false; + + int opti = 0; + while (opti < args.length) { + String opt = args[opti]; + if (opt == null || opt.length() <= 0 || opt.charAt(0) != '-') { + break; + } + opti++; + if ("-a".equals(opt)) { + dumpDetails = true; + dumpFullDetails = true; + dumpDalvik = true; + } else if ("-d".equals(opt)) { + dumpDalvik = true; + } else if ("-c".equals(opt)) { + isCompact = true; + } else if ("--oom".equals(opt)) { + oomOnly = true; + } else if ("--local".equals(opt)) { + localOnly = true; + } else if ("-h".equals(opt)) { + pw.println("meminfo dump options: [-a] [-d] [-c] [--oom] [process]"); + pw.println(" -a: include all available information for each process."); + pw.println(" -d: include dalvik details when dumping process details."); + pw.println(" -c: dump in a compact machine-parseable representation."); + pw.println(" --oom: only show processes organized by oom adj."); + pw.println(" --local: only collect details locally, don't call process."); + pw.println("If [process] is specified it can be the name or "); + pw.println("pid of a specific process to dump."); + return; + } else { + pw.println("Unknown argument: " + opt + "; use -h for help"); + } + } + + final boolean isCheckinRequest = scanArgs(args, "--checkin"); + long uptime = SystemClock.uptimeMillis(); + long realtime = SystemClock.elapsedRealtime(); + final long[] tmpLong = new long[1]; + + ArrayList<ProcessRecord> procs = collectProcesses(pw, opti, args); + if (procs == null) { + // No Java processes. Maybe they want to print a native process. + if (args != null && args.length > opti + && args[opti].charAt(0) != '-') { + ArrayList<ProcessCpuTracker.Stats> nativeProcs + = new ArrayList<ProcessCpuTracker.Stats>(); + updateCpuStatsNow(); + int findPid = -1; + try { + findPid = Integer.parseInt(args[opti]); + } catch (NumberFormatException e) { + } + synchronized (mProcessCpuThread) { + final int N = mProcessCpuTracker.countStats(); + for (int i=0; i<N; i++) { + ProcessCpuTracker.Stats st = mProcessCpuTracker.getStats(i); + if (st.pid == findPid || (st.baseName != null + && st.baseName.equals(args[opti]))) { + nativeProcs.add(st); + } + } + } + if (nativeProcs.size() > 0) { + dumpApplicationMemoryUsageHeader(pw, uptime, realtime, isCheckinRequest, + isCompact); + Debug.MemoryInfo mi = null; + for (int i = nativeProcs.size() - 1 ; i >= 0 ; i--) { + final ProcessCpuTracker.Stats r = nativeProcs.get(i); + final int pid = r.pid; + if (!isCheckinRequest && dumpDetails) { + pw.println("\n** MEMINFO in pid " + pid + " [" + r.baseName + "] **"); + } + if (mi == null) { + mi = new Debug.MemoryInfo(); + } + if (dumpDetails || (!brief && !oomOnly)) { + Debug.getMemoryInfo(pid, mi); + } else { + mi.dalvikPss = (int)Debug.getPss(pid, tmpLong); + mi.dalvikPrivateDirty = (int)tmpLong[0]; + } + ActivityThread.dumpMemInfoTable(pw, mi, isCheckinRequest, dumpFullDetails, + dumpDalvik, pid, r.baseName, 0, 0, 0, 0, 0, 0); + if (isCheckinRequest) { + pw.println(); + } + } + return; + } + } + pw.println("No process found for: " + args[opti]); + return; + } + + if (!brief && !oomOnly && (procs.size() == 1 || isCheckinRequest)) { + dumpDetails = true; + } + + dumpApplicationMemoryUsageHeader(pw, uptime, realtime, isCheckinRequest, isCompact); + + String[] innerArgs = new String[args.length-opti]; + System.arraycopy(args, opti, innerArgs, 0, args.length-opti); + + ArrayList<MemItem> procMems = new ArrayList<MemItem>(); + final SparseArray<MemItem> procMemsMap = new SparseArray<MemItem>(); + long nativePss=0, dalvikPss=0, otherPss=0; + long[] miscPss = new long[Debug.MemoryInfo.NUM_OTHER_STATS]; + + long oomPss[] = new long[DUMP_MEM_OOM_LABEL.length]; + ArrayList<MemItem>[] oomProcs = (ArrayList<MemItem>[]) + new ArrayList[DUMP_MEM_OOM_LABEL.length]; + + long totalPss = 0; + long cachedPss = 0; + + Debug.MemoryInfo mi = null; + for (int i = procs.size() - 1 ; i >= 0 ; i--) { + final ProcessRecord r = procs.get(i); + final IApplicationThread thread; + final int pid; + final int oomAdj; + final boolean hasActivities; + synchronized (this) { + thread = r.thread; + pid = r.pid; + oomAdj = r.getSetAdjWithServices(); + hasActivities = r.activities.size() > 0; + } + if (thread != null) { + if (!isCheckinRequest && dumpDetails) { + pw.println("\n** MEMINFO in pid " + pid + " [" + r.processName + "] **"); + } + if (mi == null) { + mi = new Debug.MemoryInfo(); + } + if (dumpDetails || (!brief && !oomOnly)) { + Debug.getMemoryInfo(pid, mi); + } else { + mi.dalvikPss = (int)Debug.getPss(pid, tmpLong); + mi.dalvikPrivateDirty = (int)tmpLong[0]; + } + if (dumpDetails) { + if (localOnly) { + ActivityThread.dumpMemInfoTable(pw, mi, isCheckinRequest, dumpFullDetails, + dumpDalvik, pid, r.processName, 0, 0, 0, 0, 0, 0); + if (isCheckinRequest) { + pw.println(); + } + } else { + try { + pw.flush(); + thread.dumpMemInfo(fd, mi, isCheckinRequest, dumpFullDetails, + dumpDalvik, innerArgs); + } catch (RemoteException e) { + if (!isCheckinRequest) { + pw.println("Got RemoteException!"); + pw.flush(); + } + } + } + } + + final long myTotalPss = mi.getTotalPss(); + final long myTotalUss = mi.getTotalUss(); + + synchronized (this) { + if (r.thread != null && oomAdj == r.getSetAdjWithServices()) { + // Record this for posterity if the process has been stable. + r.baseProcessTracker.addPss(myTotalPss, myTotalUss, true, r.pkgList); + } + } + + if (!isCheckinRequest && mi != null) { + totalPss += myTotalPss; + MemItem pssItem = new MemItem(r.processName + " (pid " + pid + + (hasActivities ? " / activities)" : ")"), + r.processName, myTotalPss, pid, hasActivities); + procMems.add(pssItem); + procMemsMap.put(pid, pssItem); + + nativePss += mi.nativePss; + dalvikPss += mi.dalvikPss; + otherPss += mi.otherPss; + for (int j=0; j<Debug.MemoryInfo.NUM_OTHER_STATS; j++) { + long mem = mi.getOtherPss(j); + miscPss[j] += mem; + otherPss -= mem; + } + + if (oomAdj >= ProcessList.CACHED_APP_MIN_ADJ) { + cachedPss += myTotalPss; + } + + for (int oomIndex=0; oomIndex<oomPss.length; oomIndex++) { + if (oomAdj <= DUMP_MEM_OOM_ADJ[oomIndex] + || oomIndex == (oomPss.length-1)) { + oomPss[oomIndex] += myTotalPss; + if (oomProcs[oomIndex] == null) { + oomProcs[oomIndex] = new ArrayList<MemItem>(); + } + oomProcs[oomIndex].add(pssItem); + break; + } + } + } + } + } + + if (!isCheckinRequest && procs.size() > 1) { + // If we are showing aggregations, also look for native processes to + // include so that our aggregations are more accurate. + updateCpuStatsNow(); + synchronized (mProcessCpuThread) { + final int N = mProcessCpuTracker.countStats(); + for (int i=0; i<N; i++) { + ProcessCpuTracker.Stats st = mProcessCpuTracker.getStats(i); + if (st.vsize > 0 && procMemsMap.indexOfKey(st.pid) < 0) { + if (mi == null) { + mi = new Debug.MemoryInfo(); + } + if (!brief && !oomOnly) { + Debug.getMemoryInfo(st.pid, mi); + } else { + mi.nativePss = (int)Debug.getPss(st.pid, tmpLong); + mi.nativePrivateDirty = (int)tmpLong[0]; + } + + final long myTotalPss = mi.getTotalPss(); + totalPss += myTotalPss; + + MemItem pssItem = new MemItem(st.name + " (pid " + st.pid + ")", + st.name, myTotalPss, st.pid, false); + procMems.add(pssItem); + + nativePss += mi.nativePss; + dalvikPss += mi.dalvikPss; + otherPss += mi.otherPss; + for (int j=0; j<Debug.MemoryInfo.NUM_OTHER_STATS; j++) { + long mem = mi.getOtherPss(j); + miscPss[j] += mem; + otherPss -= mem; + } + oomPss[0] += myTotalPss; + if (oomProcs[0] == null) { + oomProcs[0] = new ArrayList<MemItem>(); + } + oomProcs[0].add(pssItem); + } + } + } + + ArrayList<MemItem> catMems = new ArrayList<MemItem>(); + + catMems.add(new MemItem("Native", "Native", nativePss, -1)); + catMems.add(new MemItem("Dalvik", "Dalvik", dalvikPss, -2)); + catMems.add(new MemItem("Unknown", "Unknown", otherPss, -3)); + for (int j=0; j<Debug.MemoryInfo.NUM_OTHER_STATS; j++) { + String label = Debug.MemoryInfo.getOtherLabel(j); + catMems.add(new MemItem(label, label, miscPss[j], j)); + } + + ArrayList<MemItem> oomMems = new ArrayList<MemItem>(); + for (int j=0; j<oomPss.length; j++) { + if (oomPss[j] != 0) { + String label = isCompact ? DUMP_MEM_OOM_COMPACT_LABEL[j] + : DUMP_MEM_OOM_LABEL[j]; + MemItem item = new MemItem(label, label, oomPss[j], + DUMP_MEM_OOM_ADJ[j]); + item.subitems = oomProcs[j]; + oomMems.add(item); + } + } + + if (!brief && !oomOnly && !isCompact) { + pw.println(); + pw.println("Total PSS by process:"); + dumpMemItems(pw, " ", "proc", procMems, true, isCompact); + pw.println(); + } + if (!isCompact) { + pw.println("Total PSS by OOM adjustment:"); + } + dumpMemItems(pw, " ", "oom", oomMems, false, isCompact); + if (!brief && !oomOnly) { + PrintWriter out = categoryPw != null ? categoryPw : pw; + if (!isCompact) { + out.println(); + out.println("Total PSS by category:"); + } + dumpMemItems(out, " ", "cat", catMems, true, isCompact); + } + if (!isCompact) { + pw.println(); + } + MemInfoReader memInfo = new MemInfoReader(); + memInfo.readMemInfo(); + if (!brief) { + if (!isCompact) { + pw.print("Total RAM: "); pw.print(memInfo.getTotalSizeKb()); + pw.println(" kB"); + pw.print(" Free RAM: "); pw.print(cachedPss + memInfo.getCachedSizeKb() + + memInfo.getFreeSizeKb()); pw.print(" kB ("); + pw.print(cachedPss); pw.print(" cached pss + "); + pw.print(memInfo.getCachedSizeKb()); pw.print(" cached + "); + pw.print(memInfo.getFreeSizeKb()); pw.println(" free)"); + } else { + pw.print("ram,"); pw.print(memInfo.getTotalSizeKb()); pw.print(","); + pw.print(cachedPss + memInfo.getCachedSizeKb() + + memInfo.getFreeSizeKb()); pw.print(","); + pw.println(totalPss - cachedPss); + } + } + if (!isCompact) { + pw.print(" Used RAM: "); pw.print(totalPss - cachedPss + + memInfo.getBuffersSizeKb() + memInfo.getShmemSizeKb() + + memInfo.getSlabSizeKb()); pw.print(" kB ("); + pw.print(totalPss - cachedPss); pw.print(" used pss + "); + pw.print(memInfo.getBuffersSizeKb()); pw.print(" buffers + "); + pw.print(memInfo.getShmemSizeKb()); pw.print(" shmem + "); + pw.print(memInfo.getSlabSizeKb()); pw.println(" slab)"); + pw.print(" Lost RAM: "); pw.print(memInfo.getTotalSizeKb() + - totalPss - memInfo.getFreeSizeKb() - memInfo.getCachedSizeKb() + - memInfo.getBuffersSizeKb() - memInfo.getShmemSizeKb() + - memInfo.getSlabSizeKb()); pw.println(" kB"); + } + if (!brief) { + if (memInfo.getZramTotalSizeKb() != 0) { + if (!isCompact) { + pw.print(" ZRAM: "); pw.print(memInfo.getZramTotalSizeKb()); + pw.print(" kB physical used for "); + pw.print(memInfo.getSwapTotalSizeKb() + - memInfo.getSwapFreeSizeKb()); + pw.print(" kB in swap ("); + pw.print(memInfo.getSwapTotalSizeKb()); + pw.println(" kB total swap)"); + } else { + pw.print("zram,"); pw.print(memInfo.getZramTotalSizeKb()); pw.print(","); + pw.print(memInfo.getSwapTotalSizeKb()); pw.print(","); + pw.println(memInfo.getSwapFreeSizeKb()); + } + } + final int[] SINGLE_LONG_FORMAT = new int[] { + Process.PROC_SPACE_TERM|Process.PROC_OUT_LONG + }; + long[] longOut = new long[1]; + Process.readProcFile("/sys/kernel/mm/ksm/pages_shared", + SINGLE_LONG_FORMAT, null, longOut, null); + long shared = longOut[0] * ProcessList.PAGE_SIZE / 1024; + longOut[0] = 0; + Process.readProcFile("/sys/kernel/mm/ksm/pages_sharing", + SINGLE_LONG_FORMAT, null, longOut, null); + long sharing = longOut[0] * ProcessList.PAGE_SIZE / 1024; + longOut[0] = 0; + Process.readProcFile("/sys/kernel/mm/ksm/pages_unshared", + SINGLE_LONG_FORMAT, null, longOut, null); + long unshared = longOut[0] * ProcessList.PAGE_SIZE / 1024; + longOut[0] = 0; + Process.readProcFile("/sys/kernel/mm/ksm/pages_volatile", + SINGLE_LONG_FORMAT, null, longOut, null); + long voltile = longOut[0] * ProcessList.PAGE_SIZE / 1024; + if (!isCompact) { + if (sharing != 0 || shared != 0 || unshared != 0 || voltile != 0) { + pw.print(" KSM: "); pw.print(sharing); + pw.print(" kB saved from shared "); + pw.print(shared); pw.println(" kB"); + pw.print(" "); pw.print(unshared); pw.print(" kB unshared; "); + pw.print(voltile); pw.println(" kB volatile"); + } + pw.print(" Tuning: "); + pw.print(ActivityManager.staticGetMemoryClass()); + pw.print(" (large "); + pw.print(ActivityManager.staticGetLargeMemoryClass()); + pw.print("), oom "); + pw.print(mProcessList.getMemLevel(ProcessList.CACHED_APP_MAX_ADJ)/1024); + pw.print(" kB"); + pw.print(", restore limit "); + pw.print(mProcessList.getCachedRestoreThresholdKb()); + pw.print(" kB"); + if (ActivityManager.isLowRamDeviceStatic()) { + pw.print(" (low-ram)"); + } + if (ActivityManager.isHighEndGfx()) { + pw.print(" (high-end-gfx)"); + } + pw.println(); + } else { + pw.print("ksm,"); pw.print(sharing); pw.print(","); + pw.print(shared); pw.print(","); pw.print(unshared); pw.print(","); + pw.println(voltile); + pw.print("tuning,"); + pw.print(ActivityManager.staticGetMemoryClass()); + pw.print(','); + pw.print(ActivityManager.staticGetLargeMemoryClass()); + pw.print(','); + pw.print(mProcessList.getMemLevel(ProcessList.CACHED_APP_MAX_ADJ)/1024); + if (ActivityManager.isLowRamDeviceStatic()) { + pw.print(",low-ram"); + } + if (ActivityManager.isHighEndGfx()) { + pw.print(",high-end-gfx"); + } + pw.println(); + } + } + } + } + + /** + * Searches array of arguments for the specified string + * @param args array of argument strings + * @param value value to search for + * @return true if the value is contained in the array + */ + private static boolean scanArgs(String[] args, String value) { + if (args != null) { + for (String arg : args) { + if (value.equals(arg)) { + return true; + } + } + } + return false; + } + + private final boolean removeDyingProviderLocked(ProcessRecord proc, + ContentProviderRecord cpr, boolean always) { + final boolean inLaunching = mLaunchingProviders.contains(cpr); + + if (!inLaunching || always) { + synchronized (cpr) { + cpr.launchingApp = null; + cpr.notifyAll(); + } + mProviderMap.removeProviderByClass(cpr.name, UserHandle.getUserId(cpr.uid)); + String names[] = cpr.info.authority.split(";"); + for (int j = 0; j < names.length; j++) { + mProviderMap.removeProviderByName(names[j], UserHandle.getUserId(cpr.uid)); + } + } + + for (int i=0; i<cpr.connections.size(); i++) { + ContentProviderConnection conn = cpr.connections.get(i); + if (conn.waiting) { + // If this connection is waiting for the provider, then we don't + // need to mess with its process unless we are always removing + // or for some reason the provider is not currently launching. + if (inLaunching && !always) { + continue; + } + } + ProcessRecord capp = conn.client; + conn.dead = true; + if (conn.stableCount > 0) { + if (!capp.persistent && capp.thread != null + && capp.pid != 0 + && capp.pid != MY_PID) { + killUnneededProcessLocked(capp, "depends on provider " + + cpr.name.flattenToShortString() + + " in dying proc " + (proc != null ? proc.processName : "??")); + } + } else if (capp.thread != null && conn.provider.provider != null) { + try { + capp.thread.unstableProviderDied(conn.provider.provider.asBinder()); + } catch (RemoteException e) { + } + // In the protocol here, we don't expect the client to correctly + // clean up this connection, we'll just remove it. + cpr.connections.remove(i); + conn.client.conProviders.remove(conn); + } + } + + if (inLaunching && always) { + mLaunchingProviders.remove(cpr); + } + return inLaunching; + } + + /** + * Main code for cleaning up a process when it has gone away. This is + * called both as a result of the process dying, or directly when stopping + * a process when running in single process mode. + */ + private final void cleanUpApplicationRecordLocked(ProcessRecord app, + boolean restarting, boolean allowRestart, int index) { + if (index >= 0) { + removeLruProcessLocked(app); + } + + mProcessesToGc.remove(app); + mPendingPssProcesses.remove(app); + + // Dismiss any open dialogs. + if (app.crashDialog != null && !app.forceCrashReport) { + app.crashDialog.dismiss(); + app.crashDialog = null; + } + if (app.anrDialog != null) { + app.anrDialog.dismiss(); + app.anrDialog = null; + } + if (app.waitDialog != null) { + app.waitDialog.dismiss(); + app.waitDialog = null; + } + + app.crashing = false; + app.notResponding = false; + + app.resetPackageList(mProcessStats); + app.unlinkDeathRecipient(); + app.makeInactive(mProcessStats); + app.forcingToForeground = null; + app.foregroundServices = false; + app.foregroundActivities = false; + app.hasShownUi = false; + app.hasAboveClient = false; + + mServices.killServicesLocked(app, allowRestart); + + boolean restart = false; + + // Remove published content providers. + for (int i=app.pubProviders.size()-1; i>=0; i--) { + ContentProviderRecord cpr = app.pubProviders.valueAt(i); + final boolean always = app.bad || !allowRestart; + if (removeDyingProviderLocked(app, cpr, always) || always) { + // We left the provider in the launching list, need to + // restart it. + restart = true; + } + + cpr.provider = null; + cpr.proc = null; + } + app.pubProviders.clear(); + + // Take care of any launching providers waiting for this process. + if (checkAppInLaunchingProvidersLocked(app, false)) { + restart = true; + } + + // Unregister from connected content providers. + if (!app.conProviders.isEmpty()) { + for (int i=0; i<app.conProviders.size(); i++) { + ContentProviderConnection conn = app.conProviders.get(i); + conn.provider.connections.remove(conn); + } + app.conProviders.clear(); + } + + // At this point there may be remaining entries in mLaunchingProviders + // where we were the only one waiting, so they are no longer of use. + // Look for these and clean up if found. + // XXX Commented out for now. Trying to figure out a way to reproduce + // the actual situation to identify what is actually going on. + if (false) { + for (int i=0; i<mLaunchingProviders.size(); i++) { + ContentProviderRecord cpr = (ContentProviderRecord) + mLaunchingProviders.get(i); + if (cpr.connections.size() <= 0 && !cpr.hasExternalProcessHandles()) { + synchronized (cpr) { + cpr.launchingApp = null; + cpr.notifyAll(); + } + } + } + } + + skipCurrentReceiverLocked(app); + + // Unregister any receivers. + for (int i=app.receivers.size()-1; i>=0; i--) { + removeReceiverLocked(app.receivers.valueAt(i)); + } + app.receivers.clear(); + + // If the app is undergoing backup, tell the backup manager about it + if (mBackupTarget != null && app.pid == mBackupTarget.app.pid) { + if (DEBUG_BACKUP || DEBUG_CLEANUP) Slog.d(TAG, "App " + + mBackupTarget.appInfo + " died during backup"); + try { + IBackupManager bm = IBackupManager.Stub.asInterface( + ServiceManager.getService(Context.BACKUP_SERVICE)); + bm.agentDisconnected(app.info.packageName); + } catch (RemoteException e) { + // can't happen; backup manager is local + } + } + + for (int i = mPendingProcessChanges.size()-1; i>=0; i--) { + ProcessChangeItem item = mPendingProcessChanges.get(i); + if (item.pid == app.pid) { + mPendingProcessChanges.remove(i); + mAvailProcessChanges.add(item); + } + } + mHandler.obtainMessage(DISPATCH_PROCESS_DIED, app.pid, app.info.uid, null).sendToTarget(); + + // If the caller is restarting this app, then leave it in its + // current lists and let the caller take care of it. + if (restarting) { + return; + } + + if (!app.persistent || app.isolated) { + if (DEBUG_PROCESSES || DEBUG_CLEANUP) Slog.v(TAG, + "Removing non-persistent process during cleanup: " + app); + mProcessNames.remove(app.processName, app.uid); + mIsolatedProcesses.remove(app.uid); + if (mHeavyWeightProcess == app) { + mHandler.sendMessage(mHandler.obtainMessage(CANCEL_HEAVY_NOTIFICATION_MSG, + mHeavyWeightProcess.userId, 0)); + mHeavyWeightProcess = null; + } + } else if (!app.removed) { + // This app is persistent, so we need to keep its record around. + // If it is not already on the pending app list, add it there + // and start a new process for it. + if (mPersistentStartingProcesses.indexOf(app) < 0) { + mPersistentStartingProcesses.add(app); + restart = true; + } + } + if ((DEBUG_PROCESSES || DEBUG_CLEANUP) && mProcessesOnHold.contains(app)) Slog.v(TAG, + "Clean-up removing on hold: " + app); + mProcessesOnHold.remove(app); + + if (app == mHomeProcess) { + mHomeProcess = null; + } + if (app == mPreviousProcess) { + mPreviousProcess = null; + } + + if (restart && !app.isolated) { + // We have components that still need to be running in the + // process, so re-launch it. + mProcessNames.put(app.processName, app.uid, app); + startProcessLocked(app, "restart", app.processName); + } else if (app.pid > 0 && app.pid != MY_PID) { + // Goodbye! + synchronized (mPidsSelfLocked) { + mPidsSelfLocked.remove(app.pid); + mHandler.removeMessages(PROC_START_TIMEOUT_MSG, app); + } + app.setPid(0); + } + } + + boolean checkAppInLaunchingProvidersLocked(ProcessRecord app, boolean alwaysBad) { + // Look through the content providers we are waiting to have launched, + // and if any run in this process then either schedule a restart of + // the process or kill the client waiting for it if this process has + // gone bad. + int NL = mLaunchingProviders.size(); + boolean restart = false; + for (int i=0; i<NL; i++) { + ContentProviderRecord cpr = mLaunchingProviders.get(i); + if (cpr.launchingApp == app) { + if (!alwaysBad && !app.bad) { + restart = true; + } else { + removeDyingProviderLocked(app, cpr, true); + // cpr should have been removed from mLaunchingProviders + NL = mLaunchingProviders.size(); + i--; + } + } + } + return restart; + } + + // ========================================================= + // SERVICES + // ========================================================= + + public List<ActivityManager.RunningServiceInfo> getServices(int maxNum, + int flags) { + enforceNotIsolatedCaller("getServices"); + synchronized (this) { + return mServices.getRunningServiceInfoLocked(maxNum, flags); + } + } + + public PendingIntent getRunningServiceControlPanel(ComponentName name) { + enforceNotIsolatedCaller("getRunningServiceControlPanel"); + synchronized (this) { + return mServices.getRunningServiceControlPanelLocked(name); + } + } + + public ComponentName startService(IApplicationThread caller, Intent service, + String resolvedType, int userId) { + enforceNotIsolatedCaller("startService"); + // Refuse possible leaked file descriptors + if (service != null && service.hasFileDescriptors() == true) { + throw new IllegalArgumentException("File descriptors passed in Intent"); + } + + if (DEBUG_SERVICE) + Slog.v(TAG, "startService: " + service + " type=" + resolvedType); + synchronized(this) { + final int callingPid = Binder.getCallingPid(); + final int callingUid = Binder.getCallingUid(); + final long origId = Binder.clearCallingIdentity(); + ComponentName res = mServices.startServiceLocked(caller, service, + resolvedType, callingPid, callingUid, userId); + Binder.restoreCallingIdentity(origId); + return res; + } + } + + ComponentName startServiceInPackage(int uid, + Intent service, String resolvedType, int userId) { + synchronized(this) { + if (DEBUG_SERVICE) + Slog.v(TAG, "startServiceInPackage: " + service + " type=" + resolvedType); + final long origId = Binder.clearCallingIdentity(); + ComponentName res = mServices.startServiceLocked(null, service, + resolvedType, -1, uid, userId); + Binder.restoreCallingIdentity(origId); + return res; + } + } + + public int stopService(IApplicationThread caller, Intent service, + String resolvedType, int userId) { + enforceNotIsolatedCaller("stopService"); + // Refuse possible leaked file descriptors + if (service != null && service.hasFileDescriptors() == true) { + throw new IllegalArgumentException("File descriptors passed in Intent"); + } + + synchronized(this) { + return mServices.stopServiceLocked(caller, service, resolvedType, userId); + } + } + + public IBinder peekService(Intent service, String resolvedType) { + enforceNotIsolatedCaller("peekService"); + // Refuse possible leaked file descriptors + if (service != null && service.hasFileDescriptors() == true) { + throw new IllegalArgumentException("File descriptors passed in Intent"); + } + synchronized(this) { + return mServices.peekServiceLocked(service, resolvedType); + } + } + + public boolean stopServiceToken(ComponentName className, IBinder token, + int startId) { + synchronized(this) { + return mServices.stopServiceTokenLocked(className, token, startId); + } + } + + public void setServiceForeground(ComponentName className, IBinder token, + int id, Notification notification, boolean removeNotification) { + synchronized(this) { + mServices.setServiceForegroundLocked(className, token, id, notification, + removeNotification); + } + } + + public int handleIncomingUser(int callingPid, int callingUid, int userId, boolean allowAll, + boolean requireFull, String name, String callerPackage) { + final int callingUserId = UserHandle.getUserId(callingUid); + if (callingUserId != userId) { + if (callingUid != 0 && callingUid != Process.SYSTEM_UID) { + if ((requireFull || checkComponentPermission( + android.Manifest.permission.INTERACT_ACROSS_USERS, + callingPid, callingUid, -1, true) != PackageManager.PERMISSION_GRANTED) + && checkComponentPermission( + android.Manifest.permission.INTERACT_ACROSS_USERS_FULL, + callingPid, callingUid, -1, true) + != PackageManager.PERMISSION_GRANTED) { + if (userId == UserHandle.USER_CURRENT_OR_SELF) { + // In this case, they would like to just execute as their + // owner user instead of failing. + userId = callingUserId; + } else { + StringBuilder builder = new StringBuilder(128); + builder.append("Permission Denial: "); + builder.append(name); + if (callerPackage != null) { + builder.append(" from "); + builder.append(callerPackage); + } + builder.append(" asks to run as user "); + builder.append(userId); + builder.append(" but is calling from user "); + builder.append(UserHandle.getUserId(callingUid)); + builder.append("; this requires "); + builder.append(android.Manifest.permission.INTERACT_ACROSS_USERS_FULL); + if (!requireFull) { + builder.append(" or "); + builder.append(android.Manifest.permission.INTERACT_ACROSS_USERS); + } + String msg = builder.toString(); + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + } + } + if (userId == UserHandle.USER_CURRENT + || userId == UserHandle.USER_CURRENT_OR_SELF) { + // Note that we may be accessing this outside of a lock... + // shouldn't be a big deal, if this is being called outside + // of a locked context there is intrinsically a race with + // the value the caller will receive and someone else changing it. + userId = mCurrentUserId; + } + if (!allowAll && userId < 0) { + throw new IllegalArgumentException( + "Call does not support special user #" + userId); + } + } + return userId; + } + + boolean isSingleton(String componentProcessName, ApplicationInfo aInfo, + String className, int flags) { + boolean result = false; + if (UserHandle.getAppId(aInfo.uid) >= Process.FIRST_APPLICATION_UID) { + if ((flags&ServiceInfo.FLAG_SINGLE_USER) != 0) { + if (ActivityManager.checkUidPermission( + android.Manifest.permission.INTERACT_ACROSS_USERS, + aInfo.uid) != PackageManager.PERMISSION_GRANTED) { + ComponentName comp = new ComponentName(aInfo.packageName, className); + String msg = "Permission Denial: Component " + comp.flattenToShortString() + + " requests FLAG_SINGLE_USER, but app does not hold " + + android.Manifest.permission.INTERACT_ACROSS_USERS; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + result = true; + } + } else if (componentProcessName == aInfo.packageName) { + result = (aInfo.flags & ApplicationInfo.FLAG_PERSISTENT) != 0; + } else if ("system".equals(componentProcessName)) { + result = true; + } + if (DEBUG_MU) { + Slog.v(TAG, "isSingleton(" + componentProcessName + ", " + aInfo + + ", " + className + ", 0x" + Integer.toHexString(flags) + ") = " + result); + } + return result; + } + + public int bindService(IApplicationThread caller, IBinder token, + Intent service, String resolvedType, + IServiceConnection connection, int flags, int userId) { + enforceNotIsolatedCaller("bindService"); + // Refuse possible leaked file descriptors + if (service != null && service.hasFileDescriptors() == true) { + throw new IllegalArgumentException("File descriptors passed in Intent"); + } + + synchronized(this) { + return mServices.bindServiceLocked(caller, token, service, resolvedType, + connection, flags, userId); + } + } + + public boolean unbindService(IServiceConnection connection) { + synchronized (this) { + return mServices.unbindServiceLocked(connection); + } + } + + public void publishService(IBinder token, Intent intent, IBinder service) { + // Refuse possible leaked file descriptors + if (intent != null && intent.hasFileDescriptors() == true) { + throw new IllegalArgumentException("File descriptors passed in Intent"); + } + + synchronized(this) { + if (!(token instanceof ServiceRecord)) { + throw new IllegalArgumentException("Invalid service token"); + } + mServices.publishServiceLocked((ServiceRecord)token, intent, service); + } + } + + public void unbindFinished(IBinder token, Intent intent, boolean doRebind) { + // Refuse possible leaked file descriptors + if (intent != null && intent.hasFileDescriptors() == true) { + throw new IllegalArgumentException("File descriptors passed in Intent"); + } + + synchronized(this) { + mServices.unbindFinishedLocked((ServiceRecord)token, intent, doRebind); + } + } + + public void serviceDoneExecuting(IBinder token, int type, int startId, int res) { + synchronized(this) { + if (!(token instanceof ServiceRecord)) { + throw new IllegalArgumentException("Invalid service token"); + } + mServices.serviceDoneExecutingLocked((ServiceRecord)token, type, startId, res); + } + } + + // ========================================================= + // BACKUP AND RESTORE + // ========================================================= + + // Cause the target app to be launched if necessary and its backup agent + // instantiated. The backup agent will invoke backupAgentCreated() on the + // activity manager to announce its creation. + public boolean bindBackupAgent(ApplicationInfo app, int backupMode) { + if (DEBUG_BACKUP) Slog.v(TAG, "bindBackupAgent: app=" + app + " mode=" + backupMode); + enforceCallingPermission("android.permission.BACKUP", "bindBackupAgent"); + + synchronized(this) { + // !!! TODO: currently no check here that we're already bound + BatteryStatsImpl.Uid.Pkg.Serv ss = null; + BatteryStatsImpl stats = mBatteryStatsService.getActiveStatistics(); + synchronized (stats) { + ss = stats.getServiceStatsLocked(app.uid, app.packageName, app.name); + } + + // Backup agent is now in use, its package can't be stopped. + try { + AppGlobals.getPackageManager().setPackageStoppedState( + app.packageName, false, UserHandle.getUserId(app.uid)); + } catch (RemoteException e) { + } catch (IllegalArgumentException e) { + Slog.w(TAG, "Failed trying to unstop package " + + app.packageName + ": " + e); + } + + BackupRecord r = new BackupRecord(ss, app, backupMode); + ComponentName hostingName = (backupMode == IApplicationThread.BACKUP_MODE_INCREMENTAL) + ? new ComponentName(app.packageName, app.backupAgentName) + : new ComponentName("android", "FullBackupAgent"); + // startProcessLocked() returns existing proc's record if it's already running + ProcessRecord proc = startProcessLocked(app.processName, app, + false, 0, "backup", hostingName, false, false, false); + if (proc == null) { + Slog.e(TAG, "Unable to start backup agent process " + r); + return false; + } + + r.app = proc; + mBackupTarget = r; + mBackupAppName = app.packageName; + + // Try not to kill the process during backup + updateOomAdjLocked(proc); + + // If the process is already attached, schedule the creation of the backup agent now. + // If it is not yet live, this will be done when it attaches to the framework. + if (proc.thread != null) { + if (DEBUG_BACKUP) Slog.v(TAG, "Agent proc already running: " + proc); + try { + proc.thread.scheduleCreateBackupAgent(app, + compatibilityInfoForPackageLocked(app), backupMode); + } catch (RemoteException e) { + // Will time out on the backup manager side + } + } else { + if (DEBUG_BACKUP) Slog.v(TAG, "Agent proc not running, waiting for attach"); + } + // Invariants: at this point, the target app process exists and the application + // is either already running or in the process of coming up. mBackupTarget and + // mBackupAppName describe the app, so that when it binds back to the AM we + // know that it's scheduled for a backup-agent operation. + } + + return true; + } + + @Override + public void clearPendingBackup() { + if (DEBUG_BACKUP) Slog.v(TAG, "clearPendingBackup"); + enforceCallingPermission("android.permission.BACKUP", "clearPendingBackup"); + + synchronized (this) { + mBackupTarget = null; + mBackupAppName = null; + } + } + + // A backup agent has just come up + public void backupAgentCreated(String agentPackageName, IBinder agent) { + if (DEBUG_BACKUP) Slog.v(TAG, "backupAgentCreated: " + agentPackageName + + " = " + agent); + + synchronized(this) { + if (!agentPackageName.equals(mBackupAppName)) { + Slog.e(TAG, "Backup agent created for " + agentPackageName + " but not requested!"); + return; + } + } + + long oldIdent = Binder.clearCallingIdentity(); + try { + IBackupManager bm = IBackupManager.Stub.asInterface( + ServiceManager.getService(Context.BACKUP_SERVICE)); + bm.agentConnected(agentPackageName, agent); + } catch (RemoteException e) { + // can't happen; the backup manager service is local + } catch (Exception e) { + Slog.w(TAG, "Exception trying to deliver BackupAgent binding: "); + e.printStackTrace(); + } finally { + Binder.restoreCallingIdentity(oldIdent); + } + } + + // done with this agent + public void unbindBackupAgent(ApplicationInfo appInfo) { + if (DEBUG_BACKUP) Slog.v(TAG, "unbindBackupAgent: " + appInfo); + if (appInfo == null) { + Slog.w(TAG, "unbind backup agent for null app"); + return; + } + + synchronized(this) { + try { + if (mBackupAppName == null) { + Slog.w(TAG, "Unbinding backup agent with no active backup"); + return; + } + + if (!mBackupAppName.equals(appInfo.packageName)) { + Slog.e(TAG, "Unbind of " + appInfo + " but is not the current backup target"); + return; + } + + // Not backing this app up any more; reset its OOM adjustment + final ProcessRecord proc = mBackupTarget.app; + updateOomAdjLocked(proc); + + // If the app crashed during backup, 'thread' will be null here + if (proc.thread != null) { + try { + proc.thread.scheduleDestroyBackupAgent(appInfo, + compatibilityInfoForPackageLocked(appInfo)); + } catch (Exception e) { + Slog.e(TAG, "Exception when unbinding backup agent:"); + e.printStackTrace(); + } + } + } finally { + mBackupTarget = null; + mBackupAppName = null; + } + } + } + // ========================================================= + // BROADCASTS + // ========================================================= + + private final List getStickiesLocked(String action, IntentFilter filter, + List cur, int userId) { + final ContentResolver resolver = mContext.getContentResolver(); + ArrayMap<String, ArrayList<Intent>> stickies = mStickyBroadcasts.get(userId); + if (stickies == null) { + return cur; + } + final ArrayList<Intent> list = stickies.get(action); + if (list == null) { + return cur; + } + int N = list.size(); + for (int i=0; i<N; i++) { + Intent intent = list.get(i); + if (filter.match(resolver, intent, true, TAG) >= 0) { + if (cur == null) { + cur = new ArrayList<Intent>(); + } + cur.add(intent); + } + } + return cur; + } + + boolean isPendingBroadcastProcessLocked(int pid) { + return mFgBroadcastQueue.isPendingBroadcastProcessLocked(pid) + || mBgBroadcastQueue.isPendingBroadcastProcessLocked(pid); + } + + void skipPendingBroadcastLocked(int pid) { + Slog.w(TAG, "Unattached app died before broadcast acknowledged, skipping"); + for (BroadcastQueue queue : mBroadcastQueues) { + queue.skipPendingBroadcastLocked(pid); + } + } + + // The app just attached; send any pending broadcasts that it should receive + boolean sendPendingBroadcastsLocked(ProcessRecord app) { + boolean didSomething = false; + for (BroadcastQueue queue : mBroadcastQueues) { + didSomething |= queue.sendPendingBroadcastsLocked(app); + } + return didSomething; + } + + public Intent registerReceiver(IApplicationThread caller, String callerPackage, + IIntentReceiver receiver, IntentFilter filter, String permission, int userId) { + enforceNotIsolatedCaller("registerReceiver"); + int callingUid; + int callingPid; + synchronized(this) { + ProcessRecord callerApp = null; + if (caller != null) { + callerApp = getRecordForAppLocked(caller); + if (callerApp == null) { + throw new SecurityException( + "Unable to find app for caller " + caller + + " (pid=" + Binder.getCallingPid() + + ") when registering receiver " + receiver); + } + if (callerApp.info.uid != Process.SYSTEM_UID && + !callerApp.pkgList.containsKey(callerPackage) && + !"android".equals(callerPackage)) { + throw new SecurityException("Given caller package " + callerPackage + + " is not running in process " + callerApp); + } + callingUid = callerApp.info.uid; + callingPid = callerApp.pid; + } else { + callerPackage = null; + callingUid = Binder.getCallingUid(); + callingPid = Binder.getCallingPid(); + } + + userId = this.handleIncomingUser(callingPid, callingUid, userId, + true, true, "registerReceiver", callerPackage); + + List allSticky = null; + + // Look for any matching sticky broadcasts... + Iterator actions = filter.actionsIterator(); + if (actions != null) { + while (actions.hasNext()) { + String action = (String)actions.next(); + allSticky = getStickiesLocked(action, filter, allSticky, + UserHandle.USER_ALL); + allSticky = getStickiesLocked(action, filter, allSticky, + UserHandle.getUserId(callingUid)); + } + } else { + allSticky = getStickiesLocked(null, filter, allSticky, + UserHandle.USER_ALL); + allSticky = getStickiesLocked(null, filter, allSticky, + UserHandle.getUserId(callingUid)); + } + + // The first sticky in the list is returned directly back to + // the client. + Intent sticky = allSticky != null ? (Intent)allSticky.get(0) : null; + + if (DEBUG_BROADCAST) Slog.v(TAG, "Register receiver " + filter + + ": " + sticky); + + if (receiver == null) { + return sticky; + } + + ReceiverList rl + = (ReceiverList)mRegisteredReceivers.get(receiver.asBinder()); + if (rl == null) { + rl = new ReceiverList(this, callerApp, callingPid, callingUid, + userId, receiver); + if (rl.app != null) { + rl.app.receivers.add(rl); + } else { + try { + receiver.asBinder().linkToDeath(rl, 0); + } catch (RemoteException e) { + return sticky; + } + rl.linkedToDeath = true; + } + mRegisteredReceivers.put(receiver.asBinder(), rl); + } else if (rl.uid != callingUid) { + throw new IllegalArgumentException( + "Receiver requested to register for uid " + callingUid + + " was previously registered for uid " + rl.uid); + } else if (rl.pid != callingPid) { + throw new IllegalArgumentException( + "Receiver requested to register for pid " + callingPid + + " was previously registered for pid " + rl.pid); + } else if (rl.userId != userId) { + throw new IllegalArgumentException( + "Receiver requested to register for user " + userId + + " was previously registered for user " + rl.userId); + } + BroadcastFilter bf = new BroadcastFilter(filter, rl, callerPackage, + permission, callingUid, userId); + rl.add(bf); + if (!bf.debugCheck()) { + Slog.w(TAG, "==> For Dynamic broadast"); + } + mReceiverResolver.addFilter(bf); + + // Enqueue broadcasts for all existing stickies that match + // this filter. + if (allSticky != null) { + ArrayList receivers = new ArrayList(); + receivers.add(bf); + + int N = allSticky.size(); + for (int i=0; i<N; i++) { + Intent intent = (Intent)allSticky.get(i); + BroadcastQueue queue = broadcastQueueForIntent(intent); + BroadcastRecord r = new BroadcastRecord(queue, intent, null, + null, -1, -1, null, null, AppOpsManager.OP_NONE, receivers, null, 0, + null, null, false, true, true, -1); + queue.enqueueParallelBroadcastLocked(r); + queue.scheduleBroadcastsLocked(); + } + } + + return sticky; + } + } + + public void unregisterReceiver(IIntentReceiver receiver) { + if (DEBUG_BROADCAST) Slog.v(TAG, "Unregister receiver: " + receiver); + + final long origId = Binder.clearCallingIdentity(); + try { + boolean doTrim = false; + + synchronized(this) { + ReceiverList rl = mRegisteredReceivers.get(receiver.asBinder()); + if (rl != null) { + if (rl.curBroadcast != null) { + BroadcastRecord r = rl.curBroadcast; + final boolean doNext = finishReceiverLocked( + receiver.asBinder(), r.resultCode, r.resultData, + r.resultExtras, r.resultAbort); + if (doNext) { + doTrim = true; + r.queue.processNextBroadcast(false); + } + } + + if (rl.app != null) { + rl.app.receivers.remove(rl); + } + removeReceiverLocked(rl); + if (rl.linkedToDeath) { + rl.linkedToDeath = false; + rl.receiver.asBinder().unlinkToDeath(rl, 0); + } + } + } + + // If we actually concluded any broadcasts, we might now be able + // to trim the recipients' apps from our working set + if (doTrim) { + trimApplications(); + return; + } + + } finally { + Binder.restoreCallingIdentity(origId); + } + } + + void removeReceiverLocked(ReceiverList rl) { + mRegisteredReceivers.remove(rl.receiver.asBinder()); + int N = rl.size(); + for (int i=0; i<N; i++) { + mReceiverResolver.removeFilter(rl.get(i)); + } + } + + private final void sendPackageBroadcastLocked(int cmd, String[] packages, int userId) { + for (int i = mLruProcesses.size() - 1 ; i >= 0 ; i--) { + ProcessRecord r = mLruProcesses.get(i); + if (r.thread != null && (userId == UserHandle.USER_ALL || r.userId == userId)) { + try { + r.thread.dispatchPackageBroadcast(cmd, packages); + } catch (RemoteException ex) { + } + } + } + } + + private List<ResolveInfo> collectReceiverComponents(Intent intent, String resolvedType, + int[] users) { + List<ResolveInfo> receivers = null; + try { + HashSet<ComponentName> singleUserReceivers = null; + boolean scannedFirstReceivers = false; + for (int user : users) { + List<ResolveInfo> newReceivers = AppGlobals.getPackageManager() + .queryIntentReceivers(intent, resolvedType, STOCK_PM_FLAGS, user); + if (user != 0 && newReceivers != null) { + // If this is not the primary user, we need to check for + // any receivers that should be filtered out. + for (int i=0; i<newReceivers.size(); i++) { + ResolveInfo ri = newReceivers.get(i); + if ((ri.activityInfo.flags&ActivityInfo.FLAG_PRIMARY_USER_ONLY) != 0) { + newReceivers.remove(i); + i--; + } + } + } + if (newReceivers != null && newReceivers.size() == 0) { + newReceivers = null; + } + if (receivers == null) { + receivers = newReceivers; + } else if (newReceivers != null) { + // We need to concatenate the additional receivers + // found with what we have do far. This would be easy, + // but we also need to de-dup any receivers that are + // singleUser. + if (!scannedFirstReceivers) { + // Collect any single user receivers we had already retrieved. + scannedFirstReceivers = true; + for (int i=0; i<receivers.size(); i++) { + ResolveInfo ri = receivers.get(i); + if ((ri.activityInfo.flags&ActivityInfo.FLAG_SINGLE_USER) != 0) { + ComponentName cn = new ComponentName( + ri.activityInfo.packageName, ri.activityInfo.name); + if (singleUserReceivers == null) { + singleUserReceivers = new HashSet<ComponentName>(); + } + singleUserReceivers.add(cn); + } + } + } + // Add the new results to the existing results, tracking + // and de-dupping single user receivers. + for (int i=0; i<newReceivers.size(); i++) { + ResolveInfo ri = newReceivers.get(i); + if ((ri.activityInfo.flags&ActivityInfo.FLAG_SINGLE_USER) != 0) { + ComponentName cn = new ComponentName( + ri.activityInfo.packageName, ri.activityInfo.name); + if (singleUserReceivers == null) { + singleUserReceivers = new HashSet<ComponentName>(); + } + if (!singleUserReceivers.contains(cn)) { + singleUserReceivers.add(cn); + receivers.add(ri); + } + } else { + receivers.add(ri); + } + } + } + } + } catch (RemoteException ex) { + // pm is in same process, this will never happen. + } + return receivers; + } + + private final int broadcastIntentLocked(ProcessRecord callerApp, + String callerPackage, Intent intent, String resolvedType, + IIntentReceiver resultTo, int resultCode, String resultData, + Bundle map, String requiredPermission, int appOp, + boolean ordered, boolean sticky, int callingPid, int callingUid, + int userId) { + intent = new Intent(intent); + + // By default broadcasts do not go to stopped apps. + intent.addFlags(Intent.FLAG_EXCLUDE_STOPPED_PACKAGES); + + if (DEBUG_BROADCAST_LIGHT) Slog.v( + TAG, (sticky ? "Broadcast sticky: ": "Broadcast: ") + intent + + " ordered=" + ordered + " userid=" + userId); + if ((resultTo != null) && !ordered) { + Slog.w(TAG, "Broadcast " + intent + " not ordered but result callback requested!"); + } + + userId = handleIncomingUser(callingPid, callingUid, userId, + true, false, "broadcast", callerPackage); + + // Make sure that the user who is receiving this broadcast is started. + // If not, we will just skip it. + if (userId != UserHandle.USER_ALL && mStartedUsers.get(userId) == null) { + if (callingUid != Process.SYSTEM_UID || (intent.getFlags() + & Intent.FLAG_RECEIVER_BOOT_UPGRADE) == 0) { + Slog.w(TAG, "Skipping broadcast of " + intent + + ": user " + userId + " is stopped"); + return ActivityManager.BROADCAST_SUCCESS; + } + } + + /* + * Prevent non-system code (defined here to be non-persistent + * processes) from sending protected broadcasts. + */ + int callingAppId = UserHandle.getAppId(callingUid); + if (callingAppId == Process.SYSTEM_UID || callingAppId == Process.PHONE_UID + || callingAppId == Process.SHELL_UID || callingAppId == Process.BLUETOOTH_UID || + callingUid == 0) { + // Always okay. + } else if (callerApp == null || !callerApp.persistent) { + try { + if (AppGlobals.getPackageManager().isProtectedBroadcast( + intent.getAction())) { + String msg = "Permission Denial: not allowed to send broadcast " + + intent.getAction() + " from pid=" + + callingPid + ", uid=" + callingUid; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } else if (AppWidgetManager.ACTION_APPWIDGET_CONFIGURE.equals(intent.getAction())) { + // Special case for compatibility: we don't want apps to send this, + // but historically it has not been protected and apps may be using it + // to poke their own app widget. So, instead of making it protected, + // just limit it to the caller. + if (callerApp == null) { + String msg = "Permission Denial: not allowed to send broadcast " + + intent.getAction() + " from unknown caller."; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } else if (intent.getComponent() != null) { + // They are good enough to send to an explicit component... verify + // it is being sent to the calling app. + if (!intent.getComponent().getPackageName().equals( + callerApp.info.packageName)) { + String msg = "Permission Denial: not allowed to send broadcast " + + intent.getAction() + " to " + + intent.getComponent().getPackageName() + " from " + + callerApp.info.packageName; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + } else { + // Limit broadcast to their own package. + intent.setPackage(callerApp.info.packageName); + } + } + } catch (RemoteException e) { + Slog.w(TAG, "Remote exception", e); + return ActivityManager.BROADCAST_SUCCESS; + } + } + + // Handle special intents: if this broadcast is from the package + // manager about a package being removed, we need to remove all of + // its activities from the history stack. + final boolean uidRemoved = Intent.ACTION_UID_REMOVED.equals( + intent.getAction()); + if (Intent.ACTION_PACKAGE_REMOVED.equals(intent.getAction()) + || Intent.ACTION_PACKAGE_CHANGED.equals(intent.getAction()) + || Intent.ACTION_EXTERNAL_APPLICATIONS_UNAVAILABLE.equals(intent.getAction()) + || uidRemoved) { + if (checkComponentPermission( + android.Manifest.permission.BROADCAST_PACKAGE_REMOVED, + callingPid, callingUid, -1, true) + == PackageManager.PERMISSION_GRANTED) { + if (uidRemoved) { + final Bundle intentExtras = intent.getExtras(); + final int uid = intentExtras != null + ? intentExtras.getInt(Intent.EXTRA_UID) : -1; + if (uid >= 0) { + BatteryStatsImpl bs = mBatteryStatsService.getActiveStatistics(); + synchronized (bs) { + bs.removeUidStatsLocked(uid); + } + mAppOpsService.uidRemoved(uid); + } + } else { + // If resources are unavailable just force stop all + // those packages and flush the attribute cache as well. + if (Intent.ACTION_EXTERNAL_APPLICATIONS_UNAVAILABLE.equals(intent.getAction())) { + String list[] = intent.getStringArrayExtra(Intent.EXTRA_CHANGED_PACKAGE_LIST); + if (list != null && (list.length > 0)) { + for (String pkg : list) { + forceStopPackageLocked(pkg, -1, false, true, true, false, userId, + "storage unmount"); + } + sendPackageBroadcastLocked( + IApplicationThread.EXTERNAL_STORAGE_UNAVAILABLE, list, userId); + } + } else { + Uri data = intent.getData(); + String ssp; + if (data != null && (ssp=data.getSchemeSpecificPart()) != null) { + boolean removed = Intent.ACTION_PACKAGE_REMOVED.equals( + intent.getAction()); + if (!intent.getBooleanExtra(Intent.EXTRA_DONT_KILL_APP, false)) { + forceStopPackageLocked(ssp, UserHandle.getAppId( + intent.getIntExtra(Intent.EXTRA_UID, -1)), false, true, true, + false, userId, removed ? "pkg removed" : "pkg changed"); + } + if (removed) { + sendPackageBroadcastLocked(IApplicationThread.PACKAGE_REMOVED, + new String[] {ssp}, userId); + if (!intent.getBooleanExtra(Intent.EXTRA_REPLACING, false)) { + mAppOpsService.packageRemoved( + intent.getIntExtra(Intent.EXTRA_UID, -1), ssp); + + // Remove all permissions granted from/to this package + removeUriPermissionsForPackageLocked(ssp, userId, true); + } + } + } + } + } + } else { + String msg = "Permission Denial: " + intent.getAction() + + " broadcast from " + callerPackage + " (pid=" + callingPid + + ", uid=" + callingUid + ")" + + " requires " + + android.Manifest.permission.BROADCAST_PACKAGE_REMOVED; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + + // Special case for adding a package: by default turn on compatibility + // mode. + } else if (Intent.ACTION_PACKAGE_ADDED.equals(intent.getAction())) { + Uri data = intent.getData(); + String ssp; + if (data != null && (ssp=data.getSchemeSpecificPart()) != null) { + mCompatModePackages.handlePackageAddedLocked(ssp, + intent.getBooleanExtra(Intent.EXTRA_REPLACING, false)); + } + } + + /* + * If this is the time zone changed action, queue up a message that will reset the timezone + * of all currently running processes. This message will get queued up before the broadcast + * happens. + */ + if (intent.ACTION_TIMEZONE_CHANGED.equals(intent.getAction())) { + mHandler.sendEmptyMessage(UPDATE_TIME_ZONE); + } + + if (intent.ACTION_CLEAR_DNS_CACHE.equals(intent.getAction())) { + mHandler.sendEmptyMessage(CLEAR_DNS_CACHE_MSG); + } + + if (Proxy.PROXY_CHANGE_ACTION.equals(intent.getAction())) { + ProxyProperties proxy = intent.getParcelableExtra("proxy"); + mHandler.sendMessage(mHandler.obtainMessage(UPDATE_HTTP_PROXY_MSG, proxy)); + } + + // Add to the sticky list if requested. + if (sticky) { + if (checkPermission(android.Manifest.permission.BROADCAST_STICKY, + callingPid, callingUid) + != PackageManager.PERMISSION_GRANTED) { + String msg = "Permission Denial: broadcastIntent() requesting a sticky broadcast from pid=" + + callingPid + ", uid=" + callingUid + + " requires " + android.Manifest.permission.BROADCAST_STICKY; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + if (requiredPermission != null) { + Slog.w(TAG, "Can't broadcast sticky intent " + intent + + " and enforce permission " + requiredPermission); + return ActivityManager.BROADCAST_STICKY_CANT_HAVE_PERMISSION; + } + if (intent.getComponent() != null) { + throw new SecurityException( + "Sticky broadcasts can't target a specific component"); + } + // We use userId directly here, since the "all" target is maintained + // as a separate set of sticky broadcasts. + if (userId != UserHandle.USER_ALL) { + // But first, if this is not a broadcast to all users, then + // make sure it doesn't conflict with an existing broadcast to + // all users. + ArrayMap<String, ArrayList<Intent>> stickies = mStickyBroadcasts.get( + UserHandle.USER_ALL); + if (stickies != null) { + ArrayList<Intent> list = stickies.get(intent.getAction()); + if (list != null) { + int N = list.size(); + int i; + for (i=0; i<N; i++) { + if (intent.filterEquals(list.get(i))) { + throw new IllegalArgumentException( + "Sticky broadcast " + intent + " for user " + + userId + " conflicts with existing global broadcast"); + } + } + } + } + } + ArrayMap<String, ArrayList<Intent>> stickies = mStickyBroadcasts.get(userId); + if (stickies == null) { + stickies = new ArrayMap<String, ArrayList<Intent>>(); + mStickyBroadcasts.put(userId, stickies); + } + ArrayList<Intent> list = stickies.get(intent.getAction()); + if (list == null) { + list = new ArrayList<Intent>(); + stickies.put(intent.getAction(), list); + } + int N = list.size(); + int i; + for (i=0; i<N; i++) { + if (intent.filterEquals(list.get(i))) { + // This sticky already exists, replace it. + list.set(i, new Intent(intent)); + break; + } + } + if (i >= N) { + list.add(new Intent(intent)); + } + } + + int[] users; + if (userId == UserHandle.USER_ALL) { + // Caller wants broadcast to go to all started users. + users = mStartedUserArray; + } else { + // Caller wants broadcast to go to one specific user. + users = new int[] {userId}; + } + + // Figure out who all will receive this broadcast. + List receivers = null; + List<BroadcastFilter> registeredReceivers = null; + // Need to resolve the intent to interested receivers... + if ((intent.getFlags()&Intent.FLAG_RECEIVER_REGISTERED_ONLY) + == 0) { + receivers = collectReceiverComponents(intent, resolvedType, users); + } + if (intent.getComponent() == null) { + registeredReceivers = mReceiverResolver.queryIntent(intent, + resolvedType, false, userId); + } + + final boolean replacePending = + (intent.getFlags()&Intent.FLAG_RECEIVER_REPLACE_PENDING) != 0; + + if (DEBUG_BROADCAST) Slog.v(TAG, "Enqueing broadcast: " + intent.getAction() + + " replacePending=" + replacePending); + + int NR = registeredReceivers != null ? registeredReceivers.size() : 0; + if (!ordered && NR > 0) { + // If we are not serializing this broadcast, then send the + // registered receivers separately so they don't wait for the + // components to be launched. + final BroadcastQueue queue = broadcastQueueForIntent(intent); + BroadcastRecord r = new BroadcastRecord(queue, intent, callerApp, + callerPackage, callingPid, callingUid, resolvedType, requiredPermission, + appOp, registeredReceivers, resultTo, resultCode, resultData, map, + ordered, sticky, false, userId); + if (DEBUG_BROADCAST) Slog.v( + TAG, "Enqueueing parallel broadcast " + r); + final boolean replaced = replacePending && queue.replaceParallelBroadcastLocked(r); + if (!replaced) { + queue.enqueueParallelBroadcastLocked(r); + queue.scheduleBroadcastsLocked(); + } + registeredReceivers = null; + NR = 0; + } + + // Merge into one list. + int ir = 0; + if (receivers != null) { + // A special case for PACKAGE_ADDED: do not allow the package + // being added to see this broadcast. This prevents them from + // using this as a back door to get run as soon as they are + // installed. Maybe in the future we want to have a special install + // broadcast or such for apps, but we'd like to deliberately make + // this decision. + String skipPackages[] = null; + if (Intent.ACTION_PACKAGE_ADDED.equals(intent.getAction()) + || Intent.ACTION_PACKAGE_RESTARTED.equals(intent.getAction()) + || Intent.ACTION_PACKAGE_DATA_CLEARED.equals(intent.getAction())) { + Uri data = intent.getData(); + if (data != null) { + String pkgName = data.getSchemeSpecificPart(); + if (pkgName != null) { + skipPackages = new String[] { pkgName }; + } + } + } else if (Intent.ACTION_EXTERNAL_APPLICATIONS_AVAILABLE.equals(intent.getAction())) { + skipPackages = intent.getStringArrayExtra(Intent.EXTRA_CHANGED_PACKAGE_LIST); + } + if (skipPackages != null && (skipPackages.length > 0)) { + for (String skipPackage : skipPackages) { + if (skipPackage != null) { + int NT = receivers.size(); + for (int it=0; it<NT; it++) { + ResolveInfo curt = (ResolveInfo)receivers.get(it); + if (curt.activityInfo.packageName.equals(skipPackage)) { + receivers.remove(it); + it--; + NT--; + } + } + } + } + } + + int NT = receivers != null ? receivers.size() : 0; + int it = 0; + ResolveInfo curt = null; + BroadcastFilter curr = null; + while (it < NT && ir < NR) { + if (curt == null) { + curt = (ResolveInfo)receivers.get(it); + } + if (curr == null) { + curr = registeredReceivers.get(ir); + } + if (curr.getPriority() >= curt.priority) { + // Insert this broadcast record into the final list. + receivers.add(it, curr); + ir++; + curr = null; + it++; + NT++; + } else { + // Skip to the next ResolveInfo in the final list. + it++; + curt = null; + } + } + } + while (ir < NR) { + if (receivers == null) { + receivers = new ArrayList(); + } + receivers.add(registeredReceivers.get(ir)); + ir++; + } + + if ((receivers != null && receivers.size() > 0) + || resultTo != null) { + BroadcastQueue queue = broadcastQueueForIntent(intent); + BroadcastRecord r = new BroadcastRecord(queue, intent, callerApp, + callerPackage, callingPid, callingUid, resolvedType, + requiredPermission, appOp, receivers, resultTo, resultCode, + resultData, map, ordered, sticky, false, userId); + if (DEBUG_BROADCAST) Slog.v( + TAG, "Enqueueing ordered broadcast " + r + + ": prev had " + queue.mOrderedBroadcasts.size()); + if (DEBUG_BROADCAST) { + int seq = r.intent.getIntExtra("seq", -1); + Slog.i(TAG, "Enqueueing broadcast " + r.intent.getAction() + " seq=" + seq); + } + boolean replaced = replacePending && queue.replaceOrderedBroadcastLocked(r); + if (!replaced) { + queue.enqueueOrderedBroadcastLocked(r); + queue.scheduleBroadcastsLocked(); + } + } + + return ActivityManager.BROADCAST_SUCCESS; + } + + final Intent verifyBroadcastLocked(Intent intent) { + // Refuse possible leaked file descriptors + if (intent != null && intent.hasFileDescriptors() == true) { + throw new IllegalArgumentException("File descriptors passed in Intent"); + } + + int flags = intent.getFlags(); + + if (!mProcessesReady) { + // if the caller really truly claims to know what they're doing, go + // ahead and allow the broadcast without launching any receivers + if ((flags&Intent.FLAG_RECEIVER_REGISTERED_ONLY_BEFORE_BOOT) != 0) { + intent = new Intent(intent); + intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY); + } else if ((flags&Intent.FLAG_RECEIVER_REGISTERED_ONLY) == 0) { + Slog.e(TAG, "Attempt to launch receivers of broadcast intent " + intent + + " before boot completion"); + throw new IllegalStateException("Cannot broadcast before boot completed"); + } + } + + if ((flags&Intent.FLAG_RECEIVER_BOOT_UPGRADE) != 0) { + throw new IllegalArgumentException( + "Can't use FLAG_RECEIVER_BOOT_UPGRADE here"); + } + + return intent; + } + + public final int broadcastIntent(IApplicationThread caller, + Intent intent, String resolvedType, IIntentReceiver resultTo, + int resultCode, String resultData, Bundle map, + String requiredPermission, int appOp, boolean serialized, boolean sticky, int userId) { + enforceNotIsolatedCaller("broadcastIntent"); + synchronized(this) { + intent = verifyBroadcastLocked(intent); + + final ProcessRecord callerApp = getRecordForAppLocked(caller); + final int callingPid = Binder.getCallingPid(); + final int callingUid = Binder.getCallingUid(); + final long origId = Binder.clearCallingIdentity(); + int res = broadcastIntentLocked(callerApp, + callerApp != null ? callerApp.info.packageName : null, + intent, resolvedType, resultTo, + resultCode, resultData, map, requiredPermission, appOp, serialized, sticky, + callingPid, callingUid, userId); + Binder.restoreCallingIdentity(origId); + return res; + } + } + + int broadcastIntentInPackage(String packageName, int uid, + Intent intent, String resolvedType, IIntentReceiver resultTo, + int resultCode, String resultData, Bundle map, + String requiredPermission, boolean serialized, boolean sticky, int userId) { + synchronized(this) { + intent = verifyBroadcastLocked(intent); + + final long origId = Binder.clearCallingIdentity(); + int res = broadcastIntentLocked(null, packageName, intent, resolvedType, + resultTo, resultCode, resultData, map, requiredPermission, + AppOpsManager.OP_NONE, serialized, sticky, -1, uid, userId); + Binder.restoreCallingIdentity(origId); + return res; + } + } + + public final void unbroadcastIntent(IApplicationThread caller, Intent intent, int userId) { + // Refuse possible leaked file descriptors + if (intent != null && intent.hasFileDescriptors() == true) { + throw new IllegalArgumentException("File descriptors passed in Intent"); + } + + userId = handleIncomingUser(Binder.getCallingPid(), + Binder.getCallingUid(), userId, true, false, "removeStickyBroadcast", null); + + synchronized(this) { + if (checkCallingPermission(android.Manifest.permission.BROADCAST_STICKY) + != PackageManager.PERMISSION_GRANTED) { + String msg = "Permission Denial: unbroadcastIntent() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " requires " + android.Manifest.permission.BROADCAST_STICKY; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + ArrayMap<String, ArrayList<Intent>> stickies = mStickyBroadcasts.get(userId); + if (stickies != null) { + ArrayList<Intent> list = stickies.get(intent.getAction()); + if (list != null) { + int N = list.size(); + int i; + for (i=0; i<N; i++) { + if (intent.filterEquals(list.get(i))) { + list.remove(i); + break; + } + } + if (list.size() <= 0) { + stickies.remove(intent.getAction()); + } + } + if (stickies.size() <= 0) { + mStickyBroadcasts.remove(userId); + } + } + } + } + + private final boolean finishReceiverLocked(IBinder receiver, int resultCode, + String resultData, Bundle resultExtras, boolean resultAbort) { + final BroadcastRecord r = broadcastRecordForReceiverLocked(receiver); + if (r == null) { + Slog.w(TAG, "finishReceiver called but not found on queue"); + return false; + } + + return r.queue.finishReceiverLocked(r, resultCode, resultData, resultExtras, resultAbort, false); + } + + void backgroundServicesFinishedLocked(int userId) { + for (BroadcastQueue queue : mBroadcastQueues) { + queue.backgroundServicesFinishedLocked(userId); + } + } + + public void finishReceiver(IBinder who, int resultCode, String resultData, + Bundle resultExtras, boolean resultAbort) { + if (DEBUG_BROADCAST) Slog.v(TAG, "Finish receiver: " + who); + + // Refuse possible leaked file descriptors + if (resultExtras != null && resultExtras.hasFileDescriptors()) { + throw new IllegalArgumentException("File descriptors passed in Bundle"); + } + + final long origId = Binder.clearCallingIdentity(); + try { + boolean doNext = false; + BroadcastRecord r; + + synchronized(this) { + r = broadcastRecordForReceiverLocked(who); + if (r != null) { + doNext = r.queue.finishReceiverLocked(r, resultCode, + resultData, resultExtras, resultAbort, true); + } + } + + if (doNext) { + r.queue.processNextBroadcast(false); + } + trimApplications(); + } finally { + Binder.restoreCallingIdentity(origId); + } + } + + // ========================================================= + // INSTRUMENTATION + // ========================================================= + + public boolean startInstrumentation(ComponentName className, + String profileFile, int flags, Bundle arguments, + IInstrumentationWatcher watcher, IUiAutomationConnection uiAutomationConnection, + int userId) { + enforceNotIsolatedCaller("startInstrumentation"); + userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(), + userId, false, true, "startInstrumentation", null); + // Refuse possible leaked file descriptors + if (arguments != null && arguments.hasFileDescriptors()) { + throw new IllegalArgumentException("File descriptors passed in Bundle"); + } + + synchronized(this) { + InstrumentationInfo ii = null; + ApplicationInfo ai = null; + try { + ii = mContext.getPackageManager().getInstrumentationInfo( + className, STOCK_PM_FLAGS); + ai = AppGlobals.getPackageManager().getApplicationInfo( + ii.targetPackage, STOCK_PM_FLAGS, userId); + } catch (PackageManager.NameNotFoundException e) { + } catch (RemoteException e) { + } + if (ii == null) { + reportStartInstrumentationFailure(watcher, className, + "Unable to find instrumentation info for: " + className); + return false; + } + if (ai == null) { + reportStartInstrumentationFailure(watcher, className, + "Unable to find instrumentation target package: " + ii.targetPackage); + return false; + } + + int match = mContext.getPackageManager().checkSignatures( + ii.targetPackage, ii.packageName); + if (match < 0 && match != PackageManager.SIGNATURE_FIRST_NOT_SIGNED) { + String msg = "Permission Denial: starting instrumentation " + + className + " from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingPid() + + " not allowed because package " + ii.packageName + + " does not have a signature matching the target " + + ii.targetPackage; + reportStartInstrumentationFailure(watcher, className, msg); + throw new SecurityException(msg); + } + + final long origId = Binder.clearCallingIdentity(); + // Instrumentation can kill and relaunch even persistent processes + forceStopPackageLocked(ii.targetPackage, -1, true, false, true, true, userId, + "start instr"); + ProcessRecord app = addAppLocked(ai, false); + app.instrumentationClass = className; + app.instrumentationInfo = ai; + app.instrumentationProfileFile = profileFile; + app.instrumentationArguments = arguments; + app.instrumentationWatcher = watcher; + app.instrumentationUiAutomationConnection = uiAutomationConnection; + app.instrumentationResultClass = className; + Binder.restoreCallingIdentity(origId); + } + + return true; + } + + /** + * Report errors that occur while attempting to start Instrumentation. Always writes the + * error to the logs, but if somebody is watching, send the report there too. This enables + * the "am" command to report errors with more information. + * + * @param watcher The IInstrumentationWatcher. Null if there isn't one. + * @param cn The component name of the instrumentation. + * @param report The error report. + */ + private void reportStartInstrumentationFailure(IInstrumentationWatcher watcher, + ComponentName cn, String report) { + Slog.w(TAG, report); + try { + if (watcher != null) { + Bundle results = new Bundle(); + results.putString(Instrumentation.REPORT_KEY_IDENTIFIER, "ActivityManagerService"); + results.putString("Error", report); + watcher.instrumentationStatus(cn, -1, results); + } + } catch (RemoteException e) { + Slog.w(TAG, e); + } + } + + void finishInstrumentationLocked(ProcessRecord app, int resultCode, Bundle results) { + if (app.instrumentationWatcher != null) { + try { + // NOTE: IInstrumentationWatcher *must* be oneway here + app.instrumentationWatcher.instrumentationFinished( + app.instrumentationClass, + resultCode, + results); + } catch (RemoteException e) { + } + } + if (app.instrumentationUiAutomationConnection != null) { + try { + app.instrumentationUiAutomationConnection.shutdown(); + } catch (RemoteException re) { + /* ignore */ + } + // Only a UiAutomation can set this flag and now that + // it is finished we make sure it is reset to its default. + mUserIsMonkey = false; + } + app.instrumentationWatcher = null; + app.instrumentationUiAutomationConnection = null; + app.instrumentationClass = null; + app.instrumentationInfo = null; + app.instrumentationProfileFile = null; + app.instrumentationArguments = null; + + forceStopPackageLocked(app.info.packageName, -1, false, false, true, true, app.userId, + "finished inst"); + } + + public void finishInstrumentation(IApplicationThread target, + int resultCode, Bundle results) { + int userId = UserHandle.getCallingUserId(); + // Refuse possible leaked file descriptors + if (results != null && results.hasFileDescriptors()) { + throw new IllegalArgumentException("File descriptors passed in Intent"); + } + + synchronized(this) { + ProcessRecord app = getRecordForAppLocked(target); + if (app == null) { + Slog.w(TAG, "finishInstrumentation: no app for " + target); + return; + } + final long origId = Binder.clearCallingIdentity(); + finishInstrumentationLocked(app, resultCode, results); + Binder.restoreCallingIdentity(origId); + } + } + + // ========================================================= + // CONFIGURATION + // ========================================================= + + public ConfigurationInfo getDeviceConfigurationInfo() { + ConfigurationInfo config = new ConfigurationInfo(); + synchronized (this) { + config.reqTouchScreen = mConfiguration.touchscreen; + config.reqKeyboardType = mConfiguration.keyboard; + config.reqNavigation = mConfiguration.navigation; + if (mConfiguration.navigation == Configuration.NAVIGATION_DPAD + || mConfiguration.navigation == Configuration.NAVIGATION_TRACKBALL) { + config.reqInputFeatures |= ConfigurationInfo.INPUT_FEATURE_FIVE_WAY_NAV; + } + if (mConfiguration.keyboard != Configuration.KEYBOARD_UNDEFINED + && mConfiguration.keyboard != Configuration.KEYBOARD_NOKEYS) { + config.reqInputFeatures |= ConfigurationInfo.INPUT_FEATURE_HARD_KEYBOARD; + } + config.reqGlEsVersion = GL_ES_VERSION; + } + return config; + } + + ActivityStack getFocusedStack() { + return mStackSupervisor.getFocusedStack(); + } + + public Configuration getConfiguration() { + Configuration ci; + synchronized(this) { + ci = new Configuration(mConfiguration); + } + return ci; + } + + public void updatePersistentConfiguration(Configuration values) { + enforceCallingPermission(android.Manifest.permission.CHANGE_CONFIGURATION, + "updateConfiguration()"); + enforceCallingPermission(android.Manifest.permission.WRITE_SETTINGS, + "updateConfiguration()"); + if (values == null) { + throw new NullPointerException("Configuration must not be null"); + } + + synchronized(this) { + final long origId = Binder.clearCallingIdentity(); + updateConfigurationLocked(values, null, true, false); + Binder.restoreCallingIdentity(origId); + } + } + + public void updateConfiguration(Configuration values) { + enforceCallingPermission(android.Manifest.permission.CHANGE_CONFIGURATION, + "updateConfiguration()"); + + synchronized(this) { + if (values == null && mWindowManager != null) { + // sentinel: fetch the current configuration from the window manager + values = mWindowManager.computeNewConfiguration(); + } + + if (mWindowManager != null) { + mProcessList.applyDisplaySize(mWindowManager); + } + + final long origId = Binder.clearCallingIdentity(); + if (values != null) { + Settings.System.clearConfiguration(values); + } + updateConfigurationLocked(values, null, false, false); + Binder.restoreCallingIdentity(origId); + } + } + + /** + * Do either or both things: (1) change the current configuration, and (2) + * make sure the given activity is running with the (now) current + * configuration. Returns true if the activity has been left running, or + * false if <var>starting</var> is being destroyed to match the new + * configuration. + * @param persistent TODO + */ + boolean updateConfigurationLocked(Configuration values, + ActivityRecord starting, boolean persistent, boolean initLocale) { + int changes = 0; + + if (values != null) { + Configuration newConfig = new Configuration(mConfiguration); + changes = newConfig.updateFrom(values); + if (changes != 0) { + if (DEBUG_SWITCH || DEBUG_CONFIGURATION) { + Slog.i(TAG, "Updating configuration to: " + values); + } + + EventLog.writeEvent(EventLogTags.CONFIGURATION_CHANGED, changes); + + if (values.locale != null && !initLocale) { + saveLocaleLocked(values.locale, + !values.locale.equals(mConfiguration.locale), + values.userSetLocale); + } + + mConfigurationSeq++; + if (mConfigurationSeq <= 0) { + mConfigurationSeq = 1; + } + newConfig.seq = mConfigurationSeq; + mConfiguration = newConfig; + Slog.i(TAG, "Config changes=" + Integer.toHexString(changes) + " " + newConfig); + + final Configuration configCopy = new Configuration(mConfiguration); + + // TODO: If our config changes, should we auto dismiss any currently + // showing dialogs? + mShowDialogs = shouldShowDialogs(newConfig); + + AttributeCache ac = AttributeCache.instance(); + if (ac != null) { + ac.updateConfiguration(configCopy); + } + + // Make sure all resources in our process are updated + // right now, so that anyone who is going to retrieve + // resource values after we return will be sure to get + // the new ones. This is especially important during + // boot, where the first config change needs to guarantee + // all resources have that config before following boot + // code is executed. + mSystemThread.applyConfigurationToResources(configCopy); + + if (persistent && Settings.System.hasInterestingConfigurationChanges(changes)) { + Message msg = mHandler.obtainMessage(UPDATE_CONFIGURATION_MSG); + msg.obj = new Configuration(configCopy); + mHandler.sendMessage(msg); + } + + for (int i=mLruProcesses.size()-1; i>=0; i--) { + ProcessRecord app = mLruProcesses.get(i); + try { + if (app.thread != null) { + if (DEBUG_CONFIGURATION) Slog.v(TAG, "Sending to proc " + + app.processName + " new config " + mConfiguration); + app.thread.scheduleConfigurationChanged(configCopy); + } + } catch (Exception e) { + } + } + Intent intent = new Intent(Intent.ACTION_CONFIGURATION_CHANGED); + intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY + | Intent.FLAG_RECEIVER_REPLACE_PENDING + | Intent.FLAG_RECEIVER_FOREGROUND); + broadcastIntentLocked(null, null, intent, null, null, 0, null, null, + null, AppOpsManager.OP_NONE, false, false, MY_PID, + Process.SYSTEM_UID, UserHandle.USER_ALL); + if ((changes&ActivityInfo.CONFIG_LOCALE) != 0) { + intent = new Intent(Intent.ACTION_LOCALE_CHANGED); + intent.addFlags(Intent.FLAG_RECEIVER_FOREGROUND); + broadcastIntentLocked(null, null, intent, + null, null, 0, null, null, null, AppOpsManager.OP_NONE, + false, false, MY_PID, Process.SYSTEM_UID, UserHandle.USER_ALL); + } + } + } + + boolean kept = true; + final ActivityStack mainStack = mStackSupervisor.getFocusedStack(); + // mainStack is null during startup. + if (mainStack != null) { + if (changes != 0 && starting == null) { + // If the configuration changed, and the caller is not already + // in the process of starting an activity, then find the top + // activity to check if its configuration needs to change. + starting = mainStack.topRunningActivityLocked(null); + } + + if (starting != null) { + kept = mainStack.ensureActivityConfigurationLocked(starting, changes); + // And we need to make sure at this point that all other activities + // are made visible with the correct configuration. + mStackSupervisor.ensureActivitiesVisibleLocked(starting, changes); + } + } + + if (values != null && mWindowManager != null) { + mWindowManager.setNewConfiguration(mConfiguration); + } + + return kept; + } + + /** + * Decide based on the configuration whether we should shouw the ANR, + * crash, etc dialogs. The idea is that if there is no affordnace to + * press the on-screen buttons, we shouldn't show the dialog. + * + * A thought: SystemUI might also want to get told about this, the Power + * dialog / global actions also might want different behaviors. + */ + private static final boolean shouldShowDialogs(Configuration config) { + return !(config.keyboard == Configuration.KEYBOARD_NOKEYS + && config.touchscreen == Configuration.TOUCHSCREEN_NOTOUCH); + } + + /** + * Save the locale. You must be inside a synchronized (this) block. + */ + private void saveLocaleLocked(Locale l, boolean isDiff, boolean isPersist) { + if(isDiff) { + SystemProperties.set("user.language", l.getLanguage()); + SystemProperties.set("user.region", l.getCountry()); + } + + if(isPersist) { + SystemProperties.set("persist.sys.language", l.getLanguage()); + SystemProperties.set("persist.sys.country", l.getCountry()); + SystemProperties.set("persist.sys.localevar", l.getVariant()); + } + } + + @Override + public boolean targetTaskAffinityMatchesActivity(IBinder token, String destAffinity) { + ActivityRecord srec = ActivityRecord.forToken(token); + return srec != null && srec.task.affinity != null && + srec.task.affinity.equals(destAffinity); + } + + public boolean navigateUpTo(IBinder token, Intent destIntent, int resultCode, + Intent resultData) { + + synchronized (this) { + final ActivityStack stack = ActivityRecord.getStackLocked(token); + if (stack != null) { + return stack.navigateUpToLocked(token, destIntent, resultCode, resultData); + } + return false; + } + } + + public int getLaunchedFromUid(IBinder activityToken) { + ActivityRecord srec = ActivityRecord.forToken(activityToken); + if (srec == null) { + return -1; + } + return srec.launchedFromUid; + } + + public String getLaunchedFromPackage(IBinder activityToken) { + ActivityRecord srec = ActivityRecord.forToken(activityToken); + if (srec == null) { + return null; + } + return srec.launchedFromPackage; + } + + // ========================================================= + // LIFETIME MANAGEMENT + // ========================================================= + + // Returns which broadcast queue the app is the current [or imminent] receiver + // on, or 'null' if the app is not an active broadcast recipient. + private BroadcastQueue isReceivingBroadcast(ProcessRecord app) { + BroadcastRecord r = app.curReceiver; + if (r != null) { + return r.queue; + } + + // It's not the current receiver, but it might be starting up to become one + synchronized (this) { + for (BroadcastQueue queue : mBroadcastQueues) { + r = queue.mPendingBroadcast; + if (r != null && r.curApp == app) { + // found it; report which queue it's in + return queue; + } + } + } + + return null; + } + + private final int computeOomAdjLocked(ProcessRecord app, int cachedAdj, ProcessRecord TOP_APP, + boolean doingAll, long now) { + if (mAdjSeq == app.adjSeq) { + // This adjustment has already been computed. + return app.curRawAdj; + } + + if (app.thread == null) { + app.adjSeq = mAdjSeq; + app.curSchedGroup = Process.THREAD_GROUP_BG_NONINTERACTIVE; + app.curProcState = ActivityManager.PROCESS_STATE_CACHED_EMPTY; + return (app.curAdj=app.curRawAdj=ProcessList.CACHED_APP_MAX_ADJ); + } + + app.adjTypeCode = ActivityManager.RunningAppProcessInfo.REASON_UNKNOWN; + app.adjSource = null; + app.adjTarget = null; + app.empty = false; + app.cached = false; + + final int activitiesSize = app.activities.size(); + + if (app.maxAdj <= ProcessList.FOREGROUND_APP_ADJ) { + // The max adjustment doesn't allow this app to be anything + // below foreground, so it is not worth doing work for it. + app.adjType = "fixed"; + app.adjSeq = mAdjSeq; + app.curRawAdj = app.maxAdj; + app.foregroundActivities = false; + app.keeping = true; + app.curSchedGroup = Process.THREAD_GROUP_DEFAULT; + app.curProcState = ActivityManager.PROCESS_STATE_PERSISTENT; + // System process can do UI, and when they do we want to have + // them trim their memory after the user leaves the UI. To + // facilitate this, here we need to determine whether or not it + // is currently showing UI. + app.systemNoUi = true; + if (app == TOP_APP) { + app.systemNoUi = false; + } else if (activitiesSize > 0) { + for (int j = 0; j < activitiesSize; j++) { + final ActivityRecord r = app.activities.get(j); + if (r.visible) { + app.systemNoUi = false; + } + } + } + if (!app.systemNoUi) { + app.curProcState = ActivityManager.PROCESS_STATE_PERSISTENT_UI; + } + return (app.curAdj=app.maxAdj); + } + + app.keeping = false; + app.systemNoUi = false; + + // Determine the importance of the process, starting with most + // important to least, and assign an appropriate OOM adjustment. + int adj; + int schedGroup; + int procState; + boolean foregroundActivities = false; + boolean interesting = false; + BroadcastQueue queue; + if (app == TOP_APP) { + // The last app on the list is the foreground app. + adj = ProcessList.FOREGROUND_APP_ADJ; + schedGroup = Process.THREAD_GROUP_DEFAULT; + app.adjType = "top-activity"; + foregroundActivities = true; + interesting = true; + procState = ActivityManager.PROCESS_STATE_TOP; + } else if (app.instrumentationClass != null) { + // Don't want to kill running instrumentation. + adj = ProcessList.FOREGROUND_APP_ADJ; + schedGroup = Process.THREAD_GROUP_DEFAULT; + app.adjType = "instrumentation"; + interesting = true; + procState = ActivityManager.PROCESS_STATE_IMPORTANT_FOREGROUND; + } else if ((queue = isReceivingBroadcast(app)) != null) { + // An app that is currently receiving a broadcast also + // counts as being in the foreground for OOM killer purposes. + // It's placed in a sched group based on the nature of the + // broadcast as reflected by which queue it's active in. + adj = ProcessList.FOREGROUND_APP_ADJ; + schedGroup = (queue == mFgBroadcastQueue) + ? Process.THREAD_GROUP_DEFAULT : Process.THREAD_GROUP_BG_NONINTERACTIVE; + app.adjType = "broadcast"; + procState = ActivityManager.PROCESS_STATE_RECEIVER; + } else if (app.executingServices.size() > 0) { + // An app that is currently executing a service callback also + // counts as being in the foreground. + adj = ProcessList.FOREGROUND_APP_ADJ; + schedGroup = app.execServicesFg ? + Process.THREAD_GROUP_DEFAULT : Process.THREAD_GROUP_BG_NONINTERACTIVE; + app.adjType = "exec-service"; + procState = ActivityManager.PROCESS_STATE_SERVICE; + //Slog.i(TAG, "EXEC " + (app.execServicesFg ? "FG" : "BG") + ": " + app); + } else { + // As far as we know the process is empty. We may change our mind later. + schedGroup = Process.THREAD_GROUP_BG_NONINTERACTIVE; + // At this point we don't actually know the adjustment. Use the cached adj + // value that the caller wants us to. + adj = cachedAdj; + procState = ActivityManager.PROCESS_STATE_CACHED_EMPTY; + app.cached = true; + app.empty = true; + app.adjType = "cch-empty"; + } + + // Examine all activities if not already foreground. + if (!foregroundActivities && activitiesSize > 0) { + for (int j = 0; j < activitiesSize; j++) { + final ActivityRecord r = app.activities.get(j); + if (r.app != app) { + Slog.w(TAG, "Wtf, activity " + r + " in proc activity list not using proc " + + app + "?!?"); + continue; + } + if (r.visible) { + // App has a visible activity; only upgrade adjustment. + if (adj > ProcessList.VISIBLE_APP_ADJ) { + adj = ProcessList.VISIBLE_APP_ADJ; + app.adjType = "visible"; + } + if (procState > ActivityManager.PROCESS_STATE_TOP) { + procState = ActivityManager.PROCESS_STATE_TOP; + } + schedGroup = Process.THREAD_GROUP_DEFAULT; + app.cached = false; + app.empty = false; + foregroundActivities = true; + break; + } else if (r.state == ActivityState.PAUSING || r.state == ActivityState.PAUSED) { + if (adj > ProcessList.PERCEPTIBLE_APP_ADJ) { + adj = ProcessList.PERCEPTIBLE_APP_ADJ; + app.adjType = "pausing"; + } + if (procState > ActivityManager.PROCESS_STATE_TOP) { + procState = ActivityManager.PROCESS_STATE_TOP; + } + schedGroup = Process.THREAD_GROUP_DEFAULT; + app.cached = false; + app.empty = false; + foregroundActivities = true; + } else if (r.state == ActivityState.STOPPING) { + if (adj > ProcessList.PERCEPTIBLE_APP_ADJ) { + adj = ProcessList.PERCEPTIBLE_APP_ADJ; + app.adjType = "stopping"; + } + // For the process state, we will at this point consider the + // process to be cached. It will be cached either as an activity + // or empty depending on whether the activity is finishing. We do + // this so that we can treat the process as cached for purposes of + // memory trimming (determing current memory level, trim command to + // send to process) since there can be an arbitrary number of stopping + // processes and they should soon all go into the cached state. + if (!r.finishing) { + if (procState > ActivityManager.PROCESS_STATE_CACHED_ACTIVITY) { + procState = ActivityManager.PROCESS_STATE_CACHED_ACTIVITY; + } + } + app.cached = false; + app.empty = false; + foregroundActivities = true; + } else { + if (procState > ActivityManager.PROCESS_STATE_CACHED_ACTIVITY) { + procState = ActivityManager.PROCESS_STATE_CACHED_ACTIVITY; + app.adjType = "cch-act"; + } + } + } + } + + if (adj > ProcessList.PERCEPTIBLE_APP_ADJ) { + if (app.foregroundServices) { + // The user is aware of this app, so make it visible. + adj = ProcessList.PERCEPTIBLE_APP_ADJ; + procState = ActivityManager.PROCESS_STATE_IMPORTANT_FOREGROUND; + app.cached = false; + app.adjType = "fg-service"; + schedGroup = Process.THREAD_GROUP_DEFAULT; + } else if (app.forcingToForeground != null) { + // The user is aware of this app, so make it visible. + adj = ProcessList.PERCEPTIBLE_APP_ADJ; + procState = ActivityManager.PROCESS_STATE_IMPORTANT_FOREGROUND; + app.cached = false; + app.adjType = "force-fg"; + app.adjSource = app.forcingToForeground; + schedGroup = Process.THREAD_GROUP_DEFAULT; + } + } + + if (app.foregroundServices) { + interesting = true; + } + + if (app == mHeavyWeightProcess) { + if (adj > ProcessList.HEAVY_WEIGHT_APP_ADJ) { + // We don't want to kill the current heavy-weight process. + adj = ProcessList.HEAVY_WEIGHT_APP_ADJ; + schedGroup = Process.THREAD_GROUP_BG_NONINTERACTIVE; + app.cached = false; + app.adjType = "heavy"; + } + if (procState > ActivityManager.PROCESS_STATE_HEAVY_WEIGHT) { + procState = ActivityManager.PROCESS_STATE_HEAVY_WEIGHT; + } + } + + if (app == mHomeProcess) { + if (adj > ProcessList.HOME_APP_ADJ) { + // This process is hosting what we currently consider to be the + // home app, so we don't want to let it go into the background. + adj = ProcessList.HOME_APP_ADJ; + schedGroup = Process.THREAD_GROUP_BG_NONINTERACTIVE; + app.cached = false; + app.adjType = "home"; + } + if (procState > ActivityManager.PROCESS_STATE_HOME) { + procState = ActivityManager.PROCESS_STATE_HOME; + } + } + + if (app == mPreviousProcess && app.activities.size() > 0) { + if (adj > ProcessList.PREVIOUS_APP_ADJ) { + // This was the previous process that showed UI to the user. + // We want to try to keep it around more aggressively, to give + // a good experience around switching between two apps. + adj = ProcessList.PREVIOUS_APP_ADJ; + schedGroup = Process.THREAD_GROUP_BG_NONINTERACTIVE; + app.cached = false; + app.adjType = "previous"; + } + if (procState > ActivityManager.PROCESS_STATE_LAST_ACTIVITY) { + procState = ActivityManager.PROCESS_STATE_LAST_ACTIVITY; + } + } + + if (false) Slog.i(TAG, "OOM " + app + ": initial adj=" + adj + + " reason=" + app.adjType); + + // By default, we use the computed adjustment. It may be changed if + // there are applications dependent on our services or providers, but + // this gives us a baseline and makes sure we don't get into an + // infinite recursion. + app.adjSeq = mAdjSeq; + app.curRawAdj = adj; + app.hasStartedServices = false; + + if (mBackupTarget != null && app == mBackupTarget.app) { + // If possible we want to avoid killing apps while they're being backed up + if (adj > ProcessList.BACKUP_APP_ADJ) { + if (DEBUG_BACKUP) Slog.v(TAG, "oom BACKUP_APP_ADJ for " + app); + adj = ProcessList.BACKUP_APP_ADJ; + if (procState > ActivityManager.PROCESS_STATE_IMPORTANT_BACKGROUND) { + procState = ActivityManager.PROCESS_STATE_IMPORTANT_BACKGROUND; + } + app.adjType = "backup"; + app.cached = false; + } + if (procState > ActivityManager.PROCESS_STATE_BACKUP) { + procState = ActivityManager.PROCESS_STATE_BACKUP; + } + } + + boolean mayBeTop = false; + + for (int is = app.services.size()-1; + is >= 0 && (adj > ProcessList.FOREGROUND_APP_ADJ + || schedGroup == Process.THREAD_GROUP_BG_NONINTERACTIVE + || procState > ActivityManager.PROCESS_STATE_TOP); + is--) { + ServiceRecord s = app.services.valueAt(is); + if (s.startRequested) { + app.hasStartedServices = true; + if (procState > ActivityManager.PROCESS_STATE_SERVICE) { + procState = ActivityManager.PROCESS_STATE_SERVICE; + } + if (app.hasShownUi && app != mHomeProcess) { + // If this process has shown some UI, let it immediately + // go to the LRU list because it may be pretty heavy with + // UI stuff. We'll tag it with a label just to help + // debug and understand what is going on. + if (adj > ProcessList.SERVICE_ADJ) { + app.adjType = "cch-started-ui-services"; + } + } else { + if (now < (s.lastActivity + ActiveServices.MAX_SERVICE_INACTIVITY)) { + // This service has seen some activity within + // recent memory, so we will keep its process ahead + // of the background processes. + if (adj > ProcessList.SERVICE_ADJ) { + adj = ProcessList.SERVICE_ADJ; + app.adjType = "started-services"; + app.cached = false; + } + } + // If we have let the service slide into the background + // state, still have some text describing what it is doing + // even though the service no longer has an impact. + if (adj > ProcessList.SERVICE_ADJ) { + app.adjType = "cch-started-services"; + } + } + // Don't kill this process because it is doing work; it + // has said it is doing work. + app.keeping = true; + } + for (int conni = s.connections.size()-1; + conni >= 0 && (adj > ProcessList.FOREGROUND_APP_ADJ + || schedGroup == Process.THREAD_GROUP_BG_NONINTERACTIVE + || procState > ActivityManager.PROCESS_STATE_TOP); + conni--) { + ArrayList<ConnectionRecord> clist = s.connections.valueAt(conni); + for (int i = 0; + i < clist.size() && (adj > ProcessList.FOREGROUND_APP_ADJ + || schedGroup == Process.THREAD_GROUP_BG_NONINTERACTIVE + || procState > ActivityManager.PROCESS_STATE_TOP); + i++) { + // XXX should compute this based on the max of + // all connected clients. + ConnectionRecord cr = clist.get(i); + if (cr.binding.client == app) { + // Binding to ourself is not interesting. + continue; + } + if ((cr.flags&Context.BIND_WAIVE_PRIORITY) == 0) { + ProcessRecord client = cr.binding.client; + int clientAdj = computeOomAdjLocked(client, cachedAdj, + TOP_APP, doingAll, now); + int clientProcState = client.curProcState; + if (clientProcState >= ActivityManager.PROCESS_STATE_CACHED_ACTIVITY) { + // If the other app is cached for any reason, for purposes here + // we are going to consider it empty. The specific cached state + // doesn't propagate except under certain conditions. + clientProcState = ActivityManager.PROCESS_STATE_CACHED_EMPTY; + } + String adjType = null; + if ((cr.flags&Context.BIND_ALLOW_OOM_MANAGEMENT) != 0) { + // Not doing bind OOM management, so treat + // this guy more like a started service. + if (app.hasShownUi && app != mHomeProcess) { + // If this process has shown some UI, let it immediately + // go to the LRU list because it may be pretty heavy with + // UI stuff. We'll tag it with a label just to help + // debug and understand what is going on. + if (adj > clientAdj) { + adjType = "cch-bound-ui-services"; + } + app.cached = false; + clientAdj = adj; + clientProcState = procState; + } else { + if (now >= (s.lastActivity + + ActiveServices.MAX_SERVICE_INACTIVITY)) { + // This service has not seen activity within + // recent memory, so allow it to drop to the + // LRU list if there is no other reason to keep + // it around. We'll also tag it with a label just + // to help debug and undertand what is going on. + if (adj > clientAdj) { + adjType = "cch-bound-services"; + } + clientAdj = adj; + } + } + } + if (adj > clientAdj) { + // If this process has recently shown UI, and + // the process that is binding to it is less + // important than being visible, then we don't + // care about the binding as much as we care + // about letting this process get into the LRU + // list to be killed and restarted if needed for + // memory. + if (app.hasShownUi && app != mHomeProcess + && clientAdj > ProcessList.PERCEPTIBLE_APP_ADJ) { + adjType = "cch-bound-ui-services"; + } else { + if ((cr.flags&(Context.BIND_ABOVE_CLIENT + |Context.BIND_IMPORTANT)) != 0) { + adj = clientAdj; + } else if ((cr.flags&Context.BIND_NOT_VISIBLE) != 0 + && clientAdj < ProcessList.PERCEPTIBLE_APP_ADJ + && adj > ProcessList.PERCEPTIBLE_APP_ADJ) { + adj = ProcessList.PERCEPTIBLE_APP_ADJ; + } else if (clientAdj > ProcessList.VISIBLE_APP_ADJ) { + adj = clientAdj; + } else { + if (adj > ProcessList.VISIBLE_APP_ADJ) { + adj = ProcessList.VISIBLE_APP_ADJ; + } + } + if (!client.cached) { + app.cached = false; + } + if (client.keeping) { + app.keeping = true; + } + adjType = "service"; + } + } + if ((cr.flags&Context.BIND_NOT_FOREGROUND) == 0) { + if (client.curSchedGroup == Process.THREAD_GROUP_DEFAULT) { + schedGroup = Process.THREAD_GROUP_DEFAULT; + } + if (clientProcState <= ActivityManager.PROCESS_STATE_TOP) { + if (clientProcState == ActivityManager.PROCESS_STATE_TOP) { + // Special handling of clients who are in the top state. + // We *may* want to consider this process to be in the + // top state as well, but only if there is not another + // reason for it to be running. Being on the top is a + // special state, meaning you are specifically running + // for the current top app. If the process is already + // running in the background for some other reason, it + // is more important to continue considering it to be + // in the background state. + mayBeTop = true; + clientProcState = ActivityManager.PROCESS_STATE_CACHED_EMPTY; + } else { + // Special handling for above-top states (persistent + // processes). These should not bring the current process + // into the top state, since they are not on top. Instead + // give them the best state after that. + clientProcState = + ActivityManager.PROCESS_STATE_IMPORTANT_FOREGROUND; + } + } + } else { + if (clientProcState < + ActivityManager.PROCESS_STATE_IMPORTANT_BACKGROUND) { + clientProcState = + ActivityManager.PROCESS_STATE_IMPORTANT_BACKGROUND; + } + } + if (procState > clientProcState) { + procState = clientProcState; + } + if (procState < ActivityManager.PROCESS_STATE_IMPORTANT_BACKGROUND + && (cr.flags&Context.BIND_SHOWING_UI) != 0) { + app.pendingUiClean = true; + } + if (adjType != null) { + app.adjType = adjType; + app.adjTypeCode = ActivityManager.RunningAppProcessInfo + .REASON_SERVICE_IN_USE; + app.adjSource = cr.binding.client; + app.adjSourceOom = clientAdj; + app.adjTarget = s.name; + } + } + final ActivityRecord a = cr.activity; + if ((cr.flags&Context.BIND_ADJUST_WITH_ACTIVITY) != 0) { + if (a != null && adj > ProcessList.FOREGROUND_APP_ADJ && + (a.visible || a.state == ActivityState.RESUMED + || a.state == ActivityState.PAUSING)) { + adj = ProcessList.FOREGROUND_APP_ADJ; + if ((cr.flags&Context.BIND_NOT_FOREGROUND) == 0) { + schedGroup = Process.THREAD_GROUP_DEFAULT; + } + app.cached = false; + app.adjType = "service"; + app.adjTypeCode = ActivityManager.RunningAppProcessInfo + .REASON_SERVICE_IN_USE; + app.adjSource = a; + app.adjSourceOom = adj; + app.adjTarget = s.name; + } + } + } + } + } + + for (int provi = app.pubProviders.size()-1; + provi >= 0 && (adj > ProcessList.FOREGROUND_APP_ADJ + || schedGroup == Process.THREAD_GROUP_BG_NONINTERACTIVE + || procState > ActivityManager.PROCESS_STATE_TOP); + provi--) { + ContentProviderRecord cpr = app.pubProviders.valueAt(provi); + for (int i = cpr.connections.size()-1; + i >= 0 && (adj > ProcessList.FOREGROUND_APP_ADJ + || schedGroup == Process.THREAD_GROUP_BG_NONINTERACTIVE + || procState > ActivityManager.PROCESS_STATE_TOP); + i--) { + ContentProviderConnection conn = cpr.connections.get(i); + ProcessRecord client = conn.client; + if (client == app) { + // Being our own client is not interesting. + continue; + } + int clientAdj = computeOomAdjLocked(client, cachedAdj, TOP_APP, doingAll, now); + int clientProcState = client.curProcState; + if (clientProcState >= ActivityManager.PROCESS_STATE_CACHED_ACTIVITY) { + // If the other app is cached for any reason, for purposes here + // we are going to consider it empty. + clientProcState = ActivityManager.PROCESS_STATE_CACHED_EMPTY; + } + if (adj > clientAdj) { + if (app.hasShownUi && app != mHomeProcess + && clientAdj > ProcessList.PERCEPTIBLE_APP_ADJ) { + app.adjType = "cch-ui-provider"; + } else { + adj = clientAdj > ProcessList.FOREGROUND_APP_ADJ + ? clientAdj : ProcessList.FOREGROUND_APP_ADJ; + app.adjType = "provider"; + } + app.cached &= client.cached; + app.keeping |= client.keeping; + app.adjTypeCode = ActivityManager.RunningAppProcessInfo + .REASON_PROVIDER_IN_USE; + app.adjSource = client; + app.adjSourceOom = clientAdj; + app.adjTarget = cpr.name; + } + if (clientProcState <= ActivityManager.PROCESS_STATE_TOP) { + if (clientProcState == ActivityManager.PROCESS_STATE_TOP) { + // Special handling of clients who are in the top state. + // We *may* want to consider this process to be in the + // top state as well, but only if there is not another + // reason for it to be running. Being on the top is a + // special state, meaning you are specifically running + // for the current top app. If the process is already + // running in the background for some other reason, it + // is more important to continue considering it to be + // in the background state. + mayBeTop = true; + clientProcState = ActivityManager.PROCESS_STATE_CACHED_EMPTY; + } else { + // Special handling for above-top states (persistent + // processes). These should not bring the current process + // into the top state, since they are not on top. Instead + // give them the best state after that. + clientProcState = + ActivityManager.PROCESS_STATE_IMPORTANT_FOREGROUND; + } + } + if (procState > clientProcState) { + procState = clientProcState; + } + if (client.curSchedGroup == Process.THREAD_GROUP_DEFAULT) { + schedGroup = Process.THREAD_GROUP_DEFAULT; + } + } + // If the provider has external (non-framework) process + // dependencies, ensure that its adjustment is at least + // FOREGROUND_APP_ADJ. + if (cpr.hasExternalProcessHandles()) { + if (adj > ProcessList.FOREGROUND_APP_ADJ) { + adj = ProcessList.FOREGROUND_APP_ADJ; + schedGroup = Process.THREAD_GROUP_DEFAULT; + app.cached = false; + app.keeping = true; + app.adjType = "provider"; + app.adjTarget = cpr.name; + } + if (procState > ActivityManager.PROCESS_STATE_IMPORTANT_FOREGROUND) { + procState = ActivityManager.PROCESS_STATE_IMPORTANT_FOREGROUND; + } + } + } + + if (mayBeTop && procState > ActivityManager.PROCESS_STATE_TOP) { + // A client of one of our services or providers is in the top state. We + // *may* want to be in the top state, but not if we are already running in + // the background for some other reason. For the decision here, we are going + // to pick out a few specific states that we want to remain in when a client + // is top (states that tend to be longer-term) and otherwise allow it to go + // to the top state. + switch (procState) { + case ActivityManager.PROCESS_STATE_IMPORTANT_FOREGROUND: + case ActivityManager.PROCESS_STATE_IMPORTANT_BACKGROUND: + case ActivityManager.PROCESS_STATE_SERVICE: + // These all are longer-term states, so pull them up to the top + // of the background states, but not all the way to the top state. + procState = ActivityManager.PROCESS_STATE_IMPORTANT_FOREGROUND; + break; + default: + // Otherwise, top is a better choice, so take it. + procState = ActivityManager.PROCESS_STATE_TOP; + break; + } + } + + if (procState >= ActivityManager.PROCESS_STATE_CACHED_EMPTY && app.hasClientActivities) { + // This is a cached process, but with client activities. Mark it so. + procState = ActivityManager.PROCESS_STATE_CACHED_ACTIVITY_CLIENT; + app.adjType = "cch-client-act"; + } + + if (adj == ProcessList.SERVICE_ADJ) { + if (doingAll) { + app.serviceb = mNewNumAServiceProcs > (mNumServiceProcs/3); + mNewNumServiceProcs++; + //Slog.i(TAG, "ADJ " + app + " serviceb=" + app.serviceb); + if (!app.serviceb) { + // This service isn't far enough down on the LRU list to + // normally be a B service, but if we are low on RAM and it + // is large we want to force it down since we would prefer to + // keep launcher over it. + if (mLastMemoryLevel > ProcessStats.ADJ_MEM_FACTOR_NORMAL + && app.lastPss >= mProcessList.getCachedRestoreThresholdKb()) { + app.serviceHighRam = true; + app.serviceb = true; + //Slog.i(TAG, "ADJ " + app + " high ram!"); + } else { + mNewNumAServiceProcs++; + //Slog.i(TAG, "ADJ " + app + " not high ram!"); + } + } else { + app.serviceHighRam = false; + } + } + if (app.serviceb) { + adj = ProcessList.SERVICE_B_ADJ; + } + } + + app.curRawAdj = adj; + + //Slog.i(TAG, "OOM ADJ " + app + ": pid=" + app.pid + + // " adj=" + adj + " curAdj=" + app.curAdj + " maxAdj=" + app.maxAdj); + if (adj > app.maxAdj) { + adj = app.maxAdj; + if (app.maxAdj <= ProcessList.PERCEPTIBLE_APP_ADJ) { + schedGroup = Process.THREAD_GROUP_DEFAULT; + } + } + if (adj < ProcessList.CACHED_APP_MIN_ADJ) { + app.keeping = true; + } + + // Do final modification to adj. Everything we do between here and applying + // the final setAdj must be done in this function, because we will also use + // it when computing the final cached adj later. Note that we don't need to + // worry about this for max adj above, since max adj will always be used to + // keep it out of the cached vaues. + adj = app.modifyRawOomAdj(adj); + + app.curProcState = procState; + + int importance = app.memImportance; + if (importance == 0 || adj != app.curAdj || schedGroup != app.curSchedGroup) { + app.curAdj = adj; + app.curSchedGroup = schedGroup; + if (!interesting) { + // For this reporting, if there is not something explicitly + // interesting in this process then we will push it to the + // background importance. + importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_BACKGROUND; + } else if (adj >= ProcessList.CACHED_APP_MIN_ADJ) { + importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_BACKGROUND; + } else if (adj >= ProcessList.SERVICE_B_ADJ) { + importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_SERVICE; + } else if (adj >= ProcessList.HOME_APP_ADJ) { + importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_BACKGROUND; + } else if (adj >= ProcessList.SERVICE_ADJ) { + importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_SERVICE; + } else if (adj >= ProcessList.HEAVY_WEIGHT_APP_ADJ) { + importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_CANT_SAVE_STATE; + } else if (adj >= ProcessList.PERCEPTIBLE_APP_ADJ) { + importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_PERCEPTIBLE; + } else if (adj >= ProcessList.VISIBLE_APP_ADJ) { + importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_VISIBLE; + } else if (adj >= ProcessList.FOREGROUND_APP_ADJ) { + importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_FOREGROUND; + } else { + importance = ActivityManager.RunningAppProcessInfo.IMPORTANCE_PERSISTENT; + } + } + + int changes = importance != app.memImportance ? ProcessChangeItem.CHANGE_IMPORTANCE : 0; + if (foregroundActivities != app.foregroundActivities) { + changes |= ProcessChangeItem.CHANGE_ACTIVITIES; + } + if (changes != 0) { + if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "Changes in " + app + ": " + changes); + app.memImportance = importance; + app.foregroundActivities = foregroundActivities; + int i = mPendingProcessChanges.size()-1; + ProcessChangeItem item = null; + while (i >= 0) { + item = mPendingProcessChanges.get(i); + if (item.pid == app.pid) { + if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "Re-using existing item: " + item); + break; + } + i--; + } + if (i < 0) { + // No existing item in pending changes; need a new one. + final int NA = mAvailProcessChanges.size(); + if (NA > 0) { + item = mAvailProcessChanges.remove(NA-1); + if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "Retreiving available item: " + item); + } else { + item = new ProcessChangeItem(); + if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "Allocating new item: " + item); + } + item.changes = 0; + item.pid = app.pid; + item.uid = app.info.uid; + if (mPendingProcessChanges.size() == 0) { + if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, + "*** Enqueueing dispatch processes changed!"); + mHandler.obtainMessage(DISPATCH_PROCESSES_CHANGED).sendToTarget(); + } + mPendingProcessChanges.add(item); + } + item.changes |= changes; + item.importance = importance; + item.foregroundActivities = foregroundActivities; + if (DEBUG_PROCESS_OBSERVERS) Slog.i(TAG, "Item " + + Integer.toHexString(System.identityHashCode(item)) + + " " + app.toShortString() + ": changes=" + item.changes + + " importance=" + item.importance + + " foreground=" + item.foregroundActivities + + " type=" + app.adjType + " source=" + app.adjSource + + " target=" + app.adjTarget); + } + + return app.curRawAdj; + } + + /** + * Schedule PSS collection of a process. + */ + void requestPssLocked(ProcessRecord proc, int procState) { + if (mPendingPssProcesses.contains(proc)) { + return; + } + if (mPendingPssProcesses.size() == 0) { + mBgHandler.sendEmptyMessage(COLLECT_PSS_BG_MSG); + } + if (DEBUG_PSS) Slog.d(TAG, "Requesting PSS of: " + proc); + proc.pssProcState = procState; + mPendingPssProcesses.add(proc); + } + + /** + * Schedule PSS collection of all processes. + */ + void requestPssAllProcsLocked(long now, boolean always, boolean memLowered) { + if (!always) { + if (now < (mLastFullPssTime + + (memLowered ? FULL_PSS_LOWERED_INTERVAL : FULL_PSS_MIN_INTERVAL))) { + return; + } + } + if (DEBUG_PSS) Slog.d(TAG, "Requesting PSS of all procs! memLowered=" + memLowered); + mLastFullPssTime = now; + mPendingPssProcesses.ensureCapacity(mLruProcesses.size()); + mPendingPssProcesses.clear(); + for (int i=mLruProcesses.size()-1; i>=0; i--) { + ProcessRecord app = mLruProcesses.get(i); + if (memLowered || now > (app.lastStateTime+ProcessList.PSS_ALL_INTERVAL)) { + app.pssProcState = app.setProcState; + app.nextPssTime = ProcessList.computeNextPssTime(app.curProcState, true, + mSleeping, now); + mPendingPssProcesses.add(app); + } + } + mBgHandler.sendEmptyMessage(COLLECT_PSS_BG_MSG); + } + + /** + * Ask a given process to GC right now. + */ + final void performAppGcLocked(ProcessRecord app) { + try { + app.lastRequestedGc = SystemClock.uptimeMillis(); + if (app.thread != null) { + if (app.reportLowMemory) { + app.reportLowMemory = false; + app.thread.scheduleLowMemory(); + } else { + app.thread.processInBackground(); + } + } + } catch (Exception e) { + // whatever. + } + } + + /** + * Returns true if things are idle enough to perform GCs. + */ + private final boolean canGcNowLocked() { + boolean processingBroadcasts = false; + for (BroadcastQueue q : mBroadcastQueues) { + if (q.mParallelBroadcasts.size() != 0 || q.mOrderedBroadcasts.size() != 0) { + processingBroadcasts = true; + } + } + return !processingBroadcasts + && (mSleeping || mStackSupervisor.allResumedActivitiesIdle()); + } + + /** + * Perform GCs on all processes that are waiting for it, but only + * if things are idle. + */ + final void performAppGcsLocked() { + final int N = mProcessesToGc.size(); + if (N <= 0) { + return; + } + if (canGcNowLocked()) { + while (mProcessesToGc.size() > 0) { + ProcessRecord proc = mProcessesToGc.remove(0); + if (proc.curRawAdj > ProcessList.PERCEPTIBLE_APP_ADJ || proc.reportLowMemory) { + if ((proc.lastRequestedGc+GC_MIN_INTERVAL) + <= SystemClock.uptimeMillis()) { + // To avoid spamming the system, we will GC processes one + // at a time, waiting a few seconds between each. + performAppGcLocked(proc); + scheduleAppGcsLocked(); + return; + } else { + // It hasn't been long enough since we last GCed this + // process... put it in the list to wait for its time. + addProcessToGcListLocked(proc); + break; + } + } + } + + scheduleAppGcsLocked(); + } + } + + /** + * If all looks good, perform GCs on all processes waiting for them. + */ + final void performAppGcsIfAppropriateLocked() { + if (canGcNowLocked()) { + performAppGcsLocked(); + return; + } + // Still not idle, wait some more. + scheduleAppGcsLocked(); + } + + /** + * Schedule the execution of all pending app GCs. + */ + final void scheduleAppGcsLocked() { + mHandler.removeMessages(GC_BACKGROUND_PROCESSES_MSG); + + if (mProcessesToGc.size() > 0) { + // Schedule a GC for the time to the next process. + ProcessRecord proc = mProcessesToGc.get(0); + Message msg = mHandler.obtainMessage(GC_BACKGROUND_PROCESSES_MSG); + + long when = proc.lastRequestedGc + GC_MIN_INTERVAL; + long now = SystemClock.uptimeMillis(); + if (when < (now+GC_TIMEOUT)) { + when = now + GC_TIMEOUT; + } + mHandler.sendMessageAtTime(msg, when); + } + } + + /** + * Add a process to the array of processes waiting to be GCed. Keeps the + * list in sorted order by the last GC time. The process can't already be + * on the list. + */ + final void addProcessToGcListLocked(ProcessRecord proc) { + boolean added = false; + for (int i=mProcessesToGc.size()-1; i>=0; i--) { + if (mProcessesToGc.get(i).lastRequestedGc < + proc.lastRequestedGc) { + added = true; + mProcessesToGc.add(i+1, proc); + break; + } + } + if (!added) { + mProcessesToGc.add(0, proc); + } + } + + /** + * Set up to ask a process to GC itself. This will either do it + * immediately, or put it on the list of processes to gc the next + * time things are idle. + */ + final void scheduleAppGcLocked(ProcessRecord app) { + long now = SystemClock.uptimeMillis(); + if ((app.lastRequestedGc+GC_MIN_INTERVAL) > now) { + return; + } + if (!mProcessesToGc.contains(app)) { + addProcessToGcListLocked(app); + scheduleAppGcsLocked(); + } + } + + final void checkExcessivePowerUsageLocked(boolean doKills) { + updateCpuStatsNow(); + + BatteryStatsImpl stats = mBatteryStatsService.getActiveStatistics(); + boolean doWakeKills = doKills; + boolean doCpuKills = doKills; + if (mLastPowerCheckRealtime == 0) { + doWakeKills = false; + } + if (mLastPowerCheckUptime == 0) { + doCpuKills = false; + } + if (stats.isScreenOn()) { + doWakeKills = false; + } + final long curRealtime = SystemClock.elapsedRealtime(); + final long realtimeSince = curRealtime - mLastPowerCheckRealtime; + final long curUptime = SystemClock.uptimeMillis(); + final long uptimeSince = curUptime - mLastPowerCheckUptime; + mLastPowerCheckRealtime = curRealtime; + mLastPowerCheckUptime = curUptime; + if (realtimeSince < WAKE_LOCK_MIN_CHECK_DURATION) { + doWakeKills = false; + } + if (uptimeSince < CPU_MIN_CHECK_DURATION) { + doCpuKills = false; + } + int i = mLruProcesses.size(); + while (i > 0) { + i--; + ProcessRecord app = mLruProcesses.get(i); + if (!app.keeping) { + long wtime; + synchronized (stats) { + wtime = stats.getProcessWakeTime(app.info.uid, + app.pid, curRealtime); + } + long wtimeUsed = wtime - app.lastWakeTime; + long cputimeUsed = app.curCpuTime - app.lastCpuTime; + if (DEBUG_POWER) { + StringBuilder sb = new StringBuilder(128); + sb.append("Wake for "); + app.toShortString(sb); + sb.append(": over "); + TimeUtils.formatDuration(realtimeSince, sb); + sb.append(" used "); + TimeUtils.formatDuration(wtimeUsed, sb); + sb.append(" ("); + sb.append((wtimeUsed*100)/realtimeSince); + sb.append("%)"); + Slog.i(TAG, sb.toString()); + sb.setLength(0); + sb.append("CPU for "); + app.toShortString(sb); + sb.append(": over "); + TimeUtils.formatDuration(uptimeSince, sb); + sb.append(" used "); + TimeUtils.formatDuration(cputimeUsed, sb); + sb.append(" ("); + sb.append((cputimeUsed*100)/uptimeSince); + sb.append("%)"); + Slog.i(TAG, sb.toString()); + } + // If a process has held a wake lock for more + // than 50% of the time during this period, + // that sounds bad. Kill! + if (doWakeKills && realtimeSince > 0 + && ((wtimeUsed*100)/realtimeSince) >= 50) { + synchronized (stats) { + stats.reportExcessiveWakeLocked(app.info.uid, app.processName, + realtimeSince, wtimeUsed); + } + killUnneededProcessLocked(app, "excessive wake held " + wtimeUsed + + " during " + realtimeSince); + app.baseProcessTracker.reportExcessiveWake(app.pkgList); + } else if (doCpuKills && uptimeSince > 0 + && ((cputimeUsed*100)/uptimeSince) >= 50) { + synchronized (stats) { + stats.reportExcessiveCpuLocked(app.info.uid, app.processName, + uptimeSince, cputimeUsed); + } + killUnneededProcessLocked(app, "excessive cpu " + cputimeUsed + + " during " + uptimeSince); + app.baseProcessTracker.reportExcessiveCpu(app.pkgList); + } else { + app.lastWakeTime = wtime; + app.lastCpuTime = app.curCpuTime; + } + } + } + } + + private final boolean applyOomAdjLocked(ProcessRecord app, boolean wasKeeping, + ProcessRecord TOP_APP, boolean doingAll, boolean reportingProcessState, long now) { + boolean success = true; + + if (app.curRawAdj != app.setRawAdj) { + if (wasKeeping && !app.keeping) { + // This app is no longer something we want to keep. Note + // its current wake lock time to later know to kill it if + // it is not behaving well. + BatteryStatsImpl stats = mBatteryStatsService.getActiveStatistics(); + synchronized (stats) { + app.lastWakeTime = stats.getProcessWakeTime(app.info.uid, + app.pid, SystemClock.elapsedRealtime()); + } + app.lastCpuTime = app.curCpuTime; + } + + app.setRawAdj = app.curRawAdj; + } + + if (app.curAdj != app.setAdj) { + if (Process.setOomAdj(app.pid, app.curAdj)) { + if (DEBUG_SWITCH || DEBUG_OOM_ADJ) Slog.v( + TAG, "Set " + app.pid + " " + app.processName + + " adj " + app.curAdj + ": " + app.adjType); + app.setAdj = app.curAdj; + } else { + success = false; + Slog.w(TAG, "Failed setting oom adj of " + app + " to " + app.curAdj); + } + } + if (app.setSchedGroup != app.curSchedGroup) { + app.setSchedGroup = app.curSchedGroup; + if (DEBUG_SWITCH || DEBUG_OOM_ADJ) Slog.v(TAG, + "Setting process group of " + app.processName + + " to " + app.curSchedGroup); + if (app.waitingToKill != null && + app.setSchedGroup == Process.THREAD_GROUP_BG_NONINTERACTIVE) { + killUnneededProcessLocked(app, app.waitingToKill); + success = false; + } else { + if (true) { + long oldId = Binder.clearCallingIdentity(); + try { + Process.setProcessGroup(app.pid, app.curSchedGroup); + } catch (Exception e) { + Slog.w(TAG, "Failed setting process group of " + app.pid + + " to " + app.curSchedGroup); + e.printStackTrace(); + } finally { + Binder.restoreCallingIdentity(oldId); + } + } else { + if (app.thread != null) { + try { + app.thread.setSchedulingGroup(app.curSchedGroup); + } catch (RemoteException e) { + } + } + } + Process.setSwappiness(app.pid, + app.curSchedGroup <= Process.THREAD_GROUP_BG_NONINTERACTIVE); + } + } + if (app.repProcState != app.curProcState) { + app.repProcState = app.curProcState; + if (!reportingProcessState && app.thread != null) { + try { + if (false) { + //RuntimeException h = new RuntimeException("here"); + Slog.i(TAG, "Sending new process state " + app.repProcState + + " to " + app /*, h*/); + } + app.thread.setProcessState(app.repProcState); + } catch (RemoteException e) { + } + } + } + if (app.setProcState < 0 || ProcessList.procStatesDifferForMem(app.curProcState, + app.setProcState)) { + app.lastStateTime = now; + app.nextPssTime = ProcessList.computeNextPssTime(app.curProcState, true, + mSleeping, now); + if (DEBUG_PSS) Slog.d(TAG, "Process state change from " + + ProcessList.makeProcStateString(app.setProcState) + " to " + + ProcessList.makeProcStateString(app.curProcState) + " next pss in " + + (app.nextPssTime-now) + ": " + app); + } else { + if (now > app.nextPssTime || (now > (app.lastPssTime+ProcessList.PSS_MAX_INTERVAL) + && now > (app.lastStateTime+ProcessList.PSS_MIN_TIME_FROM_STATE_CHANGE))) { + requestPssLocked(app, app.setProcState); + app.nextPssTime = ProcessList.computeNextPssTime(app.curProcState, false, + mSleeping, now); + } else if (false && DEBUG_PSS) { + Slog.d(TAG, "Not requesting PSS of " + app + ": next=" + (app.nextPssTime-now)); + } + } + if (app.setProcState != app.curProcState) { + if (DEBUG_SWITCH || DEBUG_OOM_ADJ) Slog.v(TAG, + "Proc state change of " + app.processName + + " to " + app.curProcState); + app.setProcState = app.curProcState; + if (app.setProcState >= ActivityManager.PROCESS_STATE_HOME) { + app.notCachedSinceIdle = false; + } + if (!doingAll) { + setProcessTrackerState(app, mProcessStats.getMemFactorLocked(), now); + } else { + app.procStateChanged = true; + } + } + return success; + } + + private final void setProcessTrackerState(ProcessRecord proc, int memFactor, long now) { + if (proc.thread != null && proc.baseProcessTracker != null) { + proc.baseProcessTracker.setState(proc.repProcState, memFactor, now, proc.pkgList); + } + } + + private final boolean updateOomAdjLocked(ProcessRecord app, int cachedAdj, + ProcessRecord TOP_APP, boolean doingAll, boolean reportingProcessState, long now) { + if (app.thread == null) { + return false; + } + + final boolean wasKeeping = app.keeping; + + computeOomAdjLocked(app, cachedAdj, TOP_APP, doingAll, now); + + return applyOomAdjLocked(app, wasKeeping, TOP_APP, doingAll, + reportingProcessState, now); + } + + private final ActivityRecord resumedAppLocked() { + return mStackSupervisor.resumedAppLocked(); + } + + final boolean updateOomAdjLocked(ProcessRecord app) { + return updateOomAdjLocked(app, false); + } + + final boolean updateOomAdjLocked(ProcessRecord app, boolean doingProcessState) { + final ActivityRecord TOP_ACT = resumedAppLocked(); + final ProcessRecord TOP_APP = TOP_ACT != null ? TOP_ACT.app : null; + final boolean wasCached = app.cached; + + mAdjSeq++; + + // This is the desired cached adjusment we want to tell it to use. + // If our app is currently cached, we know it, and that is it. Otherwise, + // we don't know it yet, and it needs to now be cached we will then + // need to do a complete oom adj. + final int cachedAdj = app.curRawAdj >= ProcessList.CACHED_APP_MIN_ADJ + ? app.curRawAdj : ProcessList.UNKNOWN_ADJ; + boolean success = updateOomAdjLocked(app, cachedAdj, TOP_APP, false, doingProcessState, + SystemClock.uptimeMillis()); + if (wasCached != app.cached || app.curRawAdj == ProcessList.UNKNOWN_ADJ) { + // Changed to/from cached state, so apps after it in the LRU + // list may also be changed. + updateOomAdjLocked(); + } + return success; + } + + final void updateOomAdjLocked() { + final ActivityRecord TOP_ACT = resumedAppLocked(); + final ProcessRecord TOP_APP = TOP_ACT != null ? TOP_ACT.app : null; + final long now = SystemClock.uptimeMillis(); + final long oldTime = now - ProcessList.MAX_EMPTY_TIME; + final int N = mLruProcesses.size(); + + if (false) { + RuntimeException e = new RuntimeException(); + e.fillInStackTrace(); + Slog.i(TAG, "updateOomAdj: top=" + TOP_ACT, e); + } + + mAdjSeq++; + mNewNumServiceProcs = 0; + mNewNumAServiceProcs = 0; + + final int emptyProcessLimit; + final int cachedProcessLimit; + if (mProcessLimit <= 0) { + emptyProcessLimit = cachedProcessLimit = 0; + } else if (mProcessLimit == 1) { + emptyProcessLimit = 1; + cachedProcessLimit = 0; + } else { + emptyProcessLimit = ProcessList.computeEmptyProcessLimit(mProcessLimit); + cachedProcessLimit = mProcessLimit - emptyProcessLimit; + } + + // Let's determine how many processes we have running vs. + // how many slots we have for background processes; we may want + // to put multiple processes in a slot of there are enough of + // them. + int numSlots = (ProcessList.CACHED_APP_MAX_ADJ + - ProcessList.CACHED_APP_MIN_ADJ + 1) / 2; + int numEmptyProcs = N - mNumNonCachedProcs - mNumCachedHiddenProcs; + if (numEmptyProcs > cachedProcessLimit) { + // If there are more empty processes than our limit on cached + // processes, then use the cached process limit for the factor. + // This ensures that the really old empty processes get pushed + // down to the bottom, so if we are running low on memory we will + // have a better chance at keeping around more cached processes + // instead of a gazillion empty processes. + numEmptyProcs = cachedProcessLimit; + } + int emptyFactor = numEmptyProcs/numSlots; + if (emptyFactor < 1) emptyFactor = 1; + int cachedFactor = (mNumCachedHiddenProcs > 0 ? mNumCachedHiddenProcs : 1)/numSlots; + if (cachedFactor < 1) cachedFactor = 1; + int stepCached = 0; + int stepEmpty = 0; + int numCached = 0; + int numEmpty = 0; + int numTrimming = 0; + + mNumNonCachedProcs = 0; + mNumCachedHiddenProcs = 0; + + // First update the OOM adjustment for each of the + // application processes based on their current state. + int curCachedAdj = ProcessList.CACHED_APP_MIN_ADJ; + int nextCachedAdj = curCachedAdj+1; + int curEmptyAdj = ProcessList.CACHED_APP_MIN_ADJ; + int nextEmptyAdj = curEmptyAdj+2; + for (int i=N-1; i>=0; i--) { + ProcessRecord app = mLruProcesses.get(i); + if (!app.killedByAm && app.thread != null) { + app.procStateChanged = false; + final boolean wasKeeping = app.keeping; + computeOomAdjLocked(app, ProcessList.UNKNOWN_ADJ, TOP_APP, true, now); + + // If we haven't yet assigned the final cached adj + // to the process, do that now. + if (app.curAdj >= ProcessList.UNKNOWN_ADJ) { + switch (app.curProcState) { + case ActivityManager.PROCESS_STATE_CACHED_ACTIVITY: + case ActivityManager.PROCESS_STATE_CACHED_ACTIVITY_CLIENT: + // This process is a cached process holding activities... + // assign it the next cached value for that type, and then + // step that cached level. + app.curRawAdj = curCachedAdj; + app.curAdj = app.modifyRawOomAdj(curCachedAdj); + if (DEBUG_LRU && false) Slog.d(TAG, "Assigning activity LRU #" + i + + " adj: " + app.curAdj + " (curCachedAdj=" + curCachedAdj + + ")"); + if (curCachedAdj != nextCachedAdj) { + stepCached++; + if (stepCached >= cachedFactor) { + stepCached = 0; + curCachedAdj = nextCachedAdj; + nextCachedAdj += 2; + if (nextCachedAdj > ProcessList.CACHED_APP_MAX_ADJ) { + nextCachedAdj = ProcessList.CACHED_APP_MAX_ADJ; + } + } + } + break; + default: + // For everything else, assign next empty cached process + // level and bump that up. Note that this means that + // long-running services that have dropped down to the + // cached level will be treated as empty (since their process + // state is still as a service), which is what we want. + app.curRawAdj = curEmptyAdj; + app.curAdj = app.modifyRawOomAdj(curEmptyAdj); + if (DEBUG_LRU && false) Slog.d(TAG, "Assigning empty LRU #" + i + + " adj: " + app.curAdj + " (curEmptyAdj=" + curEmptyAdj + + ")"); + if (curEmptyAdj != nextEmptyAdj) { + stepEmpty++; + if (stepEmpty >= emptyFactor) { + stepEmpty = 0; + curEmptyAdj = nextEmptyAdj; + nextEmptyAdj += 2; + if (nextEmptyAdj > ProcessList.CACHED_APP_MAX_ADJ) { + nextEmptyAdj = ProcessList.CACHED_APP_MAX_ADJ; + } + } + } + break; + } + } + + applyOomAdjLocked(app, wasKeeping, TOP_APP, true, false, now); + + // Count the number of process types. + switch (app.curProcState) { + case ActivityManager.PROCESS_STATE_CACHED_ACTIVITY: + case ActivityManager.PROCESS_STATE_CACHED_ACTIVITY_CLIENT: + mNumCachedHiddenProcs++; + numCached++; + if (numCached > cachedProcessLimit) { + killUnneededProcessLocked(app, "cached #" + numCached); + } + break; + case ActivityManager.PROCESS_STATE_CACHED_EMPTY: + if (numEmpty > ProcessList.TRIM_EMPTY_APPS + && app.lastActivityTime < oldTime) { + killUnneededProcessLocked(app, "empty for " + + ((oldTime + ProcessList.MAX_EMPTY_TIME - app.lastActivityTime) + / 1000) + "s"); + } else { + numEmpty++; + if (numEmpty > emptyProcessLimit) { + killUnneededProcessLocked(app, "empty #" + numEmpty); + } + } + break; + default: + mNumNonCachedProcs++; + break; + } + + if (app.isolated && app.services.size() <= 0) { + // If this is an isolated process, and there are no + // services running in it, then the process is no longer + // needed. We agressively kill these because we can by + // definition not re-use the same process again, and it is + // good to avoid having whatever code was running in them + // left sitting around after no longer needed. + killUnneededProcessLocked(app, "isolated not needed"); + } + + if (app.curProcState >= ActivityManager.PROCESS_STATE_HOME + && !app.killedByAm) { + numTrimming++; + } + } + } + + mNumServiceProcs = mNewNumServiceProcs; + + // Now determine the memory trimming level of background processes. + // Unfortunately we need to start at the back of the list to do this + // properly. We only do this if the number of background apps we + // are managing to keep around is less than half the maximum we desire; + // if we are keeping a good number around, we'll let them use whatever + // memory they want. + final int numCachedAndEmpty = numCached + numEmpty; + int memFactor; + if (numCached <= ProcessList.TRIM_CACHED_APPS + && numEmpty <= ProcessList.TRIM_EMPTY_APPS) { + if (numCachedAndEmpty <= ProcessList.TRIM_CRITICAL_THRESHOLD) { + memFactor = ProcessStats.ADJ_MEM_FACTOR_CRITICAL; + } else if (numCachedAndEmpty <= ProcessList.TRIM_LOW_THRESHOLD) { + memFactor = ProcessStats.ADJ_MEM_FACTOR_LOW; + } else { + memFactor = ProcessStats.ADJ_MEM_FACTOR_MODERATE; + } + } else { + memFactor = ProcessStats.ADJ_MEM_FACTOR_NORMAL; + } + // We always allow the memory level to go up (better). We only allow it to go + // down if we are in a state where that is allowed, *and* the total number of processes + // has gone down since last time. + if (DEBUG_OOM_ADJ) Slog.d(TAG, "oom: memFactor=" + memFactor + " last=" + mLastMemoryLevel + + " allowLow=" + mAllowLowerMemLevel + " numProcs=" + mLruProcesses.size() + + " last=" + mLastNumProcesses); + if (memFactor > mLastMemoryLevel) { + if (!mAllowLowerMemLevel || mLruProcesses.size() >= mLastNumProcesses) { + memFactor = mLastMemoryLevel; + if (DEBUG_OOM_ADJ) Slog.d(TAG, "Keeping last mem factor!"); + } + } + mLastMemoryLevel = memFactor; + mLastNumProcesses = mLruProcesses.size(); + boolean allChanged = mProcessStats.setMemFactorLocked(memFactor, !mSleeping, now); + final int trackerMemFactor = mProcessStats.getMemFactorLocked(); + if (memFactor != ProcessStats.ADJ_MEM_FACTOR_NORMAL) { + if (mLowRamStartTime == 0) { + mLowRamStartTime = now; + } + int step = 0; + int fgTrimLevel; + switch (memFactor) { + case ProcessStats.ADJ_MEM_FACTOR_CRITICAL: + fgTrimLevel = ComponentCallbacks2.TRIM_MEMORY_RUNNING_CRITICAL; + break; + case ProcessStats.ADJ_MEM_FACTOR_LOW: + fgTrimLevel = ComponentCallbacks2.TRIM_MEMORY_RUNNING_LOW; + break; + default: + fgTrimLevel = ComponentCallbacks2.TRIM_MEMORY_RUNNING_MODERATE; + break; + } + int factor = numTrimming/3; + int minFactor = 2; + if (mHomeProcess != null) minFactor++; + if (mPreviousProcess != null) minFactor++; + if (factor < minFactor) factor = minFactor; + int curLevel = ComponentCallbacks2.TRIM_MEMORY_COMPLETE; + for (int i=N-1; i>=0; i--) { + ProcessRecord app = mLruProcesses.get(i); + if (allChanged || app.procStateChanged) { + setProcessTrackerState(app, trackerMemFactor, now); + app.procStateChanged = false; + } + if (app.curProcState >= ActivityManager.PROCESS_STATE_HOME + && !app.killedByAm) { + if (app.trimMemoryLevel < curLevel && app.thread != null) { + try { + if (DEBUG_SWITCH || DEBUG_OOM_ADJ) Slog.v(TAG, + "Trimming memory of " + app.processName + + " to " + curLevel); + app.thread.scheduleTrimMemory(curLevel); + } catch (RemoteException e) { + } + if (false) { + // For now we won't do this; our memory trimming seems + // to be good enough at this point that destroying + // activities causes more harm than good. + if (curLevel >= ComponentCallbacks2.TRIM_MEMORY_COMPLETE + && app != mHomeProcess && app != mPreviousProcess) { + // Need to do this on its own message because the stack may not + // be in a consistent state at this point. + // For these apps we will also finish their activities + // to help them free memory. + mStackSupervisor.scheduleDestroyAllActivities(app, "trim"); + } + } + } + app.trimMemoryLevel = curLevel; + step++; + if (step >= factor) { + step = 0; + switch (curLevel) { + case ComponentCallbacks2.TRIM_MEMORY_COMPLETE: + curLevel = ComponentCallbacks2.TRIM_MEMORY_MODERATE; + break; + case ComponentCallbacks2.TRIM_MEMORY_MODERATE: + curLevel = ComponentCallbacks2.TRIM_MEMORY_BACKGROUND; + break; + } + } + } else if (app.curProcState == ActivityManager.PROCESS_STATE_HEAVY_WEIGHT) { + if (app.trimMemoryLevel < ComponentCallbacks2.TRIM_MEMORY_BACKGROUND + && app.thread != null) { + try { + if (DEBUG_SWITCH || DEBUG_OOM_ADJ) Slog.v(TAG, + "Trimming memory of heavy-weight " + app.processName + + " to " + ComponentCallbacks2.TRIM_MEMORY_BACKGROUND); + app.thread.scheduleTrimMemory( + ComponentCallbacks2.TRIM_MEMORY_BACKGROUND); + } catch (RemoteException e) { + } + } + app.trimMemoryLevel = ComponentCallbacks2.TRIM_MEMORY_BACKGROUND; + } else { + if ((app.curProcState >= ActivityManager.PROCESS_STATE_IMPORTANT_BACKGROUND + || app.systemNoUi) && app.pendingUiClean) { + // If this application is now in the background and it + // had done UI, then give it the special trim level to + // have it free UI resources. + final int level = ComponentCallbacks2.TRIM_MEMORY_UI_HIDDEN; + if (app.trimMemoryLevel < level && app.thread != null) { + try { + if (DEBUG_SWITCH || DEBUG_OOM_ADJ) Slog.v(TAG, + "Trimming memory of bg-ui " + app.processName + + " to " + level); + app.thread.scheduleTrimMemory(level); + } catch (RemoteException e) { + } + } + app.pendingUiClean = false; + } + if (app.trimMemoryLevel < fgTrimLevel && app.thread != null) { + try { + if (DEBUG_SWITCH || DEBUG_OOM_ADJ) Slog.v(TAG, + "Trimming memory of fg " + app.processName + + " to " + fgTrimLevel); + app.thread.scheduleTrimMemory(fgTrimLevel); + } catch (RemoteException e) { + } + } + app.trimMemoryLevel = fgTrimLevel; + } + } + } else { + if (mLowRamStartTime != 0) { + mLowRamTimeSinceLastIdle += now - mLowRamStartTime; + mLowRamStartTime = 0; + } + for (int i=N-1; i>=0; i--) { + ProcessRecord app = mLruProcesses.get(i); + if (allChanged || app.procStateChanged) { + setProcessTrackerState(app, trackerMemFactor, now); + app.procStateChanged = false; + } + if ((app.curProcState >= ActivityManager.PROCESS_STATE_IMPORTANT_BACKGROUND + || app.systemNoUi) && app.pendingUiClean) { + if (app.trimMemoryLevel < ComponentCallbacks2.TRIM_MEMORY_UI_HIDDEN + && app.thread != null) { + try { + if (DEBUG_SWITCH || DEBUG_OOM_ADJ) Slog.v(TAG, + "Trimming memory of ui hidden " + app.processName + + " to " + ComponentCallbacks2.TRIM_MEMORY_UI_HIDDEN); + app.thread.scheduleTrimMemory( + ComponentCallbacks2.TRIM_MEMORY_UI_HIDDEN); + } catch (RemoteException e) { + } + } + app.pendingUiClean = false; + } + app.trimMemoryLevel = 0; + } + } + + if (mAlwaysFinishActivities) { + // Need to do this on its own message because the stack may not + // be in a consistent state at this point. + mStackSupervisor.scheduleDestroyAllActivities(null, "always-finish"); + } + + if (allChanged) { + requestPssAllProcsLocked(now, false, mProcessStats.isMemFactorLowered()); + } + + if (mProcessStats.shouldWriteNowLocked(now)) { + mHandler.post(new Runnable() { + @Override public void run() { + synchronized (ActivityManagerService.this) { + mProcessStats.writeStateAsyncLocked(); + } + } + }); + } + + if (DEBUG_OOM_ADJ) { + Slog.d(TAG, "Did OOM ADJ in " + (SystemClock.uptimeMillis()-now) + "ms"); + } + } + + final void trimApplications() { + synchronized (this) { + int i; + + // First remove any unused application processes whose package + // has been removed. + for (i=mRemovedProcesses.size()-1; i>=0; i--) { + final ProcessRecord app = mRemovedProcesses.get(i); + if (app.activities.size() == 0 + && app.curReceiver == null && app.services.size() == 0) { + Slog.i( + TAG, "Exiting empty application process " + + app.processName + " (" + + (app.thread != null ? app.thread.asBinder() : null) + + ")\n"); + if (app.pid > 0 && app.pid != MY_PID) { + EventLog.writeEvent(EventLogTags.AM_KILL, app.userId, app.pid, + app.processName, app.setAdj, "empty"); + app.killedByAm = true; + Process.killProcessQuiet(app.pid); + } else { + try { + app.thread.scheduleExit(); + } catch (Exception e) { + // Ignore exceptions. + } + } + cleanUpApplicationRecordLocked(app, false, true, -1); + mRemovedProcesses.remove(i); + + if (app.persistent) { + if (app.persistent) { + addAppLocked(app.info, false); + } + } + } + } + + // Now update the oom adj for all processes. + updateOomAdjLocked(); + } + } + + /** This method sends the specified signal to each of the persistent apps */ + public void signalPersistentProcesses(int sig) throws RemoteException { + if (sig != Process.SIGNAL_USR1) { + throw new SecurityException("Only SIGNAL_USR1 is allowed"); + } + + synchronized (this) { + if (checkCallingPermission(android.Manifest.permission.SIGNAL_PERSISTENT_PROCESSES) + != PackageManager.PERMISSION_GRANTED) { + throw new SecurityException("Requires permission " + + android.Manifest.permission.SIGNAL_PERSISTENT_PROCESSES); + } + + for (int i = mLruProcesses.size() - 1 ; i >= 0 ; i--) { + ProcessRecord r = mLruProcesses.get(i); + if (r.thread != null && r.persistent) { + Process.sendSignal(r.pid, sig); + } + } + } + } + + private void stopProfilerLocked(ProcessRecord proc, String path, int profileType) { + if (proc == null || proc == mProfileProc) { + proc = mProfileProc; + path = mProfileFile; + profileType = mProfileType; + clearProfilerLocked(); + } + if (proc == null) { + return; + } + try { + proc.thread.profilerControl(false, path, null, profileType); + } catch (RemoteException e) { + throw new IllegalStateException("Process disappeared"); + } + } + + private void clearProfilerLocked() { + if (mProfileFd != null) { + try { + mProfileFd.close(); + } catch (IOException e) { + } + } + mProfileApp = null; + mProfileProc = null; + mProfileFile = null; + mProfileType = 0; + mAutoStopProfiler = false; + } + + public boolean profileControl(String process, int userId, boolean start, + String path, ParcelFileDescriptor fd, int profileType) throws RemoteException { + + try { + synchronized (this) { + // note: hijacking SET_ACTIVITY_WATCHER, but should be changed to + // its own permission. + if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER) + != PackageManager.PERMISSION_GRANTED) { + throw new SecurityException("Requires permission " + + android.Manifest.permission.SET_ACTIVITY_WATCHER); + } + + if (start && fd == null) { + throw new IllegalArgumentException("null fd"); + } + + ProcessRecord proc = null; + if (process != null) { + proc = findProcessLocked(process, userId, "profileControl"); + } + + if (start && (proc == null || proc.thread == null)) { + throw new IllegalArgumentException("Unknown process: " + process); + } + + if (start) { + stopProfilerLocked(null, null, 0); + setProfileApp(proc.info, proc.processName, path, fd, false); + mProfileProc = proc; + mProfileType = profileType; + try { + fd = fd.dup(); + } catch (IOException e) { + fd = null; + } + proc.thread.profilerControl(start, path, fd, profileType); + fd = null; + mProfileFd = null; + } else { + stopProfilerLocked(proc, path, profileType); + if (fd != null) { + try { + fd.close(); + } catch (IOException e) { + } + } + } + + return true; + } + } catch (RemoteException e) { + throw new IllegalStateException("Process disappeared"); + } finally { + if (fd != null) { + try { + fd.close(); + } catch (IOException e) { + } + } + } + } + + private ProcessRecord findProcessLocked(String process, int userId, String callName) { + userId = handleIncomingUser(Binder.getCallingPid(), Binder.getCallingUid(), + userId, true, true, callName, null); + ProcessRecord proc = null; + try { + int pid = Integer.parseInt(process); + synchronized (mPidsSelfLocked) { + proc = mPidsSelfLocked.get(pid); + } + } catch (NumberFormatException e) { + } + + if (proc == null) { + ArrayMap<String, SparseArray<ProcessRecord>> all + = mProcessNames.getMap(); + SparseArray<ProcessRecord> procs = all.get(process); + if (procs != null && procs.size() > 0) { + proc = procs.valueAt(0); + if (userId != UserHandle.USER_ALL && proc.userId != userId) { + for (int i=1; i<procs.size(); i++) { + ProcessRecord thisProc = procs.valueAt(i); + if (thisProc.userId == userId) { + proc = thisProc; + break; + } + } + } + } + } + + return proc; + } + + public boolean dumpHeap(String process, int userId, boolean managed, + String path, ParcelFileDescriptor fd) throws RemoteException { + + try { + synchronized (this) { + // note: hijacking SET_ACTIVITY_WATCHER, but should be changed to + // its own permission (same as profileControl). + if (checkCallingPermission(android.Manifest.permission.SET_ACTIVITY_WATCHER) + != PackageManager.PERMISSION_GRANTED) { + throw new SecurityException("Requires permission " + + android.Manifest.permission.SET_ACTIVITY_WATCHER); + } + + if (fd == null) { + throw new IllegalArgumentException("null fd"); + } + + ProcessRecord proc = findProcessLocked(process, userId, "dumpHeap"); + if (proc == null || proc.thread == null) { + throw new IllegalArgumentException("Unknown process: " + process); + } + + boolean isDebuggable = "1".equals(SystemProperties.get(SYSTEM_DEBUGGABLE, "0")); + if (!isDebuggable) { + if ((proc.info.flags&ApplicationInfo.FLAG_DEBUGGABLE) == 0) { + throw new SecurityException("Process not debuggable: " + proc); + } + } + + proc.thread.dumpHeap(managed, path, fd); + fd = null; + return true; + } + } catch (RemoteException e) { + throw new IllegalStateException("Process disappeared"); + } finally { + if (fd != null) { + try { + fd.close(); + } catch (IOException e) { + } + } + } + } + + /** In this method we try to acquire our lock to make sure that we have not deadlocked */ + public void monitor() { + synchronized (this) { } + } + + void onCoreSettingsChange(Bundle settings) { + for (int i = mLruProcesses.size() - 1; i >= 0; i--) { + ProcessRecord processRecord = mLruProcesses.get(i); + try { + if (processRecord.thread != null) { + processRecord.thread.setCoreSettings(settings); + } + } catch (RemoteException re) { + /* ignore */ + } + } + } + + // Multi-user methods + + @Override + public boolean switchUser(final int userId) { + if (checkCallingPermission(android.Manifest.permission.INTERACT_ACROSS_USERS_FULL) + != PackageManager.PERMISSION_GRANTED) { + String msg = "Permission Denial: switchUser() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " requires " + android.Manifest.permission.INTERACT_ACROSS_USERS_FULL; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + + final long ident = Binder.clearCallingIdentity(); + try { + synchronized (this) { + final int oldUserId = mCurrentUserId; + if (oldUserId == userId) { + return true; + } + + final UserInfo userInfo = getUserManagerLocked().getUserInfo(userId); + if (userInfo == null) { + Slog.w(TAG, "No user info for user #" + userId); + return false; + } + + mWindowManager.startFreezingScreen(R.anim.screen_user_exit, + R.anim.screen_user_enter); + + boolean needStart = false; + + // If the user we are switching to is not currently started, then + // we need to start it now. + if (mStartedUsers.get(userId) == null) { + mStartedUsers.put(userId, new UserStartedState(new UserHandle(userId), false)); + updateStartedUserArrayLocked(); + needStart = true; + } + + mCurrentUserId = userId; + final Integer userIdInt = Integer.valueOf(userId); + mUserLru.remove(userIdInt); + mUserLru.add(userIdInt); + + mWindowManager.setCurrentUser(userId); + + // Once the internal notion of the active user has switched, we lock the device + // with the option to show the user switcher on the keyguard. + mWindowManager.lockNow(null); + + final UserStartedState uss = mStartedUsers.get(userId); + + // Make sure user is in the started state. If it is currently + // stopping, we need to knock that off. + if (uss.mState == UserStartedState.STATE_STOPPING) { + // If we are stopping, we haven't sent ACTION_SHUTDOWN, + // so we can just fairly silently bring the user back from + // the almost-dead. + uss.mState = UserStartedState.STATE_RUNNING; + updateStartedUserArrayLocked(); + needStart = true; + } else if (uss.mState == UserStartedState.STATE_SHUTDOWN) { + // This means ACTION_SHUTDOWN has been sent, so we will + // need to treat this as a new boot of the user. + uss.mState = UserStartedState.STATE_BOOTING; + updateStartedUserArrayLocked(); + needStart = true; + } + + mHandler.removeMessages(REPORT_USER_SWITCH_MSG); + mHandler.removeMessages(USER_SWITCH_TIMEOUT_MSG); + mHandler.sendMessage(mHandler.obtainMessage(REPORT_USER_SWITCH_MSG, + oldUserId, userId, uss)); + mHandler.sendMessageDelayed(mHandler.obtainMessage(USER_SWITCH_TIMEOUT_MSG, + oldUserId, userId, uss), USER_SWITCH_TIMEOUT); + if (needStart) { + Intent intent = new Intent(Intent.ACTION_USER_STARTED); + intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY + | Intent.FLAG_RECEIVER_FOREGROUND); + intent.putExtra(Intent.EXTRA_USER_HANDLE, userId); + broadcastIntentLocked(null, null, intent, + null, null, 0, null, null, null, AppOpsManager.OP_NONE, + false, false, MY_PID, Process.SYSTEM_UID, userId); + } + + if ((userInfo.flags&UserInfo.FLAG_INITIALIZED) == 0) { + if (userId != 0) { + Intent intent = new Intent(Intent.ACTION_USER_INITIALIZE); + intent.addFlags(Intent.FLAG_RECEIVER_FOREGROUND); + broadcastIntentLocked(null, null, intent, null, + new IIntentReceiver.Stub() { + public void performReceive(Intent intent, int resultCode, + String data, Bundle extras, boolean ordered, + boolean sticky, int sendingUser) { + userInitialized(uss, userId); + } + }, 0, null, null, null, AppOpsManager.OP_NONE, + true, false, MY_PID, Process.SYSTEM_UID, + userId); + uss.initializing = true; + } else { + getUserManagerLocked().makeInitialized(userInfo.id); + } + } + + boolean homeInFront = mStackSupervisor.switchUserLocked(userId, uss); + if (homeInFront) { + startHomeActivityLocked(userId); + } else { + mStackSupervisor.resumeTopActivitiesLocked(); + } + + EventLogTags.writeAmSwitchUser(userId); + getUserManagerLocked().userForeground(userId); + sendUserSwitchBroadcastsLocked(oldUserId, userId); + if (needStart) { + Intent intent = new Intent(Intent.ACTION_USER_STARTING); + intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY); + intent.putExtra(Intent.EXTRA_USER_HANDLE, userId); + broadcastIntentLocked(null, null, intent, + null, new IIntentReceiver.Stub() { + @Override + public void performReceive(Intent intent, int resultCode, String data, + Bundle extras, boolean ordered, boolean sticky, int sendingUser) + throws RemoteException { + } + }, 0, null, null, + android.Manifest.permission.INTERACT_ACROSS_USERS, AppOpsManager.OP_NONE, + true, false, MY_PID, Process.SYSTEM_UID, UserHandle.USER_ALL); + } + } + } finally { + Binder.restoreCallingIdentity(ident); + } + + return true; + } + + void sendUserSwitchBroadcastsLocked(int oldUserId, int newUserId) { + long ident = Binder.clearCallingIdentity(); + try { + Intent intent; + if (oldUserId >= 0) { + intent = new Intent(Intent.ACTION_USER_BACKGROUND); + intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY + | Intent.FLAG_RECEIVER_FOREGROUND); + intent.putExtra(Intent.EXTRA_USER_HANDLE, oldUserId); + broadcastIntentLocked(null, null, intent, + null, null, 0, null, null, null, AppOpsManager.OP_NONE, + false, false, MY_PID, Process.SYSTEM_UID, oldUserId); + } + if (newUserId >= 0) { + intent = new Intent(Intent.ACTION_USER_FOREGROUND); + intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY + | Intent.FLAG_RECEIVER_FOREGROUND); + intent.putExtra(Intent.EXTRA_USER_HANDLE, newUserId); + broadcastIntentLocked(null, null, intent, + null, null, 0, null, null, null, AppOpsManager.OP_NONE, + false, false, MY_PID, Process.SYSTEM_UID, newUserId); + intent = new Intent(Intent.ACTION_USER_SWITCHED); + intent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY + | Intent.FLAG_RECEIVER_FOREGROUND); + intent.putExtra(Intent.EXTRA_USER_HANDLE, newUserId); + broadcastIntentLocked(null, null, intent, + null, null, 0, null, null, + android.Manifest.permission.MANAGE_USERS, AppOpsManager.OP_NONE, + false, false, MY_PID, Process.SYSTEM_UID, UserHandle.USER_ALL); + } + } finally { + Binder.restoreCallingIdentity(ident); + } + } + + void dispatchUserSwitch(final UserStartedState uss, final int oldUserId, + final int newUserId) { + final int N = mUserSwitchObservers.beginBroadcast(); + if (N > 0) { + final IRemoteCallback callback = new IRemoteCallback.Stub() { + int mCount = 0; + @Override + public void sendResult(Bundle data) throws RemoteException { + synchronized (ActivityManagerService.this) { + if (mCurUserSwitchCallback == this) { + mCount++; + if (mCount == N) { + sendContinueUserSwitchLocked(uss, oldUserId, newUserId); + } + } + } + } + }; + synchronized (this) { + uss.switching = true; + mCurUserSwitchCallback = callback; + } + for (int i=0; i<N; i++) { + try { + mUserSwitchObservers.getBroadcastItem(i).onUserSwitching( + newUserId, callback); + } catch (RemoteException e) { + } + } + } else { + synchronized (this) { + sendContinueUserSwitchLocked(uss, oldUserId, newUserId); + } + } + mUserSwitchObservers.finishBroadcast(); + } + + void timeoutUserSwitch(UserStartedState uss, int oldUserId, int newUserId) { + synchronized (this) { + Slog.w(TAG, "User switch timeout: from " + oldUserId + " to " + newUserId); + sendContinueUserSwitchLocked(uss, oldUserId, newUserId); + } + } + + void sendContinueUserSwitchLocked(UserStartedState uss, int oldUserId, int newUserId) { + mCurUserSwitchCallback = null; + mHandler.removeMessages(USER_SWITCH_TIMEOUT_MSG); + mHandler.sendMessage(mHandler.obtainMessage(CONTINUE_USER_SWITCH_MSG, + oldUserId, newUserId, uss)); + } + + void userInitialized(UserStartedState uss, int newUserId) { + completeSwitchAndInitalize(uss, newUserId, true, false); + } + + void continueUserSwitch(UserStartedState uss, int oldUserId, int newUserId) { + completeSwitchAndInitalize(uss, newUserId, false, true); + } + + void completeSwitchAndInitalize(UserStartedState uss, int newUserId, + boolean clearInitializing, boolean clearSwitching) { + boolean unfrozen = false; + synchronized (this) { + if (clearInitializing) { + uss.initializing = false; + getUserManagerLocked().makeInitialized(uss.mHandle.getIdentifier()); + } + if (clearSwitching) { + uss.switching = false; + } + if (!uss.switching && !uss.initializing) { + mWindowManager.stopFreezingScreen(); + unfrozen = true; + } + } + if (unfrozen) { + final int N = mUserSwitchObservers.beginBroadcast(); + for (int i=0; i<N; i++) { + try { + mUserSwitchObservers.getBroadcastItem(i).onUserSwitchComplete(newUserId); + } catch (RemoteException e) { + } + } + mUserSwitchObservers.finishBroadcast(); + } + } + + void finishUserSwitch(UserStartedState uss) { + synchronized (this) { + if (uss.mState == UserStartedState.STATE_BOOTING + && mStartedUsers.get(uss.mHandle.getIdentifier()) == uss) { + uss.mState = UserStartedState.STATE_RUNNING; + final int userId = uss.mHandle.getIdentifier(); + Intent intent = new Intent(Intent.ACTION_BOOT_COMPLETED, null); + intent.putExtra(Intent.EXTRA_USER_HANDLE, userId); + intent.addFlags(Intent.FLAG_RECEIVER_NO_ABORT); + broadcastIntentLocked(null, null, intent, + null, null, 0, null, null, + android.Manifest.permission.RECEIVE_BOOT_COMPLETED, AppOpsManager.OP_NONE, + true, false, MY_PID, Process.SYSTEM_UID, userId); + } + int num = mUserLru.size(); + int i = 0; + while (num > MAX_RUNNING_USERS && i < mUserLru.size()) { + Integer oldUserId = mUserLru.get(i); + UserStartedState oldUss = mStartedUsers.get(oldUserId); + if (oldUss == null) { + // Shouldn't happen, but be sane if it does. + mUserLru.remove(i); + num--; + continue; + } + if (oldUss.mState == UserStartedState.STATE_STOPPING + || oldUss.mState == UserStartedState.STATE_SHUTDOWN) { + // This user is already stopping, doesn't count. + num--; + i++; + continue; + } + if (oldUserId == UserHandle.USER_OWNER || oldUserId == mCurrentUserId) { + // Owner and current can't be stopped, but count as running. + i++; + continue; + } + // This is a user to be stopped. + stopUserLocked(oldUserId, null); + num--; + i++; + } + } + } + + @Override + public int stopUser(final int userId, final IStopUserCallback callback) { + if (checkCallingPermission(android.Manifest.permission.INTERACT_ACROSS_USERS_FULL) + != PackageManager.PERMISSION_GRANTED) { + String msg = "Permission Denial: switchUser() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " requires " + android.Manifest.permission.INTERACT_ACROSS_USERS_FULL; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + if (userId <= 0) { + throw new IllegalArgumentException("Can't stop primary user " + userId); + } + synchronized (this) { + return stopUserLocked(userId, callback); + } + } + + private int stopUserLocked(final int userId, final IStopUserCallback callback) { + if (mCurrentUserId == userId) { + return ActivityManager.USER_OP_IS_CURRENT; + } + + final UserStartedState uss = mStartedUsers.get(userId); + if (uss == null) { + // User is not started, nothing to do... but we do need to + // callback if requested. + if (callback != null) { + mHandler.post(new Runnable() { + @Override + public void run() { + try { + callback.userStopped(userId); + } catch (RemoteException e) { + } + } + }); + } + return ActivityManager.USER_OP_SUCCESS; + } + + if (callback != null) { + uss.mStopCallbacks.add(callback); + } + + if (uss.mState != UserStartedState.STATE_STOPPING + && uss.mState != UserStartedState.STATE_SHUTDOWN) { + uss.mState = UserStartedState.STATE_STOPPING; + updateStartedUserArrayLocked(); + + long ident = Binder.clearCallingIdentity(); + try { + // We are going to broadcast ACTION_USER_STOPPING and then + // once that is done send a final ACTION_SHUTDOWN and then + // stop the user. + final Intent stoppingIntent = new Intent(Intent.ACTION_USER_STOPPING); + stoppingIntent.addFlags(Intent.FLAG_RECEIVER_REGISTERED_ONLY); + stoppingIntent.putExtra(Intent.EXTRA_USER_HANDLE, userId); + stoppingIntent.putExtra(Intent.EXTRA_SHUTDOWN_USERSPACE_ONLY, true); + final Intent shutdownIntent = new Intent(Intent.ACTION_SHUTDOWN); + // This is the result receiver for the final shutdown broadcast. + final IIntentReceiver shutdownReceiver = new IIntentReceiver.Stub() { + @Override + public void performReceive(Intent intent, int resultCode, String data, + Bundle extras, boolean ordered, boolean sticky, int sendingUser) { + finishUserStop(uss); + } + }; + // This is the result receiver for the initial stopping broadcast. + final IIntentReceiver stoppingReceiver = new IIntentReceiver.Stub() { + @Override + public void performReceive(Intent intent, int resultCode, String data, + Bundle extras, boolean ordered, boolean sticky, int sendingUser) { + // On to the next. + synchronized (ActivityManagerService.this) { + if (uss.mState != UserStartedState.STATE_STOPPING) { + // Whoops, we are being started back up. Abort, abort! + return; + } + uss.mState = UserStartedState.STATE_SHUTDOWN; + } + broadcastIntentLocked(null, null, shutdownIntent, + null, shutdownReceiver, 0, null, null, null, AppOpsManager.OP_NONE, + true, false, MY_PID, Process.SYSTEM_UID, userId); + } + }; + // Kick things off. + broadcastIntentLocked(null, null, stoppingIntent, + null, stoppingReceiver, 0, null, null, + android.Manifest.permission.INTERACT_ACROSS_USERS, AppOpsManager.OP_NONE, + true, false, MY_PID, Process.SYSTEM_UID, UserHandle.USER_ALL); + } finally { + Binder.restoreCallingIdentity(ident); + } + } + + return ActivityManager.USER_OP_SUCCESS; + } + + void finishUserStop(UserStartedState uss) { + final int userId = uss.mHandle.getIdentifier(); + boolean stopped; + ArrayList<IStopUserCallback> callbacks; + synchronized (this) { + callbacks = new ArrayList<IStopUserCallback>(uss.mStopCallbacks); + if (mStartedUsers.get(userId) != uss) { + stopped = false; + } else if (uss.mState != UserStartedState.STATE_SHUTDOWN) { + stopped = false; + } else { + stopped = true; + // User can no longer run. + mStartedUsers.remove(userId); + mUserLru.remove(Integer.valueOf(userId)); + updateStartedUserArrayLocked(); + + // Clean up all state and processes associated with the user. + // Kill all the processes for the user. + forceStopUserLocked(userId, "finish user"); + } + } + + for (int i=0; i<callbacks.size(); i++) { + try { + if (stopped) callbacks.get(i).userStopped(userId); + else callbacks.get(i).userStopAborted(userId); + } catch (RemoteException e) { + } + } + + mStackSupervisor.removeUserLocked(userId); + } + + @Override + public UserInfo getCurrentUser() { + if ((checkCallingPermission(android.Manifest.permission.INTERACT_ACROSS_USERS) + != PackageManager.PERMISSION_GRANTED) && ( + checkCallingPermission(android.Manifest.permission.INTERACT_ACROSS_USERS_FULL) + != PackageManager.PERMISSION_GRANTED)) { + String msg = "Permission Denial: getCurrentUser() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " requires " + android.Manifest.permission.INTERACT_ACROSS_USERS; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + synchronized (this) { + return getUserManagerLocked().getUserInfo(mCurrentUserId); + } + } + + int getCurrentUserIdLocked() { + return mCurrentUserId; + } + + @Override + public boolean isUserRunning(int userId, boolean orStopped) { + if (checkCallingPermission(android.Manifest.permission.INTERACT_ACROSS_USERS) + != PackageManager.PERMISSION_GRANTED) { + String msg = "Permission Denial: isUserRunning() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " requires " + android.Manifest.permission.INTERACT_ACROSS_USERS; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + synchronized (this) { + return isUserRunningLocked(userId, orStopped); + } + } + + boolean isUserRunningLocked(int userId, boolean orStopped) { + UserStartedState state = mStartedUsers.get(userId); + if (state == null) { + return false; + } + if (orStopped) { + return true; + } + return state.mState != UserStartedState.STATE_STOPPING + && state.mState != UserStartedState.STATE_SHUTDOWN; + } + + @Override + public int[] getRunningUserIds() { + if (checkCallingPermission(android.Manifest.permission.INTERACT_ACROSS_USERS) + != PackageManager.PERMISSION_GRANTED) { + String msg = "Permission Denial: isUserRunning() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " requires " + android.Manifest.permission.INTERACT_ACROSS_USERS; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + synchronized (this) { + return mStartedUserArray; + } + } + + private void updateStartedUserArrayLocked() { + int num = 0; + for (int i=0; i<mStartedUsers.size(); i++) { + UserStartedState uss = mStartedUsers.valueAt(i); + // This list does not include stopping users. + if (uss.mState != UserStartedState.STATE_STOPPING + && uss.mState != UserStartedState.STATE_SHUTDOWN) { + num++; + } + } + mStartedUserArray = new int[num]; + num = 0; + for (int i=0; i<mStartedUsers.size(); i++) { + UserStartedState uss = mStartedUsers.valueAt(i); + if (uss.mState != UserStartedState.STATE_STOPPING + && uss.mState != UserStartedState.STATE_SHUTDOWN) { + mStartedUserArray[num] = mStartedUsers.keyAt(i); + num++; + } + } + } + + @Override + public void registerUserSwitchObserver(IUserSwitchObserver observer) { + if (checkCallingPermission(android.Manifest.permission.INTERACT_ACROSS_USERS_FULL) + != PackageManager.PERMISSION_GRANTED) { + String msg = "Permission Denial: registerUserSwitchObserver() from pid=" + + Binder.getCallingPid() + + ", uid=" + Binder.getCallingUid() + + " requires " + android.Manifest.permission.INTERACT_ACROSS_USERS_FULL; + Slog.w(TAG, msg); + throw new SecurityException(msg); + } + + mUserSwitchObservers.register(observer); + } + + @Override + public void unregisterUserSwitchObserver(IUserSwitchObserver observer) { + mUserSwitchObservers.unregister(observer); + } + + private boolean userExists(int userId) { + if (userId == 0) { + return true; + } + UserManagerService ums = getUserManagerLocked(); + return ums != null ? (ums.getUserInfo(userId) != null) : false; + } + + int[] getUsersLocked() { + UserManagerService ums = getUserManagerLocked(); + return ums != null ? ums.getUserIds() : new int[] { 0 }; + } + + UserManagerService getUserManagerLocked() { + if (mUserManager == null) { + IBinder b = ServiceManager.getService(Context.USER_SERVICE); + mUserManager = (UserManagerService)IUserManager.Stub.asInterface(b); + } + return mUserManager; + } + + private int applyUserId(int uid, int userId) { + return UserHandle.getUid(userId, uid); + } + + ApplicationInfo getAppInfoForUser(ApplicationInfo info, int userId) { + if (info == null) return null; + ApplicationInfo newInfo = new ApplicationInfo(info); + newInfo.uid = applyUserId(info.uid, userId); + newInfo.dataDir = USER_DATA_DIR + userId + "/" + + info.packageName; + return newInfo; + } + + ActivityInfo getActivityInfoForUser(ActivityInfo aInfo, int userId) { + if (aInfo == null + || (userId < 1 && aInfo.applicationInfo.uid < UserHandle.PER_USER_RANGE)) { + return aInfo; + } + + ActivityInfo info = new ActivityInfo(aInfo); + info.applicationInfo = getAppInfoForUser(info.applicationInfo, userId); + return info; + } +} |